This document discusses treating cybersecurity risks like public health issues by collecting and analyzing cyber threat data. It proposes adopting approaches used by Patient Safety Organizations (PSOs) that collect medical error data to identify risks. PSOs analyze error sources, propose prevention methods, and raise awareness. Similarly, the document argues, cyber risk intelligence programs should collect online data on cyber attacks, standardize it, analyze trends to manage organizational and supply chain risks, and educate stakeholders. It promotes the speaker's company, SurfWatch Labs, as providing a solution to bridge tactical cybersecurity and strategic insights through real-time healthcare cyber reports and samples.
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax Technology
Haystax Technology, Inc. provides next-generation intelligence and analytics solutions that deliver up to the minute situational awareness and actionable intelligence for the public and commercial sectors. Haystax uses a combination of software and human analysis to turn large, disparate and unstructured data volumes into comprehensive and actionable information. In essence, these technologies allow users to find “the needle in the haystack” quickly and reliably.
Applying advanced analytic techniques to enable rapid real-time enterprise threat intelligence and awareness. This presentation looks at how data + algorithms can help enterprises improve their overall threat posture.
“Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption”diannepatricia
Chuck Howell, Chief Engineer for Intelligence Programs and Integration at the MITRE Corporation, presentation “Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption” as part of the Cognitive Systems Institute Speaker Series.
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteInterset
Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture.
Presentation delivered by Bryan Ware, CTO at Haystax Technology at The Research Board Symposium on Information Risk Management in NYC. This presentation provides an overview of the importance of this approach. Contact the author for a more detailed explanation of the approach.
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Interset
At the 2018 CRIAQ RDV Forum, Interset Director of Field Operations Jay Lillie presented on Interset's mission to apply principled math and data science to cybersecurity in order to detect insider threats.
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoescentralohioissa
This presentation is to provide IT departments who have not leveraged their own data analytics skills for increasing the efficiency and effectiveness of compliance efforts to implement very low-cost solutions while achieving high returns on investment. Focusing on understanding how audit performs testing should assist IT organizations in designing their own compliance testing. Multiple examples will be provided to demonstrate how unlocking the potential of small and/or unstructured data and focusing on data relationships will improve overall data integrity and provide quantifiable measures of operational effectiveness.
Check out these slides from SpiceWorld London that talk about debuzzing network security! Sometimes we get so caught up using buzzwords that we lose the point of the whole solution, we don’t want that to be the case for our new online security solution and we need the SpiceHeads to help! Be the first to see our totally new solution and help us to shape the future of a tool that gives you the power to manage your network security like large enterprises, at a fraction of the price and time commitment.
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax Technology
Haystax Technology, Inc. provides next-generation intelligence and analytics solutions that deliver up to the minute situational awareness and actionable intelligence for the public and commercial sectors. Haystax uses a combination of software and human analysis to turn large, disparate and unstructured data volumes into comprehensive and actionable information. In essence, these technologies allow users to find “the needle in the haystack” quickly and reliably.
Applying advanced analytic techniques to enable rapid real-time enterprise threat intelligence and awareness. This presentation looks at how data + algorithms can help enterprises improve their overall threat posture.
“Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption”diannepatricia
Chuck Howell, Chief Engineer for Intelligence Programs and Integration at the MITRE Corporation, presentation “Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption” as part of the Cognitive Systems Institute Speaker Series.
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteInterset
Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture.
Presentation delivered by Bryan Ware, CTO at Haystax Technology at The Research Board Symposium on Information Risk Management in NYC. This presentation provides an overview of the importance of this approach. Contact the author for a more detailed explanation of the approach.
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Interset
At the 2018 CRIAQ RDV Forum, Interset Director of Field Operations Jay Lillie presented on Interset's mission to apply principled math and data science to cybersecurity in order to detect insider threats.
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoescentralohioissa
This presentation is to provide IT departments who have not leveraged their own data analytics skills for increasing the efficiency and effectiveness of compliance efforts to implement very low-cost solutions while achieving high returns on investment. Focusing on understanding how audit performs testing should assist IT organizations in designing their own compliance testing. Multiple examples will be provided to demonstrate how unlocking the potential of small and/or unstructured data and focusing on data relationships will improve overall data integrity and provide quantifiable measures of operational effectiveness.
Check out these slides from SpiceWorld London that talk about debuzzing network security! Sometimes we get so caught up using buzzwords that we lose the point of the whole solution, we don’t want that to be the case for our new online security solution and we need the SpiceHeads to help! Be the first to see our totally new solution and help us to shape the future of a tool that gives you the power to manage your network security like large enterprises, at a fraction of the price and time commitment.
Next generation analytics and cybersecurity solutions that takes a holistic approach to enabling, protecting, managing and supporting mission critical enterprise systems.
Steven Greschner was the CEO of the Aviion and recommend that you contact the Arizona, Utah, or Idaho Fusion Center to find out for yourself what is the company about.
Get it Together: ChainLink Securely Tying Smart Contracts to the Data They Re...Steve Miller, CFA
ChainLink is a project with a clear use case driven by market demand. Supported by a strong team and an engaged community. These positive factors are undermined by opaque distribution and minimal decentralization. Resulting in a token score of 33 out of 50.
Haystax Technology, Inc. provides next-generation intelligence and analytics solutions that deliver up to the minute situational awareness and actionable intelligence for the public and commercial sectors. Haystax uses a combination of software and human analysis to turn large, disparate and unstructured data volumes into comprehensive and actionable information. In essence, these technologies allow users to find “the needle in the haystack” quickly and reliably.
How to Operationalize Big Data Security AnalyticsInterset
Analytics tools and analysis tools are not the same. Here is how to accelerate threat-detection activities with a holistic, strategic security-analytics solution.
Can Health Data Technology be Empathetic? Person-centric Data PracticesODH, Inc.
Can Technology be Empathetic? Designing Person-Centric Data Practices
Originally presented by ODH, Inc. CEO at AHIP June, 2018
Updated by Adam Johnson, Vice President, Product Development & Operations, ODH, Inc.
Empathy in Healthcare Technology can help tackle big challenges:
• Reducing costs
• Improving outcomes
• Increased satisfaction
• Fewer errors
Data technology's strength has been its ability to distill insights from mountains of data, but what’s missing?
What forms does Empathetic Technology take?
Health data can add Social Determinants of Health, besides clinical and other info, but to what end? Will the analyses result in actionable insights? What might be done differently? Better?
Challenges & Opportunities in Managing Cyber RisksAnna Gomez
• Outline the resource, technology, awareness and financial
challenges among small and medium providers to handle
emerging security risks and ransomware attacks
• Explore potential opportunities to help small, medium and
even large healthcare providers especially from efficient
management of cyber risk program
• Call for an active participation by the board members and
audit compliance committees in raising the support and
investment required for cybersecurity programs
• Highlight key recommendations from the National
Cybersecurity Taskforce formed by the Department of Health
and Human Services
Risk Intelligence: Threats are the New RiskResolver Inc.
Do you know the criticality of the assets within your organization? If your answer is ‘no’, don’t worry – chances are, your cyber teams don’t either. Security is badly in need of holistic security leadership. Most security practitioners don’t know that information security risk is processed the same way that physical security risk is processed. By increasing your overall risk awareness, you can take a leadership stance in security within your organization.
The first confirmed case of 2019-nCoV infection in the United States was reported on January 20, 2020. A lot has happened in healthcare and in security since then - - workers have gone home, telehealth literally blew up, the threat landscape has changed and the attack surface is almost beyond a CISO’s control.
In this session, Dave Bailey, CynergisTek’s Director of Security Services, and Randall Frietzsche, an experienced CISO, strategically-focused InfoSec Executive and Harvard instructor will discuss what that all means to security, security assessment, budgets, staffing and working with employees and clinicians in the new world. Attendees will leave this session with lots of ideas and even more things to think about.
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
A quick summary of the current state of big data technology and data science approaches used in cyber / network defender security analytics including summary use cases, a walk through of a reference architecture and breakdown of the required skills. Focus is on the knowledge needed to run a proof of concept and establish a programme for early benefits. Will then also include a view on the future of extending the platforms and capabilities of security analytics to cover performance metrics and data-driven security management approaches.
Presentation by Ansgar Koene (Chair of IEEE P7003 – Algorithmic Bias Working Group, University of Notthingham, UK) at the event "Incorporating Ethical Considerations in Autonomous & Intelligent Systems (A/IS) – Policy & Industry Requirements in the Algorithmic Age". The event took place on 11 June 2018 and was jointly organized by IEEE Standards Association (IEEE-SA) and the Delft Design for Values Institute (DDFV). For more info see http://designforvalues.tudelft.nl/event/incorporating-ethical-considerations-in-ai-policy-industry-requirements/
The presentation is devoted to the main trends and problems in the development of medicine, what allows artificial Intelligence and Data Science on the basis of analysis of large data sets and key characteristics of teams working with AI and DS in medicine etc.
This presentation by Nataliya Siromakha (Director, Engineering, Kharkiv) was delivered at Outsource People 2017 (Kyiv) on October 13, 2017.
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...SurfWatch Labs
Credit Unions have to deal with the same cybercrime-related issues as large banks, but they often have less resources to address those risks. Cyber risk intelligence can help to make sure they use those limited resources wisely.
Next generation analytics and cybersecurity solutions that takes a holistic approach to enabling, protecting, managing and supporting mission critical enterprise systems.
Steven Greschner was the CEO of the Aviion and recommend that you contact the Arizona, Utah, or Idaho Fusion Center to find out for yourself what is the company about.
Get it Together: ChainLink Securely Tying Smart Contracts to the Data They Re...Steve Miller, CFA
ChainLink is a project with a clear use case driven by market demand. Supported by a strong team and an engaged community. These positive factors are undermined by opaque distribution and minimal decentralization. Resulting in a token score of 33 out of 50.
Haystax Technology, Inc. provides next-generation intelligence and analytics solutions that deliver up to the minute situational awareness and actionable intelligence for the public and commercial sectors. Haystax uses a combination of software and human analysis to turn large, disparate and unstructured data volumes into comprehensive and actionable information. In essence, these technologies allow users to find “the needle in the haystack” quickly and reliably.
How to Operationalize Big Data Security AnalyticsInterset
Analytics tools and analysis tools are not the same. Here is how to accelerate threat-detection activities with a holistic, strategic security-analytics solution.
Can Health Data Technology be Empathetic? Person-centric Data PracticesODH, Inc.
Can Technology be Empathetic? Designing Person-Centric Data Practices
Originally presented by ODH, Inc. CEO at AHIP June, 2018
Updated by Adam Johnson, Vice President, Product Development & Operations, ODH, Inc.
Empathy in Healthcare Technology can help tackle big challenges:
• Reducing costs
• Improving outcomes
• Increased satisfaction
• Fewer errors
Data technology's strength has been its ability to distill insights from mountains of data, but what’s missing?
What forms does Empathetic Technology take?
Health data can add Social Determinants of Health, besides clinical and other info, but to what end? Will the analyses result in actionable insights? What might be done differently? Better?
Challenges & Opportunities in Managing Cyber RisksAnna Gomez
• Outline the resource, technology, awareness and financial
challenges among small and medium providers to handle
emerging security risks and ransomware attacks
• Explore potential opportunities to help small, medium and
even large healthcare providers especially from efficient
management of cyber risk program
• Call for an active participation by the board members and
audit compliance committees in raising the support and
investment required for cybersecurity programs
• Highlight key recommendations from the National
Cybersecurity Taskforce formed by the Department of Health
and Human Services
Risk Intelligence: Threats are the New RiskResolver Inc.
Do you know the criticality of the assets within your organization? If your answer is ‘no’, don’t worry – chances are, your cyber teams don’t either. Security is badly in need of holistic security leadership. Most security practitioners don’t know that information security risk is processed the same way that physical security risk is processed. By increasing your overall risk awareness, you can take a leadership stance in security within your organization.
The first confirmed case of 2019-nCoV infection in the United States was reported on January 20, 2020. A lot has happened in healthcare and in security since then - - workers have gone home, telehealth literally blew up, the threat landscape has changed and the attack surface is almost beyond a CISO’s control.
In this session, Dave Bailey, CynergisTek’s Director of Security Services, and Randall Frietzsche, an experienced CISO, strategically-focused InfoSec Executive and Harvard instructor will discuss what that all means to security, security assessment, budgets, staffing and working with employees and clinicians in the new world. Attendees will leave this session with lots of ideas and even more things to think about.
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
A quick summary of the current state of big data technology and data science approaches used in cyber / network defender security analytics including summary use cases, a walk through of a reference architecture and breakdown of the required skills. Focus is on the knowledge needed to run a proof of concept and establish a programme for early benefits. Will then also include a view on the future of extending the platforms and capabilities of security analytics to cover performance metrics and data-driven security management approaches.
Presentation by Ansgar Koene (Chair of IEEE P7003 – Algorithmic Bias Working Group, University of Notthingham, UK) at the event "Incorporating Ethical Considerations in Autonomous & Intelligent Systems (A/IS) – Policy & Industry Requirements in the Algorithmic Age". The event took place on 11 June 2018 and was jointly organized by IEEE Standards Association (IEEE-SA) and the Delft Design for Values Institute (DDFV). For more info see http://designforvalues.tudelft.nl/event/incorporating-ethical-considerations-in-ai-policy-industry-requirements/
The presentation is devoted to the main trends and problems in the development of medicine, what allows artificial Intelligence and Data Science on the basis of analysis of large data sets and key characteristics of teams working with AI and DS in medicine etc.
This presentation by Nataliya Siromakha (Director, Engineering, Kharkiv) was delivered at Outsource People 2017 (Kyiv) on October 13, 2017.
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...SurfWatch Labs
Credit Unions have to deal with the same cybercrime-related issues as large banks, but they often have less resources to address those risks. Cyber risk intelligence can help to make sure they use those limited resources wisely.
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...SurfWatch Labs
By using Cyber Threat Intelligence, organizations can understand what specific threats they face and use these insights to drive the most effective defense.
Create a Safer Learning Environment with Absolute Safe SchoolsAbsolute
Educational organizations are embracing mobile devices to provide a more flexible approach to classroom learning. Laptops and tablets are enhancing the learning experience by motivating students, providing a wealth of instant information, and eliminating costly textbooks that date quickly. But along with the benefits of mobile devices comes the associated risks. Device theft is on the rise and some students are becoming targets of crime.
SANS Report: The State of Security in Control Systems TodaySurfWatch Labs
SANS conducted a survey of more than 300 ICS professionals and this presentation shares key highlights from the findings to give you insights on the cybersecurity challenges facing your peers and the approaches used to reduce cyber risks.
Containing the outbreak: The healthcare security pandemicAvecto
James Maude, Senior Security Engineer at Avecto examines the security state of play in the healthcare industry and why it’s now a prime target for hackers.
Point of Sale Insecurity: A Threat to Your BusinessSurfWatch Labs
PoS systems continue to be targeted by cybercriminals for card payment information as well as personally identifiable information. Even as organizations solidify their PoS security, cybercriminals evolve.
This presentation examines the State of PoS Insecurity. Read this to learn:
-Why situational awareness of your POS risks is a must
-Insights on the latest and trending POS cyber risks and impacts
-Fundamental security recommendations from SurfWatch Analysts
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...SurfWatch Labs
Threat intelligence needs to be in a language the business understands. SurfWatch Labs can help connect cyber threat intelligence to business operations in order to help manage cyber risk.
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
Simplifying BYOD deployments while satisfying HIPAA and other healthcare regulations. Virtual Mobile Infrastructure with strong biometric authentication and 4096-bit encryption. Android-based VDI for mobile security.
This presentation delves into the many cybersecurty risks that plague the healthcare industry and how these risks can be mitigated with the help of security solutions that Seqrite offers.
Ransomware attacks are not only growing and evolving but are getting more sophisticated by using advanced evasion techniques impacting individuals and organizations across verticals.
Seqrite security solutions provide multi-layered defense that prevents and blocks real-time threats and emerging ransomware infections.
Cyber Security presentation given by Luke Schneider, Chief Executive Officer of Medicine Bow Technologies at the 2016 Wyoming Hospital Association Annual Conference
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
The potential benefits of mobile medical technology and telemedicine are enormous, from better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance. In these slides I show why HIPAA compliant is not the same as being secure, and why protecting health data on mobile devices is a such a big security challenge.
Doug Copley presented on cybersecurity challenges in healthcare including threats, trends in healthcare, practical steps and building security without boundaries.
The 10 Most Trusted Healthcare IT Security Solution Providers 2018insightscare
With the impending risk in the mind, to assist healthcare organizations to prevent data security breaches, we bring you the “The 10 Most Trusted Healthcare IT Security Solution Providers” issue. In this issue, we are presenting to you some of the prominent companies and healthcare solution providers, who have successfully helped the industry to protect the patients’ information and other critical healthcare data against the ever-rising cyber-attacks.
Critical Issues in School Board Cyber SecurityDan Michaluk
An hour presentation to school board officials in Ontario on cyber security issues, covering the threat environment, defense, incident response, threat information sharing and vendor issues.
The 10 most trusted healthcare it security solution providers 2018insightscare
With the impending risk in the mind, to assist healthcare organizations to prevent data security breaches, we bring you the “The 10 Most Trusted Healthcare IT Security Solution Providers” issue.
Under cyber attack: EY's Global information security survey 2013EY
Under cyber-attack, EY's 16th annual Global Information Security Survey 2013 tracks the level of awareness and action by companies in response to cyber threats and canvases the opinion of over 1,900 senior executives globally. This year’s results show that as companies continue to invest heavily to protect themselves against cyber-attacks, the number of security breaches is on the rise and it is no longer of question of if, but when, a company will be the target of an attack.
For further information, visit: http://www.ey.com/GL/en/Services/Advisory/Cyber-security
Cyber Threat Intelligence is a process in which information from different sources is collected, then analyzed to identify and detect threats against any environment. The information collected could be evidence-based knowledge that could support the context, mechanism, indicators, or implications about an already existing threat against an environment, and/or the knowledge about an upcoming threat that could potentially affect the environment. Credit: Marlabs Inc
Technology is constantly transforming healthcare for the better, but getting technology right is an understated challenge for the industry. This webinar addresses three of healthcare's top challenges in tapping technology's full potential: cost, privacy and adoption. Experts and providers share tips, strategies and stories to help overcome these challenges to truly harness the power of transformative healthcare technology.
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
Cybersecurity risk assessments help organizations identify, manage and mitigate all forms of cyber risk. It is a critical component of any comprehensive data protection strategy.
ISACA talk - cybersecurity and security cultureCraig McGill
PwC's talented senior cybersecurity and infosec manager Ross Foley recently gave a great talk on the growing importance of security culture within infosec. Here are the slides to help raise awareness of this issue.
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskSurfWatch Labs
Data breaches and cyber-attacks are often tied to vendors, partners, or other external organizations. Threat intelligence can help to shed a light on an organization's third-party risks and help to provide guidance on how to mitigate that risk.
Know Your Adversary: Analyzing the Human Element in Evolving Cyber ThreatsSurfWatch Labs
Understanding the types of malicious actors that are attempting to compromise your organization, what motivates them, and what their goals are is a crucial step when it comes to taking action against cyber risks.
Using Threat Intelligence to Address Your Growing Digital RiskSurfWatch Labs
Cyber threat intelligence can be used to help organizations to better manage their growing digital risk footprints and drive more effective risk decisions.
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
The digital presence of organizations continues to expand, and with that expansion comes greater exposure to digital risks. Visibility into those risks is critical in order to effectively manage that risk.
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
Network-enabled or "smart" IOT devices are commonplace these days, with commercial and residential buildings having smart light bulbs, smart locks, DVRs, security cameras and more. The potential of having multiple devices per building potentially translates into the largest digital footprint that is NOT under proper security management.
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your RiskSurfWatch Labs
Today’s business world is online and as such is inherently chock full of cyber risks. Cybercriminals continue to take advantage of system vulnerabilities and social engineering to target personally identifiable information, credit card numbers, trade secrets and more. Although there are hundreds of security solutions, products and consultants that claim to solve and address data breaches, the traditional, tactical approach to security is not working. Evaluated cyber intelligence is trapped in your systems, applications and employees – and making that intelligence easily available and quickly understood can help your organization significantly reduce the cyber risks it faces and improve its business resilience.
This presentation examines how to reduce your cyber risks by unlocking the door to evaluated intelligence. Learn:
• Why the traditional threat intelligence approach is not addressing the problem
• Why it’s not just about adding on more security layers, but shifting your cybersecurity approach
• How to mine both your tactical and strategic cyber data for improved operational intelligence
• How to derive immediate visual insights of relevant trending cyber problems through security analytics
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
With the board room increasingly being held accountable for data breaches, it's crucial that they know and understand the cyber risks facing their organization.Connect board room to server room
How to Raise Cyber Risk Awareness and Management to the C-SuiteSurfWatch Labs
Who's responsible for cybersecurity at your organization? The accountability for cybersecurity has shifted to the C-Suite, and it's needs to become part of the overall business strategy.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
3. POLLING QUESTION
How do you know what your specific cyber risks are?
(Select the most appropriate answer)
A. Threat data feed
B. SIEM
C. Managed service provider/consultants
D. Internally research cyber threats
E. We don’t know
3
6. Do You Know It’s Coming?
Healthcare Targets Have
Been “Low Hanging Fruit”
for Cybercriminals
•Large health insurers
•Local dentists
•Specialized healthcare IT consulting firms
•Hospital chains
•Plastic surgery clinics
•Small regional hospitals
•Dialysis center chains
•Small insurance claims processing shops
6
9. This Cyber Emergency Requires
a Different Approach
9
The reactionary/crisis-mode
cybersecurity approach is not
working! What we need is…
Consistent, managed and
scientific cybersecurity
strategy based on long-
term commitment to data
collection and analysis.
10. Where to Start? Follow in the
Footsteps of PSOs
A Patient Safety Organization (PSO) is a group,
institution or association that improves medical
care by reducing medical errors. Common
functions of patient safety organizations are data
collection and analysis, reporting, education,
funding and advocacy.
Replace “medical care” with “cyber”
and you almost have it right?
10
11. Comparing PSOs to
Cyber Risk Intelligence
PSO Cyber Risk Intelligence
Collects data on prevalence and individual details of
errors.
Collects data on cyber activity from OSINT, dark web
and internal users.
Analyzes sources of error by root cause analysis. Standardizes cyber event data into ATEP model and
analyzes for trends.
Proposes and disseminates methods for error
prevention.
Speeds response (and pre-response) to incidents.
Designs and conducts projects to study safety
initiatives including monitoring of results.
Manages risks across your internal organization and
supply chain.
Raises awareness and informs the public, health
pros, providers, purchasers and employers.
Raises cross-organizational situational awareness of
cyber risks.
Conducts fundraising and provides funding for
research and safety projects.
Prioritizes the most effective use of tactical
cybersecurity solutions.
Advocates for regulatory and legislative changes. Educates and informs your management and peers.
11
14. How Do You Get Here?
• Sound risk management is founded in evaluated
intelligence, just like a PSO
• Simplify the complex cyber world into what matters
– Who attacked who/what?
– How was the attack carried out?
– What was the impact?
14
17. POLLING QUESTION
Do you have a formal threat intelligence and analysis
organization/program? (Select the most appropriate answer)
A.Our IT/cybersecurity team handles this
B.Our manager service provider handles this
C.No
D.I don’t know
E.Not yet, but planning on it
17
19. Bridge the Gap Between
Low-Level Tactics & Strategic Insights
19
20. SurfWatch Healthcare
Case Study
20
Large Non-Profit Healthcare
System Business Drivers
•Wanted to be able to produce their own
executive-level cyber reports
•“Because it’s real-time, SurfWatch provides
way more insight on the cyber world in
healthcare than our consulting firm was
providing us.”
SurfWatch Advantages:
•Gives full control of cyber reports produced for management
•Adds real-time cyber insights within the healthcare market
•Fraction of the cost of what company was paying consultant for static info
22. Next Steps and Q&A
22
Read the 2015 Mid-Year Cyber Risk Report:
info.surfwatchlabs.com/2015-mid-year-cyber-risk-report
Download Sample Dark Web Intel Report:
info.surfwatchlabs.com/dark-web-report
Schedule a Demonstration:
•SurfWatch C-Suite:
info.surfwatchlabs.com/request-demo
•Dark Web Intelligence Service:
info.surfwatchlabs.com/dark-web-service-consultation
This was at a dr’s office, where I was taken back and waiting to meet with the dr.
This year the healthcare industry has been on high alert – Anthem and Premera breaches. But this shouldn’t be such a surprise - Looking at data, in 2013 and 2014, Health care networks were being breached, but not by brute force. In fact, the attacks were not even particularly sophisticated at all, but they were carried out deftly:
Overlooked back doors in supply chains were being exploited
3rd party software with unchecked permissions was used to easily gain access
employees with access to networks were phished and their system privileges used to extract data
web applications with network and database access ran with default passwords and incorrect permissions
obvious software and network configurations persisted unchecked.
All veritable open doors.
And in 2015 we’ve seen bigger, badder breaches
Looking back at data from 1-2 years ago it was clear that a lot of bad cyber activity was going on without the good guys even knowing.
Each day, I watched the individual attackers hit their targets. Almost always, they were small and seemingly insignificant ones like local dentists, small consulting firms specializing in healthcare IT, 3-hospital chains in the Pacific NorthWest, plastic surgery clinics, tiny regional hospitals in out of the way parts of your own state that you’ve never even been to, dialysis center chains in the Southeast, 5-person insurance claims processing shops, one-off hospital websites in the Mid-West and even emergency vets just for reptiles (yes, they have those).
my meetings have shown me that, most often, organizations prize high-cost specialized tools, countless alerts and mountains of low-level log and threat data over anything else. They have been - and still are - too focused on “edge-case” threats independent of any specific risk relevance for their specific businesses. To me, it’s kinda like choosing to look through thousands of keyholes to try and paint a picture of what’s outside the house when you have a system of imagery satellites in geosynchronous orbit.
Worse yet, I’ve found most businesses prefer a very broad-spectrum “cover the waterfront” cyber defense approach mixed with just this kind of inconsistent, niche-focused emphasis on highly specific threats that have little true risk relevance for them. To say it another way, they spend on whatever everyone else is spending on at the macro level and get distracted into expending far too much energy worrying about micro threats for which they have little compelling evidence to support being a real threat to them at all.
This approach is not only all-too common across industry today, it is in fact, the standard. A standard that’s now starting to be seen as one of failure.
In my day job, as I meet each week with companies and their cybersecurity teams to exchange info and talk about the benefits of practical cyber intelligence functions inside their business organizations, that data has shown me an equally clear and bothersome image.
Healthcare, much like most other sectors throwing their hands up against an impossible cyber defense task, is indolently ignoring the process of gathering and using important, high-level intelligence to focus and tune their cyber defenses against immediate and trending threats.
This reactionary/emergency response approach to cyber simply isn’t getting the job done. What we need to do is take an existing approach used in the healthcare industry to treat disease and apply it to cyber… all based on a commitment to data mining, analysis and planning.
SurfWatch Labs Starts Where Traditional Threat Intelligence Stops
Powerful cyber risk analytics and practical BI apps that drive strategic insights for improved long-term cyber resilience
Met 3 team members in early Dec at SANS Healthcare Cyber Security Summit
Worked with Exec Director of Enterprise Shared Services, within HIPAA Security Program
Bought 10 user C-Suite license about 1 month after meeting at the event
Replacing $100k+ of services with C-Suite