SlideShare a Scribd company logo
1 of 30
Download to read offline
© 2013 IBM Corporation
IBM Security Intelligence
Less Threat. More Intelligence.
Brendan Hannigan
General Manager, IBM Security Systems
© 2013 IBM Corporation
3
Evolving Threat Landscape
Evolving CISO Landscape
4
CISO Challenge: Competing priorities
83%of enterprises
have difficulty filling
security roles
increase
in Web application
vulnerabilities
from 2011 to 2012
14%
Increase in
compliance
mandates
Common
Vulnerabilities
and Exposures
5
CISO Challenge: Inadequate tools
85tools from
0 out of 46
vendors detected
malware
45vendors
Source: IBM client example
6
CISO Challenge: Business pressures
of CISOs are
concerned about Cloud and
mobile security
of organizations
are using at least one
cloud platform
70%
75%+
7
stolen from
bank accounts
in Operation
High Roller
of C-level execs
say that negligent
insiders are their
biggest concern
increase
in critical
web browser
vulnerabilities
59%
43%
INTERNAL EXTERNAL PAYOFFS
$78M
CISO Challenge: Evolving Threats
8
Advantage: Attacker
9
1 2 3
InnovationIntelligenceFocus
10
Focus
USERS
ASSETSTRANSACTIONS
11
USERS
60,000 employees
Provisioning took up to 2 weeks
No monitoring of privileged users
Focus on users,
not devices
Implement identity
intelligence
Pay special attention
to trusted insiders
Privilege Identity Management
Monitoring and same-day
de-provisioning
for 100+ privileged users
Source: IBM client example
12
ASSETS
critical databases
$21M
Saved
2,000
Secured
in compliance costs
Database Access and Monitoring
Thousands of databases containing
HR, ERP, credit card, and other PII
in a world where 98%
of breaches hit databases
Discover critical business
data
Harden and
secure repositories
Monitor and prevent
unauthorized access
Source: IBM client example
13
30 Million customers in an industry where
$3.4B industry losses from online fraud
85% of breaches go undetected
TRANSACTIONS
Identify most
critical transactions
Monitor sessions,
access, and devices
Look for anomalies
and attacks
Advanced Fraud Protection
Zero instances of fraud
on over 1 million customer endpoints
reported
Source: IBM client example
14
Intelligence
ANALYTICS
VISIBILITYINTEGRATION
15
Context, clustering, baselining,
machine learning, and heuristics
Identify entire classes of Mutated threats
by analyzing 250+protocols and file typesANALYTICS
Pattern
matching
Don’t rely on
signature detection
Use baselines
and reputation
Identify
outliers
16
Reduce 2 Billion logs and events per day
to 25high priority offenses
Get full coverage,
No more blind spots
Reduce and
prioritize alerts
Continuous
monitoring
VISIBILITY
Source: IBM client example
17
Integrated
Platforms
Eliminate silos and
point solutions
Build upon a
common platform
Share information
between controls
Monitor threats across 8 Million subscribers
with an integrated PlatformINTEGRATION
Siloed
Point Products
Source: IBM client example
18
CLOUD
MOBILE
Innovation
19
Cloud-enhanced Security
Automated, customizable,
and elastic
Cloud is an opportunity
for enhanced security
Traditional Security
Manual
and static
20
Mobility is the opportunity
to get security right
Network
and Access
Control
Fraud
Protection
Application
and Data
Security
Endpoint
Management
21
Intelligence
Integration
Expertise
IBM Security Framework
Professional, Managed,
and Cloud Services
22
Advanced Threat Protection
Staying ahead of sophisticated attacks
Defense StrategyAttack Chain IBM Capabilities and Services
QRadar Security Intelligence
X-Force Threat Intelligence
Emergency Response Services
Network Protection
InfoSphere Guardium
Trusteer Apex
QRadar Vulnerability Manager
Endpoint Manager
AppScan
23
CISO: Checkmate!
Analytics-powered security
Leaning forward.
Felix Mohan
Bharti Airtel Limited
© 2013 IBM Corporation
25
Align. Make intelligent.
Third-party risk
Advanced attacks
Regulatory compliance
Voice to data shift
Competitive pressure
Disruptive technologies
Automation
Optimization
Culture
Competency
Communication
Intelligence
Aggravators
Concerns
Align.
Make
intelligent.
Business-aligned
Analytics-driven
26
Airtel intelligence structure.
Technology
Interaction
Information
Integration
Analytics
ContextSecurity
devices
Network
devices
Events
Flows
Contextual assessments
Better risk management
Prioritized and actionable intelligence
Broader and deeper vulnerability insight
Better protection from advanced attacks
Quicker response
QFlow and VFlow Collector
Vulnerability Manager
Risk Manager
SIEM
QRadar
X-Force external threat feed
Trusteer* (2014) Openpages*, BigInsights* (2015-16)
27
Understand. Prioritize. Act.
Advanced threat
protection
Risk
management
Compliance Resource
optimization
Fraud
protection
Simulate “what ifs” for risk impact
Remediate zero-days and new security threats
Monitor asset profiles & behaviour continuously
Visualize traffic patterns and connections
Comply with regulatory mandates and policies
Prioritize vulnerability remediation
Protect transactions
Carry out advanced incident analysis & forensics
Optimize resources and efforts
We are moving from dousing fires to ensuring they don’t happen in the first place!
Vulnerability
scan data
Configuration
data
Event
data Activity
data
Context
Network
topology
#IBMINTERCONNECT
© 2013 IBM Corporation
Thank You
29
10+ demos
5 appliances
•  Visit the Security Intelligence
area in the Solution Center
•  Meet experts from the IBM
Security Singapore Lab
•  Solution Center Sessions: Enhancing IBM Security solutions
with Trusteer fraud detection capabilities
•  Technical Session: Dedicated Security track featuring
Identity and Access Management, Security Intelligence,
Mobile Security, and more
Don’t miss partner & client speakers including YaData and Asian Paints
Don’t miss…
All
Day
2
Day
3
© 2013 IBM Corporation

More Related Content

What's hot

Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
calebbarlow
 

What's hot (20)

Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
T&M Cyber
T&M CyberT&M Cyber
T&M Cyber
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 

Viewers also liked (8)

Information Extraction from HTML: General Machine Learning ...
Information Extraction from HTML: General Machine Learning ...Information Extraction from HTML: General Machine Learning ...
Information Extraction from HTML: General Machine Learning ...
 
Computer Evolution
Computer EvolutionComputer Evolution
Computer Evolution
 
Branches of TOM, Machine & Structure, Kinematic Links
Branches of TOM, Machine & Structure, Kinematic LinksBranches of TOM, Machine & Structure, Kinematic Links
Branches of TOM, Machine & Structure, Kinematic Links
 
Android Application Development for Intel Platform
Android Application Development for Intel PlatformAndroid Application Development for Intel Platform
Android Application Development for Intel Platform
 
Lecture 9 slides: Machine learning for Protein Structure ...
Lecture 9 slides: Machine learning for Protein Structure ...Lecture 9 slides: Machine learning for Protein Structure ...
Lecture 9 slides: Machine learning for Protein Structure ...
 
Operating System 2
Operating System 2Operating System 2
Operating System 2
 
Ntroduction to computer architecture and organization
Ntroduction to computer architecture and organizationNtroduction to computer architecture and organization
Ntroduction to computer architecture and organization
 
System Programing Unit 1
System Programing Unit 1System Programing Unit 1
System Programing Unit 1
 

Similar to IBM InterConnect 2013 Security Keynote

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 

Similar to IBM InterConnect 2013 Security Keynote (20)

AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
 
7 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 20157 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 2015
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Power Of SIEM Solutions With CloudIBN
Power Of SIEM Solutions With CloudIBNPower Of SIEM Solutions With CloudIBN
Power Of SIEM Solutions With CloudIBN
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 

More from IBM Events

IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM Events
 

More from IBM Events (15)

IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in Context
IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in ContextIBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in Context
IBM InterConnect 2013 Smarter Commerce Keynote: Your Customer in Context
 
IBM InterConnect 2013 Smarter Commerce Keynote: SingTel
IBM InterConnect 2013 Smarter Commerce Keynote: SingTelIBM InterConnect 2013 Smarter Commerce Keynote: SingTel
IBM InterConnect 2013 Smarter Commerce Keynote: SingTel
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
 
IBM InterConnect 2013 Mobile Keynote: Kristen Lauria
IBM InterConnect 2013 Mobile Keynote: Kristen LauriaIBM InterConnect 2013 Mobile Keynote: Kristen Lauria
IBM InterConnect 2013 Mobile Keynote: Kristen Lauria
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Spindo
IBM InterConnect 2013 Expert Integrated Systems Keynote: SpindoIBM InterConnect 2013 Expert Integrated Systems Keynote: Spindo
IBM InterConnect 2013 Expert Integrated Systems Keynote: Spindo
 
IBM InterConnect 2013: DevOps Keynote
IBM InterConnect 2013: DevOps KeynoteIBM InterConnect 2013: DevOps Keynote
IBM InterConnect 2013: DevOps Keynote
 
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle MollotInterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
 
InterConnect 2013 Cloud General Session: Douglas White
InterConnect 2013 Cloud General Session: Douglas WhiteInterConnect 2013 Cloud General Session: Douglas White
InterConnect 2013 Cloud General Session: Douglas White
 
IBM InterConnect 2013 Cloud General Session: Jamie Thomas
IBM InterConnect 2013 Cloud General Session: Jamie ThomasIBM InterConnect 2013 Cloud General Session: Jamie Thomas
IBM InterConnect 2013 Cloud General Session: Jamie Thomas
 
IBM InterConnect 2013 Cloud General Session: Tom Rosamilia
IBM InterConnect 2013 Cloud General Session: Tom RosamiliaIBM InterConnect 2013 Cloud General Session: Tom Rosamilia
IBM InterConnect 2013 Cloud General Session: Tom Rosamilia
 
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
 
IBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: George KaridisIBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: George Karidis
 
IBM InterConnect 2013 Cloud General Session: Bryan Guenther
IBM InterConnect 2013 Cloud General Session: Bryan GuentherIBM InterConnect 2013 Cloud General Session: Bryan Guenther
IBM InterConnect 2013 Cloud General Session: Bryan Guenther
 
IBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013: Big Data and Analytics Presented by Mike RhodinIBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
IBM InterConnect 2013: Big Data and Analytics Presented by Mike Rhodin
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

IBM InterConnect 2013 Security Keynote