SlideShare una empresa de Scribd logo
1 de 117
SCADA and ICS for
Security Experts:
         How to Avoid Being a Cyber Idiot


James Arlen, CISA
Black Hat Europe - Barcelona - 2010


                                            1
Disclaimer

 I am employed in the Infosec industry,
 but not authorized to speak on behalf
 of my employer or clients.


 Everything I say can be blamed on
 great food, mind-control and jet lag.



                                          2
Credentials

 15+ years information security specialist
 staff operations, consultant, auditor, researcher
 utilities vertical (grid operations, generation, distribution)
 financial vertical (banks, trust companies, trading)


                           ...still not an expert at anything.


                                                                  3
1/ Stop Sounding Stupid




                          4
Scada
got
sexy




        5
Follow
the
money




         6
Who's
an
expert
now?



         7
One
time
at
security
camp


           8
Gotta
get
me
a
piece
of
that
        9
Gotta
get
me
a
piece
of
that
        10
2/ Big Things and
    Little Things



                    11
Not all ‘scada’ is SCADA




                           12
Big things:
power grid




              13
Big things:
pipeline




              14
Inter-
connected
sensors and
controls
under
central
management
              15
Inter-
connected
sensors and
controls
under
central
management
              16
Supervisory control and
    data acquisition



                          17
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  18
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  19
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  20
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  21
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  22
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  23
Lots of
individual
capabilities
with some
orchestration


                24
Programmable
logic
controllers




               25
Programmable
logic
controllers




               26
Programmable
logic
controllers




               27
Industrial control systems/
Distributed control systems



                              28
3/ Part of a Bigger Picture




                              29
So if you
break the
computer,
you break
everything


             30
What
happens
when Edna
falls into the
reactant
vessel

                 31
This is the data

                   32
This is the data

                   33
This is the process

                      34
This is the process

                      35
This is the process

                      36
I know you
can grok
the protocol,
can you
break the
controls?

                37
I know you
can grok
the protocol,
can you
break the
controls?

                38
Oh, you
forgot about
safety




               39
Oh, you
forgot about
safety




               40
Oh, you
forgot about
testing




               41
Oh, you
forgot about
testing




               42
Oh, you
forgot about
people




               43
Oh, you
forgot about
people




               44
What if it really is SCADA?

                              45
Stuff breaks




               46
All the
&*^$ing
time




          47
And it gets
fixed




              48
And it gets
fixed




              49
And you
never
noticed




          50
And you
never
noticed




          51
And you
never
noticed




          52
And you
never
noticed




          53
4/ Practical Positive Things




                               54
You can
understand
this stuff




             55
You can
help




          56
They need
you




            57
You need to
suck it up




              58
It's time to
learn before
teaching




               59
It's time to
learn before
teaching




               60
5/ You Wouldn't Believe
    Me If I Told You



                          61
The
Organization
is
against
you


               62
Your prima
donna
attitude is
against you



              63
Your age is
against you




              64
It's time to
start
hacking




               65
First you
hack the
org




            66
Then you own their asses

                           67
Then you own their asses

                           68
6/ Movies Would Have
   You Believe



                       69
It's a mad
mad
graphical
awesome
world


             70
It's a mad
mad
graphical
awesome
world


             71
It's a mad
mad
graphical
awesome
world


             72
It's a mad
mad
graphical
awesome
world


             73
It's a mad
mad
graphical
awesome
world


             74
It's a mad
mad
graphical
awesome
world


             75
It's a mad
mad
graphical
awesome
world


             76
It's a mad
mad
graphical
awesome
world


             77
It's a mad
mad
graphical
awesome
world


             78
It's a mad
mad
graphical
awesome
world


             79
What an afternoon at the
console really feels like
                            80
What an afternoon at the
console really feels like
                            81
What an afternoon at the
console really feels like
                            82
7/ The Media Hypes
    It As If...



                     83
There's a
hacker
behind the
bush



             84
There's a
hacker
behind the
bush



             85
There's a
hacker
behind the
bush



             86
There's a
hacker
behind the
bush



             87
There's a
hacker
behind the
bush



             88
A 14yo in
Mom's
basement




            89
A 14yo in
Mom's
basement




            90
A 14yo in
Mom's
basement




            91
L337 cadre
of
genetically
engineered
supersoldiers


                92
L337 cadre
of
genetically
engineered
supersoldiers


                93
L337 cadre
of
genetically
engineered
supersoldiers


                94
Killer Tubes




               95
8/ Bad Shit That
    Actually Happened



                        96
Not
necessarily
public news.




               97
9/ What Could Have
   Saved It



                     98
Superheroes,
Ninjas and
Pirates




               99
Superheroes,
Ninjas and
Pirates




               100
Superheroes,
Ninjas and
Pirates




               101
Following
Instructions




               102
Or, not sucking at
implementation
                     103
Or, doing
what you're
told




              104
Or, stuff
that has
nothing at
all to do
with
computers

             105
10/ What You Can Do -
    Little Picture



                        106
Learn

        107
Stop listening to "experts"

                              108
Modest
changes,
massive
results



           109
11/ What You Can Do -
    Big Picture



                        110
Stop feeding
the trolls




               111
Avoid being
‘that person’




                112
Press for
sane
acquisitions




               113
Study past
success




             114
Study past
success




             115
Q & A
          @myrcurial
james.arlen@pushthestack.com




                               116
Credits, Links and Notices
                                 http://jamesarlen.net and
Me:                              http://www.linkedin.com/in/jamesarlen
                                 and sometimes http://liquidmatrix.org/blog

                                 All of you, My Family, Friends, Jeff Moss
                                 (for demanding this talk) and the rest of
                                 the Black Hat Europe Team.
Thanks:
                                 Mentors/Luminaries: D. Anderson, M. Fabro, J. Brodsky,
                                 R. Southworth, M. Sachs, C. Jager, B. Radvanovsky
                                 and J. Weiss (all from whom I borrowed material)

                                 twitter, fast music, caffeine, my lovely wife
Inspiration:                     and hackerish children, blinky lights, shiny
                                 things, & altruism.
      http://creativecommons.org/licenses/by-nc-sa/2.5/ca/                                117

Más contenido relacionado

Destacado

Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration TestingAhmed Sherif
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS CommunicationsDigital Bond
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsShah Sheikh
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsAleksandr Timorin
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 

Destacado (11)

Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration Testing
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 

Similar a BlackHat Europe 2010: SCADA and ICS for Security Experts

Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012Wil Reynolds
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackersgrugq
 
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)GeekWire
 
Pyramid Song
Pyramid SongPyramid Song
Pyramid SongFITC
 
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Vlad Styran
 
3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IP3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IPRising Media, Inc.
 
Secrets of a super hacker
Secrets of a super hackerSecrets of a super hacker
Secrets of a super hackerDecarl Decarl
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoDeja vu Security
 
2600 v15 n4 (winter 1998)
2600 v15 n4 (winter 1998)2600 v15 n4 (winter 1998)
2600 v15 n4 (winter 1998)Felipe Prado
 
William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015CSO_Presentations
 
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine LearningWell, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine LearningDevFest DC
 
Hackers contemplations
Hackers contemplationsHackers contemplations
Hackers contemplationsChris Roberts
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DANeil Lines
 
Just the basics_strata_2013
Just the basics_strata_2013Just the basics_strata_2013
Just the basics_strata_2013Ken Mwai
 
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...OpenCredo
 
2600 v22 n3 (autumn 2005)
2600 v22 n3 (autumn 2005)2600 v22 n3 (autumn 2005)
2600 v22 n3 (autumn 2005)Felipe Prado
 

Similar a BlackHat Europe 2010: SCADA and ICS for Security Experts (20)

100 ways to kill a concept
100 ways to kill a concept100 ways to kill a concept
100 ways to kill a concept
 
Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
 
Pyramid Song
Pyramid SongPyramid Song
Pyramid Song
 
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
 
3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IP3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IP
 
Dv40
Dv40Dv40
Dv40
 
Secrets of a super hacker
Secrets of a super hackerSecrets of a super hacker
Secrets of a super hacker
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
 
Flash Mob Sprint
Flash Mob SprintFlash Mob Sprint
Flash Mob Sprint
 
2600 v15 n4 (winter 1998)
2600 v15 n4 (winter 1998)2600 v15 n4 (winter 1998)
2600 v15 n4 (winter 1998)
 
William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015
 
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine LearningWell, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
 
Dec2018 istanbul-2
Dec2018 istanbul-2Dec2018 istanbul-2
Dec2018 istanbul-2
 
Hackers contemplations
Hackers contemplationsHackers contemplations
Hackers contemplations
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 
Just the basics_strata_2013
Just the basics_strata_2013Just the basics_strata_2013
Just the basics_strata_2013
 
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
 
2600 v22 n3 (autumn 2005)
2600 v22 n3 (autumn 2005)2600 v22 n3 (autumn 2005)
2600 v22 n3 (autumn 2005)
 

Más de James Arlen

Notacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next GenerationNotacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next GenerationJames Arlen
 
HAR2009 - Your Mind: Legal Status, Rights and Securing Yourself
HAR2009 - Your Mind: Legal Status, Rights and Securing YourselfHAR2009 - Your Mind: Legal Status, Rights and Securing Yourself
HAR2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
DEFCON17 - Fail Panel
DEFCON17 - Fail PanelDEFCON17 - Fail Panel
DEFCON17 - Fail PanelJames Arlen
 
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfSecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowBlack Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowJames Arlen
 
SecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongSecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongJames Arlen
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfBlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfJames Arlen
 
The Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitThe Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitJames Arlen
 

Más de James Arlen (9)

Notacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next GenerationNotacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next Generation
 
HAR2009 - Your Mind: Legal Status, Rights and Securing Yourself
HAR2009 - Your Mind: Legal Status, Rights and Securing YourselfHAR2009 - Your Mind: Legal Status, Rights and Securing Yourself
HAR2009 - Your Mind: Legal Status, Rights and Securing Yourself
 
DEFCON17 - Fail Panel
DEFCON17 - Fail PanelDEFCON17 - Fail Panel
DEFCON17 - Fail Panel
 
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfSecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
 
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowBlack Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
 
SecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongSecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It Wrong
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
 
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfBlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
 
The Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitThe Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black Suit
 

Último

Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1DianaGray10
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfInfopole1
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and businessFrancesco Corti
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechProduct School
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)codyslingerland1
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfTejal81
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud DataEric D. Schabell
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTxtailishbaloch
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0DanBrown980551
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameKapil Thakar
 
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxGraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxNeo4j
 

Último (20)

Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdf
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and business
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First Frame
 
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxGraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
 

BlackHat Europe 2010: SCADA and ICS for Security Experts