SlideShare una empresa de Scribd logo
1 de 54
YEAR OF THE

BREACH
@appnetsecurity

linkedin.com/in/mprerad

mprerad@gmail.com
1993.
1993.

2013.
2164

Data breach
incidents
2164

Data breach
incidents

60% HACKING
2164

Data breach
incidents

60% HACKING

71.2% EXTERNAL
2164

Data breach
incidents

60% HACKING

71.2% EXTERNAL

822 MILLION
DATA RECORDS STOLEN IN 2013
THAT‘S ABOUT

1/9
OF WORLD
POPULATION
IN 2013 ONLY
96.8%
of all exposed records involved
outside the organization activity
540+ MILLION
OF RECORDS EXPOSED

NEARLY

1/2

OF INCIDENTS

66.5%
of ALL exposed records
369 million
exposed records
TOP 5 BREACHES OF 2013
“ There are only two types of companies:

those that have

been hacked

and those that will

be hacked.”
Robert S. Mueller, III
Director, FBI
LARGEST
DATA BREACHES

OF 2013
Biggest breach in history

152+ MILLION
username + hash password combo

2.8+ MILLION
credit card information
+ source code leak
110+ MILLION
RECORDS EXPOSED

70+ MILLION
NAMES, EMAILS, PHONES

40+ MILLION
CREDIT/DEBIT CARDS
58+ MILLION
names, encrypted passwords, emails
54 MILLION
ID‘s, addresses, names

“in two hours hackers downloaded all the information.”

70%

of whole Turkish

population

Hacked system (for Database and
website Management) didn’t have
ANY security product installed.
50+ MILLION
names, encrypted passwords, emails
50+ MILLION

names, encrypted passwords, emails, date of birth
Good Job: credit card info stored on separate system
Bad Job: SHA1 hashing algorithm used – low protection
42 MILLION
name, encrypted password, emails, birthday

* 56 Homeland Security Dept. employees
22 MILLION
user ID‘s (login), no passwords stolen

No real big value, except possible SPAM
or selling database of emails
20+ MILLION
emails, physical address, phones

* data stolen from hotel reservations
6 MILLION
email and/or phone number

Bug in DYI (Download Your Information) feature
Allowed downloading contacts from friends

Facebook keeping it as small story as
possible outcome is companies
blocking access to FB from work again
4.6 MILLION
Usernames and phone numbers

Announced on 31st December, soon after
declining Facebook offer. Coincidence?
4+ MILLION
username and password combo

No credit card data stolen, stated by Groupon Taiwan
2nd largest HIPAA
breach ever reported to HHS

4+ MILLION

names, addresses, social security number, date of birth

How? 4 unencrypted computers were stolen from HQ
2.4 MILLION
social security numbers, bank accounts, drivers licenses.

Waited 7 months to notify affected persons!
2.4 MILLION
full credit card details

Started by infecting PC‘s with Malware!
It will cost Schnucks several millions of $$$
2 MILLION

names, addresses, ID‘s, bank details, phone numbers

INSIDER INTRUSION!
„PONY“ BOTNET ATTACK
2+ MILLION
username, passwords

318.121
70.532
59.549
21.708
Keystroke logging used
1.82 MILLION
username, password, email
by exploiting Adobe’s ColdFusion app server

1 MILLION
drivers license numbers, names

160.000
social security numbers
1+ MILLION
usernames, emails, hashed passwords

Infected through 3rd party software
860.000+
usernames, emails, hashed passwords

Zero Day Remote Code Execution
“We found a critical vulnerability in
all vBulletin versions 4.x.x and 5.х.x. and
have successfully uploaded our shell on
the official vBulletin server and dumped
their database after getting root access. ”
Critical breach!

850.000

credit card numbers, expiry dates and
associated names and addresses

241.000

high or no-limit American Express
including Fortune 500 CEOs and A-list celebrities
465.000
unknown portion of data

Data of card holders leaked through
temporay unencrypted log file
300.000

names, email addresses, passwords, phone numbers
Hackers tried to BLACKMAIL company

asking for $50.000 for stolen data
250.000
usernames, emails, passwords
100.000+
usernames, emails, addresses

Researcher hack, not real threat
BUT...
1 EVENT
BECAME
HISTORY
...AND 1 BECAME FUNNIEST 

* Anonymous hacked North Korean websites, twitter, flickr...
1 HACKER GROUP
WAS VERY ACTIVE
Hacked by Syrian Electronic Army
Let me remind you of...
Biggest incidents in 2011/2012
2.5 BILLION
TOTAL NUMBER OF
STOLEN RECORDS

* in history
THAT‘S ABOUT POPULATION OF

+
India

China
SEE WORLD‘S BIGGEST DATA BREACHES

VISUALIZED

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
HAVE YOU
BEEN HACKED

???
Mihajlo Prerad
slideshare.net/mprerad
@appnetsecurity
linkedin.com/in/mprerad

mprerad@gmail.com
Thank You!

Más contenido relacionado

La actualidad más candente

PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017Ryan Hardesty
 
4 mobile security threats companies must look out for
4 mobile security threats companies must look out for4 mobile security threats companies must look out for
4 mobile security threats companies must look out forHouse of IT
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
News Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakNews Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakMukesh Pathak
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesPaubox, Inc.
 
What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )Olivia martins
 
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareCybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareYoungjun Chang
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani Tanish Khilani
 
Building Cloud Applications Based On Zero Trust
Building Cloud Applications Based On Zero TrustBuilding Cloud Applications Based On Zero Trust
Building Cloud Applications Based On Zero TrustMahesh Patil
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Trust Online is at the Breaking Point
Trust Online is at the Breaking PointTrust Online is at the Breaking Point
Trust Online is at the Breaking PointVenafi
 

La actualidad más candente (18)

Data breach
Data breachData breach
Data breach
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
 
PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017
 
4 mobile security threats companies must look out for
4 mobile security threats companies must look out for4 mobile security threats companies must look out for
4 mobile security threats companies must look out for
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
News Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakNews Byte Session By Mukesh Pathak
News Byte Session By Mukesh Pathak
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
 
What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )
 
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareCybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshare
 
Data Breach
Data BreachData Breach
Data Breach
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
 
Building Cloud Applications Based On Zero Trust
Building Cloud Applications Based On Zero TrustBuilding Cloud Applications Based On Zero Trust
Building Cloud Applications Based On Zero Trust
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Trust Online is at the Breaking Point
Trust Online is at the Breaking PointTrust Online is at the Breaking Point
Trust Online is at the Breaking Point
 

Destacado

Estudio empresas afectadas por situación Abengoa
Estudio empresas afectadas por situación Abengoa Estudio empresas afectadas por situación Abengoa
Estudio empresas afectadas por situación Abengoa INFORMA D&B
 
EuskaL EAko Emakumeen Elkarteen Gida // Guía de Asociaciones de Mujeres en la...
EuskaL EAko Emakumeen Elkarteen Gida // Guía de Asociaciones de Mujeres en la...EuskaL EAko Emakumeen Elkarteen Gida // Guía de Asociaciones de Mujeres en la...
EuskaL EAko Emakumeen Elkarteen Gida // Guía de Asociaciones de Mujeres en la...Irekia - EJGV
 
ALFAPARF SEMI Di LINO Diamante Illuminating Shampoo
ALFAPARF SEMI Di LINO Diamante Illuminating Shampoo
ALFAPARF SEMI Di LINO Diamante Illuminating Shampoo
ALFAPARF SEMI Di LINO Diamante Illuminating Shampoo combsrzqlpfdwnh
 
emedcareers Media Pack
emedcareers Media Packemedcareers Media Pack
emedcareers Media Packgtholt
 
Pedim 2014 Final Scientific Programme
Pedim 2014 Final Scientific ProgrammePedim 2014 Final Scientific Programme
Pedim 2014 Final Scientific ProgrammePEDIM2014
 
Arise Inspections Sept 2015
Arise Inspections Sept 2015Arise Inspections Sept 2015
Arise Inspections Sept 2015Bob Jewell
 
Calendario Julio 2016
Calendario Julio 2016Calendario Julio 2016
Calendario Julio 2016moonmentum
 
Link Building and Content Marketing: How They Work Together
Link Building and Content Marketing: How They Work TogetherLink Building and Content Marketing: How They Work Together
Link Building and Content Marketing: How They Work TogetherBenj Arriola
 
Rutas de la Tapa 2012
Rutas de la  Tapa 2012Rutas de la  Tapa 2012
Rutas de la Tapa 2012magmdv
 

Destacado (20)

Where to Travel in 2017
Where to Travel in 2017Where to Travel in 2017
Where to Travel in 2017
 
Folleto del posgrado cali
Folleto del posgrado caliFolleto del posgrado cali
Folleto del posgrado cali
 
IMC Profile
IMC ProfileIMC Profile
IMC Profile
 
Estudio empresas afectadas por situación Abengoa
Estudio empresas afectadas por situación Abengoa Estudio empresas afectadas por situación Abengoa
Estudio empresas afectadas por situación Abengoa
 
Presentacion daisy
Presentacion daisyPresentacion daisy
Presentacion daisy
 
EuskaL EAko Emakumeen Elkarteen Gida // Guía de Asociaciones de Mujeres en la...
EuskaL EAko Emakumeen Elkarteen Gida // Guía de Asociaciones de Mujeres en la...EuskaL EAko Emakumeen Elkarteen Gida // Guía de Asociaciones de Mujeres en la...
EuskaL EAko Emakumeen Elkarteen Gida // Guía de Asociaciones de Mujeres en la...
 
Habilidades gerenciales y
Habilidades gerenciales yHabilidades gerenciales y
Habilidades gerenciales y
 
ALFAPARF SEMI Di LINO Diamante Illuminating Shampoo
ALFAPARF SEMI Di LINO Diamante Illuminating Shampoo
ALFAPARF SEMI Di LINO Diamante Illuminating Shampoo
ALFAPARF SEMI Di LINO Diamante Illuminating Shampoo
 
Peer-to-Peer: All for One (article)
Peer-to-Peer: All for One (article)Peer-to-Peer: All for One (article)
Peer-to-Peer: All for One (article)
 
emedcareers Media Pack
emedcareers Media Packemedcareers Media Pack
emedcareers Media Pack
 
Pedim 2014 Final Scientific Programme
Pedim 2014 Final Scientific ProgrammePedim 2014 Final Scientific Programme
Pedim 2014 Final Scientific Programme
 
Stierman Van Bellingen
Stierman Van BellingenStierman Van Bellingen
Stierman Van Bellingen
 
Oxfam grow
Oxfam growOxfam grow
Oxfam grow
 
Arise Inspections Sept 2015
Arise Inspections Sept 2015Arise Inspections Sept 2015
Arise Inspections Sept 2015
 
I care numero I anno 2012
I care numero I anno 2012I care numero I anno 2012
I care numero I anno 2012
 
CONECTATE 051: ADICCIONES, LIBERACIÓN
CONECTATE 051: ADICCIONES, LIBERACIÓNCONECTATE 051: ADICCIONES, LIBERACIÓN
CONECTATE 051: ADICCIONES, LIBERACIÓN
 
Calendario Julio 2016
Calendario Julio 2016Calendario Julio 2016
Calendario Julio 2016
 
Link Building and Content Marketing: How They Work Together
Link Building and Content Marketing: How They Work TogetherLink Building and Content Marketing: How They Work Together
Link Building and Content Marketing: How They Work Together
 
APM People SIG - 'The Leadership Challenge', 22nd October 2015
APM People SIG - 'The Leadership Challenge', 22nd October 2015APM People SIG - 'The Leadership Challenge', 22nd October 2015
APM People SIG - 'The Leadership Challenge', 22nd October 2015
 
Rutas de la Tapa 2012
Rutas de la  Tapa 2012Rutas de la  Tapa 2012
Rutas de la Tapa 2012
 

Similar a Year of the Breach: 822 Million Records Stolen in 2013

Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hackingbluecoatss
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceDulanja Liyanage
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoJonas Mercier
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33Felipe Prado
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013post_it
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxacarolyn
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013EMC
 

Similar a Year of the Breach: 822 Million Records Stolen in 2013 (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hacking
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
 

Más de Mihajlo Prerad

Remote Work Productivity
Remote Work ProductivityRemote Work Productivity
Remote Work ProductivityMihajlo Prerad
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Cyber Crime in Numbers
Cyber Crime in NumbersCyber Crime in Numbers
Cyber Crime in NumbersMihajlo Prerad
 
FTTx and TriplePlay basic facts
FTTx and TriplePlay basic factsFTTx and TriplePlay basic facts
FTTx and TriplePlay basic factsMihajlo Prerad
 
WiFi: saveti za poboljsanje home mreze
WiFi: saveti za poboljsanje home mrezeWiFi: saveti za poboljsanje home mreze
WiFi: saveti za poboljsanje home mrezeMihajlo Prerad
 
Merenja u telekomunikacijama
Merenja u telekomunikacijamaMerenja u telekomunikacijama
Merenja u telekomunikacijamaMihajlo Prerad
 

Más de Mihajlo Prerad (9)

Remote Work Productivity
Remote Work ProductivityRemote Work Productivity
Remote Work Productivity
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Generation Mobile
Generation MobileGeneration Mobile
Generation Mobile
 
Cyber Crime in Numbers
Cyber Crime in NumbersCyber Crime in Numbers
Cyber Crime in Numbers
 
Music through ages
Music through agesMusic through ages
Music through ages
 
FTTx and TriplePlay basic facts
FTTx and TriplePlay basic factsFTTx and TriplePlay basic facts
FTTx and TriplePlay basic facts
 
WiFi: saveti za poboljsanje home mreze
WiFi: saveti za poboljsanje home mrezeWiFi: saveti za poboljsanje home mreze
WiFi: saveti za poboljsanje home mreze
 
Merenja u telekomunikacijama
Merenja u telekomunikacijamaMerenja u telekomunikacijama
Merenja u telekomunikacijama
 
CRM menadzment
CRM menadzmentCRM menadzment
CRM menadzment
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Year of the Breach: 822 Million Records Stolen in 2013