Enviar búsqueda
Cargar
Making fact based decisions and 4 board decisions (Oct 2019)
•
6 recomendaciones
•
1,210 vistas
Dinis Cruz
Seguir
Presentation delivered at Cobalt.io event
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 44
Descargar ahora
Descargar para leer sin conexión
Recomendados
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
Dinis Cruz
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019
Dinis Cruz
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health security
Dinis Cruz
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Dinis Cruz
Modern security using graphs, automation and data science
Modern security using graphs, automation and data science
Dinis Cruz
The benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC Conference
Dinis Cruz
Using Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and Strategy
Dinis Cruz
Recomendados
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
Dinis Cruz
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019
Dinis Cruz
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health security
Dinis Cruz
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Dinis Cruz
Modern security using graphs, automation and data science
Modern security using graphs, automation and data science
Dinis Cruz
The benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC Conference
Dinis Cruz
Using Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and Strategy
Dinis Cruz
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Forcepoint LLC
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Forcepoint LLC
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Forcepoint LLC
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
MarketingArrowECS_CZ
State of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top Predictions
Comodo SSL Store
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
MarketingArrowECS_CZ
2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
Nyotron
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
Opening Remarks
Opening Remarks
scoopnewsgroup
No sql understanding
No sql understanding
Vivek Mishra
Docker Deployments for the Enterprise
Docker Deployments for the Enterprise
Murad Korejo
SYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobile
Citrix
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
The Distributed & Decentralized Cloud
The Distributed & Decentralized Cloud
Margaret Dawson
Seven Ways to Boost Artificial Intelligence Research
Seven Ways to Boost Artificial Intelligence Research
NVIDIA
MiCADO - Auto-scaling Framework for Docker Containers, orchestrated by Kubern...
MiCADO - Auto-scaling Framework for Docker Containers, orchestrated by Kubern...
Project COLA
Confessions of a CIO
Confessions of a CIO
Delphix
What is it (good for)? - MiCADO webinar No.1/4 - 09/2019
What is it (good for)? - MiCADO webinar No.1/4 - 09/2019
Project COLA
AxCrypt Pitch Deck - File Security Made Easy!
AxCrypt Pitch Deck - File Security Made Easy!
Zebastian Victorin
Soluções de IoT no Microsoft Azure
Soluções de IoT no Microsoft Azure
Fabrício Lopes Sanchez
Running Head CLOUD TECHNOLOGY AND VIRTUALIZATION CLOUD TECHN.docx
Running Head CLOUD TECHNOLOGY AND VIRTUALIZATION CLOUD TECHN.docx
healdkathaleen
Más contenido relacionado
La actualidad más candente
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Forcepoint LLC
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Forcepoint LLC
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Forcepoint LLC
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
MarketingArrowECS_CZ
State of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top Predictions
Comodo SSL Store
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
MarketingArrowECS_CZ
2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
Nyotron
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
Opening Remarks
Opening Remarks
scoopnewsgroup
No sql understanding
No sql understanding
Vivek Mishra
Docker Deployments for the Enterprise
Docker Deployments for the Enterprise
Murad Korejo
SYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobile
Citrix
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
The Distributed & Decentralized Cloud
The Distributed & Decentralized Cloud
Margaret Dawson
Seven Ways to Boost Artificial Intelligence Research
Seven Ways to Boost Artificial Intelligence Research
NVIDIA
MiCADO - Auto-scaling Framework for Docker Containers, orchestrated by Kubern...
MiCADO - Auto-scaling Framework for Docker Containers, orchestrated by Kubern...
Project COLA
Confessions of a CIO
Confessions of a CIO
Delphix
What is it (good for)? - MiCADO webinar No.1/4 - 09/2019
What is it (good for)? - MiCADO webinar No.1/4 - 09/2019
Project COLA
AxCrypt Pitch Deck - File Security Made Easy!
AxCrypt Pitch Deck - File Security Made Easy!
Zebastian Victorin
La actualidad más candente
(20)
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
State of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top Predictions
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Opening Remarks
Opening Remarks
No sql understanding
No sql understanding
Docker Deployments for the Enterprise
Docker Deployments for the Enterprise
SYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobile
C-Level tools for Cloud security
C-Level tools for Cloud security
The Distributed & Decentralized Cloud
The Distributed & Decentralized Cloud
Seven Ways to Boost Artificial Intelligence Research
Seven Ways to Boost Artificial Intelligence Research
MiCADO - Auto-scaling Framework for Docker Containers, orchestrated by Kubern...
MiCADO - Auto-scaling Framework for Docker Containers, orchestrated by Kubern...
Confessions of a CIO
Confessions of a CIO
What is it (good for)? - MiCADO webinar No.1/4 - 09/2019
What is it (good for)? - MiCADO webinar No.1/4 - 09/2019
AxCrypt Pitch Deck - File Security Made Easy!
AxCrypt Pitch Deck - File Security Made Easy!
Similar a Making fact based decisions and 4 board decisions (Oct 2019)
Soluções de IoT no Microsoft Azure
Soluções de IoT no Microsoft Azure
Fabrício Lopes Sanchez
Running Head CLOUD TECHNOLOGY AND VIRTUALIZATION CLOUD TECHN.docx
Running Head CLOUD TECHNOLOGY AND VIRTUALIZATION CLOUD TECHN.docx
healdkathaleen
Are you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana Seliškar
Bosnia Agile
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
Mighty Guides, Inc.
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
PaaSword EU Project
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
Hong-Linh Truong
EENA2019: Track3 session1 improving response times & decision making_Eric Basha
EENA2019: Track3 session1 improving response times & decision making_Eric Basha
EENA (European Emergency Number Association)
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
Insights success media and technology pvt ltd
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
IndianAppDevelopers
Jakarta keynote
Jakarta keynote
Karan Sachdeva
Top Use Cases for Desktop Virtualization
Top Use Cases for Desktop Virtualization
Citrix
Cybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.co
Industrial Cyber
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
AFCEA International
Smart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
Adrian Dumitrescu
14Security DesignSha
14Security DesignSha
MatthewTennant613
14Security DesignSha
14Security DesignSha
EttaBenton28
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
Hong-Linh Truong
Schoology cloud assignment
Schoology cloud assignment
Vellore Institute of Technology
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
Similar a Making fact based decisions and 4 board decisions (Oct 2019)
(20)
Soluções de IoT no Microsoft Azure
Soluções de IoT no Microsoft Azure
Running Head CLOUD TECHNOLOGY AND VIRTUALIZATION CLOUD TECHN.docx
Running Head CLOUD TECHNOLOGY AND VIRTUALIZATION CLOUD TECHN.docx
Are you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana Seliškar
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
EENA2019: Track3 session1 improving response times & decision making_Eric Basha
EENA2019: Track3 session1 improving response times & decision making_Eric Basha
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Jakarta keynote
Jakarta keynote
Top Use Cases for Desktop Virtualization
Top Use Cases for Desktop Virtualization
Cybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.co
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
Smart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
14Security DesignSha
14Security DesignSha
14Security DesignSha
14Security DesignSha
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout Session
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
Schoology cloud assignment
Schoology cloud assignment
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Más de Dinis Cruz
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Dinis Cruz
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
Dinis Cruz
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Dinis Cruz
GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)
Dinis Cruz
OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)
Dinis Cruz
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Dinis Cruz
Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"
Dinis Cruz
Owasp and summits (may 2019)
Owasp and summits (may 2019)
Dinis Cruz
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Dinis Cruz
Open security summit 2019 owasp london 25th feb
Open security summit 2019 owasp london 25th feb
Dinis Cruz
Owasp summit 2019 - OWASP London 25th feb
Owasp summit 2019 - OWASP London 25th feb
Dinis Cruz
Evolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIs
Dinis Cruz
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
Dinis Cruz
Thinking in graphs v1.0
Thinking in graphs v1.0
Dinis Cruz
Open Security Summit - April 2018
Open Security Summit - April 2018
Dinis Cruz
Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018
Dinis Cruz
Using security to drive chaos engineering
Using security to drive chaos engineering
Dinis Cruz
Scaling security in a cloud environment v0.5 (Sep 2017)
Scaling security in a cloud environment v0.5 (Sep 2017)
Dinis Cruz
Improving the quality of Cyber Security Hires via Pre-Interview Challenges
Improving the quality of Cyber Security Hires via Pre-Interview Challenges
Dinis Cruz
Creating a Graph Based Security Organisation - DevSecCon Keynote
Creating a Graph Based Security Organisation - DevSecCon Keynote
Dinis Cruz
Más de Dinis Cruz
(20)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)
OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"
Owasp and summits (may 2019)
Owasp and summits (may 2019)
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Open security summit 2019 owasp london 25th feb
Open security summit 2019 owasp london 25th feb
Owasp summit 2019 - OWASP London 25th feb
Owasp summit 2019 - OWASP London 25th feb
Evolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIs
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
Thinking in graphs v1.0
Thinking in graphs v1.0
Open Security Summit - April 2018
Open Security Summit - April 2018
Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering
Using security to drive chaos engineering
Scaling security in a cloud environment v0.5 (Sep 2017)
Scaling security in a cloud environment v0.5 (Sep 2017)
Improving the quality of Cyber Security Hires via Pre-Interview Challenges
Improving the quality of Cyber Security Hires via Pre-Interview Challenges
Creating a Graph Based Security Organisation - DevSecCon Keynote
Creating a Graph Based Security Organisation - DevSecCon Keynote
Último
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Zilliz
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Último
(20)
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Making fact based decisions and 4 board decisions (Oct 2019)
1.
@DinisCruz Making Fact Based Security
Decisions and 4x board scenarios Oct 2019, @DinisCruz Lightning talk (15m)
2.
@DinisCruz This is a
story about making Security Scale and giving it a Seat at the Table
3.
@DinisCruz It is about interconnecting
all data sources and knowledge that we have access to
4.
@DinisCruz It is about
transforming Spreedsheets from sources of pain into sources of massive power
5.
@DinisCruz It about using
Data Science and Visualisations to create feedback loops
6.
@DinisCruz It about using DevOps
practices for Security Operations Security Data Security Risks Security Decisions
7.
@DinisCruz It is about
Risk Dashboards that make sense to Management Stakeholders
8.
Using OWASP Security
Bot (OSBot) to make Fact Based Security Decisions Sep 2019, @DinisCruz Lightning talk (15m)
9.
Serverless stack
10.
CLI (Command Line
Interface) to your data
11.
REPL (Read Evaluate
Print Loop)
12.
Incident workflow automation Real-word
example
13.
Workflow Person Credentials Application uses to access conditions generate Alert acknowledged
in Slack by entered in action updates status of alert in
14.
Jira as (graph)
database
15.
Slack as UI
, Jira as Database
16.
Create schema that
represents the business
17.
Map reality
18.
Linked Security Policies = Fact
based Security Decisions
19.
Hyperlinked policies in
Jira Policy’s pdfs do not scale because it is not possible to link real-world data to the respective policy
20.
Convert policy into
an graph
21.
Policies Links to
Facts Links to Vulns Links to Risks
22.
Context specific Jira
projects (for example FACTs)
23.
Connecting Facts with
Risks
24.
Connected risk data
25.
Graph project’s to
outcomes and threats
26.
Threat Models (in
a scalable way)
27.
DataScience your data
28.
Risk workflows
29.
Scale using Workflows RISK
Workflow VULN Workflow
30.
Hyperlinked RISKs (from
R1s to R4s to V1s to V3s)
31.
Global Dashboards that
actually are FACT based
32.
Board dashboards (Delta)
33.
Modern approach to
managing security RISKs https://www.soa.org/globalassets/assets/Files/Research/Projects/research-new-approach.pdf
34.
JIRA Schema Graphing Real
World
35.
36.
Workflow everything
37.
38.
@DinisCruz 4x board scenarios
39.
@DinisCruz Not preventing incidents Preventing
crisis
40.
@DinisCruz Not making you
secure Making you safe
41.
@DinisCruz Creating connected risk dashboards
42.
@DinisCruz Making the business
case for investing in legacy applications https://www.slideshare.net/DinisCruz/legac ysecdevops-appsec-management-debrief
43.
@DinisCruz In conclusion
44.
@DinisCruz Thanks
Descargar ahora