SlideShare una empresa de Scribd logo
1 de 39
Descargar para leer sin conexión
World®
’16
Gaps	in	your	Defense:	
Hacking	the	Mainframe	
Philip	Young,	Co-Founder,	ZedSec	390	
MFT1755	
MAINFRAME	AND	WORKLOAD	AUTOMATION
2	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respecve	companies.	
The	content	provided	in	this	CA	World	2016	presentaon	is	intended	for	informaonal	purposes	only	and	does	not	form	any	type	
of	warranty.	The	informaon	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.		
For	Informaonal	Purposes	Only		
Terms	of	this	Presentaon
3	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Abstract	
The	mainframe	is	the	mission-essenal	backbone	of	the	enterprise,	housing	over	70	percent	of	
corporate	data,	touching	more	than	half	of	all	applicaons,	and	connecng	to	the	internet	and	
Internet	of	Things	(IoT)	through	APIs.	However,	in	the	enterprise	security	discussion,	the	
mainframe	is	oaen	presumed	to	be	inherently	secure.	This	session	will	dive	into	the	current	
state	of	mainframe	of	mainframe	hacking,	why	hackers	are	taking	a	larger	interest	in	the	
plaborm,	a	discussion	of	compliance	versus	security	and	next	steps	on	how	you	can	opmize	the	
security	of	your	most	mission-essenal	business	asset.	
Philip	Young	
ZedSec	390	
Co-Founder
4	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Disclaimer	
I’m	not	here	in	the	name	of	or	
on	behalf	of	my	employer.	All	
opinions	expressed	here	are	my	
own.	
Philip	Young	
ZedSec	390	
Co-Founder
5	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
6	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
7	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
8	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
9	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
10	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
11	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Logica	Security	Incident	Inves3ga3on:	Bilaga_A.pdf	
Source:	h=ps://wikileaks.org/goArid-docs/
12	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Castle	Walls	Under	Digital	Siege:	Risk-based	Security	for	z/OS	–	CA	World	‘15	
Source:	h=ps://www.youtube.com/watch?v=CySiZOaY2T0
13	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Common	Myths	
IT’S	NOT	ON	THE	INTERNET	
IT’S	IMPENETRABLE	
HACKERS	DON’T	KNOW	ABOUT	IT	HACKERS	DON’T	KNOW	ABOUT	IT	
BUT	WE’RE	AUDITED	ALL	THE	TIME!?
14	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
The	‘IMP’	
§  Started	in	2013	
§  Tools:	
–  MassScan	
–  Nmap	
–  Python	
–  X3270	
–  Linux	VPS	
§  Database	of	400+	mainframes	
hkps://mainframesproject.tumblr.com/	
Internet	Mainframes	Project
15	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
16	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
17	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
18	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
19	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
It	Doesn’t	Ma=er
20	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Enterprises	are	Flat	
§  Many	large	enterprises	experienced	a	breach	
in	2015	
§  Flat	networks	
§  No	firewall	between	“Corporate”	network	and	
mainframe
21	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Hacking	the	Unhackable	
§  From	the	network	
§  No	knowledge	of	the	system	
§  Steps	
–  Gather	informaon	
–  Profile	the	system	
–  Launch	akacks	
Tools	released/updated	in	2015/2016
22	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Nmap	in	2015/2016	
• Anon?	
• SITE?	
• OS	Version?	
• Informaon	
• VTAM?	
• CICS?	
• TSO?	
• Version?	
• Nikto?	
• BURP?	
• Enumerate?	
• Java	Objects
23	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
TN3270	
Screen
24	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
VTAM	
Enumeraon
25	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
TSO	User	
Enumeraon
26	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
27	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
CICS	
Transacon	
Enumeraon
28	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
29	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
CICSpwn
30	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
CICSpwn:	
TSO	Shell
31	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
CICSpwn:	
TSO	Shell
32	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
FTP	
Authorized	
Code	Exec
33	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
What	Can	I	Do?	
§  Compliance	is	literally	the	start	
§  Just	because	you’re	compliant	doesn’t	mean:	
–  The	compliance	rules	are	well	done	
–  Represent	current	threats	
–  Match	current	baselines	
§  Vulnerability	Scanning?
34	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Gap	Assessment	
§  Compare	your	requirements	to	a	standard	
§  How	do	you	compare	and	contrast?	
§  Who’s	experse	are	you	relying	on?
35	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Go	Beyond	Compliance	
§  zAssure?	
§  Idenfying	Data	Assets?	
§  Logging	and	Monitoring?	
–  zSecure	
–  IronStream	
–  Vanguard	
§  Penetraon	Tesng?
36	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Quesons?
37	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
CICSpwn	
h=ps://github.com/ayoul3/
cicspwn	
Nmap	Scripts	
h=ps://github.com/
zedsec390/NMAP	
	
Metasploit	
h=ps://github.com/rapid7/
metasploit-framework	
	
Contact	&	References	
Twi=er:	@mainframed767	
E-Mail:	mainframed767@gmail.com
38	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Stay	connected	at	communies.ca.com	
Thank	you.
@CAWORLD					#CAWORLD	 ©	2016	CA.	All	RIGHTS	RESERVED.	39	 @CAWORLD					#CAWORLD	
Mainframe	and	Workload	
Automa3on	
For	more	informaon	on	Mainframe	and	Workload	Automaon,		
please	visit:	hkp://cainc.to/9GQ2JI

Más contenido relacionado

Similar a Hacking the Mainframe: Gaps in your Defense

Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe CA Technologies
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...CA Technologies
 
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...CA Technologies
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowCA Technologies
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?CA Technologies
 
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...CA Technologies
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...CA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital AgeCA Technologies
 
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...CA Technologies
 
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationPre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationCA Technologies
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesCA Technologies
 
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...CA Technologies
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2CA Technologies
 
Tracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APMTracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APMCA Technologies
 
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education The Importance of Mainframe Security Education
The Importance of Mainframe Security Education CA Technologies
 
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersThe Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersTrustmarque
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudCA Technologies
 
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...CA Technologies
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadCA Technologies
 

Similar a Hacking the Mainframe: Gaps in your Defense (20)

Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
 
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
 
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
 
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationPre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
 
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
 
Tracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APMTracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APM
 
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
 
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersThe Top Three Cloud Security Mythbusters
The Top Three Cloud Security Mythbusters
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
 
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Hacking the Mainframe: Gaps in your Defense