SlideShare una empresa de Scribd logo
1 de 56
Descargar para leer sin conexión
INGLORIOUS
THREAT
INTELLIGENCE
@rickhholland
Rick Holland
VP Strategy, Digital Shadows
“Now this is not the end.
It is not even the
beginning of the end. But
it is, perhaps, the end of
the beginning.”
Chapter One
Wild Bill Donovan
@rickhholland
US Intelligence - 1941
7
Primitive
Parochial
Underfunded
Undermanned
Dumping ground
“Information is useless
unless it is intelligently
directed to the strategic
purpose.”
Office of Strategic Services
Behind enemy lines
Chapter Two
Operation Torch
@rickhholland
1. Inspire guerrilla warfare
campaign against French
2. Ensure French forces wouldn’t
resist landing US troops
3. Provide intel on French troop
strength and disposition
4. Provide intel on landing
conditions at ports and beaches
OSS enabled the path
to the “soft underbelly”
of Europe.
Align to the “strategic purpose”
Chapter Three
Operation Barbarossa
@rickhholland
Avoid winter warfare in Russia
Also never get involved in a land war in Asia
Admiral Wilhelm Canaris
Head of the Abwehr
1. SOC analyst
2. Threat hunter
3. Chief Information Security Officer
4. Other C level executives
5. Business unit / Line of business leader
Use personas to better understand your intel
customers
• Specific to the individual
• What are their triggers?
• What are they passionate about?
• Document!
Build dossiers on your intel customers
5 ways to connect
with your intel
customers
1. Use their terminology; not yours
2. Focus on what they care about
3. Create a personal story that resonates
4. Be flexible, adjust your process
5. Engage outside of work
Chapter Four
Operation North Pole
@rickhholland
Major Hermann Giskes of the Abwehr
Huub Lauwers
‣ 90 Royal Air Force sorties
flown
‣ 54 Dutch SOE agents died
‣ 83 RAF crew died
500,000 Guilders
53 SOE radio sets
> 4,000 machine guns
50,000 rounds of ammunition
“Whenever you will come to pay a visit to
the Continent you may be assured that you
will be received with the same care and
result as all those who you sent us before.”
Don’t let rivalries impact analysis
Leave the drama at home
Structured analytic techniques should be 2nd
nature
1. Align to the “strategic purpose”
2. Use personas to better understand your intel
customer
3. Build dossiers on your intel customer
4. Connect with your intel customer
Summary
5. Don’t let rivalries impact analysis
6. Leave the drama at home
7. Structured analytic techniques should be 2nd nature
Summary
55
Thank you!
@rickhholland
• Wild Bill Donovan: The Spymaster Who Created the OSS and Modern American Espionage
• Hitler's Spies: German Military Intelligence in World War II
• German Military Intelligence In World War II
• Volume 1 War Report Office of Strategic Services Washington Organization,
https://searchworks.stanford.edu/view/11645521
• Volume 2 War Report: Office of Strategic Services: Operations in the Field,
https://searchworks.stanford.edu/view/11645521
• Analysis of The Personality of Adolph Hitler http://lawcollections.library.cornell.edu/nuremberg/analysis
• A Timeline for Using Analytic Techniques Throughout an Analytic Project https://www.cia.gov/library/center-for-the-
study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf
• The Science of Building Buyer Personas, https://www.singlegrain.com/blog-posts/content-marketing/science-
building-buyer-personas/
• Trump and intelligence: 6 ways to deal with challenging intelligence consumers
https://www.digitalshadows.com/blog-and-research/trump-and-intelligence-6-ways-to-deal-with-challenging-
intelligence-consumers/
• Two ways to effectively tailor your intelligence products https://www.digitalshadows.com/blog-and-research/two-
ways-to-more-effectively-tailor-your-intelligence-products/
References:

Más contenido relacionado

La actualidad más candente

La actualidad más candente (14)

JRN 572 - Lecture One
JRN 572 - Lecture OneJRN 572 - Lecture One
JRN 572 - Lecture One
 
JRN572A - Lecture One
JRN572A - Lecture OneJRN572A - Lecture One
JRN572A - Lecture One
 
Most Famous Conspiracy Theories
Most Famous Conspiracy Theories Most Famous Conspiracy Theories
Most Famous Conspiracy Theories
 
Conspiracy Theories and the Concept of Foreshadowing in the Modern World
Conspiracy Theories and the Concept of Foreshadowing in the Modern World Conspiracy Theories and the Concept of Foreshadowing in the Modern World
Conspiracy Theories and the Concept of Foreshadowing in the Modern World
 
Cold War Web Quest
Cold War Web QuestCold War Web Quest
Cold War Web Quest
 
Embeded Journalism
Embeded JournalismEmbeded Journalism
Embeded Journalism
 
Curator pocket-history-cia
Curator pocket-history-ciaCurator pocket-history-cia
Curator pocket-history-cia
 
Mac373 Reporting War 2009
Mac373 Reporting War 2009Mac373 Reporting War 2009
Mac373 Reporting War 2009
 
WikiLeaks Multimedia
WikiLeaks Multimedia WikiLeaks Multimedia
WikiLeaks Multimedia
 
Zero dark thirty
Zero dark thirtyZero dark thirty
Zero dark thirty
 
Navajo Codetalkers
Navajo CodetalkersNavajo Codetalkers
Navajo Codetalkers
 
Death of Osama Bin Laden
Death of Osama Bin LadenDeath of Osama Bin Laden
Death of Osama Bin Laden
 
Dem Natl Conv, Boston I
Dem Natl Conv, Boston IDem Natl Conv, Boston I
Dem Natl Conv, Boston I
 
Monthlyreview.org essays in-this_series[1]
Monthlyreview.org essays in-this_series[1]Monthlyreview.org essays in-this_series[1]
Monthlyreview.org essays in-this_series[1]
 

Destacado

Mountain Photografy
Mountain PhotografyMountain Photografy
Mountain PhotografyVictoria A
 
Actors, movies, directors... whatever 3
Actors, movies, directors... whatever 3Actors, movies, directors... whatever 3
Actors, movies, directors... whatever 3guimera
 
Apple in emerging countries
Apple in emerging countriesApple in emerging countries
Apple in emerging countriesJohn Cao
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsRahul Neel Mani
 
The art of drinking …in paintings
The art of drinking …in paintingsThe art of drinking …in paintings
The art of drinking …in paintingsguimera
 
Surrealist Painter~Vilijus Vaišvila
Surrealist Painter~Vilijus VaišvilaSurrealist Painter~Vilijus Vaišvila
Surrealist Painter~Vilijus Vaišvilamaditabalnco
 
Satyrs and Nymphs in paintings
Satyrs and Nymphs in paintingsSatyrs and Nymphs in paintings
Satyrs and Nymphs in paintingsguimera
 
Nielsen Global Consumer Exercise Trends Survey 2014
Nielsen Global Consumer Exercise Trends Survey 2014Nielsen Global Consumer Exercise Trends Survey 2014
Nielsen Global Consumer Exercise Trends Survey 2014Bryan K. O'Rourke
 

Destacado (11)

Mountain Photografy
Mountain PhotografyMountain Photografy
Mountain Photografy
 
Actors, movies, directors... whatever 3
Actors, movies, directors... whatever 3Actors, movies, directors... whatever 3
Actors, movies, directors... whatever 3
 
Tarantino Quiz
Tarantino QuizTarantino Quiz
Tarantino Quiz
 
Apple in emerging countries
Apple in emerging countriesApple in emerging countries
Apple in emerging countries
 
Quentin tarantino
Quentin tarantinoQuentin tarantino
Quentin tarantino
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
 
The art of drinking …in paintings
The art of drinking …in paintingsThe art of drinking …in paintings
The art of drinking …in paintings
 
Surrealist Painter~Vilijus Vaišvila
Surrealist Painter~Vilijus VaišvilaSurrealist Painter~Vilijus Vaišvila
Surrealist Painter~Vilijus Vaišvila
 
Satyrs and Nymphs in paintings
Satyrs and Nymphs in paintingsSatyrs and Nymphs in paintings
Satyrs and Nymphs in paintings
 
Nielsen Global Consumer Exercise Trends Survey 2014
Nielsen Global Consumer Exercise Trends Survey 2014Nielsen Global Consumer Exercise Trends Survey 2014
Nielsen Global Consumer Exercise Trends Survey 2014
 

Similar a Inglorious Threat Intelligence by Rick Holland

POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxRoland994165
 
Application Writing Sample #2
Application Writing Sample #2Application Writing Sample #2
Application Writing Sample #2Krystal Norman
 
The Office of Strategic Services - A Mixed Start to American Intelligence
The Office of Strategic Services - A Mixed Start to American IntelligenceThe Office of Strategic Services - A Mixed Start to American Intelligence
The Office of Strategic Services - A Mixed Start to American IntelligenceJoseph Osborne
 
229Chapter 11 PROJECT RISK MANAGEMENT .docx
229Chapter 11        PROJECT RISK MANAGEMENT          .docx229Chapter 11        PROJECT RISK MANAGEMENT          .docx
229Chapter 11 PROJECT RISK MANAGEMENT .docxtamicawaysmith
 
Gap between perception and reality in higher leadership Good framework to un...
Gap between perception and reality in higher leadership  Good framework to un...Gap between perception and reality in higher leadership  Good framework to un...
Gap between perception and reality in higher leadership Good framework to un...Agha A
 
Gap between perception and reality in higher leadership
Gap between perception and reality in higher leadershipGap between perception and reality in higher leadership
Gap between perception and reality in higher leadershipAgha A
 

Similar a Inglorious Threat Intelligence by Rick Holland (16)

POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
 
Application Writing Sample #2
Application Writing Sample #2Application Writing Sample #2
Application Writing Sample #2
 
Curator pocket-history-cia
Curator pocket-history-ciaCurator pocket-history-cia
Curator pocket-history-cia
 
Final Draft
Final DraftFinal Draft
Final Draft
 
Oss catalogue
Oss catalogueOss catalogue
Oss catalogue
 
Oss catalogue
Oss catalogueOss catalogue
Oss catalogue
 
The Office of Strategic Services - A Mixed Start to American Intelligence
The Office of Strategic Services - A Mixed Start to American IntelligenceThe Office of Strategic Services - A Mixed Start to American Intelligence
The Office of Strategic Services - A Mixed Start to American Intelligence
 
2009 perhaps we should have shouted
2009 perhaps we should have shouted2009 perhaps we should have shouted
2009 perhaps we should have shouted
 
2009 perhaps we should have shouted
2009 perhaps we should have shouted2009 perhaps we should have shouted
2009 perhaps we should have shouted
 
229Chapter 11 PROJECT RISK MANAGEMENT .docx
229Chapter 11        PROJECT RISK MANAGEMENT          .docx229Chapter 11        PROJECT RISK MANAGEMENT          .docx
229Chapter 11 PROJECT RISK MANAGEMENT .docx
 
Office of-strategic-services
Office of-strategic-servicesOffice of-strategic-services
Office of-strategic-services
 
Office of-strategic-services
Office of-strategic-servicesOffice of-strategic-services
Office of-strategic-services
 
Studies vol 49 no 3 book
Studies vol 49 no 3 bookStudies vol 49 no 3 book
Studies vol 49 no 3 book
 
Gap between perception and reality in higher leadership Good framework to un...
Gap between perception and reality in higher leadership  Good framework to un...Gap between perception and reality in higher leadership  Good framework to un...
Gap between perception and reality in higher leadership Good framework to un...
 
Gap between perception and reality in higher leadership
Gap between perception and reality in higher leadershipGap between perception and reality in higher leadership
Gap between perception and reality in higher leadership
 
Vietnam anthology-print-version
Vietnam anthology-print-versionVietnam anthology-print-version
Vietnam anthology-print-version
 

Más de Digital Shadows

Threat model of a remote worker | Infographic
Threat model of a remote worker | InfographicThreat model of a remote worker | Infographic
Threat model of a remote worker | InfographicDigital Shadows
 
Inadvertant Data Breaches
Inadvertant Data BreachesInadvertant Data Breaches
Inadvertant Data BreachesDigital Shadows
 
Digital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows
 
WTF is Digital Risk Protection
WTF is Digital Risk ProtectionWTF is Digital Risk Protection
WTF is Digital Risk ProtectionDigital Shadows
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows
 
Digital Shadows Shadow Search
Digital Shadows Shadow SearchDigital Shadows Shadow Search
Digital Shadows Shadow SearchDigital Shadows
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkDigital Shadows
 
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for OrganizationsMitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for OrganizationsDigital Shadows
 
MITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentMITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentDigital Shadows
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerDigital Shadows
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows
 
Digital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration DatasheetDigital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration DatasheetDigital Shadows
 
Data Sources - Digital Shadows
Data Sources - Digital ShadowsData Sources - Digital Shadows
Data Sources - Digital ShadowsDigital Shadows
 
Energy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False PositivesEnergy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False PositivesDigital Shadows
 
Digital Shadows Client Feedback
Digital Shadows Client FeedbackDigital Shadows Client Feedback
Digital Shadows Client FeedbackDigital Shadows
 
Managed Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsManaged Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsDigital Shadows
 
Source Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by DeveloperSource Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by DeveloperDigital Shadows
 
Phishing Site Detected and Taken Down
Phishing Site Detected and Taken Down Phishing Site Detected and Taken Down
Phishing Site Detected and Taken Down Digital Shadows
 

Más de Digital Shadows (20)

Threat model of a remote worker | Infographic
Threat model of a remote worker | InfographicThreat model of a remote worker | Infographic
Threat model of a remote worker | Infographic
 
Inadvertant Data Breaches
Inadvertant Data BreachesInadvertant Data Breaches
Inadvertant Data Breaches
 
Digital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security Framework
 
WTF is Digital Risk Protection
WTF is Digital Risk ProtectionWTF is Digital Risk Protection
WTF is Digital Risk Protection
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ Overview
 
Data Loss Detection
Data Loss DetectionData Loss Detection
Data Loss Detection
 
Detecting Spoof Domains
Detecting Spoof DomainsDetecting Spoof Domains
Detecting Spoof Domains
 
Digital Shadows Shadow Search
Digital Shadows Shadow SearchDigital Shadows Shadow Search
Digital Shadows Shadow Search
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
 
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for OrganizationsMitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
 
MITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentMITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB Indictment
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
 
Digital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration DatasheetDigital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration Datasheet
 
Data Sources - Digital Shadows
Data Sources - Digital ShadowsData Sources - Digital Shadows
Data Sources - Digital Shadows
 
Energy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False PositivesEnergy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False Positives
 
Digital Shadows Client Feedback
Digital Shadows Client FeedbackDigital Shadows Client Feedback
Digital Shadows Client Feedback
 
Managed Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsManaged Takedown Service - Digital Shadows
Managed Takedown Service - Digital Shadows
 
Source Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by DeveloperSource Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by Developer
 
Phishing Site Detected and Taken Down
Phishing Site Detected and Taken Down Phishing Site Detected and Taken Down
Phishing Site Detected and Taken Down
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Último (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Inglorious Threat Intelligence by Rick Holland