SlideShare una empresa de Scribd logo
Gratitude Ignites, Growth Fortifies:
Building an unbreakable Cyber Security Village
“Life is either a daring adventure or nothing at all” ~ Helen Keller
W
H
O
?
Trupti Shiralkar
India
WORK
EDUCATION
MS in Security Informatics
Johns Hopkins University
EXPERTISE
Applied
Crypto
App Sec
Secure SDLC
Privacy Engg
INTERESTS
Cognitive Psychology
Hiking
Meditation
T
r
a
v
e
l
l
i
n
g
P
a
i
n
t
i
n
g
Product security leader
Founder, TrueNil
About Me
Five Pillars
Gratitude
Security
Village
Inspiration
Collective
Growth
~
Community
Mindfulness
Transform your security career
66 Speakers 4 Keynotes 4 Workshops 1000+ Attendees
Day of Shecurity 2024 Recap
Artificial
Intelligence
Privacy
Governance, Risk &
Compliance
EQ & Career
Day of Shecurity 2024 Trends
The Power of Gratitude
“Gratitude is a currency we can mint ourselves and
spend without fear of bankruptcy.”
~ Fred De Witt Van Amburgh
Community Support System
Security Dweebs
Motto - we rise together by lifting others
My Villages & Communities
Hedy Lamarr
Late Hollywood Actress & Inventor of
Frequency hopping
Carla Harris
Powerful African American banker
from WS, Author, Motivational
Speaker, Singer and Songwriter
Deidre Diamond
Sales Executive turned a dynamic
Entrepreneur, Founder & CEO of
CyberSN and Secure diversity
Women who Keep Inspiring Me
Empowerment Through Collective Growth
“Rising tide lifts all boats” ~ JFK
My Path to Collective Growth
Five Pillars
Gratitude
Security
Village
Inspiration
Collective
Growth
~
Community
Mindfulness
Let’s Connect

Más contenido relacionado

Similar a Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security Village

Brand Identity Research: H&M, Starbucks, and NYT
Brand Identity Research: H&M, Starbucks, and NYTBrand Identity Research: H&M, Starbucks, and NYT
Brand Identity Research: H&M, Starbucks, and NYT
Rebecca Horton
 
Nfs short version 10 april 2008
Nfs short version 10 april 2008Nfs short version 10 april 2008
Nfs short version 10 april 2008
Coinoor
 
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdfThe 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
Insights success media and technology pvt ltd
 
Creative Superpowers (Aug18)
Creative Superpowers (Aug18)Creative Superpowers (Aug18)
Creative Superpowers (Aug18)
Utopia
 
Becoming a Conscious Host: Catalyzing Change in Your Community
Becoming a  Conscious Host: Catalyzing Change in Your CommunityBecoming a  Conscious Host: Catalyzing Change in Your Community
Becoming a Conscious Host: Catalyzing Change in Your Community
Anna Pollock
 
Communicating Vision and Value
Communicating Vision and ValueCommunicating Vision and Value
Communicating Vision and Value
4Good.org
 
Social Capital - How To Create & Use It
Social Capital - How To Create & Use ItSocial Capital - How To Create & Use It
Social Capital - How To Create & Use It
Gian Fiero
 
Reputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media RevisedReputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media Revised
James Kane
 
Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5
Jim Cathcart
 
JUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine HamptonsJUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine Hamptons
Christopher Dwight London
 
Re-branding Islam through Digital Marketing
Re-branding Islam through Digital MarketingRe-branding Islam through Digital Marketing
Re-branding Islam through Digital Marketing
Happy Marketer
 
All hands on deck for siemens medical solutions western zone leadership retreat
All hands on deck for siemens medical solutions western zone leadership retreatAll hands on deck for siemens medical solutions western zone leadership retreat
All hands on deck for siemens medical solutions western zone leadership retreat
Joe Tye
 
Hacking CT Lessons Learned H4Dip Stanford 2016
Hacking CT Lessons Learned H4Dip Stanford 2016Hacking CT Lessons Learned H4Dip Stanford 2016
Hacking CT Lessons Learned H4Dip Stanford 2016
Stanford University
 
Hacking CT Lessons Learned Final
Hacking CT Lessons Learned FinalHacking CT Lessons Learned Final
Hacking CT Lessons Learned Final
H4Diadmin
 
Myths of Innovation
Myths of InnovationMyths of Innovation
Myths of Innovation
Peter Vander Auwera
 
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
Tiffany Sunday
 
Sponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDCSponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDC
Sherry Snipes
 
DANDI AWARDS & EXECUTIVE FORUM 2015
DANDI AWARDS & EXECUTIVE FORUM 2015DANDI AWARDS & EXECUTIVE FORUM 2015
DANDI AWARDS & EXECUTIVE FORUM 2015
Sherry Snipes
 
Human side of The Project Economy - PMI Ghana Oct 2020
Human side of The Project Economy - PMI Ghana Oct 2020Human side of The Project Economy - PMI Ghana Oct 2020
Human side of The Project Economy - PMI Ghana Oct 2020
Thomas Walenta, PMI Fellow
 
Dealing with difficult dialogue
Dealing with difficult dialogueDealing with difficult dialogue
Dealing with difficult dialogue
Chrysalis Leadership Development Ltd
 

Similar a Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security Village (20)

Brand Identity Research: H&M, Starbucks, and NYT
Brand Identity Research: H&M, Starbucks, and NYTBrand Identity Research: H&M, Starbucks, and NYT
Brand Identity Research: H&M, Starbucks, and NYT
 
Nfs short version 10 april 2008
Nfs short version 10 april 2008Nfs short version 10 april 2008
Nfs short version 10 april 2008
 
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdfThe 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
 
Creative Superpowers (Aug18)
Creative Superpowers (Aug18)Creative Superpowers (Aug18)
Creative Superpowers (Aug18)
 
Becoming a Conscious Host: Catalyzing Change in Your Community
Becoming a  Conscious Host: Catalyzing Change in Your CommunityBecoming a  Conscious Host: Catalyzing Change in Your Community
Becoming a Conscious Host: Catalyzing Change in Your Community
 
Communicating Vision and Value
Communicating Vision and ValueCommunicating Vision and Value
Communicating Vision and Value
 
Social Capital - How To Create & Use It
Social Capital - How To Create & Use ItSocial Capital - How To Create & Use It
Social Capital - How To Create & Use It
 
Reputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media RevisedReputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media Revised
 
Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5
 
JUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine HamptonsJUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine Hamptons
 
Re-branding Islam through Digital Marketing
Re-branding Islam through Digital MarketingRe-branding Islam through Digital Marketing
Re-branding Islam through Digital Marketing
 
All hands on deck for siemens medical solutions western zone leadership retreat
All hands on deck for siemens medical solutions western zone leadership retreatAll hands on deck for siemens medical solutions western zone leadership retreat
All hands on deck for siemens medical solutions western zone leadership retreat
 
Hacking CT Lessons Learned H4Dip Stanford 2016
Hacking CT Lessons Learned H4Dip Stanford 2016Hacking CT Lessons Learned H4Dip Stanford 2016
Hacking CT Lessons Learned H4Dip Stanford 2016
 
Hacking CT Lessons Learned Final
Hacking CT Lessons Learned FinalHacking CT Lessons Learned Final
Hacking CT Lessons Learned Final
 
Myths of Innovation
Myths of InnovationMyths of Innovation
Myths of Innovation
 
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
 
Sponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDCSponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDC
 
DANDI AWARDS & EXECUTIVE FORUM 2015
DANDI AWARDS & EXECUTIVE FORUM 2015DANDI AWARDS & EXECUTIVE FORUM 2015
DANDI AWARDS & EXECUTIVE FORUM 2015
 
Human side of The Project Economy - PMI Ghana Oct 2020
Human side of The Project Economy - PMI Ghana Oct 2020Human side of The Project Economy - PMI Ghana Oct 2020
Human side of The Project Economy - PMI Ghana Oct 2020
 
Dealing with difficult dialogue
Dealing with difficult dialogueDealing with difficult dialogue
Dealing with difficult dialogue
 

Más de Trupti Shiralkar, CISSP

Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Trupti Shiralkar, CISSP
 
IKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxIKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptx
Trupti Shiralkar, CISSP
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Trupti Shiralkar, CISSP
 
Self-care, breathing exercises, meditation
Self-care, breathing exercises, meditationSelf-care, breathing exercises, meditation
Self-care, breathing exercises, meditation
Trupti Shiralkar, CISSP
 
Cloud Security Trends.pdf
Cloud Security Trends.pdfCloud Security Trends.pdf
Cloud Security Trends.pdf
Trupti Shiralkar, CISSP
 
Zerotrusting serverless applications protecting microservices using secure d...
Zerotrusting serverless applications  protecting microservices using secure d...Zerotrusting serverless applications  protecting microservices using secure d...
Zerotrusting serverless applications protecting microservices using secure d...
Trupti Shiralkar, CISSP
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
Trupti Shiralkar, CISSP
 
Secure coding-guidelines
Secure coding-guidelinesSecure coding-guidelines
Secure coding-guidelines
Trupti Shiralkar, CISSP
 
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
Trupti Shiralkar, CISSP
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
Trupti Shiralkar, CISSP
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
Trupti Shiralkar, CISSP
 
Purple team strategy_lascon_2016
Purple team strategy_lascon_2016Purple team strategy_lascon_2016
Purple team strategy_lascon_2016
Trupti Shiralkar, CISSP
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
Trupti Shiralkar, CISSP
 

Más de Trupti Shiralkar, CISSP (13)

Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
 
IKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxIKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptx
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
 
Self-care, breathing exercises, meditation
Self-care, breathing exercises, meditationSelf-care, breathing exercises, meditation
Self-care, breathing exercises, meditation
 
Cloud Security Trends.pdf
Cloud Security Trends.pdfCloud Security Trends.pdf
Cloud Security Trends.pdf
 
Zerotrusting serverless applications protecting microservices using secure d...
Zerotrusting serverless applications  protecting microservices using secure d...Zerotrusting serverless applications  protecting microservices using secure d...
Zerotrusting serverless applications protecting microservices using secure d...
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Secure coding-guidelines
Secure coding-guidelinesSecure coding-guidelines
Secure coding-guidelines
 
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
 
Purple team strategy_lascon_2016
Purple team strategy_lascon_2016Purple team strategy_lascon_2016
Purple team strategy_lascon_2016
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
 

Último

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 

Último (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 

Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security Village