SlideShare une entreprise Scribd logo
1  sur  103
Télécharger pour lire hors ligne
Digital Law
Identity & access management
	Jacques	Folon	
www.folon.com	
Partner	Edge	Consulting	
Maître	de	conférences		
Université	de	Liège		
Chargé	de	cours		
ICHEC	Brussels	Management	School		
Professeur	invité		
Université	de	Lorraine	(Metz)	
ESC	Rennes	
http://www.nyls.edu/institute_for_information_law_and_policy/conferences/visualizing_law_in_the_digital_age/
IAM
1. IAM?	
2. Preset	context?	
3. IAM	&	cloud	computing	
4. Why	is	it	useful	and	
mandatory?	
5. To	do	list	
6. IAM	&	privacy	
7. IAM	&	control	
8. e-discovery	
9. Conclusion
1.	IAM	????
Provisioning
Single	Sign		On
PKIStrong	
Authentication
Federation
Directories
Authorization
Secure	Remote		
Access
Password	
Management
Web	Services	
Security
Auditing	&	
Reporting
Role	based	
Management
DRM
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

5 Questions 

to ask your CISO
Q: What’s posted on this
monitor?
a – password to financial application
b – phone messages
c – to-do’s
Q: What determines your
employee’s access?
a – give Alice whatever Wally has
b – roles, attributes, and requests
c – whatever her manager says
Q: Who is the most privileged
user in your enterprise?
a – security administrator
b – CFO
c – the summer intern who is now working
for your competitor
Q: How secure is your

identity data?
a – It is in 18 different secured stores
b – We protect the admin passwords
c – Privacy? We don’t hold credit card
numbers
Q: How much are manual
compliance controls costing
your organization?
a – nothing, no new headcount
b – don’t ask
c – don’t know
Today’s IT Challenges
More Agile Business
• More accessibility for employees,
customers and partners
• Higher level of B2B integrations
• Faster reaction to changing requirements
More Secured Business
• Organized crime
• Identity theft
• Intellectual property theft
• Constant global threats
More Compliant Business
• Increasing regulatory demands
• Increasing privacy concerns
• Business viability concerns
State Of Security In Enterprise
• Incomplete
• Multiple point solutions from many vendors
• Disparate technologies that don’t work together
• Complex
• Repeated point-to-point integrations
• Mostly manual operations
• ‘Non-compliant’
• Difficult to enforce consistent set of policies
• Difficult to measure compliance with those policies
Identity Management Values
• Trusted and reliable security
• Efficient regulatory compliance
• Lower administrative and development costs
• Enable online business networks
• Better end-user experience
15
IAM	MEANS	MANAGING	THE	
EMPLOYEES	LIFECYCLE	(HIRING,	
RECRUITING,	PROMOTION,	
CHANGE,	LEAVING)	AND	THE	
IMPACTS	ON	THE	INFORMATION	
MANAGEMENT	SYSTEM
source	clusif	
IAM		is	a	legal	obligation	!
• IAM	IS	DEFINED	BY	THE	BUSINESS	(RH,	SCM,	
ETC.)
• AND
• FOLLOWING THE LEGAL
FRAMEWORK
• AND
• TECHNICALLY IMPLEMENTED
16
IAM	IS	BUSINESS	&	ICT	+	LEGAL
source	clusif
17
IAM INCLUDES
• DATABASE OF ALL AND EVERY USER
•DATABASE OF ALL TYPE OF PROFILES
& ROLES
•DEFINITION BEFOREHAND
•DEFINE WICH ROLE FOR WICH
EMPLOYEE
•DEFINITION OF LOGIN & PASSWORDS
•AUDIT
•REPORTING
•ACCESS CONTROL
source	clusif
• What	is	Identity	Management	?	
	 “Identity	management	is	the	set	
of	business	processes,	and	a	
supporting	infrastructure,	for	the	
creation,	maintenance,	and	use	of	
digital	identities.”	The	Burton	Group	
(a	research	firm	specializing	in	IT	
infrastructure	for	the	enterprise)	
• Identity	Management	in	this	
sense	is	sometimes	called	
“Identity	and	Access	
Management”	(IAM)
Définition
19
Identity and Access Management is the process for managing the
lifecycle of digital identities and access for people, systems and
services. This includes:
User Management – management of large, changing user
populations along with delegated- and self-service
administration.
Access Management – allows applications to authenticate
users and allow access to resources based upon policy.
Provisioning and De-Provisioning – automates account
propagation across applications and systems.
Audit and Reporting – review access privileges, validate
changes, and manage accountability.
CA
IAM : J. Tony Goulding CISSP, ITIL CA t ony.goulding@ca.com
IAM	IN	ESC…
• “MY	NAME	IS	JULIE	AND	I	AM	A	
STUDENT.”			(Identity)	
• “this	is	my	password.”	
	 	 (Authentification)	
• “I	want	an	access	to	my	account”	
	 	 (Authorization	ok)	
• “I	want	to	adapt	my	grade.”	
	 	 (Autorization	rejected)
What	are	the	questions	?
• is	this	person	the	one	she	said	she	
is?	
• Is	she	a	member	of	our	group	?	
• Did	she	receive	the	necessary	
authorization	?	
• Is	data	privacy	OK?
Type	of	questions	for	a	newcomer
– Which	kind	of	password?	
– Which	activities	are	accepted?	
– Which	are	forbidden?	
– To	which	category	this	person	belongs?	
– When	do	we	have	to	give	the	authorization??	
– What	control	do	we	need	?	
– Could	we	demonstrate	in	court	our	procedure?
24
IAM	triple	A
Authentication
WHO ARE YOU?
Authorization / Access Control
WHAT CAN YOU DO?
Audit
WHAT HAVE YOU DONE?
24
Components	of	IAM
• Administration	
– User	Management	
– Password	Management	
– Workflow	
– Delegation	
• Access	Management	
– Authentication		
– Authorization	
• Identity	Management	
– Account	Provisioning	
– Account	Deprovisioning	
– Synchronisation
Reliable Identity Data
Administration
Authorization
Authentication
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

2.	Context	in	2016
28
various	identity	co-exists
29
IRL	&	virtual	identity
• Internet	is	based	on	IP	identification	
• everybody	has	different	profiles	
• Each	platform	has	a	different	
authentification	system	
• Users	are	the	weakest	link	
• Cybercrime	increases	
• Controls	means	identification	
• Data	privacy	imposes	controls	&	security	
• e-discovery	imposes	ECM
Welcome	to	a	digital	world
Explosion	of	IDs
Pre	1980’s 1980’s 1990’s 2000’s
#	of	
Digital	IDs
Time
Applications
Mainframe
Client	Server
Internet
Business	
Automation
Company	
(B2E)
Partners	
(B2B)
Customers	
(B2C)
Mobility
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

The	Disconnected	Reality
• “Identity	Chaos”		
– Many	users		
– Many	ID	
– Many	log	in	&	passwords		
– Multiple	repositories	of	identity	information	
– Multiple	user	IDs,	multiple	passwords
Enterprise Directory
HR
Infra	
Application
Office
In-House	
Application
External app
Finance
employee	
Application
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authorization
•Identity Data
•Authentication
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

Your	COMPANY	and

your	EMPLOYEES
Your	SUPPLIERS
Your	PARTNERSYour	REMOTE	and

VIRTUAL	EMPLOYEES
Your	CUSTOMERS
Customer	satisfaction	&	customer	intimacy	
Cost	competitiveness	
Reach,	personalization
Collaboration	
Outsourcing	
Faster	business	cycles;	process	
automation	
Value	chain
M&A	
Mobile/global	workforce	
Flexible/temp	workforce
Multiple	Contexts
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

Trends	Impacting	Identity
Increasing Threat Landscape	
Identity	theft	costs	banks	and	credit	card	issuers	$1.2	billion	in	1	yr	
•$250 billion lost from exposure of confidential info
Maintenance Costs Dominate IT Budget	
On average employees need access to 16 apps and systems	
•Companies spend $20-30 per user per year for PW resets
Deeper Line of Business Automation and Integration	
One half of all enterprises have SOA under development	
•Web services spending growing 45%
Rising Tide of Regulation and Compliance	
SOX, HIPAA, GLB, Basel II, 21 CFR Part 11, …	
•$15.5 billion spend on compliance (analyst estimate)
Data	Sources:	Gartner,	AMR	Research,	IDC,	eMarketer,	U.S.	Department.	of	Justice
37
Business

Owner
End	UserIT	Admin Developer Security/	Compliance
Too	expensive	
to	reach	new	
partners,	
channels	
Need	for	
control
Too	many	
passwords	
Long	waits	for	
access	to	apps,	
resources
Too	many	user	
stores	and	
account	admin	
requests	
Unsafe	sync	
scripts
Pain	Points
Redundant	
code	in	each	
app	
Rework	code	
too	often
Too	many	
orphaned	
accounts	
Limited	
auditing	ability
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

3.	IAM	&	Cloud	computing
First,
What the heck is
Cloud Computing
First, what the heck is
Cloud Computing?
…in simple, plain
English please!
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s use a simple analogy
Say you just
moved to a city,
and you’re looking
for a nice
place to
live
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
You can either
Build a house
or
Rent an
apartment
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
If you build a house, there are a few
important decisions you have to make…
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
How big is the house?
are you planning to grow a large
family?
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Remodel, addition typically cost a lot more once the
house is built
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
But, you get a
chance to
customize it
Roof
Andy Harjanto I’m cloud confused
Once the house is built,
you’re
responsible for
maintenance
Hire Landscaper
Electrician
Plumber
Pay
property tax
Electricity
Water
Gutter Cleaning
Heating and Cooling
House Keeping
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
How about renting?
Consider a builder in your city builds a
Huge
number of apartment units
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
A unit can easily be converted
into a 2,3,4 or more units
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
You make a fewer, 

simpler
decisions
You can start with one
unit and grow later, or
downsize
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
But…
You do not
have
a lot of
options to
customize
your unit Andy Harjanto I’m cloud confuse
d http://www.andyharjanto.com
However, builders provide you with 

very high quality infrastructure
high speed Internet
high capacity electricity
triple pane windows
green materials
No need to worry
about maintenance
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Just pay your
rent
and utilities
Pay as You Go
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
Let’s translate to
Cloud Computing?
As an end-consumer, believe it or not
you’ve been using Cloud for long times
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
most of
them are
Free
In return, you’re willing to
give away
your information for ads and
other purposes
But you’ve been
enjoying
High Reliability Service
Limited Storage
Connecting, Sharing
OK, Now tell that to the business
owner
Give up your data,
then
you can use this
infrastructure for free
Are You crazy?
will answer the CEO
My Business
Needs…
Security
Privacy
Reliability
High
Availability
Building Enterprise
Software
Stone Wall
Fire-proof
Moat
Army
Death Hole
is like….
Medieval
Castle
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s Hire an Army of IT Engineers
Software Upgrade
Support
Backup/Restore
Service Pack
Development
Network issues
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s Build
Huge Data
Center
Capacity Planning
Disaster Plan
Cooling Management
Server
Crashes
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
Your data is replicated
3 or 4 times in their data
center
High Availability
Adding “servers” is a click
away.
Running in just minutes, not
days
HighTraffic?
It can even load balance
your server traffic
Expect your Cloud
Network
is always up
Yes, you can even pick
where your data
and “servers” reside
Don’t forget data privacy issues
So we know what
Cloud is and the
choice we have
Cloud	Computing:	Definition
• No	Unique	Definition	or	General	Consensus	about	what	Cloud	
Computing	is	…	
• Different	Perspectives	&	Focuses	(Platform,	SW,	Service	Levels…)	
• Flavours:	
– Computing	and	IT		Resources	Accessible	Online	
– Dynamically	Scalable	Computing	Power		
– Virtualization	of	Resources	
– Access	to	(potentially)	Composable	&	Interchangeable	Services		
– Abstraction	of	IT	Infrastructure		
				!	No	need	to	understand	its	implementation:	use	Services	&	their	APIs	
– Some	current	players,	at	the	Infrastructure	&	Service	Level:		
			SalesfoRce.com,	Google	Apps,	Amazon,	Yahoo,	Microsoft,	IBM,	HP,	etc.




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



Cloud	Computing:	Implications
• Enterprise:		
			Paradigm	Shift	from	“Close	&	Controlled”	IT	Infrastructures	and	Services	to	
Externally	Provided	Services	and	IT	Infrastructures		
• Private	User:		
			Paradigm	Shift	from	Accessing	Static	Set	of	Services	to	Dynamic	&	Composable	
Services		
• General	Issues:	
– 	Potential	Loss	of	Control	(on	Data,	Infrastructure,	Processes,	etc.)	
– 	Data	&	Confidential	Information	Stored	in	The	Clouds	
– 	Management	of	Identities	and	Access	(IAM)	in	the	Cloud	
– 	Compliance	to	Security	Practice	and	Legislation		
– 	Privacy	Management	(Control,	Consent,	Revocation,	etc.)	
– 	New	Threat	Environments	
– 	Reliability	and	Longevity	of	Cloud	&	Service	Providers




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



Identity	in	the	Cloud:	Enterprise	Case
Enterprise
Data	
Storage	
Service
Office	
Apps
On	Demand	
CPUsPrinting	
Service
Cloud		
Provider	#1
Cloud		
Provider	#2
Internal	Cloud
CRM	
Service
…
Service	3
Backup	
Service	ILM	
Service
Service
Service
Service
Business	
Apps/Service
Employee
…
…
…
The		
Internet
Identity	&	
Credentials
Identity	&	
Credentials
Identity	&	
Credentials
Identity	&	
Credentials
Identity	&	
Credentials
Identity	&	
Credentials
Identity	&	
Credentials
Authentication	
Authorization	
Audit
Authentication	
Authorization	
Audit
Authentication	
Authorization	
Audit
Authentication	
Authorization	
Audit
User	Account	
Provisioning/	
De-provisioning
User	Account	
Provisioning/	
De-provisioning
User	Account	
Provisioning/	
De-provisioning
User	Account	
Provisioning/	
De-provisioning
Data	
&	Confidential	
Information
Data	
&	Confidential	
Information
Data	
&	Confidential	
Information
Data	
&	Confidential	
Information
IAM	Capabilities		
and	Services	
Can	be		
Outsourced	in	
The	Cloud	…




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009

Identity	in	the	Cloud:	Enterprise	Case
Issues	and	Risks	[1/2]	
•	Potential	Proliferation	of	Required	Identities	&	Credentials	to	Access	Services	
			!	Misbehaviours	when	handling	credentials	(writing	down,	reusing,	sharing,	etc.)	
•	Complexity	in	correctly	“enabling”	Information	Flows	across	boundaries		
			!	Security	Threats	
								(Enterprise	!	Cloud	&	Service	Providers,	Service	Provider	!	Service	Provider,	…_	
•	Propagation	of	Identity	and	Personal	Information	across	Multiple	Clouds/Services		
		!	Privacy	issues	(e.g.	compliance	to	multiple		Legislations,	Importance	of	Location,	etc.)	
		!	Exposure	of	business	sensitive	information		
						(employees’	identities,	roles,	organisational	structures,	enterprise	apps/services,	etc.)	
		!	How	to	effectively	Control	this	Data?	
•	Delegation	of	IAM	and	Data	Management	Processes	to	Cloud	and	Service	Providers		
		!	How	to	get	Assurance	that	these	Processes	and	Security	Practice		are	Consistent	with						
						Enterprise	Policies?	
						-	Recurrent	problem	for	all	Stakeholders:	Enterprise,	Cloud	and	Service	Providers	…		
		!	Consistency	and	Integrity	of	User	Accounts	&	Information	across	various	Clouds/Services	
		!	How	to	deal	with	overall	Compliance	and	Governance	issues?	
	




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



Identity	in	the	Cloud:	Enterprise	Case
Issues	and	Risks	[2/2]	
•	Migration	of	Services	between	Cloud	and	Service	Providers	
		!	Management	of	Data	Lifecycle	
•	Threats	and	Attacks	in	the	Clouds	and	Cloud	Services	
			!	Cloud	and	Service	Providers	can	be	the	“weakest	links”	in	Security	&	Privacy		
			!	Reliance	on	good	security	practice	of	Third	Parties				




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



4.Why	do	we	need	IAM?
•Security	
•Compliance	
•Cost	control	
•Audit	support	
•Access	control
Source:	ftp://ftp.boulder.ibm.com/software/uk/productnews/tv/vh_-_access_and_identity_management.pdf
cost	reduction
• Directory	Synchronization	
“Improved	updating	of	user	data:	$185	per	user/year”	
“Improved	list	management:	$800	per	list”	
-	Giga	Information	Group	
• Password	Management	
“Password	reset	costs	range	from	$51	(best	case)	to	$147	(worst	case)	for	
labor	alone.”	–	Gartner	
• User	Provisioning	
“Improved	IT	efficiency:	$70,000	per	year	per	1,000	managed	users”	
“Reduced	help	desk	costs:	$75	per	user	per	year”	
-	Giga	Information	Group
Can	We	Just	Ignore	It	All?
• Today,	average	corporate	user	
spends	16	minutes	a	day	logging	on	
• A	typical	home	user	maintains	12-18	
identities	
• Number	of	phishing		sites	grew	over	
1600%	over	the	past	year	
• Corporate	IT	Ops	manage	an	average	
of	73	applications	and	46	suppliers,	
often	with	individual	directories	
• Regulators	are	becoming	stricter	
about	compliance	and	auditing	
• Orphaned	accounts	and	identities	
lead	to	security	problems
Source:	Microsoft’s	internal	research	and	Anti-phishing	Working	Group
IAM	Benefits
Benefits to take you
forward 	
(Strategic)
Benefits today	
(Tactical)
Save money and improve operational
efficiency
Improved time to deliver applications and
service
Enhance Security
Regulatory Compliance and Audit
New ways of working
Improved time to market
Closer Supplier, Customer, 	
Partner and Employee relationships
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

5.	IAM	to	do	list
• Automatic	account	
management	
• Archiving		
• Data	privacy	
• Compliance		
• Securiry	VS	Risks	
• user	identification	
• E-business	
• M2M
6.	Data	protection
Source	:	https://www.britestream.com/difference.html.
need	to	check
legal	limits
data	controller	responsibility
teleworking
data	theft
87
7.	IAM	&	control
data	transfer
• limitation	of	control	
• Private	email	
• penalties	
• who	controls
• security	is	mandatory	!
• technical	security	
– Risk	analysis	
– Back-up	
– desaster	recovery	
– identity	management	
– Strong	login	&	passwords
• legal	security	
– information	in	the	
employment	contracts	
– Contracts	with	subcontractors	
– Code	of	conduct	
– Compliance	
– Control	of	the	employees
Control	?
8.	E-discovery
Definition	of	e-discovery
• Electronic	discovery	(or	e-discovery)	refers	to	discovery	in	civil	
litigation	which	deals	with	information	in	electronic	format	
also	referred	to	as	Electronically	Stored	Information	(ESI).		
• It	means	the	collection,	preparation,	review	and	production	of	
electronic	documents	in	litigation	discovery.		
• Any	process	in	which	electronic	data	is	sought,	located,	
secured,	and	searched	with	the	intent	of	using	it	as	evidence	
in	a	civil	or	criminal	legal	case	
• This	includes	e-mail,	attachments,	and	other	data	stored	on	a	
computer,	network,	backup	or	other	storage	media.	e-
Discovery	includes	metadata.
Recommandations
Organizations	should	update	and/or	create	information	
management	policies	and	procedures	that	include:	
– e-mail	retention	policies,	On	an	individual	level,	employees	tend	to	
keep	information	on	their	hard	drives	“just	in	case”	they	might	need	
it.	
– Work	with	users	to	rationalize	their	storage	requirements	and	
decrease	their	storage	budget.	
– off-line	and	off-site	data	storage	retention	policies,		
– controls	defining	which	users	have	access	to	which	systems	andunder	
what	circumstances,		
– instructions	for	how	and	where	users	can	store	data,	and	•	backup	
and	recovery	procedures.	
– Assessments	or	surveys	should	be	done	to	identify	business	functions,	
data	repositories,	and	the	systems	that	support	them.	
– Legal	must	be	consulted.	Organizations	and	their	legal	teams	should	
work	together	to	create	and/or	update	their	data	retention	policies	
and	procedures	for	managing	litigation	holds.
9.	Conclusion
• IAM	is	a	legal	question,	not	only	
business	&	IT	
• compliance	is	important	
• More	security	due	to	
– Cloud	computing	
– Virtualisation	
– Data	privacy	
– archiving	
• Transparency	
• E-discovery
IAM	could	be	an	opportunity
• Rethink	security	
• risks	reduction	
• costs	reduction	
• precise	roles	&	responsibilities
Any question?
Jacques Folon	
Jacques.folon@ichec.be

Contenu connexe

Tendances

Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondZeshan Sattar
 
Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Edge Pereira
 
Information security overview
Information security overviewInformation security overview
Information security overviewPonum Raja
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102Jean-François LOMBARDO
 
Dharmes Mistry Tony De Bree S O A Business Persp V1a
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1aDharmes  Mistry    Tony De  Bree   S O A Business Persp V1a
Dharmes Mistry Tony De Bree S O A Business Persp V1aSOA Symposium
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Benjamin Ang
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3techcouncil
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016Tomppa Järvinen
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction BriefNováccent
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...ProductNation/iSPIRT
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 

Tendances (20)

Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
 
Funsec3e ppt ch14
Funsec3e ppt ch14Funsec3e ppt ch14
Funsec3e ppt ch14
 
Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!
 
Information security overview
Information security overviewInformation security overview
Information security overview
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102
 
Dharmes Mistry Tony De Bree S O A Business Persp V1a
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1aDharmes  Mistry    Tony De  Bree   S O A Business Persp V1a
Dharmes Mistry Tony De Bree S O A Business Persp V1a
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
IoT PPT Deck
IoT PPT DeckIoT PPT Deck
IoT PPT Deck
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 

En vedette

LA TRANSFORMATION DIGITALE DANS LE SECTEUR DU PROFIT SOCIAL
LA TRANSFORMATION DIGITALE DANS LE SECTEUR DU PROFIT SOCIALLA TRANSFORMATION DIGITALE DANS LE SECTEUR DU PROFIT SOCIAL
LA TRANSFORMATION DIGITALE DANS LE SECTEUR DU PROFIT SOCIALProf. Jacques Folon (Ph.D)
 
How to propose a model as an alternative payment model (apm) by steven lash
How to propose a model as an alternative payment model (apm) by steven lashHow to propose a model as an alternative payment model (apm) by steven lash
How to propose a model as an alternative payment model (apm) by steven lashSteven Lash
 
Poppy Liu - CMX Summit East 2016 - The Formula for Connecting Humans
Poppy Liu - CMX Summit East 2016 - The Formula for Connecting HumansPoppy Liu - CMX Summit East 2016 - The Formula for Connecting Humans
Poppy Liu - CMX Summit East 2016 - The Formula for Connecting HumansCMX
 
Aprendizajeintegral diapositivas
Aprendizajeintegral diapositivasAprendizajeintegral diapositivas
Aprendizajeintegral diapositivasJean Rondon Caceres
 
How to Grow a Vibrant Community that Delivers Real Business Results
How to Grow a Vibrant Community that Delivers Real Business ResultsHow to Grow a Vibrant Community that Delivers Real Business Results
How to Grow a Vibrant Community that Delivers Real Business ResultsCMX
 
MACRA - What’s In Store for Independent Practices
MACRA - What’s In Store for Independent PracticesMACRA - What’s In Store for Independent Practices
MACRA - What’s In Store for Independent PracticesKareo
 

En vedette (20)

transformation digitale et burnout
transformation digitale et burnouttransformation digitale et burnout
transformation digitale et burnout
 
Cefora
CeforaCefora
Cefora
 
LA TRANSFORMATION DIGITALE DANS LE SECTEUR DU PROFIT SOCIAL
LA TRANSFORMATION DIGITALE DANS LE SECTEUR DU PROFIT SOCIALLA TRANSFORMATION DIGITALE DANS LE SECTEUR DU PROFIT SOCIAL
LA TRANSFORMATION DIGITALE DANS LE SECTEUR DU PROFIT SOCIAL
 
entreprise de 2016 face au monde connecté
entreprise de 2016 face au monde connectéentreprise de 2016 face au monde connecté
entreprise de 2016 face au monde connecté
 
marque employeur
marque employeurmarque employeur
marque employeur
 
transformation digitale et burnout
transformation digitale et burnouttransformation digitale et burnout
transformation digitale et burnout
 
Vie privée et RH
Vie privée et RHVie privée et RH
Vie privée et RH
 
De la stratégie à la gestion de projets
De la stratégie à la gestion de projetsDe la stratégie à la gestion de projets
De la stratégie à la gestion de projets
 
contexte du marketing digital
contexte du marketing digitalcontexte du marketing digital
contexte du marketing digital
 
Iam infosafe janvier 2017
Iam infosafe janvier 2017 Iam infosafe janvier 2017
Iam infosafe janvier 2017
 
2 hoja de vida
2 hoja de vida2 hoja de vida
2 hoja de vida
 
How to propose a model as an alternative payment model (apm) by steven lash
How to propose a model as an alternative payment model (apm) by steven lashHow to propose a model as an alternative payment model (apm) by steven lash
How to propose a model as an alternative payment model (apm) by steven lash
 
Poppy Liu - CMX Summit East 2016 - The Formula for Connecting Humans
Poppy Liu - CMX Summit East 2016 - The Formula for Connecting HumansPoppy Liu - CMX Summit East 2016 - The Formula for Connecting Humans
Poppy Liu - CMX Summit East 2016 - The Formula for Connecting Humans
 
Aprendizajeintegral diapositivas
Aprendizajeintegral diapositivasAprendizajeintegral diapositivas
Aprendizajeintegral diapositivas
 
Le monde a change
Le monde a changeLe monde a change
Le monde a change
 
Balaji CV - 2015
Balaji CV - 2015Balaji CV - 2015
Balaji CV - 2015
 
How to Grow a Vibrant Community that Delivers Real Business Results
How to Grow a Vibrant Community that Delivers Real Business ResultsHow to Grow a Vibrant Community that Delivers Real Business Results
How to Grow a Vibrant Community that Delivers Real Business Results
 
CV_11May2016
CV_11May2016CV_11May2016
CV_11May2016
 
MACRA - What’s In Store for Independent Practices
MACRA - What’s In Store for Independent PracticesMACRA - What’s In Store for Independent Practices
MACRA - What’s In Store for Independent Practices
 
Ciberbullying
CiberbullyingCiberbullying
Ciberbullying
 

Similaire à IAM

Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCloudIDSummit
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity ProgramDan Houser
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Pete Nieminen
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?ITU
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLogicalis Australia
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesBlackBerry
 
Cloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony FinancialCloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony FinancialVMware Tanzu
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptmamathajagarlamudi2
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentationwebhostingguy
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and RewardChris Haddad
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...Jean-François LOMBARDO
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...Peter de Haas
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventMatteo Masi
 

Similaire à IAM (20)

digital strategy and information security
digital strategy and information securitydigital strategy and information security
digital strategy and information security
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
 
Israel IT Market 2006 2008
Israel IT Market 2006 2008Israel IT Market 2006 2008
Israel IT Market 2006 2008
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Cloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony FinancialCloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony Financial
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.ppt
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
 

Plus de Prof. Jacques Folon (Ph.D)

Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTProf. Jacques Folon (Ph.D)
 

Plus de Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 

Dernier

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Dernier (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

IAM