SlideShare a Scribd company logo
1 of 33
[object Object]
RIP  Dennis Ritchie (1941 - 2011)
[object Object],[object Object]
[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Open source / Linux user since 1993
Founder of  Better Access (°1996) / BA (°2003)
Open Source Fundamentalist (in my free time)
Pass a lot of my time in the lab
[object Object],[object Object]
Rolled into it by putting securityproblems in the lab and proving they are real !
But I have been researching and trying to develop solutions since 1996.
Involved in :  ,[object Object]
Infosecurity
Who are you ?
[object Object],[object Object]
Monitoring Platform
Packaged Antispam
Web Application Firewall  ,[object Object],[object Object]
Developping custom solutions largely based on open source
[object Object],[object Object]
Politicians
FUD ,[object Object],[object Object]
Integrity
Availability
[object Object],[object Object]
Allways balance between useability / security
Common sense is the best security product

More Related Content

What's hot

KennethBaughResume_2015
KennethBaughResume_2015KennethBaughResume_2015
KennethBaughResume_2015Ken Baugh
 
Microsoft_Azure_Network_Security_Mechanisms
Microsoft_Azure_Network_Security_MechanismsMicrosoft_Azure_Network_Security_Mechanisms
Microsoft_Azure_Network_Security_Mechanismsrobertfischer3
 
Cybersecurity tactics to keep you safe during lockdown
Cybersecurity tactics to keep you safe during lockdownCybersecurity tactics to keep you safe during lockdown
Cybersecurity tactics to keep you safe during lockdownXperteks
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That WorksBrett L. Scott
 
Cloud Security:Threats & Mitgations
Cloud Security:Threats & MitgationsCloud Security:Threats & Mitgations
Cloud Security:Threats & MitgationsIndicThreads
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubiplotnikov
 
Take advantage of open source networking solutions(finished)
Take advantage of open source networking solutions(finished)Take advantage of open source networking solutions(finished)
Take advantage of open source networking solutions(finished)RandyBett
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
Security On Rails
Security On RailsSecurity On Rails
Security On RailsJonathan Weiss
 
Aws cloud hms service
Aws cloud hms serviceAws cloud hms service
Aws cloud hms serviceMmik Huang
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Shamal Abeyrathne
 
Real security in a virtual environment - Infosecurity 2011
Real security in a virtual environment - Infosecurity 2011Real security in a virtual environment - Infosecurity 2011
Real security in a virtual environment - Infosecurity 2011David Geens
 
Computer & Data Security
Computer & Data SecurityComputer & Data Security
Computer & Data SecurityFrederik Questier
 
IT Resume updated
IT Resume updatedIT Resume updated
IT Resume updatedChidi Ukazu
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISECHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISEAlexander Kravchenko
 

What's hot (20)

KennethBaughResume_2015
KennethBaughResume_2015KennethBaughResume_2015
KennethBaughResume_2015
 
Web Application Detection with SNORT
Web Application Detection with SNORTWeb Application Detection with SNORT
Web Application Detection with SNORT
 
Microsoft_Azure_Network_Security_Mechanisms
Microsoft_Azure_Network_Security_MechanismsMicrosoft_Azure_Network_Security_Mechanisms
Microsoft_Azure_Network_Security_Mechanisms
 
Cybersecurity tactics to keep you safe during lockdown
Cybersecurity tactics to keep you safe during lockdownCybersecurity tactics to keep you safe during lockdown
Cybersecurity tactics to keep you safe during lockdown
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
Cloud Security:Threats & Mitgations
Cloud Security:Threats & MitgationsCloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
 
Take advantage of open source networking solutions(finished)
Take advantage of open source networking solutions(finished)Take advantage of open source networking solutions(finished)
Take advantage of open source networking solutions(finished)
 
Network security
Network securityNetwork security
Network security
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
Network security
Network securityNetwork security
Network security
 
Security On Rails
Security On RailsSecurity On Rails
Security On Rails
 
Aws cloud hms service
Aws cloud hms serviceAws cloud hms service
Aws cloud hms service
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0
 
Real security in a virtual environment - Infosecurity 2011
Real security in a virtual environment - Infosecurity 2011Real security in a virtual environment - Infosecurity 2011
Real security in a virtual environment - Infosecurity 2011
 
Computer & Data Security
Computer & Data SecurityComputer & Data Security
Computer & Data Security
 
IT Resume updated
IT Resume updatedIT Resume updated
IT Resume updated
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISECHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
 

Viewers also liked

Sun start solar generators commercial
Sun start solar generators commercialSun start solar generators commercial
Sun start solar generators commercialChristopherAWalker
 
Presentazione standard1
Presentazione standard1Presentazione standard1
Presentazione standard1Fashionsharebyv
 
Adding Products on Tablet POS
Adding Products on Tablet POSAdding Products on Tablet POS
Adding Products on Tablet POSPayfirma
 
Power BaseÂź Selling Preview
Power BaseÂź Selling PreviewPower BaseÂź Selling Preview
Power BaseÂź Selling Previewmatt_at_holden
 
Latihan soal
Latihan soalLatihan soal
Latihan soalNani Triana
 
Đ­ĐșĐŸĐ»ĐŸĐłĐžŃ Đł. УссуроĐčсĐș ĐżŃ€ĐŸĐ”Đșт "Đ—Đ”Đ»Đ”ĐœŃ‹Đč ĐžŃŃ‚Ń€ĐŸĐČ"
Đ­ĐșĐŸĐ»ĐŸĐłĐžŃ Đł. УссуроĐčсĐș ĐżŃ€ĐŸĐ”Đșт "Đ—Đ”Đ»Đ”ĐœŃ‹Đč ĐžŃŃ‚Ń€ĐŸĐČ"Đ­ĐșĐŸĐ»ĐŸĐłĐžŃ Đł. УссуроĐčсĐș ĐżŃ€ĐŸĐ”Đșт "Đ—Đ”Đ»Đ”ĐœŃ‹Đč ĐžŃŃ‚Ń€ĐŸĐČ"
Đ­ĐșĐŸĐ»ĐŸĐłĐžŃ Đł. УссуроĐčсĐș ĐżŃ€ĐŸĐ”Đșт "Đ—Đ”Đ»Đ”ĐœŃ‹Đč ĐžŃŃ‚Ń€ĐŸĐČ"Armine
 
PietilÀ, Vonk: Terve suu yhteisenÀ tavoitteena
PietilÀ, Vonk: Terve suu yhteisenÀ tavoitteenaPietilÀ, Vonk: Terve suu yhteisenÀ tavoitteena
PietilÀ, Vonk: Terve suu yhteisenÀ tavoitteenaKouluterveyskysely
 
Animalicos 2
Animalicos 2Animalicos 2
Animalicos 2Judy Liliana
 
Ntd television okt 2011
Ntd television okt 2011Ntd television okt 2011
Ntd television okt 2011JWM2011
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitaejleenderts
 
Đ€ĐžĐ·ĐžĐŸĐ»ĐŸĐłĐžŃ‡Đ”ŃĐșОД ĐŒĐ”Ń…Đ°ĐœĐžĐ·ĐŒŃ‹ ŃĐœĐ°
Đ€ĐžĐ·ĐžĐŸĐ»ĐŸĐłĐžŃ‡Đ”ŃĐșОД ĐŒĐ”Ń…Đ°ĐœĐžĐ·ĐŒŃ‹ ŃĐœĐ°Đ€ĐžĐ·ĐžĐŸĐ»ĐŸĐłĐžŃ‡Đ”ŃĐșОД ĐŒĐ”Ń…Đ°ĐœĐžĐ·ĐŒŃ‹ ŃĐœĐ°
Đ€ĐžĐ·ĐžĐŸĐ»ĐŸĐłĐžŃ‡Đ”ŃĐșОД ĐŒĐ”Ń…Đ°ĐœĐžĐ·ĐŒŃ‹ ŃĐœĐ°crasgmu
 
æ„Ÿæ…š
æ„Ÿæ…šæ„Ÿæ…š
æ„Ÿæ…šweskerlee007
 
Key in.pptx
Key in.pptxKey in.pptx
Key in.pptxMay Mei
 
Building Beach Soccer - taking sport from recreation to profession by Andrew ...
Building Beach Soccer - taking sport from recreation to profession by Andrew ...Building Beach Soccer - taking sport from recreation to profession by Andrew ...
Building Beach Soccer - taking sport from recreation to profession by Andrew ...Foro Internacional del Deporte Valencia
 
Final Presentation
Final PresentationFinal Presentation
Final PresentationCitrix Lad
 
Ie c4luc5iec5guc4k+c5iec4iq===..
Ie c4luc5iec5guc4k+c5iec4iq===..Ie c4luc5iec5guc4k+c5iec4iq===..
Ie c4luc5iec5guc4k+c5iec4iq===..Alicia Ipiña
 
Copia de animals
Copia de animalsCopia de animals
Copia de animalsanglesschool
 

Viewers also liked (20)

Sun start solar generators commercial
Sun start solar generators commercialSun start solar generators commercial
Sun start solar generators commercial
 
Presentazione standard1
Presentazione standard1Presentazione standard1
Presentazione standard1
 
Adding Products on Tablet POS
Adding Products on Tablet POSAdding Products on Tablet POS
Adding Products on Tablet POS
 
Power BaseÂź Selling Preview
Power BaseÂź Selling PreviewPower BaseÂź Selling Preview
Power BaseÂź Selling Preview
 
Latihan soal
Latihan soalLatihan soal
Latihan soal
 
Đ­ĐșĐŸĐ»ĐŸĐłĐžŃ Đł. УссуроĐčсĐș ĐżŃ€ĐŸĐ”Đșт "Đ—Đ”Đ»Đ”ĐœŃ‹Đč ĐžŃŃ‚Ń€ĐŸĐČ"
Đ­ĐșĐŸĐ»ĐŸĐłĐžŃ Đł. УссуроĐčсĐș ĐżŃ€ĐŸĐ”Đșт "Đ—Đ”Đ»Đ”ĐœŃ‹Đč ĐžŃŃ‚Ń€ĐŸĐČ"Đ­ĐșĐŸĐ»ĐŸĐłĐžŃ Đł. УссуроĐčсĐș ĐżŃ€ĐŸĐ”Đșт "Đ—Đ”Đ»Đ”ĐœŃ‹Đč ĐžŃŃ‚Ń€ĐŸĐČ"
Đ­ĐșĐŸĐ»ĐŸĐłĐžŃ Đł. УссуроĐčсĐș ĐżŃ€ĐŸĐ”Đșт "Đ—Đ”Đ»Đ”ĐœŃ‹Đč ĐžŃŃ‚Ń€ĐŸĐČ"
 
PietilÀ, Vonk: Terve suu yhteisenÀ tavoitteena
PietilÀ, Vonk: Terve suu yhteisenÀ tavoitteenaPietilÀ, Vonk: Terve suu yhteisenÀ tavoitteena
PietilÀ, Vonk: Terve suu yhteisenÀ tavoitteena
 
Portfolio leve'
Portfolio leve'Portfolio leve'
Portfolio leve'
 
Animalicos 2
Animalicos 2Animalicos 2
Animalicos 2
 
Ntd television okt 2011
Ntd television okt 2011Ntd television okt 2011
Ntd television okt 2011
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
N untitled
N untitledN untitled
N untitled
 
Đ€ĐžĐ·ĐžĐŸĐ»ĐŸĐłĐžŃ‡Đ”ŃĐșОД ĐŒĐ”Ń…Đ°ĐœĐžĐ·ĐŒŃ‹ ŃĐœĐ°
Đ€ĐžĐ·ĐžĐŸĐ»ĐŸĐłĐžŃ‡Đ”ŃĐșОД ĐŒĐ”Ń…Đ°ĐœĐžĐ·ĐŒŃ‹ ŃĐœĐ°Đ€ĐžĐ·ĐžĐŸĐ»ĐŸĐłĐžŃ‡Đ”ŃĐșОД ĐŒĐ”Ń…Đ°ĐœĐžĐ·ĐŒŃ‹ ŃĐœĐ°
Đ€ĐžĐ·ĐžĐŸĐ»ĐŸĐłĐžŃ‡Đ”ŃĐșОД ĐŒĐ”Ń…Đ°ĐœĐžĐ·ĐŒŃ‹ ŃĐœĐ°
 
æ„Ÿæ…š
æ„Ÿæ…šæ„Ÿæ…š
æ„Ÿæ…š
 
Key in.pptx
Key in.pptxKey in.pptx
Key in.pptx
 
Sabtu
SabtuSabtu
Sabtu
 
Building Beach Soccer - taking sport from recreation to profession by Andrew ...
Building Beach Soccer - taking sport from recreation to profession by Andrew ...Building Beach Soccer - taking sport from recreation to profession by Andrew ...
Building Beach Soccer - taking sport from recreation to profession by Andrew ...
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Ie c4luc5iec5guc4k+c5iec4iq===..
Ie c4luc5iec5guc4k+c5iec4iq===..Ie c4luc5iec5guc4k+c5iec4iq===..
Ie c4luc5iec5guc4k+c5iec4iq===..
 
Copia de animals
Copia de animalsCopia de animals
Copia de animals
 

Similar to A pinguin as a bouncer... Open Source Security Solutions

Day4
Day4Day4
Day4Jai4uk
 
Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The CloudOmer Trajman
 
Digital self defense
Digital self defenseDigital self defense
Digital self defenseHenrik Jacobsen
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAmazon Web Services
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection systemMaulana Arif
 
Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection systemDuwinowo NT
 
Bsides Tampa Blue Team’s tool dump.
Bsides Tampa Blue Team’s tool dump.Bsides Tampa Blue Team’s tool dump.
Bsides Tampa Blue Team’s tool dump.Alexander Kot
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressVallie Joseph
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...AI Frontiers
 
JS Fest 2019. ĐĐœĐ°ŃŃ‚Đ°ŃĐžŃ Đ’ĐŸĐčŃ‚ĐŸĐČĐ°. "Defense in depth": trench warfare principle...
JS Fest 2019. ĐĐœĐ°ŃŃ‚Đ°ŃĐžŃ Đ’ĐŸĐčŃ‚ĐŸĐČĐ°. "Defense in depth": trench warfare principle...JS Fest 2019. ĐĐœĐ°ŃŃ‚Đ°ŃĐžŃ Đ’ĐŸĐčŃ‚ĐŸĐČĐ°. "Defense in depth": trench warfare principle...
JS Fest 2019. ĐĐœĐ°ŃŃ‚Đ°ŃĐžŃ Đ’ĐŸĐčŃ‚ĐŸĐČĐ°. "Defense in depth": trench warfare principle...JSFestUA
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxwrite4
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxwrite4
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxwrite31
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 

Similar to A pinguin as a bouncer... Open Source Security Solutions (20)

Day4
Day4Day4
Day4
 
Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The Cloud
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection system
 
Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection system
 
Bsides Tampa Blue Team’s tool dump.
Bsides Tampa Blue Team’s tool dump.Bsides Tampa Blue Team’s tool dump.
Bsides Tampa Blue Team’s tool dump.
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
 
JS Fest 2019. ĐĐœĐ°ŃŃ‚Đ°ŃĐžŃ Đ’ĐŸĐčŃ‚ĐŸĐČĐ°. "Defense in depth": trench warfare principle...
JS Fest 2019. ĐĐœĐ°ŃŃ‚Đ°ŃĐžŃ Đ’ĐŸĐčŃ‚ĐŸĐČĐ°. "Defense in depth": trench warfare principle...JS Fest 2019. ĐĐœĐ°ŃŃ‚Đ°ŃĐžŃ Đ’ĐŸĐčŃ‚ĐŸĐČĐ°. "Defense in depth": trench warfare principle...
JS Fest 2019. ĐĐœĐ°ŃŃ‚Đ°ŃĐžŃ Đ’ĐŸĐčŃ‚ĐŸĐČĐ°. "Defense in depth": trench warfare principle...
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
 
Hakin9 05 2013
Hakin9 05 2013Hakin9 05 2013
Hakin9 05 2013
 
Network security
Network securityNetwork security
Network security
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 

More from B.A.

GDPR one year in: Observations
GDPR one year in: ObservationsGDPR one year in: Observations
GDPR one year in: ObservationsB.A.
 
Multicloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuurMulticloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuurB.A.
 
Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ? Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ? B.A.
 
Verhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacyVerhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacyB.A.
 
BC, DR & SLA's
BC, DR & SLA'sBC, DR & SLA's
BC, DR & SLA'sB.A.
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...B.A.
 
Cyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgravenCyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgravenB.A.
 
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturenThe good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturenB.A.
 
GDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectiefGDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectiefB.A.
 
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginnersBelgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginnersB.A.
 
Van brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseurVan brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseurB.A.
 
Business Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductieBusiness Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductieB.A.
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learnedB.A.
 
Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )B.A.
 
Storage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveatsStorage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveatsB.A.
 
De verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
De verschillende beveiligingsrisico’s van mobiele toepassingen en DevicesDe verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
De verschillende beveiligingsrisico’s van mobiele toepassingen en DevicesB.A.
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on securityB.A.
 
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ?  Nadenken over veiligheidsaspecten van E-shops/CommerceSafeshops ?  Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/CommerceB.A.
 
Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source B.A.
 
Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"B.A.
 

More from B.A. (20)

GDPR one year in: Observations
GDPR one year in: ObservationsGDPR one year in: Observations
GDPR one year in: Observations
 
Multicloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuurMulticloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuur
 
Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ? Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ?
 
Verhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacyVerhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacy
 
BC, DR & SLA's
BC, DR & SLA'sBC, DR & SLA's
BC, DR & SLA's
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
 
Cyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgravenCyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgraven
 
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturenThe good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
 
GDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectiefGDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectief
 
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginnersBelgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
 
Van brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseurVan brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseur
 
Business Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductieBusiness Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductie
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )
 
Storage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveatsStorage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveats
 
De verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
De verschillende beveiligingsrisico’s van mobiele toepassingen en DevicesDe verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
De verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on security
 
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ?  Nadenken over veiligheidsaspecten van E-shops/CommerceSafeshops ?  Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
 
Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source
 
Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

A pinguin as a bouncer... Open Source Security Solutions

Editor's Notes

  1. Purpose of presentation: 20 slides, 20 seconds, maximum presentation time of 6 minutes Objective: visionary and innovating introduction
  2. Keywords: A) Virtual; Integrated; Enterprise; Federated; Combined; Contextual; Ad hoc; Distributed; Structured; Aggregated B) Information; Data; Knowledge; Wisdom; Query; Content; Schema; Resource; Model C) Integration; Infrastructure; Base; Broker; Systems; Management; Convergence; Architecture; Solution; Federation;
  3. Connect keywords with focus Keywords for Mobility: Freedom, Future, Productivity Keywords for Security: Threats, Globalisation, Competition Keywords for Virtualisation: Environment, Cost control, Financial crisis Keywords for Digitisation: Future, Sustainability, Preservation; Competition