SlideShare une entreprise Scribd logo
1  sur  100
Télécharger pour lire hors ligne
@DinisCruz
security
Dinis Cruz
presentation to Babylon Health
When applied to the CISO position
Dinis Cruz v0.6 (DRAFT) Sep 2019
@DinisCruz
security
Babylon Health Security
Dinis Cruz Interim CISO Candidate Sep 2019 v0.6
@DinisCruz
security
This presentation was created by
Dinis Cruz , who is an candidate to the
Babylon Health CISO position*!
DISCLAIMER!
* Dinis is currently NOT an Babylon Health employee/contractor
** Dinis does NOT have Internal knowledge of existing Babylon Health security team structure,
objectives or activities
?
WHY?
This is a good medium to present Dinis’
thinking, approach and values**
@DinisCruz
security
Babylon’s Security team
mission is to put an
safe, accessible and
affordable health service in the
hands of every person on
earth.
@DinisCruz
security
must enable and empower these amazing
professionals to fulfill their potential
… while enhancing the patient’s data:
Confidentiality
Integrity
Availability
@DinisCruz
security
?
WHY is
Babylon Security
important?
@DinisCruz
security
Is the guardian of
Babylon’s
Customers and
employees:
@DinisCruz
security
@DinisCruz
Babylon Health Security commitments
@DinisCruz
security
@DinisCruz
Babylon Health Security page
@DinisCruz
security
@DinisCruz
Security drives business change and digital transformation
@DinisCruz
security
@DinisCruz
Required compliance to multiple standards
@DinisCruz
security
@DinisCruz
https://www.serveit.com/recruitment-sourcing-guide-gdpr/
https://www.serveit.com/gdpr-for-developers-data-subject-rights/
GDPR principles, processing and customers rights
@DinisCruz
security
@DinisCruz
GDPR - Personal Data Journey (Privacy Impact Assessments)
https://2018.open-security-summit.org/tracks/gdpr/working-sessions/creating-standard-for-gdpr-patterns/
@DinisCruz
security
@DinisCruz
Desired Threat Level capability
Detect and Contain
Must be able to:
Neutralise
Break economic model
https://www.canso.org/sites/default/files/CANSO%20Cyber%20Security%20and%20Risk%20Assessment%20Guide.pdf
@DinisCruz
security
@DinisCruz
Health care security stats
@DinisCruz
security
@DinisCruz
Healthcare record’s value and incident’s patterns
@DinisCruz
security
Strategy
@DinisCruz@DinisCruz
security
By combining the ever-growing
power of AI with the best
Security expertise of humans,
Babylon Health Security Team
can deliver a safe ecosystem for
customer’s health Data,
including personalised Security
assessments, treatment advice
and appointments with a
Security Professional 24/7.
AI
+
Security
Professionals
@DinisCruz
security
@DinisCruz
Aligned with best practices
Start here
https://www.ncsc.gov.uk/collection/board-toolkit
@DinisCruz
securitystrategy
@DinisCruz
security
@DinisCruz
How to prevent and contain malicious activities
https://www.ncsc.gov.uk/collection/board-toolkit
@DinisCruz
security
@DinisCruz
10 Steps to Cyber Security
https://www.ncsc.gov.uk/collection/board-toolkit
@DinisCruz
security
@DinisCruz
Effective Cyber Security
https://www.canso.org/sites/default/files/CANSO%20Cyber%20Security%20and%20Risk%20Assessment%20Guide.pdfhttps://onlinedegrees.kent.edu/ischool/health-informatics/community/healthcare-data-security/CybersecurityHealthcare.pdf
@DinisCruz
security
@DinisCruz
Strong driver for Information Governance
https://www.bdo.com/blogs/nonprofit-standard/may-2018/the-integration-of-data-privacy https://activenavigation.com//wp-content/uploads/2015/10/File-Analysis-and-Your-Information-Governance-Maturity-Oct-2015.pdf
@DinisCruz
security
@DinisCruz
NIST (Cyber Security Framework)
https://www.canso.org/sites/default/files/CANSO%20Cyber%20Security%20and%20Risk%20Assessment%20Guide.pdf
@DinisCruz
security
@DinisCruz
Map functions to standards and policies
https://insights.sei.cmu.edu/sei_blog/2016/02/structuring-the-chief-information-security-officer-ciso-organization.html
@DinisCruz
security
@DinisCruz
Hippocratic Oath for Security and IT Engineers
https://queue.acm.org/detail.cfm?id=1016991
@DinisCruz
security
@DinisCruz
#DataSavesLives
https://understandingpatientdata.org.uk
@DinisCruz
security
=
+
@DinisCruz@DinisCruz
security
Babylon Security objectives and
mission are completely aligned with
NHS and NHSx
Tight collaboration with NHSx Cyber
Security team is a win-win scenario for
both parties and the wider health care
industry
Learn, integrate
and improve
NHSx
Cyber Security
https://coinzodiac.com/cryptocurrency-arms-race/reinvent-wheel/
Do NOT reinvent the wheel
@DinisCruz
security
@DinisCruz
Be a player
Supports
Integrates
Contributes
Babylon should be here
Private sector players
@DinisCruz
security
@DinisCruz
NHSx focus = Babylon Health Security focus
https://www.slideshare.net/InnovationNWC/dr-masood-nazir-eco-19-care-closer-to-home
@DinisCruz
security
People
Process
Technology
@DinisCruz@DinisCruz
security
1. Babylon Security provides a comprehensive
service, available to all*
2. Access to Babylon Security services is based
on need, not an individual’s business unit
3. Babylon Security aspires to the highest
standards of excellence and professionalism
4. The patient will be at the heart of everything
Babylon Security does
5. Babylon Security works across organisational
boundaries
6. Babylon Security is committed to providing
best value for money
7. Babylon Security is accountable to the
patients, management and shareholders
*All = Babylon Health Company and selected partners
Principles
inspired by:
@DinisCruz
security
@DinisCruz
Following best practices and ideas
1. Ensuring every Babylon Health customer and
employee data is protected
2. Establishing shared architecture and
standards
3. Implementing services to meet needs
4. Supporting stakeholders to get the best out of
technology, data and information
5. Making better use of cyber health and care
information
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/443353/HSCIC-Strategy-2015-2020-FINAL-310315.pdf
@DinisCruz
security
https://digital.nhs.uk/binaries/content/assets/legacy/pdf/8/9/copconfidentialinformation.pdf
@DinisCruz
securityhttps://www.gov.uk/government/publications/the-future-of-healthcare-our-vision-for-digital-data-and-technology-in-health-and-care/the-future-of-healthca
re-our-vision-for-digital-data-and-technology-in-health-and-care
@DinisCruz
security
@DinisCruz
security
@DinisCruz
Babylon Health is very synergetic with GP Connect
@DinisCruz
security
@DinisCruz
NHS Code of Conduct
@DinisCruz
security
@DinisCruz
OWASP ASVS Application Security Verification Standard (in Healthcare)
@DinisCruz
security
?
HOW
Babylon Security
Operates and behaves
@DinisCruz
security
@DinisCruz
Team’s capabilities exposed as services
@DinisCruz
security
@DinisCruz
Graph project’s to outcomes and threats
Each yellow
box is a Jira
ticket
@DinisCruz
security
@DinisCruz
Create schema that represents the business
@DinisCruz
security
@DinisCruz
Scale using Workflows
RISK Workflow VULN Workflow
@DinisCruz
security
@DinisCruz
Lots of workflows
@DinisCruz
security
@DinisCruz
Hyperlinked RISKs
https://www.canso.org/sites/default/files/CANSO%20Cyber%20Security%20and%20Risk%20Assessment%20Guide.pdf
@DinisCruz
security
@DinisCruz
Modern approach to managing security RISKs
https://www.soa.org/globalassets/assets/Files/Research/Projects/research-new-approach.pdf
@DinisCruz
security
Embrace Open Source and CC (Creative Commons)
@DinisCruz
security
=
Linked
Security Policies
Evidence based
Security decisions
@DinisCruz
security
@DinisCruz
Hyperlinked policies in Jira
Policy’s pdfs
do not scale
because it is not
possible to link real-world
data to the respective policy
@DinisCruz
security
@DinisCruz
Convert policy into an graph
@DinisCruz
security
Policies Links to Facts Links to Vulns Links to Risks
@DinisCruz
security
@DinisCruz
Context specific Jira projects (for example FACTs)
@DinisCruz
security
? WHO is
Babylon Security ?
@DinisCruz
security
@DinisCruz
Current Security team
@DinisCruz
security
@DinisCruz
Creating Security Champions
https://www.owasp.org/index.php/Security_Champions
https://safecode.org/putting-a-face-to-software-security-champions/
@DinisCruz
security
@DinisCruz
Security Champions
https://www.slideshare.net/DinisCruz/security-champions-v10
@DinisCruz
security
@DinisCruz
Security Digital Twins
Leverage existing Babylon
Health technology and create
Security digital twins for:
● Security Activities
● Application Security
● Network Security
● Intrusion Detection
● Risks
● Stakeholders (users, customers)
@DinisCruz
security
} Babylon Security
Data Science Tech Stack
@DinisCruz
security
@DinisCruz
Serverless stack
@DinisCruz
security
@DinisCruz
Scalable data creation workflow
@DinisCruz
security
@DinisCruz
JIRA
@DinisCruz
security
@DinisCruz
Elastic (ELK)
@DinisCruz
security
@DinisCruz
Slack
@DinisCruz
security
@DinisCruz
Jupyter notebooks
@DinisCruz
security
@DinisCruz
Other Key Components
@DinisCruz
security
*Graphs and Maps
@DinisCruz
security
@DinisCruz
Wardley Maps
https://leadingedgeforum.com/researchers/simon-wardley/
@DinisCruz
security
@DinisCruz
https://wardle.org/strategy/2018/07/19/mapping.html
This is a graph (position doesn’t matter)
This is a map (position represents evolution)
Using Wardley Maps on Healthcare
@DinisCruz
security
@DinisCruz
Maps help to visualise strategy (and bias)
@DinisCruz
security
@DinisCruz
https://medium.com/@erik_schon/the-art-of-strategy-811c00a96fad
Metadata use in Maps is very powerful
@DinisCruz
security
@DinisCruz
Advanced Wardley Mapping
@DinisCruz
security
@DinisCruz
Cynefin Framework
https://academic.oup.com/heapro/article/28/1/73/576131
@DinisCruz
security
Why Dinis Cruz ?
for Babylon CISO
@DinisCruz
@DinisCruz
@DinisCruz
@DinisCruz
@DinisCruz
Created OWASP Summit* event.
Motivated 100+ Security professionals to collaborate together, and
release knowledge/code under Open Source (or Creative Commons)
* now called Open Security Summit
@DinisCruz
Published
Books
@DinisCruz
https://cyberleadersnetwork.org/dinis-cruz-ciso-of-photobox-on-how-to
-identify-communicate-and-resolve-cyber-security-risks/
https://www.youtube.com/watch?v=A7hccDXlDwI
https://www.youtube.com/watch?v=6XmCQhn57gk
Video interviews
and presentations
@DinisCruz
LinkedIn, GitHub,
Twitter, Blog, Email
http://www.linkedin.com/in/diniscruz
https://twitter.com/DinisCruz
http://github.com/diniscruz http://blog.diniscruz.com/
dinis.cruz@owasp.org
@DinisCruz
security
Thank you - Any Questions?
Dinis Cruz Interim CISO Candidate Sep 2019
@DinisCruz
security
@DinisCruz
security
Misc Slides
(to be added to next version of this
deck)
@DinisCruz
security
Security Ecosystem
Safe Secure
EffectivePeople
Mentor
Community
ResilientCompliant
CommercialTransformative
FoundationsInnovative Enabler ScalableOpen
@DinisCruz
security
@DinisCruz
Handle incidents (should be seen as opportunities)
@DinisCruz@DinisCruz
security
The Security team must do the same
Babylon thinks in graphs
@DinisCruz
security
@DinisCruz
Board/C-Level view of Cyber Security
https://www.ncsc.gov.uk/collection/board-toolkit
@DinisCruz
security
Open Source as a key strategy
@DinisCruz
security
@DinisCruz
Behaviours
@DinisCruz
security
Add how this applies
to security
@DinisCruz
security
@DinisCruz
Security Team values
@DinisCruz
security
Wardley maps
@DinisCruz
@DinisCruz
https://www.isaca.org/Journal/archives/2017/Volume-3/PublishingImages/17v3-Security-Assurance-2L.jpg
@DinisCruz
security
NIST and CIS Controls
https://www.nist.gov/news-events/news/2018/05/mep-centers-aid-manufacturers-cybersecurity
@DinisCruz
security
Design elements

Contenu connexe

Tendances

kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
 

Tendances (20)

Security champions v1.0
Security champions v1.0Security champions v1.0
Security champions v1.0
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Hacking Portugal v1.1
Hacking Portugal  v1.1Hacking Portugal  v1.1
Hacking Portugal v1.1
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
NEW LAUNCH! AWS Shield—A Managed DDoS Protection ServiceNEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
 
AWS Cloud Adoption Framework and Workshops
AWS Cloud Adoption Framework and WorkshopsAWS Cloud Adoption Framework and Workshops
AWS Cloud Adoption Framework and Workshops
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 

Similaire à CISO Application presentation - Babylon health security

Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
Carl De Groote
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_Proof
Dominic Vogel
 

Similaire à CISO Application presentation - Babylon health security (20)

Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
The benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC ConferenceThe benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC Conference
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
Novum insights client deck november 2016
Novum insights client deck november 2016Novum insights client deck november 2016
Novum insights client deck november 2016
 
Keith prabhu cloud security-public
Keith prabhu cloud security-publicKeith prabhu cloud security-public
Keith prabhu cloud security-public
 
The Emerging IT Landscape and the IT GRC and Security Professional
The Emerging IT Landscape and the IT GRC and Security Professional  The Emerging IT Landscape and the IT GRC and Security Professional
The Emerging IT Landscape and the IT GRC and Security Professional
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020
 
Encuesta Mundial de Ciberseguridad de la Información 2017
Encuesta Mundial de Ciberseguridad de la Información 2017Encuesta Mundial de Ciberseguridad de la Información 2017
Encuesta Mundial de Ciberseguridad de la Información 2017
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
ISACA_Bringing out the hidden security Ninjas
ISACA_Bringing out the hidden security NinjasISACA_Bringing out the hidden security Ninjas
ISACA_Bringing out the hidden security Ninjas
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Digital Competence for Energy Operations
Digital Competence for Energy OperationsDigital Competence for Energy Operations
Digital Competence for Energy Operations
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdf
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_Proof
 
Cisco's MultiCloud Strategy
Cisco's MultiCloud StrategyCisco's MultiCloud Strategy
Cisco's MultiCloud Strategy
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 

Plus de Dinis Cruz

Plus de Dinis Cruz (20)

Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 
Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)
 
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security DecisionsUsing OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
 
GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)
 
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6 (OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
 
OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)
 
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Jira schemas  - Open Security Summit (Working Session 21th May 2019)Jira schemas  - Open Security Summit (Working Session 21th May 2019)
Jira schemas - Open Security Summit (Working Session 21th May 2019)
 
Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"
 
Owasp and summits (may 2019)
Owasp and summits (may 2019)Owasp and summits (may 2019)
Owasp and summits (may 2019)
 
Open security summit 2019 owasp london 25th feb
Open security summit 2019   owasp london 25th febOpen security summit 2019   owasp london 25th feb
Open security summit 2019 owasp london 25th feb
 
Owasp summit 2019 - OWASP London 25th feb
Owasp summit 2019  - OWASP London 25th febOwasp summit 2019  - OWASP London 25th feb
Owasp summit 2019 - OWASP London 25th feb
 
Evolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsEvolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIs
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Thinking in graphs v1.0
Thinking in graphs v1.0Thinking in graphs v1.0
Thinking in graphs v1.0
 
Open Security Summit - April 2018
Open Security Summit - April 2018 Open Security Summit - April 2018
Open Security Summit - April 2018
 
Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018
 
Using security to drive chaos engineering
Using security to drive chaos engineeringUsing security to drive chaos engineering
Using security to drive chaos engineering
 
Scaling security in a cloud environment v0.5 (Sep 2017)
Scaling security in a cloud environment  v0.5 (Sep 2017)Scaling security in a cloud environment  v0.5 (Sep 2017)
Scaling security in a cloud environment v0.5 (Sep 2017)
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

CISO Application presentation - Babylon health security