SlideShare a Scribd company logo
1 of 70
Download to read offline
@DinisCruz
The benefits of
Police and Industry
Investigation
Jan 2020, Dinis Cruz
Keynote , Conference
@DinisCruz
Who am I?
@DinisCruz
Collaborated with
Workshop for
Sussex Police
@DinisCruz
Mapping the landscape
@DinisCruz
security
Security
team
Incident
Response
MVP
(Minimum Viable
Prototypes)
Genesis Custom Built Product Commodity
invisiblevisible
The Landscape
@DinisCruz
Comms
Cloud
Services
Security
Automation
Data
Science
Automating
processes
Innovation
Not
integrated
Main areas
@DinisCruz
Buy or Outsource
Build
Build
Relationships
Build vs Buy
Share and
Collaborate
@DinisCruz
security
Security
team
Incident
Response
MVP
(Minimum Viable
Prototypes)
Genesis Custom Built Product Commodity
invisiblevisible
What we need
Create products
Commoditized
solutions
@DinisCruz
Case Study: Modern Security toolkit
@DinisCruz
The reality in Jan/2020
@DinisCruz
If the organization
Has
an history of attacks or
major security incidents
@DinisCruz
There is budget, focus and accountability
@DinisCruz
If the organization
Does not have
An history of attacks or
major security incidents
@DinisCruz
It is a ‘Best Effort’ and Marketing exercise
@DinisCruz
What scales
@DinisCruz
Disrupt the
Attacker’s
Business Model
@DinisCruz
* created by Ashraf Aboukass
@DinisCruz
* created by Ashraf Aboukass
@DinisCruz
* created by Ashraf Aboukass
@DinisCruz
Automation
@DinisCruz
Case study: Modern Security Incident Response
Playbooks
@DinisCruz
Capture data into graph
@DinisCruz
Create feedback loops
@DinisCruz
Create issue and confirm activity with user
@DinisCruz
Close issue (depending on response and rules)
@DinisCruz
Thinking in Graphs
@DinisCruz
@DinisCruz
You need to think in Graphs
@DinisCruz
You need an Graph Database
@DinisCruz
You can’t
Outsource this
@DinisCruz
Creating Graphs
is a key capability you
need to have in-house
@DinisCruz
You need
Developers and
Data Scientists
In your Teams
@DinisCruz
APIs
@DinisCruz
You need to think in APIs
@DinisCruz
This is how Amazon did it
Memo
from 2002
@DinisCruz
Push Model
(broadcast only)
No APIs
Where are the Police and NPCC APIs?
@DinisCruz
NPCC needs to be where the action is
@DinisCruz
It’s APIs Everywhere
@DinisCruz
Embrace Data Science
@DinisCruz
Great Examples
@DinisCruz
Content and Code
Licensing
@DinisCruz
Collaborate internally, externally
@DinisCruz
Case Study: Glasswall is sharing how it works
@DinisCruz
Case study: Glasswall Engineering Blog
@DinisCruz
Case study: Glasswall Security Policies
@DinisCruz
Transparency is the new security
@DinisCruz
You can do it
@DinisCruz
Remove duplication
@DinisCruz
You already have all resources you need
@DinisCruz
Leverage best in class
@DinisCruz
Use Pioneers, Settlers and Town Planners
@DinisCruz
Content Disarm &
Reconstruction (CDR)
@DinisCruz
@DinisCruz
Case Study: Glasswall Threat Intelligence
@DinisCruz
How do we
Give you our Threat
Intelligence?
@DinisCruz
How do we
Consume your
Threat Intelligence?
@DinisCruz
We need
joint playbooks and
collaboration touchpoints
@DinisCruz
Wardley Maps
@DinisCruz
Created by this gentleman
See his
presentations!!!
Read his book
@DinisCruz
https://www.youtube.com/watch?v=ZB-4ynJPDIA
Mapping Policing in the UK with Tim Ebenezer
@DinisCruz
Great GCHQ publication on technology change
@DinisCruz
See also (in slideshare)
https://www.slideshare.net/DinisCruz/using-w
ardley-maps-to-understand-securitys-landsca
pe-and-strategy-191404053
https://www.slideshare.net/DinisCruz/modern
-security-using-graphs-automation-and-data-
science
@DinisCruz
Wrapping up
@DinisCruz
You need
To engage with Industry
BEFORE incidents
@DinisCruz
You need
To have modern
development workflows
@DinisCruz
You need
To add value to the Top and
Bottom line of business
@DinisCruz
You need
To proactively defend the
Customer/Public
@DinisCruz
You need
To work with companies that
want to engage with you
@DinisCruz
You need to
Productise and commoditize
your services and mission
@DinisCruz
Thanks

More Related Content

What's hot

Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesDinis Cruz
 
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security DecisionsUsing OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security DecisionsDinis Cruz
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial TsunamiForcepoint LLC
 
Microservices Applications: Challenges and Best Practices When Deploying SQL-...
Microservices Applications: Challenges and Best Practices When Deploying SQL-...Microservices Applications: Challenges and Best Practices When Deploying SQL-...
Microservices Applications: Challenges and Best Practices When Deploying SQL-...NuoDB
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksForcepoint LLC
 
State of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top PredictionsState of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top PredictionsComodo SSL Store
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterForcepoint LLC
 
2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity PredictionsNyotron
 
Cloud Security - Reality or Illusion
Cloud Security - Reality or IllusionCloud Security - Reality or Illusion
Cloud Security - Reality or IllusionSrinivas Thimmaiah
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityForcepoint LLC
 
Elastic Security: Your one-stop OODA loop shop
Elastic Security: Your one-stop OODA loop shopElastic Security: Your one-stop OODA loop shop
Elastic Security: Your one-stop OODA loop shopElasticsearch
 
Webinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy WebinarWebinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy WebinarBlueliv
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...MarketingArrowECS_CZ
 
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...Blueliv
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
Cloud Security - The treacherous 12
Cloud Security - The treacherous 12Cloud Security - The treacherous 12
Cloud Security - The treacherous 12Hemed Gur Ary
 
Annoyance to Annihilation: Assessing Privacy Risk
Annoyance to Annihilation: Assessing Privacy RiskAnnoyance to Annihilation: Assessing Privacy Risk
Annoyance to Annihilation: Assessing Privacy RiskProtecture Ltd
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsCarl De Groote
 
Project Grace - Towards a Secure Internet
Project Grace - Towards a Secure InternetProject Grace - Towards a Secure Internet
Project Grace - Towards a Secure Internetinside-BigData.com
 

What's hot (20)

Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security DecisionsUsing OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial Tsunami
 
Microservices Applications: Challenges and Best Practices When Deploying SQL-...
Microservices Applications: Challenges and Best Practices When Deploying SQL-...Microservices Applications: Challenges and Best Practices When Deploying SQL-...
Microservices Applications: Challenges and Best Practices When Deploying SQL-...
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
 
State of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top PredictionsState of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top Predictions
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
 
2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
 
Cloud Security - Reality or Illusion
Cloud Security - Reality or IllusionCloud Security - Reality or Illusion
Cloud Security - Reality or Illusion
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 
Elastic Security: Your one-stop OODA loop shop
Elastic Security: Your one-stop OODA loop shopElastic Security: Your one-stop OODA loop shop
Elastic Security: Your one-stop OODA loop shop
 
Webinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy WebinarWebinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy Webinar
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
 
EyeHub
EyeHub EyeHub
EyeHub
 
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
Cloud Security - The treacherous 12
Cloud Security - The treacherous 12Cloud Security - The treacherous 12
Cloud Security - The treacherous 12
 
Annoyance to Annihilation: Assessing Privacy Risk
Annoyance to Annihilation: Assessing Privacy RiskAnnoyance to Annihilation: Assessing Privacy Risk
Annoyance to Annihilation: Assessing Privacy Risk
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
Project Grace - Towards a Secure Internet
Project Grace - Towards a Secure InternetProject Grace - Towards a Secure Internet
Project Grace - Towards a Secure Internet
 

Similar to The benefits of police and industry investigation - NPCC Conference

Education in Age of Digital Disruption @ OPSOA
Education in Age of Digital Disruption @ OPSOAEducation in Age of Digital Disruption @ OPSOA
Education in Age of Digital Disruption @ OPSOARick Huijbregts
 
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityThe Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityDinis Guarda
 
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityThe Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularitytheodorekristiniak
 
Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsIDC Italy
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewVeritas Technologies LLC
 
The Amazing Ways Artificial Intelligence (AI) Can Now Detect Dangers At Work
The Amazing Ways Artificial Intelligence (AI) Can Now Detect Dangers At WorkThe Amazing Ways Artificial Intelligence (AI) Can Now Detect Dangers At Work
The Amazing Ways Artificial Intelligence (AI) Can Now Detect Dangers At WorkBernard Marr
 
Smart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure CitiesSmart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure Cities4 All of Us
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 
Our Role and Responsibility in Information 4.0
Our Role and Responsibility in Information 4.0Our Role and Responsibility in Information 4.0
Our Role and Responsibility in Information 4.0The Transformation Society
 
What are the 2019 Trends of Cloud Computing the CIOS should Aware of
What are the 2019 Trends of Cloud Computing the CIOS should Aware ofWhat are the 2019 Trends of Cloud Computing the CIOS should Aware of
What are the 2019 Trends of Cloud Computing the CIOS should Aware ofGeekTek IT Services
 
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...Equinix
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudChris Swan
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsSkycure
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in irelandFiona Sexton
 
Social Media Bootcamp for LinkedIn
Social Media Bootcamp for LinkedInSocial Media Bootcamp for LinkedIn
Social Media Bootcamp for LinkedInBob West
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCHarry Gunns
 
A world of connected object Designed to Serve Us
A world of connected object Designed to Serve UsA world of connected object Designed to Serve Us
A world of connected object Designed to Serve UsPhilip Andreae
 

Similar to The benefits of police and industry investigation - NPCC Conference (20)

Education in Age of Digital Disruption @ OPSOA
Education in Age of Digital Disruption @ OPSOAEducation in Age of Digital Disruption @ OPSOA
Education in Age of Digital Disruption @ OPSOA
 
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityThe Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
 
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityThe Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
 
Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directions
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
 
The Amazing Ways Artificial Intelligence (AI) Can Now Detect Dangers At Work
The Amazing Ways Artificial Intelligence (AI) Can Now Detect Dangers At WorkThe Amazing Ways Artificial Intelligence (AI) Can Now Detect Dangers At Work
The Amazing Ways Artificial Intelligence (AI) Can Now Detect Dangers At Work
 
Smart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure CitiesSmart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure Cities
 
TIAD : In a chocolate factory
TIAD : In a chocolate factoryTIAD : In a chocolate factory
TIAD : In a chocolate factory
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Our Role and Responsibility in Information 4.0
Our Role and Responsibility in Information 4.0Our Role and Responsibility in Information 4.0
Our Role and Responsibility in Information 4.0
 
What are the 2019 Trends of Cloud Computing the CIOS should Aware of
What are the 2019 Trends of Cloud Computing the CIOS should Aware ofWhat are the 2019 Trends of Cloud Computing the CIOS should Aware of
What are the 2019 Trends of Cloud Computing the CIOS should Aware of
 
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
 
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloud
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in ireland
 
Social Media Bootcamp for LinkedIn
Social Media Bootcamp for LinkedInSocial Media Bootcamp for LinkedIn
Social Media Bootcamp for LinkedIn
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
A world of connected object Designed to Serve Us
A world of connected object Designed to Serve UsA world of connected object Designed to Serve Us
A world of connected object Designed to Serve Us
 

More from Dinis Cruz

Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)Dinis Cruz
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsDinis Cruz
 
GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)Dinis Cruz
 
OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)Dinis Cruz
 
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Jira schemas  - Open Security Summit (Working Session 21th May 2019)Jira schemas  - Open Security Summit (Working Session 21th May 2019)
Jira schemas - Open Security Summit (Working Session 21th May 2019)Dinis Cruz
 
Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Dinis Cruz
 
Owasp and summits (may 2019)
Owasp and summits (may 2019)Owasp and summits (may 2019)
Owasp and summits (may 2019)Dinis Cruz
 
Open security summit 2019 owasp london 25th feb
Open security summit 2019   owasp london 25th febOpen security summit 2019   owasp london 25th feb
Open security summit 2019 owasp london 25th febDinis Cruz
 
Owasp summit 2019 - OWASP London 25th feb
Owasp summit 2019  - OWASP London 25th febOwasp summit 2019  - OWASP London 25th feb
Owasp summit 2019 - OWASP London 25th febDinis Cruz
 
Evolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsEvolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsDinis Cruz
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)Dinis Cruz
 
Thinking in graphs v1.0
Thinking in graphs v1.0Thinking in graphs v1.0
Thinking in graphs v1.0Dinis Cruz
 
Open Security Summit - April 2018
Open Security Summit - April 2018 Open Security Summit - April 2018
Open Security Summit - April 2018 Dinis Cruz
 
Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018Dinis Cruz
 
Using security to drive chaos engineering
Using security to drive chaos engineeringUsing security to drive chaos engineering
Using security to drive chaos engineeringDinis Cruz
 
Scaling security in a cloud environment v0.5 (Sep 2017)
Scaling security in a cloud environment  v0.5 (Sep 2017)Scaling security in a cloud environment  v0.5 (Sep 2017)
Scaling security in a cloud environment v0.5 (Sep 2017)Dinis Cruz
 
Improving the quality of Cyber Security Hires via Pre-Interview Challenges
Improving the quality of Cyber Security Hires via Pre-Interview Challenges Improving the quality of Cyber Security Hires via Pre-Interview Challenges
Improving the quality of Cyber Security Hires via Pre-Interview Challenges Dinis Cruz
 
Creating a Graph Based Security Organisation - DevSecCon Keynote
Creating a Graph Based Security Organisation - DevSecCon KeynoteCreating a Graph Based Security Organisation - DevSecCon Keynote
Creating a Graph Based Security Organisation - DevSecCon KeynoteDinis Cruz
 
Owasp Summit 2017 - Keynote
Owasp Summit 2017 - KeynoteOwasp Summit 2017 - Keynote
Owasp Summit 2017 - KeynoteDinis Cruz
 
Owasp summit slides day 2
Owasp summit slides day 2Owasp summit slides day 2
Owasp summit slides day 2Dinis Cruz
 

More from Dinis Cruz (20)

Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 
GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)
 
OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)
 
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Jira schemas  - Open Security Summit (Working Session 21th May 2019)Jira schemas  - Open Security Summit (Working Session 21th May 2019)
Jira schemas - Open Security Summit (Working Session 21th May 2019)
 
Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"
 
Owasp and summits (may 2019)
Owasp and summits (may 2019)Owasp and summits (may 2019)
Owasp and summits (may 2019)
 
Open security summit 2019 owasp london 25th feb
Open security summit 2019   owasp london 25th febOpen security summit 2019   owasp london 25th feb
Open security summit 2019 owasp london 25th feb
 
Owasp summit 2019 - OWASP London 25th feb
Owasp summit 2019  - OWASP London 25th febOwasp summit 2019  - OWASP London 25th feb
Owasp summit 2019 - OWASP London 25th feb
 
Evolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsEvolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIs
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Thinking in graphs v1.0
Thinking in graphs v1.0Thinking in graphs v1.0
Thinking in graphs v1.0
 
Open Security Summit - April 2018
Open Security Summit - April 2018 Open Security Summit - April 2018
Open Security Summit - April 2018
 
Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018
 
Using security to drive chaos engineering
Using security to drive chaos engineeringUsing security to drive chaos engineering
Using security to drive chaos engineering
 
Scaling security in a cloud environment v0.5 (Sep 2017)
Scaling security in a cloud environment  v0.5 (Sep 2017)Scaling security in a cloud environment  v0.5 (Sep 2017)
Scaling security in a cloud environment v0.5 (Sep 2017)
 
Improving the quality of Cyber Security Hires via Pre-Interview Challenges
Improving the quality of Cyber Security Hires via Pre-Interview Challenges Improving the quality of Cyber Security Hires via Pre-Interview Challenges
Improving the quality of Cyber Security Hires via Pre-Interview Challenges
 
Creating a Graph Based Security Organisation - DevSecCon Keynote
Creating a Graph Based Security Organisation - DevSecCon KeynoteCreating a Graph Based Security Organisation - DevSecCon Keynote
Creating a Graph Based Security Organisation - DevSecCon Keynote
 
Owasp Summit 2017 - Keynote
Owasp Summit 2017 - KeynoteOwasp Summit 2017 - Keynote
Owasp Summit 2017 - Keynote
 
Owasp summit slides day 2
Owasp summit slides day 2Owasp summit slides day 2
Owasp summit slides day 2
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

The benefits of police and industry investigation - NPCC Conference