SlideShare a Scribd company logo
Jacques	Folon	
www.folon.com		
Partner	Edge	Consulting	
Professeur	
ICHEC		
Maître	de	conférences		
Université	de	Liège		
Professeur	invité		
Université	Saint	Louis	(BXL)	
Université	de	Lorraine		
ESC	Rennes	School	of	Business	
Digital strategy
Information security
Identity Access Management
table of content
1.Introduction
2.information security definition
3.Risk analysis
4.Myth of cybersecurity
5.Identity access management
6.Cloud computing
7.the weakest link: the employee
8.E-Discovery
9.Conclusion
1.introduction
The value of information goes beyond the written words, numbers and images:
knowledge, concepts, ideas and brands are examples of intangible forms of
information.
In an interconnected world, information and related processes,
systems, networks and personnel involved in their operation, handling
and protection are assets that, like other important business assets, are valuable
to an organization’s business and consequently deserve or require protection
against various hazards.
ISO/IEC 27002:2013
2. DEFINITION
Source	:	https://www.britestream.com/difference.html.
www.intertek.com
Information Security Overview
Issue 2 © Intertek QATAR www.intertek.com
9
11
WHAT IS
OF INFORMATION ?
www.intertek.com
Information Security Overview
Issue 2 © Intertek QATAR www.intertek.com
10
Availability – the property of being accessible and
usable upon demand by an authorised entity
The elements of information security
12CQIMC LA PPT 2 Ver 0.2
www.intertek.com
Information Security Overview
Issue 2 © Intertek QATAR www.intertek.com
11
CQIMC LA PPT 2 Ver 0.2 13
act of informing –
✓what is conveyed or represented by a particular arrangement
or sequence of things.
✓data as processed, stored, or transmitted by a computer.
✓facts provided or learned about something or someone.
www.intertek.com
Information Security Overview
Issue 2 © Intertek QATAR www.intertek.com
12
Where is information residing .?
14
Information – is of value to the organization, consequently
requires adequate protection!
Information needs to be protected !
www.intertek.com
Issue 2 © Intertek QATAR www.intertek.com
Information Security Overview
www.intertek.comIssue 1 © Intertek QATAR www.intertek.com
ISO 27001 : 2013 OVERVIEW
15
ISO 27001 : 2013
3. Risk analysis
Risk analysis
exemple of cyber attack
4. Myths and cybersecurity
5.	Identity	Access	Management	(IAM)
Provisioning
Single	Sign		On
PKIStrong	
Authentication
Federation
Directories
Authorization
Secure	Remote		
Access
Password	
Management
Web	Services	
Security
Auditing	&	
Reporting
Role	based	
Management
DRM
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

5 Questions 

to ask your CISO
Q: What’s posted on this monitor?
a – password to financial application
b – phone messages
c – to-do’s
Q: What determines your
employee’s access?
a – give Alice whatever Wally has
b – roles, attributes, and requests
c – whatever her manager says
Q: Who is the most privileged
user in your enterprise?
a – security administrator
b – CFO
c – the summer intern who is now working
for your competitor
Q: How secure is your

identity data?
a – It is in 18 different secured stores
b – We protect the admin passwords
c – Privacy? We don’t hold credit card
numbers
Q: How much are manual
compliance controls costing
your organization?
a – nothing, no new headcount
b – don’t ask
c – don’t know
Today’s IT Challenges
More Agile Business
• More accessibility for employees, customers
and partners
• Higher level of B2B integrations
• Faster reaction to changing requirements
More Secured Business
• Organized crime
• Identity theft
• Intellectual property theft
• Constant global threats
More Compliant Business
• Increasing regulatory demands
• Increasing privacy concerns
• Business viability concerns
State Of Security In Enterprise
• Incomplete
• Multiple point solutions from many vendors
• Disparate technologies that don’t work together
• Complex
• Repeated point-to-point integrations
• Mostly manual operations
• ‘Non-compliant’
• Difficult to enforce consistent set of policies
• Difficult to measure compliance with those policies
Identity Management Values
• Trusted and reliable security
• Efficient regulatory compliance
• Lower administrative and development costs
• Enable online business networks
• Better end-user experience
15
IAM	MEANS	MANAGING	THE	
EMPLOYEES	LIFECYCLE	(HIRING,	
RECRUITING,	PROMOTION,	CHANGE,	
LEAVING)	AND	THE	IMPACTS	ON	THE	
INFORMATION	MANAGEMENT	
SYSTEM
source	clusif	
IAM		is	a	legal	obligation	!
• IAM	IS	DEFINED	BY	THE	BUSINESS	(RH,	SCM,	
ETC.)
• AND
• FOLLOWING THE LEGAL
FRAMEWORK
• AND
• TECHNICALLY IMPLEMENTED
16
IAM	IS	BUSINESS	&	ICT	+	LEGAL
source	clusif
17
IAM INCLUDES
• DATABASE OF ALL AND EVERY USER
•DATABASE OF ALL TYPE OF PROFILES
& ROLES
•DEFINITION BEFOREHAND
•DEFINE WICH ROLE FOR WICH
EMPLOYEE
•DEFINITION OF LOGIN & PASSWORDS
•AUDIT
•REPORTING
•ACCESS CONTROL
source	clusif
• What	is	Identity	Management	?	
	“Identity	management	is	the	set	of	
business	processes,	and	a	supporting	
infrastructure,	for	the	creation,	
maintenance,	and	use	of	digital	
identities.”	The	Burton	Group	(a	
research	firm	specializing	in	IT	
infrastructure	for	the	enterprise)	
• Identity	Management	in	this	sense	
is	sometimes	called	“Identity	and	
Access	Management”	(IAM)
Définition
IAM	AT	ICHEC…
• “MY	NAME	IS	JULIE	AND	I	AM	A	
STUDENT.”			(Identity)	
• “this	is	my	password.”	
	 	 (Authentification)	
• “I	want	an	access	to	my	account”	
	 	 (Authorization	ok)	
• “I	want	to	adapt	my	grade.”	
	 	 (Autorization	rejected)
What	are	the	questions	?
• is	this	person	the	one	she	said	she	
is?	
• Is	she	a	member	of	our	group	?	
• Did	she	receive	the	necessary	
authorization	?	
• Is	data	privacy	OK?
Type	of	questions	for	a	newcomer
– Which	kind	of	password?	
– Which	activities	are	accepted?	
– Which	are	forbidden?	
– To	which	category	this	person	belongs?	
– When	do	we	have	to	give	the	authorization??	
– What	control	do	we	need	?	
– Could	we	demonstrate	in	court	our	procedure?
24
IAM	triple	A
Authentication
WHO ARE YOU?
Authorization / Access Control
WHAT CAN YOU DO?
Audit
WHAT HAVE YOU DONE?
24
Components	of	IAM
• Administration	
– User	Management	
– Password	Management	
– Workflow	
– Delegation	
• Access	Management	
– Authentication		
– Authorization	
• Identity	Management	
– Account	Provisioning	
– Account	Deprovisioning	
– Synchronisation
Reliable Identity Data
Administration
Authorization
Authentication
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

Context	in	2017
28
various	identity	co-exists
29
IRL	&	virtual	identity
• Internet	is	based	on	IP	identification	
• everybody	has	different	profiles	
• Each	platform	has	a	different	
authentification	system	
• Users	are	the	weakest	link	
• Cybercrime	increases	
• Controls	means	identification	
• Data	privacy	imposes	controls	&	security	
• e-discovery	imposes	ECM
Welcome	to	a	digital	world
Explosion	of	IDs
Pre	1980’s 1980’s 1990’s 2000’s
#	of	
Digital	IDs
Time
Applications
Mainframe
Client	Server
Internet
Business	
Automation
Company	
(B2E)
Partners	
(B2B)
Customers	
(B2C)
Mobility
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

The	Disconnected	Reality
• “Identity	Chaos”		
– Many	users		
– Many	ID	
– Many	log	in	&	passwords		
– Multiple	repositories	of	identity	information	
– Multiple	user	IDs,	multiple	passwords
Enterprise Directory
HR
Infra	
Application
Office
In-House	
Application
External app
Finance
employee	
Application
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authorization
•Identity Data
•Authentication
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

Your	COMPANY	and

your	EMPLOYEES
Your	SUPPLIERS
Your	PARTNERSYour	REMOTE	and

VIRTUAL	EMPLOYEES
Your	CUSTOMERS
Customer	satisfaction	&	customer	intimacy	
Cost	competitiveness	
Reach,	personalization
Collaboration	
Outsourcing	
Faster	business	cycles;	process	
automation	
Value	chain
M&A	
Mobile/global	workforce	
Flexible/temp	workforce
Multiple	Contexts
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

Trends	Impacting	Identity
Increasing Threat Landscape	
Identity	theft	costs	banks	and	credit	card	issuers	$1.2	billion	in	1	yr	
•$250 billion lost from exposure of confidential info
Maintenance Costs Dominate IT Budget	
On average employees need access to 16 apps and systems	
•Companies spend $20-30 per user per year for PW resets
Deeper Line of Business Automation and Integration	
One half of all enterprises have SOA under development	
•Web services spending growing 45%
Rising Tide of Regulation and Compliance	
SOX, HIPAA, GLB, Basel II, 21 CFR Part 11, …	
•$15.5 billion spend on compliance (analyst estimate)
Data	Sources:	Gartner,	AMR	Research,	IDC,	eMarketer,	U.S.	Department.	of	Justice
37
Business

Owner
End	UserIT	Admin Developer Security/	Compliance
Too	expensive	
to	reach	new	
partners,	
channels	
Need	for	
control
Too	many	
passwords	
Long	waits	for	
access	to	apps,	
resources
Too	many	user	
stores	and	
account	admin	
requests	
Unsafe	sync	
scripts
Pain	Points
Redundant	
code	in	each	
app	
Rework	code	
too	often
Too	many	
orphaned	
accounts	
Limited	
auditing	ability
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

Why	do	we	need	IAM?
•Security	
•Compliance	
•Cost	control	
•Audit	support	
•Access	control
Source:	ftp://ftp.boulder.ibm.com/software/uk/productnews/tv/vh_-_access_and_identity_management.pdf
cost	reduction
• Directory	Synchronization	
“Improved	updating	of	user	data:	$185	per	user/year”	
“Improved	list	management:	$800	per	list”	
-	Giga	Information	Group	
• Password	Management	
“Password	reset	costs	range	from	$51	(best	case)	to	$147	(worst	case)	for	labor	
alone.”	–	Gartner	
• User	Provisioning	
“Improved	IT	efficiency:	$70,000	per	year	per	1,000	managed	users”	
“Reduced	help	desk	costs:	$75	per	user	per	year”	
-	Giga	Information	Group
Can	We	Just	Ignore	It	All?
• Today,	average	corporate	user	spends	
16	minutes	a	day	logging	on	
• A	typical	home	user	maintains	12-18	
identities	
• Number	of	phishing		sites	grew	over	
1600%	over	the	past	year	
• Corporate	IT	Ops	manage	an	average	
of	73	applications	and	46	suppliers,	
often	with	individual	directories	
• Regulators	are	becoming	stricter	
about	compliance	and	auditing	
• Orphaned	accounts	and	identities	
lead	to	security	problems
Source:	Microsoft’s	internal	research	and	Anti-phishing	Working	Group
IAM	Benefits
Benefits to take you
forward 	
(Strategic)
Benefits today	
(Tactical)
Save money and improve operational
efficiency
Improved time to deliver applications and
service
Enhance Security
Regulatory Compliance and Audit
New ways of working
Improved time to market
Closer Supplier, Customer, 	
Partner and Employee relationships
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

IAM	to	do	list
• Automatic	account	
management	
• Archiving		
• Data	privacy	
• Compliance		
• Securiry	VS	Risks	
• user	identification	
• E-business	
• M2M
6.	Cloud	computing
First,
What the heck is
Cloud Computing
First, what the heck is
Cloud Computing?
…in simple, plain
English please!
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s use a simple analogy
Say you just moved
to a city, and
you’re looking for
a nice
place to live
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
You can either
Build a house
or
Rent an
apartment
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
If you build a house, there are a few
important decisions you have to make…
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
How big is the house?
are you planning to grow a large
family?
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Remodel, addition typically cost a lot more once the
house is built
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
But, you get a
chance to
customize it
Roof
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
Once the house is built,
you’re
responsible for
maintenance
Hire Landscaper
Electrician
Plumber
Pay
property tax
Electricity
Water
Gutter Cleaning
Heating and Cooling
House Keeping
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
How about renting?
Consider a builder in your city builds a
Huge
number of apartment units
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
A unit can easily be converted
into a 2,3,4 or more units
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
You make a fewer, 

simpler
decisions
You can start with one
unit and grow later, or
downsize
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
But…
You do not
have
a lot of
options to
customize
your unit Andy Harjanto I’m cloud confuse
d http://www.andyharjanto.com
However, builders provide you with 

very high quality infrastructure
high speed Internet
high capacity electricity
triple pane windows
green materials
No need to worry
about maintenance
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Just pay your
rent
and utilities
Pay as You Go
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
Let’s translate to
Cloud Computing?
As an end-consumer, believe it or not
you’ve been using Cloud for long times
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
most of
them are
Free
In return, you’re willing to
give away
your information for ads and
other purposes
But you’ve been
enjoying
High Reliability Service
Limited Storage
Connecting, Sharing
OK, Now tell that to the business
owner
Give up your data,
then
you can use this
infrastructure for free
Are You crazy?
will answer the CEO
My Business
Needs…
Security
Privacy
Reliability
High
Availability
Building Enterprise
Software
Stone Wall
Fire-proof
Moat
Army
Death Hole
is like….
Medieval
Castle
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s Hire an Army of IT Engineers
Software Upgrade
Support
Backup/Restore
Service Pack
Development
Network issues
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s Build
Huge Data
Center
Capacity Planning
Disaster Plan
Cooling Management
Server
Crashes
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
Your data is replicated
3 or 4 times in their data
center
High Availability
Adding “servers” is a click
away.
Running in just minutes, not
days
HighTraffic?
It can even load balance
your server traffic
Expect your Cloud
Network
is always up
Yes, you can even pick
where your data
and “servers” reside
Don’t forget data privacy issues
So we know what
Cloud is and the
choice we have
Cloud	Computing:	Definition
• No	Unique	Definition	or	General	Consensus	about	what	Cloud	Computing	is	…	
• Different	Perspectives	&	Focuses	(Platform,	SW,	Service	Levels…)	
• Flavours:	
✦Computing	and	IT		Resources	Accessible	Online	
✦Dynamically	Scalable	Computing	Power		
✦Virtualization	of	Resources	
✦Abstraction	of	IT	Infrastructure		
✦				!	No	need	to	understand	its	implementation:	use	Services	&	their	
APIs	
✦Some	current	players,	at	the	Infrastructure	&	Service	Level:		
✦			SalesfoRce.com,	Google	Apps,	Amazon,	Yahoo,	Microsoft,	IBM,	HP,	etc.




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



Cloud	Computing:	Implications
• Enterprise:		
			Paradigm	Shift	from	“Close	&	Controlled”	IT	Infrastructures	and	Services	to	Externally	
Provided	Services	and	IT	Infrastructures		
• Private	User:		
			Paradigm	Shift	from	Accessing	Static	Set	of	Services	to	Dynamic	&	Composable	Services		
• General	Issues:	
– 	Potential	Loss	of	Control	(on	Data,	Infrastructure,	Processes,	etc.)	
– 	Data	&	Confidential	Information	Stored	in	The	Clouds	
– 	Management	of	Identities	and	Access	(IAM)	in	the	Cloud	
– 	Compliance	to	Security	Practice	and	Legislation		
– 	Privacy	Management	(Control,	Consent,	Revocation,	etc.)	
– 	New	Threat	Environments	
– 	Reliability	and	Longevity	of	Cloud	&	Service	Providers


The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



Identity	in	the	Cloud:	Enterprise	Case
Issues	and	Risks	[1/2]	


•	Potential	Proliferation	of	Required	Identities	&	Credentials	to	Access	Services	
			!	Misbehaviours	when	handling	credentials	(writing	down,	reusing,	sharing,	etc.)	
•	Propagation	of	Identity	and	Personal	Information	across	Multiple	Clouds/Services		
		!	Privacy	issues	(e.g.	compliance	to	multiple		Legislations,	Importance	of	Location,	etc.)	
		!	Exposure	of	business	sensitive	information		
						(employees’	identities,	roles,	organisational	structures,	enterprise	apps/services,	etc.)	
		!	How	to	effectively	Control	this	Data?	
•	Delegation	of	IAM	and	Data	Management	Processes	to	Cloud	and	Service	Providers		
		!	How	to	get	Assurance	that	these	Processes	and	Security	Practice		are	Consistent	with						
						Enterprise	Policies?	
		!	How	to	deal	with	overall	Compliance	and	Governance	issues?	
	

The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



Identity	in	the	Cloud:	Enterprise	Case
Issues	and	Risks	[2/2]	
•	Migration	of	Services	between	Cloud	and	Service	Providers	
		!	Management	of	Data	Lifecycle	
•	Threats	and	Attacks	in	the	Clouds	and	Cloud	Services	
			!	Cloud	and	Service	Providers	can	be	the	“weakest	links”	in	Security	&	
Privacy		
			!	Reliance	on	good	security	practice	of	Third	Parties				



The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



7.	the	weakest	link	:	the	employee
need	to	check
legal	limits
data	controller	responsibility
teleworking
data	theft
124
data	transfer
• limitation	of	control	
• Private	email	
• penalties	
• who	controls
• security	is	mandatory	!
• technical	security	
– Risk	analysis	
– Back-up	
– desaster	recovery	
– identity	management	
– Strong	login	&	passwords
• legal	security	
– information	in	the	employment	
contracts	
– Contracts	with	subcontractors	
– Code	of	conduct	
– Compliance	
– Control	of	the	employees
Control	?
8.	E-discovery
Definition	of	e-discovery
• Electronic	discovery	(or	e-discovery)	refers	to	discovery	in	civil	
litigation	which	deals	with	information	in	electronic	format	also	
referred	to	as	Electronically	Stored	Information	(ESI).		
• It	means	the	collection,	preparation,	review	and	production	of	
electronic	documents	in	litigation	discovery.		
• Any	process	in	which	electronic	data	is	sought,	located,	secured,	
and	searched	with	the	intent	of	using	it	as	evidence	in	a	civil	or	
criminal	legal	case	
• This	includes	e-mail,	attachments,	and	other	data	stored	on	a	
computer,	network,	backup	or	other	storage	media.	e-Discovery	
includes	metadata.
Recommandations
Organizations	should	update	and/or	create	information	
management	policies	and	procedures	that	include:	
– e-mail	retention	policies,	On	an	individual	level,	employees	tend	to	
keep	information	on	their	hard	drives	“just	in	case”	they	might	need	it.	
– Work	with	users	to	rationalize	their	storage	requirements	and	
decrease	their	storage	budget.	
– off-line	and	off-site	data	storage	retention	policies,		
– controls	defining	which	users	have	access	to	which	systems	andunder	
what	circumstances,		
– instructions	for	how	and	where	users	can	store	data,	and	•	backup	and	
recovery	procedures.	
– Assessments	or	surveys	should	be	done	to	identify	business	functions,	
data	repositories,	and	the	systems	that	support	them.	
– Legal	must	be	consulted.	Organizations	and	their	legal	teams	should	
work	together	to	create	and/or	update	their	data	retention	policies	
and	procedures	for	managing	litigation	holds.
• Information	security	is	a	legal	question,	not	only	business	&	IT	
• compliance	is	important	
• More	security	due	to	
– Cloud	computing	
– Virtualisation	
– Data	privacy	
– archiving	
• Transparency	
• E-discovery
IAM	could	be	an	opportunity
• Rethink	security	
• risks	reduction	
• costs	reduction	
• precise	roles	&	responsibilities
conclusion
Any question?
Jacques Folon	
Jacques.folon@ichec.be
credits
M. Martins: https://fr.slideshare.net/MarceloMartinsCISSPC/information-security-strategic-management?
qid=17d48b57-2499-4fc4-9801-b6e96a036ddc&v=&b=&from_search=2
Business continuity institute : https://fr.slideshare.net/TheBCEye/risk-based-cyber-security?
qid=8057ce87-091d-4364-a0f3-ff24e44bb913&v=&b=&from_search=4
W. Brown: https://fr.slideshare.net/whbrown5/how-secure-is-your-business-fraud-risk-analysis-and-
security-management?qid=59280de3-32f9-4260-94e4-38989615b7f4&v=&b=&from_search=8
PECB : https://fr.slideshare.net/PECBCERTIFICATION/check-if-you-are-ready-for-isms-implementation?
qid=cfac8544-a584-4fe4-b752-0d5cacabd8ea&v=&b=&from_search=14
N.Rao: https://fr.slideshare.net/NareshRao3/iso-27001-2013-isms-final-overview?
qid=7c622233-05ea-489b-88e5-30751c3ee08b&v=&b=&from_search=8
VERIZON: https://fr.slideshare.net/VerizonEnterpriseSolutions/2016-data-breach-investigations-report-
dbir-cybersecurity-on-slideshare?qid=1f9f7d1a-7a0e-431e-b7fb-98bcb94c935b&v=&b=&from_search=2
ACCENTURE: https://fr.slideshare.net/AccentureOperations/the-state-of-cybersecurity-and-digital-
trust-2016?qid=1f9a736f-882d-4b3b-82b1-87b447f9b2ea&v=&b=&from_search=11

More Related Content

Viewers also liked

Implementing Your Own Chatbot Platform!
Implementing Your Own Chatbot Platform!Implementing Your Own Chatbot Platform!
Implementing Your Own Chatbot Platform!Oracle Developers
 
Cloud Computing Basics III
Cloud Computing Basics IIICloud Computing Basics III
Cloud Computing Basics IIIRightScale
 
Cloud Computing Basics II
Cloud Computing Basics IICloud Computing Basics II
Cloud Computing Basics IIRightScale
 
IIS for Developers
IIS for DevelopersIIS for Developers
IIS for DevelopersIdo Flatow
 
Cloud Computing Basics I
Cloud Computing Basics ICloud Computing Basics I
Cloud Computing Basics IRightScale
 
IT Professional Development - HDI Keynote - Eric Vanderburg
IT Professional Development - HDI Keynote - Eric VanderburgIT Professional Development - HDI Keynote - Eric Vanderburg
IT Professional Development - HDI Keynote - Eric VanderburgEric Vanderburg
 
Recycling: Weerstand overwinnen?
Recycling: Weerstand overwinnen?Recycling: Weerstand overwinnen?
Recycling: Weerstand overwinnen?Peter Achterberg
 
Kubernetes @ Nanit by Chen Fisher
Kubernetes @ Nanit by Chen FisherKubernetes @ Nanit by Chen Fisher
Kubernetes @ Nanit by Chen FisherDoiT International
 
Quality Software Development LifeCycle
Quality Software Development LifeCycleQuality Software Development LifeCycle
Quality Software Development LifeCycleConsulthinkspa
 
Si pi, yenny farlina yoris, hapzi ali, sistem informasi organisasi dan strate...
Si pi, yenny farlina yoris, hapzi ali, sistem informasi organisasi dan strate...Si pi, yenny farlina yoris, hapzi ali, sistem informasi organisasi dan strate...
Si pi, yenny farlina yoris, hapzi ali, sistem informasi organisasi dan strate...yenny yoris
 

Viewers also liked (14)

Implementing Your Own Chatbot Platform!
Implementing Your Own Chatbot Platform!Implementing Your Own Chatbot Platform!
Implementing Your Own Chatbot Platform!
 
Contexte organisationnel pour GDPR
Contexte organisationnel pour GDPRContexte organisationnel pour GDPR
Contexte organisationnel pour GDPR
 
transformation digitale et burnout
transformation digitale et burnouttransformation digitale et burnout
transformation digitale et burnout
 
transformation digitale et burnout
transformation digitale et burnouttransformation digitale et burnout
transformation digitale et burnout
 
Cloud Computing Basics III
Cloud Computing Basics IIICloud Computing Basics III
Cloud Computing Basics III
 
Cloud Computing Basics II
Cloud Computing Basics IICloud Computing Basics II
Cloud Computing Basics II
 
IIS for Developers
IIS for DevelopersIIS for Developers
IIS for Developers
 
Cloud Computing Basics I
Cloud Computing Basics ICloud Computing Basics I
Cloud Computing Basics I
 
IT Professional Development - HDI Keynote - Eric Vanderburg
IT Professional Development - HDI Keynote - Eric VanderburgIT Professional Development - HDI Keynote - Eric Vanderburg
IT Professional Development - HDI Keynote - Eric Vanderburg
 
Frases biblicas escritas em imagens
Frases biblicas escritas em imagensFrases biblicas escritas em imagens
Frases biblicas escritas em imagens
 
Recycling: Weerstand overwinnen?
Recycling: Weerstand overwinnen?Recycling: Weerstand overwinnen?
Recycling: Weerstand overwinnen?
 
Kubernetes @ Nanit by Chen Fisher
Kubernetes @ Nanit by Chen FisherKubernetes @ Nanit by Chen Fisher
Kubernetes @ Nanit by Chen Fisher
 
Quality Software Development LifeCycle
Quality Software Development LifeCycleQuality Software Development LifeCycle
Quality Software Development LifeCycle
 
Si pi, yenny farlina yoris, hapzi ali, sistem informasi organisasi dan strate...
Si pi, yenny farlina yoris, hapzi ali, sistem informasi organisasi dan strate...Si pi, yenny farlina yoris, hapzi ali, sistem informasi organisasi dan strate...
Si pi, yenny farlina yoris, hapzi ali, sistem informasi organisasi dan strate...
 

Similar to digital strategy and information security

Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxinfosec train
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del cisoCSA Argentina
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptxrabeetkashif
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetBVU
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfCIO Look Magazine
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.Merry D'souza
 

Similar to digital strategy and information security (20)

IAM
IAMIAM
IAM
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.
 

More from Prof. Jacques Folon (Ph.D)

Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTProf. Jacques Folon (Ph.D)
 

More from Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 

Recently uploaded

Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfTamralipta Mahavidyalaya
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfPo-Chuan Chen
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 

Recently uploaded (20)

Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDF
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 

digital strategy and information security