SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
internet security
Past, present and future
Tamaghna Basu
tamaghna.basu@gmail.com
www.tbasu.com
Weekendsecurity.org
Disclaimer!
 The content of this presentation and techniques showed
here are for educational purpose only The organizers and
presenters do not encourage the attendees to use this
knowledge learned here for any malicious and illegal
purpose.
 If the attendees use this knowledge for any kind of real
hacking or illegal activity which violates the law, then we,
the organizers and the presenters will not be responsible for
that or any further consequences.
http://www.slideshare.net/AnkamKarthik/zion-se
http://www.slideshare.net/AnkamKarthik/zion-se
 Confidentiality- data security
 Integrity- digital signature and audit trails
 Availability- load balancing, throttling
CIA Triad
Integrity
You are being watched - CCTV
•Weak or no authentication on
CCTVs
•Easily accessible
CCTV
How ?
• IP addresses and the links of the
CCTVs’ pages are found in
Google search results.
• Even CCTVs inside homes
could be visible.
CCTV
Web Cams &Video Chat
Clickjacking -
 A new threat to all browsers (IE, Firefox,
Safari, Opera, Chrome etc) except non-
interactive browsers like Lynx.
 Hijacking your click. Clicking on something
hidden to the users.
 Enable webcam, microphone.
 Get your credentials.
 Mostly a flash and iframe based vulnerability.
 Discussed in OWASP - 2008
Why Hacking?
 Hacking for fun & profit
 Capture The Flag
 0’day
 Underground economy
 Bug Bounty
Types of hackers
BlackHat
•Malicious, destructive
WhiteHat
•Security professionals
ScriptKiddie
•Sometimes referred to as n00bz
????
Hacktivism
Anonymous
Wiki Leaks
CyberWar
India-Pakistan
India-China
Pivoting
What do they want?
Credentials
PII information
PCI Data
Intellectual Property
OSINT
Why heart bleed?
 TLS HearBeat Extension.
The vulnerability lies in the implementation of TLS
Heartbeat extension. There is common necessity
in an established ssl session to maintain the
connection for a longer time. The HeartBeat
protocol extension is added to TLS for this reason.
The HTTP keep-alive feature does the same but HB
protocol allows a client to perform this action in
much higher rate.
The client can send a Heart-Beat request message
and the server has to respond back with a
HearBeat response .
Why heart bleed?
 buffer = OPENSSL_malloc(1 + 2 + payload +
padding);
SOURCE :
https://github.com/openssl/openssl/commit/96db9023b881d7cd9f3
79b0c154650d6c108e9a3#diff-2
• We can leak 64 kb of memory and that
could easily have usernames/password,
private keys etc.
• Constant HB request could be made to
the server leaking (random memory)
any amount of data from the server .
Vulnerable versions
Fix
• The fix to this bug was to simply bound
check the payload + padding length to
not exceed 16 bytes .
What’s happening in the wild?
What’s happening in the wild?
Chromebleed
chromebleed
And My contribution as well 
Is that all?
Not really…
http://filippo.io/Heartbleed/
Summary
Port Status
21 TLS Error
22 Connection Refused
25 TLS Error
53 Connection Refused
80 Large Record Received
443 Certificate error
Summary
Port Status
21 TLS Error
22 Connection
Refused
25 TLS Error
53 Connection
Refused
80 Large
Record
Received
443 Certificate
error
Port Status
21 TLS Error
22 Connection
Refused
25 TLS Error
53 Connection
Refused
80 Large
Record
Received
443 Certificate
error
42
Thank you
 tamaghna.basu@gmail.com
 twitter.com/titanlambda
 linkedin.com/in/tamaghnabasu

Contenu connexe

Similaire à Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu

Security Theatre - PHP UK Conference
Security Theatre - PHP UK ConferenceSecurity Theatre - PHP UK Conference
Security Theatre - PHP UK Conferencexsist10
 
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...JPCERT Coordination Center
 
Encryption with DANE, NZNOG 2017
Encryption with DANE, NZNOG 2017Encryption with DANE, NZNOG 2017
Encryption with DANE, NZNOG 2017APNIC
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxJezer Arces
 
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...Start Pad
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam NotesVijayanand Yadla
 
Security Theatre (PHP Leuven)
Security Theatre (PHP Leuven)Security Theatre (PHP Leuven)
Security Theatre (PHP Leuven)xsist10
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsCyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsJim Kaplan CIA CFE
 
Secure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet InfrastructureSecure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet Infrastructurewebhostingguy
 
Security theatre (Scotland php)
Security theatre (Scotland php)Security theatre (Scotland php)
Security theatre (Scotland php)xsist10
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionCASCouncil
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Tim Wright
 
Security Theatre - Confoo
Security Theatre - ConfooSecurity Theatre - Confoo
Security Theatre - Confooxsist10
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ONOWASP EEE
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...centralohioissa
 
Hold My Beer, I'm going to do DevOps with DICOM, HIPAA, and Hospitals, or at ...
Hold My Beer, I'm going to do DevOps with DICOM, HIPAA, and Hospitals, or at ...Hold My Beer, I'm going to do DevOps with DICOM, HIPAA, and Hospitals, or at ...
Hold My Beer, I'm going to do DevOps with DICOM, HIPAA, and Hospitals, or at ...DevOpsDays Tel Aviv
 

Similaire à Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu (20)

Security Theatre - PHP UK Conference
Security Theatre - PHP UK ConferenceSecurity Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
 
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
 
Encryption with DANE, NZNOG 2017
Encryption with DANE, NZNOG 2017Encryption with DANE, NZNOG 2017
Encryption with DANE, NZNOG 2017
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
 
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
Security Theatre (PHP Leuven)
Security Theatre (PHP Leuven)Security Theatre (PHP Leuven)
Security Theatre (PHP Leuven)
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsCyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense Mechanisms
 
Secure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet InfrastructureSecure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet Infrastructure
 
Security theatre (Scotland php)
Security theatre (Scotland php)Security theatre (Scotland php)
Security theatre (Scotland php)
 
Tech t18
Tech t18Tech t18
Tech t18
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)
 
Security Theatre - Confoo
Security Theatre - ConfooSecurity Theatre - Confoo
Security Theatre - Confoo
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
 
Hold My Beer, I'm going to do DevOps with DICOM, HIPAA, and Hospitals, or at ...
Hold My Beer, I'm going to do DevOps with DICOM, HIPAA, and Hospitals, or at ...Hold My Beer, I'm going to do DevOps with DICOM, HIPAA, and Hospitals, or at ...
Hold My Beer, I'm going to do DevOps with DICOM, HIPAA, and Hospitals, or at ...
 
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)
 

Plus de Lounge47

IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...Lounge47
 
FITTING PRODUCT TO MARKET – DO'S & DONT'S - Venugopal Iyengar, COO, Apalya Te...
FITTING PRODUCT TO MARKET – DO'S & DONT'S - Venugopal Iyengar, COO, Apalya Te...FITTING PRODUCT TO MARKET – DO'S & DONT'S - Venugopal Iyengar, COO, Apalya Te...
FITTING PRODUCT TO MARKET – DO'S & DONT'S - Venugopal Iyengar, COO, Apalya Te...Lounge47
 
BIG DATA: LEVERAGING COMPETITIVE INTELLIGENCE IN RETAIL - Mandar Mutalikdesai...
BIG DATA: LEVERAGING COMPETITIVE INTELLIGENCE IN RETAIL - Mandar Mutalikdesai...BIG DATA: LEVERAGING COMPETITIVE INTELLIGENCE IN RETAIL - Mandar Mutalikdesai...
BIG DATA: LEVERAGING COMPETITIVE INTELLIGENCE IN RETAIL - Mandar Mutalikdesai...Lounge47
 
Consumer Internet Insights - Jeyandran Venugopal
Consumer Internet Insights  - Jeyandran VenugopalConsumer Internet Insights  - Jeyandran Venugopal
Consumer Internet Insights - Jeyandran VenugopalLounge47
 
Creating creative content for social media - Balraj KN, Cartoonist, Illustrat...
Creating creative content for social media - Balraj KN, Cartoonist, Illustrat...Creating creative content for social media - Balraj KN, Cartoonist, Illustrat...
Creating creative content for social media - Balraj KN, Cartoonist, Illustrat...Lounge47
 
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Lounge47
 
K-12 EDUCATION - CHALLENGES & OPPORTUNITIES FOR STARTUPS - Balu Pandian, Chai...
K-12 EDUCATION - CHALLENGES & OPPORTUNITIES FOR STARTUPS - Balu Pandian, Chai...K-12 EDUCATION - CHALLENGES & OPPORTUNITIES FOR STARTUPS - Balu Pandian, Chai...
K-12 EDUCATION - CHALLENGES & OPPORTUNITIES FOR STARTUPS - Balu Pandian, Chai...Lounge47
 
I am starting up - How do I start coding? - Gautham Pai, an "Entrepreneur, Fo...
I am starting up - How do I start coding? - Gautham Pai, an "Entrepreneur, Fo...I am starting up - How do I start coding? - Gautham Pai, an "Entrepreneur, Fo...
I am starting up - How do I start coding? - Gautham Pai, an "Entrepreneur, Fo...Lounge47
 
Online Advertising - Monetization Models Explained - Jayant Nandan
Online Advertising - Monetization Models Explained - Jayant NandanOnline Advertising - Monetization Models Explained - Jayant Nandan
Online Advertising - Monetization Models Explained - Jayant NandanLounge47
 
Bare Essentials - A practical guide to building a lean Startup - Karthik Rama...
Bare Essentials - A practical guide to building a lean Startup - Karthik Rama...Bare Essentials - A practical guide to building a lean Startup - Karthik Rama...
Bare Essentials - A practical guide to building a lean Startup - Karthik Rama...Lounge47
 
Do's & dont's of funding - Kiran Bettadapur Kiran Bettadapur - entrepreneur, ...
Do's & dont's of funding - Kiran Bettadapur Kiran Bettadapur - entrepreneur, ...Do's & dont's of funding - Kiran Bettadapur Kiran Bettadapur - entrepreneur, ...
Do's & dont's of funding - Kiran Bettadapur Kiran Bettadapur - entrepreneur, ...Lounge47
 
Protecting intellectual property (ip) at startups - Ravi Vaikuntachar, Manage...
Protecting intellectual property (ip) at startups - Ravi Vaikuntachar, Manage...Protecting intellectual property (ip) at startups - Ravi Vaikuntachar, Manage...
Protecting intellectual property (ip) at startups - Ravi Vaikuntachar, Manage...Lounge47
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...Lounge47
 
Driving Social Change Through Entrepreneurship - Ashok Panikkar, Director Met...
Driving Social Change Through Entrepreneurship - Ashok Panikkar, Director Met...Driving Social Change Through Entrepreneurship - Ashok Panikkar, Director Met...
Driving Social Change Through Entrepreneurship - Ashok Panikkar, Director Met...Lounge47
 
Financial Sector - Opportunities for Disruption
Financial Sector - Opportunities for DisruptionFinancial Sector - Opportunities for Disruption
Financial Sector - Opportunities for DisruptionLounge47
 
Learnings from Scaling (Businesses), Gunaseelan Radhakrishnan, Entrepreneur
Learnings from Scaling (Businesses), Gunaseelan Radhakrishnan, EntrepreneurLearnings from Scaling (Businesses), Gunaseelan Radhakrishnan, Entrepreneur
Learnings from Scaling (Businesses), Gunaseelan Radhakrishnan, EntrepreneurLounge47
 
Skills & Myths of an Innovative Entrepreneur
Skills & Myths of an Innovative EntrepreneurSkills & Myths of an Innovative Entrepreneur
Skills & Myths of an Innovative EntrepreneurLounge47
 
Angel Investment Insights
Angel Investment InsightsAngel Investment Insights
Angel Investment InsightsLounge47
 
SUCCESSFUL APPS - THE HYGIENE FACTORS: SUDHIR GOEL
SUCCESSFUL APPS - THE HYGIENE FACTORS: SUDHIR GOEL    SUCCESSFUL APPS - THE HYGIENE FACTORS: SUDHIR GOEL
SUCCESSFUL APPS - THE HYGIENE FACTORS: SUDHIR GOEL Lounge47
 
CHAIPOINT.COM -THE POWER OF EXECUTION -TEJUS CHANDRA, CFO, MOUNTAIN TRAIL FOODS
CHAIPOINT.COM -THE POWER OF EXECUTION -TEJUS CHANDRA, CFO, MOUNTAIN TRAIL FOODSCHAIPOINT.COM -THE POWER OF EXECUTION -TEJUS CHANDRA, CFO, MOUNTAIN TRAIL FOODS
CHAIPOINT.COM -THE POWER OF EXECUTION -TEJUS CHANDRA, CFO, MOUNTAIN TRAIL FOODSLounge47
 

Plus de Lounge47 (20)

IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
 
FITTING PRODUCT TO MARKET – DO'S & DONT'S - Venugopal Iyengar, COO, Apalya Te...
FITTING PRODUCT TO MARKET – DO'S & DONT'S - Venugopal Iyengar, COO, Apalya Te...FITTING PRODUCT TO MARKET – DO'S & DONT'S - Venugopal Iyengar, COO, Apalya Te...
FITTING PRODUCT TO MARKET – DO'S & DONT'S - Venugopal Iyengar, COO, Apalya Te...
 
BIG DATA: LEVERAGING COMPETITIVE INTELLIGENCE IN RETAIL - Mandar Mutalikdesai...
BIG DATA: LEVERAGING COMPETITIVE INTELLIGENCE IN RETAIL - Mandar Mutalikdesai...BIG DATA: LEVERAGING COMPETITIVE INTELLIGENCE IN RETAIL - Mandar Mutalikdesai...
BIG DATA: LEVERAGING COMPETITIVE INTELLIGENCE IN RETAIL - Mandar Mutalikdesai...
 
Consumer Internet Insights - Jeyandran Venugopal
Consumer Internet Insights  - Jeyandran VenugopalConsumer Internet Insights  - Jeyandran Venugopal
Consumer Internet Insights - Jeyandran Venugopal
 
Creating creative content for social media - Balraj KN, Cartoonist, Illustrat...
Creating creative content for social media - Balraj KN, Cartoonist, Illustrat...Creating creative content for social media - Balraj KN, Cartoonist, Illustrat...
Creating creative content for social media - Balraj KN, Cartoonist, Illustrat...
 
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
 
K-12 EDUCATION - CHALLENGES & OPPORTUNITIES FOR STARTUPS - Balu Pandian, Chai...
K-12 EDUCATION - CHALLENGES & OPPORTUNITIES FOR STARTUPS - Balu Pandian, Chai...K-12 EDUCATION - CHALLENGES & OPPORTUNITIES FOR STARTUPS - Balu Pandian, Chai...
K-12 EDUCATION - CHALLENGES & OPPORTUNITIES FOR STARTUPS - Balu Pandian, Chai...
 
I am starting up - How do I start coding? - Gautham Pai, an "Entrepreneur, Fo...
I am starting up - How do I start coding? - Gautham Pai, an "Entrepreneur, Fo...I am starting up - How do I start coding? - Gautham Pai, an "Entrepreneur, Fo...
I am starting up - How do I start coding? - Gautham Pai, an "Entrepreneur, Fo...
 
Online Advertising - Monetization Models Explained - Jayant Nandan
Online Advertising - Monetization Models Explained - Jayant NandanOnline Advertising - Monetization Models Explained - Jayant Nandan
Online Advertising - Monetization Models Explained - Jayant Nandan
 
Bare Essentials - A practical guide to building a lean Startup - Karthik Rama...
Bare Essentials - A practical guide to building a lean Startup - Karthik Rama...Bare Essentials - A practical guide to building a lean Startup - Karthik Rama...
Bare Essentials - A practical guide to building a lean Startup - Karthik Rama...
 
Do's & dont's of funding - Kiran Bettadapur Kiran Bettadapur - entrepreneur, ...
Do's & dont's of funding - Kiran Bettadapur Kiran Bettadapur - entrepreneur, ...Do's & dont's of funding - Kiran Bettadapur Kiran Bettadapur - entrepreneur, ...
Do's & dont's of funding - Kiran Bettadapur Kiran Bettadapur - entrepreneur, ...
 
Protecting intellectual property (ip) at startups - Ravi Vaikuntachar, Manage...
Protecting intellectual property (ip) at startups - Ravi Vaikuntachar, Manage...Protecting intellectual property (ip) at startups - Ravi Vaikuntachar, Manage...
Protecting intellectual property (ip) at startups - Ravi Vaikuntachar, Manage...
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
 
Driving Social Change Through Entrepreneurship - Ashok Panikkar, Director Met...
Driving Social Change Through Entrepreneurship - Ashok Panikkar, Director Met...Driving Social Change Through Entrepreneurship - Ashok Panikkar, Director Met...
Driving Social Change Through Entrepreneurship - Ashok Panikkar, Director Met...
 
Financial Sector - Opportunities for Disruption
Financial Sector - Opportunities for DisruptionFinancial Sector - Opportunities for Disruption
Financial Sector - Opportunities for Disruption
 
Learnings from Scaling (Businesses), Gunaseelan Radhakrishnan, Entrepreneur
Learnings from Scaling (Businesses), Gunaseelan Radhakrishnan, EntrepreneurLearnings from Scaling (Businesses), Gunaseelan Radhakrishnan, Entrepreneur
Learnings from Scaling (Businesses), Gunaseelan Radhakrishnan, Entrepreneur
 
Skills & Myths of an Innovative Entrepreneur
Skills & Myths of an Innovative EntrepreneurSkills & Myths of an Innovative Entrepreneur
Skills & Myths of an Innovative Entrepreneur
 
Angel Investment Insights
Angel Investment InsightsAngel Investment Insights
Angel Investment Insights
 
SUCCESSFUL APPS - THE HYGIENE FACTORS: SUDHIR GOEL
SUCCESSFUL APPS - THE HYGIENE FACTORS: SUDHIR GOEL    SUCCESSFUL APPS - THE HYGIENE FACTORS: SUDHIR GOEL
SUCCESSFUL APPS - THE HYGIENE FACTORS: SUDHIR GOEL
 
CHAIPOINT.COM -THE POWER OF EXECUTION -TEJUS CHANDRA, CFO, MOUNTAIN TRAIL FOODS
CHAIPOINT.COM -THE POWER OF EXECUTION -TEJUS CHANDRA, CFO, MOUNTAIN TRAIL FOODSCHAIPOINT.COM -THE POWER OF EXECUTION -TEJUS CHANDRA, CFO, MOUNTAIN TRAIL FOODS
CHAIPOINT.COM -THE POWER OF EXECUTION -TEJUS CHANDRA, CFO, MOUNTAIN TRAIL FOODS
 

Dernier

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu