SlideShare une entreprise Scribd logo
1  sur  15
The 2014 IEEE
Workshop on Web 2.0
Security and Privacy
May 18th, 2014
• Statistics
• Post-Workshop Impact
• Best Paper Announcement
• KeyNote Introduction
Workshop Statistics
Authors
Belgium
5%
China
4%
Germany
8%
India
4%
Ireland
1%
Israel
9%
Mexico
1%
Pakistan
2%
Saudi Arabia
1%
Singapore
4%
United
Kingdom
3%
United States
58%
Submissions
Austria
3%
Belgium
3%
China
3%
Germany
8%
India
6%
Ireland
3%
Israel
6%Mexico
3%
Pakistan
3%
Saudi
Arabia
3%
Singapore
3%
United
Kingdom
3%
United States
53%
Program Committee
Brazil
3%
Germany
5%
India
3%
Italy
8%
Jamaica
5%
Morocco
3%Poland
3%
Russian
Federation
3%
United
Kingdom
3%
United States
64%
Program Committee
Female
34%
Male
66%
Accepted Papers
Germany
20%
Israel
10%
Singapore
10%
United States
60%
General Statistics
Accepted
29%
Rejected
71%
Impact
Post-Workshop
Publication Venues
IEEE Internet
Computing
18%
IEEE
Software
12%
IEEE IT
Professional
26%
No Venue
44%
Best Paper
I Know Where You’ve Been: Geo-Inference
Attacks via the Browser Cache
Many websites customize their services according to different geo-
locations of users, to provide more relevant content and better
responsiveness, including Google, Craigslist, etc. Recently, mobile devices
further allow web applications to directly read users’ geo-location
information from GPS sensors. However, if such websites leave location-
sensitive content in the browser cache, other sites can sniff users’ geo-
locations by utilizing timing side-channels. In this paper, we demonstrate
that such geo-location leakage channels are widely open in popular web
applications today, including 62% of Alexa Top 100 websites. With geo-
inference attacks that measure the timing of browser cache queries, we can
locate users’ countries, cities and neighborhoods in our case studies. We
also discuss whether existing defenses can effectively prevent such attacks
and additional support required for a better defense deployment.
Yaoqi Jia, Xinshu Dong, Zhenkai Liang, Prateek Saxena.
Keynote
Michelle Finneran Dennedy
Vice President & Chief Privacy Officer, McAfee
Michelle currently serves as Chief Privacy Officer to McAfee, an Intel
Company. She is responsible to creating a privacy practice that is focused on
quality and excellence in McAfee’s policies, products, procedures and
governance efforts. Her team is a staunch supporter of McAfee’s outreach
efforts to educate and protect children, families and communities in the
Digital Age.
Before coming to McAfee, Michelle founded The iDennedy Project, a
consulting and advisory company specializing in privacy and security
sensitive organizations. Michelle is also a founder and editor in chief of a
new media site—TheIdentityProject.com—that was started as an advocacy
and education site, currently focused on the growing crime of Child ID theft.
Michelle was the Vice President for Security & Privacy Solutions for the
Oracle Corporation. Her team worked closely with customers to enable them
to proceed with the confidence that information is protected and accelerated
as an asset.
Before the Oracle acquisition of Sun, Michelle was Chief Data Governance
Officer within the Cloud Computing division at Sun Microsystems, Inc.
Michelle worked closely with Sun's business, technical and legal teams to
create to the best data governance policies and processes possible for cloud
computing to build trust for cloud environments through vendor
transparency.
Michelle also served as Sun’s Chief Privacy Officer where she was
responsible for the development and implementation of Sun's data privacy
policies and practices, working across Sun's business groups to drive the
company's continued data privacy excellence.
Michelle has a JD from Fordham University School of Law and a BS degree
with university honors from The Ohio State University. In 2009, she was
awarded the Goodwin Procter-IAPP Vanguard award for lifetime
achievement and the EWF – CSO Magazine Woman of Influence award for
work in the privacy and security fields. In 2012, she was honored by the
National Diversity Council as one of California’s Most Powerful and
Influential Women.
Michelle is a Coauthor, The Privacy Engineer's Manifesto: Getting from
Policy to Code to QA to Value, 2014, Apress Media."

Contenu connexe

Tendances

Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignored
richard_turner
 

Tendances (9)

[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignored
 
Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?
 
Security in the New World of Content and Documents
Security in the New World of Content and DocumentsSecurity in the New World of Content and Documents
Security in the New World of Content and Documents
 
David's Law
David's Law David's Law
David's Law
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 
CSS 2018 Trivia
CSS 2018 TriviaCSS 2018 Trivia
CSS 2018 Trivia
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 

En vedette

Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info TekstversieWat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
Digital creator Nederland
 
Tierra
TierraTierra
Tierra
elena
 
Project 2000
Project 2000Project 2000
Project 2000
lexsing
 
Food And Thought
Food And ThoughtFood And Thought
Food And Thought
thandastuff
 
Ben's two year presentation
Ben's two year presentationBen's two year presentation
Ben's two year presentation
judygio
 
Weinman danny macbeth
Weinman danny macbethWeinman danny macbeth
Weinman danny macbeth
celliot
 
Project 2000
Project 2000Project 2000
Project 2000
lexsing
 
Tobias N Tripp--Juggling
Tobias N Tripp--JugglingTobias N Tripp--Juggling
Tobias N Tripp--Juggling
kavitamenon1
 

En vedette (20)

Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info TekstversieWat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
 
Course 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateCourse 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM Template
 
Presentatie het nieuwe wonen ppt
Presentatie het nieuwe wonen pptPresentatie het nieuwe wonen ppt
Presentatie het nieuwe wonen ppt
 
Tierra
TierraTierra
Tierra
 
Jw day 9 (unit 3)
Jw day 9 (unit 3)Jw day 9 (unit 3)
Jw day 9 (unit 3)
 
Project 2000
Project 2000Project 2000
Project 2000
 
Food And Thought
Food And ThoughtFood And Thought
Food And Thought
 
Ben's two year presentation
Ben's two year presentationBen's two year presentation
Ben's two year presentation
 
Weinman danny macbeth
Weinman danny macbethWeinman danny macbeth
Weinman danny macbeth
 
When communication innovations lead to social exclusion
When communication innovations lead to social exclusionWhen communication innovations lead to social exclusion
When communication innovations lead to social exclusion
 
VALS WP7 – Dissemina1on Status at Bolton meeting
VALS WP7 – Dissemina1on Status at Bolton meetingVALS WP7 – Dissemina1on Status at Bolton meeting
VALS WP7 – Dissemina1on Status at Bolton meeting
 
Library Instruction Session Outline Example
Library Instruction Session Outline ExampleLibrary Instruction Session Outline Example
Library Instruction Session Outline Example
 
Linked in for career development MBA Talk (08.12.11)
Linked in for career development MBA Talk (08.12.11)Linked in for career development MBA Talk (08.12.11)
Linked in for career development MBA Talk (08.12.11)
 
Project 2000
Project 2000Project 2000
Project 2000
 
The Power of SharePoint Mobile Web Solutions
The Power of SharePoint Mobile Web SolutionsThe Power of SharePoint Mobile Web Solutions
The Power of SharePoint Mobile Web Solutions
 
IFS World 2010/1
IFS World 2010/1IFS World 2010/1
IFS World 2010/1
 
Compensation Plan J
Compensation Plan JCompensation Plan J
Compensation Plan J
 
Tobias N Tripp--Juggling
Tobias N Tripp--JugglingTobias N Tripp--Juggling
Tobias N Tripp--Juggling
 
Social media marketing
Social media marketingSocial media marketing
Social media marketing
 
Melhore o seu linkedin!
Melhore o seu linkedin!Melhore o seu linkedin!
Melhore o seu linkedin!
 

Similaire à Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop

Leadershipchallenge
LeadershipchallengeLeadershipchallenge
Leadershipchallenge
Deloitte
 
Hidden-Ynion_Internal_Information_Security_Management
Hidden-Ynion_Internal_Information_Security_ManagementHidden-Ynion_Internal_Information_Security_Management
Hidden-Ynion_Internal_Information_Security_Management
Hiddenynion
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
Edge AI and Vision Alliance
 

Similaire à Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop (20)

The New Framework for Modern Data Privacy and Security
The New Framework for Modern Data Privacy and SecurityThe New Framework for Modern Data Privacy and Security
The New Framework for Modern Data Privacy and Security
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Leadershipchallenge
LeadershipchallengeLeadershipchallenge
Leadershipchallenge
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyers
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
 
Hidden-Ynion_Internal_Information_Security_Management
Hidden-Ynion_Internal_Information_Security_ManagementHidden-Ynion_Internal_Information_Security_Management
Hidden-Ynion_Internal_Information_Security_Management
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
How to Enhance Your Career with AI
How to Enhance Your Career with AIHow to Enhance Your Career with AI
How to Enhance Your Career with AI
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
 
Big Data: Opportunity & Challenges
Big Data: Opportunity & ChallengesBig Data: Opportunity & Challenges
Big Data: Opportunity & Challenges
 
Big Data: Opportunity & Challenges
Big Data: Opportunity & ChallengesBig Data: Opportunity & Challenges
Big Data: Opportunity & Challenges
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
 
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
Stop.+think.+connect+michael+kaiser
Stop.+think.+connect+michael+kaiserStop.+think.+connect+michael+kaiser
Stop.+think.+connect+michael+kaiser
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 

Plus de Tyrone Grandison

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Tyrone Grandison
 

Plus de Tyrone Grandison (20)

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and Access
 
COVID and the Ederly
COVID and the EderlyCOVID and the Ederly
COVID and the Ederly
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater Good
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab Launch
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic Plan
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and Focus
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of Innovation
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHME
 
The Power Of Open
The Power Of OpenThe Power Of Open
The Power Of Open
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data Service
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social Good
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT Modernization
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of America
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public Collaborations
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With Purpose
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in Healthcare
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop