SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Gratitude Ignites, Growth Fortifies:
Building an unbreakable Cyber Security Village
“Life is either a daring adventure or nothing at all” ~ Helen Keller
W
H
O
?
Trupti Shiralkar
India
WORK
EDUCATION
MS in Security Informatics
Johns Hopkins University
EXPERTISE
Applied
Crypto
App Sec
Secure SDLC
Privacy Engg
INTERESTS
Cognitive Psychology
Hiking
Meditation
T
r
a
v
e
l
l
i
n
g
P
a
i
n
t
i
n
g
Product security leader
Founder, TrueNil
About Me
Five Pillars
Gratitude
Security
Village
Inspiration
Collective
Growth
~
Community
Mindfulness
Transform your security career
66 Speakers 4 Keynotes 4 Workshops 1000+ Attendees
Day of Shecurity 2024 Recap
Artificial
Intelligence
Privacy
Governance, Risk &
Compliance
EQ & Career
Day of Shecurity 2024 Trends
The Power of Gratitude
“Gratitude is a currency we can mint ourselves and
spend without fear of bankruptcy.”
~ Fred De Witt Van Amburgh
Community Support System
Security Dweebs
Motto - we rise together by lifting others
My Villages & Communities
Hedy Lamarr
Late Hollywood Actress & Inventor of
Frequency hopping
Carla Harris
Powerful African American banker
from WS, Author, Motivational
Speaker, Singer and Songwriter
Deidre Diamond
Sales Executive turned a dynamic
Entrepreneur, Founder & CEO of
CyberSN and Secure diversity
Women who Keep Inspiring Me
Empowerment Through Collective Growth
“Rising tide lifts all boats” ~ JFK
My Path to Collective Growth
Five Pillars
Gratitude
Security
Village
Inspiration
Collective
Growth
~
Community
Mindfulness
Let’s Connect

Más contenido relacionado

Similar a Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security Village

Brand Identity Research: H&M, Starbucks, and NYT
Brand Identity Research: H&M, Starbucks, and NYTBrand Identity Research: H&M, Starbucks, and NYT
Brand Identity Research: H&M, Starbucks, and NYTRebecca Horton
 
Nfs short version 10 april 2008
Nfs short version 10 april 2008Nfs short version 10 april 2008
Nfs short version 10 april 2008Coinoor
 
Creative Superpowers (Aug18)
Creative Superpowers (Aug18)Creative Superpowers (Aug18)
Creative Superpowers (Aug18)Utopia
 
Becoming a Conscious Host: Catalyzing Change in Your Community
Becoming a  Conscious Host: Catalyzing Change in Your CommunityBecoming a  Conscious Host: Catalyzing Change in Your Community
Becoming a Conscious Host: Catalyzing Change in Your CommunityAnna Pollock
 
Communicating Vision and Value
Communicating Vision and ValueCommunicating Vision and Value
Communicating Vision and Value4Good.org
 
Social Capital - How To Create & Use It
Social Capital - How To Create & Use ItSocial Capital - How To Create & Use It
Social Capital - How To Create & Use ItGian Fiero
 
Reputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media RevisedReputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media RevisedJames Kane
 
Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5Jim Cathcart
 
JUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine HamptonsJUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine HamptonsChristopher Dwight London
 
Re-branding Islam through Digital Marketing
Re-branding Islam through Digital MarketingRe-branding Islam through Digital Marketing
Re-branding Islam through Digital MarketingHappy Marketer
 
All hands on deck for siemens medical solutions western zone leadership retreat
All hands on deck for siemens medical solutions western zone leadership retreatAll hands on deck for siemens medical solutions western zone leadership retreat
All hands on deck for siemens medical solutions western zone leadership retreatJoe Tye
 
Hacking CT Lessons Learned H4Dip Stanford 2016
Hacking CT Lessons Learned H4Dip Stanford 2016Hacking CT Lessons Learned H4Dip Stanford 2016
Hacking CT Lessons Learned H4Dip Stanford 2016Stanford University
 
Hacking CT Lessons Learned Final
Hacking CT Lessons Learned FinalHacking CT Lessons Learned Final
Hacking CT Lessons Learned FinalH4Diadmin
 
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...Tiffany Sunday
 
Sponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDCSponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDCSherry Snipes
 
DANDI AWARDS & EXECUTIVE FORUM 2015
DANDI AWARDS & EXECUTIVE FORUM 2015DANDI AWARDS & EXECUTIVE FORUM 2015
DANDI AWARDS & EXECUTIVE FORUM 2015Sherry Snipes
 
Human side of The Project Economy - PMI Ghana Oct 2020
Human side of The Project Economy - PMI Ghana Oct 2020Human side of The Project Economy - PMI Ghana Oct 2020
Human side of The Project Economy - PMI Ghana Oct 2020Thomas Walenta, PMI Fellow
 

Similar a Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security Village (20)

Brand Identity Research: H&M, Starbucks, and NYT
Brand Identity Research: H&M, Starbucks, and NYTBrand Identity Research: H&M, Starbucks, and NYT
Brand Identity Research: H&M, Starbucks, and NYT
 
Nfs short version 10 april 2008
Nfs short version 10 april 2008Nfs short version 10 april 2008
Nfs short version 10 april 2008
 
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdfThe 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
 
Creative Superpowers (Aug18)
Creative Superpowers (Aug18)Creative Superpowers (Aug18)
Creative Superpowers (Aug18)
 
Becoming a Conscious Host: Catalyzing Change in Your Community
Becoming a  Conscious Host: Catalyzing Change in Your CommunityBecoming a  Conscious Host: Catalyzing Change in Your Community
Becoming a Conscious Host: Catalyzing Change in Your Community
 
Communicating Vision and Value
Communicating Vision and ValueCommunicating Vision and Value
Communicating Vision and Value
 
Social Capital - How To Create & Use It
Social Capital - How To Create & Use ItSocial Capital - How To Create & Use It
Social Capital - How To Create & Use It
 
Reputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media RevisedReputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media Revised
 
Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5
 
JUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine HamptonsJUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine Hamptons
 
Re-branding Islam through Digital Marketing
Re-branding Islam through Digital MarketingRe-branding Islam through Digital Marketing
Re-branding Islam through Digital Marketing
 
All hands on deck for siemens medical solutions western zone leadership retreat
All hands on deck for siemens medical solutions western zone leadership retreatAll hands on deck for siemens medical solutions western zone leadership retreat
All hands on deck for siemens medical solutions western zone leadership retreat
 
Hacking CT Lessons Learned H4Dip Stanford 2016
Hacking CT Lessons Learned H4Dip Stanford 2016Hacking CT Lessons Learned H4Dip Stanford 2016
Hacking CT Lessons Learned H4Dip Stanford 2016
 
Hacking CT Lessons Learned Final
Hacking CT Lessons Learned FinalHacking CT Lessons Learned Final
Hacking CT Lessons Learned Final
 
Myths of Innovation
Myths of InnovationMyths of Innovation
Myths of Innovation
 
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
 
Sponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDCSponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDC
 
DANDI AWARDS & EXECUTIVE FORUM 2015
DANDI AWARDS & EXECUTIVE FORUM 2015DANDI AWARDS & EXECUTIVE FORUM 2015
DANDI AWARDS & EXECUTIVE FORUM 2015
 
Human side of The Project Economy - PMI Ghana Oct 2020
Human side of The Project Economy - PMI Ghana Oct 2020Human side of The Project Economy - PMI Ghana Oct 2020
Human side of The Project Economy - PMI Ghana Oct 2020
 
Dealing with difficult dialogue
Dealing with difficult dialogueDealing with difficult dialogue
Dealing with difficult dialogue
 

Más de Trupti Shiralkar, CISSP

Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecTrupti Shiralkar, CISSP
 
IKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxIKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxTrupti Shiralkar, CISSP
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTrupti Shiralkar, CISSP
 
Self-care, breathing exercises, meditation
Self-care, breathing exercises, meditationSelf-care, breathing exercises, meditation
Self-care, breathing exercises, meditationTrupti Shiralkar, CISSP
 
Zerotrusting serverless applications protecting microservices using secure d...
Zerotrusting serverless applications  protecting microservices using secure d...Zerotrusting serverless applications  protecting microservices using secure d...
Zerotrusting serverless applications protecting microservices using secure d...Trupti Shiralkar, CISSP
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Trupti Shiralkar, CISSP
 
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...Trupti Shiralkar, CISSP
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementationsTrupti Shiralkar, CISSP
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Trupti Shiralkar, CISSP
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Trupti Shiralkar, CISSP
 

Más de Trupti Shiralkar, CISSP (13)

Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
 
IKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxIKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptx
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
 
Self-care, breathing exercises, meditation
Self-care, breathing exercises, meditationSelf-care, breathing exercises, meditation
Self-care, breathing exercises, meditation
 
Cloud Security Trends.pdf
Cloud Security Trends.pdfCloud Security Trends.pdf
Cloud Security Trends.pdf
 
Zerotrusting serverless applications protecting microservices using secure d...
Zerotrusting serverless applications  protecting microservices using secure d...Zerotrusting serverless applications  protecting microservices using secure d...
Zerotrusting serverless applications protecting microservices using secure d...
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Secure coding-guidelines
Secure coding-guidelinesSecure coding-guidelines
Secure coding-guidelines
 
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
 
Purple team strategy_lascon_2016
Purple team strategy_lascon_2016Purple team strategy_lascon_2016
Purple team strategy_lascon_2016
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
 

Último

Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 

Último (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 

Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security Village