CINXE.COM

Mongoose H4D 2021 Lessons Learned | PPT

<!DOCTYPE html><html lang="en"><script id="gtm"> performance.mark('gtm.start'); (function (w, d, s, l, i) { w[l] = w[l] || []; w[l].push({ 'gtm.start': new Date().getTime(), event: 'gtm.js' }); var f = d.getElementsByTagName(s)[0], j = d.createElement(s), dl = l != 'dataLayer' ? '&l=' + l : ''; j.async = true; j.src = 'https://www.googletagmanager.com/gtm.js?id=' + i + dl; j.onload = function () { performance.mark('gtm.end'); performance.measure('gtm', 'gtm.start', 'gtm.end'); }; f.parentNode.insertBefore(j, f); })(window, document, 'script', 'dataLayer', 'GTM-M36RG8PT'); </script><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><link rel="shortcut icon" href="https://public.slidesharecdn.com/_next/static/media/favicon.7bc3d920.ico"/><script> window.eventsToSend = window.eventsToSend || [] window.eventsToSend.push({ name: "page_rendering", timestamp: new Date().toISOString(), value: JSON.stringify({ time: performance?.now() }) }) </script><script type="speculationrules">{"prerender":[{"where":{"and":[{"href_matches":"/slideshow/*"}]},"eagerness":"moderate"}]}</script><title>Mongoose H4D 2021 Lessons Learned | PPT</title><meta name="robots" content="index, follow"/><meta name="title" content="Mongoose H4D 2021 Lessons Learned"/><meta name="description" content="Mongoose H4D 2021 Lessons Learned - Download as a PDF or view online for free"/><link rel="canonical" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080"/><link rel="alternate" hrefLang="en" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080"/><link rel="alternate" hrefLang="x-default" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080"/><link rel="preconnect" href="https://a.pub.network/" crossorigin="anonymous"/><link rel="preconnect" href="https://b.pub.network/" crossorigin="anonymous"/><link rel="preconnect" href="https://c.pub.network/" crossorigin="anonymous"/><link rel="preconnect" href="https://d.pub.network/" crossorigin="anonymous"/><link rel="preconnect" href="https://c.amazon-adsystem.com" crossorigin="anonymous"/><link rel="preconnect" href="https://s.amazon-adsystem.com" crossorigin="anonymous"/><link rel="preconnect" href="https://secure.quantserve.com/" crossorigin="anonymous"/><link rel="preconnect" href="https://rules.quantcount.com/" crossorigin="anonymous"/><link rel="preconnect" href="https://pixel.quantserve.com/" crossorigin="anonymous"/><link rel="preconnect" href="https://btloader.com/" crossorigin="anonymous"/><link rel="preconnect" href="https://api.btloader.com/" crossorigin="anonymous"/><link rel="preconnect" href="https://confiant-integrations.global.ssl.fastly.net" crossorigin="anonymous"/><link rel="preload" href="https://a.pub.network/slideshare-net/pubfig.min.js" as="script"/><script> window.freestarReactCompontentLoaded = true; // Prevents Freestar from appending the script a second time; typo is theirs window.freestar = window.freestar || { queue: [] }; window.freestar.config = freestar.config || {}; window.freestar.config.disabledProducts = { googleInterstitial: false, }; window.eventsToSend = window.eventsToSend || []; window.freestar.queue.push(function () { window.eventsToSend.push({ name: "freestar_queue_start", timestamp: new Date().toISOString() }) }); </script><meta name="twitter:site" content="@SlideShare"/><meta name="twitter:card" content="player"/><meta name="twitter:title" content="Mongoose H4D 2021 Lessons Learned"/><meta name="twitter:description" content="Mongoose H4D 2021 Lessons Learned - Download as a PDF or view online for free"/><meta name="twitter:image" content="https://cdn.slidesharecdn.com/ss_thumbnails/mongooselessonslearned-210602053011-thumbnail.jpg?width=640&amp;height=640&amp;fit=bounds"/><meta name="twitter:image:alt" content="Mongoose H4D 2021 Lessons Learned"/><meta name="twitter:player" content="https://www.slideshare.net/slideshow/embed_code/key/jzREqHv0PyyUr8"/><meta name="twitter:player:width" content="597"/><meta name="twitter:player:height" content="486"/><meta name="twitter:app:name:googleplay" content="SlideShare Android"/><meta name="twitter:app:id:googleplay" content="net.slideshare.mobile"/><meta name="twitter:app:name:iphone" content="SlideShare iOS"/><meta name="twitter:app:id:iphone" content="917418728"/><meta name="twitter:app:url:iphone" content="slideshare-app://ss/165952101"/><meta name="twitter:app:name:ipad" content="SlideShare iOS"/><meta name="twitter:app:id:ipad" content="917418728"/><meta name="twitter:app:url:ipad" content="slideshare-app://ss/165952101"/><meta property="og:site_name" content="SlideShare"/><meta property="og:type" content="website"/><meta property="og:url" content="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080"/><meta property="og:title" content="Mongoose H4D 2021 Lessons Learned"/><meta property="og:description" content="Mongoose H4D 2021 Lessons Learned - Download as a PDF or view online for free"/><meta property="og:image" content="https://cdn.slidesharecdn.com/ss_thumbnails/mongooselessonslearned-210602053011-thumbnail.jpg?width=640&amp;height=640&amp;fit=bounds"/><meta property="og:image:alt" content="Mongoose H4D 2021 Lessons Learned"/><meta property="og:image:type" content="image/webp"/><meta property="og:image:width" content="640"/><meta property="og:image:height" content="360"/><script type="application/ld+json">{"@context":"http://schema.org","@type":"CreativeWork","name":"Mongoose H4D 2021 Lessons Learned","description":"business model, business model canvas, mission model, mission model canvas, customer development, hacking for defense, H4D, lean launchpad, lean startup, stanford, startup, steve blank, pete newell, bmnt, entrepreneurship, I-Corps, Security, NSIN, NSA, disposable infrastructure, cyber, Joe Felter, DOD","url":"https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080","datePublished":"2021-06-02 05:30:11 UTC","publisher":{"@type":"Organization","name":"Slideshare","url":"https://www.slideshare.net/"},"encodingFormat":"application/pdf","fileFormat":"pdf","inLanguage":"en","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080"}}</script><script type="application/ld+json">{"@context":"https://schema.org/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.slideshare.net"},{"@type":"ListItem","position":2,"name":"Education","item":"https://www.slideshare.net/category/education"},{"@type":"ListItem","position":3,"name":"Mongoose H4D 2021 Lessons Learned","item":"https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080"}]}</script><script> window.freestar?.queue.push(function() { googletag.pubads().setTargeting('test', []); }); </script><meta name="next-head-count" content="56"/><link rel="preload" href="https://public.slidesharecdn.com/_next/static/media/b6a6f0b43d027304-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="https://public.slidesharecdn.com/_next/static/media/9cf9c6e84ed13b5e-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><noscript data-n-css=""></noscript><link rel="preload" href="https://cmp.osano.com/AzZdHGSGtpxCq1Cpt/079b27eb-bb3f-48dd-9bd9-3feb8aec3c38/osano.js" as="script"/><link rel="preload" as="script" href="https://public.slidesharecdn.com/_next/static/chunks/webpack-35e3c94b8145dab3.js"/><link rel="preload" as="script" href="https://public.slidesharecdn.com/_next/static/chunks/framework-5a981bd1af7edc76.js"/><link rel="preload" as="script" href="https://public.slidesharecdn.com/_next/static/chunks/main-9d633b45c44c4167.js"/><link rel="preload" as="script" href="https://public.slidesharecdn.com/_next/static/chunks/pages/_app-44f2c5b25ccc0f6f.js"/><link rel="preload" as="script" href="https://public.slidesharecdn.com/_next/static/chunks/5121-c12bfd4bed7c2139.js"/><link rel="preload" as="script" href="https://public.slidesharecdn.com/_next/static/chunks/6534-260039e7949cc580.js"/><link rel="preload" as="script" href="https://public.slidesharecdn.com/_next/static/chunks/3882-1930de008c11530f.js"/><link rel="preload" as="script" href="https://public.slidesharecdn.com/_next/static/chunks/pages/slideshow/%5Btitle%5D/%5Bid%5D-3cc06acbe42bfc9f.js"/><link rel="preload" as="script" href="https://public.slidesharecdn.com/_next/static/b5e752549b9bd9a6933b5e828d6464a4c991c335/_buildManifest.js"/><link rel="preload" as="script" href="https://public.slidesharecdn.com/_next/static/b5e752549b9bd9a6933b5e828d6464a4c991c335/_ssgManifest.js"/><style>:root{--black:#000;--white:#fff;--alice-blue-100:#f5fcff;--alice-blue-200:#f2faff;--alice-blue-300:#f2f9fc;--alice-blue-600:#ddf1f9;--celadon-blue:#027eb0;--celadon-blue-dark:#026c97;--midnight-green-dark:#002e3c;--light-gray:#e9edf8;--pale-gray:#fdfdfd;--snow-gray:#f3f6fd;--snow-gray-100:#f9faff;--blue-gray-100:#f5f6fa;--blue-gray-200:#e3e6f0;--blue-gray-300:#d0d6e6;--blue-gray-400:#b4bbd1;--blue-gray-500:#989fbc;--blue-gray-575:#6d7594;--blue-gray-600:#636c8b;--blue-gray-700:#424766;--blue-gray-800:#212240;--blue-gray-900:#0e0f25;--blue-300:#005e93;--blue-200:#0076b9;--blue-100:#e7f5fc;--gray-500:#303133;--tangerine-100:#fbedd8;--color-info:#3aa7ea;--color-error:#bf3131;--color-success:#337c41;--color-warning:#cd5308;--color-error-red-100:#f2dede;--celadon-blue-rgb:2,126,176;--blue-gray-600-rgb:99,108,139;--color-twitter:#1da1f2;--color-twitter-hover:#1a91da;--color-facebook:#3b5998;--color-facebook-hover:#3c5586;--color-linkedin:#337ab1;--color-linkedin-hover:#2e6e9f;--color-scribd:#1e7b85;--color-scribd-hover:#1d7680;--color-sms:#3b3835;--color-email:#bbc4c8;color-scheme:only light;--header-height:64px;--toolbar-height:54px;--progress-bar-height:8px;--pushdown-height:90px;--adhesion-height:0px;--key-moments-size:140px;--sections-size:185px;--sidebar-size:404px;--metadata-toolbar-height:100px;--metadata-toolbar-offset:0px;--metadata-toolbar-shadow-opacity:0;--actions-menu-height:74px;--max-content-width:1688px;--border-radius:8px;--sticky-index:8;--header-index:11;--dropdown-index:99;--freestar-index:999;--progress-bar-index:9999;--popup-index:9999;--toast-index:99999;--pointly-index:2;--slide-actions-index:3;--font-weight-light:300;--font-weight-regular:400;--font-weight-medium:600;--font-weight-bold:700;--font-weight-black:900;--font-size-large:16px;--font-size-medium:14px;--font-size-small:12px;--font-size-xsmall:10px;--line-height-relax:1.5;--line-height-compact:1.15;--line-height-tight:1;--ease:cubic-bezier(0.2,0,0,1)}@media screen and (max-width:1249px){:root{--sidebar-size:364px}}@media screen and (max-width:1024px){:root{--header-height:75px}}@media screen and (max-width:767px){:root{--pushdown-height:50px}}@media only screen and (min-width:929px){:root{--actions-menu-height:0}}*,:after,:before{box-sizing:border-box}*{margin:0}:focus-visible{outline:2px solid rgba(2,126,176,.7);outline-offset:2px}body,html{min-height:100%}html{scroll-behavior:smooth;scrollbar-gutter:stable}body{background-color:var(--white);font-family:var(--font-family);font-size:var(--font-size-medium);line-height:var(--line-height-relax);overflow:clip scroll;text-rendering:optimizeLegibility;-webkit-text-size-adjust:100%;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}canvas,img,picture,video{display:block;max-width:100%}button,input,select,textarea{font-family:var(--font-family)}h1,h2,h3,h4,h5,h6,p{overflow-wrap:break-word}#__next,#root{isolation:isolate;min-height:100%;height:-moz-max-content;height:max-content}::-moz-selection{color:var(--blue-gray-900);background-color:var(--blue-gray-200)}::selection{color:var(--blue-gray-900);background-color:var(--blue-gray-200)}body:has(dialog[open]){overflow:clip}body:has(dialog.scrollable[open]){overflow:auto}header:has(+aside.visible){box-shadow:none}header:has(+aside:not(.visible)){box-shadow:0 1px 0 0 var(--blue-gray-200)}.content-wrapper{width:100%;max-width:var(--max-content-width);margin-inline:auto}.clamp-lines{-webkit-box-orient:vertical;-webkit-line-clamp:2;line-clamp:2;display:-webkit-box}.clamp-lines,.ellipsis{text-overflow:ellipsis;overflow:hidden}.ellipsis{white-space:nowrap}.seo-only,.sr-only{position:absolute!important;width:1px;height:1px;border:0;clip:rect(1px,1px,1px,1px);clip-path:inset(50%);padding:0;margin:-1px;overflow:hidden;white-space:nowrap}.no-scroll,body[class^=no-scroll-for-]{overflow:hidden;touch-action:none}.hide-scrollbar{-ms-overflow-style:none;scrollbar-width:none}.hide-scrollbar::-webkit-scrollbar{display:none}.unstyled-button{background:none;border:none;padding:0}body:has(#slideshare_pushdown-pushdown-cls iframe){--pushdown-height:90px}body:has(.fs-pushdown-sticky:empty){--pushdown-height:0px}@media only screen and (max-width:928px){#fs-sticky-footer{bottom:var(--actions-menu-height)}}@media only screen and (min-width:1051px){body:has(#slideshare_pushdown-pushdown-cls.fs-pushdown-sticky){--metadata-toolbar-offset:0px!important}}.metadata-toolbar{top:var(--metadata-toolbar-offset)}body:has(#fs-sticky-footer iframe) #fixed-download-container{bottom:var(--adhesion-height,0)}body:not(:has(#fs-sticky-footer iframe)) #fs-sticky-footer{min-height:0!important}dialog[open]{display:grid;grid-template-rows:max-content;opacity:1}dialog[open]::backdrop{opacity:.6}dialog{max-width:100dvw;max-height:100dvh;box-shadow:0 0 0 1px rgba(9,30,66,.08),0 2px 1px rgba(9,30,66,.08),0 0 20px -6px rgba(9,30,66,.3);border:0;padding:0;margin:auto;overflow:clip}dialog,dialog::backdrop{opacity:0;transition:opacity .3s ease-out,transform .3s ease-out,translate .3s ease-out,display allow-discrete .3s,overlay allow-discrete .3s}dialog::backdrop{background-color:#000}@starting-style{dialog[open],dialog[open]::backdrop{opacity:0}}.popover.open,[popover]:popover-open{opacity:1;scale:1}[popover]:popover-open::backdrop{opacity:0}.popover.floating-ui{display:none;z-index:var(--popup-index)}.popover.floating-ui.open{display:block;opacity:1}.popover,[popover]{position:absolute;inset:auto;color:var(--blue-gray-800);background-color:canvas;border:0;border-radius:4px;box-shadow:0 1px 5px rgba(0,0,0,.05),0 4px 12px rgba(0,0,0,.2);overscroll-behavior:contain;overflow:clip auto;padding:0;margin-block:1ch;scale:.96}.popover,[popover],[popover]::backdrop{transition:opacity .3s,scale .3s,display allow-discrete .2s,overlay allow-discrete .2s;opacity:0}@starting-style{.popover.open,[popover]:popover-open,[popover]:popover-open::backdrop{opacity:0}.popover.open,[popover]:popover-open{scale:.96}}.popover [data-popover-list],[popover] [data-popover-list]{display:flex;flex-direction:column;list-style:none;padding-inline:0;padding-block:8px}.popover [data-popover-item],[popover] [data-popover-item]{width:100%;display:flex;align-items:center;gap:8px;padding-block:12px;padding-inline:16px;color:inherit;text-decoration:none;cursor:pointer}.popover [data-popover-item]:hover,[popover] [data-popover-item]:hover{background-color:var(--blue-gray-100)}.popover [role=separator],[popover] [role=separator]{margin-block:8px;margin-inline:16px}@supports (anchor-name:--foo-bar){[popover]{position-try-order:most-height;position-visibility:anchors-visible}[popover][data-popover-position=bottom]{position-area:bottom;position-try:flip-block;transform-origin:top}[popover][data-popover-position=bottom-start]{position-area:bottom span-right;position-try:flip-block,flip-inline;transform-origin:top left}[popover][data-popover-position=bottom-end]{position-area:bottom span-left;position-try:flip-block,flip-inline;transform-origin:top right}[popover][data-popover-position=top]{position-area:top;position-try:flip-block}[popover][data-popover-position=top-start]{position-area:top span-right;position-try:flip-block,flip-inline;transform-origin:bottom left}[popover][data-popover-position=top-end]{position-area:top span-left;position-try:flip-block,flip-inline;transform-origin:bottom right}[popover][data-popover-position=left]{position-area:left;position-try:flip-inline;transform-origin:right}[popover][data-popover-position=left-start]{position-area:left span-bottom;position-try:flip-block,flip-inline;transform-origin:top right}[popover][data-popover-position=left-end]{position-area:left span-top;position-try:flip-block,flip-inline;transform-origin:bottom right}[popover][data-popover-position=right]{position-area:right;position-try:flip-inline;transform-origin:left}[popover][data-popover-position=right-start]{position-area:right span-bottom;position-try:flip-block,flip-inline;transform-origin:top left}[popover][data-popover-position=right-end]{position-area:right span-top;position-try:flip-block,flip-inline;transform-origin:bottom left}}#fs-sticky-footer,.orp-player-wrapper{z-index:var(--freestar-index)!important}.fs-sticky-parent{position:static!important}.fs-sticky-wrapper{padding-right:0!important;display:block!important}#slideshare_pushdown-pushdown-cls.fs-pushdown-sticky{position:static!important}body.no-scroll-mobile #slideshare_pushdown-pushdown-cls{height:auto}body.gallery-view #slideshare_pushdown-pushdown-cls{display:none}#pushdown-ad-large{display:grid;justify-content:center;align-items:center}#above-recs-desktop-ad-sm,#above-recs-mobile,#below-reader-ad,#between-recs-ad-1,#between-recs-ad-2{height:280px}@media screen and (min-width:929px){#below-reader-ad,#between-recs-ad-1,#between-recs-ad-2{height:250px}#above-recs-desktop-ad-sm,#above-recs-desktop-ad-sm-2{aspect-ratio:336/280;height:280px;margin-bottom:32px}#above-recs-desktop-ad-sm_container{justify-content:left!important}}@media only screen and (min-width:1051px){body{--padding-x-offset:clamp(1rem,-1.6rem + 8vw,8rem);--margin-x-offset:0px;--end:calc(var(--padding-x-offset) + var(--sidebar-size) + var(--margin-x-offset))}#fs-sticky-footer:has(#slideshare_adhesion){left:0;width:calc(100% - var(--end))}#fs-sticky-footer:has(#slideshare_adhesion2){width:var(--end);left:unset;right:0}}@media only screen and (min-width:1689px){body{--margin-x-offset:calc(calc(100% - var(--max-content-width)) / 2)}}div:has(>#between-recs-ad-1),div:has(>#between-recs-ad-2),div:has(>#interstitial-ad-1),div:has(>[id^=slideshare_docs_incontent]){display:grid;justify-content:center}div:has(>#interstitial-ad-1.video-interstitial-ad){display:block}@media screen and (max-width:928px){div:has(>#above-recs-mobile),div:has(>#below-reader-ad){display:grid;justify-content:center}}#fs-sticky-footer.hidden,.orp-player-wrapper.hidden{display:none!important}@media only screen and (max-width:928px){#fs-sticky-footer.hidden-on-mobile,.orp-player-wrapper.hidden-on-mobile{display:none!important}}div[id^=FreeStarVideoAdContainer_]{width:100%}#freestar-video-child:not(:empty){margin-bottom:24px}div[id^=FreeStarVideoAdContainer_FloatingOnly]{width:auto;aspect-ratio:auto}:root{--shadow-color:rgba(122,61,143,.15);--osano-dialog-shadow:drop-shadow(var(--shadow-color) 0.5px 1px 1px) drop-shadow(var(--shadow-color) 1px 2px 2px) drop-shadow(var(--shadow-color) 2px 4px 4px) drop-shadow(var(--shadow-color) 4px 8px 8px) drop-shadow(var(--shadow-color) 8px 16px 16px)}.osano-cm-dialog{background-color:#212240;color:var(--white)}.osano-cm-dialog__close{color:inherit;stroke:var(--white)}.osano-cm-dialog--eu{display:grid;grid-template-columns:1fr 200px;grid-column-gap:48px;-moz-column-gap:48px;column-gap:48px;max-height:95dvh;font-family:Source Sans Pro,sans-serif;color:var(--blue-gray-600,#636c8b);background-color:var(--white,#fff);border-top-left-radius:var(--border-radius,8px);border-top-right-radius:var(--border-radius,8px);filter:var(--osano-dialog-shadow);padding-block-start:32px;padding-block-end:20px;padding-inline:5%;.osano-cm-dialog__content{max-height:calc(95dvh - 52px)}.osano-cm-dialog__close{display:none}.osano-cm-dialog__title{font-size:24px;font-weight:700;color:var(--blue-gray-900,#0e0f25);margin-block-end:16px}.osano-cm-content__usage-list{font-size:16px}.osano-cm-usage-list__list{margin-block-start:8px;margin-block-end:16px;margin-inline-start:8px;.osano-cm-list__list-item{font-size:16px}}.osano-cm-link,.osano-cm-message{font-size:16px}.osano-cm-message{display:flex}.osano-cm-drawer-links,.osano-cm-link{display:inline}.osano-cm-link{color:var(--celadon-blue,#027eb0);font-weight:600;text-decoration:none;&:hover{color:var(--celadon-blue-dark,#026c97)}&:after{content:"|";padding-inline:12px}&:last-child:after{content:""}}.osano-cm-dialog__list{line-height:normal;margin-block-start:24px;.osano-cm-list__list-item{display:inline-flex;align-items:center;&:after{content:"|";padding-inline:16px;color:var(--blue-gray-200,#e3e6f0);font-size:28px}&:last-child:after{content:""}}}.osano-cm-toggle__switch{display:none}.osano-cm-toggle__input{width:16px;height:16px;margin:unset;overflow:unset;accent-color:var(--blue-gray-900,#0e0f25);position:static;opacity:1}.osano-cm-toggle__label.osano-cm-label{color:var(--blue-gray-600,#636c8b);font-size:18px;font-weight:600;margin-left:8px;margin-inline-end:0}.osano-cm-dialog__buttons{min-width:unset;align-self:flex-end;display:grid;grid-row-gap:8px;row-gap:8px;justify-content:stretch;align-items:center;margin:unset;.osano-cm-buttons__button{height:-moz-max-content;height:max-content;min-height:40px;font-size:16px;font-weight:600;margin:unset}.osano-cm-accept-all{order:-1}.osano-cm-accept-all,.osano-cm-manage{background-color:var(--celadon-blue,#027eb0)}.osano-cm-deny,.osano-cm-denyAll,.osano-cm-save{background-color:transparent;color:var(--celadon-blue,#027eb0);border:1px solid var(--celadon-blue,#027eb0)}}}.osano-cm-dialog--eu.osano-cm-dialog--br{.osano-cm-dialog__title{font-size:26px;font-weight:600}.osano-cm-dialog__buttons{row-gap:12px}}.osano-cm-window:has(>.osano-cm-dialog--br-overlay):before{content:"";position:fixed;inset:0;background-color:rgba(0,0,0,.6);z-index:-1}@media screen and (max-width:768px){.osano-cm-dialog--eu{-moz-column-gap:24px;column-gap:24px;grid-template-columns:1fr;padding-block-end:32px;padding-inline:16px;.osano-cm-dialog__buttons{display:flex;flex-wrap:nowrap;align-items:center;justify-content:flex-start;gap:16px;.osano-cm-buttons__button{width:-moz-max-content;width:max-content}}}.osano-cm-dialog--eu.osano-cm-dialog--br{.osano-cm-link,.osano-cm-message{font-size:16px;width:auto}.osano-cm-dialog__buttons{margin-block-start:24px;row-gap:16px}}}@media screen and (max-width:520px){.osano-cm-dialog--eu{font-size:14px;padding-block-start:16px;padding-block-end:16px;.osano-cm-dialog__title{font-size:20px;margin-block-end:8px}.osano-cm-link,.osano-cm-message{font-size:inherit}.osano-cm-usage-list__list{font-size:12px;.osano-cm-list__list-item{font-size:inherit}}.osano-cm-toggle__label.osano-cm-label{font-size:15px}.osano-cm-dialog__list{width:100%;display:flex;flex-direction:column;margin-block-start:8px;.osano-cm-list__list-item{display:grid;border-bottom:1px solid var(--blue-gray-200,#e3e6f0);padding-block:4px;&:last-child{border-bottom:unset}}.osano-cm-list__list-item:after{content:unset}.osano-cm-list-item__toggle{align-self:baseline;justify-content:space-between;.osano-cm-toggle__label{order:-1;margin:unset}}}.osano-cm-dialog__buttons{display:grid;grid-template-columns:1fr 1fr;grid-column-gap:16px;-moz-column-gap:16px;column-gap:16px;grid-row-gap:12px;row-gap:12px;margin-block-start:0;.osano-cm-buttons__button{min-width:-moz-max-content;min-width:max-content;width:unset;justify-self:stretch}.osano-cm-accept-all{grid-column:1/span 2}}}.osano-cm-dialog--eu.osano-cm-dialog--br{padding-block-start:32px;padding-block-end:32px;.osano-cm-dialog__title{font-size:26px;margin-block-end:16px}.osano-cm-link,.osano-cm-message{font-size:16px;width:auto}.osano-cm-dialog__buttons{margin-block-start:24px;row-gap:16px}}}@media screen and (min-width:929px){.osano-cm-widget{display:none}.osano-cm-content__message{margin-bottom:8px;padding-bottom:0;width:90%}.osano-cm-message{font-size:12px}.osano-cm-drawer-links{margin:0}.osano-cm-link{color:var(--celadon-blue);font-size:12px}.osano-cm-list__list-item{font-size:12px}.osano-cm-dialog__buttons{display:flex;align-items:center;gap:6px}.osano-cm-button{height:44px;font-size:14px;background-color:var(--celadon-blue);border-color:var(--celadon-blue);color:var(--white);padding:10px;margin:3px 0}.osano-cm-denyAll{background-color:var(--blue-gray-800);border-color:var(--white);color:var(--white)}}.osano-cm-widget{display:none}.osano-cm-content__message{margin-bottom:8px;padding-bottom:0;width:90%}.osano-cm-message{font-size:12px}.osano-cm-drawer-links{margin:0}.osano-cm-link{color:var(--celadon-blue);font-size:12px}.osano-cm-list__list-item{font-size:12px}.osano-cm-dialog__buttons{display:flex;align-items:center;gap:6px}.osano-cm-button{height:44px;font-size:14px;background-color:var(--celadon-blue);border-color:var(--celadon-blue);color:var(--white);padding:10px;margin:3px 0}.osano-cm-denyAll{background-color:var(--blue-gray-800);border-color:var(--white);color:var(--white)}@font-face{font-family:__Source_Sans_3_11ceb6;font-style:normal;font-weight:200 900;font-display:swap;src:url(https://public.slidesharecdn.com/_next/static/media/88da59c891d37117-s.woff2) format("woff2");unicode-range:u+0460-052f,u+1c80-1c8a,u+20b4,u+2de0-2dff,u+a640-a69f,u+fe2e-fe2f}@font-face{font-family:__Source_Sans_3_11ceb6;font-style:normal;font-weight:200 900;font-display:swap;src:url(https://public.slidesharecdn.com/_next/static/media/1e377d93cbdd6b44-s.woff2) format("woff2");unicode-range:u+0301,u+0400-045f,u+0490-0491,u+04b0-04b1,u+2116}@font-face{font-family:__Source_Sans_3_11ceb6;font-style:normal;font-weight:200 900;font-display:swap;src:url(https://public.slidesharecdn.com/_next/static/media/36d711d427a06e51-s.woff2) format("woff2");unicode-range:u+1f??}@font-face{font-family:__Source_Sans_3_11ceb6;font-style:normal;font-weight:200 900;font-display:swap;src:url(https://public.slidesharecdn.com/_next/static/media/f1f7cdf240180e28-s.woff2) format("woff2");unicode-range:u+0370-0377,u+037a-037f,u+0384-038a,u+038c,u+038e-03a1,u+03a3-03ff}@font-face{font-family:__Source_Sans_3_11ceb6;font-style:normal;font-weight:200 900;font-display:swap;src:url(https://public.slidesharecdn.com/_next/static/media/55fbdf033607a0e1-s.woff2) format("woff2");unicode-range:u+0102-0103,u+0110-0111,u+0128-0129,u+0168-0169,u+01a0-01a1,u+01af-01b0,u+0300-0301,u+0303-0304,u+0308-0309,u+0323,u+0329,u+1ea0-1ef9,u+20ab}@font-face{font-family:__Source_Sans_3_11ceb6;font-style:normal;font-weight:200 900;font-display:swap;src:url(https://public.slidesharecdn.com/_next/static/media/b6a6f0b43d027304-s.p.woff2) format("woff2");unicode-range:u+0100-02ba,u+02bd-02c5,u+02c7-02cc,u+02ce-02d7,u+02dd-02ff,u+0304,u+0308,u+0329,u+1d00-1dbf,u+1e00-1e9f,u+1ef2-1eff,u+2020,u+20a0-20ab,u+20ad-20c0,u+2113,u+2c60-2c7f,u+a720-a7ff}@font-face{font-family:__Source_Sans_3_11ceb6;font-style:normal;font-weight:200 900;font-display:swap;src:url(https://public.slidesharecdn.com/_next/static/media/9cf9c6e84ed13b5e-s.p.woff2) format("woff2");unicode-range:u+00??,u+0131,u+0152-0153,u+02bb-02bc,u+02c6,u+02da,u+02dc,u+0304,u+0308,u+0329,u+2000-206f,u+20ac,u+2122,u+2191,u+2193,u+2212,u+2215,u+feff,u+fffd}@font-face{font-family:__Source_Sans_3_Fallback_11ceb6;src:local("Arial");ascent-override:109.21%;descent-override:42.66%;line-gap-override:0.00%;size-adjust:93.76%}.__className_11ceb6{font-family:__Source_Sans_3_11ceb6,__Source_Sans_3_Fallback_11ceb6,Inter,-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen,Ubuntu,Cantarell,Fira Sans,Droid Sans,Helvetica Neue,sans-serif;font-style:normal}.__variable_11ceb6{--font-family:"__Source_Sans_3_11ceb6","__Source_Sans_3_Fallback_11ceb6",Inter,-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen,Ubuntu,Cantarell,Fira Sans,Droid Sans,Helvetica Neue,sans-serif}.PageProgressBar_root__1y_Q3{position:fixed;top:0;left:0;width:100%;z-index:var(--progress-bar-index);pointer-events:none}.PageProgressBar_bar__Kyoem{width:100%;height:3px;background-color:var(--celadon-blue);transform:scaleX(0);transform-origin:left;transition:transform .4s cubic-bezier(.4,0,.2,1),opacity .5s ease;opacity:1}.PageProgressBar_complete__KhJy3{opacity:0}.ErrorShell_root__zYUH8{min-height:100vh;display:flex;flex-direction:column}.Header_root__8A86O{--fluid-16-24:clamp(1rem,0.7373rem + 1.3136vi,1.5rem);position:relative;height:var(--header-height);display:grid;grid-template-columns:auto 1fr;align-items:center;grid-gap:24px;gap:24px;background-color:var(--white);font-family:inherit;padding-inline:var(--fluid-16-24)}.Header_root__8A86O.Header_sticky__NGNE7{position:sticky;top:0;transition:box-shadow .3s ease-in-out;z-index:var(--header-index)}.Header_root__8A86O button{font-size:14px;white-space:nowrap}.Header_wrapper___zBfP{display:flex;align-items:center;flex-shrink:0;gap:12px}@media screen and (max-width:1320px){.Header_root__8A86O.Header_biggerSearch__Ce0Hq{grid-template-columns:auto 1fr auto}}@media screen and (min-width:768px){.Header_root__8A86O{grid-template-columns:repeat(3,minmax(min-content,1fr))}}.Hamburger_root__tHlgC{display:grid;place-content:center;background:transparent;border:0;border-radius:2px;color:var(--blue-gray-600);padding:0;margin:0;cursor:pointer}@media screen and (min-width:768px){.Hamburger_root__tHlgC{display:none}}.SidebarFallback_loggedOutRoot__oKMfe{display:grid;grid-template-rows:170px 1fr}.SidebarFallback_loggedOutContainer__Tpr_u{display:flex;flex-direction:column;padding:16px}.SidebarFallback_loggedInRoot__r1CEd{display:grid;grid-template-rows:64px 1fr}.SidebarFallback_loggedInContainer__dw_ML{display:flex;flex-direction:column;gap:16px;padding:16px}.SidebarFallback_loggedInLinks__C2NaL{display:grid;grid-gap:24px;gap:24px}.SidebarFallback_loggedInUser__b8i41{display:flex;align-items:center;gap:8px;margin-block-start:12px;margin-block-end:auto}.Skeleton_root__U4QqL{--skeleton-bg:rgba(0,0,0,.1);--shimmer-bg:linear-gradient(90deg,transparent,rgba(0,0,0,.04),transparent);position:relative;display:block;height:1.2rem;flex-shrink:0;background:var(--skeleton-bg);overflow:hidden}.Skeleton_root__U4QqL:after{content:"";position:absolute;inset:0;translate:-100% 0;background:var(--shimmer-bg);animation:Skeleton_shimmer__hGst9 2s ease-in-out .5s infinite}.Skeleton_circle___fxTG{aspect-ratio:1/1;border-radius:100vmax;height:unset}.Skeleton_rectangle__UY3OD{border-radius:0}.Skeleton_rounded__BLBq2{border-radius:4px}.Skeleton_text___JusF{border-radius:4px;font-size:1rem;scale:1 .6}.Skeleton_text___JusF:before{content:"\00a0"}.Skeleton_list__xNehW{display:flex;flex-direction:column;gap:6px;padding-inline:8px;padding-block:10px}.Skeleton_copy__qgw2R{display:flex;flex-direction:column;padding-block:12px;padding-inline:16px}.Skeleton_copy__qgw2R .skeleton:first-child{margin-block-end:8px}@keyframes Skeleton_shimmer__hGst9{0%{translate:-100% 0}50%{translate:100% 0}to{translate:100% 0}}.Icon_root__AjZyv{--size:24px;position:relative;display:flex;align-items:center;justify-content:center}.Icon_icon__4zzsG{flex-shrink:0;display:inline-block;width:var(--size);height:var(--size);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:cover;mask-size:cover;vertical-align:middle}.Drawer_root__ob4ZM[open]{translate:0 0}.Drawer_root__ob4ZM{position:fixed;inset:0;border-radius:0;translate:var(--slide-from)}@starting-style{.Drawer_root__ob4ZM[open]{translate:var(--slide-from)}}.Drawer_root__ob4ZM[data-placement=left]{--slide-from:-100% 0;inset-inline-end:auto;border-top-right-radius:var(--border-radius);border-bottom-right-radius:var(--border-radius)}.Drawer_root__ob4ZM[data-placement=right]{--slide-from:100% 0;inset-inline-start:unset;border-top-left-radius:var(--border-radius);border-bottom-left-radius:var(--border-radius)}.Drawer_root__ob4ZM[data-placement=bottom]{--slide-from:0 100%;inset-block-start:unset;border-top-left-radius:var(--border-radius);border-top-right-radius:var(--border-radius)}.Drawer_content__ye6ZB{display:grid;overflow:auto}.Drawer_root__ob4ZM[data-placement=left],.Drawer_root__ob4ZM[data-placement=right]{width:min(280px,80vw);height:100dvh}.Drawer_root__ob4ZM[data-placement=bottom]{width:100dvw;max-height:80dvh}.CloseButton_root__JCTRm{position:absolute;right:16px;top:16px;width:40px;height:40px;display:grid;place-content:center;color:var(--blue-gray-600);border-radius:100vmax;background-color:transparent;border:0;padding:0;margin:0;transition:background-color .2s ease-in-out;cursor:pointer}.CloseButton_root__JCTRm:hover{background-color:rgba(var(--blue-gray-600-rgb),.05)}.Logo_root__Qba3h{flex-shrink:0}.SearchForm_root__usp4s{position:relative;justify-self:center;width:min(100%,440px)}.SearchForm_root__usp4s form{display:grid}.SearchForm_root__usp4s input{height:40px;border-radius:100vmax;border:1px solid var(--blue-gray-600);margin:0;padding:0 40px 0 16px;color:var(--blue-gray-900);background-color:var(--white);width:100%}.SearchForm_root__usp4s.SearchForm_biggerSearch__syu70{width:100%}.SearchForm_root__usp4s input::-moz-placeholder{color:var(--blue-gray-600)}.SearchForm_root__usp4s input::placeholder{color:var(--blue-gray-600)}div.SearchForm_popover__K3_9y{left:anchor(left);right:anchor(right)}div.SearchForm_popoverContent__O_56c{max-width:100%}div.SearchForm_popoverContent__O_56c p{--webkit-line-clamp:unset;line-clamp:unset}.SearchForm_hidden__rZp69{display:none}.SearchForm_submit__U8kPR{width:32px;height:32px;position:absolute;right:14px;top:50%;display:grid;place-content:center;border:none;background:transparent;border-radius:100vmax;color:var(--blue-gray-400);padding:0;margin:0;translate:0 -50%;cursor:pointer}.SearchForm_expressivePlaceholder__6nNw5{position:absolute;top:10px;left:20px;height:20px;overflow:hidden;white-space:nowrap;pointer-events:none;max-width:100%;display:flex;padding-right:60px}.SearchForm_expressiveLabel__7_0_U{display:block;color:var(--blue-gray-575);font-size:14px;max-width:100%;overflow:hidden;text-overflow:ellipsis;white-space:nowrap}.SearchForm_expressiveLabelMobile__ZmtzP{display:none}@media screen and (max-width:928px){.SearchForm_expressiveLabelDesktop__D0GoT,.SearchForm_popover__K3_9y{display:none}.SearchForm_expressiveLabelMobile__ZmtzP{display:block}}@media screen and (max-width:768px){.SearchForm_root__usp4s{justify-self:flex-end}}.PopoverContent_root__Wu_Vr{max-width:332px;padding-block:12px;padding-inline:16px;display:flex;gap:10px;align-items:flex-start}.PopoverContent_root__Wu_Vr .PopoverContent_title__U2Bf2{display:flex;align-items:center;justify-content:space-between;font-size:1rem;margin-bottom:4px}.PopoverContent_inner__Ulol1{display:flex;flex-direction:column}.PopoverContent_root__Wu_Vr .PopoverContent_title__U2Bf2 span{line-height:18px;font-weight:600}.PopoverContent_accentBubble__E3IDn{margin-left:34px}.PopoverContent_root__Wu_Vr p{-webkit-box-orient:vertical;-webkit-line-clamp:3;display:-webkit-box;color:var(--blue-gray-600);font-size:14px;line-height:18px;line-clamp:5;overflow:hidden}.AccentBubble_root__DZ4aE{padding:4px 12px;border-radius:100px;background:var(--tangerine-100);font-size:11px;font-weight:600;color:var(--gray-500);display:flex;text-align:center;justify-content:center}.HeaderActions_root__11_ai{display:flex;align-items:center;justify-self:flex-end;gap:16px}@media screen and (max-width:768px){.HeaderActions_root__11_ai{display:none}}.Footer_footer__N3WmV{width:100%;display:flex;flex-direction:column;gap:24px;background-color:var(--midnight-green-dark);color:var(--blue-gray-400);padding:24px;margin-top:auto}.Footer_footer__N3WmV .separator{opacity:.3}.Footer_top__y0vfl{display:flex;justify-content:space-between;align-items:center;gap:24px}.Footer_links__F2xFZ{color:inherit;display:flex;align-items:center;flex-wrap:wrap;-moz-column-gap:32px;column-gap:32px;row-gap:12px;padding:0;margin:0}.Footer_cookiePreferenceButton__lDgkB{order:4;background-color:transparent;border:none;color:inherit;font-size:inherit;font-weight:800;cursor:pointer}.Footer_top__y0vfl .everand-link{order:8}.Footer_bottom__reaXc{display:flex;align-items:center;gap:24px}.Footer_copyright__dje7H{font-size:14px;line-height:24px;margin-right:auto}.Footer_icons__8EufG{display:flex;align-items:center;gap:16px}.Link_root__vn3ab{display:inline-flex;align-items:center;gap:4px;border-radius:2px;color:inherit;font-size:inherit;font-weight:inherit;text-decoration:none;-webkit-text-decoration-color:transparent;text-decoration-color:transparent;transition:color .2s ease-in-out,-webkit-text-decoration-color .2s ease-in-out .2s;transition:color .2s ease-in-out,text-decoration-color .2s ease-in-out .2s;transition:color .2s ease-in-out,text-decoration-color .2s ease-in-out .2s,-webkit-text-decoration-color .2s ease-in-out .2s}.Link_primary__Iq4CI{color:var(--celadon-blue-dark)}.Link_primary__Iq4CI:focus,.Link_primary__Iq4CI:focus-visible,.Link_primary__Iq4CI:hover{color:var(--celadon-blue)}.Link_gray__Efpxa{color:var(--blue-gray-600)}.Link_gray__Efpxa:focus,.Link_gray__Efpxa:focus-visible,.Link_gray__Efpxa:hover{color:var(--blue-gray-700)}.Link_light__mcUPh{color:var(--blue-gray-400)}.Link_light__mcUPh:focus,.Link_light__mcUPh:focus-visible,.Link_light__mcUPh:hover{color:var(--blue-gray-100)}.Link_dark__Ql4LW{color:var(--blue-gray-800)}.Link_dark__Ql4LW:focus,.Link_dark__Ql4LW:focus-visible,.Link_dark__Ql4LW:hover{color:var(--celadon-blue)}.Link_weight-regular__yPpnB{font-weight:400}.Link_weight-medium__h0ic3{font-weight:600}.Link_weight-bold__me4nt{font-weight:700}.Link_size-small__wSSrC{font-size:12px}.Link_size-medium__ZLo12{font-size:14px}.Link_size-large__W0PAv{font-size:16px}.Link_size-xLarge__Dq0j8{font-size:18px}.Link_hoverUnderline__QMNau:hover,.Link_underline__RoQbh{text-decoration:underline;-webkit-text-decoration-color:inherit;text-decoration-color:inherit}.Link_hoverUnderline__QMNau:hover{text-decoration-thickness:1.5px;text-underline-offset:2px}.LanguageSelect_trigger__XUC_9{height:40px;display:flex;align-items:center;gap:8px;color:var(--white);background-color:transparent;border:1px solid var(--white);border-radius:4px;font-weight:700;padding-inline:12px;cursor:pointer}.LanguageSelect_trigger__XUC_9 span:first-child{transform-origin:center;transition:rotate .2s}.LanguageSelect_trigger__XUC_9.LanguageSelect_flipped__OJ2FL span:first-child{rotate:z 90deg}.Separator_root__70Ime{background-color:var(--color);flex-shrink:0;justify-self:stretch;align-self:stretch}.Separator_horizontal__czVEa{height:1px}.Separator_vertical__JYCCK{width:1px}.PrivateContentMessage_root__IEx17{flex-grow:1;width:100%;height:100%;display:flex;align-items:flex-start}.PrivateContentMessage_box__YG0Bp{width:100%;max-width:960px;background-color:#f2dede;border-color:#eed3d7;border-radius:8px;color:#b94a48;font-size:14px;font-weight:400;padding:16px 24px;margin:100px auto}@media screen and (max-width:960px){.PrivateContentMessage_box__YG0Bp{margin-left:16px;margin-right:16px}}.RemovedContentMessage_root__rtN5X{flex-grow:1;width:100%;display:flex;align-items:flex-start}.RemovedContentMessage_box__pw1z3{width:100%;max-width:960px;background-color:#fcf8e3;border:1px solid #fbeed5;border-radius:4px;color:#c09853;font-size:14px;font-weight:400;text-shadow:0 1px 0 hsla(0,0%,100%,.5);padding:16px 24px;margin:100px auto}.RemovedContentMessage_title__vwHjN{color:#504c48;font-size:25px;font-weight:300;line-height:35px;margin-bottom:4px}@media screen and (max-width:960px){.RemovedContentMessage_box__pw1z3{margin-left:16px;margin-right:16px}}.ErrorDisplay_root__bY_Qo{height:100%;display:flex;flex-direction:column;align-items:center;justify-content:center;background:var(--white);font-family:-system-ui,sans-serif;color:var(--blue-gray-800)}.ErrorDisplay_smiley__o9HSN{width:129px;height:122px;margin:60px auto 30px}.ErrorDisplay_errorBox__jL_9h{max-width:800px;width:100%;height:290px;background:var(--white) url(/images/fadedlogo.jpg) no-repeat left top;background-position:14px 20px;margin:0 auto 120px}.ErrorDisplay_errorCode__AlZal{border-right:1px solid var(--blue-gray-100);color:var(--blue-gray-500);float:left;font-size:1.3em;height:290px;line-height:370px;margin:0 25px 0 0;vertical-align:bottom;text-align:center;width:200px}.ErrorDisplay_errorBox__jL_9h h1{font-weight:400;margin-bottom:0}.ErrorDisplay_errorBox__jL_9h h2{font-size:.9em;font-weight:400;margin-top:0}.ErrorDisplay_errorBox__jL_9h h3{font-size:1em;font-weight:700;margin:10px 0}.ErrorDisplay_errorBox__jL_9h ul{list-style-type:none}.ErrorDisplay_errorBox__jL_9h ul li{background:transparent url(/images/arrow.png) no-repeat left 6px;float:left;font-size:.813em;font-weight:400;list-style-type:none;margin:.313em;padding-left:20px;width:110px}.ErrorDisplay_middle__espDJ{padding-right:3.5em}.ErrorDisplay_searchSection__1J_EK{background:var(--blue-gray-100) url(/images/searchbg.jpg) repeat-x left top;border:1px solid var(--blue-gray-300);float:left;padding:10px;margin-top:20px}.ErrorDisplay_searchSection__1J_EK form{display:flex}.ErrorDisplay_searchSection__1J_EK button{background:url(/images/searchbutton.jpg) repeat-x scroll 0 0 #ffb762;border:1px solid #db9b51;color:var(--blue-gray-800);cursor:pointer;float:left;font-size:1em;margin:0 0 0 .8px;padding:9px 15px;outline:0 none;text-decoration:none;text-shadow:1px 1px 1px var(--white);vertical-align:top}.ErrorDisplay_searchSection__1J_EK button span{background:#ffb762 url(/images/magnifier.jpg) no-repeat 0 0;padding:0 8px;margin-left:5px;text-decoration:none}.ErrorDisplay_errorSearchBox__Uglib{border-color:var(--blue-gray-500) var(--blue-gray-400) var(--blue-gray-400) var(--blue-gray-500);border-width:1px;color:var(--blue-gray-600);float:left;font-size:13px;margin-left:2px;padding:9px;vertical-align:top;width:350px}@media screen and (max-width:768px){.ErrorDisplay_searchSection__1J_EK{width:calc(100% - 240px)}.ErrorDisplay_errorSearchBox__Uglib{width:calc(100% - 128px);margin:0 auto}}.ToastManager_root__mVUMQ{position:fixed;inset-block-end:0;inset-inline:0;display:grid;justify-items:flex-end;justify-content:flex-end;grid-gap:1vh;gap:1vh;padding-block-end:5vh;padding-right:1rem;pointer-events:none;z-index:var(--toast-index)}@media only screen and (max-width:928px){.ToastManager_root__mVUMQ{justify-items:center;justify-content:center;padding-right:0;top:0;padding-block-start:2vh;inset-block-end:unset}}.Toast_root__ZhPa4{min-width:360px;max-width:360px;display:grid;grid-template-columns:max-content 1fr repeat(2,max-content);grid-gap:4px;gap:4px;background-color:var(--background);border-radius:8px;color:var(--white);padding-block:28px;padding-inline:24px;pointer-events:all;opacity:1;transition:opacity .3s ease-in-out}@starting-style{.Toast_root__ZhPa4{opacity:0}}.Toast_info__g9NV8{--background:var(--midnight-green-dark)}.Toast_success__sWJ1E{--background:var(--color-success)}.Toast_error__SQpXK{--background:var(--color-error)}.Toast_warning__7GyxY{--background:var(--color-warning)}.Toast_root__ZhPa4>svg{flex-shrink:0;margin-top:2px}.Toast_content__whMkq{font-weight:400;font-size:16px;line-height:24px;word-wrap:break-word}.Toast_separator__dUZVN{width:1px;background-color:var(--blue-gray-500);opacity:.3;margin-inline:8px}.Toast_dismiss___YbdO{color:var(--blue-gray-300);cursor:pointer}.Toast_dismiss___YbdO:hover{color:var(--white)}.PortalsContainer_drawerRoot__esMLC{position:fixed;top:0;left:0}.PortalsContainer_bannerRoot__Q_sNw{position:relative}.PortalsContainer_drawerRoot__esMLC{z-index:101} /*# sourceMappingURL=7e3bcc314180c812.css.map*/</style><style>.SlideshowScreen_root__k9j1_{width:100%;max-width:var(--max-content-width);position:relative;display:grid;place-content:flex-start;grid-template-columns:minmax(0,1fr) var(--sidebar-size);grid-template-rows:auto auto 1fr;background-color:var(--white);padding-block:1px;padding-inline:clamp(1rem,-1.6rem + 8vw,8rem);margin-inline:auto}.SlideshowScreen_root__k9j1_.SlideshowScreen_withKeyMoments__RbHLe{grid-template-columns:var(--key-moments-size) minmax(0,1fr) var(--sidebar-size)}.SlideshowScreen_root__k9j1_.SlideshowScreen_withSections__cJqYu{grid-template-columns:var(--sections-size) minmax(0,1fr) var(--sidebar-size)}.SlideshowScreen_root__k9j1_:before{content:"";position:absolute;inset:0 0 auto;height:1px;background-color:var(--blue-gray-200);margin-inline:-50vw}.SlideshowScreen_root__k9j1_ .sidebar{border-left:1px solid var(--blue-gray-200);grid-row:1/-1;grid-column:2}.SlideshowScreen_root__k9j1_.SlideshowScreen_withKeyMoments__RbHLe .sidebar{grid-column:3}.SlideshowScreen_root__k9j1_ .metadata{grid-column:1/-2;grid-row:1}.SlideshowScreen_root__k9j1_ .metadata-toolbar{grid-column:1/-2;grid-row:2}.SlideshowScreen_root__k9j1_ .player{grid-column:1}@media screen and (min-width:929px){.SlideshowScreen_root__k9j1_.SlideshowScreen_withKeyMoments__RbHLe .player{grid-column:2;grid-row:3}}.SlideshowScreen_root__k9j1_.SlideshowScreen_withKeyMoments__RbHLe .key-moments{grid-column:1;grid-row:3}@media screen and (min-width:929px){.SlideshowScreen_root__k9j1_.SlideshowScreen_withKeyMoments__RbHLe .player{border-left:1px solid var(--blue-gray-200)}.SlideshowScreen_root__k9j1_.SlideshowScreen_withKeyMoments__RbHLe .metadata{padding-inline-end:24px}}@media screen and (min-width:929px) and (max-width:1050px){.SlideshowScreen_root__k9j1_.SlideshowScreen_withKeyMoments__RbHLe{grid-template-columns:var(--key-moments-size) minmax(0,1fr);padding-inline:0}.SlideshowScreen_root__k9j1_.SlideshowScreen_withKeyMoments__RbHLe .metadata,.SlideshowScreen_root__k9j1_.SlideshowScreen_withKeyMoments__RbHLe .metadata-toolbar{grid-column:1/-1;padding-inline:16px}}@media screen and (max-width:928px){.SlideshowScreen_root__k9j1_:before{display:none}.SlideshowScreen_root__k9j1_.SlideshowScreen_withKeyMoments__RbHLe{grid-template-columns:minmax(0,1fr)!important}.SlideshowScreen_root__k9j1_ .metadata,.SlideshowScreen_root__k9j1_ .metadata-toolbar,.SlideshowScreen_root__k9j1_ .player{grid-column:1/-1}}.PrivateContentScreen_root__qdfD9{gap:30px}.PasswordForm_root__Pnyoo,.PrivateContentScreen_root__qdfD9{min-height:calc(100svh - 2 * var(--header-height));background-color:var(--blue-gray-100);display:flex;flex-direction:column;align-items:center;justify-content:center}.PasswordForm_root__Pnyoo{gap:20px}.Form_root__NTbyO{display:flex;flex-direction:column;gap:10px}.Form_root__NTbyO button[type=submit]{align-self:flex-start}.Button_root__i1yp0{--size:44px;--foreground:var(--white);--background:var(--celadon-blue);--border:var(--celadon-blue);--fontSize:16px;--padding-x:14px;position:relative;min-width:48px;min-height:var(--size);display:flex;align-items:center;border-radius:4px;border:none;background-color:var(--background);color:var(--foreground);font-size:var(--fontSize);font-weight:var(--font-weight-medium);padding-inline:var(--padding-x);transition:color .2s ease-in-out,background-color .2s ease-in-out;cursor:pointer}.Button_root__i1yp0 span{display:flex;align-items:center;gap:4px;opacity:1;transition:opacity .2s ease-in-out}.Button_large__Yv_oe{--fontSize:18px;--size:48px;--padding-x:20px}.Button_regular__i28NX{--fontSize:18px;--size:44px}.Button_medium__H8pKi{--size:40px}.Button_small__sqsEx{--size:32px;--padding-x:12px}.Button_xsmall__jBPCG{--fontSize:14px;--size:24px;--padding-x:8px}.Button_root__i1yp0.Button_icon__1C4qi{justify-content:center;min-width:24px;padding:0}.Button_icon__1C4qi{width:var(--size);height:var(--size)}.Button_spinner__iLPXf{position:absolute;top:50%;left:50%;transform:translate(-50%,-50%);opacity:0;visibility:hidden;transition:opacity .2s ease-in-out,visibility .2s ease-in-out}.Button_loading__ZYqeE .Button_spinner__iLPXf{opacity:1;visibility:visible;transition-delay:0s}.Button_loading__ZYqeE span{opacity:0}.Button_fullWidth__dRbM6{width:100%;justify-content:center}.Button_fullWidth__dRbM6 span{justify-content:center}.Button_disabled__M5jJf{opacity:.8;pointer-events:none;-webkit-user-select:none;-moz-user-select:none;user-select:none}.Button_primary__K25Gq.Button_contained__gyjai{--foreground:var(--white);--background:var(--celadon-blue);--border:var(--celadon-blue)}.Button_primary__K25Gq.Button_contained__gyjai:active,.Button_primary__K25Gq.Button_contained__gyjai:hover{--background:var(--celadon-blue-dark);--border:var(--celadon-blue-dark)}.Button_primary__K25Gq.Button_outlined__oZHqK{border:1px solid var(--border);--foreground:var(--celadon-blue-dark);--background:transparent;--border:var(--celadon-blue-dark)}.Button_primary__K25Gq.Button_outlined__oZHqK:hover{--foreground:var(--blue-gray-800);--background:rgba(var(--celadon-blue-rgb),0.05);--border:var(--blue-gray-800)}.Button_primary__K25Gq.Button_outlined__oZHqK:active{--foreground:var(--celadon-blue-dark);--background:rgba(var(--celadon-blue-rgb),0.1);--border:var(--celadon-blue)}.Button_primary__K25Gq.Button_text__ZT_3O{--foreground:var(--celadon-blue-dark);--background:transparent;--border:transparent}.Button_primary__K25Gq.Button_text__ZT_3O:hover{--foreground:var(--celadon-blue-dark);--background:rgba(var(--celadon-blue-rgb),0.05);--border:transparent}.Button_primary__K25Gq.Button_text__ZT_3O:active{--foreground:var(--celadon-blue);--background:rgba(var(--celadon-blue-rgb),0.1);--border:transparent}.Button_secondary__hHiHI.Button_contained__gyjai{--foreground:var(--white);--background:var(--blue-gray-600);--border:var(--blue-gray-600)}.Button_secondary__hHiHI.Button_contained__gyjai:hover{--background:var(--blue-gray-700);--border:var(--blue-gray-700)}.Button_secondary__hHiHI.Button_contained__gyjai:active{--background:var(--blue-gray-500);--border:var(--blue-gray-500)}.Button_secondary__hHiHI.Button_outlined__oZHqK{border:1px solid var(--border);--foreground:var(--blue-gray-600);--background:transparent;--border:var(--blue-gray-600)}.Button_secondary__hHiHI.Button_outlined__oZHqK:hover{--foreground:var(--blue-gray-700);--background:rgba(var(--blue-gray-600-rgb),0.05);--border:var(--blue-gray-700)}.Button_secondary__hHiHI.Button_outlined__oZHqK:active{--foreground:var(--blue-gray-600);--background:rgba(var(--blue-gray-600-rgb),0.1);--border:var(--blue-gray-500)}.Button_secondary__hHiHI.Button_regular__i28NX{border:1px solid var(--border);--foreground:var(--blue-gray-700);--background:var(--white);--border:var(--blue-gray-200)}.Button_secondary__hHiHI.Button_regular__i28NX:hover{--background:var(--blue-gray-100)}.Button_secondary__hHiHI.Button_text__ZT_3O{--foreground:var(--blue-gray-600);--background:transparent;--border:transparent}.Button_secondary__hHiHI.Button_text__ZT_3O:hover{--foreground:var(--blue-gray-700);--background:rgba(var(--blue-gray-600-rgb),0.05);--border:transparent}.Button_secondary__hHiHI.Button_text__ZT_3O:active{--foreground:var(--blue-gray-600);--background:rgba(var(--blue-gray-600-rgb),0.1);--border:transparent}.Button_tertiary__ae6C5{--foreground:var(--blue-gray-700);--background:var(--white);border:1px solid var(--blue-gray-200)}.Button_tertiary__ae6C5:hover{--background:var(--blue-gray-100)}.Button_tertiary__ae6C5.Button_active__YNf7E,.Button_tertiary__ae6C5:active{--background:var(--blue-gray-200)}.Dropdown_container__NBOZ_{display:flex;flex-direction:column;gap:8px;font-family:var(--font-family);width:100%;max-width:280px}.Dropdown_select__8pQOA{border:1px solid var(--blue-gray-500);border-radius:4px;font-size:16px;font-weight:400;color:var(--blue-gray-900);margin:0;padding:8px 20px 8px 8px;background:transparent}.Dropdown_select__8pQOA:hover{border:1px solid var(--blue-gray-600);background:transparent}.Dropdown_select__8pQOA:focus{outline:none;border:1px solid var(--celadon-blue)}.Dropdown_footerText__NChWz{color:var(--blue-gray-600);font-size:11px;font-weight:400}.Dropdown_error__QI4FY{border:1px solid var(--color-error)}.Label_label__KH246{font-weight:600;font-size:14px;font-family:var(--font-family);color:var(--blue-gray-600);margin:0;-webkit-user-select:none;-moz-user-select:none;user-select:none}.Label_error__jqh1I{color:var(--color-error)}.RequiredNotice_required___q_RJ{display:flex;align-items:center;gap:8px;color:var(--blue-gray-600);font-size:11px;font-weight:400}.RequiredNotice_error__eBy3b{color:var(--color-error)}.Input_container__QSkRF{display:flex;flex-direction:column;gap:8px;font-family:var(--font-family);width:100%;max-width:280px}.Input_input__Q0qP2{padding:8px;border:1px solid var(--blue-gray-500);border-radius:4px;font-size:16px;font-weight:400;color:var(--blue-gray-900);margin:0;height:46px}.Input_input__Q0qP2:hover{border:1px solid var(--blue-gray-600)}.Input_input__Q0qP2:focus{outline:none;border:1px solid var(--celadon-blue)}.Input_error__l9OaT{border:1px solid var(--color-error)}.Input_characterLimit__4NkYE{color:var(--blue-gray-600);font-size:11px;font-weight:400}.Input_characterLimitError__ZByP3{color:var(--color-error)}.Input_footer__55AdV{display:flex;justify-content:space-between}.Input_footerAlignRight__DG8UZ{justify-content:flex-end}.Text_root__is73U{display:inline-block;padding:0;margin:0}.Text_primary__rZf7F{color:var(--blue-gray-900)}.Text_secondary__EPWj0{color:var(--blue-gray-600)}.Text_success__Mcw5I{color:var(--color-success)}.Text_error__pdEO6{color:var(--color-error)}.Text_warning__xCiZk{color:var(--color-warning)}.Text_white__Sb1IU{color:#fff}.Text_rowTitle__U1gB1{font-size:28px;line-height:35px}.Text_xlarge__X3NtK{font-size:20px;line-height:26px}.Text_large__c_Tar{font-size:18px;line-height:26px}.Text_medium__rk8Tn{font-size:16px;line-height:22px}.Text_small__S0zKm{font-size:14px;line-height:18px}.Text_xsmall__vYp9p{font-size:12px;line-height:15px}.Text_xxsmall__kOJdm{font-size:11px;line-height:14px}.Text_disabled___vAZA{color:var(--blue-gray-500)}.Text_italic__ZZFbJ{font-style:italic}.Text_weight-light__Rh8tc{font-weight:300}.Text_weight-regular__gWC16{font-weight:400}.Text_weight-medium__oIdYz{font-weight:500}.Text_weight-strong__yEO2S{font-weight:600}.Text_weight-bold__xnsIS{font-weight:700}.Text_ellipsis__QNjvO{max-width:100%;overflow:hidden;text-overflow:ellipsis;white-space:nowrap}.Text_lineClamp__SO_Pl{overflow:hidden;text-overflow:ellipsis;display:-webkit-box;-webkit-box-orient:vertical}.TextArea_container__oc_q4{display:flex;flex-direction:column;gap:8px;font-family:var(--font-family);width:100%;max-width:280px}.TextArea_textarea__VyrNQ{padding:8px;border:1px solid var(--blue-gray-500);border-radius:4px;font-size:16px;font-weight:400;color:var(--blue-gray-900);font-family:var(--font-family);min-height:150px;margin:0}.TextArea_textarea__VyrNQ:hover{border:1px solid var(--blue-gray-600)}.TextArea_textarea__VyrNQ:focus{outline:none;border:1px solid var(--celadon-blue);background:transparent}.TextArea_error__o_XpL{border:1px solid var(--color-error)}.TextArea_characterLimit__hm9El{color:var(--blue-gray-600);font-size:11px;font-weight:400}.TextArea_characterLimitError__UbPM9{color:var(--color-error)}.TextArea_footer__EG4wA{display:flex;justify-content:space-between}.TextArea_footerAlignRight__PmO7Z{justify-content:flex-end}.TagInput_container__4lPGD{display:flex;flex-direction:column;gap:8px;font-family:var(--font-family);width:100%;max-width:280px}.TagInput_input__lsGqa{border:none;flex:1 1;min-width:100px;height:30px}.TagInput_tag__9BE6f{border-radius:20px;padding:4px 8px;border:1px solid var(--blue-gray-300);display:flex;gap:8px;font-size:14px;color:var(--blue-gray-600);font-weight:600;align-items:center}.TagInput_closeTag__oeDgn{border:none;background-color:transparent;padding:0;color:var(--blue-gray-500);font-size:10px;margin:0}.TagInput_closeTag__oeDgn:hover{opacity:.75;cursor:pointer}.TagInput_inputContainer__dl2dW{box-sizing:border-box;padding:8px;border:1px solid var(--blue-gray-500);border-radius:4px;font-size:16px;font-weight:400;color:var(--blue-gray-900);width:100%;display:flex;gap:8px}.TagInput_inputContainer__dl2dW:hover{border:1px solid var(--blue-gray-600)}.TagInput_input__lsGqa:focus{outline:none;border-radius:4px;border:1px solid var(--celadon-blue)}.TagInput_error__INAMJ{border:1px solid var(--color-error)}.TagInput_errorText__Dq2QW{display:flex;align-items:center;gap:8px;color:var(--color-error);font-size:11px;font-weight:400}.TagInput_autocompleteContainer__RgOvw{position:relative}.TagInput_autocomplete__nGD9D{background-color:var(--white);display:flex;flex-direction:column;width:100%;position:absolute;left:0;right:0;top:-8px;box-shadow:0 .5px 5px rgba(0,0,0,.039),0 3.75px 11px rgba(0,0,0,.19);border-radius:4px;overflow-y:scroll;z-index:3}.TagInput_suggestion__k4kfh{padding:8px;color:var(--blue-gray-600);font-weight:600;text-decoration:underline;text-underline-offset:1.5px}.TagInput_suggestion__k4kfh:hover{cursor:pointer;color:var(--blue-gray-600)}.TagInput_focusedSuggestion__QnSXo,.TagInput_suggestion__k4kfh:hover{background-color:var(--blue-gray-200)}.TagInput_tagContainer__LflB5{display:flex;gap:8px;flex-wrap:wrap;width:100%}.TagInput_footerText__O_1t4{color:var(--blue-gray-600);font-size:11px;font-weight:400}.Selector_container__v2jVr{display:flex;flex-direction:column;gap:8px;font-family:var(--font-family);width:100%;max-width:280px}.Selector_selector__U2foh{border-radius:4px;display:flex;width:100%}.Selector_selector__U2foh button{border:1px solid var(--blue-gray-500);padding:6px 0;flex:1 1;margin:0;background-color:transparent}.Selector_selector__U2foh button:enabled:hover{cursor:pointer;background-color:var(--blue-gray-300)}.Selector_selector__U2foh button:first-child{border-radius:4px 0 0 4px}.Selector_selector__U2foh button:last-child{border-radius:0 4px 4px 0}.Selector_selector__U2foh button.Selector_selected__nyxjH{border:1px solid var(--celadon-blue);background-color:var(--celadon-blue)}.Selector_selector__U2foh button.Selector_selected__nyxjH .Selector_text__Rs7F7{color:var(--white)}.Selector_selector__U2foh button.Selector_selected__nyxjH:focus{outline-offset:4px}.Selector_selectorContainer__h4Mg1{display:flex;align-items:center;gap:4px}.Selector_icon__Y9S90{color:var(--blue-gray-500)}.Selector_text__Rs7F7{margin:0;font-weight:400;font-size:16px;font-family:Source Sans Pro,sans-serif}.IconWithExplanation_container__21T3S{position:relative;display:inline-flex}.IconWithExplanation_explanation___qwbw{position:absolute;top:50%;transform:translateY(-50%);left:120%;background-color:#fff;border-radius:4px;box-shadow:0 .5px 5px rgba(0,0,0,.039),0 3.75px 11px rgba(0,0,0,.19);z-index:3;padding:8px;width:150px}.IconWithExplanation_container__21T3S:hover .IconWithExplanation_explanation___qwbw{display:block}.IconWithExplanation_arrow__fCL_Y{content:"";position:absolute;left:-10px;margin-left:-5px;top:50%;transform:translateY(-50%);border:10px solid transparent;border-right-color:#fff}@media (max-width:768px){.IconWithExplanation_arrow__fCL_Y{margin-right:-5px;margin-left:0;border-color:transparent transparent transparent #fff;left:auto;right:-10px}.IconWithExplanation_explanation___qwbw{left:auto;right:120%}}.Checkbox_wrapper__HI5JR{display:flex;gap:10px;align-items:center}.Checkbox_input__RZSBL:hover,.Checkbox_label__7BF2Y:hover,.Checkbox_wrapper__HI5JR:hover{cursor:pointer}.Checkbox_wrapper__HI5JR .Checkbox_label__7BF2Y{font-weight:400;color:var(--blue-gray-900);margin:0}.Checkbox_wrapper__HI5JR .Checkbox_input__RZSBL{width:20px;height:20px;accent-color:var(--celadon-blue);margin:0}.Checkbox_wrapper__HI5JR:hover .Checkbox_input__RZSBL{accent-color:var(--celadon-blue-dark)}.Checkbox_wrapper__HI5JR:hover .Checkbox_label__7BF2Y{color:var(--celadon-blue-dark)}.RadioButton_root__592m2{--size:16px;--borderSize:2px;display:inline-flex;align-items:center;justify-content:flex-start;gap:12px;padding-block:8px;cursor:pointer}.RadioButton_root__592m2.RadioButton_large__K_9NI{--size:24px}.RadioButton_root__592m2.RadioButton_rtl__rAcql{font-size:16px;justify-content:space-between}.RadioButton_root__592m2:hover:not(.RadioButton_labelOnLeft__nb96s){font-weight:600}.RadioButton_root__592m2 input[type=radio]{position:relative;width:var(--size);height:var(--size);-webkit-appearance:none;-moz-appearance:none;appearance:none;background-color:transparent;margin:0;border:var(--borderSize) solid var(--blue-gray-500);border-radius:100vmax}.RadioButton_root__592m2 input[type=radio]:before{content:"";position:absolute;top:50%;left:50%;display:block;width:calc(var(--size) / 2);height:calc(var(--size) / 2);background-color:var(--celadon-blue);border-radius:100vmax;translate:-50% -50%;transition:scale .2s;scale:0}.RadioButton_root__592m2.RadioButton_checked__dJL5R input[type=radio]{border-color:var(--celadon-blue)}.RadioButton_root__592m2.RadioButton_checked__dJL5R input[type=radio]:before{scale:1}.Banner_root__pOnAN{--background:var(--celadon-blue-dark);width:100vw;height:40px;display:flex;align-items:center;justify-content:center;background-color:var(--background);color:var(--white);font-size:var(--font-size-medium);font-weight:var(--font-weight-medium);opacity:0;visibility:hidden;transition:opacity .2s ease-in-out,visibility .2s ease-in-out;z-index:1}.Banner_visible__q1NMx{opacity:1;visibility:visible;transition-delay:0s}.Banner_aboveHeader__hC_i_{position:static;top:0}.Banner_belowHeader__Mcfew{position:absolute;top:var(--header-height)}.Banner_info__7SXSI{--background:var(--color-info)}.Banner_success__wveEs{--background:var(--color-success)}.Banner_error__lW5NB{--background:var(--color-error)}.Banner_warning__pEEt7{--background:var(--color-warning)}.Metadata_root__oCstk{display:grid;grid-template-columns:repeat(2,minmax(0,1fr));place-content:flex-start;padding-block-start:32px}.Metadata_root__oCstk .author{grid-column:1;grid-row:3;align-content:flex-start}.Metadata_root__oCstk .description,.Metadata_root__oCstk .pills-list,.Metadata_root__oCstk .stats,.Metadata_root__oCstk .title{grid-column:1/span 2}.Metadata_root__oCstk .title{margin-bottom:8px}.Metadata_root__oCstk .stats{margin-bottom:12px}.Metadata_root__oCstk .description{margin-top:12px}.Metadata_root__oCstk .pills-list{margin-block-start:20px;margin-block-end:18px}@media screen and (max-width:928px){.Metadata_root__oCstk{margin-block:8px 20px}.Metadata_root__oCstk .stats{margin-bottom:16px}.Metadata_root__oCstk .description{margin-top:0}.Metadata_root__oCstk .author{grid-column:2;grid-row:5;margin-block-start:12px;margin-block-end:6px;justify-content:end}.Metadata_root__oCstk.Metadata_authorInDescription__hW1wb:not(.Metadata_expanded__uLdy4) .author{display:none}.Metadata_root__oCstk.Metadata_authorInDescription__hW1wb.Metadata_expanded__uLdy4 .author{display:flex;grid-column:1/span 2;grid-row:5;justify-content:flex-start;margin-block-start:12px}.Metadata_root__oCstk .pills-list{margin-block-start:16px;margin-block-end:0}}.Metadata_root__oCstk .metadata-recs{grid-column:1/-1}.Title_root__svkHQ{font-size:clamp(26px,1vw + 1rem,28px);font-weight:600;line-height:1.25;min-width:0;word-break:break-word}.Heading_heading__3MAvZ,.Title_root__svkHQ{color:var(--blue-gray-900)}.Heading_h1__3k7S2{font-size:32px;font-weight:700}.Heading_h2__f9yvs{font-size:28px;font-weight:600}.Heading_h3__f1djd{font-size:24px}.Heading_h4__7tfLE{font-size:20px}.Heading_h5__jVM0l{font-size:16px;font-weight:400}.Heading_h6__uUTrd{font-size:14px;font-weight:400}.Stats_root__p_BoZ{display:flex;-moz-column-gap:6px;column-gap:6px;align-items:center;flex-wrap:wrap;color:var(--blue-gray-600);font-size:1rem}.Stats_bullet__DbT30:after{content:"•"}@media screen and (max-width:928px){.Stats_formatBullet__AHEoj{width:100%}.Stats_formatBullet__AHEoj:after{content:""}}.Likes_root__WVQ1_{cursor:pointer;transition:color .2s ease-in-out;border-radius:4px}.Likes_root__WVQ1_:hover{color:var(--blue-gray-700)}.LikeModal_more__R9uAk{justify-self:center;color:var(--celadon-blue);font-weight:500;opacity:0;visibility:hidden;transition:opacity .2s ease-in-out,visibility .2s ease-in-out}.LikeModal_more__R9uAk.LikeModal_visible__t1vr4{opacity:1;visibility:visible;transition-delay:0s}.LikesUserListSkeleton_root__pUbb3{display:flex;flex-direction:column;gap:12px}.LikesUserListSkeleton_root__pUbb3 .skeleton:first-child{grid-row:1/span 2}.LikesUserListSkeleton_item__mONV4{display:grid;grid-template-columns:max-content 1fr;grid-column-gap:12px;-moz-column-gap:12px;column-gap:12px;grid-row-gap:4px;row-gap:4px}.Modal_root__TYkzh[open]{transform:translateY(0)}.Modal_root__TYkzh{--max-height:calc(100dvb - var(--header-height));--title-size:80px;width:-moz-max-content;width:max-content;max-height:var(--max-height);place-self:center;border-radius:var(--border-radius);transform:translateY(8px)}@starting-style{.Modal_root__TYkzh[open]{transform:translateY(8px)}}.Modal_root__TYkzh.Modal_small__hupRE{width:400px}.Modal_root__TYkzh.Modal_medium__j8NOV{width:600px}.Modal_root__TYkzh.Modal_large__ygVmr{width:800px}.Modal_root__TYkzh.Modal_xlarge__HeXWk{width:960px}.Modal_wrapper__4UTGq{position:relative;display:grid}.Modal_wrapper__4UTGq .modal-content{flex:1 1;max-height:calc(var(--max-height) - var(--title-size));overflow:clip auto}@media screen and (max-width:520px){.Modal_root__TYkzh,.Modal_root__TYkzh.Modal_large__ygVmr,.Modal_root__TYkzh.Modal_medium__j8NOV,.Modal_root__TYkzh.Modal_small__hupRE,.Modal_root__TYkzh.Modal_xlarge__HeXWk{width:100vw}}@media screen and (max-width:928px){.Modal_root__TYkzh.Modal_bottomPlacement__BUbfp{width:100vw;top:unset;bottom:0;border-bottom-left-radius:0;border-bottom-right-radius:0}}.Modal_title__xhSfl{height:var(--title-size);line-height:var(--title-size);color:var(--blue-gray-900);font-size:20px;font-weight:600;border-bottom:1px solid var(--blue-gray-200);padding-inline-start:20px;padding-inline-end:60px}.Modal_title__xhSfl:first-letter{text-transform:capitalize}.Modal_content__R1F4d{padding-inline:20px;padding-block:24px}.Modal_root__TYkzh:has(.Modal_actions__t63hZ) .Modal_content__R1F4d{padding-block-end:96px}.Modal_actions__t63hZ{position:absolute;inset-inline:0;bottom:0;display:flex;align-items:center;justify-content:flex-end;gap:24px;background-color:var(--white);padding-inline:20px;padding-block:16px}.ViewModal_content__GPKXy{padding-block:0}.ViewModal_row__xLxnz{display:flex;justify-content:space-between;border-bottom:1px dashed var(--blue-gray-300);color:var(--blue-gray-800);padding:16px 0}.ViewModal_row__xLxnz:last-child{border-bottom:none}.Author_link___lVxw,.Author_root___6Bx5{display:flex;align-items:center;gap:8px}.Author_link___lVxw{color:var(--blue-gray-800);font-size:var(--font-size-large);font-weight:600;text-decoration:none;transition:color .15s}.Author_link___lVxw:hover{color:var(--celadon-blue-dark)}.Avatar_root__GNWHY{display:inline-flex;align-items:center;justify-content:center;flex-shrink:0;background-color:var(--white);color:var(--blue-gray-300);border-radius:50%;font-size:16px;font-weight:600;text-align:center;-webkit-user-select:none;-moz-user-select:none;user-select:none;overflow:hidden}.Avatar_initials__EJfVt{color:var(--white);transition:background-color .2s ease-in-out}.Avatar_initials__EJfVt,.Avatar_initials__EJfVt:hover{background-color:var(--blue-gray-600)}.Avatar_image__Bbtll{width:100%;height:100%;-o-object-fit:cover;object-fit:cover}.Description_root__kt4uq{--line-height:26px;position:relative}.Description_root__kt4uq.Description_clamped__PaV_1{padding-bottom:25px}.Description_root__kt4uq.Description_clamped__PaV_1 .Description_wrapper__hYE9_{mask-image:linear-gradient(to bottom,var(--white),transparent);-webkit-mask-image:linear-gradient(to bottom,var(--white),transparent)}.Description_wrapper__hYE9_{min-height:var(--line-height);display:-webkit-box;overflow:hidden;text-overflow:ellipsis;-webkit-box-orient:vertical;-webkit-line-clamp:2}.Description_noClamp__1z7c5,.Description_wrapper__hYE9_.Description_expanded__lRamt{-webkit-line-clamp:unset;-webkit-mask-image:none;mask-image:none}.Description_wrapper__hYE9_.Description_expanded__lRamt{height:auto}.Description_wrapper__hYE9_ p{color:var(--blue-gray-600);font-size:18px;line-height:var(--line-height);white-space:pre-wrap;word-break:break-word}.Description_root__kt4uq button{padding-inline:0}.Description_root__kt4uq .Description_more__ChrRK{position:absolute;padding:0;bottom:0;height:26px}.Description_root__kt4uq .Description_less__BvWbY{display:none}@media screen and (max-width:928px){.Description_root__kt4uq .Description_more__ChrRK{right:0;background-color:#fff}.Description_root__kt4uq.Description_clamped__PaV_1{padding-bottom:0}.Description_root__kt4uq .Description_less__BvWbY,.Description_root__kt4uq .Description_more__ChrRK{display:flex;height:var(--line-height)}}.Description_root__kt4uq .Description_less__BvWbY.Description_hidden__a9QZJ,.Description_root__kt4uq .Description_more__ChrRK.Description_hidden__a9QZJ{display:none}.PillsList_root__2EydN{display:flex;flex-wrap:wrap;align-items:center;gap:8px}.Pill_root__IqOYH{--bg:color-mix(in srgb,var(--celadon-blue-dark),90% transparent);--color:var(--blue-gray-800);height:40px;display:inline-flex;align-items:center;gap:6px;background-color:var(--bg);border-radius:100vmax;color:var(--color);font-size:16px;font-weight:600;padding-inline:16px;transition:color .2s ease-in-out,background-color .2s ease-in-out,filter .2s ease-in-out;cursor:pointer;-webkit-user-select:none;-moz-user-select:none;user-select:none;text-decoration:none;white-space:nowrap}.Pill_root__IqOYH:not(.Pill_selected__VPtHm):hover{filter:brightness(.6)}.Pill_root__IqOYH.Pill_selected__VPtHm{--bg:var(--blue-gray-900);--color:var(--white)}@media screen and (max-width:520px){.Pill_root__IqOYH{height:28px;padding-inline:12px;gap:4px;font-size:12px}.Pill_icon__xE_Cg{--size:18px!important}}.MetadataToolbar_root__c03ao{--shadow-opacity:0;position:sticky;display:grid;height:var(--metadata-toolbar-height);background-color:var(--white);z-index:var(--header-index)}.MetadataToolbar_root__c03ao.MetadataToolbar_withStickyHeader__EDA4C{top:var(--header-height)}.MetadataToolbar_wrapper__r7XEc{position:relative;display:grid;grid-template-columns:minmax(0,1fr) max-content 1fr;align-items:center;padding-inline-end:20px;padding-block:16px}.MetadataToolbar_underline__QQn0C{grid-column:1/-1;grid-row:2;height:1px;position:absolute;bottom:0;right:-20px;left:-30vw;background-color:var(--blue-gray-200);box-shadow:0 2px 4px 0 rgba(0 0 0/var(--shadow-opacity));animation:MetadataToolbar_reveal-shadow__5yBxP linear both;animation-timeline:scroll(block);animation-range:150px 450px}.MetadataToolbar_title__jfTWv{font-size:18px;font-weight:600}.MetadataToolbar_actions__FB33C{width:-moz-max-content;width:max-content;justify-self:flex-end;align-self:flex-start;display:flex;grid-column-end:-1}.MetadataToolbar_pageNumber__i6Bhj{display:inline-flex;align-items:center;margin-inline:1em;height:44px}@media screen and (max-width:928px){.MetadataToolbar_root__c03ao{display:none}}@keyframes MetadataToolbar_reveal-shadow__5yBxP{to{--shadow-opacity:0.122}}.Actions_root__00yIC{display:flex;gap:6px;align-items:baseline;min-height:44px}@media screen and (max-width:928px){.Actions_root__00yIC{min-height:35px}.Actions_root__00yIC .gallery-view-button{padding-inline:0;margin-inline-end:auto}}@media (min-width:929px){.Actions_root__00yIC button.fullscreen-button,.Actions_root__00yIC button.like-button,.Actions_root__00yIC button.more-button,.Actions_root__00yIC button.save-slideshow-button,.Actions_root__00yIC button.study-guide-button{--foreground:var(--blue-gray-700);border:1px solid var(--blue-gray-200)}}button.GalleryViewButton_root__s4Nw4{--size:32px;color:var(--blue-gray-700)}button.GalleryViewButton_root__s4Nw4:hover{background-color:transparent}@media only screen and (min-width:929px){button.GalleryViewButton_root__s4Nw4{display:none}}.Tooltip_root__7FS0Y{background:var(--midnight-green-dark);border-radius:4px;box-shadow:.5px 5px rgba(0,0,0,.04),0 4px 11px rgba(0,0,0,.2);color:var(--white);font-size:12px;line-height:15px;padding-inline:8px;padding-block:6px;margin:1ch}.SaveToListButton_root__T0ltL{margin:0}div.SaveToNewListModal_input__Fi90k{max-width:unset;margin-bottom:24px}.SaveToNewListModal_checkboxWrapper__y_w0m .SaveToNewListModal_checkboxLabel__lMiU9:hover,.SaveToNewListModal_checkboxWrapper__y_w0m:hover .SaveToNewListModal_checkboxLabel__lMiU9,.SaveToNewListModal_checkboxWrapper__y_w0m:hover .SaveToNewListModal_input__Fi90k{color:var(--blue-gray-800)}.SaveToNewListModal_checkboxWrapper__y_w0m .SaveToNewListModal_checkboxLabel__lMiU9{color:var(--blue-gray-800);font-weight:400;font-size:14px;flex-direction:column;display:flex;line-height:18px}.SaveToNewListModal_imageContainer__Dx4nD{display:flex;flex-direction:column;justify-content:center;align-items:center;width:178px;margin:0 auto 24px}.SaveToNewListModal_imageContainer__Dx4nD img{height:100px}.SaveToNewListModal_errorContainer__FBZPH{margin:16px 0}.ConfirmRemoveSavedModal_description__2EAEu{color:var(--blue-gray-800);font-weight:400;font-size:16px;line-height:20px;padding:24px 0}.MoreDropdownButton_root__ciXL6{width:100%;padding:0 16px}.MoreDropdownButton_list__VI5Ah{list-style-type:none;padding:0;margin:0}.MoreDropdownButton_item__t4HmI{margin:8px 0}.MoreDropdownButton_actionButton__gJ41E{color:var(--black);display:flex;align-items:center;font-size:16px;height:48px;gap:12px}.MoreDropdownButton_actionButton__gJ41E:focus{outline:none}.MoreDropdownButton_drawerHeading__chh4X{margin:24px 0;display:flex;align-items:center}.MoreDropdownButton_icon__DxfY4{color:var(--blue-gray-800)}.MoreDropdownButton_tooltip__az4od{white-space:nowrap}.MoreDropdownButton_trigger__x7wGs{width:44px;height:44px;color:var(--foreground);border-radius:4px}@media (max-width:928px){.MoreDropdownButton_trigger__x7wGs{width:32px;height:32px}}.ReportForm_root__REyLj{display:grid;grid-gap:12px;gap:12px;font-size:1rem;color:var(--blue-gray-800)}.ReportForm_root__REyLj label,.ReportForm_row__dXO5W{display:flex;align-items:center;gap:12px}.ReportForm_root__REyLj label{gap:8px}.ReportForm_root__REyLj label:has(input[type=radio]:checked){font-weight:600;color:var(--blue-gray-900)}.ReportForm_root__REyLj input[type=radio]{accent-color:var(--celadon-blue)}.ReportForm_root__REyLj select{width:100%;display:block;height:40px;-webkit-appearance:none;-moz-appearance:none;appearance:none;background:url('data:image/svg+xml;utf8,<svg fill="lightgray" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24px" height="24px"><path d="M7 10l5 5 5-5z"/></svg>') no-repeat right 8px center;border:1px solid var(--blue-gray-300);border-radius:4px;color:var(--blue-gray-600);font-size:1rem;padding-block:4px;padding-inline:16px;margin-block-start:8px}.ReportForm_root__REyLj select.changed{background-image:url('data:image/svg+xml;utf8,<svg fill="lightgray" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24px" height="24px"><path d="M7 10l5 5 5-5z"/></svg>');color:var(--blue-gray-900)}.ReportForm_root__REyLj a{color:var(--celadon-blue);font-weight:600;text-decoration:none}.ReportForm_root__REyLj p{color:var(--blue-gray-700)}.ReportForm_actions__LPSXn{display:flex;gap:12px;justify-content:flex-end;margin-block-start:8px}.ReportForm_copyrightPolicy__z8QMf{display:unset}.ReportForm_info__2Xs_1{max-width:200px;padding-inline:16px;padding-block:20px}.ReportForm_error__bC3zN{display:flex;align-items:center;gap:8px;border-radius:8px;background-color:#f2dede;color:var(--blue-gray-800);padding-inline:16px;padding-block:12px;margin-block-end:16px}.DownloadButton_root__adY00{margin-left:auto;display:inline-grid;gap:6px;justify-items:center;flex-shrink:0;text-align:center}.DownloadButton_savedStyling__k18od{font-weight:600;font-size:18px}.Player_root__L1AmF{position:relative;min-width:0;background-color:var(--snow-gray);padding:20px}.Player_root__L1AmF.Player_isInfographic__iQpvH{background-color:unset;padding-inline-start:1px;padding-inline-end:20px}@media (max-width:928px){.Player_root__L1AmF,.Player_root__L1AmF.Player_isInfographic__iQpvH{background-color:unset;padding-inline:2px}}.VerticalPlayer_root__K8_YS{position:relative;display:grid;grid-template-columns:minmax(0,1fr);grid-gap:24px;gap:24px}@media screen and (max-width:928px){.VerticalPlayer_root__K8_YS{gap:8px}}.VerticalSlide_root__jU_9r{position:relative}.VerticalSlide_root__jU_9r .vertical-slide-image{position:absolute;inset:0}.VerticalSlide_root__jU_9r .save-slide-button{background-color:var(--blue-gray-100)}@media only screen and (max-width:520px){.VerticalSlide_root__jU_9r .save-slide-button,.VerticalSlide_root__jU_9r .slide-download-button{--size:32px}}.VerticalSlideImage_root__64KSA{position:relative;width:100%;height:100%;box-shadow:0 0 0 1px var(--blue-gray-200);border-radius:8px;overflow:clip}.VerticalSlideImage_image__VtE4p{-o-object-fit:contain;object-fit:contain;opacity:1;transition:opacity .3s var(--ease);@starting-style{opacity:0}}.VerticalSlideActions_root__azvaH{display:flex;flex-direction:column;gap:12px;position:absolute;top:12px;right:12px;bottom:12px;opacity:1;transition:opacity .3s ease-in .1s;z-index:1}@starting-style{.VerticalSlideActions_root__azvaH{opacity:0}}button.VerticalSlideActions_downloadButton__ancDu{border-radius:4px;color:var(--blue-gray-700);background-color:var(--blue-gray-100)}button.VerticalSlideActions_fullscreen__5CkK_{background-color:var(--blue-gray-100);color:var(--blue-gray-700);margin-block-start:auto}@media (max-width:928px){.VerticalSlideActions_root__azvaH>div:first-child{display:none}}.FreestarVideoAd_root__KDWgl{min-width:0;flex-shrink:0;aspect-ratio:16/9}.VerticalInterstitialAdWrapper_root__LxQh8{container-type:inline-size;position:relative;display:grid;min-height:280px;overflow-x:clip}.VerticalInterstitialAdWrapper_root__LxQh8:has(.interstitial-ad-container.has-fetched):not(:has(.interstitial-ad-container.has-fetched .freestar-ad-container:not(.unfilled))){display:none}.VerticalInterstitialAdWrapper_root__LxQh8:has(div.interstitial-ad-container.has-fetched div.freestar-ad-container.filled div),.VerticalInterstitialAdWrapper_root__LxQh8:has(div.interstitial-ad-container.has-fetched div.freestar-ad-container.unfilled iframe){display:grid!important}.VerticalInterstitial_root__Dunl7{display:none}@container (max-width: 480px){.VerticalInterstitial_root__Dunl7{display:block;justify-self:center;align-self:center}}.FreestarAdContainer_root__qPPC_{position:relative;display:grid;place-content:center}.FreestarAdContainer_root__qPPC_.FreestarAdContainer_withFallback__A4lgm{aspect-ratio:var(--fallback-aspect-ratio)}.FreestarAdContainer_fallback__WreT9{inset:0;grid-template-columns:unset;place-content:center}.AdFallback_root__uAXsl{display:grid;justify-items:center;grid-template-columns:1fr;background-color:hsla(0,0%,97%,.9);z-index:0}.VerticalInterstitialDesktop_root__s5iTm{display:none;place-content:center}@container (min-width: 481px){.VerticalInterstitialDesktop_root__s5iTm{display:grid}}.BelowReaderAd_root__NKeGg{margin-top:16px;margin-bottom:60px}.BelowReaderAd_root__NKeGg.BelowReaderAd_desktop__7_JN7{display:block;justify-items:flex-start}.BelowReaderAd_root__NKeGg.BelowReaderAd_mobile__08T3d{display:none}.BelowReaderAd_root__NKeGg .fallback-ad{justify-self:flex-start}@media screen and (max-width:928px){.BelowReaderAd_root__NKeGg.BelowReaderAd_desktop__7_JN7{display:none}.BelowReaderAd_root__NKeGg.BelowReaderAd_mobile__08T3d{display:block;justify-items:center}}.Sidebar_root__1BbNu{width:var(--sidebar-size);max-height:100dvh;overflow:clip scroll;position:sticky;top:var(--metadata-toolbar-offset,0);display:flex;flex-direction:column;padding-inline-start:28px;padding-block-start:32px;padding-block-end:430px}.Sidebar_root__1BbNu.Sidebar_withStickyHeader__u8U46{top:var(--header-height)}@media (max-width:1050px){.Sidebar_root__1BbNu{display:none}}.AboveRecsAd_root__iTmTR{min-height:280px;margin-block-end:32px}.AboveRecsAd_root__iTmTR .freestar-ad-container{place-content:flex-start}@media (max-width:1050px){.AboveRecsAd_root__iTmTR .freestar-ad-container{place-content:center}}.AboveRecsAd_mobileAd__LYgqf{display:none}.AboveRecsAd_desktopAd__ymykj{display:block}@media (max-width:1050px){.AboveRecsAd_mobileAd__LYgqf{display:block}.AboveRecsAd_desktopAd__ymykj{display:none}}.RailRecommendations_root__zqtZQ{display:flex;flex-direction:column;gap:8px;padding-block-end:24px}.RailRecommendations_title__kt1D2{font-size:24px;color:var(--blue-gray-900);font-weight:600;margin-block-end:20px}.RailCard_root__rZUGY{--card-hover-background:var(--blue-gray-100);width:100%;position:relative;padding-block:12px}.RailCard_root__rZUGY.slideshow-card{grid-template-columns:160px minmax(0,1fr);grid-template-rows:auto;gap:12px}.RailCard_root__rZUGY .slideshow-card-content{padding:0}.RailCard_link__d3BBm{z-index:1}.RailCard_root__rZUGY .RailCard_title__Tvfiv{font-size:16px}.RailCard_stats__ZvZms .text{font-size:12px}.RailCard_root__rZUGY .RailCard_author__JYeYZ{color:var(--blue-gray-700);text-decoration:none}@media screen and (min-width:929px){.RailCard_root__rZUGY.RailCard_hasDescription__MjSgf:hover{background-color:var(--blue-gray-100)}}.SlideshowCard_root__pD8t4{position:relative;display:grid;grid-template-rows:max-content minmax(0,1fr);grid-template-columns:minmax(0,1fr);align-content:flex-start;color:var(--blue-gray-600)}.SlideshowCard_root__pD8t4:hover .SlideshowCard_thumb__86aJk{scale:1.02}.SlideshowCard_content__xh7kV{display:grid;padding:16px 0;grid-template-columns:1fr 32px;grid-template-rows:auto;grid-row-gap:4px;row-gap:4px}.SlideshowCard_content__xh7kV .slideshow-right-side{grid-column-start:2;grid-row-start:1;grid-row-end:span 3}.SlideshowCard_content__xh7kV .slideshow-author,.SlideshowCard_content__xh7kV .slideshow-stats,.SlideshowCard_content__xh7kV .slideshow-title,.SlideshowCard_content__xh7kV .slideshow-type{grid-column-start:1}.SlideshowCard_content__xh7kV .slideshow-author,.SlideshowCard_content__xh7kV .slideshow-stats{margin-block-start:auto}.SlideshowCardLink_root__p8KI7{position:absolute;inset:0;z-index:1;margin:4px}.Thumbnail_root__qLW0K{--ease:cubic-bezier(0.2,0,0,1);position:relative;background-color:var(--blue-gray-100);border:1px solid var(--blue-gray-100);border-radius:8px;scale:1;transition:scale .2s var(--ease);overflow:clip}.Thumbnail_thumb__UXO3a{position:absolute;inset:0;width:100%;height:100%;opacity:1;transition:opacity .3s var(--ease);transition-delay:calc(30ms * var(--index));@starting-style{opacity:0}}.Thumbnail_blur__opK6A{filter:blur(8px)}.Thumbnail_cover__1zsIi{-o-object-fit:cover;object-fit:cover}.Thumbnail_contain__K6M0d{-o-object-fit:contain;object-fit:contain}.SlideshowTitle_root__2VccW{display:-webkit-box;color:var(--blue-gray-900);font-size:18px;font-weight:600;line-height:1.2;margin-bottom:8px;white-space:break-spaces;word-break:break-word;-webkit-box-orient:vertical}.SaveButton_root__b6zuu{z-index:1}.SlideshowAuthor_root__IkT1_{color:var(--celadon-blue-dark);font-weight:600;text-decoration:underline;-webkit-text-decoration-color:transparent;text-decoration-color:transparent;text-decoration-thickness:1.5px;text-underline-offset:2px;transition:-webkit-text-decoration-color .2s ease-out;transition:text-decoration-color .2s ease-out;transition:text-decoration-color .2s ease-out,-webkit-text-decoration-color .2s ease-out;z-index:2}.SlideshowAuthor_root__IkT1_:hover{-webkit-text-decoration-color:var(--celadon-blue);text-decoration-color:var(--celadon-blue)}.SlideshowStats_root__EQOR1{display:flex;align-items:center;gap:6px}.SlideshowStats_text___WD7l{color:var(--blue-gray-600)}.CountTag_root__y1hE1,.SplitDot_root__lTZDc{color:var(--blue-gray-600);font-weight:400}.RelatedContent_root__29Np1{background-color:var(--blue-gray-100);border-top:1px solid var(--blue-gray-200);border-bottom:1px solid var(--blue-gray-200);padding-block:32px;position:relative}.RelatedContent_wrapper__riU7l{display:grid;grid-template-columns:minmax(0,1fr);grid-gap:32px;gap:32px;max-width:var(--max-content-width);margin-inline:auto}.RelatedContent_title__QUhpL{text-align:center;font-size:32px;font-weight:700}@media screen and (max-width:520px){.RelatedContent_wrapper__riU7l{padding-inline:16px}}.BottomRecommendation_root__7aU9w{display:grid;grid-gap:4px;gap:4px;padding-inline:24px}.BottomRecommendation_title__SRj68{font-size:22px;font-weight:600}.BottomRecommendation_count__4HpLo{font-size:16px;font-weight:400}@media screen and (max-width:520px){.BottomRecommendation_root__7aU9w{padding-inline:0}}.BottomRecommendationContent_root__2qm4_{display:grid}.BottomRecommendationContent_hidden__CUlxl{display:none}.BottomRecommendationContent_root__2qm4_ .mobile-recs{display:grid}.BottomRecommendationContent_root__2qm4_ .desktop-recs{display:none}@media screen and (min-width:520px){.BottomRecommendationContent_root__2qm4_ .mobile-recs{display:none}.BottomRecommendationContent_root__2qm4_ .desktop-recs{display:flex}}.Slider_root__c0Jo8{position:relative;display:grid}.Slider_scroller__KHjw4{display:flex;gap:20px;overflow:auto;scroll-snap-type:x mandatory;overscroll-behavior-x:contain;max-inline-size:100%;min-block-size:100%;touch-action:pan-x;-ms-overflow-style:none;scrollbar-width:none}.Slider_scroller__KHjw4::-webkit-scrollbar{display:none}.Slider_scroller__KHjw4>*{flex-grow:1;flex-shrink:0;scroll-snap-align:start}.Slider_scroller__KHjw4>:last-child{scroll-snap-align:end}.Slider_arrow__8LCca{display:grid;place-content:center;width:36px;height:36px;position:absolute;top:50%;background:var(--white);border:1px solid var(--blue-gray-200);border-radius:100vmax;box-shadow:0 2px 4px 0 rgba(0,0,0,.25);color:var(--blue-gray-800);padding:0;opacity:1;visibility:visible;pointer-events:all;transition:opacity .2s ease-in-out,visibility .2s ease-in-out;transition-delay:0s;cursor:pointer;z-index:1}.Slider_prev__YMssa{left:0;translate:-50% -50%}.Slider_next__fa9IO{right:0;translate:50% -50%}.Slider_hidden__rs7nK{opacity:0;visibility:hidden;pointer-events:none}.BottomRecommendationCard_root__gffTk{inline-size:clamp(220px,12.63rem + 3.45vw,260px);position:relative;background-color:none}.BottomRecommendationCard_root__gffTk .slideshow-thumbnail{border:1px solid var(--blue-gray-200)}.ScribdRecommendation_root__t3ezS{display:grid;grid-gap:16px;gap:16px;padding:0 24px}.ScribdRecommendation_header__Jw_M1{display:grid;grid-template-columns:1fr max-content}.ScribdRecommendation_title__JZ5p7{font-size:22px;font-weight:600}.ScribdRecommendation_link__4DVQz{align-self:end;grid-column:2;grid-row:1/span 2;color:var(--celadon-blue-dark)}.ScribdRecommendation_link__4DVQz:hover{color:var(--celadon-blue)}.ScribdRecommendationCard_root__ef2Y_{--rec-bg-1:#f1e3e3;--rec-bg-2:#f6f4e3;--rec-bg-3:#e1eaec;--rec-bg-4:#efebef;--rec-bg-5:#f1f0f0;--rec-bg-6:#f4eadb;--rec-bg-7:#eaeee7;--rec-bg-8:#e3e8ef;--rec-bg-9:#f1eee6;max-width:172px;position:relative;height:100%;display:grid;grid-template-columns:minmax(0,1fr);grid-template-rows:max-content minmax(0,1fr);align-content:flex-start;background-color:var(--white);border:1px solid var(--blue-gray-200);box-shadow:none;transition:box-shadow .2s ease-in-out;text-decoration:none}.ScribdRecommendationCard_root__ef2Y_:hover{box-shadow:0 2px 10px rgba(0,0,0,.1)}.ScribdRecommendationCard_thumb__5VVNh{position:relative;display:flex;background-color:var(--blue-gray-200);margin-block-start:24px;margin-inline:20px}.ScribdRecommendationCard_root__ef2Y_:before{position:absolute;inset:0;aspect-ratio:19/16;content:"";background-color:var(--block-color)}.ScribdRecommendationCard_thumb__5VVNh img{--reveal-delay:calc(30ms * var(--card-index));aspect-ratio:inherit;box-shadow:0 4px 6px rgba(0,0,0,.2);-o-object-fit:cover;object-fit:cover;opacity:0;visibility:hidden;transition:opacity .3s var(--ease);transition-delay:var(--reveal-delay)}.ScribdRecommendationCard_loaded__FTN_f img{opacity:1;visibility:visible}.ScribdRecommendationCard_content__ObcvL{display:flex;flex-direction:column;padding-block:20px;padding-inline:16px}.ScribdRecommendationCard_content__ObcvL .rating{padding-block-start:8px;margin-block-start:auto}@media (max-width:928px){.ScribdRecommendationCard_content__ObcvL .rating{flex-direction:column;align-items:flex-start}}.Rating_root__fgZQJ{display:flex;align-items:center;-moz-column-gap:6px;column-gap:6px;white-space:nowrap}.Rating_root__fgZQJ :first-child{color:#e47b01;font-size:16px;line-height:1}.Rating_root__fgZQJ :last-child{color:var(--blue-gray-600);font-size:14px;letter-spacing:-.25px}.Transcript_root__Vrf6Q{width:100%;max-width:var(--max-content-width);display:grid;grid-gap:8px;gap:8px;padding:32px 16px;margin-inline:auto;position:relative;background:#fff}.Transcript_title__YgAka{display:flex;align-items:center;gap:4px;font-weight:300;word-break:break-word}.Transcript_list__faItj{list-style-type:none;padding-inline-start:0;word-break:break-word}.Transcript_link__MLbGS{color:var(--celadon-blue);font-weight:700;line-height:22px;text-decoration:none;cursor:pointer}.EditorsNotes_root__3PcDF{padding:32px 16px;margin:0 auto}.EditorsNotes_heading__XR9E6{font-weight:700;font-size:22px}.EditorsNotes_list__NcG5Y{padding-left:30px;font-size:18px;font-style:italic;color:var(--blue-gray-600)}.EditorsNotes_item__ebBbj{word-break:break-word}.EditorsNotes_link__HRUAh{color:var(--celadon-blue);font-weight:700;line-height:22px;text-decoration:none;cursor:pointer}@media screen and (min-width:1696px){.EditorsNotes_root__3PcDF{max-width:1688px}}dialog.FullscreenModal_root__efM9m[open]{animation:none;opacity:1;scale:1}dialog.FullscreenModal_root__efM9m{--max-height:100dvh;width:100dvw;height:100dvh;border-radius:0;opacity:0;scale:.96}dialog.FullscreenModal_root__efM9m .FullscreenModal_content__bQ6mt{width:100svw;height:100svh;display:grid;padding:0;max-height:100svh}@starting-style{dialog.FullscreenModal_root__efM9m[open]{opacity:0;scale:.96}} /*# sourceMappingURL=2037c432d9eb83a2.css.map*/</style></head><body><noscript><iframe title="gtm-noscript" src="https://www.googletagmanager.com/ns.html?id=GTM-M36RG8PT" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><div id="__next"><div class="__variable_11ceb6 __className_11ceb6" style="overflow:clip"><div class="PageProgressBar_root__1y_Q3"><div class="PageProgressBar_bar__Kyoem" style="transform:scaleX(0)"></div></div><div data-freestar-ad="__320x50 __1140x90" id="slideshare_pushdown-pushdown-cls" style="height:var(--pushdown-height)"></div><header class="Header_root__8A86O"><div class="Header_wrapper___zBfP"><button aria-label="Open navigation menu" class="Hamburger_root__tHlgC" data-cy="mobile-header-menu" type="button"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/hamburger.5a525941.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><dialog id=":R15d6:" class="drawer Drawer_root__ob4ZM" data-placement="left"><div class="Drawer_content__ye6ZB"></div><button autofocus="" type="button" aria-label="Close" class="close-button CloseButton_root__JCTRm" data-cy="drawer-close-button"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/close.393923c4.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button></dialog><a aria-label="SlideShare a Scribd company logo" class="Logo_root__Qba3h" data-cy="slideshare-logo" title="Return to the homepage" href="https://www.slideshare.net/"><img alt="SlideShare a Scribd company logo" loading="lazy" width="120" height="30" decoding="async" data-nimg="1" style="color:transparent" srcSet="https://public.slidesharecdn.com/images/next/svg/logo/slideshare-scribd-company.svg?w=128&amp;q=75 1x, https://public.slidesharecdn.com/images/next/svg/logo/slideshare-scribd-company.svg?w=256&amp;q=75 2x" src="https://public.slidesharecdn.com/images/next/svg/logo/slideshare-scribd-company.svg?w=256&amp;q=75"/></a></div><div class="SearchForm_root__usp4s"><form data-testid="search-form" role="search"><input name="searchfrom" type="hidden" value="header"/><input type="text" autoComplete="off" aria-label="Search SlideShare" id="nav-search-query" data-cy="search-field" name="q" placeholder="Search" aria-haspopup="dialog" aria-controls=":R16d6:" popovertarget=":R16d6:" style="anchor-name:--popover-R16d6" value=""/><div class="SearchForm_popover__K3_9y SearchForm_hidden__rZp69" id=":R16d6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R16d6"></div><button type="submit" class="SearchForm_submit__U8kPR" id="search-submit" data-cy="search-submit"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/search.844a289d.svg);background-color:currentColor"></span><span class="sr-only">Submit Search</span></span></button></form></div><div class="HeaderActions_root__11_ai undefined"></div></header><div class="SlideshowScreen_root__k9j1_ SlideshowScreen_withKeyMoments__RbHLe"><!--$--><div class="metadata Metadata_root__oCstk" data-cy="metadata"><h1 class="Heading_heading__3MAvZ Heading_h1__3k7S2 title Title_root__svkHQ">Mongoose H4D 2021 Lessons Learned</h1><div class="stats Stats_root__p_BoZ"><time dateTime="2021-06-02 05:30:11 UTC">Jun 2, 2021</time><span class="Stats_bullet__DbT30"></span><span class="Text_root__is73U Text_medium__rk8Tn text" style="-webkit-line-clamp:0">Download as PPTX, PDF</span><span class="Stats_bullet__DbT30 Stats_formatBullet__AHEoj"></span><span class="Text_root__is73U Text_weight-strong__yEO2S Text_secondary__EPWj0 Text_medium__rk8Tn Likes_root__WVQ1_ text" style="-webkit-line-clamp:0" tabindex="0">1 like</span><span class="Stats_bullet__DbT30"></span><span class="Text_root__is73U Text_weight-strong__yEO2S Text_secondary__EPWj0 Text_medium__rk8Tn Likes_root__WVQ1_ text" style="-webkit-line-clamp:0" tabindex="0">53,594<!-- --> <!-- -->views</span></div><div class="author Author_root___6Bx5"><a data-cy="author-link" class="Author_link___lVxw ellipsis" title="Stanford University" href="https://www.slideshare.net/sblank"><div class="Avatar_root__GNWHY" style="width:24px;height:24px;line-height:24px"><img class="Avatar_image__Bbtll" src="https://cdn.slidesharecdn.com/profile-photo-sblank-48x48.jpg?cb=1707173175" alt="Stanford University" loading="lazy" decoding="sync"/></div><span>Stanford University</span></a></div><div class="description Description_root__kt4uq Description_clamped__PaV_1"><div class="Description_wrapper__hYE9_" data-cy="document-description"><p>business model, business model canvas, mission model, mission model canvas, customer development, hacking for defense, H4D, lean launchpad, lean startup, stanford, startup, steve blank, pete newell, bmnt, entrepreneurship, I-Corps, Security, NSIN, NSA, disposable infrastructure, cyber, Joe Felter, DOD<button type="button" class="Button_root__i1yp0 Button_primary__K25Gq Button_text__ZT_3O Button_small__sqsEx Description_less__BvWbY Description_hidden__a9QZJ" data-testid="button" aria-label="Read less"><span>Read less</span></button></p></div><button type="button" class="Button_root__i1yp0 Button_primary__K25Gq Button_text__ZT_3O Button_small__sqsEx Description_more__ChrRK" data-testid="button" aria-label="Read more" data-cy="read-more-button"><span>Read more</span></button></div></div><div class="MetadataToolbar_root__c03ao metadata-toolbar" data-cy="slideshow-toolbar"><div class="MetadataToolbar_wrapper__r7XEc"><div class="actions Actions_root__00yIC"><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_regular__i28NX Button_icon__1C4qi like-button unliked" data-testid="button" aria-label="Like" data-favorited="false" data-cy="like-button" aria-haspopup="dialog" aria-controls=":R2654f6:" popovertarget=":R2654f6:" style="anchor-name:--popover-R2654f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/like.3870b074.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R2654f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R2654f6"></div><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_regular__i28NX Button_icon__1C4qi save-slideshow-button SaveToListButton_root__T0ltL" data-testid="button" aria-label="Save for later" data-cy="save-slideshow-logged-out-button" aria-haspopup="dialog" aria-controls=":R3654f6:" popovertarget=":R3654f6:" style="anchor-name:--popover-R3654f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R3654f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R3654f6"></div><button type="button" class="unstyled-button more-button MoreDropdownButton_trigger__x7wGs" aria-label="More options" data-cy="more-options-icon" data-testid="ellipsis" aria-haspopup="dialog" aria-controls=":Rc654f6:" popovertarget=":Rc654f6:" style="anchor-name:--popover-Rc654f6"><span class="icon Icon_root__AjZyv" style="anchor-name:--popover-R3c654f6" aria-haspopup="dialog" aria-controls=":R3c654f6:" popovertarget=":R3c654f6:"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/more-horizontal.f69be1b8.svg);background-color:currentColor"></span><span class="sr-only"></span></span><div class="Tooltip_root__7FS0Y" id=":R3c654f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R3c654f6"></div></button><div class="" id=":Rc654f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rc654f6"></div></div><span data-cy="page-number" class="MetadataToolbar_pageNumber__i6Bhj">1<!-- --> <!-- -->of<!-- --> <!-- -->27</span><div class="MetadataToolbar_actions__FB33C"><div class="DownloadButton_root__adY00"><button type="button" class="Button_root__i1yp0 Button_primary__K25Gq Button_contained__gyjai Button_large__Yv_oe" data-testid="download-button" data-cy="download-button-toolbar" label="Download now" aria-label="Download now" aria-haspopup="dialog" aria-controls=":R1e54f6:" popovertarget=":R1e54f6:" style="anchor-name:--popover-R1e54f6"><span><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/download.b1b2622c.svg);background-color:currentColor"></span><span class="sr-only"></span></span>Download now</span></button><div class="" id=":R1e54f6:" popover="manual" data-popover-position="bottom" style="position-anchor:--popover-R1e54f6"></div><span class="Text_root__is73U Text_secondary__EPWj0 Text_xsmall__vYp9p text" style="-webkit-line-clamp:0">Downloaded 12 times</span></div></div><div class="MetadataToolbar_underline__QQn0C"></div></div></div><!--/$--><!--$--><!--/$--><div class="player Player_root__L1AmF"><div id="new-player" class="vertical-player VerticalPlayer_root__K8_YS" data-slideshow-id="248856080"><div><div id="slide1" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-0" alt="TeamMongoose Keertan Kini Zoe Durand Ricardo Rosales Frances Schroeder INITIAL PROBLEM STATEMENT Enable the NSA to rapidly identify disposable infrastructure used in cyber-attacks CURRENT PROBLEM STATEMENT Democratize threat intelligence by providing an automatic “pivoting” solution 100 Interviews BS Symbolic Systems ‘22 Hipster MBA ‘22 Hustler MBA ‘22 Hound MBA + MPP Hacker Problem Sponsor: National Security Agency Cybersecurity Directorate " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="eager" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-1-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-1-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-1-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-1-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide2" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-1" alt="Over the past 10 weeks, we conducted 100 interviews. Academic Commercial Government " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-2-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-2-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-2-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-2-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide3" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-2" alt="We didn’t fully understand the beneficiary nor the problem statement... What is the full mission of the NSA? What data does the NSA have access to? What is the organizational structure between the NSA and all the other agencies that it defends? What is disposable infrastructure? How is it used by adversaries in an attack? Week 1 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-3-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-3-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-3-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-3-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide4" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-3" alt="Since we didn’t know what “disposable infrastructure” was… we decided to start with the data where we could find it! 1. “The NSA does not have access to network data if it is domestic” - from Sponsor 1. “There is a clear reason for which the NSA doesn’t have access to that data - they should just work more effectively with the FBI” - from cyber-crime / cyber-security diplomat 1. “What is missing is the defense agreement to get the data, not the data itself.” - from sponsor &amp; DoD representative Week 1 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-4-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-4-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-4-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-4-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide5" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-4" alt="We realized that the world was much more complicated than we had originally thought Confused mongoose Week 3 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-5-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-5-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-5-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-5-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide6" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-5" alt="Aha moment! Disposable infrastructure = servers leased through cloud providers Week 3 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-6-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-6-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-6-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-6-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide7" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-6" alt="All Agencies in National Security System DoD Agencies in National Security System Critical infrastructure, private companies NSA The interplay between agencies is even more complicated that we had originally thought! Cybersecurity and Infrastructure Security Agency CISA FBI Cloud Providers MALICIOUS CYBER ACTOR Disposable Infrastructure Already gone! USCYBERCOM Private Incident Response Companies Week 4 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-7-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-7-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-7-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-7-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide8" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-7" alt="Mission Model Canvas had a lot of other players involved KEY PARTNERS - NSA (analysts and expertise) - DHS CISA - Private sector - - Cloud provider Trust and Security Teams - FBI Cybercrime Division - Private Network security firms KEY RESOURCES - Security Clearance - IT Security Accreditation - Examples of concerning malware for categorization and analysis - Traffic Data (labeled instances of disposable infrastructure) VALUE PROPOSITIONS One or several of the following: -Reduce time required to identify persistent infrastructure used by multiple malware installations - Identify temporary infrastructure used by malware installation previously unidentified and share to Cloud Providers to shutdown - Reduce time to serve Data Preservation notices to Cloud Providers to help attribution KEY ACTIVITIES - Software Engineering: - Identify common data for behavioral analysis of specific attacks - Create analytics which plugs into existing engines - Organizational: Fast Path for data sharing - Security Accreditation MISSION ACHIEVEMENT/IMPACT FACTORS Our mission will be successful if we develop a scalable solution to help the NSA identify persistent infrastructure used by multiple malware installations in a timely manner. DEPLOYMENT 1. Back-end algorithm not running in real time as proof of concept 2. Back-end algorithm running in real time (streaming) 3. Dashboard updated in real time deployed to the cloud or on-prem and accessible NSA/CISA/FBI stakeholders BUY-IN &amp; SUPPORT -Need IT Approvals from NSA/CISA/FBI for their systems -Need demand MISSION BUDGET/COST BENEFICIARIES Primary: Cyber defenders at the NSA, Secondary: Cyber investigators at the FBI Tertiary: All entities that the NSA serves and the DoD in general Fixed: - Software design &amp; engineering - Helpdesk/support functions - Labelling Costs Variable: - Subscription API usage for External tools, cloud computation/storage " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-8-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-8-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-8-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-8-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide9" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-8" alt="“Attack” can mean different things, and even the lifecycle of an attack is broad - where could Mongoose help? Prevention Incident response Attribution Week 4 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-9-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-9-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-9-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-9-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide10" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-9" alt="Big identity crisis for the team! A picture of a Mongoose team member boiling the ocean, circa Week 4 Prevention Attribution Incident response Team Mongoose NSA DoD Critical infra Lighthouse of the teaching team FBI Flocks of beneficiaries " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-10-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-10-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-10-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-10-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide11" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-10" alt="Lightbulb moment! Disposable infrastructure isn’t in and of itself a problem, is it? “Attacks” isn’t specific enough. You need to narrow it down to a specific attack! “We were originally given a solution, not a problem.” Week 4 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-11-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-11-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-11-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-11-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide12" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-11" alt="Pivot! Focus on a specific attack type: Data exfiltration. Week 5 Problem Statement WHAT: improve the early detection of nation-state data exfiltration cyber- attacks on the NSA corporate network conducted through ephemeral cloud infrastructure, where the initial attack vector is a zero-day or supply chain attack, by quickly identifying the C2 servers owned in full by the attackers FOR WHO: NSA cyber analysts as early adopter, later DoD agencies. Week 5 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-12-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-12-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-12-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-12-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide13" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-12" alt="To solve the problem of NSA’s access to domestic data, we decide to focus on the NSA as a corporate network Week 5 We still have a data problem... " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-13-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-13-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-13-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-13-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide14" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-13" alt="Intelligence and/or Firewall? Intelligence for signal analysis Firewall to instantly block malicious traffic Week 6 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-14-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-14-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-14-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-14-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide15" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-14" alt="At this point, we still weren’t sure that Mongoose could really bring anything to the table. Week 6 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-15-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-15-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-15-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-15-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide16" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-15" alt="Despite the new problem statement, we hit a new low. We write an email to the teaching team outlining our concerns: “Our problem statement is either too broad, or too technical. People have tried to solve these problems for years, and it’s unclear what we might be able to contribute. ‘Redefine cybersecurity’ is better suited to a PhD in cybersecurity than to H4D” Week 6 Week 1 Week 2 Week 3 Week 4 Week 5 “The NSA is a bit of a black box in terms of their processes and heir prior attacks. Proxies don’t seem to be working either as no company seems keen to discuss the ways in which they’ve been breached.” " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-16-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-16-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-16-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-16-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide17" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-16" alt="We talk to our sponsor and have a breakthrough moment. What if I already had an indicator of compromise… and I asked you to find similar things? ! ! " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-17-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-17-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-17-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-17-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide18" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-17" alt="Major breakthrough: we redefine both the problem statement and the beneficiary WHAT: flag infrastructure on the public internet that “correlates” or “matches” to a known malicious infrastructure (seed) FOR WHO: NSA Discovery Team in conjunction with JFHQ-DODIN Network Defenders. Week 6 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-18-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-18-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-18-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-18-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide19" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-18" alt="Team Mongoose is back! Week 7 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-19-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-19-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-19-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-19-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide20" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-19" alt="We define a high-level product! Mongoose Intelligence will provide analysis automation through an entity matching API Mongoose entity matching API Malicious IP or domain Similar IP or Domain Week 7 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-20-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-20-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-20-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-20-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide21" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-20" alt="We learn that visualization seems to be a compelling product in and of itself for many beneficiaries IP 1 IP 2 DoD Endpoint 1 Domain aws.com Domain XYZ.com IP 3 IP 4 DoD Endpoint 2 JFHQ-DoDIN network - Country - Date of first connection - Account holder - # of connections - Port - Protocol INPUT OUTPUT “Love the visualization! It would be great if you displayed context and confidence scores.” " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-21-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-21-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-21-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-21-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide22" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-21" alt="Why hadn’t the NSA ever built this before? They might have. Legal framework Large siloed organization? Week 8 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-22-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-22-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-22-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-22-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide23" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-22" alt="We start to understand more about the details of the specific data sources and systems that we would need to plug into “Nobody is doing anything with all the log data that is produced by Akamai on DoD networks.” “You should plug into Acropolis that is already doing data collection. DMA is already dumping several terabytes of logs per day. Basically all of the DoD is feeding in data.” -- Defense Digital Service Week 9 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-23-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-23-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-23-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-23-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide24" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-23" alt="With our MVPs, we got good signal that this is something that is interesting to the NSA Discovery Team “There are rules against me saying we would purchase this. But this is a problem, and it needs to be solved ASAP.” -- NSA CSD TD Week 9 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-24-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-24-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-24-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-24-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide25" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-24" alt="Several types of potential customers Small/Medium Enterprises NSA/JFHQ-DODIN Telecoms Week 10 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-25-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-25-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-25-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-25-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide26" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-25" alt="We’re still thinking about whether or not we want to continue on the project after the class. Week 10 " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-26-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-26-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-26-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-26-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div><div><div id="slide27" class="VerticalSlide_root__jU_9r slide-item" style="aspect-ratio:720 / 405" data-cy="slide-container"><div class="VerticalSlideImage_root__64KSA"><img id="slide-image-26" alt="Thank you to everyone who made this possible! Special thanks to: ● Neal Ziring, NSA CSD Technical Director ● Jennifer Quarrie and Jason Chen ● Our defense mentor ● H4D TA Joel Johnson ● The entire H4D teaching team ● Our 100 interviewees TeamMongoose Problem Sponsor: National Security Agency, Cybersecurity Directorate Keertan Kini Zoe Durand Ricardo Rosales Frances Schroeder " class="vertical-slide-image VerticalSlideImage_image__VtE4p" data-testid="vertical-slide-image" loading="lazy" srcSet="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-27-320.jpg 320w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-27-638.jpg 638w, https://image.slidesharecdn.com/mongooselessonslearned-210602053011/75/Mongoose-H4D-2021-Lessons-Learned-27-2048.jpg 2048w" src="https://image.slidesharecdn.com/mongooselessonslearned-210602053011/85/Mongoose-H4D-2021-Lessons-Learned-27-320.jpg" sizes="100vw"/></div><!--$--><!--/$--></div></div></div></div><div id="sidebar" class="sidebar hide-scrollbar Sidebar_root__1BbNu" style="--slots:9"><div class="above-recs-ad-wrapper AboveRecsAd_root__iTmTR"><div class="AboveRecsAd_desktopAd__ymykj"><div class="freestar-ad-container FreestarAdContainer_root__qPPC_" style="--fallback-aspect-ratio:300 / 260" data-testid="freestar-ad-container"><div><div class="" id="above-recs-desktop-ad-sm"></div></div></div></div></div><!--$--><div class="rail-recs RailRecommendations_root__zqtZQ"><h2 class="RailRecommendations_title__kt1D2">Recommended</h2><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-0" aria-haspopup="dialog" aria-controls=":Rgql4f6:" popovertarget=":Rgql4f6:" style="anchor-name:--popover-Rgql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/customizing-llms-cbd3/263022617"><span class="sr-only">Customizing LLMs</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:0" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Customizing LLMs" src="https://cdn.slidesharecdn.com/ss_thumbnails/customizingllms-231103202846-426ebdf1-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Customizing LLMs" src="https://cdn.slidesharecdn.com/ss_thumbnails/customizingllms-231103202846-426ebdf1-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Customizing LLMs</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Customizing LLMs for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mgql4f6:" popovertarget=":R5mgql4f6:" style="anchor-name:--popover-R5mgql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mgql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mgql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/dijieming">Jim Steele</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses different methods for customizing large language models (LLMs) with proprietary or private data, including training a custom model, fine-tuning a general model, and prompting with expanded inputs. Fine-tuning techniques like low-rank adaptation and supervised fine-tuning allow emphasizing custom knowledge without full retraining. Prompt expansion using techniques like retrieval augmented generation can provide additional context beyond the character limit.</span></div></div><div class="" id=":Rgql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rgql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-1" aria-haspopup="dialog" aria-controls=":Rhal4f6:" popovertarget=":Rhal4f6:" style="anchor-name:--popover-Rhal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/opinion-mining-29407190/29407190"><span class="sr-only">Opinion Mining</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:1" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Opinion Mining" src="https://cdn.slidesharecdn.com/ss_thumbnails/opinionmining-131221011849-phpapp02-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Opinion Mining" src="https://cdn.slidesharecdn.com/ss_thumbnails/opinionmining-131221011849-phpapp02-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Opinion Mining</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Opinion Mining for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mhal4f6:" popovertarget=":R5mhal4f6:" style="anchor-name:--popover-R5mhal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mhal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mhal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Alihabeeb">Ali Habeeb</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This document provides an overview of opinion mining and sentiment analysis. It defines opinion mining as attempting to automatically determine human opinion from natural language text. It discusses some key applications, such as classifying reviews and understanding public opinion. The document also outlines some challenges, such as understanding context and differing domains. It then describes common models for sentiment analysis, including preparing data, analyzing reviews linguistically, and classifying sentiment using techniques like machine learning classifiers.</span></div></div><div class="" id=":Rhal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rhal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-2" aria-haspopup="dialog" aria-controls=":Rhql4f6:" popovertarget=":Rhql4f6:" style="anchor-name:--popover-Rhql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/finetuning-bert-for-question-answering/179628340"><span class="sr-only">Fine-tuning BERT for Question Answering</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:2" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Fine-tuning BERT for Question Answering" src="https://cdn.slidesharecdn.com/ss_thumbnails/questionansweringbert-191007035518-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Fine-tuning BERT for Question Answering" src="https://cdn.slidesharecdn.com/ss_thumbnails/questionansweringbert-191007035518-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Fine-tuning BERT for Question Answering</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Fine-tuning BERT for Question Answering for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mhql4f6:" popovertarget=":R5mhql4f6:" style="anchor-name:--popover-R5mhql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mhql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mhql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/apachemxnet">Apache MXNet</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This deck covers the problem of fine-tuning a pre-trained BERT model for the task of Question Answering. Check out the GluonNLP model zoo here for models and tutorials: http://gluon-nlp.mxnet.io/model_zoo/bert/index.html Slides: Thomas Delteil</span></div></div><div class="" id=":Rhql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rhql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-3" aria-haspopup="dialog" aria-controls=":Rial4f6:" popovertarget=":Rial4f6:" style="anchor-name:--popover-Rial4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/lalamove/starting-awebplatform-or-a-marketplace"><span class="sr-only">Starting a web-platform or a marketplace?</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:3" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Starting a web-platform or a marketplace?" src="https://cdn.slidesharecdn.com/ss_thumbnails/lalamove-o2o-business-platform-hkust-151109021054-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Starting a web-platform or a marketplace?" src="https://cdn.slidesharecdn.com/ss_thumbnails/lalamove-o2o-business-platform-hkust-151109021054-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Starting a web-platform or a marketplace?</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Starting a web-platform or a marketplace? for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mial4f6:" popovertarget=":R5mial4f6:" style="anchor-name:--popover-R5mial4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mial4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mial4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/lalamove">Lalamove / EasyVan</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Lalamove is an on-demand delivery platform operating in Asia. The document discusses key considerations for scaling an online-to-offline (O2O) business platform across Asia, including starting a marketplace, growing the marketplace, and lessons learned. When starting a marketplace, founders must determine whether to operate as a platform or marketplace and tackle challenges like demand/supply balance and competition. Growth requires expanding breadth and depth, focusing on core values like speed and localization, and understanding objectives and stages and key decisions around expansion. Overall takeaways include demonstrating efficiency through technology, focusing on narrowly defined markets, and acquiring customers through paid and organic means while efficiently onboarding suppliers.</span></div></div><div class="" id=":Rial4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rial4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-4" aria-haspopup="dialog" aria-controls=":Riql4f6:" popovertarget=":Riql4f6:" style="anchor-name:--popover-Riql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/Wachanga/doption-of-cloudbased-services-by-smes-in-developing-countries-development-of-a-toe-based-model"><span class="sr-only">ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:4" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT..." src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudcomputingadoptionmodelbyamoswachanga-180414091450-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT..." src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudcomputingadoptionmodelbyamoswachanga-180414091450-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5miql4f6:" popovertarget=":R5miql4f6:" style="anchor-name:--popover-R5miql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5miql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5miql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Wachanga">Amos Wachanga</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Small and Medium Enterprises (SMEs) face numerous challenges in identification, setting up and making use of Information Technology (IT) as an enabler for business. Cloud computing could solve this problem by offering ready, low cost of entry IT solutions. Adoption of cloud computing among the SMEs in developing countries is however low due to a number of barriers as identified by previous studies. Over the years, research on adoption on innovation and technology has unveiled a number of theories on adoption which range from Individual level theories to Organizational level theories and even Market level theories. This study reviews the various theories, opting to use an organization level theory so that focus on the SME is emphasized. Analysis of literature renders this study to be based on the Technology- Organization-Environment (TOE) framework proposed by DePietro et al. (1990). This study reviews the current adoption levels of cloud computing and proposes a TOE based model for adoption of cloud-based services by SMEs in developing countries. The study employed literature review to determine the factors that are applicable for a model on adoption of cloud computing in the developing countries. Further, the study conducted a survey through a questionnaire to collect quantitative data to assist in determination of the most applicable model. Convenience sampling was employed due to the study’s constraints on time and budget. The study findings revealed that there is low adoption of cloud computing for business applications by SMEs in Nairobi County, hence confirms the need for the adoption model. Using Exploratory Factor Analysis (EFA) six components were extracted for the proposed model which include Relative Advantage, Accessibility, Organization Readiness and Size, Vendor Readiness, Regulations and Trading Partner Pressure, each with attributes required to ensure successful adoption of cloud computing. The model was validated through statistical analysis which confirms a largely reasonable level of fit for the indices and construct validity conducted through convergent and discriminant validity methods. Further, the model was subjected to experts’ analysis who concluded that the model is simple, applicable and fitting. The study finally proposes practical recommendations to governments and policy makers, educational institutions, software vendors and SMEs based on the model. Further research areas include subjecting the model to larger sample sizes to confirm its validity and the preparation of an implementation guideline. Keywords: Cloud computing, Small and medium enterprises, ICT Adoption, Nairobi Kenya</span></div></div><div class="" id=":Riql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Riql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-5" aria-haspopup="dialog" aria-controls=":Rjal4f6:" popovertarget=":Rjal4f6:" style="anchor-name:--popover-Rjal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist-52562830/52562830"><span class="sr-only">Are you ready for the next attack? Reviewing the SP Security Checklist</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:5" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Are you ready for the next attack? Reviewing the SP Security Checklist" src="https://cdn.slidesharecdn.com/ss_thumbnails/areyoureadyforthenextattackreviewingthespsecuritychecklist40apnic4041-150909011223-lva1-app6891-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Are you ready for the next attack? Reviewing the SP Security Checklist" src="https://cdn.slidesharecdn.com/ss_thumbnails/areyoureadyforthenextattackreviewingthespsecuritychecklist40apnic4041-150909011223-lva1-app6891-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Are you ready for the next attack? Reviewing the SP Security Checklist</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Are you ready for the next attack? Reviewing the SP Security Checklist for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mjal4f6:" popovertarget=":R5mjal4f6:" style="anchor-name:--popover-R5mjal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mjal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mjal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/apnic">APNIC</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses the importance of using checklists to optimize security operations. It provides an initial security checklist for internet service providers (ISPs) to assess positive control, virtual terminal access control lists (VTY ACLs), vendor security partnerships, upgrade plans, IPv6 security, attack tree analysis, border gateway protocol (BGP) policies, DNS architecture resilience, and developing a security community. The checklist highlights key areas ISPs should review to strengthen their defenses against evolving cyber threats from criminals, hackers, and nation states. Regular use of such checklists is encouraged to proactively address vulnerabilities before exploits can be launched.</span></div></div><div class="" id=":Rjal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rjal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-6" aria-haspopup="dialog" aria-controls=":Rjql4f6:" popovertarget=":Rjql4f6:" style="anchor-name:--popover-Rjql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/BarryRGreene/are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist-apnic-40"><span class="sr-only">Are you ready for the next attack? reviewing the sp security checklist (apnic...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:6" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Are you ready for the next attack? reviewing the sp security checklist (apnic..." src="https://cdn.slidesharecdn.com/ss_thumbnails/areyoureadyforthenextattackreviewingthespsecuritychecklistapnic40-150928083936-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Are you ready for the next attack? reviewing the sp security checklist (apnic..." src="https://cdn.slidesharecdn.com/ss_thumbnails/areyoureadyforthenextattackreviewingthespsecuritychecklistapnic40-150928083936-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Are you ready for the next attack? reviewing the sp security checklist (apnic...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Are you ready for the next attack? reviewing the sp security checklist (apnic... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mjql4f6:" popovertarget=":R5mjql4f6:" style="anchor-name:--popover-R5mjql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mjql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mjql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/BarryRGreene">Barry Greene</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Rethinking Security and how you can Act on Meaningful Change What the industry recommends to protect your network is NOT working! The industry is stuck in a dysfunctional ecosystem that encourages the cyber-criminal innovation at the cost to business and individual loss throughout the world. We do not need a “Manhattan Project” for the security of the Internet. What we need are tools to help operators throughout the world ask the right question that would lead them to meaningful action. Security empowerment must empower the grassroots and provide the tools to push back on the root cause. This talk will explore these issues, highlight the dysfunction in our “security” economy, and present “take home” tools that would facilitate immediate action. </span></div></div><div class="" id=":Rjql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rjql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-7" aria-haspopup="dialog" aria-controls=":Rkal4f6:" popovertarget=":Rkal4f6:" style="anchor-name:--popover-Rkal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/cybersecurity-jim-butterworth/4929622"><span class="sr-only">Cybersecurity - Jim Butterworth</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:7" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Cybersecurity - Jim Butterworth" src="https://cdn.slidesharecdn.com/ss_thumbnails/brazilcybersecurityfinaljim-100809115709-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Cybersecurity - Jim Butterworth" src="https://cdn.slidesharecdn.com/ss_thumbnails/brazilcybersecurityfinaljim-100809115709-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Cybersecurity - Jim Butterworth</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Cybersecurity - Jim Butterworth for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mkal4f6:" popovertarget=":R5mkal4f6:" style="anchor-name:--popover-R5mkal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mkal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mkal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/techbizforense">TechBiz Forense Digital</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Palestra do evento &quot;Cybersecurity: a nova era em resposta a incidentes e auditoria de dados&quot; Jim Butterworth - Senior Cybersecurity Director Guidance Software Inc. Brasília, 04 de agosto de 2010</span></div></div><div class="" id=":Rkal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rkal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-8" aria-haspopup="dialog" aria-controls=":Rkql4f6:" popovertarget=":Rkql4f6:" style="anchor-name:--popover-Rkql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/applied-cognitive-security-complementing-the-security-analyst/74979164"><span class="sr-only">Applied cognitive security complementing the security analyst </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:8" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Applied cognitive security complementing the security analyst " src="https://cdn.slidesharecdn.com/ss_thumbnails/spo3-w03applied-cognitive-security-complementing-the-security-analystcopy1-170413124007-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Applied cognitive security complementing the security analyst " src="https://cdn.slidesharecdn.com/ss_thumbnails/spo3-w03applied-cognitive-security-complementing-the-security-analystcopy1-170413124007-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Applied cognitive security complementing the security analyst </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Applied cognitive security complementing the security analyst for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mkql4f6:" popovertarget=":R5mkql4f6:" style="anchor-name:--popover-R5mkql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mkql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mkql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/cisoplatform7">Priyanka Aash</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution that can learn about security from structured and unstructured information sources is essential. It can be applied to empower security analysts with insights to qualify incidents and investigate risks quickly and accurately. (Source : RSA Conference 2017)</span></div></div><div class="" id=":Rkql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rkql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-9" aria-haspopup="dialog" aria-controls=":Rlal4f6:" popovertarget=":Rlal4f6:" style="anchor-name:--popover-Rlal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/software-supply-chain-attacks/249624123"><span class="sr-only">Software Supply Chain Attacks (June 2021)</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:9" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Software Supply Chain Attacks (June 2021)" src="https://cdn.slidesharecdn.com/ss_thumbnails/softwaresupplychainattacks-tzahiarabov-210706132923-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Software Supply Chain Attacks (June 2021)" src="https://cdn.slidesharecdn.com/ss_thumbnails/softwaresupplychainattacks-tzahiarabov-210706132923-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Software Supply Chain Attacks (June 2021)</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Software Supply Chain Attacks (June 2021) for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mlal4f6:" popovertarget=":R5mlal4f6:" style="anchor-name:--popover-R5mlal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mlal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mlal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/TzahiArabov">TzahiArabov</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The Codecov compromise involved a threat actor tampering with Codecov&#x27;s Bash uploader script between January-April 2021, allowing them to export data from hundreds of customers&#x27; CI environments. The compromised script exfiltrated environment variables to the attacker&#x27;s IP address. Rapid7 confirmed they were impacted, though the attacker was limited to internal tools and credentials and a small subset of source code repositories.</span></div></div><div class="" id=":Rlal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rlal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-10" aria-haspopup="dialog" aria-controls=":Rlql4f6:" popovertarget=":Rlql4f6:" style="anchor-name:--popover-Rlql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/big-security-for-big-data/42439766"><span class="sr-only">Big security for big data</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:10" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Big security for big data" src="https://cdn.slidesharecdn.com/ss_thumbnails/bigsecurityforbigdata-141207073439-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Big security for big data" src="https://cdn.slidesharecdn.com/ss_thumbnails/bigsecurityforbigdata-141207073439-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Big security for big data</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Big security for big data for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mlql4f6:" popovertarget=":R5mlql4f6:" style="anchor-name:--popover-R5mlql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mlql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mlql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/toroscatenato">Giuliano Tavaroli</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Big organizations are dealing with massive amounts of data from various sources that needs to be collected and analyzed in real-time to detect security threats. This requires normalizing the data, integrating it from different sources, and using analytics to identify patterns and correlations that could indicate attacks. Doing this analysis in real-time allows threats to be addressed quickly before data is stolen, rather than only analyzing after an attack occurred.</span></div></div><div class="" id=":Rlql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rlql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-11" aria-haspopup="dialog" aria-controls=":Rmal4f6:" popovertarget=":Rmal4f6:" style="anchor-name:--popover-Rmal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist/51987162"><span class="sr-only">Are you ready for the next attack? Reviewing the SP Security Checklist</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:11" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Are you ready for the next attack? Reviewing the SP Security Checklist" src="https://cdn.slidesharecdn.com/ss_thumbnails/barry-areyoureadyforthenextattackreviewingthespsecuritychecklist2-150824040120-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Are you ready for the next attack? Reviewing the SP Security Checklist" src="https://cdn.slidesharecdn.com/ss_thumbnails/barry-areyoureadyforthenextattackreviewingthespsecuritychecklist2-150824040120-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Are you ready for the next attack? Reviewing the SP Security Checklist</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Are you ready for the next attack? Reviewing the SP Security Checklist for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mmal4f6:" popovertarget=":R5mmal4f6:" style="anchor-name:--popover-R5mmal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mmal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mmal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/mynog">MyNOG</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses the importance of checklists for network security and productivity. It provides a security checklist for internet service providers to optimize their operations. The checklist includes items like ensuring positive control over network access, implementing VTY access lists, requiring security partnerships with vendors, having upgrade plans for all equipment, reviewing IPv6 security, analyzing attack vectors, documenting BGP policies, and building a security community with peers. Adopting such practices can help mitigate security risks from threats like cyber criminals, hackers, and nation states.</span></div></div><div class="" id=":Rmal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rmal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-12" aria-haspopup="dialog" aria-controls=":Rmql4f6:" popovertarget=":Rmql4f6:" style="anchor-name:--popover-Rmql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/AlertLogic/realities-of-security-in-the-cloud-92195659"><span class="sr-only">Realities of Security in the Cloud</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:12" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Realities of Security in the Cloud" src="https://cdn.slidesharecdn.com/ss_thumbnails/realitiesofsecurityin-180328155648-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Realities of Security in the Cloud" src="https://cdn.slidesharecdn.com/ss_thumbnails/realitiesofsecurityin-180328155648-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Realities of Security in the Cloud</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Realities of Security in the Cloud for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mmql4f6:" popovertarget=":R5mmql4f6:" style="anchor-name:--popover-R5mmql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mmql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mmql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/AlertLogic">Alert Logic </a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This document discusses security challenges in cloud computing environments and how machine learning can help address them. It summarizes that web application attacks are now the largest source of data breaches but receive less than 5% of security budgets. It also notes that most detection efforts relying only on tools fail due to alert fatigue. Machine learning can help overcome these challenges by analyzing a wide range of data to detect even sophisticated, multi-stage attacks across cloud and non-cloud environments. The document advocates for an approach combining prevention, detection, response, compliance and expertise to provide comprehensive cloud security.</span></div></div><div class="" id=":Rmql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rmql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-13" aria-haspopup="dialog" aria-controls=":Rnal4f6:" popovertarget=":Rnal4f6:" style="anchor-name:--popover-Rnal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/websense-security-prediction-2014/29961110"><span class="sr-only">Websense security prediction 2014</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:13" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Websense security prediction 2014" src="https://cdn.slidesharecdn.com/ss_thumbnails/websense-securityprediction2014-140113091408-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Websense security prediction 2014" src="https://cdn.slidesharecdn.com/ss_thumbnails/websense-securityprediction2014-140113091408-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Websense security prediction 2014</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Websense security prediction 2014 for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mnal4f6:" popovertarget=":R5mnal4f6:" style="anchor-name:--popover-R5mnal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mnal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mnal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Bee_Ware">Bee_Ware</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document provides 8 predictions for cybersecurity threats in 2014: 1) Advanced malware volume will decrease but attacks will become more targeted and stealthy. 2) A major data-destruction attack such as ransomware will successfully target organizations. 3) Attackers will increasingly target cloud data rather than enterprise networks. 4) Exploit kits like Redkit and Neutrino will struggle for dominance following the arrest of the Blackhole exploit kit author. 5) Java vulnerabilities will remain highly exploitable and exploited with expanded consequences. 6) Attackers will use professional social networks like LinkedIn to target executives and organizations. 7) Cybercriminals will target weaker links in organizations</span></div></div><div class="" id=":Rnal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rnal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-14" aria-haspopup="dialog" aria-controls=":Rnql4f6:" popovertarget=":Rnql4f6:" style="anchor-name:--popover-Rnql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/4777team-cfinal/156190924"><span class="sr-only">4777.team c.final</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:14" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="4777.team c.final" src="https://cdn.slidesharecdn.com/ss_thumbnails/4777-190718032016-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="4777.team c.final" src="https://cdn.slidesharecdn.com/ss_thumbnails/4777-190718032016-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">4777.team c.final</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 4777.team c.final for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mnql4f6:" popovertarget=":R5mnql4f6:" style="anchor-name:--popover-R5mnql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mnql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mnql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/AlexisHarvey8">AlexisHarvey8</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Team research paper and project on network vulnerabilities with multiple attacks and defesnses: Cybersecurity -For this project, our class was paired with teams to attempt to find vulnerabilities in other teams networks and to successfully beach their network. -My role in this group was to help breach other team vulnerabilities through different attacks like responder attacks, honeypots, etc. -The main challenges of this project were trying to find the vulnerabilities successfully, as the whole team had troubles with each of our different attacks and defenses. -We learned how to use cybersecurity tools to help find vulnerabilities in networks and how to protect against them better. For example, in the honeypot we used we deployed it to port 80, when the attacker tried to access our fake server we were notified. We also deployed palto alto firewall to create our private and secure network. For an attack, we also used password crackers like john the ripper. This project taught us how to breach networks as a team. </span></div></div><div class="" id=":Rnql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rnql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-15" aria-haspopup="dialog" aria-controls=":Roal4f6:" popovertarget=":Roal4f6:" style="anchor-name:--popover-Roal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/combating-advanced-persistent-threats/24805314"><span class="sr-only">Combating Advanced Persistent Threats with Flow-based Security Monitoring</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:15" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Combating Advanced Persistent Threats with Flow-based Security Monitoring" src="https://cdn.slidesharecdn.com/ss_thumbnails/combating-apts-with-stealthwatch-slides-130731103954-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Combating Advanced Persistent Threats with Flow-based Security Monitoring" src="https://cdn.slidesharecdn.com/ss_thumbnails/combating-apts-with-stealthwatch-slides-130731103954-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Combating Advanced Persistent Threats with Flow-based Security Monitoring</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Combating Advanced Persistent Threats with Flow-based Security Monitoring for later" role="switch" aria-haspopup="dialog" aria-controls=":R5moal4f6:" popovertarget=":R5moal4f6:" style="anchor-name:--popover-R5moal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5moal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5moal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Lancope">Lancope, Inc.</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Learn how to leverage flow data to: * Proactively detect attacks * Mitigate APTs * Gain forensic intelligence * Improve situational awareness</span></div></div><div class="" id=":Roal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Roal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-16" aria-haspopup="dialog" aria-controls=":Roql4f6:" popovertarget=":Roql4f6:" style="anchor-name:--popover-Roql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/attackers-may-depend-on-social-engineering-to-gain/263567592"><span class="sr-only">Attackers May Depend On Social Engineering To Gain...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:16" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Attackers May Depend On Social Engineering To Gain..." src="https://cdn.slidesharecdn.com/ss_thumbnails/attackersmaydependonsocialengineeringtogain-231118212631-5f67e5bf-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Attackers May Depend On Social Engineering To Gain..." src="https://cdn.slidesharecdn.com/ss_thumbnails/attackersmaydependonsocialengineeringtogain-231118212631-5f67e5bf-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Attackers May Depend On Social Engineering To Gain...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Attackers May Depend On Social Engineering To Gain... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5moql4f6:" popovertarget=":R5moql4f6:" style="anchor-name:--popover-R5moql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5moql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5moql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/tiffanysandovalfairf">Tiffany Sandoval</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses integrating threat intelligence and incident response. It defines threat intelligence as technical and contextual information about emerging threats evaluated for accuracy. Threat intelligence feeds into strategic, operational and tactical security levels. Challenges include connecting diverse data points and filtering noise. A threat intelligence platform helps address this by analyzing data and delivering standardized information. The threat kill chain model outlines attack stages from reconnaissance to information theft. Integrating threat intelligence and incident response improves network defenses across each stage.</span></div></div><div class="" id=":Roql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Roql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-17" aria-haspopup="dialog" aria-controls=":Rpal4f6:" popovertarget=":Rpal4f6:" style="anchor-name:--popover-Rpal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/security-opportunities-a-silicon-valley-vc-perspective/48934246"><span class="sr-only">Security Opportunities A Silicon Valley VC Perspective</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:17" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Security Opportunities A Silicon Valley VC Perspective" src="https://cdn.slidesharecdn.com/ss_thumbnails/positivehackdays-rev1-150603100316-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Security Opportunities A Silicon Valley VC Perspective" src="https://cdn.slidesharecdn.com/ss_thumbnails/positivehackdays-rev1-150603100316-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Security Opportunities A Silicon Valley VC Perspective</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Security Opportunities A Silicon Valley VC Perspective for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mpal4f6:" popovertarget=":R5mpal4f6:" style="anchor-name:--popover-R5mpal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mpal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mpal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/phdays">Positive Hack Days</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This document summarizes the key points from a Silicon Valley VC&#x27;s perspective on security opportunities and challenges. It notes that the security landscape is increasingly complex, with state-sponsored attacks and advanced tools being used by attackers. Most enterprises do not treat security as a core part of their culture. There are many opportunities for startups in security analytics, behavioral monitoring, encryption, and translating technical security data into actionable intelligence for companies. However, the document also notes that startups themselves often have very poor security practices. It provides examples of weak security postures commonly seen in startups. The document argues that improving security should be a priority for startups in order to protect their valuable assets and avoid losing funding or having their work stolen.</span></div></div><div class="" id=":Rpal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rpal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-18" aria-haspopup="dialog" aria-controls=":Rpql4f6:" popovertarget=":Rpql4f6:" style="anchor-name:--popover-Rpql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/cyber-defense-how-to-be-prepared-to-apt/75398262"><span class="sr-only">Cyber Defense - How to be prepared to APT</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:18" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Cyber Defense - How to be prepared to APT" src="https://cdn.slidesharecdn.com/ss_thumbnails/aieacyberdefensev07so-170425172551-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Cyber Defense - How to be prepared to APT" src="https://cdn.slidesharecdn.com/ss_thumbnails/aieacyberdefensev07so-170425172551-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Cyber Defense - How to be prepared to APT</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Cyber Defense - How to be prepared to APT for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mpql4f6:" popovertarget=":R5mpql4f6:" style="anchor-name:--popover-R5mpql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mpql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mpql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/simone.onofri">Simone Onofri</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This document provides an overview of a presentation on cyber defense and cyber attack simulations. It begins with an agenda and introductions. It then discusses the evolving threats landscape, with attacks increasing in scale, scope and sophistication. It outlines the cyber attack simulation methodology, including researching the target, infiltrating networks, establishing footholds, moving laterally and exfiltrating data. It describes three scenario examples - a web attack, phishing email, and exploiting physical access. Each scenario provides the rules of engagement, attack overview and lessons learned. It concludes with quotes emphasizing the importance of preparation and deception in warfare.</span></div></div><div class="" id=":Rpql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rpql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-19" aria-haspopup="dialog" aria-controls=":Rqal4f6:" popovertarget=":Rqal4f6:" style="anchor-name:--popover-Rqal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/network-security-monitoring-with-open-source-tools/38033458"><span class="sr-only">Network security monitoring with open source tools</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:19" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Network security monitoring with open source tools" src="https://cdn.slidesharecdn.com/ss_thumbnails/networksecuritymonitoringwithopensourcetools-140815140843-phpapp02-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Network security monitoring with open source tools" src="https://cdn.slidesharecdn.com/ss_thumbnails/networksecuritymonitoringwithopensourcetools-140815140843-phpapp02-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Network security monitoring with open source tools</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Network security monitoring with open source tools for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mqal4f6:" popovertarget=":R5mqal4f6:" style="anchor-name:--popover-R5mqal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mqal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mqal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/terriert">terriert</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses implementing network security monitoring using open source tools. It begins with an introduction to network security monitoring (NSM) and its goal of collecting and analyzing different types of network data to detect and respond to intrusions. It then discusses recommended platforms and operating systems for NSM, such as various free/open BSD systems. Next, it covers ways to capture network traffic, including using hubs, taps, inline devices, or SPAN ports. It proceeds to describe the four types of data collected in NSM - full content, session, event, and statistical data. For each, it provides examples of open source tools and compares them to commercial options. Finally, it discusses the open source tool Sguil, which implements</span></div></div><div class="" id=":Rqal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rqal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-20" aria-haspopup="dialog" aria-controls=":Rqql4f6:" popovertarget=":Rqql4f6:" style="anchor-name:--popover-Rqql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/osint-basics-for-threat-hunters-and-practitioners/244754055"><span class="sr-only">OSINT Basics for Threat Hunters and Practitioners</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:20" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="OSINT Basics for Threat Hunters and Practitioners" src="https://cdn.slidesharecdn.com/ss_thumbnails/mdeblois-osint-basics-swift-mar20212-210319182345-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="OSINT Basics for Threat Hunters and Practitioners" src="https://cdn.slidesharecdn.com/ss_thumbnails/mdeblois-osint-basics-swift-mar20212-210319182345-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">OSINT Basics for Threat Hunters and Practitioners</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save OSINT Basics for Threat Hunters and Practitioners for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mqql4f6:" popovertarget=":R5mqql4f6:" style="anchor-name:--popover-R5mqql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mqql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mqql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/MeganDeBlois">Megan DeBlois</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This presentation was created for the SWIFT Tech Symposium at Calpoly Pomona. Learn the basics of OSINT, but for hunting Internet infrastructure. -OSINT Basics: Let’ s talk about what it is, why it’s important, how it’s used in the world of Internet infrastructure. -Understanding Different Use Cases: We’ll take a quick look at examples of how this is valuable for threat hunters, security practitioners, as well as researchers. -Practice, practice, practice: I’ll end this talk by sharing out some good resources and ideas for how you can sharpen your OSINT skills for security research or for better organization defense.</span></div></div><div class="" id=":Rqql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rqql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-21" aria-haspopup="dialog" aria-controls=":Rral4f6:" popovertarget=":Rral4f6:" style="anchor-name:--popover-Rral4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/threatstack-workshop-stop-wasting-your-time-focus-on-security-practices-that-actually-matter/79134926"><span class="sr-only">ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:21" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha..." src="https://cdn.slidesharecdn.com/ss_thumbnails/aws-security-week-2017-2-hou-10f571fa-3bdd-49e1-9194-6ee92ada79b8-1317587539-170824204401-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha..." src="https://cdn.slidesharecdn.com/ss_thumbnails/aws-security-week-2017-2-hou-10f571fa-3bdd-49e1-9194-6ee92ada79b8-1317587539-170824204401-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mral4f6:" popovertarget=":R5mral4f6:" style="anchor-name:--popover-R5mral4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mral4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mral4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/AmazonWebServices">Amazon Web Services</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">There’s no shortage of noise about cybersecurity. Between the shear number of vendors and daily news coverage about the next big vulnerability or breach, it’s easy to start feeling directionless and reactive. However, there are ways to cut through the noise. The first step is understanding how companies are actually getting breached - not just the ones you hear about in the media. Then, you can create a strategy that’s tailored to your risk profile and attack surface. In this session, you’ll leave with an understanding of how to measure your risk, devise a realistic defense strategy, and deploy high impact security, no matter what your budget or time crunch is.</span></div></div><div class="" id=":Rral4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rral4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-22" aria-haspopup="dialog" aria-controls=":Rrql4f6:" popovertarget=":Rrql4f6:" style="anchor-name:--popover-Rrql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/splunk-for-security-handson-61639706/61639706"><span class="sr-only">Splunk for Security - Hands-On </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:22" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Splunk for Security - Hands-On " src="https://cdn.slidesharecdn.com/ss_thumbnails/discoverydaydesmoinessecuritypresentation-160503195214-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Splunk for Security - Hands-On " src="https://cdn.slidesharecdn.com/ss_thumbnails/discoverydaydesmoinessecuritypresentation-160503195214-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Splunk for Security - Hands-On </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Splunk for Security - Hands-On for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mrql4f6:" popovertarget=":R5mrql4f6:" style="anchor-name:--popover-R5mrql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mrql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mrql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Join our Security Expert and learn how to use the Splunk App for Enterprise Security (ES) in a live, hands-on session. We&#x27;ll take a tour through Splunk&#x27;s award-winning security offering to understand some of the unique capabilities in the product. Then, we&#x27;ll use ES to work an incident and disrupt an adversary&#x27;s Kill Chain by finding the Actions on Intent, Exploitation Methods, and Reconnaissance Tactics used against a simulated organization. Data investigated will include threat list intelligence feeds, endpoint activity logs, e-mail logs, and web access logs. This session is a must for all security experts! Please bring your laptop as this is a hands-on session. </span></div></div><div class="" id=":Rrql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rrql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-23" aria-haspopup="dialog" aria-controls=":Rsal4f6:" popovertarget=":Rsal4f6:" style="anchor-name:--popover-Rsal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/solnet-dev-secops-meetup/238687891"><span class="sr-only">Solnet dev secops meetup</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:23" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Solnet dev secops meetup" src="https://cdn.slidesharecdn.com/ss_thumbnails/solnetdevsecopsmeetup-201001033017-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Solnet dev secops meetup" src="https://cdn.slidesharecdn.com/ss_thumbnails/solnetdevsecopsmeetup-201001033017-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Solnet dev secops meetup</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Solnet dev secops meetup for later" role="switch" aria-haspopup="dialog" aria-controls=":R5msal4f6:" popovertarget=":R5msal4f6:" style="anchor-name:--popover-R5msal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5msal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5msal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/pbink">pbink</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">DevSecOps aims to integrate security practices into DevOps workflows to deliver value faster and safer. It addresses challenges like keeping security practices aligned with continuous delivery models and empowered DevOps teams. DevSecOps incorporates security checks and tools into development pipelines to find and fix issues early. This helps prevent breaches like the 2017 Equifax hack, which exploited a known vulnerability. DevSecOps promotes a culture of collaboration, shared responsibility, and proactive security monitoring throughout the software development lifecycle.</span></div></div><div class="" id=":Rsal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rsal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-24" aria-haspopup="dialog" aria-controls=":Rsql4f6:" popovertarget=":Rsql4f6:" style="anchor-name:--popover-Rsql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/networkworldsafebreach/70916466"><span class="sr-only">NetworkWorld-SafeBreach</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:24" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="NetworkWorld-SafeBreach" src="https://cdn.slidesharecdn.com/ss_thumbnails/2cb6af68-5293-48f0-85b1-08e60ba432df-170111174639-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="NetworkWorld-SafeBreach" src="https://cdn.slidesharecdn.com/ss_thumbnails/2cb6af68-5293-48f0-85b1-08e60ba432df-170111174639-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">NetworkWorld-SafeBreach</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save NetworkWorld-SafeBreach for later" role="switch" aria-haspopup="dialog" aria-controls=":R5msql4f6:" popovertarget=":R5msql4f6:" style="anchor-name:--popover-R5msql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5msql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5msql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/DanKunkel">Dan Kunkel</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">SafeBreach is a continuous security validation platform that can identify vulnerabilities in a company&#x27;s network by simulating cyberattacks. It deploys agents across all systems to map the network and monitor for attacks without affecting the systems. The article describes how SafeBreach was tested on a large virtual network, quickly finding hundreds of potential entry points and paths to sensitive data. It also discusses how SafeBreach can be used to run security scenarios and wargames to help train IT teams to respond to attacks.</span></div></div><div class="" id=":Rsql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rsql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-25" aria-haspopup="dialog" aria-controls=":Rtal4f6:" popovertarget=":Rtal4f6:" style="anchor-name:--popover-Rtal4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/hands-on-security-disrupting-the-kill-chain-breakout-final/47048737"><span class="sr-only">Hands on Security - Disrupting the Kill Chain Breakout Session</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:25" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Hands on Security - Disrupting the Kill Chain Breakout Session" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecurity-disruptingthekillchainbreakout-final-150415183306-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Hands on Security - Disrupting the Kill Chain Breakout Session" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecurity-disruptingthekillchainbreakout-final-150415183306-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Hands on Security - Disrupting the Kill Chain Breakout Session</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Hands on Security - Disrupting the Kill Chain Breakout Session for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mtal4f6:" popovertarget=":R5mtal4f6:" style="anchor-name:--popover-R5mtal4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mtal4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mtal4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses a security investigation using Splunk software to trace a cyber attack across multiple data sources. The investigation began by identifying communications from an internal IP address to known threats. Examining endpoint data revealed a suspicious svchost.exe process communicating outbound, which was traced back through parent processes to a vulnerable PDF reader opened by an employee. Web logs showed the attacker gained access to a sensitive file via a brute force attack on the company website. By connecting activities across threat intelligence, endpoint, email, web and other sources, the root cause was determined to be a targeted spear phishing email containing a weaponized PDF file.</span></div></div><div class="" id=":Rtal4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rtal4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-26" aria-haspopup="dialog" aria-controls=":Rtql4f6:" popovertarget=":Rtql4f6:" style="anchor-name:--popover-Rtql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/Splunk/handson-security-breakout-session-disrupting-the-kill-chain-48173629"><span class="sr-only">Hands-On Security Breakout Session- Disrupting the Kill Chain</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:26" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150515021052-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150515021052-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Hands-On Security Breakout Session- Disrupting the Kill Chain</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Hands-On Security Breakout Session- Disrupting the Kill Chain for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mtql4f6:" popovertarget=":R5mtql4f6:" style="anchor-name:--popover-R5mtql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mtql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mtql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This document summarizes a security investigation using Splunk software to disrupt the cyber kill chain. The investigation began by detecting threat intelligence related events across multiple data sources for a specific IP address. Further investigation revealed DNS queries, proxy activity, and suspicious processes on an endpoint. Pivoting to the endpoint data identified a Zeus malware process communicating outbound. Working backwards through process lineage identified an exploited vulnerable application and a weaponized PDF file delivered via email phishing. A search of web logs found the file was obtained from a website via a brute force attack. The root cause was determined to be a targeted spear phishing email containing an exploit.</span></div></div><div class="" id=":Rtql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rtql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-27" aria-haspopup="dialog" aria-controls=":Rual4f6:" popovertarget=":Rual4f6:" style="anchor-name:--popover-Rual4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/handson-security-breakout-session-disrupting-the-kill-chain/48005202"><span class="sr-only">Hands-On Security Breakout Session- Disrupting the Kill Chain</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:27" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150511162909-lva1-app6891-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150511162909-lva1-app6891-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Hands-On Security Breakout Session- Disrupting the Kill Chain</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Hands-On Security Breakout Session- Disrupting the Kill Chain for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mual4f6:" popovertarget=":R5mual4f6:" style="anchor-name:--popover-R5mual4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mual4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mual4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses a security investigation demo using Splunk software to disrupt the cyber kill chain. It begins with detecting threat intelligence related events across multiple data sources for a specific IP address. Further investigation using endpoint data from Microsoft Sysmon reveals network connections and process information. This traces the suspicious activity back through parent processes to identify a vulnerable PDF reader application exploited by opening a weaponized file delivered via email phishing. Additional context from web logs shows the file was obtained through a brute force attack on the company&#x27;s website. The investigation is then able to connect events across various data sources to fully map out the adversary&#x27;s actions.</span></div></div><div class="" id=":Rual4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rual4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-28" aria-haspopup="dialog" aria-controls=":Ruql4f6:" popovertarget=":Ruql4f6:" style="anchor-name:--popover-Ruql4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-networks-2022-technology-innovation-great-power-competition-255126380/255126380"><span class="sr-only">Team Networks - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:28" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Networks - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team2networks2-230103193906-3a211bca-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Networks - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team2networks2-230103193906-3a211bca-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Networks - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Networks - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5muql4f6:" popovertarget=":R5muql4f6:" style="anchor-name:--popover-R5muql4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5muql4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5muql4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, networks</span></div></div><div class="" id=":Ruql4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Ruql4f6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="recommended-card-description-29" aria-haspopup="dialog" aria-controls=":Rval4f6:" popovertarget=":Rval4f6:" style="anchor-name:--popover-Rval4f6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/sblank/team-lion-batteries-2022-technology-innovation-great-power-competition"><span class="sr-only">Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:29" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team9lionbatteries-221221050826-a3ab7cab-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team9lionbatteries-221221050826-a3ab7cab-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mval4f6:" popovertarget=":R5mval4f6:" style="anchor-name:--popover-R5mval4f6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mval4f6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mval4f6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, LiOn Batteries</span></div></div><div class="" id=":Rval4f6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-Rval4f6"></div></div><!--/$--></div></div><!--$--><div class="RelatedContent_root__29Np1"><div class="RelatedContent_wrapper__riU7l"><h2 class="Heading_heading__3MAvZ Heading_h2__f9yvs RelatedContent_title__QUhpL">More Related Content</h2><div class="bottom-recs BottomRecommendation_root__7aU9w"><h3 class="BottomRecommendation_title__SRj68">Similar to Mongoose H4D 2021 Lessons Learned<!-- --> <span class="BottomRecommendation_count__4HpLo">(<!-- -->20<!-- -->)</span></h3><div class="BottomRecommendationContent_root__2qm4_"><div class="mobile-recs"><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-0" aria-haspopup="dialog" aria-controls=":R45ipkf6:" popovertarget=":R45ipkf6:" style="anchor-name:--popover-R45ipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/applied-cognitive-security-complementing-the-security-analyst/74979164"><span class="sr-only">Applied cognitive security complementing the security analyst </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:0" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Applied cognitive security complementing the security analyst " src="https://cdn.slidesharecdn.com/ss_thumbnails/spo3-w03applied-cognitive-security-complementing-the-security-analystcopy1-170413124007-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Applied cognitive security complementing the security analyst " src="https://cdn.slidesharecdn.com/ss_thumbnails/spo3-w03applied-cognitive-security-complementing-the-security-analystcopy1-170413124007-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Applied cognitive security complementing the security analyst </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Applied cognitive security complementing the security analyst for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dk5ipkf6:" popovertarget=":R1dk5ipkf6:" style="anchor-name:--popover-R1dk5ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dk5ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dk5ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/cisoplatform7">Priyanka Aash</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution that can learn about security from structured and unstructured information sources is essential. It can be applied to empower security analysts with insights to qualify incidents and investigate risks quickly and accurately. (Source : RSA Conference 2017)</span></div></div><div class="" id=":R45ipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R45ipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-1" aria-haspopup="dialog" aria-controls=":R49ipkf6:" popovertarget=":R49ipkf6:" style="anchor-name:--popover-R49ipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/software-supply-chain-attacks/249624123"><span class="sr-only">Software Supply Chain Attacks (June 2021)</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:1" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Software Supply Chain Attacks (June 2021)" src="https://cdn.slidesharecdn.com/ss_thumbnails/softwaresupplychainattacks-tzahiarabov-210706132923-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Software Supply Chain Attacks (June 2021)" src="https://cdn.slidesharecdn.com/ss_thumbnails/softwaresupplychainattacks-tzahiarabov-210706132923-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Software Supply Chain Attacks (June 2021)</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Software Supply Chain Attacks (June 2021) for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dk9ipkf6:" popovertarget=":R1dk9ipkf6:" style="anchor-name:--popover-R1dk9ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dk9ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dk9ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/TzahiArabov">TzahiArabov</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The Codecov compromise involved a threat actor tampering with Codecov&#x27;s Bash uploader script between January-April 2021, allowing them to export data from hundreds of customers&#x27; CI environments. The compromised script exfiltrated environment variables to the attacker&#x27;s IP address. Rapid7 confirmed they were impacted, though the attacker was limited to internal tools and credentials and a small subset of source code repositories.</span></div></div><div class="" id=":R49ipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R49ipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-2" aria-haspopup="dialog" aria-controls=":R4dipkf6:" popovertarget=":R4dipkf6:" style="anchor-name:--popover-R4dipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/big-security-for-big-data/42439766"><span class="sr-only">Big security for big data</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:2" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Big security for big data" src="https://cdn.slidesharecdn.com/ss_thumbnails/bigsecurityforbigdata-141207073439-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Big security for big data" src="https://cdn.slidesharecdn.com/ss_thumbnails/bigsecurityforbigdata-141207073439-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Big security for big data</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Big security for big data for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dkdipkf6:" popovertarget=":R1dkdipkf6:" style="anchor-name:--popover-R1dkdipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dkdipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dkdipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/toroscatenato">Giuliano Tavaroli</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Big organizations are dealing with massive amounts of data from various sources that needs to be collected and analyzed in real-time to detect security threats. This requires normalizing the data, integrating it from different sources, and using analytics to identify patterns and correlations that could indicate attacks. Doing this analysis in real-time allows threats to be addressed quickly before data is stolen, rather than only analyzing after an attack occurred.</span></div></div><div class="" id=":R4dipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4dipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-3" aria-haspopup="dialog" aria-controls=":R4hipkf6:" popovertarget=":R4hipkf6:" style="anchor-name:--popover-R4hipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist/51987162"><span class="sr-only">Are you ready for the next attack? Reviewing the SP Security Checklist</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:3" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Are you ready for the next attack? Reviewing the SP Security Checklist" src="https://cdn.slidesharecdn.com/ss_thumbnails/barry-areyoureadyforthenextattackreviewingthespsecuritychecklist2-150824040120-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Are you ready for the next attack? Reviewing the SP Security Checklist" src="https://cdn.slidesharecdn.com/ss_thumbnails/barry-areyoureadyforthenextattackreviewingthespsecuritychecklist2-150824040120-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Are you ready for the next attack? Reviewing the SP Security Checklist</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Are you ready for the next attack? Reviewing the SP Security Checklist for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dkhipkf6:" popovertarget=":R1dkhipkf6:" style="anchor-name:--popover-R1dkhipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dkhipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dkhipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/mynog">MyNOG</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses the importance of checklists for network security and productivity. It provides a security checklist for internet service providers to optimize their operations. The checklist includes items like ensuring positive control over network access, implementing VTY access lists, requiring security partnerships with vendors, having upgrade plans for all equipment, reviewing IPv6 security, analyzing attack vectors, documenting BGP policies, and building a security community with peers. Adopting such practices can help mitigate security risks from threats like cyber criminals, hackers, and nation states.</span></div></div><div class="" id=":R4hipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4hipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-4" aria-haspopup="dialog" aria-controls=":R4lipkf6:" popovertarget=":R4lipkf6:" style="anchor-name:--popover-R4lipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/AlertLogic/realities-of-security-in-the-cloud-92195659"><span class="sr-only">Realities of Security in the Cloud</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:4" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Realities of Security in the Cloud" src="https://cdn.slidesharecdn.com/ss_thumbnails/realitiesofsecurityin-180328155648-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Realities of Security in the Cloud" src="https://cdn.slidesharecdn.com/ss_thumbnails/realitiesofsecurityin-180328155648-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Realities of Security in the Cloud</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Realities of Security in the Cloud for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dklipkf6:" popovertarget=":R1dklipkf6:" style="anchor-name:--popover-R1dklipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dklipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dklipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/AlertLogic">Alert Logic </a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This document discusses security challenges in cloud computing environments and how machine learning can help address them. It summarizes that web application attacks are now the largest source of data breaches but receive less than 5% of security budgets. It also notes that most detection efforts relying only on tools fail due to alert fatigue. Machine learning can help overcome these challenges by analyzing a wide range of data to detect even sophisticated, multi-stage attacks across cloud and non-cloud environments. The document advocates for an approach combining prevention, detection, response, compliance and expertise to provide comprehensive cloud security.</span></div></div><div class="" id=":R4lipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4lipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-5" aria-haspopup="dialog" aria-controls=":R4pipkf6:" popovertarget=":R4pipkf6:" style="anchor-name:--popover-R4pipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/websense-security-prediction-2014/29961110"><span class="sr-only">Websense security prediction 2014</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:5" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Websense security prediction 2014" src="https://cdn.slidesharecdn.com/ss_thumbnails/websense-securityprediction2014-140113091408-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Websense security prediction 2014" src="https://cdn.slidesharecdn.com/ss_thumbnails/websense-securityprediction2014-140113091408-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Websense security prediction 2014</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Websense security prediction 2014 for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dkpipkf6:" popovertarget=":R1dkpipkf6:" style="anchor-name:--popover-R1dkpipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dkpipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dkpipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Bee_Ware">Bee_Ware</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document provides 8 predictions for cybersecurity threats in 2014: 1) Advanced malware volume will decrease but attacks will become more targeted and stealthy. 2) A major data-destruction attack such as ransomware will successfully target organizations. 3) Attackers will increasingly target cloud data rather than enterprise networks. 4) Exploit kits like Redkit and Neutrino will struggle for dominance following the arrest of the Blackhole exploit kit author. 5) Java vulnerabilities will remain highly exploitable and exploited with expanded consequences. 6) Attackers will use professional social networks like LinkedIn to target executives and organizations. 7) Cybercriminals will target weaker links in organizations</span></div></div><div class="" id=":R4pipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4pipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-6" aria-haspopup="dialog" aria-controls=":R4tipkf6:" popovertarget=":R4tipkf6:" style="anchor-name:--popover-R4tipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/4777team-cfinal/156190924"><span class="sr-only">4777.team c.final</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:6" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="4777.team c.final" src="https://cdn.slidesharecdn.com/ss_thumbnails/4777-190718032016-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="4777.team c.final" src="https://cdn.slidesharecdn.com/ss_thumbnails/4777-190718032016-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">4777.team c.final</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 4777.team c.final for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dktipkf6:" popovertarget=":R1dktipkf6:" style="anchor-name:--popover-R1dktipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dktipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dktipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/AlexisHarvey8">AlexisHarvey8</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Team research paper and project on network vulnerabilities with multiple attacks and defesnses: Cybersecurity -For this project, our class was paired with teams to attempt to find vulnerabilities in other teams networks and to successfully beach their network. -My role in this group was to help breach other team vulnerabilities through different attacks like responder attacks, honeypots, etc. -The main challenges of this project were trying to find the vulnerabilities successfully, as the whole team had troubles with each of our different attacks and defenses. -We learned how to use cybersecurity tools to help find vulnerabilities in networks and how to protect against them better. For example, in the honeypot we used we deployed it to port 80, when the attacker tried to access our fake server we were notified. We also deployed palto alto firewall to create our private and secure network. For an attack, we also used password crackers like john the ripper. This project taught us how to breach networks as a team. </span></div></div><div class="" id=":R4tipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4tipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-7" aria-haspopup="dialog" aria-controls=":R51ipkf6:" popovertarget=":R51ipkf6:" style="anchor-name:--popover-R51ipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/combating-advanced-persistent-threats/24805314"><span class="sr-only">Combating Advanced Persistent Threats with Flow-based Security Monitoring</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:7" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Combating Advanced Persistent Threats with Flow-based Security Monitoring" src="https://cdn.slidesharecdn.com/ss_thumbnails/combating-apts-with-stealthwatch-slides-130731103954-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Combating Advanced Persistent Threats with Flow-based Security Monitoring" src="https://cdn.slidesharecdn.com/ss_thumbnails/combating-apts-with-stealthwatch-slides-130731103954-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Combating Advanced Persistent Threats with Flow-based Security Monitoring</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Combating Advanced Persistent Threats with Flow-based Security Monitoring for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dl1ipkf6:" popovertarget=":R1dl1ipkf6:" style="anchor-name:--popover-R1dl1ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dl1ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dl1ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Lancope">Lancope, Inc.</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Learn how to leverage flow data to: * Proactively detect attacks * Mitigate APTs * Gain forensic intelligence * Improve situational awareness</span></div></div><div class="" id=":R51ipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R51ipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-8" aria-haspopup="dialog" aria-controls=":R55ipkf6:" popovertarget=":R55ipkf6:" style="anchor-name:--popover-R55ipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/attackers-may-depend-on-social-engineering-to-gain/263567592"><span class="sr-only">Attackers May Depend On Social Engineering To Gain...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:8" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Attackers May Depend On Social Engineering To Gain..." src="https://cdn.slidesharecdn.com/ss_thumbnails/attackersmaydependonsocialengineeringtogain-231118212631-5f67e5bf-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Attackers May Depend On Social Engineering To Gain..." src="https://cdn.slidesharecdn.com/ss_thumbnails/attackersmaydependonsocialengineeringtogain-231118212631-5f67e5bf-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Attackers May Depend On Social Engineering To Gain...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Attackers May Depend On Social Engineering To Gain... for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dl5ipkf6:" popovertarget=":R1dl5ipkf6:" style="anchor-name:--popover-R1dl5ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dl5ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dl5ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/tiffanysandovalfairf">Tiffany Sandoval</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses integrating threat intelligence and incident response. It defines threat intelligence as technical and contextual information about emerging threats evaluated for accuracy. Threat intelligence feeds into strategic, operational and tactical security levels. Challenges include connecting diverse data points and filtering noise. A threat intelligence platform helps address this by analyzing data and delivering standardized information. The threat kill chain model outlines attack stages from reconnaissance to information theft. Integrating threat intelligence and incident response improves network defenses across each stage.</span></div></div><div class="" id=":R55ipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R55ipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-9" aria-haspopup="dialog" aria-controls=":R59ipkf6:" popovertarget=":R59ipkf6:" style="anchor-name:--popover-R59ipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/security-opportunities-a-silicon-valley-vc-perspective/48934246"><span class="sr-only">Security Opportunities A Silicon Valley VC Perspective</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:9" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Security Opportunities A Silicon Valley VC Perspective" src="https://cdn.slidesharecdn.com/ss_thumbnails/positivehackdays-rev1-150603100316-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Security Opportunities A Silicon Valley VC Perspective" src="https://cdn.slidesharecdn.com/ss_thumbnails/positivehackdays-rev1-150603100316-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Security Opportunities A Silicon Valley VC Perspective</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Security Opportunities A Silicon Valley VC Perspective for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dl9ipkf6:" popovertarget=":R1dl9ipkf6:" style="anchor-name:--popover-R1dl9ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dl9ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dl9ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/phdays">Positive Hack Days</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This document summarizes the key points from a Silicon Valley VC&#x27;s perspective on security opportunities and challenges. It notes that the security landscape is increasingly complex, with state-sponsored attacks and advanced tools being used by attackers. Most enterprises do not treat security as a core part of their culture. There are many opportunities for startups in security analytics, behavioral monitoring, encryption, and translating technical security data into actionable intelligence for companies. However, the document also notes that startups themselves often have very poor security practices. It provides examples of weak security postures commonly seen in startups. The document argues that improving security should be a priority for startups in order to protect their valuable assets and avoid losing funding or having their work stolen.</span></div></div><div class="" id=":R59ipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R59ipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-10" aria-haspopup="dialog" aria-controls=":R5dipkf6:" popovertarget=":R5dipkf6:" style="anchor-name:--popover-R5dipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/cyber-defense-how-to-be-prepared-to-apt/75398262"><span class="sr-only">Cyber Defense - How to be prepared to APT</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:10" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Cyber Defense - How to be prepared to APT" src="https://cdn.slidesharecdn.com/ss_thumbnails/aieacyberdefensev07so-170425172551-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Cyber Defense - How to be prepared to APT" src="https://cdn.slidesharecdn.com/ss_thumbnails/aieacyberdefensev07so-170425172551-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Cyber Defense - How to be prepared to APT</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Cyber Defense - How to be prepared to APT for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dldipkf6:" popovertarget=":R1dldipkf6:" style="anchor-name:--popover-R1dldipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dldipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dldipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/simone.onofri">Simone Onofri</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This document provides an overview of a presentation on cyber defense and cyber attack simulations. It begins with an agenda and introductions. It then discusses the evolving threats landscape, with attacks increasing in scale, scope and sophistication. It outlines the cyber attack simulation methodology, including researching the target, infiltrating networks, establishing footholds, moving laterally and exfiltrating data. It describes three scenario examples - a web attack, phishing email, and exploiting physical access. Each scenario provides the rules of engagement, attack overview and lessons learned. It concludes with quotes emphasizing the importance of preparation and deception in warfare.</span></div></div><div class="" id=":R5dipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5dipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-11" aria-haspopup="dialog" aria-controls=":R5hipkf6:" popovertarget=":R5hipkf6:" style="anchor-name:--popover-R5hipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/network-security-monitoring-with-open-source-tools/38033458"><span class="sr-only">Network security monitoring with open source tools</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:11" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Network security monitoring with open source tools" src="https://cdn.slidesharecdn.com/ss_thumbnails/networksecuritymonitoringwithopensourcetools-140815140843-phpapp02-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Network security monitoring with open source tools" src="https://cdn.slidesharecdn.com/ss_thumbnails/networksecuritymonitoringwithopensourcetools-140815140843-phpapp02-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Network security monitoring with open source tools</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Network security monitoring with open source tools for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dlhipkf6:" popovertarget=":R1dlhipkf6:" style="anchor-name:--popover-R1dlhipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dlhipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dlhipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/terriert">terriert</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses implementing network security monitoring using open source tools. It begins with an introduction to network security monitoring (NSM) and its goal of collecting and analyzing different types of network data to detect and respond to intrusions. It then discusses recommended platforms and operating systems for NSM, such as various free/open BSD systems. Next, it covers ways to capture network traffic, including using hubs, taps, inline devices, or SPAN ports. It proceeds to describe the four types of data collected in NSM - full content, session, event, and statistical data. For each, it provides examples of open source tools and compares them to commercial options. Finally, it discusses the open source tool Sguil, which implements</span></div></div><div class="" id=":R5hipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5hipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-12" aria-haspopup="dialog" aria-controls=":R5lipkf6:" popovertarget=":R5lipkf6:" style="anchor-name:--popover-R5lipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/osint-basics-for-threat-hunters-and-practitioners/244754055"><span class="sr-only">OSINT Basics for Threat Hunters and Practitioners</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:12" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="OSINT Basics for Threat Hunters and Practitioners" src="https://cdn.slidesharecdn.com/ss_thumbnails/mdeblois-osint-basics-swift-mar20212-210319182345-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="OSINT Basics for Threat Hunters and Practitioners" src="https://cdn.slidesharecdn.com/ss_thumbnails/mdeblois-osint-basics-swift-mar20212-210319182345-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">OSINT Basics for Threat Hunters and Practitioners</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save OSINT Basics for Threat Hunters and Practitioners for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dllipkf6:" popovertarget=":R1dllipkf6:" style="anchor-name:--popover-R1dllipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dllipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dllipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/MeganDeBlois">Megan DeBlois</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This presentation was created for the SWIFT Tech Symposium at Calpoly Pomona. Learn the basics of OSINT, but for hunting Internet infrastructure. -OSINT Basics: Let’ s talk about what it is, why it’s important, how it’s used in the world of Internet infrastructure. -Understanding Different Use Cases: We’ll take a quick look at examples of how this is valuable for threat hunters, security practitioners, as well as researchers. -Practice, practice, practice: I’ll end this talk by sharing out some good resources and ideas for how you can sharpen your OSINT skills for security research or for better organization defense.</span></div></div><div class="" id=":R5lipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5lipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-13" aria-haspopup="dialog" aria-controls=":R5pipkf6:" popovertarget=":R5pipkf6:" style="anchor-name:--popover-R5pipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/threatstack-workshop-stop-wasting-your-time-focus-on-security-practices-that-actually-matter/79134926"><span class="sr-only">ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:13" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha..." src="https://cdn.slidesharecdn.com/ss_thumbnails/aws-security-week-2017-2-hou-10f571fa-3bdd-49e1-9194-6ee92ada79b8-1317587539-170824204401-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha..." src="https://cdn.slidesharecdn.com/ss_thumbnails/aws-security-week-2017-2-hou-10f571fa-3bdd-49e1-9194-6ee92ada79b8-1317587539-170824204401-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha... for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dlpipkf6:" popovertarget=":R1dlpipkf6:" style="anchor-name:--popover-R1dlpipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dlpipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dlpipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/AmazonWebServices">Amazon Web Services</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">There’s no shortage of noise about cybersecurity. Between the shear number of vendors and daily news coverage about the next big vulnerability or breach, it’s easy to start feeling directionless and reactive. However, there are ways to cut through the noise. The first step is understanding how companies are actually getting breached - not just the ones you hear about in the media. Then, you can create a strategy that’s tailored to your risk profile and attack surface. In this session, you’ll leave with an understanding of how to measure your risk, devise a realistic defense strategy, and deploy high impact security, no matter what your budget or time crunch is.</span></div></div><div class="" id=":R5pipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5pipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-14" aria-haspopup="dialog" aria-controls=":R5tipkf6:" popovertarget=":R5tipkf6:" style="anchor-name:--popover-R5tipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/splunk-for-security-handson-61639706/61639706"><span class="sr-only">Splunk for Security - Hands-On </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:14" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Splunk for Security - Hands-On " src="https://cdn.slidesharecdn.com/ss_thumbnails/discoverydaydesmoinessecuritypresentation-160503195214-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Splunk for Security - Hands-On " src="https://cdn.slidesharecdn.com/ss_thumbnails/discoverydaydesmoinessecuritypresentation-160503195214-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Splunk for Security - Hands-On </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Splunk for Security - Hands-On for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dltipkf6:" popovertarget=":R1dltipkf6:" style="anchor-name:--popover-R1dltipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dltipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dltipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Join our Security Expert and learn how to use the Splunk App for Enterprise Security (ES) in a live, hands-on session. We&#x27;ll take a tour through Splunk&#x27;s award-winning security offering to understand some of the unique capabilities in the product. Then, we&#x27;ll use ES to work an incident and disrupt an adversary&#x27;s Kill Chain by finding the Actions on Intent, Exploitation Methods, and Reconnaissance Tactics used against a simulated organization. Data investigated will include threat list intelligence feeds, endpoint activity logs, e-mail logs, and web access logs. This session is a must for all security experts! Please bring your laptop as this is a hands-on session. </span></div></div><div class="" id=":R5tipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5tipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-15" aria-haspopup="dialog" aria-controls=":R61ipkf6:" popovertarget=":R61ipkf6:" style="anchor-name:--popover-R61ipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/solnet-dev-secops-meetup/238687891"><span class="sr-only">Solnet dev secops meetup</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:15" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Solnet dev secops meetup" src="https://cdn.slidesharecdn.com/ss_thumbnails/solnetdevsecopsmeetup-201001033017-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Solnet dev secops meetup" src="https://cdn.slidesharecdn.com/ss_thumbnails/solnetdevsecopsmeetup-201001033017-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Solnet dev secops meetup</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Solnet dev secops meetup for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dm1ipkf6:" popovertarget=":R1dm1ipkf6:" style="anchor-name:--popover-R1dm1ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dm1ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dm1ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/pbink">pbink</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">DevSecOps aims to integrate security practices into DevOps workflows to deliver value faster and safer. It addresses challenges like keeping security practices aligned with continuous delivery models and empowered DevOps teams. DevSecOps incorporates security checks and tools into development pipelines to find and fix issues early. This helps prevent breaches like the 2017 Equifax hack, which exploited a known vulnerability. DevSecOps promotes a culture of collaboration, shared responsibility, and proactive security monitoring throughout the software development lifecycle.</span></div></div><div class="" id=":R61ipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R61ipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-16" aria-haspopup="dialog" aria-controls=":R65ipkf6:" popovertarget=":R65ipkf6:" style="anchor-name:--popover-R65ipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/networkworldsafebreach/70916466"><span class="sr-only">NetworkWorld-SafeBreach</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:16" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="NetworkWorld-SafeBreach" src="https://cdn.slidesharecdn.com/ss_thumbnails/2cb6af68-5293-48f0-85b1-08e60ba432df-170111174639-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="NetworkWorld-SafeBreach" src="https://cdn.slidesharecdn.com/ss_thumbnails/2cb6af68-5293-48f0-85b1-08e60ba432df-170111174639-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">NetworkWorld-SafeBreach</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save NetworkWorld-SafeBreach for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dm5ipkf6:" popovertarget=":R1dm5ipkf6:" style="anchor-name:--popover-R1dm5ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dm5ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dm5ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/DanKunkel">Dan Kunkel</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">SafeBreach is a continuous security validation platform that can identify vulnerabilities in a company&#x27;s network by simulating cyberattacks. It deploys agents across all systems to map the network and monitor for attacks without affecting the systems. The article describes how SafeBreach was tested on a large virtual network, quickly finding hundreds of potential entry points and paths to sensitive data. It also discusses how SafeBreach can be used to run security scenarios and wargames to help train IT teams to respond to attacks.</span></div></div><div class="" id=":R65ipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R65ipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-17" aria-haspopup="dialog" aria-controls=":R69ipkf6:" popovertarget=":R69ipkf6:" style="anchor-name:--popover-R69ipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/hands-on-security-disrupting-the-kill-chain-breakout-final/47048737"><span class="sr-only">Hands on Security - Disrupting the Kill Chain Breakout Session</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:17" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Hands on Security - Disrupting the Kill Chain Breakout Session" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecurity-disruptingthekillchainbreakout-final-150415183306-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Hands on Security - Disrupting the Kill Chain Breakout Session" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecurity-disruptingthekillchainbreakout-final-150415183306-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Hands on Security - Disrupting the Kill Chain Breakout Session</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Hands on Security - Disrupting the Kill Chain Breakout Session for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dm9ipkf6:" popovertarget=":R1dm9ipkf6:" style="anchor-name:--popover-R1dm9ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dm9ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dm9ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses a security investigation using Splunk software to trace a cyber attack across multiple data sources. The investigation began by identifying communications from an internal IP address to known threats. Examining endpoint data revealed a suspicious svchost.exe process communicating outbound, which was traced back through parent processes to a vulnerable PDF reader opened by an employee. Web logs showed the attacker gained access to a sensitive file via a brute force attack on the company website. By connecting activities across threat intelligence, endpoint, email, web and other sources, the root cause was determined to be a targeted spear phishing email containing a weaponized PDF file.</span></div></div><div class="" id=":R69ipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R69ipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-18" aria-haspopup="dialog" aria-controls=":R6dipkf6:" popovertarget=":R6dipkf6:" style="anchor-name:--popover-R6dipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/Splunk/handson-security-breakout-session-disrupting-the-kill-chain-48173629"><span class="sr-only">Hands-On Security Breakout Session- Disrupting the Kill Chain</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:18" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150515021052-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150515021052-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Hands-On Security Breakout Session- Disrupting the Kill Chain</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Hands-On Security Breakout Session- Disrupting the Kill Chain for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dmdipkf6:" popovertarget=":R1dmdipkf6:" style="anchor-name:--popover-R1dmdipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dmdipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dmdipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">This document summarizes a security investigation using Splunk software to disrupt the cyber kill chain. The investigation began by detecting threat intelligence related events across multiple data sources for a specific IP address. Further investigation revealed DNS queries, proxy activity, and suspicious processes on an endpoint. Pivoting to the endpoint data identified a Zeus malware process communicating outbound. Working backwards through process lineage identified an exploited vulnerable application and a weaponized PDF file delivered via email phishing. A search of web logs found the file was obtained from a website via a brute force attack. The root cause was determined to be a targeted spear phishing email containing an exploit.</span></div></div><div class="" id=":R6dipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R6dipkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="similarTo-card-description-19" aria-haspopup="dialog" aria-controls=":R6hipkf6:" popovertarget=":R6hipkf6:" style="anchor-name:--popover-R6hipkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/handson-security-breakout-session-disrupting-the-kill-chain/48005202"><span class="sr-only">Hands-On Security Breakout Session- Disrupting the Kill Chain</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:19" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150511162909-lva1-app6891-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150511162909-lva1-app6891-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Hands-On Security Breakout Session- Disrupting the Kill Chain</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Hands-On Security Breakout Session- Disrupting the Kill Chain for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dmhipkf6:" popovertarget=":R1dmhipkf6:" style="anchor-name:--popover-R1dmhipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dmhipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dmhipkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document discusses a security investigation demo using Splunk software to disrupt the cyber kill chain. It begins with detecting threat intelligence related events across multiple data sources for a specific IP address. Further investigation using endpoint data from Microsoft Sysmon reveals network connections and process information. This traces the suspicious activity back through parent processes to identify a vulnerable PDF reader application exploited by opening a weaponized file delivered via email phishing. Additional context from web logs shows the file was obtained through a brute force attack on the company&#x27;s website. The investigation is then able to connect events across various data sources to fully map out the adversary&#x27;s actions.</span></div></div><div class="" id=":R6hipkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R6hipkf6"></div></div><div class="desktop-recs"><div class="Slider_root__c0Jo8"><div class="Slider_scroller__KHjw4"><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/applied-cognitive-security-complementing-the-security-analyst/74979164"><span class="sr-only">Applied cognitive security complementing the security analyst </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:0" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Applied cognitive security complementing the security analyst " src="https://cdn.slidesharecdn.com/ss_thumbnails/spo3-w03applied-cognitive-security-complementing-the-security-analystcopy1-170413124007-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Applied cognitive security complementing the security analyst " src="https://cdn.slidesharecdn.com/ss_thumbnails/spo3-w03applied-cognitive-security-complementing-the-security-analystcopy1-170413124007-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Applied cognitive security complementing the security analyst </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Applied cognitive security complementing the security analyst for later" role="switch" aria-haspopup="dialog" aria-controls=":R5gmipkf6:" popovertarget=":R5gmipkf6:" style="anchor-name:--popover-R5gmipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5gmipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5gmipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/cisoplatform7">Priyanka Aash</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/software-supply-chain-attacks/249624123"><span class="sr-only">Software Supply Chain Attacks (June 2021)</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:1" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Software Supply Chain Attacks (June 2021)" src="https://cdn.slidesharecdn.com/ss_thumbnails/softwaresupplychainattacks-tzahiarabov-210706132923-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Software Supply Chain Attacks (June 2021)" src="https://cdn.slidesharecdn.com/ss_thumbnails/softwaresupplychainattacks-tzahiarabov-210706132923-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Software Supply Chain Attacks (June 2021)</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Software Supply Chain Attacks (June 2021) for later" role="switch" aria-haspopup="dialog" aria-controls=":R5h6ipkf6:" popovertarget=":R5h6ipkf6:" style="anchor-name:--popover-R5h6ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5h6ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5h6ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/TzahiArabov">TzahiArabov</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/big-security-for-big-data/42439766"><span class="sr-only">Big security for big data</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:2" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Big security for big data" src="https://cdn.slidesharecdn.com/ss_thumbnails/bigsecurityforbigdata-141207073439-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Big security for big data" src="https://cdn.slidesharecdn.com/ss_thumbnails/bigsecurityforbigdata-141207073439-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Big security for big data</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Big security for big data for later" role="switch" aria-haspopup="dialog" aria-controls=":R5hmipkf6:" popovertarget=":R5hmipkf6:" style="anchor-name:--popover-R5hmipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5hmipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5hmipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/toroscatenato">Giuliano Tavaroli</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist/51987162"><span class="sr-only">Are you ready for the next attack? Reviewing the SP Security Checklist</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:3" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Are you ready for the next attack? Reviewing the SP Security Checklist" src="https://cdn.slidesharecdn.com/ss_thumbnails/barry-areyoureadyforthenextattackreviewingthespsecuritychecklist2-150824040120-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Are you ready for the next attack? Reviewing the SP Security Checklist" src="https://cdn.slidesharecdn.com/ss_thumbnails/barry-areyoureadyforthenextattackreviewingthespsecuritychecklist2-150824040120-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Are you ready for the next attack? Reviewing the SP Security Checklist</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Are you ready for the next attack? Reviewing the SP Security Checklist for later" role="switch" aria-haspopup="dialog" aria-controls=":R5i6ipkf6:" popovertarget=":R5i6ipkf6:" style="anchor-name:--popover-R5i6ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5i6ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5i6ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/mynog">MyNOG</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/AlertLogic/realities-of-security-in-the-cloud-92195659"><span class="sr-only">Realities of Security in the Cloud</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:4" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Realities of Security in the Cloud" src="https://cdn.slidesharecdn.com/ss_thumbnails/realitiesofsecurityin-180328155648-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Realities of Security in the Cloud" src="https://cdn.slidesharecdn.com/ss_thumbnails/realitiesofsecurityin-180328155648-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Realities of Security in the Cloud</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Realities of Security in the Cloud for later" role="switch" aria-haspopup="dialog" aria-controls=":R5imipkf6:" popovertarget=":R5imipkf6:" style="anchor-name:--popover-R5imipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5imipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5imipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/AlertLogic">Alert Logic </a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/websense-security-prediction-2014/29961110"><span class="sr-only">Websense security prediction 2014</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:5" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Websense security prediction 2014" src="https://cdn.slidesharecdn.com/ss_thumbnails/websense-securityprediction2014-140113091408-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Websense security prediction 2014" src="https://cdn.slidesharecdn.com/ss_thumbnails/websense-securityprediction2014-140113091408-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Websense security prediction 2014</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Websense security prediction 2014 for later" role="switch" aria-haspopup="dialog" aria-controls=":R5j6ipkf6:" popovertarget=":R5j6ipkf6:" style="anchor-name:--popover-R5j6ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5j6ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5j6ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Bee_Ware">Bee_Ware</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/4777team-cfinal/156190924"><span class="sr-only">4777.team c.final</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:6" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="4777.team c.final" src="https://cdn.slidesharecdn.com/ss_thumbnails/4777-190718032016-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="4777.team c.final" src="https://cdn.slidesharecdn.com/ss_thumbnails/4777-190718032016-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">4777.team c.final</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 4777.team c.final for later" role="switch" aria-haspopup="dialog" aria-controls=":R5jmipkf6:" popovertarget=":R5jmipkf6:" style="anchor-name:--popover-R5jmipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5jmipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5jmipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/AlexisHarvey8">AlexisHarvey8</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/combating-advanced-persistent-threats/24805314"><span class="sr-only">Combating Advanced Persistent Threats with Flow-based Security Monitoring</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:7" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Combating Advanced Persistent Threats with Flow-based Security Monitoring" src="https://cdn.slidesharecdn.com/ss_thumbnails/combating-apts-with-stealthwatch-slides-130731103954-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Combating Advanced Persistent Threats with Flow-based Security Monitoring" src="https://cdn.slidesharecdn.com/ss_thumbnails/combating-apts-with-stealthwatch-slides-130731103954-phpapp01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Combating Advanced Persistent Threats with Flow-based Security Monitoring</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Combating Advanced Persistent Threats with Flow-based Security Monitoring for later" role="switch" aria-haspopup="dialog" aria-controls=":R5k6ipkf6:" popovertarget=":R5k6ipkf6:" style="anchor-name:--popover-R5k6ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5k6ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5k6ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Lancope">Lancope, Inc.</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/attackers-may-depend-on-social-engineering-to-gain/263567592"><span class="sr-only">Attackers May Depend On Social Engineering To Gain...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:8" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Attackers May Depend On Social Engineering To Gain..." src="https://cdn.slidesharecdn.com/ss_thumbnails/attackersmaydependonsocialengineeringtogain-231118212631-5f67e5bf-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Attackers May Depend On Social Engineering To Gain..." src="https://cdn.slidesharecdn.com/ss_thumbnails/attackersmaydependonsocialengineeringtogain-231118212631-5f67e5bf-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Attackers May Depend On Social Engineering To Gain...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Attackers May Depend On Social Engineering To Gain... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5kmipkf6:" popovertarget=":R5kmipkf6:" style="anchor-name:--popover-R5kmipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5kmipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5kmipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/tiffanysandovalfairf">Tiffany Sandoval</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/security-opportunities-a-silicon-valley-vc-perspective/48934246"><span class="sr-only">Security Opportunities A Silicon Valley VC Perspective</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:9" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Security Opportunities A Silicon Valley VC Perspective" src="https://cdn.slidesharecdn.com/ss_thumbnails/positivehackdays-rev1-150603100316-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Security Opportunities A Silicon Valley VC Perspective" src="https://cdn.slidesharecdn.com/ss_thumbnails/positivehackdays-rev1-150603100316-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Security Opportunities A Silicon Valley VC Perspective</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Security Opportunities A Silicon Valley VC Perspective for later" role="switch" aria-haspopup="dialog" aria-controls=":R5l6ipkf6:" popovertarget=":R5l6ipkf6:" style="anchor-name:--popover-R5l6ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5l6ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5l6ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/phdays">Positive Hack Days</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/cyber-defense-how-to-be-prepared-to-apt/75398262"><span class="sr-only">Cyber Defense - How to be prepared to APT</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:10" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Cyber Defense - How to be prepared to APT" src="https://cdn.slidesharecdn.com/ss_thumbnails/aieacyberdefensev07so-170425172551-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Cyber Defense - How to be prepared to APT" src="https://cdn.slidesharecdn.com/ss_thumbnails/aieacyberdefensev07so-170425172551-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Cyber Defense - How to be prepared to APT</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Cyber Defense - How to be prepared to APT for later" role="switch" aria-haspopup="dialog" aria-controls=":R5lmipkf6:" popovertarget=":R5lmipkf6:" style="anchor-name:--popover-R5lmipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5lmipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5lmipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/simone.onofri">Simone Onofri</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/network-security-monitoring-with-open-source-tools/38033458"><span class="sr-only">Network security monitoring with open source tools</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:11" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Network security monitoring with open source tools" src="https://cdn.slidesharecdn.com/ss_thumbnails/networksecuritymonitoringwithopensourcetools-140815140843-phpapp02-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Network security monitoring with open source tools" src="https://cdn.slidesharecdn.com/ss_thumbnails/networksecuritymonitoringwithopensourcetools-140815140843-phpapp02-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Network security monitoring with open source tools</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Network security monitoring with open source tools for later" role="switch" aria-haspopup="dialog" aria-controls=":R5m6ipkf6:" popovertarget=":R5m6ipkf6:" style="anchor-name:--popover-R5m6ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5m6ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5m6ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/terriert">terriert</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/osint-basics-for-threat-hunters-and-practitioners/244754055"><span class="sr-only">OSINT Basics for Threat Hunters and Practitioners</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:12" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="OSINT Basics for Threat Hunters and Practitioners" src="https://cdn.slidesharecdn.com/ss_thumbnails/mdeblois-osint-basics-swift-mar20212-210319182345-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="OSINT Basics for Threat Hunters and Practitioners" src="https://cdn.slidesharecdn.com/ss_thumbnails/mdeblois-osint-basics-swift-mar20212-210319182345-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">OSINT Basics for Threat Hunters and Practitioners</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save OSINT Basics for Threat Hunters and Practitioners for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mmipkf6:" popovertarget=":R5mmipkf6:" style="anchor-name:--popover-R5mmipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mmipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mmipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/MeganDeBlois">Megan DeBlois</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/threatstack-workshop-stop-wasting-your-time-focus-on-security-practices-that-actually-matter/79134926"><span class="sr-only">ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:13" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha..." src="https://cdn.slidesharecdn.com/ss_thumbnails/aws-security-week-2017-2-hou-10f571fa-3bdd-49e1-9194-6ee92ada79b8-1317587539-170824204401-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha..." src="https://cdn.slidesharecdn.com/ss_thumbnails/aws-security-week-2017-2-hou-10f571fa-3bdd-49e1-9194-6ee92ada79b8-1317587539-170824204401-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5n6ipkf6:" popovertarget=":R5n6ipkf6:" style="anchor-name:--popover-R5n6ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5n6ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5n6ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/AmazonWebServices">Amazon Web Services</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/splunk-for-security-handson-61639706/61639706"><span class="sr-only">Splunk for Security - Hands-On </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:14" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Splunk for Security - Hands-On " src="https://cdn.slidesharecdn.com/ss_thumbnails/discoverydaydesmoinessecuritypresentation-160503195214-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Splunk for Security - Hands-On " src="https://cdn.slidesharecdn.com/ss_thumbnails/discoverydaydesmoinessecuritypresentation-160503195214-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Splunk for Security - Hands-On </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Splunk for Security - Hands-On for later" role="switch" aria-haspopup="dialog" aria-controls=":R5nmipkf6:" popovertarget=":R5nmipkf6:" style="anchor-name:--popover-R5nmipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5nmipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5nmipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/solnet-dev-secops-meetup/238687891"><span class="sr-only">Solnet dev secops meetup</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:15" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Solnet dev secops meetup" src="https://cdn.slidesharecdn.com/ss_thumbnails/solnetdevsecopsmeetup-201001033017-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Solnet dev secops meetup" src="https://cdn.slidesharecdn.com/ss_thumbnails/solnetdevsecopsmeetup-201001033017-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Solnet dev secops meetup</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Solnet dev secops meetup for later" role="switch" aria-haspopup="dialog" aria-controls=":R5o6ipkf6:" popovertarget=":R5o6ipkf6:" style="anchor-name:--popover-R5o6ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5o6ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5o6ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/pbink">pbink</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/networkworldsafebreach/70916466"><span class="sr-only">NetworkWorld-SafeBreach</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:16" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="NetworkWorld-SafeBreach" src="https://cdn.slidesharecdn.com/ss_thumbnails/2cb6af68-5293-48f0-85b1-08e60ba432df-170111174639-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="NetworkWorld-SafeBreach" src="https://cdn.slidesharecdn.com/ss_thumbnails/2cb6af68-5293-48f0-85b1-08e60ba432df-170111174639-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">NetworkWorld-SafeBreach</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save NetworkWorld-SafeBreach for later" role="switch" aria-haspopup="dialog" aria-controls=":R5omipkf6:" popovertarget=":R5omipkf6:" style="anchor-name:--popover-R5omipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5omipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5omipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/DanKunkel">Dan Kunkel</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/hands-on-security-disrupting-the-kill-chain-breakout-final/47048737"><span class="sr-only">Hands on Security - Disrupting the Kill Chain Breakout Session</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:17" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Hands on Security - Disrupting the Kill Chain Breakout Session" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecurity-disruptingthekillchainbreakout-final-150415183306-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Hands on Security - Disrupting the Kill Chain Breakout Session" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecurity-disruptingthekillchainbreakout-final-150415183306-conversion-gate01-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Hands on Security - Disrupting the Kill Chain Breakout Session</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Hands on Security - Disrupting the Kill Chain Breakout Session for later" role="switch" aria-haspopup="dialog" aria-controls=":R5p6ipkf6:" popovertarget=":R5p6ipkf6:" style="anchor-name:--popover-R5p6ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5p6ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5p6ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/Splunk/handson-security-breakout-session-disrupting-the-kill-chain-48173629"><span class="sr-only">Hands-On Security Breakout Session- Disrupting the Kill Chain</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:18" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150515021052-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150515021052-lva1-app6892-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Hands-On Security Breakout Session- Disrupting the Kill Chain</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Hands-On Security Breakout Session- Disrupting the Kill Chain for later" role="switch" aria-haspopup="dialog" aria-controls=":R5pmipkf6:" popovertarget=":R5pmipkf6:" style="anchor-name:--popover-R5pmipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5pmipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5pmipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/handson-security-breakout-session-disrupting-the-kill-chain/48005202"><span class="sr-only">Hands-On Security Breakout Session- Disrupting the Kill Chain</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:19" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150511162909-lva1-app6891-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Hands-On Security Breakout Session- Disrupting the Kill Chain" src="https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150511162909-lva1-app6891-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Hands-On Security Breakout Session- Disrupting the Kill Chain</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Hands-On Security Breakout Session- Disrupting the Kill Chain for later" role="switch" aria-haspopup="dialog" aria-controls=":R5q6ipkf6:" popovertarget=":R5q6ipkf6:" style="anchor-name:--popover-R5q6ipkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5q6ipkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5q6ipkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Splunk">Splunk</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div></div><button aria-label="Previous" type="button" class="Slider_arrow__8LCca Slider_prev__YMssa Slider_hidden__rs7nK"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/chevron-left.50b146c0.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><button aria-label="Next" type="button" class="Slider_arrow__8LCca Slider_next__fa9IO"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/chevron-right.9b30ad08.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button></div></div></div></div><div class="bottom-recs BottomRecommendation_root__7aU9w"><h3 class="BottomRecommendation_title__SRj68">More from Stanford University<!-- --> <span class="BottomRecommendation_count__4HpLo">(<!-- -->20<!-- -->)</span></h3><div class="BottomRecommendationContent_root__2qm4_"><div class="mobile-recs"><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-0" aria-haspopup="dialog" aria-controls=":R45j9kf6:" popovertarget=":R45j9kf6:" style="anchor-name:--popover-R45j9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-networks-2022-technology-innovation-great-power-competition-255126380/255126380"><span class="sr-only">Team Networks - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:0" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Networks - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team2networks2-230103193906-3a211bca-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Networks - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team2networks2-230103193906-3a211bca-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Networks - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Networks - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dk5j9kf6:" popovertarget=":R1dk5j9kf6:" style="anchor-name:--popover-R1dk5j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dk5j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dk5j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, networks</span></div></div><div class="" id=":R45j9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R45j9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-1" aria-haspopup="dialog" aria-controls=":R49j9kf6:" popovertarget=":R49j9kf6:" style="anchor-name:--popover-R49j9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/sblank/team-lion-batteries-2022-technology-innovation-great-power-competition"><span class="sr-only">Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:1" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team9lionbatteries-221221050826-a3ab7cab-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team9lionbatteries-221221050826-a3ab7cab-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dk9j9kf6:" popovertarget=":R1dk9j9kf6:" style="anchor-name:--popover-R1dk9j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dk9j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dk9j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, LiOn Batteries</span></div></div><div class="" id=":R49j9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R49j9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-2" aria-haspopup="dialog" aria-controls=":R4dj9kf6:" popovertarget=":R4dj9kf6:" style="anchor-name:--popover-R4dj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/sblank/team-quantum-2022-technology-innovation-great-power-competition"><span class="sr-only">Team Quantum - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:2" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Quantum - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team7quantum-221221050657-0f216f2a-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Quantum - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team7quantum-221221050657-0f216f2a-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Quantum - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Quantum - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dkdj9kf6:" popovertarget=":R1dkdj9kf6:" style="anchor-name:--popover-R1dkdj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dkdj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dkdj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Quantum</span></div></div><div class="" id=":R4dj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4dj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-3" aria-haspopup="dialog" aria-controls=":R4hj9kf6:" popovertarget=":R4hj9kf6:" style="anchor-name:--popover-R4hj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-disinformation-2022-technology-innovation-great-power-competition/254970280"><span class="sr-only">Team Disinformation - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:3" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Disinformation - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team6disinformation-221221011843-37a67139-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Disinformation - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team6disinformation-221221011843-37a67139-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Disinformation - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Disinformation - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dkhj9kf6:" popovertarget=":R1dkhj9kf6:" style="anchor-name:--popover-R1dkhj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dkhj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dkhj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Disinformation</span></div></div><div class="" id=":R4hj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4hj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-4" aria-haspopup="dialog" aria-controls=":R4lj9kf6:" popovertarget=":R4lj9kf6:" style="anchor-name:--popover-R4lj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-wargames-2022-technology-innovation-great-power-competition/254970251"><span class="sr-only">Team Wargames - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:4" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Wargames - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team4-combineddraft-221221011421-59a4b8a1-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Wargames - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team4-combineddraft-221221011421-59a4b8a1-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Wargames - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Wargames - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dklj9kf6:" popovertarget=":R1dklj9kf6:" style="anchor-name:--popover-R1dklj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dklj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dklj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Wargames</span></div></div><div class="" id=":R4lj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4lj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-5" aria-haspopup="dialog" aria-controls=":R4pj9kf6:" popovertarget=":R4pj9kf6:" style="anchor-name:--popover-R4pj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-acquistion-2022-technology-innovation-great-power-competition/254969985"><span class="sr-only">Team Acquistion - 2022 Technology, Innovation &amp; Great Power Competition </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:5" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Acquistion - 2022 Technology, Innovation &amp; Great Power Competition " src="https://cdn.slidesharecdn.com/ss_thumbnails/team3lessonslearnedvf-221221002641-538f4f5a-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Acquistion - 2022 Technology, Innovation &amp; Great Power Competition " src="https://cdn.slidesharecdn.com/ss_thumbnails/team3lessonslearnedvf-221221002641-538f4f5a-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Acquistion - 2022 Technology, Innovation &amp; Great Power Competition </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Acquistion - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dkpj9kf6:" popovertarget=":R1dkpj9kf6:" style="anchor-name:--popover-R1dkpj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dkpj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dkpj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Acquistion</span></div></div><div class="" id=":R4pj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4pj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-6" aria-haspopup="dialog" aria-controls=":R4tj9kf6:" popovertarget=":R4tj9kf6:" style="anchor-name:--popover-R4tj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/sblank/team-army-climate-change-2022-technology-innovation-great-power-competition"><span class="sr-only">Team Climate Change - 2022 Technology, Innovation &amp; Great Power Competition </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:6" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Climate Change - 2022 Technology, Innovation &amp; Great Power Competition " src="https://cdn.slidesharecdn.com/ss_thumbnails/team1final-221220213514-633c0c59-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Climate Change - 2022 Technology, Innovation &amp; Great Power Competition " src="https://cdn.slidesharecdn.com/ss_thumbnails/team1final-221220213514-633c0c59-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Climate Change - 2022 Technology, Innovation &amp; Great Power Competition </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Climate Change - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dktj9kf6:" popovertarget=":R1dktj9kf6:" style="anchor-name:--popover-R1dktj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dktj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dktj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, climate</span></div></div><div class="" id=":R4tj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4tj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-7" aria-haspopup="dialog" aria-controls=":R51j9kf6:" popovertarget=":R51j9kf6:" style="anchor-name:--popover-R51j9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/altuna-engr245-2022-lessons-learned/252113422"><span class="sr-only">Altuna Engr245 2022 Lessons Learned</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:7" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Altuna Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/2022-05-25altunafinalreflections-220704025228-fbbfff3c-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Altuna Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/2022-05-25altunafinalreflections-220704025228-fbbfff3c-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Altuna Engr245 2022 Lessons Learned</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Altuna Engr245 2022 Lessons Learned for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dl1j9kf6:" popovertarget=":R1dl1j9kf6:" style="anchor-name:--popover-R1dl1j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dl1j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dl1j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document describes a team&#x27;s efforts to commercialize a new protein quantification technology called PLA-Seq. After initially thinking the technology&#x27;s value propositions of lower cost, faster throughput, and lower sample volume would appeal to pharmaceutical and personalized health companies, the team conducted customer interviews and learned accuracy was more important than cost to most customers. They also found their target markets should be preclinical biotech and academia rather than personalized health or CROs. The team incorporated their business and pivoted their marketing strategy and funding plans accordingly based on learnings outside of the building.</span></div></div><div class="" id=":R51j9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R51j9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-8" aria-haspopup="dialog" aria-controls=":R55j9kf6:" popovertarget=":R55j9kf6:" style="anchor-name:--popover-R55j9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/invisa-engr245-2022-lessons-learned/252113417"><span class="sr-only">Invisa Engr245 2022 Lessons Learned</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:8" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Invisa Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/invisafinalpresenation-220704025156-caa0c0b6-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Invisa Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/invisafinalpresenation-220704025156-caa0c0b6-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Invisa Engr245 2022 Lessons Learned</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Invisa Engr245 2022 Lessons Learned for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dl5j9kf6:" popovertarget=":R1dl5j9kf6:" style="anchor-name:--popover-R1dl5j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dl5j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dl5j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The document summarizes the development of Invisa Bio over 10 weeks as they pivoted between different medical applications and solutions for their self-assembling medical device technology. They initially focused on manufacturing and delivery but shifted to leveraging drug delivery mechanisms. They considered applications in cardiology, neurology, and orthopedics before focusing on brain aneurysms based on feedback from physicians. The company incorporated, raised funding, and began shadowing doctors to further develop their technology to address unmet needs in difficult to reach areas.</span></div></div><div class="" id=":R55j9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R55j9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-9" aria-haspopup="dialog" aria-controls=":R59j9kf6:" popovertarget=":R59j9kf6:" style="anchor-name:--popover-R59j9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/nanda-engr245-2022-lessons-learned/252113416"><span class="sr-only">ānanda Engr245 2022 Lessons Learned</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:9" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="ānanda Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/nandalessonslearned-finaldraft-220704025152-21e0bfdd-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="ānanda Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/nandalessonslearned-finaldraft-220704025152-21e0bfdd-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">ānanda Engr245 2022 Lessons Learned</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save ānanda Engr245 2022 Lessons Learned for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dl9j9kf6:" popovertarget=":R1dl9j9kf6:" style="anchor-name:--popover-R1dl9j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dl9j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dl9j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">(1) The document describes the journey of a team developing a saffron supplement product to address mental health issues like anxiety and depression. (2) It started with the goal of targeting adults aged 18-40, but through customer interviews and testing, they learned that teenagers were more interested in an anti-anxiety gummy product. (3) Key lessons included the challenges of building the right team, navigating advice, knowing when enough customer feedback has been received, and setting individual and project milestones. The team is now continuing work over the summer to further develop the product.</span></div></div><div class="" id=":R59j9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R59j9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-10" aria-haspopup="dialog" aria-controls=":R5dj9kf6:" popovertarget=":R5dj9kf6:" style="anchor-name:--popover-R5dj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/gordian-knot-center-roundtable-wdepty-secdef/251567050"><span class="sr-only">Gordian Knot Center Roundtable w/Depty SecDef </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:10" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Gordian Knot Center Roundtable w/Depty SecDef " src="https://cdn.slidesharecdn.com/ss_thumbnails/dsdgkcroundtablev2-220412025626-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Gordian Knot Center Roundtable w/Depty SecDef " src="https://cdn.slidesharecdn.com/ss_thumbnails/dsdgkcroundtablev2-220412025626-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Gordian Knot Center Roundtable w/Depty SecDef </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Gordian Knot Center Roundtable w/Depty SecDef for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dldj9kf6:" popovertarget=":R1dldj9kf6:" style="anchor-name:--popover-R1dldj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dldj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dldj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Kathleen Hicks - Deputy secretary of defense- visit to the Stanford Gordian Knot Center for National Security Innovation</span></div></div><div class="" id=":R5dj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5dj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-11" aria-haspopup="dialog" aria-controls=":R5hj9kf6:" popovertarget=":R5hj9kf6:" style="anchor-name:--popover-R5hj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-army-venture-capital-2021-technology-innovation-great-power-competition-250985332/250985332"><span class="sr-only">Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:11" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi..." src="https://cdn.slidesharecdn.com/ss_thumbnails/avicdeckfinal2-220112223235-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi..." src="https://cdn.slidesharecdn.com/ss_thumbnails/avicdeckfinal2-220112223235-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi... for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dlhj9kf6:" popovertarget=":R1dlhj9kf6:" style="anchor-name:--popover-R1dlhj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dlhj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dlhj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, Army venture capital</span></div></div><div class="" id=":R5hj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5hj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-12" aria-haspopup="dialog" aria-controls=":R5lj9kf6:" popovertarget=":R5lj9kf6:" style="anchor-name:--popover-R5lj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-army-venture-capital-2021-technology-innovation-great-power-competition-250985330/250985330"><span class="sr-only">Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:12" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi..." src="https://cdn.slidesharecdn.com/ss_thumbnails/avicdeckfinal2-220112223132-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi..." src="https://cdn.slidesharecdn.com/ss_thumbnails/avicdeckfinal2-220112223132-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi... for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dllj9kf6:" popovertarget=":R1dllj9kf6:" style="anchor-name:--popover-R1dllj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dllj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dllj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve Blank, Army Venture capital</span></div></div><div class="" id=":R5lj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5lj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-13" aria-haspopup="dialog" aria-controls=":R5pj9kf6:" popovertarget=":R5pj9kf6:" style="anchor-name:--popover-R5pj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-catena-2021-technology-innovation-great-power-competition/250937807"><span class="sr-only">Team Catena - 2021 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:13" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Catena - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team71833318821721catenafinalprojectpresentationsubmission-220104015059-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Catena - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team71833318821721catenafinalprojectpresentationsubmission-220104015059-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Catena - 2021 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Catena - 2021 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dlpj9kf6:" popovertarget=":R1dlpj9kf6:" style="anchor-name:--popover-R1dlpj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dlpj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dlpj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, economic coercion,</span></div></div><div class="" id=":R5pj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5pj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-14" aria-haspopup="dialog" aria-controls=":R5tj9kf6:" popovertarget=":R5tj9kf6:" style="anchor-name:--popover-R5tj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-space-force-2021-technology-innovation-great-power-competition/250937800"><span class="sr-only">Team Apollo - 2021 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:14" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Apollo - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team61110388821561spaceforce-220104014933-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Apollo - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team61110388821561spaceforce-220104014933-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Apollo - 2021 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Apollo - 2021 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dltj9kf6:" popovertarget=":R1dltj9kf6:" style="anchor-name:--popover-R1dltj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dltj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dltj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, space force</span></div></div><div class="" id=":R5tj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5tj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-15" aria-haspopup="dialog" aria-controls=":R61j9kf6:" popovertarget=":R61j9kf6:" style="anchor-name:--popover-R61j9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-drone-2021-technology-innovation-great-power-competition/250937790"><span class="sr-only">Team Drone - 2021 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:15" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Drone - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team5late1841158862916tigpcdraftpresentation2-220104014801-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Drone - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team5late1841158862916tigpcdraftpresentation2-220104014801-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Drone - 2021 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Drone - 2021 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dm1j9kf6:" popovertarget=":R1dm1j9kf6:" style="anchor-name:--popover-R1dm1j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dm1j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dm1j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, c3i, command and control</span></div></div><div class="" id=":R61j9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R61j9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-16" aria-haspopup="dialog" aria-controls=":R65j9kf6:" popovertarget=":R65j9kf6:" style="anchor-name:--popover-R65j9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-short-circuit-2021-technology-innovation-great-power-competition/250937666"><span class="sr-only">Team Short Circuit - 2021 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:16" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Short Circuit - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team41730708820990teamshortcircuitpresentationclean-220104011943-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Short Circuit - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team41730708820990teamshortcircuitpresentationclean-220104011943-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Short Circuit - 2021 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Short Circuit - 2021 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dm5j9kf6:" popovertarget=":R1dm5j9kf6:" style="anchor-name:--popover-R1dm5j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dm5j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dm5j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, semiconductors</span></div></div><div class="" id=":R65j9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R65j9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-17" aria-haspopup="dialog" aria-controls=":R69j9kf6:" popovertarget=":R69j9kf6:" style="anchor-name:--popover-R69j9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/aurora-2021-technology-innovation-great-power-competition/250937652"><span class="sr-only">Team Aurora - 2021 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:17" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Aurora - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team3late1064048821797newfinalpresentationslides-220104011503-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Aurora - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team3late1064048821797newfinalpresentationslides-220104011503-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Aurora - 2021 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Aurora - 2021 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dm9j9kf6:" popovertarget=":R1dm9j9kf6:" style="anchor-name:--popover-R1dm9j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dm9j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dm9j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, Army venture capital</span></div></div><div class="" id=":R69j9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R69j9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-18" aria-haspopup="dialog" aria-controls=":R6dj9kf6:" popovertarget=":R6dj9kf6:" style="anchor-name:--popover-R6dj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-conflicted-capital-team-2021-technology-innovation-great-power-competition/250937647"><span class="sr-only">Team Conflicted Capital Team - 2021 Technology, Innovation &amp; Great Power Comp...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:18" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Conflicted Capital Team - 2021 Technology, Innovation &amp; Great Power Comp..." src="https://cdn.slidesharecdn.com/ss_thumbnails/team21130conflictedcapitaltigpcfinalpresentation-220104011009-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Conflicted Capital Team - 2021 Technology, Innovation &amp; Great Power Comp..." src="https://cdn.slidesharecdn.com/ss_thumbnails/team21130conflictedcapitaltigpcfinalpresentation-220104011009-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Conflicted Capital Team - 2021 Technology, Innovation &amp; Great Power Comp...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Conflicted Capital Team - 2021 Technology, Innovation &amp; Great Power Comp... for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dmdj9kf6:" popovertarget=":R1dmdj9kf6:" style="anchor-name:--popover-R1dmdj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dmdj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dmdj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, venture capital</span></div></div><div class="" id=":R6dj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R6dj9kf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="moreFromUser-card-description-19" aria-haspopup="dialog" aria-controls=":R6hj9kf6:" popovertarget=":R6hj9kf6:" style="anchor-name:--popover-R6hj9kf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/lecture-8-technology-innovation-and-great-power-competition-cyber/250694008"><span class="sr-only">Lecture 8 - Technology, Innovation and Great Power Competition - Cyber</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:19" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Lecture 8 - Technology, Innovation and Great Power Competition - Cyber" src="https://cdn.slidesharecdn.com/ss_thumbnails/lecture8tigpc2021-211121072220-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Lecture 8 - Technology, Innovation and Great Power Competition - Cyber" src="https://cdn.slidesharecdn.com/ss_thumbnails/lecture8tigpc2021-211121072220-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Lecture 8 - Technology, Innovation and Great Power Competition - Cyber</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Lecture 8 - Technology, Innovation and Great Power Competition - Cyber for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dmhj9kf6:" popovertarget=":R1dmhj9kf6:" style="anchor-name:--popover-R1dmhj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dmhj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dmhj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, hacking for defense, intlpol 340, joe felter, ms&amp;e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, Michael Sulmeyer, cybercom,USCYBERCOM</span></div></div><div class="" id=":R6hj9kf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R6hj9kf6"></div></div><div class="desktop-recs"><div class="Slider_root__c0Jo8"><div class="Slider_scroller__KHjw4"><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-networks-2022-technology-innovation-great-power-competition-255126380/255126380"><span class="sr-only">Team Networks - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:0" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Networks - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team2networks2-230103193906-3a211bca-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Networks - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team2networks2-230103193906-3a211bca-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Networks - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Networks - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5gmj9kf6:" popovertarget=":R5gmj9kf6:" style="anchor-name:--popover-R5gmj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5gmj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5gmj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/sblank/team-lion-batteries-2022-technology-innovation-great-power-competition"><span class="sr-only">Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:1" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team9lionbatteries-221221050826-a3ab7cab-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team9lionbatteries-221221050826-a3ab7cab-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team LiOn Batteries - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5h6j9kf6:" popovertarget=":R5h6j9kf6:" style="anchor-name:--popover-R5h6j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5h6j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5h6j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/sblank/team-quantum-2022-technology-innovation-great-power-competition"><span class="sr-only">Team Quantum - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:2" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Quantum - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team7quantum-221221050657-0f216f2a-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Quantum - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team7quantum-221221050657-0f216f2a-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Quantum - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Quantum - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5hmj9kf6:" popovertarget=":R5hmj9kf6:" style="anchor-name:--popover-R5hmj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5hmj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5hmj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-disinformation-2022-technology-innovation-great-power-competition/254970280"><span class="sr-only">Team Disinformation - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:3" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Disinformation - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team6disinformation-221221011843-37a67139-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Disinformation - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team6disinformation-221221011843-37a67139-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Disinformation - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Disinformation - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5i6j9kf6:" popovertarget=":R5i6j9kf6:" style="anchor-name:--popover-R5i6j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5i6j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5i6j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-wargames-2022-technology-innovation-great-power-competition/254970251"><span class="sr-only">Team Wargames - 2022 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:4" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Wargames - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team4-combineddraft-221221011421-59a4b8a1-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Wargames - 2022 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team4-combineddraft-221221011421-59a4b8a1-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Wargames - 2022 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Wargames - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5imj9kf6:" popovertarget=":R5imj9kf6:" style="anchor-name:--popover-R5imj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5imj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5imj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-acquistion-2022-technology-innovation-great-power-competition/254969985"><span class="sr-only">Team Acquistion - 2022 Technology, Innovation &amp; Great Power Competition </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:5" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Acquistion - 2022 Technology, Innovation &amp; Great Power Competition " src="https://cdn.slidesharecdn.com/ss_thumbnails/team3lessonslearnedvf-221221002641-538f4f5a-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Acquistion - 2022 Technology, Innovation &amp; Great Power Competition " src="https://cdn.slidesharecdn.com/ss_thumbnails/team3lessonslearnedvf-221221002641-538f4f5a-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Acquistion - 2022 Technology, Innovation &amp; Great Power Competition </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Acquistion - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5j6j9kf6:" popovertarget=":R5j6j9kf6:" style="anchor-name:--popover-R5j6j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5j6j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5j6j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/sblank/team-army-climate-change-2022-technology-innovation-great-power-competition"><span class="sr-only">Team Climate Change - 2022 Technology, Innovation &amp; Great Power Competition </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:6" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Climate Change - 2022 Technology, Innovation &amp; Great Power Competition " src="https://cdn.slidesharecdn.com/ss_thumbnails/team1final-221220213514-633c0c59-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Climate Change - 2022 Technology, Innovation &amp; Great Power Competition " src="https://cdn.slidesharecdn.com/ss_thumbnails/team1final-221220213514-633c0c59-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Climate Change - 2022 Technology, Innovation &amp; Great Power Competition </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Climate Change - 2022 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5jmj9kf6:" popovertarget=":R5jmj9kf6:" style="anchor-name:--popover-R5jmj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5jmj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5jmj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/altuna-engr245-2022-lessons-learned/252113422"><span class="sr-only">Altuna Engr245 2022 Lessons Learned</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:7" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Altuna Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/2022-05-25altunafinalreflections-220704025228-fbbfff3c-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Altuna Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/2022-05-25altunafinalreflections-220704025228-fbbfff3c-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Altuna Engr245 2022 Lessons Learned</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Altuna Engr245 2022 Lessons Learned for later" role="switch" aria-haspopup="dialog" aria-controls=":R5k6j9kf6:" popovertarget=":R5k6j9kf6:" style="anchor-name:--popover-R5k6j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5k6j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5k6j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/invisa-engr245-2022-lessons-learned/252113417"><span class="sr-only">Invisa Engr245 2022 Lessons Learned</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:8" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Invisa Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/invisafinalpresenation-220704025156-caa0c0b6-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Invisa Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/invisafinalpresenation-220704025156-caa0c0b6-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Invisa Engr245 2022 Lessons Learned</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Invisa Engr245 2022 Lessons Learned for later" role="switch" aria-haspopup="dialog" aria-controls=":R5kmj9kf6:" popovertarget=":R5kmj9kf6:" style="anchor-name:--popover-R5kmj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5kmj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5kmj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/nanda-engr245-2022-lessons-learned/252113416"><span class="sr-only">ānanda Engr245 2022 Lessons Learned</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:9" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="ānanda Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/nandalessonslearned-finaldraft-220704025152-21e0bfdd-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="ānanda Engr245 2022 Lessons Learned" src="https://cdn.slidesharecdn.com/ss_thumbnails/nandalessonslearned-finaldraft-220704025152-21e0bfdd-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">ānanda Engr245 2022 Lessons Learned</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save ānanda Engr245 2022 Lessons Learned for later" role="switch" aria-haspopup="dialog" aria-controls=":R5l6j9kf6:" popovertarget=":R5l6j9kf6:" style="anchor-name:--popover-R5l6j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5l6j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5l6j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/gordian-knot-center-roundtable-wdepty-secdef/251567050"><span class="sr-only">Gordian Knot Center Roundtable w/Depty SecDef </span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:10" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Gordian Knot Center Roundtable w/Depty SecDef " src="https://cdn.slidesharecdn.com/ss_thumbnails/dsdgkcroundtablev2-220412025626-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Gordian Knot Center Roundtable w/Depty SecDef " src="https://cdn.slidesharecdn.com/ss_thumbnails/dsdgkcroundtablev2-220412025626-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Gordian Knot Center Roundtable w/Depty SecDef </span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Gordian Knot Center Roundtable w/Depty SecDef for later" role="switch" aria-haspopup="dialog" aria-controls=":R5lmj9kf6:" popovertarget=":R5lmj9kf6:" style="anchor-name:--popover-R5lmj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5lmj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5lmj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-army-venture-capital-2021-technology-innovation-great-power-competition-250985332/250985332"><span class="sr-only">Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:11" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi..." src="https://cdn.slidesharecdn.com/ss_thumbnails/avicdeckfinal2-220112223235-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi..." src="https://cdn.slidesharecdn.com/ss_thumbnails/avicdeckfinal2-220112223235-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5m6j9kf6:" popovertarget=":R5m6j9kf6:" style="anchor-name:--popover-R5m6j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5m6j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5m6j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-army-venture-capital-2021-technology-innovation-great-power-competition-250985330/250985330"><span class="sr-only">Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:12" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi..." src="https://cdn.slidesharecdn.com/ss_thumbnails/avicdeckfinal2-220112223132-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi..." src="https://cdn.slidesharecdn.com/ss_thumbnails/avicdeckfinal2-220112223132-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Army venture capital - 2021 Technology, Innovation &amp; Great Power Competi... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mmj9kf6:" popovertarget=":R5mmj9kf6:" style="anchor-name:--popover-R5mmj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mmj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mmj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-catena-2021-technology-innovation-great-power-competition/250937807"><span class="sr-only">Team Catena - 2021 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:13" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Catena - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team71833318821721catenafinalprojectpresentationsubmission-220104015059-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Catena - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team71833318821721catenafinalprojectpresentationsubmission-220104015059-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Catena - 2021 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Catena - 2021 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5n6j9kf6:" popovertarget=":R5n6j9kf6:" style="anchor-name:--popover-R5n6j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5n6j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5n6j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-space-force-2021-technology-innovation-great-power-competition/250937800"><span class="sr-only">Team Apollo - 2021 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:14" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Apollo - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team61110388821561spaceforce-220104014933-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Apollo - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team61110388821561spaceforce-220104014933-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Apollo - 2021 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Apollo - 2021 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5nmj9kf6:" popovertarget=":R5nmj9kf6:" style="anchor-name:--popover-R5nmj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5nmj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5nmj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-drone-2021-technology-innovation-great-power-competition/250937790"><span class="sr-only">Team Drone - 2021 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:15" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Drone - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team5late1841158862916tigpcdraftpresentation2-220104014801-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Drone - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team5late1841158862916tigpcdraftpresentation2-220104014801-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Drone - 2021 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Drone - 2021 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5o6j9kf6:" popovertarget=":R5o6j9kf6:" style="anchor-name:--popover-R5o6j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5o6j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5o6j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-short-circuit-2021-technology-innovation-great-power-competition/250937666"><span class="sr-only">Team Short Circuit - 2021 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:16" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Short Circuit - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team41730708820990teamshortcircuitpresentationclean-220104011943-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Short Circuit - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team41730708820990teamshortcircuitpresentationclean-220104011943-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Short Circuit - 2021 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Short Circuit - 2021 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5omj9kf6:" popovertarget=":R5omj9kf6:" style="anchor-name:--popover-R5omj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5omj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5omj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/aurora-2021-technology-innovation-great-power-competition/250937652"><span class="sr-only">Team Aurora - 2021 Technology, Innovation &amp; Great Power Competition</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:17" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Aurora - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team3late1064048821797newfinalpresentationslides-220104011503-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Aurora - 2021 Technology, Innovation &amp; Great Power Competition" src="https://cdn.slidesharecdn.com/ss_thumbnails/team3late1064048821797newfinalpresentationslides-220104011503-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Aurora - 2021 Technology, Innovation &amp; Great Power Competition</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Aurora - 2021 Technology, Innovation &amp; Great Power Competition for later" role="switch" aria-haspopup="dialog" aria-controls=":R5p6j9kf6:" popovertarget=":R5p6j9kf6:" style="anchor-name:--popover-R5p6j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5p6j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5p6j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/team-conflicted-capital-team-2021-technology-innovation-great-power-competition/250937647"><span class="sr-only">Team Conflicted Capital Team - 2021 Technology, Innovation &amp; Great Power Comp...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:18" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Team Conflicted Capital Team - 2021 Technology, Innovation &amp; Great Power Comp..." src="https://cdn.slidesharecdn.com/ss_thumbnails/team21130conflictedcapitaltigpcfinalpresentation-220104011009-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Team Conflicted Capital Team - 2021 Technology, Innovation &amp; Great Power Comp..." src="https://cdn.slidesharecdn.com/ss_thumbnails/team21130conflictedcapitaltigpcfinalpresentation-220104011009-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Team Conflicted Capital Team - 2021 Technology, Innovation &amp; Great Power Comp...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Team Conflicted Capital Team - 2021 Technology, Innovation &amp; Great Power Comp... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5pmj9kf6:" popovertarget=":R5pmj9kf6:" style="anchor-name:--popover-R5pmj9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5pmj9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5pmj9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/lecture-8-technology-innovation-and-great-power-competition-cyber/250694008"><span class="sr-only">Lecture 8 - Technology, Innovation and Great Power Competition - Cyber</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:19" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Lecture 8 - Technology, Innovation and Great Power Competition - Cyber" src="https://cdn.slidesharecdn.com/ss_thumbnails/lecture8tigpc2021-211121072220-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Lecture 8 - Technology, Innovation and Great Power Competition - Cyber" src="https://cdn.slidesharecdn.com/ss_thumbnails/lecture8tigpc2021-211121072220-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Lecture 8 - Technology, Innovation and Great Power Competition - Cyber</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Lecture 8 - Technology, Innovation and Great Power Competition - Cyber for later" role="switch" aria-haspopup="dialog" aria-controls=":R5q6j9kf6:" popovertarget=":R5q6j9kf6:" style="anchor-name:--popover-R5q6j9kf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5q6j9kf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5q6j9kf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sblank">Stanford University</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div></div><button aria-label="Previous" type="button" class="Slider_arrow__8LCca Slider_prev__YMssa Slider_hidden__rs7nK"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/chevron-left.50b146c0.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><button aria-label="Next" type="button" class="Slider_arrow__8LCca Slider_next__fa9IO"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/chevron-right.9b30ad08.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button></div></div></div></div><div id="between-recs-ad-1-container" class="freestar-ad-container FreestarAdContainer_root__qPPC_" style="--fallback-aspect-ratio:undefined / undefined" data-testid="freestar-ad-container"><div><div class="" id="between-recs-ad-1"></div></div></div><div class="bottom-recs BottomRecommendation_root__7aU9w"><h3 class="BottomRecommendation_title__SRj68">Recently uploaded<!-- --> <span class="BottomRecommendation_count__4HpLo">(<!-- -->20<!-- -->)</span></h3><div class="BottomRecommendationContent_root__2qm4_"><div class="mobile-recs"><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-0" aria-haspopup="dialog" aria-controls=":R45jpkf6:" popovertarget=":R45jpkf6:" style="anchor-name:--popover-R45jpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/early-korea-1-reconsidering-early-korean-history-through-archaeology-mark-e-byington/276437155"><span class="sr-only">Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:0" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ..." src="https://cdn.slidesharecdn.com/ss_thumbnails/64052-250308223712-73806320-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ..." src="https://cdn.slidesharecdn.com/ss_thumbnails/64052-250308223712-73806320-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ... for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dk5jpkf6:" popovertarget=":R1dk5jpkf6:" style="anchor-name:--popover-R1dk5jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dk5jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dk5jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/spinoyayber">spinoyayber</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. Byington Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. Byington Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. Byington</span></div></div><div class="" id=":R45jpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R45jpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-1" aria-haspopup="dialog" aria-controls=":R49jpkf6:" popovertarget=":R49jpkf6:" style="anchor-name:--popover-R49jpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/how-to-use-product-categories-in-odoo-17-to-organize-your-inventory/276539172"><span class="sr-only">How to use product categories in Odoo 17 to organize your Inventory</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:1" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="How to use product categories in Odoo 17 to organize your Inventory" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtouseproductcategoriesinodoo17toorganizeyourinventory-250311061259-404b5f8e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="How to use product categories in Odoo 17 to organize your Inventory" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtouseproductcategoriesinodoo17toorganizeyourinventory-250311061259-404b5f8e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">How to use product categories in Odoo 17 to organize your Inventory</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save How to use product categories in Odoo 17 to organize your Inventory for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dk9jpkf6:" popovertarget=":R1dk9jpkf6:" style="anchor-name:--popover-R1dk9jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dk9jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dk9jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/CelineGeorge1">Celine George</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Product categories in Odoo are essential for organizing and managing your inventory efficiently. They help you group similar products together, making it easier to track stock levels, analyze sales data, and apply specific configurations such as tax rules, accounting entries, or routes for purchasing and manufacturing.</span></div></div><div class="" id=":R49jpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R49jpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-2" aria-haspopup="dialog" aria-controls=":R4djpkf6:" popovertarget=":R4djpkf6:" style="anchor-name:--popover-R4djpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/7-es-application-of-number-percentages/276495934"><span class="sr-only">7. ES: Application of Number: Percentages</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:2" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="7. ES: Application of Number: Percentages" src="https://cdn.slidesharecdn.com/ss_thumbnails/8-250310093732-964a000d-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="7. ES: Application of Number: Percentages" src="https://cdn.slidesharecdn.com/ss_thumbnails/8-250310093732-964a000d-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">7. ES: Application of Number: Percentages</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 7. ES: Application of Number: Percentages for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dkdjpkf6:" popovertarget=":R1dkdjpkf6:" style="anchor-name:--popover-R1dkdjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dkdjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dkdjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/leigh441292">leigh441292</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">AON: Percentages</span></div></div><div class="" id=":R4djpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4djpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-3" aria-haspopup="dialog" aria-controls=":R4hjpkf6:" popovertarget=":R4hjpkf6:" style="anchor-name:--popover-R4hjpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024/276384155"><span class="sr-only">Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:3" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1..." src="https://cdn.slidesharecdn.com/ss_thumbnails/lessonplanm12024-250307104619-647897c6-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1..." src="https://cdn.slidesharecdn.com/ss_thumbnails/lessonplanm12024-250307104619-647897c6-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1... for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dkhjpkf6:" popovertarget=":R1dkhjpkf6:" style="anchor-name:--popover-R1dkhjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dkhjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dkhjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/pinkdvil200">pinkdvil200</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 </span></div></div><div class="" id=":R4hjpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4hjpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-4" aria-haspopup="dialog" aria-controls=":R4ljpkf6:" popovertarget=":R4ljpkf6:" style="anchor-name:--popover-R4ljpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/kaun-talha-quiz-prelims-el-dorado-2025/276392082"><span class="sr-only">Kaun TALHA quiz Prelims - El Dorado 2025</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:4" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Kaun TALHA quiz Prelims - El Dorado 2025" src="https://cdn.slidesharecdn.com/ss_thumbnails/kauntalhaprelimswithanswers-250307151746-3d96fe94-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Kaun TALHA quiz Prelims - El Dorado 2025" src="https://cdn.slidesharecdn.com/ss_thumbnails/kauntalhaprelimswithanswers-250307151746-3d96fe94-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Kaun TALHA quiz Prelims - El Dorado 2025</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Kaun TALHA quiz Prelims - El Dorado 2025 for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dkljpkf6:" popovertarget=":R1dkljpkf6:" style="anchor-name:--popover-R1dkljpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dkljpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dkljpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/ConquiztadorsTheQuiz">Conquiztadors- the Quiz Society of Sri Venkateswara College</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Prelims of Kaun TALHA : a Travel, Architecture, Lifestyle, Heritage and Activism quiz, organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025. </span></div></div><div class="" id=":R4ljpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4ljpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-5" aria-haspopup="dialog" aria-controls=":R4pjpkf6:" popovertarget=":R4pjpkf6:" style="anchor-name:--popover-R4pjpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/adrenergic-transmission-adrenergic-drugs/276453870"><span class="sr-only">Adrenergic Transmission &amp; Adrenergic Drugs</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:5" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Adrenergic Transmission &amp; Adrenergic Drugs" src="https://cdn.slidesharecdn.com/ss_thumbnails/adrenergicdrugsdrcvignesh-250309111948-b49476f3-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Adrenergic Transmission &amp; Adrenergic Drugs" src="https://cdn.slidesharecdn.com/ss_thumbnails/adrenergicdrugsdrcvignesh-250309111948-b49476f3-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Adrenergic Transmission &amp; Adrenergic Drugs</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Adrenergic Transmission &amp; Adrenergic Drugs for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dkpjpkf6:" popovertarget=":R1dkpjpkf6:" style="anchor-name:--popover-R1dkpjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dkpjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dkpjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/doc21vignesh">Dr C Vignesh </a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">General overview of Adrenergic transmission and Adrenergic drugs</span></div></div><div class="" id=":R4pjpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4pjpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-6" aria-haspopup="dialog" aria-controls=":R4tjpkf6:" popovertarget=":R4tjpkf6:" style="anchor-name:--popover-R4tjpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/storytelling-instructions-3e91/276393244"><span class="sr-only">Storytelling instructions...............</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:6" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Storytelling instructions..............." src="https://cdn.slidesharecdn.com/ss_thumbnails/storytellinginstructions-250307155643-ebcb3ba3-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Storytelling instructions..............." src="https://cdn.slidesharecdn.com/ss_thumbnails/storytellinginstructions-250307155643-ebcb3ba3-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Storytelling instructions...............</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Storytelling instructions............... for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dktjpkf6:" popovertarget=":R1dktjpkf6:" style="anchor-name:--popover-R1dktjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dktjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dktjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Alexanderperez41">Alexander Benito</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">for students</span></div></div><div class="" id=":R4tjpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R4tjpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-7" aria-haspopup="dialog" aria-controls=":R51jpkf6:" popovertarget=":R51jpkf6:" style="anchor-name:--popover-R51jpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/kaun-talha-quiz-finals-el-dorado-2025/276392212"><span class="sr-only">Kaun TALHA quiz Finals -- El Dorado 2025</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:7" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Kaun TALHA quiz Finals -- El Dorado 2025" src="https://cdn.slidesharecdn.com/ss_thumbnails/kauntalhafinals-250307152232-61508273-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Kaun TALHA quiz Finals -- El Dorado 2025" src="https://cdn.slidesharecdn.com/ss_thumbnails/kauntalhafinals-250307152232-61508273-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Kaun TALHA quiz Finals -- El Dorado 2025</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Kaun TALHA quiz Finals -- El Dorado 2025 for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dl1jpkf6:" popovertarget=":R1dl1jpkf6:" style="anchor-name:--popover-R1dl1jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dl1jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dl1jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/ConquiztadorsTheQuiz">Conquiztadors- the Quiz Society of Sri Venkateswara College</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Finals of Kaun TALHA : a Travel, Architecture, Lifestyle, Heritage and Activism quiz, organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025. </span></div></div><div class="" id=":R51jpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R51jpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-8" aria-haspopup="dialog" aria-controls=":R55jpkf6:" popovertarget=":R55jpkf6:" style="anchor-name:--popover-R55jpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/q-factor-general-quiz-2nd-march-2025-quiz-club-nitw/276637663"><span class="sr-only">Q-Factor General Quiz-2nd March 2025, Quiz Club NITW</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:8" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Q-Factor General Quiz-2nd March 2025, Quiz Club NITW" src="https://cdn.slidesharecdn.com/ss_thumbnails/qfactorsgenerals25-250313040711-b1976a85-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Q-Factor General Quiz-2nd March 2025, Quiz Club NITW" src="https://cdn.slidesharecdn.com/ss_thumbnails/qfactorsgenerals25-250313040711-b1976a85-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Q-Factor General Quiz-2nd March 2025, Quiz Club NITW</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Q-Factor General Quiz-2nd March 2025, Quiz Club NITW for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dl5jpkf6:" popovertarget=":R1dl5jpkf6:" style="anchor-name:--popover-R1dl5jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dl5jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dl5jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/QuizClubNITW">Quiz Club NITW</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The General Quiz conducted by Quiz Club NITW on 2nd of March 2025, as a part of the duology of quizzes for the college fest SpringSpree 2025. The set has both the Prelims and Finals which include various questions on a wide range of topics and quite derivable answers. </span></div></div><div class="" id=":R55jpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R55jpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-9" aria-haspopup="dialog" aria-controls=":R59jpkf6:" popovertarget=":R59jpkf6:" style="anchor-name:--popover-R59jpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/mental-health-of-neurodivergent-learners/276466061"><span class="sr-only">Mental Health of Neurodivergent Learners</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:9" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Mental Health of Neurodivergent Learners" src="https://cdn.slidesharecdn.com/ss_thumbnails/mentalhealthofneurodivergentlearners-250309180615-584bcfc4-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Mental Health of Neurodivergent Learners" src="https://cdn.slidesharecdn.com/ss_thumbnails/mentalhealthofneurodivergentlearners-250309180615-584bcfc4-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Mental Health of Neurodivergent Learners</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Mental Health of Neurodivergent Learners for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dl9jpkf6:" popovertarget=":R1dl9jpkf6:" style="anchor-name:--popover-R1dl9jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dl9jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dl9jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/pookyh">Pooky Knightsmith</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">For more information about my speaking and training work, visit: https://www.pookyknightsmith.com/speaking/ </span></div></div><div class="" id=":R59jpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R59jpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-10" aria-haspopup="dialog" aria-controls=":R5djpkf6:" popovertarget=":R5djpkf6:" style="anchor-name:--popover-R5djpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/20250310-mcguinness-institute-submission-on-gene-technology-bill-pptx/276477085"><span class="sr-only">20250310 McGuinness Institute Submission on Gene Technology Bill.pptx</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:10" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="20250310 McGuinness Institute Submission on Gene Technology Bill.pptx" src="https://cdn.slidesharecdn.com/ss_thumbnails/202503101135ammcguinnessinstitutegenetechnologybillslides-250310010735-cb5e113c-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="20250310 McGuinness Institute Submission on Gene Technology Bill.pptx" src="https://cdn.slidesharecdn.com/ss_thumbnails/202503101135ammcguinnessinstitutegenetechnologybillslides-250310010735-cb5e113c-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">20250310 McGuinness Institute Submission on Gene Technology Bill.pptx</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 20250310 McGuinness Institute Submission on Gene Technology Bill.pptx for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dldjpkf6:" popovertarget=":R1dldjpkf6:" style="anchor-name:--popover-R1dldjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dldjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dldjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sustainablefuture">McGuinness Institute</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">On March 10 2025 Wendy McGuinness from the McGuinness Institute presented an oral submission to the Health Committee on the proposed Gene Technology Bill.</span></div></div><div class="" id=":R5djpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5djpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-11" aria-haspopup="dialog" aria-controls=":R5hjpkf6:" popovertarget=":R5hjpkf6:" style="anchor-name:--popover-R5hjpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/8-essential-skills-application-of-number-ratio/276661887"><span class="sr-only">8. Essential Skills: Application of Number: Ratio</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:11" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="8. Essential Skills: Application of Number: Ratio" src="https://cdn.slidesharecdn.com/ss_thumbnails/9-250313160319-77879d83-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="8. Essential Skills: Application of Number: Ratio" src="https://cdn.slidesharecdn.com/ss_thumbnails/9-250313160319-77879d83-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">8. Essential Skills: Application of Number: Ratio</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 8. Essential Skills: Application of Number: Ratio for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dlhjpkf6:" popovertarget=":R1dlhjpkf6:" style="anchor-name:--popover-R1dlhjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dlhjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dlhjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/leigh441292">leigh441292</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">AON: Ratio</span></div></div><div class="" id=":R5hjpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5hjpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-12" aria-haspopup="dialog" aria-controls=":R5ljpkf6:" popovertarget=":R5ljpkf6:" style="anchor-name:--popover-R5ljpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/summary-of-the-2024-western-cmv-safety-summit/276400186"><span class="sr-only">Summary of the 2024 Western CMV Safety Summit</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:12" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Summary of the 2024 Western CMV Safety Summit" src="https://cdn.slidesharecdn.com/ss_thumbnails/2025-03-cmv-safety-summit-summary-250307202535-4fba9735-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Summary of the 2024 Western CMV Safety Summit" src="https://cdn.slidesharecdn.com/ss_thumbnails/2025-03-cmv-safety-summit-summary-250307202535-4fba9735-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Summary of the 2024 Western CMV Safety Summit</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Summary of the 2024 Western CMV Safety Summit for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dlljpkf6:" popovertarget=":R1dlljpkf6:" style="anchor-name:--popover-R1dlljpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dlljpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dlljpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/ugpti">UGPTI</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The 2024 Western CMV Safety Summit focused on projects that utilize technologies designed to promote safe driving behaviors and on projects that demonstrate crash analysis tools capable of identifying high-risk corridors and traffic areas for the purposes of deploying CMV-related crash countermeasures. It included roundtable discussions of priorities and challenges to improve CMV safety, as well as sessions regarding readily available resources, state-specific projects, research and partnerships, coordination efforts, and updates from FMCSA. Key takeaways from attendees included the importance of learning from other states, collaborating to solve challenges, and working to change beliefs in order to change behaviors.</span></div></div><div class="" id=":R5ljpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5ljpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-13" aria-haspopup="dialog" aria-controls=":R5pjpkf6:" popovertarget=":R5pjpkf6:" style="anchor-name:--popover-R5pjpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/health-and-fitness-facts-and-fads-example-weight-loss-and-fad-diets-effects-of-fitness-fads-in-physical-activity-participation/276498129"><span class="sr-only">Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:13" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe..." src="https://cdn.slidesharecdn.com/ss_thumbnails/healthco-250310104033-138e6696-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe..." src="https://cdn.slidesharecdn.com/ss_thumbnails/healthco-250310104033-138e6696-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe... for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dlpjpkf6:" popovertarget=":R1dlpjpkf6:" style="anchor-name:--popover-R1dlpjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dlpjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dlpjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/alvinlorana1">alvinlorana1</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Fads and Diet</span></div></div><div class="" id=":R5pjpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5pjpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-14" aria-haspopup="dialog" aria-controls=":R5tjpkf6:" popovertarget=":R5tjpkf6:" style="anchor-name:--popover-R5tjpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/computer-network-unit-iv-lecture-notes-network-layer/276463778"><span class="sr-only">Computer Network Unit IV - Lecture Notes - Network Layer</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:14" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Computer Network Unit IV - Lecture Notes - Network Layer" src="https://cdn.slidesharecdn.com/ss_thumbnails/thenetworklayerunit4-250309164756-1dda4781-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Computer Network Unit IV - Lecture Notes - Network Layer" src="https://cdn.slidesharecdn.com/ss_thumbnails/thenetworklayerunit4-250309164756-1dda4781-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Computer Network Unit IV - Lecture Notes - Network Layer</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Computer Network Unit IV - Lecture Notes - Network Layer for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dltjpkf6:" popovertarget=":R1dltjpkf6:" style="anchor-name:--popover-R1dltjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dltjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dltjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Murugan146644">Murugan146644</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Title: Lecture Notes - Unit IV - The Network Layer Description: Welcome to the comprehensive guide on Computer Network concepts, tailored for final year B.Sc. Computer Science students affiliated with Alagappa University. This document covers fundamental principles and advanced topics in Computer Network. PDF content is prepared from the text book Computer Network by Andrew S. Tenanbaum Key Topics Covered: Main Topic : The Network Layer Sub-Topic : Network Layer Design Issues (Store and forward packet switching , service provided to the transport layer, implementation of connection less service, implementation of connection oriented service, Comparision of virtual circuit and datagram subnet), Routing algorithms (Shortest path routing, Flooding , Distance Vector routing algorithm, Link state routing algorithm , hierarchical routing algorithm, broadcast routing, multicast routing algorithm) Other Link : 1.Introduction to computer network - https://www.slideshare.net/slideshow/lecture-notes-introduction-to-computer-network/274183454 2. Physical Layer - https://www.slideshare.net/slideshow/lecture-notes-unit-ii-the-physical-layer/274747125 3. Data Link Layer Part 1 : https://www.slideshare.net/slideshow/lecture-notes-unit-iii-the-datalink-layer/275288798 Target Audience: Final year B.Sc. Computer Science students at Alagappa University seeking a solid foundation in Computer Network principles for academic. About the Author: Dr. S. Murugan is Associate Professor at Alagappa Government Arts College, Karaikudi. With 23 years of teaching experience in the field of Computer Science, Dr. S. Murugan has a passion for simplifying complex concepts in Computer Network Disclaimer: This document is intended for educational purposes only. The content presented here reflects the author’s understanding in the field of Computer Network</span></div></div><div class="" id=":R5tjpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R5tjpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-15" aria-haspopup="dialog" aria-controls=":R61jpkf6:" popovertarget=":R61jpkf6:" style="anchor-name:--popover-R61jpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/q-factor-mythology-quiz-1st-march-2025-quiz-club-nitw/276638569"><span class="sr-only">Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:15" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW" src="https://cdn.slidesharecdn.com/ss_thumbnails/q-factormythologyquiz-250313043012-7b705b4e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW" src="https://cdn.slidesharecdn.com/ss_thumbnails/q-factormythologyquiz-250313043012-7b705b4e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dm1jpkf6:" popovertarget=":R1dm1jpkf6:" style="anchor-name:--popover-R1dm1jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dm1jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dm1jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/QuizClubNITW">Quiz Club NITW</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">The Mythology Quiz conducted by Quiz Club NITW on 1st of March 2025, as a part of the duology of quizzes for the college fest SpringSpree 2025. The set has both the Prelims and Finals which include various questions on topics related to Mythology ranging from Hindu mythology to Greek and Norse mythology! </span></div></div><div class="" id=":R61jpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R61jpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-16" aria-haspopup="dialog" aria-controls=":R65jpkf6:" popovertarget=":R65jpkf6:" style="anchor-name:--popover-R65jpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/reordering-rules-in-odoo-17-inventory-odoo-slides/276376261"><span class="sr-only">Reordering Rules in Odoo 17 Inventory - Odoo Slides</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:16" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Reordering Rules in Odoo 17 Inventory - Odoo Slides" src="https://cdn.slidesharecdn.com/ss_thumbnails/reorderingrulesinodoo17inventory-250307063203-60d5b175-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Reordering Rules in Odoo 17 Inventory - Odoo Slides" src="https://cdn.slidesharecdn.com/ss_thumbnails/reorderingrulesinodoo17inventory-250307063203-60d5b175-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Reordering Rules in Odoo 17 Inventory - Odoo Slides</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Reordering Rules in Odoo 17 Inventory - Odoo Slides for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dm5jpkf6:" popovertarget=":R1dm5jpkf6:" style="anchor-name:--popover-R1dm5jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dm5jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dm5jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/CelineGeorge1">Celine George</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">In Odoo 17, the Inventory module allows us to set up reordering rules to ensure that our stock levels are maintained, preventing stockouts. Let&#x27;s explore how this feature works.</span></div></div><div class="" id=":R65jpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R65jpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-17" aria-haspopup="dialog" aria-controls=":R69jpkf6:" popovertarget=":R69jpkf6:" style="anchor-name:--popover-R69jpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/how-to-manage-putaway-rule-in-odoo-17-inventory/276375972"><span class="sr-only">How to Manage Putaway Rule in Odoo 17 Inventory</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:17" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="How to Manage Putaway Rule in Odoo 17 Inventory" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtomanageputawayruleinodoo17inventory-250307062533-1032bd88-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="How to Manage Putaway Rule in Odoo 17 Inventory" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtomanageputawayruleinodoo17inventory-250307062533-1032bd88-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">How to Manage Putaway Rule in Odoo 17 Inventory</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save How to Manage Putaway Rule in Odoo 17 Inventory for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dm9jpkf6:" popovertarget=":R1dm9jpkf6:" style="anchor-name:--popover-R1dm9jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dm9jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dm9jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/CelineGeorge1">Celine George</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Inventory management is a critical aspect of any business involved in manufacturing or selling products. Odoo 17 offers a robust inventory management system that can handle complex operations and optimize warehouse efficiency. </span></div></div><div class="" id=":R69jpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R69jpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-18" aria-haspopup="dialog" aria-controls=":R6djpkf6:" popovertarget=":R6djpkf6:" style="anchor-name:--popover-R6djpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/integrative-creative-works-of-selected-philippines-and-sea-arts-pptx/276412638"><span class="sr-only">Integrative Creative Works of Selected Philippines and SEA arts.pptx</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:18" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Integrative Creative Works of Selected Philippines and SEA arts.pptx" src="https://cdn.slidesharecdn.com/ss_thumbnails/integrativecreativeworksofselectedphilippinesandseaarts-250308061747-6192681f-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Integrative Creative Works of Selected Philippines and SEA arts.pptx" src="https://cdn.slidesharecdn.com/ss_thumbnails/integrativecreativeworksofselectedphilippinesandseaarts-250308061747-6192681f-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Integrative Creative Works of Selected Philippines and SEA arts.pptx</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Integrative Creative Works of Selected Philippines and SEA arts.pptx for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dmdjpkf6:" popovertarget=":R1dmdjpkf6:" style="anchor-name:--popover-R1dmdjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dmdjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dmdjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/BeauDarrylPanizales">BeauDarrylPanizales</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">Presenatation for Integrative arts in the Philippines and SEA</span></div></div><div class="" id=":R6djpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R6djpkf6"></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="RailCard_root__rZUGY RailCard_hasDescription__MjSgf SlideshowCard_root__pD8t4 slideshow-card" aria-describedby="latest-card-description-19" aria-haspopup="dialog" aria-controls=":R6hjpkf6:" popovertarget=":R6hjpkf6:" style="anchor-name:--popover-R6hjpkf6"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/4-es-application-of-number-decimal-numbers/276495371"><span class="sr-only">4. ES: Application of Number: Decimal Numbers</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:1.5;--index:19" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="4. ES: Application of Number: Decimal Numbers" src="https://cdn.slidesharecdn.com/ss_thumbnails/4-250310092050-c2ca2d9e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="4. ES: Application of Number: Decimal Numbers" src="https://cdn.slidesharecdn.com/ss_thumbnails/4-250310092050-c2ca2d9e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW RailCard_title__Tvfiv ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">4. ES: Application of Number: Decimal Numbers</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 4. ES: Application of Number: Decimal Numbers for later" role="switch" aria-haspopup="dialog" aria-controls=":R1dmhjpkf6:" popovertarget=":R1dmhjpkf6:" style="anchor-name:--popover-R1dmhjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R1dmhjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R1dmhjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ RailCard_author__JYeYZ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/leigh441292">leigh441292</a><div class="slideshow-stats SlideshowStats_root__EQOR1 RailCard_stats__ZvZms"> </div><span aria-hidden="true" class="seo-only">AON: Decimals</span></div></div><div class="" id=":R6hjpkf6:" popover="manual" data-popover-position="bottom-start" style="position-anchor:--popover-R6hjpkf6"></div></div><div class="desktop-recs"><div class="Slider_root__c0Jo8"><div class="Slider_scroller__KHjw4"><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/early-korea-1-reconsidering-early-korean-history-through-archaeology-mark-e-byington/276437155"><span class="sr-only">Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:0" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ..." src="https://cdn.slidesharecdn.com/ss_thumbnails/64052-250308223712-73806320-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ..." src="https://cdn.slidesharecdn.com/ss_thumbnails/64052-250308223712-73806320-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5gmjpkf6:" popovertarget=":R5gmjpkf6:" style="anchor-name:--popover-R5gmjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5gmjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5gmjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/spinoyayber">spinoyayber</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/how-to-use-product-categories-in-odoo-17-to-organize-your-inventory/276539172"><span class="sr-only">How to use product categories in Odoo 17 to organize your Inventory</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:1" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="How to use product categories in Odoo 17 to organize your Inventory" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtouseproductcategoriesinodoo17toorganizeyourinventory-250311061259-404b5f8e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="How to use product categories in Odoo 17 to organize your Inventory" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtouseproductcategoriesinodoo17toorganizeyourinventory-250311061259-404b5f8e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">How to use product categories in Odoo 17 to organize your Inventory</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save How to use product categories in Odoo 17 to organize your Inventory for later" role="switch" aria-haspopup="dialog" aria-controls=":R5h6jpkf6:" popovertarget=":R5h6jpkf6:" style="anchor-name:--popover-R5h6jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5h6jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5h6jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/CelineGeorge1">Celine George</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/7-es-application-of-number-percentages/276495934"><span class="sr-only">7. ES: Application of Number: Percentages</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:2" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="7. ES: Application of Number: Percentages" src="https://cdn.slidesharecdn.com/ss_thumbnails/8-250310093732-964a000d-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="7. ES: Application of Number: Percentages" src="https://cdn.slidesharecdn.com/ss_thumbnails/8-250310093732-964a000d-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">7. ES: Application of Number: Percentages</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 7. ES: Application of Number: Percentages for later" role="switch" aria-haspopup="dialog" aria-controls=":R5hmjpkf6:" popovertarget=":R5hmjpkf6:" style="anchor-name:--popover-R5hmjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5hmjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5hmjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/leigh441292">leigh441292</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024/276384155"><span class="sr-only">Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:3" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1..." src="https://cdn.slidesharecdn.com/ss_thumbnails/lessonplanm12024-250307104619-647897c6-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1..." src="https://cdn.slidesharecdn.com/ss_thumbnails/lessonplanm12024-250307104619-647897c6-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5i6jpkf6:" popovertarget=":R5i6jpkf6:" style="anchor-name:--popover-R5i6jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5i6jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5i6jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/pinkdvil200">pinkdvil200</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/kaun-talha-quiz-prelims-el-dorado-2025/276392082"><span class="sr-only">Kaun TALHA quiz Prelims - El Dorado 2025</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:4" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Kaun TALHA quiz Prelims - El Dorado 2025" src="https://cdn.slidesharecdn.com/ss_thumbnails/kauntalhaprelimswithanswers-250307151746-3d96fe94-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Kaun TALHA quiz Prelims - El Dorado 2025" src="https://cdn.slidesharecdn.com/ss_thumbnails/kauntalhaprelimswithanswers-250307151746-3d96fe94-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Kaun TALHA quiz Prelims - El Dorado 2025</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Kaun TALHA quiz Prelims - El Dorado 2025 for later" role="switch" aria-haspopup="dialog" aria-controls=":R5imjpkf6:" popovertarget=":R5imjpkf6:" style="anchor-name:--popover-R5imjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5imjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5imjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/ConquiztadorsTheQuiz">Conquiztadors- the Quiz Society of Sri Venkateswara College</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/adrenergic-transmission-adrenergic-drugs/276453870"><span class="sr-only">Adrenergic Transmission &amp; Adrenergic Drugs</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:5" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Adrenergic Transmission &amp; Adrenergic Drugs" src="https://cdn.slidesharecdn.com/ss_thumbnails/adrenergicdrugsdrcvignesh-250309111948-b49476f3-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Adrenergic Transmission &amp; Adrenergic Drugs" src="https://cdn.slidesharecdn.com/ss_thumbnails/adrenergicdrugsdrcvignesh-250309111948-b49476f3-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Adrenergic Transmission &amp; Adrenergic Drugs</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Adrenergic Transmission &amp; Adrenergic Drugs for later" role="switch" aria-haspopup="dialog" aria-controls=":R5j6jpkf6:" popovertarget=":R5j6jpkf6:" style="anchor-name:--popover-R5j6jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5j6jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5j6jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/doc21vignesh">Dr C Vignesh </a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/storytelling-instructions-3e91/276393244"><span class="sr-only">Storytelling instructions...............</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:6" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Storytelling instructions..............." src="https://cdn.slidesharecdn.com/ss_thumbnails/storytellinginstructions-250307155643-ebcb3ba3-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Storytelling instructions..............." src="https://cdn.slidesharecdn.com/ss_thumbnails/storytellinginstructions-250307155643-ebcb3ba3-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Storytelling instructions...............</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Storytelling instructions............... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5jmjpkf6:" popovertarget=":R5jmjpkf6:" style="anchor-name:--popover-R5jmjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5jmjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5jmjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Alexanderperez41">Alexander Benito</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/kaun-talha-quiz-finals-el-dorado-2025/276392212"><span class="sr-only">Kaun TALHA quiz Finals -- El Dorado 2025</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:7" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Kaun TALHA quiz Finals -- El Dorado 2025" src="https://cdn.slidesharecdn.com/ss_thumbnails/kauntalhafinals-250307152232-61508273-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Kaun TALHA quiz Finals -- El Dorado 2025" src="https://cdn.slidesharecdn.com/ss_thumbnails/kauntalhafinals-250307152232-61508273-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Kaun TALHA quiz Finals -- El Dorado 2025</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Kaun TALHA quiz Finals -- El Dorado 2025 for later" role="switch" aria-haspopup="dialog" aria-controls=":R5k6jpkf6:" popovertarget=":R5k6jpkf6:" style="anchor-name:--popover-R5k6jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5k6jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5k6jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/ConquiztadorsTheQuiz">Conquiztadors- the Quiz Society of Sri Venkateswara College</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/q-factor-general-quiz-2nd-march-2025-quiz-club-nitw/276637663"><span class="sr-only">Q-Factor General Quiz-2nd March 2025, Quiz Club NITW</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:8" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Q-Factor General Quiz-2nd March 2025, Quiz Club NITW" src="https://cdn.slidesharecdn.com/ss_thumbnails/qfactorsgenerals25-250313040711-b1976a85-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Q-Factor General Quiz-2nd March 2025, Quiz Club NITW" src="https://cdn.slidesharecdn.com/ss_thumbnails/qfactorsgenerals25-250313040711-b1976a85-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Q-Factor General Quiz-2nd March 2025, Quiz Club NITW</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Q-Factor General Quiz-2nd March 2025, Quiz Club NITW for later" role="switch" aria-haspopup="dialog" aria-controls=":R5kmjpkf6:" popovertarget=":R5kmjpkf6:" style="anchor-name:--popover-R5kmjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5kmjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5kmjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/QuizClubNITW">Quiz Club NITW</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/mental-health-of-neurodivergent-learners/276466061"><span class="sr-only">Mental Health of Neurodivergent Learners</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:9" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Mental Health of Neurodivergent Learners" src="https://cdn.slidesharecdn.com/ss_thumbnails/mentalhealthofneurodivergentlearners-250309180615-584bcfc4-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Mental Health of Neurodivergent Learners" src="https://cdn.slidesharecdn.com/ss_thumbnails/mentalhealthofneurodivergentlearners-250309180615-584bcfc4-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Mental Health of Neurodivergent Learners</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Mental Health of Neurodivergent Learners for later" role="switch" aria-haspopup="dialog" aria-controls=":R5l6jpkf6:" popovertarget=":R5l6jpkf6:" style="anchor-name:--popover-R5l6jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5l6jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5l6jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/pookyh">Pooky Knightsmith</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/20250310-mcguinness-institute-submission-on-gene-technology-bill-pptx/276477085"><span class="sr-only">20250310 McGuinness Institute Submission on Gene Technology Bill.pptx</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:10" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="20250310 McGuinness Institute Submission on Gene Technology Bill.pptx" src="https://cdn.slidesharecdn.com/ss_thumbnails/202503101135ammcguinnessinstitutegenetechnologybillslides-250310010735-cb5e113c-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="20250310 McGuinness Institute Submission on Gene Technology Bill.pptx" src="https://cdn.slidesharecdn.com/ss_thumbnails/202503101135ammcguinnessinstitutegenetechnologybillslides-250310010735-cb5e113c-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">20250310 McGuinness Institute Submission on Gene Technology Bill.pptx</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 20250310 McGuinness Institute Submission on Gene Technology Bill.pptx for later" role="switch" aria-haspopup="dialog" aria-controls=":R5lmjpkf6:" popovertarget=":R5lmjpkf6:" style="anchor-name:--popover-R5lmjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5lmjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5lmjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/sustainablefuture">McGuinness Institute</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/8-essential-skills-application-of-number-ratio/276661887"><span class="sr-only">8. Essential Skills: Application of Number: Ratio</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:11" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="8. Essential Skills: Application of Number: Ratio" src="https://cdn.slidesharecdn.com/ss_thumbnails/9-250313160319-77879d83-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="8. Essential Skills: Application of Number: Ratio" src="https://cdn.slidesharecdn.com/ss_thumbnails/9-250313160319-77879d83-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">8. Essential Skills: Application of Number: Ratio</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 8. Essential Skills: Application of Number: Ratio for later" role="switch" aria-haspopup="dialog" aria-controls=":R5m6jpkf6:" popovertarget=":R5m6jpkf6:" style="anchor-name:--popover-R5m6jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5m6jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5m6jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/leigh441292">leigh441292</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/summary-of-the-2024-western-cmv-safety-summit/276400186"><span class="sr-only">Summary of the 2024 Western CMV Safety Summit</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:12" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Summary of the 2024 Western CMV Safety Summit" src="https://cdn.slidesharecdn.com/ss_thumbnails/2025-03-cmv-safety-summit-summary-250307202535-4fba9735-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Summary of the 2024 Western CMV Safety Summit" src="https://cdn.slidesharecdn.com/ss_thumbnails/2025-03-cmv-safety-summit-summary-250307202535-4fba9735-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Summary of the 2024 Western CMV Safety Summit</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Summary of the 2024 Western CMV Safety Summit for later" role="switch" aria-haspopup="dialog" aria-controls=":R5mmjpkf6:" popovertarget=":R5mmjpkf6:" style="anchor-name:--popover-R5mmjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5mmjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5mmjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/ugpti">UGPTI</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/health-and-fitness-facts-and-fads-example-weight-loss-and-fad-diets-effects-of-fitness-fads-in-physical-activity-participation/276498129"><span class="sr-only">Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe...</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:13" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe..." src="https://cdn.slidesharecdn.com/ss_thumbnails/healthco-250310104033-138e6696-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe..." src="https://cdn.slidesharecdn.com/ss_thumbnails/healthco-250310104033-138e6696-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe...</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe... for later" role="switch" aria-haspopup="dialog" aria-controls=":R5n6jpkf6:" popovertarget=":R5n6jpkf6:" style="anchor-name:--popover-R5n6jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5n6jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5n6jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/alvinlorana1">alvinlorana1</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/computer-network-unit-iv-lecture-notes-network-layer/276463778"><span class="sr-only">Computer Network Unit IV - Lecture Notes - Network Layer</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:14" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Computer Network Unit IV - Lecture Notes - Network Layer" src="https://cdn.slidesharecdn.com/ss_thumbnails/thenetworklayerunit4-250309164756-1dda4781-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Computer Network Unit IV - Lecture Notes - Network Layer" src="https://cdn.slidesharecdn.com/ss_thumbnails/thenetworklayerunit4-250309164756-1dda4781-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Computer Network Unit IV - Lecture Notes - Network Layer</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Computer Network Unit IV - Lecture Notes - Network Layer for later" role="switch" aria-haspopup="dialog" aria-controls=":R5nmjpkf6:" popovertarget=":R5nmjpkf6:" style="anchor-name:--popover-R5nmjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5nmjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5nmjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/Murugan146644">Murugan146644</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/q-factor-mythology-quiz-1st-march-2025-quiz-club-nitw/276638569"><span class="sr-only">Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:15" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW" src="https://cdn.slidesharecdn.com/ss_thumbnails/q-factormythologyquiz-250313043012-7b705b4e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW" src="https://cdn.slidesharecdn.com/ss_thumbnails/q-factormythologyquiz-250313043012-7b705b4e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW for later" role="switch" aria-haspopup="dialog" aria-controls=":R5o6jpkf6:" popovertarget=":R5o6jpkf6:" style="anchor-name:--popover-R5o6jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5o6jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5o6jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/QuizClubNITW">Quiz Club NITW</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/reordering-rules-in-odoo-17-inventory-odoo-slides/276376261"><span class="sr-only">Reordering Rules in Odoo 17 Inventory - Odoo Slides</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:16" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Reordering Rules in Odoo 17 Inventory - Odoo Slides" src="https://cdn.slidesharecdn.com/ss_thumbnails/reorderingrulesinodoo17inventory-250307063203-60d5b175-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Reordering Rules in Odoo 17 Inventory - Odoo Slides" src="https://cdn.slidesharecdn.com/ss_thumbnails/reorderingrulesinodoo17inventory-250307063203-60d5b175-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Reordering Rules in Odoo 17 Inventory - Odoo Slides</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Reordering Rules in Odoo 17 Inventory - Odoo Slides for later" role="switch" aria-haspopup="dialog" aria-controls=":R5omjpkf6:" popovertarget=":R5omjpkf6:" style="anchor-name:--popover-R5omjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5omjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5omjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/CelineGeorge1">Celine George</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/how-to-manage-putaway-rule-in-odoo-17-inventory/276375972"><span class="sr-only">How to Manage Putaway Rule in Odoo 17 Inventory</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:17" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="How to Manage Putaway Rule in Odoo 17 Inventory" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtomanageputawayruleinodoo17inventory-250307062533-1032bd88-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="How to Manage Putaway Rule in Odoo 17 Inventory" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtomanageputawayruleinodoo17inventory-250307062533-1032bd88-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">How to Manage Putaway Rule in Odoo 17 Inventory</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save How to Manage Putaway Rule in Odoo 17 Inventory for later" role="switch" aria-haspopup="dialog" aria-controls=":R5p6jpkf6:" popovertarget=":R5p6jpkf6:" style="anchor-name:--popover-R5p6jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5p6jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5p6jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/CelineGeorge1">Celine George</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/integrative-creative-works-of-selected-philippines-and-sea-arts-pptx/276412638"><span class="sr-only">Integrative Creative Works of Selected Philippines and SEA arts.pptx</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:18" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="Integrative Creative Works of Selected Philippines and SEA arts.pptx" src="https://cdn.slidesharecdn.com/ss_thumbnails/integrativecreativeworksofselectedphilippinesandseaarts-250308061747-6192681f-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="Integrative Creative Works of Selected Philippines and SEA arts.pptx" src="https://cdn.slidesharecdn.com/ss_thumbnails/integrativecreativeworksofselectedphilippinesandseaarts-250308061747-6192681f-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">Integrative Creative Works of Selected Philippines and SEA arts.pptx</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save Integrative Creative Works of Selected Philippines and SEA arts.pptx for later" role="switch" aria-haspopup="dialog" aria-controls=":R5pmjpkf6:" popovertarget=":R5pmjpkf6:" style="anchor-name:--popover-R5pmjpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5pmjpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5pmjpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/BeauDarrylPanizales">BeauDarrylPanizales</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div><div class="BottomRecommendationCard_root__gffTk SlideshowCard_root__pD8t4 slideshow-card"><a class="SlideshowCardLink_root__p8KI7" data-cy="slideshow-card-link" data-testid="slideshow-card-link" href="https://www.slideshare.net/slideshow/4-es-application-of-number-decimal-numbers/276495371"><span class="sr-only">4. ES: Application of Number: Decimal Numbers</span></a><div class="slideshow-thumbnail Thumbnail_root__qLW0K SlideshowCard_thumb__86aJk" style="aspect-ratio:16 / 9;--index:19" data-testid="card-thumbnail"><img class="Thumbnail_thumb__UXO3a Thumbnail_blur__opK6A Thumbnail_cover__1zsIi" alt="4. ES: Application of Number: Decimal Numbers" src="https://cdn.slidesharecdn.com/ss_thumbnails/4-250310092050-c2ca2d9e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/><img class="Thumbnail_thumb__UXO3a Thumbnail_contain__K6M0d" alt="4. ES: Application of Number: Decimal Numbers" src="https://cdn.slidesharecdn.com/ss_thumbnails/4-250310092050-c2ca2d9e-thumbnail.jpg?width=560&amp;fit=bounds" loading="lazy"/></div><div class="SlideshowCard_content__xh7kV slideshow-card-content"><span class="slideshow-title SlideshowTitle_root__2VccW ellipsis" style="-webkit-line-clamp:2" data-cy="slideshow-title">4. ES: Application of Number: Decimal Numbers</span><button type="button" class="Button_root__i1yp0 Button_secondary__hHiHI Button_text__ZT_3O Button_small__sqsEx Button_icon__1C4qi save-slideshow-button SaveButton_root__b6zuu" data-testid="button" aria-checked="false" aria-label="Save 4. ES: Application of Number: Decimal Numbers for later" role="switch" aria-haspopup="dialog" aria-controls=":R5q6jpkf6:" popovertarget=":R5q6jpkf6:" style="anchor-name:--popover-R5q6jpkf6"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/save.ef1812e2.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><div class="Tooltip_root__7FS0Y" id=":R5q6jpkf6:" popover="manual" data-popover-position="top" style="position-anchor:--popover-R5q6jpkf6"></div><a class="SlideshowAuthor_root__IkT1_ slideshow-author ellipsis" data-testid="slideshow-author" data-cy="slideshow-author" href="https://www.slideshare.net/leigh441292">leigh441292</a><div class="slideshow-stats SlideshowStats_root__EQOR1"> </div></div></div></div><button aria-label="Previous" type="button" class="Slider_arrow__8LCca Slider_prev__YMssa Slider_hidden__rs7nK"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/chevron-left.50b146c0.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button><button aria-label="Next" type="button" class="Slider_arrow__8LCca Slider_next__fa9IO"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/chevron-right.9b30ad08.svg);background-color:currentColor"></span><span class="sr-only"></span></span></button></div></div></div></div><div id="between-recs-ad-2-container" class="freestar-ad-container FreestarAdContainer_root__qPPC_" style="--fallback-aspect-ratio:undefined / undefined" data-testid="freestar-ad-container"><div><div class="" id="between-recs-ad-2"></div></div></div></div></div><!--/$--><div class="Transcript_root__Vrf6Q"><h2 class="Transcript_title__YgAka"><span class="icon Icon_root__AjZyv" style="--size:24px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/file.5db1ba24.svg);background-color:currentColor"></span><span class="sr-only"></span></span>Mongoose H4D 2021 Lessons Learned</h2><div><ul class="Transcript_list__faItj"><div><li>1. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#1">TeamMongoose Keertan Kini Zoe </a> Durand Ricardo Rosales Frances Schroeder INITIAL PROBLEM STATEMENT Enable the NSA to rapidly identify disposable infrastructure used in cyber-attacks CURRENT PROBLEM STATEMENT Democratize threat intelligence by providing an automatic “pivoting” solution 100 Interviews BS Symbolic Systems ‘22 Hipster MBA ‘22 Hustler MBA ‘22 Hound MBA + MPP Hacker Problem Sponsor: National Security Agency Cybersecurity Directorate </li></div><div><li>2. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#2">Over the past </a> 10 weeks, we conducted 100 interviews. Academic Commercial Government </li></div><div><li>3. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#3">We didn’t fully </a> understand the beneficiary nor the problem statement... What is the full mission of the NSA? What data does the NSA have access to? What is the organizational structure between the NSA and all the other agencies that it defends? What is disposable infrastructure? How is it used by adversaries in an attack? Week 1 </li></div><div><li>4. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#4">Since we didn’t </a> know what “disposable infrastructure” was… we decided to start with the data where we could find it! 1. “The NSA does not have access to network data if it is domestic” - from Sponsor 1. “There is a clear reason for which the NSA doesn’t have access to that data - they should just work more effectively with the FBI” - from cyber-crime / cyber-security diplomat 1. “What is missing is the defense agreement to get the data, not the data itself.” - from sponsor &amp; DoD representative Week 1 </li></div><div><li>5. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#5">We realized that </a> the world was much more complicated than we had originally thought Confused mongoose Week 3 </li></div><div><li>6. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#6">Aha moment! Disposable </a> infrastructure = servers leased through cloud providers Week 3 </li></div><div><li>7. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#7">All Agencies in National Security </a> System DoD Agencies in National Security System Critical infrastructure, private companies NSA The interplay between agencies is even more complicated that we had originally thought! Cybersecurity and Infrastructure Security Agency CISA FBI Cloud Providers MALICIOUS CYBER ACTOR Disposable Infrastructure Already gone! USCYBERCOM Private Incident Response Companies Week 4 </li></div><div><li>8. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#8">Mission Model Canvas </a> had a lot of other players involved KEY PARTNERS - NSA (analysts and expertise) - DHS CISA - Private sector - - Cloud provider Trust and Security Teams - FBI Cybercrime Division - Private Network security firms KEY RESOURCES - Security Clearance - IT Security Accreditation - Examples of concerning malware for categorization and analysis - Traffic Data (labeled instances of disposable infrastructure) VALUE PROPOSITIONS One or several of the following: -Reduce time required to identify persistent infrastructure used by multiple malware installations - Identify temporary infrastructure used by malware installation previously unidentified and share to Cloud Providers to shutdown - Reduce time to serve Data Preservation notices to Cloud Providers to help attribution KEY ACTIVITIES - Software Engineering: - Identify common data for behavioral analysis of specific attacks - Create analytics which plugs into existing engines - Organizational: Fast Path for data sharing - Security Accreditation MISSION ACHIEVEMENT/IMPACT FACTORS Our mission will be successful if we develop a scalable solution to help the NSA identify persistent infrastructure used by multiple malware installations in a timely manner. DEPLOYMENT 1. Back-end algorithm not running in real time as proof of concept 2. Back-end algorithm running in real time (streaming) 3. Dashboard updated in real time deployed to the cloud or on-prem and accessible NSA/CISA/FBI stakeholders BUY-IN &amp; SUPPORT -Need IT Approvals from NSA/CISA/FBI for their systems -Need demand MISSION BUDGET/COST BENEFICIARIES Primary: Cyber defenders at the NSA, Secondary: Cyber investigators at the FBI Tertiary: All entities that the NSA serves and the DoD in general Fixed: - Software design &amp; engineering - Helpdesk/support functions - Labelling Costs Variable: - Subscription API usage for External tools, cloud computation/storage </li></div><div><li>9. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#9">“Attack” can mean </a> different things, and even the lifecycle of an attack is broad - where could Mongoose help? Prevention Incident response Attribution Week 4 </li></div><div><li>10. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#10">Big identity crisis </a> for the team! A picture of a Mongoose team member boiling the ocean, circa Week 4 Prevention Attribution Incident response Team Mongoose NSA DoD Critical infra Lighthouse of the teaching team FBI Flocks of beneficiaries </li></div><div><li>11. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#11">Lightbulb moment! Disposable infrastructure isn’t </a> in and of itself a problem, is it? “Attacks” isn’t specific enough. You need to narrow it down to a specific attack! “We were originally given a solution, not a problem.” Week 4 </li></div><div><li>12. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#12">Pivot! Focus on </a> a specific attack type: Data exfiltration. Week 5 Problem Statement WHAT: improve the early detection of nation-state data exfiltration cyber- attacks on the NSA corporate network conducted through ephemeral cloud infrastructure, where the initial attack vector is a zero-day or supply chain attack, by quickly identifying the C2 servers owned in full by the attackers FOR WHO: NSA cyber analysts as early adopter, later DoD agencies. Week 5 </li></div><div><li>13. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#13">To solve the </a> problem of NSA’s access to domestic data, we decide to focus on the NSA as a corporate network Week 5 We still have a data problem... </li></div><div><li>14. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#14">Intelligence and/or Firewall? Intelligence </a> for signal analysis Firewall to instantly block malicious traffic Week 6 </li></div><div><li>15. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#15">At this point, </a> we still weren’t sure that Mongoose could really bring anything to the table. Week 6 </li></div><div><li>16. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#16">Despite the new </a> problem statement, we hit a new low. We write an email to the teaching team outlining our concerns: “Our problem statement is either too broad, or too technical. People have tried to solve these problems for years, and it’s unclear what we might be able to contribute. ‘Redefine cybersecurity’ is better suited to a PhD in cybersecurity than to H4D” Week 6 Week 1 Week 2 Week 3 Week 4 Week 5 “The NSA is a bit of a black box in terms of their processes and heir prior attacks. Proxies don’t seem to be working either as no company seems keen to discuss the ways in which they’ve been breached.” </li></div><div><li>17. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#17">We talk to </a> our sponsor and have a breakthrough moment. What if I already had an indicator of compromise… and I asked you to find similar things? ! ! </li></div><div><li>18. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#18">Major breakthrough: we </a> redefine both the problem statement and the beneficiary WHAT: flag infrastructure on the public internet that “correlates” or “matches” to a known malicious infrastructure (seed) FOR WHO: NSA Discovery Team in conjunction with JFHQ-DODIN Network Defenders. Week 6 </li></div><div><li>19. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#19">Team Mongoose is </a> back! Week 7 </li></div><div><li>20. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#20">We define a </a> high-level product! Mongoose Intelligence will provide analysis automation through an entity matching API Mongoose entity matching API Malicious IP or domain Similar IP or Domain Week 7 </li></div><div><li>21. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#21">We learn that </a> visualization seems to be a compelling product in and of itself for many beneficiaries IP 1 IP 2 DoD Endpoint 1 Domain aws.com Domain XYZ.com IP 3 IP 4 DoD Endpoint 2 JFHQ-DoDIN network - Country - Date of first connection - Account holder - # of connections - Port - Protocol INPUT OUTPUT “Love the visualization! It would be great if you displayed context and confidence scores.” </li></div><div><li>22. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#22">Why hadn’t the </a> NSA ever built this before? They might have. Legal framework Large siloed organization? Week 8 </li></div><div><li>23. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#23">We start to </a> understand more about the details of the specific data sources and systems that we would need to plug into “Nobody is doing anything with all the log data that is produced by Akamai on DoD networks.” “You should plug into Acropolis that is already doing data collection. DMA is already dumping several terabytes of logs per day. Basically all of the DoD is feeding in data.” -- Defense Digital Service Week 9 </li></div><div><li>24. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#24">With our MVPs, </a> we got good signal that this is something that is interesting to the NSA Discovery Team “There are rules against me saying we would purchase this. But this is a problem, and it needs to be solved ASAP.” -- NSA CSD TD Week 9 </li></div><div><li>25. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#25">Several types of </a> potential customers Small/Medium Enterprises NSA/JFHQ-DODIN Telecoms Week 10 </li></div><div><li>26. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#26">We’re still thinking </a> about whether or not we want to continue on the project after the class. Week 10 </li></div><div><li>27. <a class="Transcript_link__MLbGS" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#27">Thank you to </a> everyone who made this possible! Special thanks to: ● Neal Ziring, NSA CSD Technical Director ● Jennifer Quarrie and Jason Chen ● Our defense mentor ● H4D TA Joel Johnson ● The entire H4D teaching team ● Our 100 interviewees TeamMongoose Problem Sponsor: National Security Agency, Cybersecurity Directorate Keertan Kini Zoe Durand Ricardo Rosales Frances Schroeder </li></div></ul></div></div><div class="EditorsNotes_root__3PcDF"><h3 class="Heading_heading__3MAvZ Heading_h3__f1djd EditorsNotes_heading__XR9E6">Editor&#x27;s Notes</h3><ul class="EditorsNotes_list__NcG5Y"><li class="EditorsNotes_item__ebBbj"><a class="EditorsNotes_link__HRUAh" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#2">#<!-- -->2<!-- -->:</a> <!-- -->Disposable infrastructure - didn’t quite know what it meant, but then decided it sounded interesting and wanted to dive deeper “If it sounds ambiguous to you, it sounded the same to us as well :)” - ,</li><li class="EditorsNotes_item__ebBbj"><a class="EditorsNotes_link__HRUAh" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#3">#<!-- -->3<!-- -->:</a> <!-- -->5 second slide</li><li class="EditorsNotes_item__ebBbj"><a class="EditorsNotes_link__HRUAh" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#4">#<!-- -->4<!-- -->:</a> <!-- -->First three questions might seem obvious to people working in the govt or agencies, but we’re Stanford students - remind them who we are :) </li><li class="EditorsNotes_item__ebBbj"><a class="EditorsNotes_link__HRUAh" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#5">#<!-- -->5<!-- -->:</a> <!-- -->We don’t know what disposable infrastructure is, but let’s start with the data ! Make the data &lt;&gt; infrastructure link clear in the title. Current title is subtitle. Cartoon of someone looking under rocks :) </li><li class="EditorsNotes_item__ebBbj"><a class="EditorsNotes_link__HRUAh" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#23">#<!-- -->23<!-- -->:</a> <!-- -->the NSA is severely restricted in what they can look at in terms of US person information (including IP addresses) </li><li class="EditorsNotes_item__ebBbj"><a class="EditorsNotes_link__HRUAh" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#27">#<!-- -->27<!-- -->:</a> <!-- -->I can’t tell what this means -&gt; Say: we are thinking of continuing, looking for some advice </li><li class="EditorsNotes_item__ebBbj"><a class="EditorsNotes_link__HRUAh" href="https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080#28">#<!-- -->28<!-- -->:</a> <!-- -->Can we add rachel ?</li></ul></div><dialog class="Modal_root__TYkzh FullscreenModal_root__efM9m" id=":R2kf6:"><div class="Modal_wrapper__4UTGq"><div class="modal-content Modal_content__R1F4d FullscreenModal_content__bQ6mt"></div></div></dialog><div class="ad textads banner-ads banner_ads ad-unit ad-zone ad-space adsbox ads prebid" style="position:absolute;height:1px"></div><footer class="Footer_footer__N3WmV"><div class="Footer_top__y0vfl" data-testid="footer-top"><div class="Footer_links__F2xFZ"><a class="Link_root__vn3ab Link_light__mcUPh Link_size-medium__ZLo12 Link_weight-bold__me4nt" style="order:0" href="/about">About</a><a class="Link_root__vn3ab Link_light__mcUPh Link_size-medium__ZLo12 Link_weight-bold__me4nt" style="order:1" href="https://support.scribd.com/hc/en/categories/360004792932-SlideShare?userType=SlideShare">Support</a><a class="Link_root__vn3ab Link_light__mcUPh Link_size-medium__ZLo12 Link_weight-bold__me4nt" style="order:2" href="https://support.scribd.com/hc/en/categories/360004792932-SlideShare?userType=SlideShare/articles/210129326-General-Terms-of-Use">Terms</a><a class="Link_root__vn3ab Link_light__mcUPh Link_size-medium__ZLo12 Link_weight-bold__me4nt" style="order:3" href="https://support.scribd.com/hc/en/categories/360004792932-SlideShare?userType=SlideShare/articles/210129366-Privacy-policy">Privacy</a><a class="Link_root__vn3ab Link_light__mcUPh Link_size-medium__ZLo12 Link_weight-bold__me4nt" style="order:4" href="/copyright-policy">Copyright</a><a class="Link_root__vn3ab Link_light__mcUPh Link_size-medium__ZLo12 Link_weight-bold__me4nt" style="order:5" href="https://support.scribd.com/hc/en/articles/360038016931-Privacy-Rights-Request-Form">Do not sell or share my personal information</a><button type="button" class="Footer_cookiePreferenceButton__lDgkB">Cookie Preferences</button></div><button type="button" aria-label="Change Language" class="LanguageSelect_trigger__XUC_9" data-cy="language-select-trigger" aria-haspopup="dialog" aria-controls=":R9j6:" popovertarget=":R9j6:" style="anchor-name:--popover-R9j6">English<span class="icon Icon_root__AjZyv" style="--size:12px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/caret-down.ae4671a7.svg);background-color:currentColor"></span><span class="sr-only"></span></span><span class="sr-only">Current Language</span></button><div class="" id=":R9j6:" popover="manual" data-popover-position="top-end" style="position-anchor:--popover-R9j6"></div></div><div class="separator Separator_root__70Ime Separator_horizontal__czVEa" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><div class="Footer_bottom__reaXc" data-testid="footer-bottom"><span class="Footer_copyright__dje7H">© 2025 SlideShare from Scribd</span><div class="Footer_icons__8EufG"><a class="Link_root__vn3ab Link_light__mcUPh Link_size-large__W0PAv Link_weight-regular__yPpnB" aria-label="Slideshare on Twitter" title="Twitter" href="https://twitter.com/slideshare"><span class="icon Icon_root__AjZyv" style="--size:18px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/twitter.89a06630.svg);background-color:currentColor"></span><span class="sr-only"></span></span></a><div class="separator Separator_root__70Ime Separator_vertical__JYCCK" style="--color:var(--blue-gray-200);--size:1px" role="separator"></div><a class="Link_root__vn3ab Link_light__mcUPh Link_size-large__W0PAv Link_weight-regular__yPpnB" aria-label="Slideshare on RSS Feed" title="RSS" href="https://www.slideshare.net/rss/latest"><span class="icon Icon_root__AjZyv" style="--size:16px"><span class="Icon_icon__4zzsG" style="mask-image:url(https://public.slidesharecdn.com/_next/static/media/rss.5c914539.svg);background-color:currentColor"></span><span class="sr-only"></span></span></a></div></div></footer><div id="portals-container" style="z-index:1"><div id="banner-portal" class="PortalsContainer_bannerRoot__Q_sNw"></div></div></div></div><script src="https://cmp.osano.com/AzZdHGSGtpxCq1Cpt/079b27eb-bb3f-48dd-9bd9-3feb8aec3c38/osano.js"></script><script> // This script assumes the Osano script is synchronously loaded window.eventsToSend = window.eventsToSend || [] if (window.Osano) { window.eventsToSend.push({ name: "osano_loaded", timestamp: new Date().toISOString(), value: JSON.stringify({ time: performance?.now() }) }) } </script><script defer="" nomodule="" src="https://public.slidesharecdn.com/_next/static/chunks/polyfills-42372ed130431b0a.js"></script><script src="https://public.slidesharecdn.com/_next/static/chunks/webpack-35e3c94b8145dab3.js" defer=""></script><script src="https://public.slidesharecdn.com/_next/static/chunks/framework-5a981bd1af7edc76.js" defer=""></script><script src="https://public.slidesharecdn.com/_next/static/chunks/main-9d633b45c44c4167.js" defer=""></script><script src="https://public.slidesharecdn.com/_next/static/chunks/pages/_app-44f2c5b25ccc0f6f.js" defer=""></script><script src="https://public.slidesharecdn.com/_next/static/chunks/5121-c12bfd4bed7c2139.js" defer=""></script><script src="https://public.slidesharecdn.com/_next/static/chunks/6534-260039e7949cc580.js" defer=""></script><script src="https://public.slidesharecdn.com/_next/static/chunks/3882-1930de008c11530f.js" defer=""></script><script src="https://public.slidesharecdn.com/_next/static/chunks/pages/slideshow/%5Btitle%5D/%5Bid%5D-3cc06acbe42bfc9f.js" defer=""></script><script src="https://public.slidesharecdn.com/_next/static/b5e752549b9bd9a6933b5e828d6464a4c991c335/_buildManifest.js" defer=""></script><script src="https://public.slidesharecdn.com/_next/static/b5e752549b9bd9a6933b5e828d6464a4c991c335/_ssgManifest.js" defer=""></script><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"name":"slideshow","edgeTestAssignments":[{"name":"example","variant":"A"},{"name":"fullscreen_view","variant":"A"},{"name":"gallery_view","variant":"B"},{"name":"nextjs_profile","variant":"B"},{"name":"nextjs_profile_v2","variant":"B"},{"name":"reading_modes","variant":"A"},{"name":"recs_placement","variant":"A"},{"name":"recs_placement_v2","variant":"A"},{"name":"sections","variant":"A"},{"name":"single_slide_view_v2","variant":"A"}],"layout":{"currentUser":null,"fullPath":"https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080","osanoId":"079b27eb-bb3f-48dd-9bd9-3feb8aec3c38","featureFlags":[{"name":"disable_facebook","enabled":true},{"name":"document_interstitials_flag","enabled":true},{"name":"recommendation_impression_tracking","enabled":true},{"name":"search_results_tracking","enabled":true},{"name":"view_restriction_without_subscription_after_five","enabled":true},{"name":"disable_lazy_hydration","enabled":false}]},"countryCodeFromFastly":"SG","slideshow":{"username":"sblank","allowDownloads":true,"allowDownloadOriginalFile":true,"allowEmbeds":true,"canonicalUrl":"https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080","categories":[{"id":"6","name":"Education","url":"education"}],"createdAt":"2021-06-02 05:30:11 UTC","description":"business model, business model canvas, mission model, mission model canvas, customer development, hacking for defense, H4D, lean launchpad, lean startup, stanford, startup, steve blank, pete newell, bmnt, entrepreneurship, I-Corps, Security, NSIN, NSA, disposable infrastructure, cyber, Joe Felter, DOD","downloadKey":"da8ac7f2ddc5f7dfdd84999ef61ce5235f400d39bbb83f2361de48f661ae304f","editorsNotes":[{"index":1,"text":"Disposable infrastructure - didn’t quite know what it meant, but then decided it sounded interesting and wanted to dive deeper\r\r“If it sounds ambiguous to you, it sounded the same to us as well :)” - ,"},{"index":2,"text":"5 second slide"},{"index":3,"text":"First three questions might seem obvious to people working in the govt or agencies, but we’re Stanford students - remind them who we are :)\r\r"},{"index":4,"text":"We don’t know what disposable infrastructure is, but let’s start with the data ! Make the data \u003c\u003e infrastructure link clear in the title. Current title is subtitle. Cartoon of someone looking under rocks :)\r"},{"index":22,"text":"the NSA is severely restricted in what they can look at in terms of US person information (including IP addresses)\r"},{"index":26,"text":"I can’t tell what this means -\u003e Say: we are thinking of continuing, looking for some advice\r"},{"index":27,"text":"Can we add rachel ?"}],"emailShareUrl":"mailto:?subject=Check out this SlideShare presentation\u0026body=https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080","extension":"pptx","facebookShareUrl":"https://facebook.com/sharer.php?u=https%3A%2F%2Fwww.slideshare.net%2Fslideshow%2Fmongoose-h4d-2021-lessons-learned-248856080%2F248856080\u0026t=Mongoose+H4D+2021+Lessons+Learned","genaiDescriptionCreatedAt":null,"genaiTest":"control","id":"248856080","iframeEmbed":{"url":"https://www.slideshare.net/slideshow/embed_code/key/jzREqHv0PyyUr8","height":486,"width":597},"isIndexable":true,"isLikedByCurrentUser":false,"isPrivate":false,"isViewable":true,"language":"en","likes":1,"linkedinShareUrl":"https://www.linkedin.com/cws/share?url=https%3A%2F%2Fwww.slideshare.net%2Fslideshow%2Fmongoose-h4d-2021-lessons-learned-248856080%2F248856080\u0026trk=SLIDESHARE","downloadCount":12,"secretUrl":"jzREqHv0PyyUr8","shouldShowAds":true,"slides":{"host":"https://image.slidesharecdn.com","title":"Mongoose-H4D-2021-Lessons-Learned","imageLocation":"mongooselessonslearned-210602053011","imageSizes":[{"quality":85,"width":320,"format":"jpg"},{"quality":85,"width":638,"format":"jpg"},{"quality":75,"width":2048,"format":"webp"}]},"smsShareUrl":"sms:?body=Check out this SlideShare : https://www.slideshare.net/slideshow/mongoose-h4d-2021-lessons-learned-248856080/248856080","strippedTitle":"mongoose-h4d-2021-lessons-learned-248856080","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/mongooselessonslearned-210602053011-thumbnail.jpg?width=640\u0026height=640\u0026fit=bounds","title":"Mongoose H4D 2021 Lessons Learned","totalSlides":27,"transcript":["TeamMongoose\nKeertan Kini Zoe Durand Ricardo Rosales Frances Schroeder\nINITIAL PROBLEM STATEMENT\nEnable the NSA to rapidly\nidentify disposable\ninfrastructure used in\ncyber-attacks\nCURRENT PROBLEM STATEMENT\nDemocratize threat\nintelligence by providing an\nautomatic “pivoting”\nsolution\n100 Interviews\nBS Symbolic Systems ‘22\nHipster\nMBA ‘22\nHustler\nMBA ‘22\nHound\nMBA + MPP\nHacker\nProblem Sponsor:\nNational Security\nAgency Cybersecurity\nDirectorate\n ","Over the past 10 weeks, we conducted 100 interviews.\nAcademic\nCommercial\nGovernment\n ","We didn’t fully understand the beneficiary nor the\nproblem statement...\nWhat is the full mission of the NSA?\nWhat data does the NSA have\naccess to?\nWhat is the organizational structure\nbetween the NSA and all the other\nagencies that it defends?\nWhat is disposable infrastructure?\nHow is it used by adversaries in an\nattack?\nWeek 1\n ","Since we didn’t know what “disposable infrastructure” was… we\ndecided to start with the data where we could find it!\n1. “The NSA does not have access to network data if it is domestic” - from Sponsor\n1. “There is a clear reason for which the NSA doesn’t have access to that data - they should just work more\neffectively with the FBI” - from cyber-crime / cyber-security diplomat\n1. “What is missing is the defense agreement to get the data, not the data itself.” - from sponsor \u0026 DoD\nrepresentative\nWeek 1\n ","We realized that the world was much\nmore complicated than we had originally\nthought\nConfused mongoose\nWeek 3\n ","Aha moment! Disposable infrastructure = servers leased\nthrough cloud providers\nWeek 3\n ","All Agencies in\nNational\nSecurity System\nDoD Agencies in\nNational\nSecurity\nSystem\nCritical\ninfrastructure,\nprivate\ncompanies\nNSA\nThe interplay between agencies is even more complicated that we had originally thought!\nCybersecurity and\nInfrastructure\nSecurity Agency\nCISA\nFBI\nCloud\nProviders\nMALICIOUS CYBER\nACTOR\nDisposable\nInfrastructure\nAlready gone!\nUSCYBERCOM\nPrivate Incident\nResponse\nCompanies\nWeek 4\n ","Mission Model Canvas had a lot of other players involved\nKEY PARTNERS\n- NSA (analysts and\nexpertise)\n- DHS CISA\n- Private sector - -\nCloud provider Trust\nand Security Teams\n- FBI Cybercrime\nDivision\n- Private Network\nsecurity firms\nKEY RESOURCES\n- Security Clearance\n- IT Security Accreditation\n- Examples of concerning\nmalware for categorization\nand analysis\n- Traffic Data (labeled\ninstances of disposable\ninfrastructure)\nVALUE PROPOSITIONS\nOne or several of the\nfollowing:\n-Reduce time required to\nidentify persistent\ninfrastructure used by\nmultiple malware\ninstallations\n- Identify temporary\ninfrastructure used by\nmalware installation\npreviously unidentified\nand share to Cloud\nProviders to shutdown\n- Reduce time to serve\nData Preservation notices\nto Cloud Providers to help\nattribution\nKEY ACTIVITIES\n- Software Engineering:\n- Identify common data for\nbehavioral analysis of\nspecific attacks\n- Create analytics which\nplugs into existing\nengines\n- Organizational: Fast Path\nfor data sharing\n- Security Accreditation\nMISSION ACHIEVEMENT/IMPACT FACTORS\nOur mission will be successful if we develop a scalable solution to help\nthe NSA identify persistent infrastructure used by multiple malware\ninstallations in a timely manner.\nDEPLOYMENT\n1. Back-end algorithm not\nrunning in real time as\nproof of concept\n2. Back-end algorithm\nrunning in real time\n(streaming)\n3. Dashboard updated in\nreal time deployed to the\ncloud or on-prem and\naccessible NSA/CISA/FBI\nstakeholders\nBUY-IN \u0026 SUPPORT\n-Need IT Approvals\nfrom NSA/CISA/FBI\nfor their systems\n-Need demand\nMISSION BUDGET/COST\nBENEFICIARIES\nPrimary: Cyber\ndefenders at the NSA,\nSecondary: Cyber\ninvestigators at the FBI\nTertiary: All entities that\nthe NSA serves and the\nDoD in general\nFixed:\n- Software design \u0026 engineering\n- Helpdesk/support functions\n- Labelling Costs\nVariable:\n- Subscription API usage for External tools, cloud computation/storage\n ","“Attack” can mean different things, and even the lifecycle of an\nattack is broad - where could Mongoose help?\nPrevention\nIncident\nresponse\nAttribution\nWeek 4\n ","Big identity crisis for the team!\nA picture of a Mongoose team member boiling the ocean, circa Week 4\nPrevention\nAttribution\nIncident\nresponse\nTeam\nMongoose\nNSA DoD\nCritical infra\nLighthouse of the\nteaching team\nFBI\nFlocks of\nbeneficiaries\n ","Lightbulb moment!\nDisposable\ninfrastructure isn’t in\nand of itself a\nproblem, is it?\n“Attacks” isn’t\nspecific enough.\nYou need to\nnarrow it down to a\nspecific attack!\n“We were originally given a\nsolution, not a problem.”\nWeek 4\n ","Pivot! Focus on a specific attack type: Data exfiltration.\nWeek 5 Problem Statement\nWHAT: improve the early detection of\nnation-state data exfiltration cyber-\nattacks on the NSA corporate network\nconducted through ephemeral cloud\ninfrastructure, where the initial attack\nvector is a zero-day or supply chain\nattack, by quickly identifying the C2\nservers owned in full by the attackers\nFOR WHO: NSA cyber analysts as early\nadopter, later DoD agencies.\nWeek 5\n ","To solve the problem of NSA’s access to domestic\ndata, we decide to focus on the NSA as a corporate\nnetwork\nWeek 5\nWe still have a data problem...\n ","Intelligence and/or Firewall?\nIntelligence for\nsignal analysis\nFirewall to\ninstantly block\nmalicious traffic\nWeek 6\n ","At this point, we still weren’t sure that Mongoose could really\nbring anything to the table.\nWeek 6\n ","Despite the new problem statement, we hit a new low.\nWe write an email to the teaching team outlining\nour concerns: “Our problem statement is either too\nbroad, or too technical. People have tried to solve\nthese problems for years, and it’s unclear what we\nmight be able to contribute. ‘Redefine\ncybersecurity’ is better suited to a PhD in\ncybersecurity than to H4D”\nWeek 6\nWeek 1\nWeek 2\nWeek 3\nWeek 4 Week 5\n“The NSA is a bit of a black\nbox in terms of their\nprocesses and heir prior\nattacks. Proxies don’t seem\nto be working either as no\ncompany seems keen to\ndiscuss the ways in which\nthey’ve been breached.”\n ","We talk to our sponsor and have a breakthrough moment.\nWhat if I already had an\nindicator of\ncompromise… and I\nasked you to find similar\nthings?\n! !\n ","Major breakthrough: we redefine both the problem statement\nand the beneficiary\nWHAT: flag infrastructure on the public internet that “correlates” or\n“matches” to a known malicious infrastructure (seed)\nFOR WHO: NSA Discovery Team in conjunction with JFHQ-DODIN\nNetwork Defenders.\nWeek 6\n ","Team Mongoose is back!\nWeek 7\n ","We define a high-level product!\nMongoose Intelligence will provide analysis automation through\nan entity matching API\nMongoose entity\nmatching API\nMalicious IP\nor domain\nSimilar IP or\nDomain\nWeek 7\n ","We learn that visualization seems to be a compelling product in and of\nitself for many beneficiaries\nIP 1\nIP 2\nDoD\nEndpoint 1\nDomain\naws.com\nDomain\nXYZ.com\nIP 3\nIP 4\nDoD\nEndpoint 2\nJFHQ-DoDIN network\n- Country\n- Date of first\nconnection\n- Account holder\n- # of connections\n- Port\n- Protocol\nINPUT\nOUTPUT\n“Love the visualization! It would be great if you displayed context\nand confidence scores.”\n ","Why hadn’t the NSA ever built this before?\nThey might have.\nLegal framework Large siloed\norganization?\nWeek 8\n ","We start to understand more about the details of the\nspecific data sources and systems that we would need to\nplug into\n“Nobody is doing anything with all the log data that is produced by Akamai\non DoD networks.”\n“You should plug into Acropolis that is already doing data collection. DMA\nis already dumping several terabytes of logs per day. Basically all of the\nDoD is feeding in data.” -- Defense Digital Service\nWeek 9\n ","With our MVPs, we got good signal that this is something that is\ninteresting to the NSA Discovery Team\n“There are rules against me saying we would purchase this. But\nthis is a problem, and it needs to be solved ASAP.” -- NSA CSD\nTD\nWeek 9\n ","Several types of potential customers\nSmall/Medium\nEnterprises\nNSA/JFHQ-DODIN\nTelecoms\nWeek 10\n ","We’re still thinking about whether or not we want to\ncontinue on the project after the class.\nWeek 10\n ","Thank you to everyone who made this possible!\nSpecial thanks to:\n● Neal Ziring, NSA CSD Technical Director\n● Jennifer Quarrie and Jason Chen\n● Our defense mentor\n● H4D TA Joel Johnson\n● The entire H4D teaching team\n● Our 100 interviewees\nTeamMongoose\nProblem Sponsor:\nNational Security\nAgency, Cybersecurity\nDirectorate\nKeertan Kini Zoe Durand Ricardo\nRosales\nFrances\nSchroeder\n "],"twitterShareUrl":"https://twitter.com/intent/tweet?via=SlideShare\u0026text=Mongoose+H4D+2021+Lessons+Learned+by+%40sgblank+%23bmnt+%23businessmodel+https%3A%2F%2Fwww.slideshare.net%2Fslideshow%2Fmongoose-h4d-2021-lessons-learned-248856080%2F248856080","type":"presentation","viewStats":{"views":918,"viewsFromEmbeds":52676,"topEmbeds":[]},"recommendationsByLocation":{"rightRail":[{"algorithmId":"5","displayTitle":"Customizing LLMs","isSavedByCurrentUser":false,"pageCount":17,"score":0.437407,"slideshowId":"263022617","sourceName":"cm_interact","strippedTitle":"customizing-llms-cbd3","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/customizingllms-231103202846-426ebdf1-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The document discusses different methods for customizing large language models (LLMs) with proprietary or private data, including training a custom model, fine-tuning a general model, and prompting with expanded inputs. Fine-tuning techniques like low-rank adaptation and supervised fine-tuning allow emphasizing custom knowledge without full retraining. Prompt expansion using techniques like retrieval augmented generation can provide additional context beyond the character limit.","tags":[],"url":"https://www.slideshare.net/slideshow/customizing-llms-cbd3/263022617","userLogin":"dijieming","userName":"Jim Steele","viewCount":1452},{"algorithmId":"5","displayTitle":"Opinion Mining","isSavedByCurrentUser":false,"pageCount":28,"score":0.409311,"slideshowId":"29407190","sourceName":"cm_interact","strippedTitle":"opinion-mining-29407190","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/opinionmining-131221011849-phpapp02-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"This document provides an overview of opinion mining and sentiment analysis. It defines opinion mining as attempting to automatically determine human opinion from natural language text. It discusses some key applications, such as classifying reviews and understanding public opinion. The document also outlines some challenges, such as understanding context and differing domains. It then describes common models for sentiment analysis, including preparing data, analyzing reviews linguistically, and classifying sentiment using techniques like machine learning classifiers.","tags":[],"url":"https://www.slideshare.net/slideshow/opinion-mining-29407190/29407190","userLogin":"Alihabeeb","userName":"Ali Habeeb","viewCount":5734},{"algorithmId":"5","displayTitle":"Fine-tuning BERT for Question Answering","isSavedByCurrentUser":false,"pageCount":12,"score":0.407919,"slideshowId":"179628340","sourceName":"cm_interact","strippedTitle":"finetuning-bert-for-question-answering","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/questionansweringbert-191007035518-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"This deck covers the problem of fine-tuning a pre-trained BERT model for the task of Question Answering. Check out the GluonNLP model zoo here for models and tutorials: http://gluon-nlp.mxnet.io/model_zoo/bert/index.html\r\nSlides: Thomas Delteil","tags":["mxnet","natural language processing","question answering"],"url":"https://www.slideshare.net/slideshow/finetuning-bert-for-question-answering/179628340","userLogin":"apachemxnet","userName":"Apache MXNet","viewCount":3342},{"algorithmId":"5","displayTitle":"Starting a\tweb-platform or a marketplace?","isSavedByCurrentUser":false,"pageCount":50,"score":0.403388,"slideshowId":"54891059","sourceName":"cm_interact","strippedTitle":"starting-awebplatform-or-a-marketplace","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/lalamove-o2o-business-platform-hkust-151109021054-lva1-app6892-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Lalamove is an on-demand delivery platform operating in Asia. The document discusses key considerations for scaling an online-to-offline (O2O) business platform across Asia, including starting a marketplace, growing the marketplace, and lessons learned. When starting a marketplace, founders must determine whether to operate as a platform or marketplace and tackle challenges like demand/supply balance and competition. Growth requires expanding breadth and depth, focusing on core values like speed and localization, and understanding objectives and stages and key decisions around expansion. Overall takeaways include demonstrating efficiency through technology, focusing on narrowly defined markets, and acquiring customers through paid and organic means while efficiently onboarding suppliers.","tags":["mobile apps","easyvan","business"],"url":"https://www.slideshare.net/lalamove/starting-awebplatform-or-a-marketplace","userLogin":"lalamove","userName":"Lalamove / EasyVan","viewCount":2370},{"algorithmId":"5","displayTitle":"ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...","isSavedByCurrentUser":false,"pageCount":66,"score":0.402456,"slideshowId":"93866369","sourceName":"cm_interact","strippedTitle":"doption-of-cloudbased-services-by-smes-in-developing-countries-development-of-a-toe-based-model","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/cloudcomputingadoptionmodelbyamoswachanga-180414091450-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Small and Medium Enterprises (SMEs) face numerous challenges in identification, setting up\r\nand making use of Information Technology (IT) as an enabler for business. Cloud computing\r\ncould solve this problem by offering ready, low cost of entry IT solutions. Adoption of cloud\r\ncomputing among the SMEs in developing countries is however low due to a number of\r\nbarriers as identified by previous studies. Over the years, research on adoption on innovation\r\nand technology has unveiled a number of theories on adoption which range from Individual\r\nlevel theories to Organizational level theories and even Market level theories. This study\r\nreviews the various theories, opting to use an organization level theory so that focus on the\r\nSME is emphasized. Analysis of literature renders this study to be based on the Technology-\r\nOrganization-Environment (TOE) framework proposed by DePietro et al. (1990). This study\r\nreviews the current adoption levels of cloud computing and proposes a TOE based model for\r\nadoption of cloud-based services by SMEs in developing countries. The study employed\r\nliterature review to determine the factors that are applicable for a model on adoption of cloud\r\ncomputing in the developing countries. Further, the study conducted a survey through a\r\nquestionnaire to collect quantitative data to assist in determination of the most applicable\r\nmodel. Convenience sampling was employed due to the study’s constraints on time and budget.\r\nThe study findings revealed that there is low adoption of cloud computing for business\r\napplications by SMEs in Nairobi County, hence confirms the need for the adoption model.\r\nUsing Exploratory Factor Analysis (EFA) six components were extracted for the proposed\r\nmodel which include Relative Advantage, Accessibility, Organization Readiness and Size,\r\nVendor Readiness, Regulations and Trading Partner Pressure, each with attributes required to\r\nensure successful adoption of cloud computing. The model was validated through statistical\r\nanalysis which confirms a largely reasonable level of fit for the indices and construct validity\r\nconducted through convergent and discriminant validity methods. Further, the model was\r\nsubjected to experts’ analysis who concluded that the model is simple, applicable and fitting.\r\nThe study finally proposes practical recommendations to governments and policy makers,\r\neducational institutions, software vendors and SMEs based on the model. Further research\r\nareas include subjecting the model to larger sample sizes to confirm its validity and the\r\npreparation of an implementation guideline.\r\n\r\nKeywords: Cloud computing, Small and medium enterprises, ICT Adoption, Nairobi Kenya","tags":["cloud computing","small and medium enterprises","ict adoption"],"url":"https://www.slideshare.net/Wachanga/doption-of-cloudbased-services-by-smes-in-developing-countries-development-of-a-toe-based-model","userLogin":"Wachanga","userName":"Amos Wachanga","viewCount":543},{"algorithmId":"3","displayTitle":"Are you ready for the next attack? Reviewing the SP Security Checklist","isSavedByCurrentUser":false,"pageCount":25,"score":0.5649,"slideshowId":"52562830","sourceName":"cm_text","strippedTitle":"are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist-52562830","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/areyoureadyforthenextattackreviewingthespsecuritychecklist40apnic4041-150909011223-lva1-app6891-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The document discusses the importance of using checklists to optimize security operations. It provides an initial security checklist for internet service providers (ISPs) to assess positive control, virtual terminal access control lists (VTY ACLs), vendor security partnerships, upgrade plans, IPv6 security, attack tree analysis, border gateway protocol (BGP) policies, DNS architecture resilience, and developing a security community. The checklist highlights key areas ISPs should review to strengthen their defenses against evolving cyber threats from criminals, hackers, and nation states. Regular use of such checklists is encouraged to proactively address vulnerabilities before exploits can be launched.","tags":["apnic 40","apnic"],"url":"https://www.slideshare.net/slideshow/are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist-52562830/52562830","userLogin":"apnic","userName":"APNIC","viewCount":272},{"algorithmId":"3","displayTitle":"Are you ready for the next attack? reviewing the sp security checklist (apnic...","isSavedByCurrentUser":false,"pageCount":25,"score":0.5649,"slideshowId":"53266149","sourceName":"cm_text","strippedTitle":"are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist-apnic-40","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/areyoureadyforthenextattackreviewingthespsecuritychecklistapnic40-150928083936-lva1-app6892-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Rethinking Security and how you can Act on Meaningful Change\r\n\r\nWhat the industry recommends to protect your network is NOT working! The industry is stuck in a dysfunctional ecosystem that encourages the cyber-criminal innovation at the cost to business and individual loss throughout the world. We do not need a “Manhattan Project” for the security of the Internet. What we need are tools to help operators throughout the world ask the right question that would lead them to meaningful action. Security empowerment must empower the grassroots and provide the tools to push back on the root cause. This talk will explore these issues, highlight the dysfunction in our “security” economy, and present “take home” tools that would facilitate immediate action. ","tags":["internet","telecommunications","security"],"url":"https://www.slideshare.net/BarryRGreene/are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist-apnic-40","userLogin":"BarryRGreene","userName":"Barry Greene","viewCount":748},{"algorithmId":"3","displayTitle":"Cybersecurity - Jim Butterworth","isSavedByCurrentUser":false,"pageCount":79,"score":0.5414,"slideshowId":"4929622","sourceName":"cm_text","strippedTitle":"cybersecurity-jim-butterworth","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/brazilcybersecurityfinaljim-100809115709-phpapp01-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Palestra do evento \"Cybersecurity: a nova era em resposta a incidentes e auditoria de dados\"\r\n\r\nJim Butterworth - Senior Cybersecurity Director Guidance Software Inc.\r\n\r\nBrasília, 04 de agosto de 2010","tags":["cybersecurity"],"url":"https://www.slideshare.net/slideshow/cybersecurity-jim-butterworth/4929622","userLogin":"techbizforense","userName":"TechBiz Forense Digital","viewCount":481}],"whatsHot":[],"alsoLiked":[],"similarTo":[{"algorithmId":"3","displayTitle":"Applied cognitive security complementing the security analyst ","isSavedByCurrentUser":false,"pageCount":21,"score":0.5365,"slideshowId":"74979164","sourceName":"cm_text","strippedTitle":"applied-cognitive-security-complementing-the-security-analyst","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/spo3-w03applied-cognitive-security-complementing-the-security-analystcopy1-170413124007-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution that can learn about security from structured and unstructured information sources is essential. It can be applied to empower security analysts with insights to qualify incidents and investigate risks quickly and accurately.\r\n(Source : RSA Conference 2017)","tags":[],"url":"https://www.slideshare.net/slideshow/applied-cognitive-security-complementing-the-security-analyst/74979164","userLogin":"cisoplatform7","userName":"Priyanka Aash","viewCount":436},{"algorithmId":"3","displayTitle":"Software Supply Chain Attacks (June 2021)","isSavedByCurrentUser":false,"pageCount":47,"score":0.5342,"slideshowId":"249624123","sourceName":"cm_text","strippedTitle":"software-supply-chain-attacks","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/softwaresupplychainattacks-tzahiarabov-210706132923-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The Codecov compromise involved a threat actor tampering with Codecov's Bash uploader script between January-April 2021, allowing them to export data from hundreds of customers' CI environments. The compromised script exfiltrated environment variables to the attacker's IP address. Rapid7 confirmed they were impacted, though the attacker was limited to internal tools and credentials and a small subset of source code repositories.","tags":["information security"],"url":"https://www.slideshare.net/slideshow/software-supply-chain-attacks/249624123","userLogin":"TzahiArabov","userName":"TzahiArabov","viewCount":101},{"algorithmId":"3","displayTitle":"Big security for big data","isSavedByCurrentUser":false,"pageCount":8,"score":0.5318,"slideshowId":"42439766","sourceName":"cm_text","strippedTitle":"big-security-for-big-data","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/bigsecurityforbigdata-141207073439-conversion-gate01-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Big organizations are dealing with massive amounts of data from various sources that needs to be collected and analyzed in real-time to detect security threats. This requires normalizing the data, integrating it from different sources, and using analytics to identify patterns and correlations that could indicate attacks. Doing this analysis in real-time allows threats to be addressed quickly before data is stolen, rather than only analyzing after an attack occurred.","tags":[],"url":"https://www.slideshare.net/slideshow/big-security-for-big-data/42439766","userLogin":"toroscatenato","userName":"Giuliano Tavaroli","viewCount":442},{"algorithmId":"3","displayTitle":"Are you ready for the next attack? Reviewing the SP Security Checklist","isSavedByCurrentUser":false,"pageCount":23,"score":0.5251,"slideshowId":"51987162","sourceName":"cm_text","strippedTitle":"are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/barry-areyoureadyforthenextattackreviewingthespsecuritychecklist2-150824040120-lva1-app6892-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The document discusses the importance of checklists for network security and productivity. It provides a security checklist for internet service providers to optimize their operations. The checklist includes items like ensuring positive control over network access, implementing VTY access lists, requiring security partnerships with vendors, having upgrade plans for all equipment, reviewing IPv6 security, analyzing attack vectors, documenting BGP policies, and building a security community with peers. Adopting such practices can help mitigate security risks from threats like cyber criminals, hackers, and nation states.","tags":["internet security","ddos attack"],"url":"https://www.slideshare.net/slideshow/are-you-ready-for-the-next-attack-reviewing-the-sp-security-checklist/51987162","userLogin":"mynog","userName":"MyNOG","viewCount":1136},{"algorithmId":"3","displayTitle":"Realities of Security in the Cloud","isSavedByCurrentUser":false,"pageCount":23,"score":0.5247,"slideshowId":"92195659","sourceName":"cm_text","strippedTitle":"realities-of-security-in-the-cloud-92195659","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/realitiesofsecurityin-180328155648-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"This document discusses security challenges in cloud computing environments and how machine learning can help address them. It summarizes that web application attacks are now the largest source of data breaches but receive less than 5% of security budgets. It also notes that most detection efforts relying only on tools fail due to alert fatigue. Machine learning can help overcome these challenges by analyzing a wide range of data to detect even sophisticated, multi-stage attacks across cloud and non-cloud environments. The document advocates for an approach combining prevention, detection, response, compliance and expertise to provide comprehensive cloud security.","tags":["alert logic","cloud security","cloud security summit"],"url":"https://www.slideshare.net/AlertLogic/realities-of-security-in-the-cloud-92195659","userLogin":"AlertLogic","userName":"Alert Logic ","viewCount":118},{"algorithmId":"3","displayTitle":"Websense security prediction 2014","isSavedByCurrentUser":false,"pageCount":11,"score":0.522,"slideshowId":"29961110","sourceName":"cm_text","strippedTitle":"websense-security-prediction-2014","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/websense-securityprediction2014-140113091408-phpapp01-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The document provides 8 predictions for cybersecurity threats in 2014:\n\n1) Advanced malware volume will decrease but attacks will become more targeted and stealthy. \n\n2) A major data-destruction attack such as ransomware will successfully target organizations. \n\n3) Attackers will increasingly target cloud data rather than enterprise networks.\n\n4) Exploit kits like Redkit and Neutrino will struggle for dominance following the arrest of the Blackhole exploit kit author. \n\n5) Java vulnerabilities will remain highly exploitable and exploited with expanded consequences. \n\n6) Attackers will use professional social networks like LinkedIn to target executives and organizations. \n\n7) Cybercriminals will target weaker links in organizations","tags":[],"url":"https://www.slideshare.net/slideshow/websense-security-prediction-2014/29961110","userLogin":"Bee_Ware","userName":"Bee_Ware","viewCount":1230},{"algorithmId":"3","displayTitle":"4777.team c.final","isSavedByCurrentUser":false,"pageCount":15,"score":0.52,"slideshowId":"156190924","sourceName":"cm_text","strippedTitle":"4777team-cfinal","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/4777-190718032016-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Team research paper and project on network vulnerabilities with multiple attacks and defesnses: \r\n\r\nCybersecurity\r\n-For this project, our class was paired with teams to attempt to find vulnerabilities in other teams networks and to successfully beach their network.\r\n-My role in this group was to help breach other team vulnerabilities through different attacks like responder attacks, honeypots, etc. \r\n-The main challenges of this project were trying to find the vulnerabilities successfully, as the whole team had troubles with each of our different attacks and defenses. \r\n-We learned how to use cybersecurity tools to help find vulnerabilities in networks and how to protect against them better. For example, in the honeypot we used we deployed it to port 80, when the attacker tried to access our fake server we were notified. We also deployed palto alto firewall to create our private and secure network. For an attack, we also used password crackers like john the ripper. This project taught us how to breach networks as a team.\r\n","tags":[],"url":"https://www.slideshare.net/slideshow/4777team-cfinal/156190924","userLogin":"AlexisHarvey8","userName":"AlexisHarvey8","viewCount":51},{"algorithmId":"3","displayTitle":"Combating Advanced Persistent Threats with Flow-based Security Monitoring","isSavedByCurrentUser":false,"pageCount":49,"score":0.5177,"slideshowId":"24805314","sourceName":"cm_text","strippedTitle":"combating-advanced-persistent-threats","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/combating-apts-with-stealthwatch-slides-130731103954-phpapp01-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Learn how to leverage flow data to:\r\n\r\n* Proactively detect attacks\r\n* Mitigate APTs\r\n* Gain forensic intelligence\r\n* Improve situational awareness","tags":["advanced persistent threats","ddos","network forensics"],"url":"https://www.slideshare.net/slideshow/combating-advanced-persistent-threats/24805314","userLogin":"Lancope","userName":"Lancope, Inc.","viewCount":1900},{"algorithmId":"3","displayTitle":"Attackers May Depend On Social Engineering To Gain...","isSavedByCurrentUser":false,"pageCount":80,"score":0.5176,"slideshowId":"263567592","sourceName":"cm_text","strippedTitle":"attackers-may-depend-on-social-engineering-to-gain","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/attackersmaydependonsocialengineeringtogain-231118212631-5f67e5bf-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The document discusses integrating threat intelligence and incident response. It defines threat intelligence as technical and contextual information about emerging threats evaluated for accuracy. Threat intelligence feeds into strategic, operational and tactical security levels. Challenges include connecting diverse data points and filtering noise. A threat intelligence platform helps address this by analyzing data and delivering standardized information. The threat kill chain model outlines attack stages from reconnaissance to information theft. Integrating threat intelligence and incident response improves network defenses across each stage.","tags":["attackers","may","depend"],"url":"https://www.slideshare.net/slideshow/attackers-may-depend-on-social-engineering-to-gain/263567592","userLogin":"tiffanysandovalfairf","userName":"Tiffany Sandoval","viewCount":9},{"algorithmId":"3","displayTitle":"Security Opportunities \u000bA Silicon Valley VC Perspective","isSavedByCurrentUser":false,"pageCount":15,"score":0.5158,"slideshowId":"48934246","sourceName":"cm_text","strippedTitle":"security-opportunities-a-silicon-valley-vc-perspective","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/positivehackdays-rev1-150603100316-lva1-app6892-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"This document summarizes the key points from a Silicon Valley VC's perspective on security opportunities and challenges. It notes that the security landscape is increasingly complex, with state-sponsored attacks and advanced tools being used by attackers. Most enterprises do not treat security as a core part of their culture. There are many opportunities for startups in security analytics, behavioral monitoring, encryption, and translating technical security data into actionable intelligence for companies. However, the document also notes that startups themselves often have very poor security practices. It provides examples of weak security postures commonly seen in startups. The document argues that improving security should be a priority for startups in order to protect their valuable assets and avoid losing funding or having their work stolen.","tags":[],"url":"https://www.slideshare.net/slideshow/security-opportunities-a-silicon-valley-vc-perspective/48934246","userLogin":"phdays","userName":"Positive Hack Days","viewCount":619},{"algorithmId":"3","displayTitle":"Cyber Defense - How to be prepared to APT","isSavedByCurrentUser":false,"pageCount":25,"score":0.5156,"slideshowId":"75398262","sourceName":"cm_text","strippedTitle":"cyber-defense-how-to-be-prepared-to-apt","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/aieacyberdefensev07so-170425172551-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"This document provides an overview of a presentation on cyber defense and cyber attack simulations. It begins with an agenda and introductions. It then discusses the evolving threats landscape, with attacks increasing in scale, scope and sophistication. It outlines the cyber attack simulation methodology, including researching the target, infiltrating networks, establishing footholds, moving laterally and exfiltrating data. It describes three scenario examples - a web attack, phishing email, and exploiting physical access. Each scenario provides the rules of engagement, attack overview and lessons learned. It concludes with quotes emphasizing the importance of preparation and deception in warfare.","tags":["network penetration test","osstmm","cyber security"],"url":"https://www.slideshare.net/slideshow/cyber-defense-how-to-be-prepared-to-apt/75398262","userLogin":"simone.onofri","userName":"Simone Onofri","viewCount":522},{"algorithmId":"3","displayTitle":"Network security monitoring with open source tools","isSavedByCurrentUser":false,"pageCount":25,"score":0.5109,"slideshowId":"38033458","sourceName":"cm_text","strippedTitle":"network-security-monitoring-with-open-source-tools","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/networksecuritymonitoringwithopensourcetools-140815140843-phpapp02-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The document discusses implementing network security monitoring using open source tools. It begins with an introduction to network security monitoring (NSM) and its goal of collecting and analyzing different types of network data to detect and respond to intrusions. It then discusses recommended platforms and operating systems for NSM, such as various free/open BSD systems. Next, it covers ways to capture network traffic, including using hubs, taps, inline devices, or SPAN ports. It proceeds to describe the four types of data collected in NSM - full content, session, event, and statistical data. For each, it provides examples of open source tools and compares them to commercial options. Finally, it discusses the open source tool Sguil, which implements","tags":["network","security"],"url":"https://www.slideshare.net/slideshow/network-security-monitoring-with-open-source-tools/38033458","userLogin":"terriert","userName":"terriert","viewCount":588},{"algorithmId":"3","displayTitle":"OSINT Basics for Threat Hunters and Practitioners","isSavedByCurrentUser":false,"pageCount":30,"score":0.5101,"slideshowId":"244754055","sourceName":"cm_text","strippedTitle":"osint-basics-for-threat-hunters-and-practitioners","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/mdeblois-osint-basics-swift-mar20212-210319182345-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"This presentation was created for the SWIFT Tech Symposium at Calpoly Pomona. Learn the basics of OSINT, but for hunting Internet infrastructure. \r\n\r\n-OSINT Basics: Let’ s talk about what it is, why it’s important, how it’s used in the world of Internet infrastructure.\r\n\r\n-Understanding Different Use Cases: We’ll take a quick look at examples of how this is valuable for threat hunters, security practitioners, as well as researchers.\r\n\r\n-Practice, practice, practice: I’ll end this talk by sharing out some good resources and ideas for how you can sharpen your OSINT skills for security research or for better organization defense.","tags":["osint","infosec","cybersecurity"],"url":"https://www.slideshare.net/slideshow/osint-basics-for-threat-hunters-and-practitioners/244754055","userLogin":"MeganDeBlois","userName":"Megan DeBlois","viewCount":361},{"algorithmId":"3","displayTitle":"ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...","isSavedByCurrentUser":false,"pageCount":79,"score":0.5085,"slideshowId":"79134926","sourceName":"cm_text","strippedTitle":"threatstack-workshop-stop-wasting-your-time-focus-on-security-practices-that-actually-matter","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/aws-security-week-2017-2-hou-10f571fa-3bdd-49e1-9194-6ee92ada79b8-1317587539-170824204401-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"There’s no shortage of noise about cybersecurity. Between the shear number of vendors and daily news coverage about the next big vulnerability or breach, it’s easy to start feeling directionless and reactive. However, there are ways to cut through the noise. The first step is understanding how companies are actually getting breached - not just the ones you hear about in the media. Then, you can create a strategy that’s tailored to your risk profile and attack surface. In this session, you’ll leave with an understanding of how to measure your risk, devise a realistic defense strategy, and deploy high impact security, no matter what your budget or time crunch is.","tags":["aws","amazon web services","cloud computing"],"url":"https://www.slideshare.net/slideshow/threatstack-workshop-stop-wasting-your-time-focus-on-security-practices-that-actually-matter/79134926","userLogin":"AmazonWebServices","userName":"Amazon Web Services","viewCount":704},{"algorithmId":"3","displayTitle":"Splunk for Security - Hands-On ","isSavedByCurrentUser":false,"pageCount":38,"score":0.5075,"slideshowId":"61639706","sourceName":"cm_text","strippedTitle":"splunk-for-security-handson-61639706","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/discoverydaydesmoinessecuritypresentation-160503195214-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Join our Security Expert and learn how to use the Splunk App for Enterprise Security (ES) in a live, hands-on session. We'll take a tour through Splunk's award-winning security offering to understand some of the unique capabilities in the product. Then, we'll use ES to work an incident and disrupt an adversary's Kill Chain by finding the Actions on Intent, Exploitation Methods, and Reconnaissance Tactics used against a simulated organization. Data investigated will include threat list intelligence feeds, endpoint activity logs, e-mail logs, and web access logs. This session is a must for all security experts! Please bring your laptop as this is a hands-on session. ","tags":["discoverydaydesmoines2016"],"url":"https://www.slideshare.net/slideshow/splunk-for-security-handson-61639706/61639706","userLogin":"Splunk","userName":"Splunk","viewCount":751},{"algorithmId":"3","displayTitle":"Solnet dev secops meetup","isSavedByCurrentUser":false,"pageCount":18,"score":0.5069,"slideshowId":"238687891","sourceName":"cm_text","strippedTitle":"solnet-dev-secops-meetup","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/solnetdevsecopsmeetup-201001033017-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"DevSecOps aims to integrate security practices into DevOps workflows to deliver value faster and safer. It addresses challenges like keeping security practices aligned with continuous delivery models and empowered DevOps teams. DevSecOps incorporates security checks and tools into development pipelines to find and fix issues early. This helps prevent breaches like the 2017 Equifax hack, which exploited a known vulnerability. DevSecOps promotes a culture of collaboration, shared responsibility, and proactive security monitoring throughout the software development lifecycle.","tags":["devops","devsecops","information security"],"url":"https://www.slideshare.net/slideshow/solnet-dev-secops-meetup/238687891","userLogin":"pbink","userName":"pbink","viewCount":92},{"algorithmId":"3","displayTitle":"NetworkWorld-SafeBreach","isSavedByCurrentUser":false,"pageCount":2,"score":0.5062,"slideshowId":"70916466","sourceName":"cm_text","strippedTitle":"networkworldsafebreach","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/2cb6af68-5293-48f0-85b1-08e60ba432df-170111174639-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"SafeBreach is a continuous security validation platform that can identify vulnerabilities in a company's network by simulating cyberattacks. It deploys agents across all systems to map the network and monitor for attacks without affecting the systems. The article describes how SafeBreach was tested on a large virtual network, quickly finding hundreds of potential entry points and paths to sensitive data. It also discusses how SafeBreach can be used to run security scenarios and wargames to help train IT teams to respond to attacks.","tags":[],"url":"https://www.slideshare.net/slideshow/networkworldsafebreach/70916466","userLogin":"DanKunkel","userName":"Dan Kunkel","viewCount":132},{"algorithmId":"3","displayTitle":"Hands on Security - Disrupting the Kill Chain Breakout Session","isSavedByCurrentUser":false,"pageCount":38,"score":0.5061,"slideshowId":"47048737","sourceName":"cm_text","strippedTitle":"hands-on-security-disrupting-the-kill-chain-breakout-final","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecurity-disruptingthekillchainbreakout-final-150415183306-conversion-gate01-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The document discusses a security investigation using Splunk software to trace a cyber attack across multiple data sources. The investigation began by identifying communications from an internal IP address to known threats. Examining endpoint data revealed a suspicious svchost.exe process communicating outbound, which was traced back through parent processes to a vulnerable PDF reader opened by an employee. Web logs showed the attacker gained access to a sensitive file via a brute force attack on the company website. By connecting activities across threat intelligence, endpoint, email, web and other sources, the root cause was determined to be a targeted spear phishing email containing a weaponized PDF file.","tags":["portland"],"url":"https://www.slideshare.net/slideshow/hands-on-security-disrupting-the-kill-chain-breakout-final/47048737","userLogin":"Splunk","userName":"Splunk","viewCount":1112},{"algorithmId":"3","displayTitle":"Hands-On Security Breakout Session- Disrupting the Kill Chain","isSavedByCurrentUser":false,"pageCount":40,"score":0.506,"slideshowId":"48173629","sourceName":"cm_text","strippedTitle":"handson-security-breakout-session-disrupting-the-kill-chain-48173629","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150515021052-lva1-app6892-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"This document summarizes a security investigation using Splunk software to disrupt the cyber kill chain. The investigation began by detecting threat intelligence related events across multiple data sources for a specific IP address. Further investigation revealed DNS queries, proxy activity, and suspicious processes on an endpoint. Pivoting to the endpoint data identified a Zeus malware process communicating outbound. Working backwards through process lineage identified an exploited vulnerable application and a weaponized PDF file delivered via email phishing. A search of web logs found the file was obtained from a website via a brute force attack. The root cause was determined to be a targeted spear phishing email containing an exploit.","tags":["calgary"],"url":"https://www.slideshare.net/Splunk/handson-security-breakout-session-disrupting-the-kill-chain-48173629","userLogin":"Splunk","userName":"Splunk","viewCount":1073},{"algorithmId":"3","displayTitle":"Hands-On Security Breakout Session- Disrupting the Kill Chain","isSavedByCurrentUser":false,"pageCount":40,"score":0.506,"slideshowId":"48005202","sourceName":"cm_text","strippedTitle":"handson-security-breakout-session-disrupting-the-kill-chain","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/hands-onsecuritybreakoutsession-disruptingthekillchain-20150506-150511162909-lva1-app6891-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The document discusses a security investigation demo using Splunk software to disrupt the cyber kill chain. It begins with detecting threat intelligence related events across multiple data sources for a specific IP address. Further investigation using endpoint data from Microsoft Sysmon reveals network connections and process information. This traces the suspicious activity back through parent processes to identify a vulnerable PDF reader application exploited by opening a weaponized file delivered via email phishing. Additional context from web logs shows the file was obtained through a brute force attack on the company's website. The investigation is then able to connect events across various data sources to fully map out the adversary's actions.","tags":["seattle"],"url":"https://www.slideshare.net/slideshow/handson-security-breakout-session-disrupting-the-kill-chain/48005202","userLogin":"Splunk","userName":"Splunk","viewCount":467}],"moreFromUser":[{"algorithmId":"","displayTitle":"Team Networks - 2022 Technology, Innovation \u0026 Great Power Competition","isSavedByCurrentUser":false,"pageCount":19,"score":0,"slideshowId":"255126380","sourceName":"MORE_FROM_USER","strippedTitle":"team-networks-2022-technology-innovation-great-power-competition-255126380","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team2networks2-230103193906-3a211bca-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, networks","tags":["technology innovation and great power competition","tigpc","gordian knot center"],"url":"https://www.slideshare.net/slideshow/team-networks-2022-technology-innovation-great-power-competition-255126380/255126380","userLogin":"sblank","userName":"Stanford University","viewCount":2674},{"algorithmId":"","displayTitle":"Team LiOn Batteries - 2022 Technology, Innovation \u0026 Great Power Competition","isSavedByCurrentUser":false,"pageCount":16,"score":0,"slideshowId":"254972349","sourceName":"MORE_FROM_USER","strippedTitle":"team-lion-batteries-2022-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team9lionbatteries-221221050826-a3ab7cab-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, LiOn Batteries","tags":["technology innovation and great power competition","tigpc","gordian knot center"],"url":"https://www.slideshare.net/sblank/team-lion-batteries-2022-technology-innovation-great-power-competition","userLogin":"sblank","userName":"Stanford University","viewCount":2995},{"algorithmId":"","displayTitle":"Team Quantum - 2022 Technology, Innovation \u0026 Great Power Competition","isSavedByCurrentUser":false,"pageCount":14,"score":0,"slideshowId":"254972339","sourceName":"MORE_FROM_USER","strippedTitle":"team-quantum-2022-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team7quantum-221221050657-0f216f2a-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Quantum","tags":["technology innovation and great power competition","tigpc","gordian knot center"],"url":"https://www.slideshare.net/sblank/team-quantum-2022-technology-innovation-great-power-competition","userLogin":"sblank","userName":"Stanford University","viewCount":2284},{"algorithmId":"","displayTitle":"Team Disinformation - 2022 Technology, Innovation \u0026 Great Power Competition","isSavedByCurrentUser":false,"pageCount":27,"score":0,"slideshowId":"254970280","sourceName":"MORE_FROM_USER","strippedTitle":"team-disinformation-2022-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team6disinformation-221221011843-37a67139-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Disinformation","tags":["technology innovation and great power competition","tigpc","gordian knot center"],"url":"https://www.slideshare.net/slideshow/team-disinformation-2022-technology-innovation-great-power-competition/254970280","userLogin":"sblank","userName":"Stanford University","viewCount":2395},{"algorithmId":"","displayTitle":"Team Wargames - 2022 Technology, Innovation \u0026 Great Power Competition","isSavedByCurrentUser":false,"pageCount":20,"score":0,"slideshowId":"254970251","sourceName":"MORE_FROM_USER","strippedTitle":"team-wargames-2022-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team4-combineddraft-221221011421-59a4b8a1-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Wargames","tags":["technology innovation and great power competition","tigpc","gordian knot center"],"url":"https://www.slideshare.net/slideshow/team-wargames-2022-technology-innovation-great-power-competition/254970251","userLogin":"sblank","userName":"Stanford University","viewCount":2519},{"algorithmId":"","displayTitle":"Team Acquistion - 2022 Technology, Innovation \u0026 Great Power Competition ","isSavedByCurrentUser":false,"pageCount":42,"score":0,"slideshowId":"254969985","sourceName":"MORE_FROM_USER","strippedTitle":"team-acquistion-2022-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team3lessonslearnedvf-221221002641-538f4f5a-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Acquistion","tags":["technology innovation and great power competition","tigpc","gordian knot center"],"url":"https://www.slideshare.net/slideshow/team-acquistion-2022-technology-innovation-great-power-competition/254969985","userLogin":"sblank","userName":"Stanford University","viewCount":2637},{"algorithmId":"","displayTitle":"Team Climate Change - 2022 Technology, Innovation \u0026 Great Power Competition ","isSavedByCurrentUser":false,"pageCount":19,"score":0,"slideshowId":"254969279","sourceName":"MORE_FROM_USER","strippedTitle":"team-army-climate-change-2022-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team1final-221220213514-633c0c59-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, climate","tags":["technology innovation and great power competition","tigpc","gordian knot center"],"url":"https://www.slideshare.net/sblank/team-army-climate-change-2022-technology-innovation-great-power-competition","userLogin":"sblank","userName":"Stanford University","viewCount":2506},{"algorithmId":"","displayTitle":"Altuna Engr245 2022 Lessons Learned","isSavedByCurrentUser":false,"pageCount":25,"score":0,"slideshowId":"252113422","sourceName":"MORE_FROM_USER","strippedTitle":"altuna-engr245-2022-lessons-learned","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/2022-05-25altunafinalreflections-220704025228-fbbfff3c-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The document describes a team's efforts to commercialize a new protein quantification technology called PLA-Seq. After initially thinking the technology's value propositions of lower cost, faster throughput, and lower sample volume would appeal to pharmaceutical and personalized health companies, the team conducted customer interviews and learned accuracy was more important than cost to most customers. They also found their target markets should be preclinical biotech and academia rather than personalized health or CROs. The team incorporated their business and pivoted their marketing strategy and funding plans accordingly based on learnings outside of the building.","tags":["e245","lean launchpad","lean"],"url":"https://www.slideshare.net/slideshow/altuna-engr245-2022-lessons-learned/252113422","userLogin":"sblank","userName":"Stanford University","viewCount":1359},{"algorithmId":"","displayTitle":"Invisa Engr245 2022 Lessons Learned","isSavedByCurrentUser":false,"pageCount":21,"score":0,"slideshowId":"252113417","sourceName":"MORE_FROM_USER","strippedTitle":"invisa-engr245-2022-lessons-learned","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/invisafinalpresenation-220704025156-caa0c0b6-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The document summarizes the development of Invisa Bio over 10 weeks as they pivoted between different medical applications and solutions for their self-assembling medical device technology. They initially focused on manufacturing and delivery but shifted to leveraging drug delivery mechanisms. They considered applications in cardiology, neurology, and orthopedics before focusing on brain aneurysms based on feedback from physicians. The company incorporated, raised funding, and began shadowing doctors to further develop their technology to address unmet needs in difficult to reach areas.","tags":["stanford","lean","lean launchpad"],"url":"https://www.slideshare.net/slideshow/invisa-engr245-2022-lessons-learned/252113417","userLogin":"sblank","userName":"Stanford University","viewCount":200},{"algorithmId":"","displayTitle":"ānanda Engr245 2022 Lessons Learned","isSavedByCurrentUser":false,"pageCount":18,"score":0,"slideshowId":"252113416","sourceName":"MORE_FROM_USER","strippedTitle":"nanda-engr245-2022-lessons-learned","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/nandalessonslearned-finaldraft-220704025152-21e0bfdd-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"(1) The document describes the journey of a team developing a saffron supplement product to address mental health issues like anxiety and depression. \n\n(2) It started with the goal of targeting adults aged 18-40, but through customer interviews and testing, they learned that teenagers were more interested in an anti-anxiety gummy product. \n\n(3) Key lessons included the challenges of building the right team, navigating advice, knowing when enough customer feedback has been received, and setting individual and project milestones. The team is now continuing work over the summer to further develop the product.","tags":["stanford","e245","lean launchpad"],"url":"https://www.slideshare.net/slideshow/nanda-engr245-2022-lessons-learned/252113416","userLogin":"sblank","userName":"Stanford University","viewCount":64},{"algorithmId":"","displayTitle":"Gordian Knot Center Roundtable w/Depty SecDef ","isSavedByCurrentUser":false,"pageCount":37,"score":0,"slideshowId":"251567050","sourceName":"MORE_FROM_USER","strippedTitle":"gordian-knot-center-roundtable-wdepty-secdef","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/dsdgkcroundtablev2-220412025626-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Kathleen Hicks - Deputy secretary of defense- visit to the Stanford Gordian Knot Center for National Security Innovation","tags":["defense innovation","deputy secretary of defense","gordian knot"],"url":"https://www.slideshare.net/slideshow/gordian-knot-center-roundtable-wdepty-secdef/251567050","userLogin":"sblank","userName":"Stanford University","viewCount":35069},{"algorithmId":"","displayTitle":"Team Army venture capital - 2021 Technology, Innovation \u0026 Great Power Competi...","isSavedByCurrentUser":false,"pageCount":16,"score":0,"slideshowId":"250985332","sourceName":"MORE_FROM_USER","strippedTitle":"team-army-venture-capital-2021-technology-innovation-great-power-competition-250985332","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/avicdeckfinal2-220112223235-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, Army venture capital","tags":["technology","innovation and great power competition","tigpc"],"url":"https://www.slideshare.net/slideshow/team-army-venture-capital-2021-technology-innovation-great-power-competition-250985332/250985332","userLogin":"sblank","userName":"Stanford University","viewCount":74802},{"algorithmId":"","displayTitle":"Team Army venture capital - 2021 Technology, Innovation \u0026 Great Power Competi...","isSavedByCurrentUser":false,"pageCount":16,"score":0,"slideshowId":"250985330","sourceName":"MORE_FROM_USER","strippedTitle":"team-army-venture-capital-2021-technology-innovation-great-power-competition-250985330","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/avicdeckfinal2-220112223132-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve Blank, Army Venture capital","tags":["technology","innovation and great power competition","tigpc"],"url":"https://www.slideshare.net/slideshow/team-army-venture-capital-2021-technology-innovation-great-power-competition-250985330/250985330","userLogin":"sblank","userName":"Stanford University","viewCount":591},{"algorithmId":"","displayTitle":"Team Catena - 2021 Technology, Innovation \u0026 Great Power Competition","isSavedByCurrentUser":false,"pageCount":20,"score":0,"slideshowId":"250937807","sourceName":"MORE_FROM_USER","strippedTitle":"team-catena-2021-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team71833318821721catenafinalprojectpresentationsubmission-220104015059-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, economic coercion,","tags":["technology","innovation and great power competition","tigpc"],"url":"https://www.slideshare.net/slideshow/team-catena-2021-technology-innovation-great-power-competition/250937807","userLogin":"sblank","userName":"Stanford University","viewCount":77686},{"algorithmId":"","displayTitle":"Team Apollo - 2021 Technology, Innovation \u0026 Great Power Competition","isSavedByCurrentUser":false,"pageCount":24,"score":0,"slideshowId":"250937800","sourceName":"MORE_FROM_USER","strippedTitle":"team-space-force-2021-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team61110388821561spaceforce-220104014933-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, space force","tags":["technology","innovation and great power competition","tigpc"],"url":"https://www.slideshare.net/slideshow/team-space-force-2021-technology-innovation-great-power-competition/250937800","userLogin":"sblank","userName":"Stanford University","viewCount":77137},{"algorithmId":"","displayTitle":"Team Drone - 2021 Technology, Innovation \u0026 Great Power Competition","isSavedByCurrentUser":false,"pageCount":51,"score":0,"slideshowId":"250937790","sourceName":"MORE_FROM_USER","strippedTitle":"team-drone-2021-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team5late1841158862916tigpcdraftpresentation2-220104014801-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, c3i, command and control","tags":["technology","innovation and great power competition","tigpc"],"url":"https://www.slideshare.net/slideshow/team-drone-2021-technology-innovation-great-power-competition/250937790","userLogin":"sblank","userName":"Stanford University","viewCount":77904},{"algorithmId":"","displayTitle":"Team Short Circuit - 2021 Technology, Innovation \u0026 Great Power Competition","isSavedByCurrentUser":false,"pageCount":19,"score":0,"slideshowId":"250937666","sourceName":"MORE_FROM_USER","strippedTitle":"team-short-circuit-2021-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team41730708820990teamshortcircuitpresentationclean-220104011943-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, semiconductors","tags":["technology","innovation and great power competition","tigpc"],"url":"https://www.slideshare.net/slideshow/team-short-circuit-2021-technology-innovation-great-power-competition/250937666","userLogin":"sblank","userName":"Stanford University","viewCount":77342},{"algorithmId":"","displayTitle":"Team Aurora - 2021 Technology, Innovation \u0026 Great Power Competition","isSavedByCurrentUser":false,"pageCount":17,"score":0,"slideshowId":"250937652","sourceName":"MORE_FROM_USER","strippedTitle":"aurora-2021-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team3late1064048821797newfinalpresentationslides-220104011503-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, Army venture capital","tags":["technology","innovation and great power competition","tigpc"],"url":"https://www.slideshare.net/slideshow/aurora-2021-technology-innovation-great-power-competition/250937652","userLogin":"sblank","userName":"Stanford University","viewCount":77397},{"algorithmId":"","displayTitle":"Team Conflicted Capital Team - 2021 Technology, Innovation \u0026 Great Power Comp...","isSavedByCurrentUser":false,"pageCount":13,"score":0,"slideshowId":"250937647","sourceName":"MORE_FROM_USER","strippedTitle":"team-conflicted-capital-team-2021-technology-innovation-great-power-competition","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/team21130conflictedcapitaltigpcfinalpresentation-220104011009-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, venture capital","tags":["technology","innovation and great power competition","tigpc"],"url":"https://www.slideshare.net/slideshow/team-conflicted-capital-team-2021-technology-innovation-great-power-competition/250937647","userLogin":"sblank","userName":"Stanford University","viewCount":77551},{"algorithmId":"","displayTitle":"Lecture 8 - Technology, Innovation and Great Power Competition - Cyber","isSavedByCurrentUser":false,"pageCount":72,"score":0,"slideshowId":"250694008","sourceName":"MORE_FROM_USER","strippedTitle":"lecture-8-technology-innovation-and-great-power-competition-cyber","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/lecture8tigpc2021-211121072220-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, hacking for defense, intlpol 340, joe felter, ms\u0026e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, Michael Sulmeyer, cybercom,USCYBERCOM","tags":["technology","innovation and great power competition","tigpc"],"url":"https://www.slideshare.net/slideshow/lecture-8-technology-innovation-and-great-power-competition-cyber/250694008","userLogin":"sblank","userName":"Stanford University","viewCount":56026}],"featured":null,"latest":[{"algorithmId":"4","displayTitle":"Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. ...","isSavedByCurrentUser":false,"pageCount":59,"score":0,"slideshowId":"276437155","sourceName":"LATEST","strippedTitle":"early-korea-1-reconsidering-early-korean-history-through-archaeology-mark-e-byington","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/64052-250308223712-73806320-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Early Korea 1 Reconsidering Early Korean History through Archaeology Mark E. Byington\nEarly Korea 1 Reconsidering Early Korean History through Archaeology Mark E. Byington\nEarly Korea 1 Reconsidering Early Korean History through Archaeology Mark E. Byington","tags":["ebooks","education"],"url":"https://www.slideshare.net/slideshow/early-korea-1-reconsidering-early-korean-history-through-archaeology-mark-e-byington/276437155","userLogin":"spinoyayber","userName":"spinoyayber","viewCount":49},{"algorithmId":"4","displayTitle":"How to use product categories in Odoo 17 to organize your Inventory","isSavedByCurrentUser":false,"pageCount":10,"score":0,"slideshowId":"276539172","sourceName":"LATEST","strippedTitle":"how-to-use-product-categories-in-odoo-17-to-organize-your-inventory","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/howtouseproductcategoriesinodoo17toorganizeyourinventory-250311061259-404b5f8e-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Product categories in Odoo are essential for organizing and managing your inventory efficiently. They help you group similar products together, making it easier to track stock levels, analyze sales data, and apply specific configurations such as tax rules, accounting entries, or routes for purchasing and manufacturing.","tags":["odoo","odoo modules","odoo guides"],"url":"https://www.slideshare.net/slideshow/how-to-use-product-categories-in-odoo-17-to-organize-your-inventory/276539172","userLogin":"CelineGeorge1","userName":"Celine George","viewCount":65},{"algorithmId":"4","displayTitle":"7. ES: Application of Number: Percentages","isSavedByCurrentUser":false,"pageCount":20,"score":0,"slideshowId":"276495934","sourceName":"LATEST","strippedTitle":"7-es-application-of-number-percentages","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/8-250310093732-964a000d-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"AON: Percentages","tags":[],"url":"https://www.slideshare.net/slideshow/7-es-application-of-number-percentages/276495934","userLogin":"leigh441292","userName":"leigh441292","viewCount":114},{"algorithmId":"4","displayTitle":"Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1...","isSavedByCurrentUser":false,"pageCount":8,"score":0,"slideshowId":"276384155","sourceName":"LATEST","strippedTitle":"lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/lessonplanm12024-250307104619-647897c6-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Lesson Plan M1 2024 Lesson Plan M1 2024 Lesson Plan M1 2024 ","tags":["lesson plan m1 2024 lesson pl"],"url":"https://www.slideshare.net/slideshow/lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024-lesson-plan-m1-2024/276384155","userLogin":"pinkdvil200","userName":"pinkdvil200","viewCount":928},{"algorithmId":"4","displayTitle":"Kaun TALHA quiz Prelims - El Dorado 2025","isSavedByCurrentUser":false,"pageCount":47,"score":0,"slideshowId":"276392082","sourceName":"LATEST","strippedTitle":"kaun-talha-quiz-prelims-el-dorado-2025","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/kauntalhaprelimswithanswers-250307151746-3d96fe94-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Prelims of Kaun TALHA : a Travel, Architecture, Lifestyle, Heritage and Activism quiz, organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025. ","tags":["quiz","lifestyle","travel"],"url":"https://www.slideshare.net/slideshow/kaun-talha-quiz-prelims-el-dorado-2025/276392082","userLogin":"ConquiztadorsTheQuiz","userName":"Conquiztadors- the Quiz Society of Sri Venkateswara College","viewCount":744},{"algorithmId":"4","displayTitle":"Adrenergic Transmission \u0026 Adrenergic Drugs","isSavedByCurrentUser":false,"pageCount":40,"score":0,"slideshowId":"276453870","sourceName":"LATEST","strippedTitle":"adrenergic-transmission-adrenergic-drugs","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/adrenergicdrugsdrcvignesh-250309111948-b49476f3-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"General overview of Adrenergic transmission and Adrenergic drugs","tags":["adrenergic drugs","sympathomimetics","adrenergic transmission"],"url":"https://www.slideshare.net/slideshow/adrenergic-transmission-adrenergic-drugs/276453870","userLogin":"doc21vignesh","userName":"Dr C Vignesh ","viewCount":148},{"algorithmId":"4","displayTitle":"Storytelling instructions...............","isSavedByCurrentUser":false,"pageCount":10,"score":0,"slideshowId":"276393244","sourceName":"LATEST","strippedTitle":"storytelling-instructions-3e91","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/storytellinginstructions-250307155643-ebcb3ba3-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"for students","tags":[],"url":"https://www.slideshare.net/slideshow/storytelling-instructions-3e91/276393244","userLogin":"Alexanderperez41","userName":"Alexander Benito","viewCount":946},{"algorithmId":"4","displayTitle":"Kaun TALHA quiz Finals -- El Dorado 2025","isSavedByCurrentUser":false,"pageCount":84,"score":0,"slideshowId":"276392212","sourceName":"LATEST","strippedTitle":"kaun-talha-quiz-finals-el-dorado-2025","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/kauntalhafinals-250307152232-61508273-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Finals of Kaun TALHA : a Travel, Architecture, Lifestyle, Heritage and Activism quiz, organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025. ","tags":["quiz","travel","architecture"],"url":"https://www.slideshare.net/slideshow/kaun-talha-quiz-finals-el-dorado-2025/276392212","userLogin":"ConquiztadorsTheQuiz","userName":"Conquiztadors- the Quiz Society of Sri Venkateswara College","viewCount":737},{"algorithmId":"4","displayTitle":"Q-Factor General Quiz-2nd March 2025, Quiz Club NITW","isSavedByCurrentUser":false,"pageCount":149,"score":0,"slideshowId":"276637663","sourceName":"LATEST","strippedTitle":"q-factor-general-quiz-2nd-march-2025-quiz-club-nitw","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/qfactorsgenerals25-250313040711-b1976a85-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The General Quiz conducted by Quiz Club NITW on 2nd of March 2025, as a part of the duology of quizzes for the college fest SpringSpree 2025. The set has both the Prelims and Finals which include various questions on a wide range of topics and quite derivable answers. ","tags":["quiz club nitw","quiz","general quiz"],"url":"https://www.slideshare.net/slideshow/q-factor-general-quiz-2nd-march-2025-quiz-club-nitw/276637663","userLogin":"QuizClubNITW","userName":"Quiz Club NITW","viewCount":65},{"algorithmId":"4","displayTitle":"Mental Health of Neurodivergent Learners","isSavedByCurrentUser":false,"pageCount":55,"score":0,"slideshowId":"276466061","sourceName":"LATEST","strippedTitle":"mental-health-of-neurodivergent-learners","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/mentalhealthofneurodivergentlearners-250309180615-584bcfc4-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"For more information about my speaking and training work, visit: https://www.pookyknightsmith.com/speaking/\n","tags":[],"url":"https://www.slideshare.net/slideshow/mental-health-of-neurodivergent-learners/276466061","userLogin":"pookyh","userName":"Pooky Knightsmith","viewCount":58},{"algorithmId":"4","displayTitle":"20250310 McGuinness Institute Submission on Gene Technology Bill.pptx","isSavedByCurrentUser":false,"pageCount":14,"score":0,"slideshowId":"276477085","sourceName":"LATEST","strippedTitle":"20250310-mcguinness-institute-submission-on-gene-technology-bill-pptx","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/202503101135ammcguinnessinstitutegenetechnologybillslides-250310010735-cb5e113c-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"On March 10 2025 Wendy McGuinness from the McGuinness Institute presented an oral submission to the Health Committee on the proposed Gene Technology Bill.","tags":[],"url":"https://www.slideshare.net/slideshow/20250310-mcguinness-institute-submission-on-gene-technology-bill-pptx/276477085","userLogin":"sustainablefuture","userName":"McGuinness Institute","viewCount":160},{"algorithmId":"4","displayTitle":"8. Essential Skills: Application of Number: Ratio","isSavedByCurrentUser":false,"pageCount":21,"score":0,"slideshowId":"276661887","sourceName":"LATEST","strippedTitle":"8-essential-skills-application-of-number-ratio","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/9-250313160319-77879d83-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"AON: Ratio","tags":[],"url":"https://www.slideshare.net/slideshow/8-essential-skills-application-of-number-ratio/276661887","userLogin":"leigh441292","userName":"leigh441292","viewCount":110},{"algorithmId":"4","displayTitle":"Summary of the 2024 Western CMV Safety Summit","isSavedByCurrentUser":false,"pageCount":18,"score":0,"slideshowId":"276400186","sourceName":"LATEST","strippedTitle":"summary-of-the-2024-western-cmv-safety-summit","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/2025-03-cmv-safety-summit-summary-250307202535-4fba9735-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The 2024 Western CMV Safety Summit focused on projects that utilize technologies designed to promote safe driving behaviors and on projects that demonstrate crash analysis tools capable of identifying high-risk corridors and traffic areas for the purposes of deploying CMV-related crash countermeasures. It included roundtable discussions of priorities and challenges to improve CMV safety, as well as sessions regarding readily available resources, state-specific projects, research and partnerships, coordination efforts, and updates from FMCSA. Key takeaways from attendees included the importance of learning from other states, collaborating to solve challenges, and working to change beliefs in order to change behaviors.","tags":["commercial vehicle safety","driving behaviors","cmv"],"url":"https://www.slideshare.net/slideshow/summary-of-the-2024-western-cmv-safety-summit/276400186","userLogin":"ugpti","userName":"UGPTI","viewCount":142},{"algorithmId":"4","displayTitle":"Health and Fitness Facts and Fads -Example: Weight Loss and Fad Diets -Effe...","isSavedByCurrentUser":false,"pageCount":35,"score":0,"slideshowId":"276498129","sourceName":"LATEST","strippedTitle":"health-and-fitness-facts-and-fads-example-weight-loss-and-fad-diets-effects-of-fitness-fads-in-physical-activity-participation","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/healthco-250310104033-138e6696-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Fads and Diet","tags":[],"url":"https://www.slideshare.net/slideshow/health-and-fitness-facts-and-fads-example-weight-loss-and-fad-diets-effects-of-fitness-fads-in-physical-activity-participation/276498129","userLogin":"alvinlorana1","userName":"alvinlorana1","viewCount":208},{"algorithmId":"4","displayTitle":"Computer Network Unit IV - Lecture Notes - Network Layer","isSavedByCurrentUser":false,"pageCount":51,"score":0,"slideshowId":"276463778","sourceName":"LATEST","strippedTitle":"computer-network-unit-iv-lecture-notes-network-layer","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/thenetworklayerunit4-250309164756-1dda4781-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Title: \nLecture Notes - Unit IV - The Network Layer\nDescription:\nWelcome to the comprehensive guide on Computer Network concepts, tailored for final year B.Sc. Computer Science students affiliated with Alagappa University. This document covers fundamental principles and advanced topics in Computer Network. PDF content is prepared from the text book Computer Network by Andrew S. Tenanbaum\n\nKey Topics Covered:\n\nMain Topic : The Network Layer\nSub-Topic : Network Layer Design Issues (Store and forward packet switching , service provided to the transport layer, implementation of connection less service, implementation of connection oriented service, Comparision of virtual circuit and datagram subnet), Routing algorithms (Shortest path routing, Flooding , Distance Vector routing algorithm, Link state routing algorithm , hierarchical routing algorithm, broadcast routing, multicast routing algorithm)\nOther Link :\n1.Introduction to computer network - https://www.slideshare.net/slideshow/lecture-notes-introduction-to-computer-network/274183454\n\n2. Physical Layer - https://www.slideshare.net/slideshow/lecture-notes-unit-ii-the-physical-layer/274747125\n\n3. Data Link Layer Part 1 : https://www.slideshare.net/slideshow/lecture-notes-unit-iii-the-datalink-layer/275288798\n\nTarget Audience:\n\nFinal year B.Sc. Computer Science students at Alagappa University seeking a solid foundation in Computer Network principles for academic.\n\nAbout the Author:\nDr. S. Murugan is Associate Professor at Alagappa Government Arts College, Karaikudi. With 23 years of teaching experience in the field of Computer Science, Dr. S. Murugan has a passion for simplifying complex concepts in Computer Network\n\nDisclaimer:\nThis document is intended for educational purposes only. The content presented here reflects the author’s understanding in the field of Computer Network","tags":["the network layer","network layer design issues","store and forward packet switc"],"url":"https://www.slideshare.net/slideshow/computer-network-unit-iv-lecture-notes-network-layer/276463778","userLogin":"Murugan146644","userName":"Murugan146644","viewCount":467},{"algorithmId":"4","displayTitle":"Q-Factor Mythology Quiz-1st March 2025, Quiz Club NITW","isSavedByCurrentUser":false,"pageCount":147,"score":0,"slideshowId":"276638569","sourceName":"LATEST","strippedTitle":"q-factor-mythology-quiz-1st-march-2025-quiz-club-nitw","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/q-factormythologyquiz-250313043012-7b705b4e-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"The Mythology Quiz conducted by Quiz Club NITW on 1st of March 2025, as a part of the duology of quizzes for the college fest SpringSpree 2025. The set has both the Prelims and Finals which include various questions on topics related to Mythology ranging from Hindu mythology to Greek and Norse mythology! \n","tags":["quiz club nitw","quizzing","mythology"],"url":"https://www.slideshare.net/slideshow/q-factor-mythology-quiz-1st-march-2025-quiz-club-nitw/276638569","userLogin":"QuizClubNITW","userName":"Quiz Club NITW","viewCount":51},{"algorithmId":"4","displayTitle":"Reordering Rules in Odoo 17 Inventory - Odoo Slides","isSavedByCurrentUser":false,"pageCount":16,"score":0,"slideshowId":"276376261","sourceName":"LATEST","strippedTitle":"reordering-rules-in-odoo-17-inventory-odoo-slides","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/reorderingrulesinodoo17inventory-250307063203-60d5b175-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"In Odoo 17, the Inventory module allows us to set up reordering rules to ensure that our stock levels are maintained, preventing stockouts. Let's explore how this feature works.","tags":["odoo","odoo slides","odoo guides"],"url":"https://www.slideshare.net/slideshow/reordering-rules-in-odoo-17-inventory-odoo-slides/276376261","userLogin":"CelineGeorge1","userName":"Celine George","viewCount":412},{"algorithmId":"4","displayTitle":"How to Manage Putaway Rule in Odoo 17 Inventory","isSavedByCurrentUser":false,"pageCount":20,"score":0,"slideshowId":"276375972","sourceName":"LATEST","strippedTitle":"how-to-manage-putaway-rule-in-odoo-17-inventory","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/howtomanageputawayruleinodoo17inventory-250307062533-1032bd88-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Inventory management is a critical aspect of any business involved in manufacturing or selling products.\nOdoo 17 offers a robust inventory management system that can handle complex operations and optimize warehouse efficiency. ","tags":["odoo","odoo 18","odoo 17"],"url":"https://www.slideshare.net/slideshow/how-to-manage-putaway-rule-in-odoo-17-inventory/276375972","userLogin":"CelineGeorge1","userName":"Celine George","viewCount":412},{"algorithmId":"4","displayTitle":"Integrative Creative Works of Selected Philippines and SEA arts.pptx","isSavedByCurrentUser":false,"pageCount":50,"score":0,"slideshowId":"276412638","sourceName":"LATEST","strippedTitle":"integrative-creative-works-of-selected-philippines-and-sea-arts-pptx","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/integrativecreativeworksofselectedphilippinesandseaarts-250308061747-6192681f-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"Presenatation for Integrative arts in the Philippines and SEA","tags":["matatag","grade 7","music and arts"],"url":"https://www.slideshare.net/slideshow/integrative-creative-works-of-selected-philippines-and-sea-arts-pptx/276412638","userLogin":"BeauDarrylPanizales","userName":"BeauDarrylPanizales","viewCount":248},{"algorithmId":"4","displayTitle":"4. ES: Application of Number: Decimal Numbers","isSavedByCurrentUser":false,"pageCount":22,"score":0,"slideshowId":"276495371","sourceName":"LATEST","strippedTitle":"4-es-application-of-number-decimal-numbers","thumbnail":"https://cdn.slidesharecdn.com/ss_thumbnails/4-250310092050-c2ca2d9e-thumbnail.jpg?width=600\u0026height=600\u0026fit=bounds","description":"AON: Decimals","tags":[],"url":"https://www.slideshare.net/slideshow/4-es-application-of-number-decimal-numbers/276495371","userLogin":"leigh441292","userName":"leigh441292","viewCount":101}]},"slideDimensions":{"height":405,"width":720},"topReadSlides":[],"user":{"id":"1137721","isFollowing":false,"login":"sblank","name":"Stanford University","occupation":"Lecturer","organization":"Stanford University","photo":"https://cdn.slidesharecdn.com/profile-photo-sblank-48x48.jpg?cb=1707173175","photoExists":true,"shortName":"Stanford University"},"views":53594},"_nextI18Next":{"initialI18nStore":{"en":{"common":{"ad":{"fallbackText":"Ad for Scribd subscription","label":"Ad","close":"Close Ad","dismiss_in":"Dismiss in","ad_info_title":"Why are you seeing this?","ad_info_description":"We use ads to keep content free and accessible for everyone. You can remove them by \u003c2\u003esigning up\u003c/2\u003e for a SlideShare subscription."},"error":{"favorite_add":"We couldn't add SlideShare to favorites","favorite_remove":"We couldn't remove SlideShare from favorites","follow":"There was a problem following this user","unfollow":"There was a problem un-following this user","save":"Unable to save this item at this time.","remove_save":"We couldn't remove from your saved items"},"header":{"hamburger_menu_aria_label":"Open navigation menu","logo":{"alt":"SlideShare a Scribd company logo","title":"Return to the homepage"},"home":"Home","explore":"Explore","search":{"placeholder":"Search","aria_label":"Search SlideShare","button":"Submit Search","suggestion_1":"business model canvas example","suggestion_2":"social media strategy outline","suggestion_3":"marketing principles diagram","suggestion_4":"ai in healthcare presentation","suggestion_5":"writing skills checklist","suggestion_6":"21st century literature talk","tooltip":"For better results, use descriptive keywords to find the most relevant presentations. \u003cb\u003eExample:\u003c/b\u003e\u003cem\u003e Instead of 'Artificial Intelligence', try 'AI in healthcare trends'\u003c/em\u003e."},"upload":"Upload","login":"Login","signup":{"label":"Download free for 30 days","title":"Signup now for a SlideShare account"},"user":{"aria_label":"User Settings","clipboards":"My Clipboards","uploads":"My Uploads","analytics":"Analytics","settings":"Account Settings","support":"Support","logout":"Logout"}},"footer":{"link":{"about":"About","support":"Support","terms":"Terms","privacy":"Privacy","copyright":"Copyright","cookie":"Cookie Preferences","privacyRights":"Do not sell or share my personal information","everand":"Everand"},"language_selector":{"aria_label":"Change Language","hidden_text":"Current Language"},"copyright":"SlideShare from Scribd","social":{"rss":{"aria_label":"Slideshare on RSS Feed","title":"RSS"},"twitter":{"aria_label":"Slideshare on Twitter","title":"Twitter"}}},"app_notification_banner":{"notification_text":"We've updated our privacy policy.","notification_link_text_desktop":"Click here to review the details.","notification_link_text_mobile":"Tap here to review the details."},"privacy_policy_explicit_opt_in_modal":{"modal_title":"We've updated our privacy policy.","modal_content_paragraph_one":"We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.","modal_content_paragraph_two":"You can read the details below. By accepting, you agree to the updated privacy policy.","modal_content_paragraph_three":"Thank you!","modal_action_assertive":"Accept and continue","modal_action":"View updated privacy policy","modal_action_error":"We've encountered a problem, please try again."},"actions":{"addToSaved":"Save for later","addToSavedA11y":"Save {{title}} for later","all_saved":"All Saved","back":"Back","close":"Close","cancel":"Cancel","save":"Save","save_slide":"Save slide","saved":"Saved","submit":"Submit","next":"Next","previous":"Previous","removeSaved":"Remove from saved","removeSavedA11y":"Remove {{title}} from saved","scrollLeft":"Scroll Left","scrollRight":"Scroll Right","save_to_new_list_success":"Saved to "},"filter":{"apply":"Apply"},"form":{"required":"Required"},"slideshow_card":{"slideshow_type":{"document":"Document","infographic":"Infographic","presentation":"Presentation","documents":"Documents","infographics":"Infographics","presentations":"Presentations","downloads":"Downloads","likes":"Likes"},"slideshow_type_unit":{"presentation":"Slide","document":"Page","infographic":"Page"},"pages_count_one":"{{count}} page","pages_count_other":"{{count}} pages","slides_count_one":"{{count}} slide","slides_count_other":"{{count}} slides","screen_reader_text":"{{title}} by {{author}}","screen_reader_text_extended":"{{title}} by {{author}}, has {{slideCount}} slides with {{viewCount}} views.","view_one":"view","view_other":"views"},"image_alt":{"studying":"Abstract image of a woman sitting on books and studying on a laptop"},"items":{"count_one":"{{count}} item","count_other":"{{count}} items"},"time":{"second_one":"{{count}} second","second_other":"{{count}} seconds"},"timeSince":{"minutes_ago":"{{count}} min. ago","hours_ago_one":"{{count}} hour ago","hours_ago_other":"{{count}} hours ago","days_ago_one":"{{count}} day ago","days_ago_other":"{{count}} days ago","months_ago_one":"{{count}} month ago","months_ago_other":"{{count}} months ago","years_ago_one":"{{count}} year ago","years_ago_other":"{{count}} years ago"},"see_more":"See more","see_less":"See Less","yes":"Yes","no":"No","signup":"Sign Up","next_label":"Next","previous_label":"Previous"},"player":{"actions":{"all_saved":"All Saved","clip":"Clip Slide","copy_text":"Copy text","copy_text_success":"Text copied to clipboard","copy_text_error":"Failed to copy the text. Please try again!","download_presentation":"Download presentation","download_slide":"Download slide","download_document":"Download document","download_page":"Download page","download_now":"Download now","download":"Download","favorite":"Favorite","remove_favorite":"Remove favorite","remove_like":"Remove like","like":"Like","follow":"Follow","unfollow":"Unfollow","more_options":"More options","share":"Share","saved":"Saved","remove_from_list":"Remove from list {{listname}}","removed_from_list":"Saved item has been removed from the List","removed_from_list_error":"Could not remove the saved item from list","save_error":"Unable to save this item at this time.","save_to_new_list":"New list","save_to_list":"Save to list {{listname}}","scroll_view":"Scroll view","scroll_view_description":"Vertically scroll through all slides","slideshow_view":"Slideshow view","slideshow_view_description":"View one slide at a time","no_saved_lists":"You don't have any lists created yet."},"ads":{"label":"Ad","skip":"Skip to next slide","skip_countdown":"You can skip to the next slide in","continue_in":"Continue in","change_volume":"Change Volume","download_read_ad_free":"Download to read ad-free","scroll":"Scroll to read more"},"ad_block_interstitial":{"title_1":"Keep SlideShare free —","title_2":"please disable your ad blocker.","button_label":"Show me how","message":"Hate ads? Join Scribd to browse SlideShare and Scribd ad-free.","cta":"Try Scribd for free"},"author":{"by":"by","follow":"Follow","following":"Following","keynoteAuthor":"Keynote Author"},"download":{"success":"Your SlideShare is downloading."},"editors_notes":"Editor's Notes","end_of_reading":{"loading":"Loading in","title":"Check these out next","next_slideshares":"Next SlideShares","upcoming_slideshare":"Upcoming SlideShare"},"first_clip":{"title":"You just clipped your first slide!","description":"Clipping is a handy way to collect important slides you want to go back to later. Now customize the name of a clipboard to store your clips."},"metadata":{"at":"at","aiTag":{"descriptionLabel":"AI-enhanced description","descriptionTooltipTitle":"AI-Enhanced Description","descriptionTooltip":"Leveraging AI technology, we've optimized the description for improved clarity.","titleLabel":"AI-enhanced title","titleTooltipTitle":"AI-Enhanced Title","titleTooltip":"Leveraging AI technology, we've optimized the title for improved clarity.","titleAndDescriptionLabel":"AI-enhanced title and description","titleAndDescriptionTooltipTitle":"AI-Enhanced Title and Description","titleAndDescriptionTooltip":"Leveraging AI technology, we've optimized the title and description for improved clarity."},"download":{"bottomSheetTitle":"Download format","label_short":"Download","label":"Download now","description":"Download to read offline","download_count":"Downloaded {{count}} times"},"download_as":"Download as {{formatTypes}}","readMore":"Read more","readLess":"Read less","more":"more","category":{"label":"Category","description":"View the featured presentations, documents and infographics in the"},"dateFormat":"MMM. D, YYYY","most_read":"Most read","pages":"Pages","page":"Page"},"navigation":{"next_slide":"Next Slide","previous_slide":"Previous Slide","slide_count_of_total_count":"\u003cspan data-cy='current-slide-number' class='current-slide-number j-current-slide'\u003e{{slideCount}}\u003c/span\u003e of \u003cspan class='total-slides j-total-slides'\u003e{{totalCount}}\u003c/span\u003e","view_fullscreen":"View Fullscreen","zoom_in":"Zoom In","zoom_out":"Zoom Out"},"new_clipboard_modal":{"title":"Create a clipboard","name":{"label":"Name","placeholder":"Best of Slides","error":"Name cannot be blank"},"description":{"label":"Description","placeholder":"Add a brief description so other know what your clipboard is about."},"visibility":{"label":"Visibility","description":"Others can see my Clipboard"}},"select_clipboard_modal":{"title":"Select a clipboard","message":"Looks like you've already clipped this slide","button":"Create a clipboard"},"share":"Share SlideShare","rec":{"related":"Related slideshows","recommended_for_you":"Recommended for you","descTooltipTitle":"About the slideshow","recommended":{"title":"Recommended","shortTitle":"Recommended"},"relatedContent":{"title":"More Related Content","shortTitle":"More Related Content"},"featured":{"title":"Featured","shortTitle":"Featured"},"forYou":{"title":"Slideshows for you","shortTitle":"Slideshows for you"},"alsoLiked":{"title":"Viewers also liked","shortTitle":"Viewers also liked"},"latest":{"title":"Recently uploaded","shortTitle":"Recently uploaded"},"moreFromUser":{"title":"More from {{name}}","shortTitle":"More from uploader"},"similarTo":{"title":"Similar to {{title}}","shortTitle":"Similar to"},"whatsHot":{"title":"What's hot","shortTitle":"What's hot"}},"scribd":{"books":{"label":"Ebook","title":"Related Books"},"audioBooks":{"label":"Audiobook","title":"Related Audiobooks"},"error":{"title":"Oops! Something went wrong.","description":"We're sorry, but we can't find any related content at this time.","button":"Try again"},"freeWithTrial":"Free with a 30 day trial from {{brand}}","viewAll":"View All"},"error":{"clipboard":"We couldn't create your clipboard","save":"We couldn't save this item","unsave":"We couldn't remove from your saved items","blocked":"This user has blocked you","private_content":"Private content!","privacy_explanation":"This content has been marked as private by the uploader.","enter_password":"Enter password","file_protected":"This file is password protected.","password_incorrect":"The password is incorrect.","private_presentation":"Private Presentation","private_content_message":"This uploaded file has been marked private by the author. Sorry!","removed_content_title":"Uploaded Content Removed","removed_content_message":"The uploaded content has been removed and is no longer available.","redirect_message":"Redirecting to the homepage in","something_went_wrong_title":"Sorry! The page could not be loaded.","something_went_wrong_message":"This is probably a temporary error. Just refresh the page and retry. If the problem continues, please check back in 5-10 minutes.","not_found_title":"Sorry! We could not find what you were looking for.","not_found_message":"Don't worry, we will help you get to the right place. Are you looking for:"},"save_to_new_list_modal":{"title":"Add to a new list","list_name_input_label":"What would you like to name this list?","list_privacy_label":"Make list private","cancel_button_label":"Cancel","save_list_button_label":"Save","success":"Saved to ","error":"We couldn't save this item to {{listname}}"},"confirm_remove_save_modal":{"title":"This saved item is also in a list.","description":"Removing from saved will also delete the item from your lists","cancel_button_label":"Cancel","delete_button_label":"Delete"},"seo_metadata_test":{"description_suffix":"Download as a PDF or view online for free"}},"metadata":{"gallery_view":"Gallery","gallery_view_label":"Gallery View","like_one":"like","like_other":"likes","likeWithCount_one":"{{count}} like","likeWithCount_other":"{{count}} likes","view_one":"view","view_other":"views","saved_one":"saved","saved_other":"saved","from_embeds":"From embeds","number_of_embeds":"Number of embeds","on_slideshare":"On Slideshare","total_views":"Total views","split_char":",","decimal_point":".","show_more":"Show More","likes":{"empty_message":"Be the first to like this","loading_message":"Loading..."},"slide_one":"slide","slide_other":"slides","slide_count_of_total":"of","study_guide":{"cta":"Convert to study guide","beta_label":"BETA","description":"Transform any presentation into a summarized study guide, highlighting the most important points and key insights.","button_cta":"Convert","label":"Study guide","modal_title":"Coming soon!","modal_description":"We're working on bringing automatic study guide generation to presentations. Help us shape this feature by sharing your feedback.","modal_question":"How often would you convert presentations into study guides if this feature was available?","modal_complete":"We appreciate you taking the time to share your thoughts. Your input will help us build a feature that better meets your needs. Stay tuned as we work to bring this to life!","modal_options":{"option_1":"Frequently (4+ times per month)","option_2":"Occasionally (1-3 times per month)","option_3":"Rarely (few times per year)","option_4":"Not interested"}},"study_materials":{"cta":"Convert to study materials","label":"Convert","description":"Transform any presentation into ready-made study material—select from outputs like summaries, definitions, and practice questions.","modal_description":"We're working on introducing automatic content conversion to help transform presentations into customized study materials. Help us shape this feature by sharing your feedback.","modal_question":"What output would be most helpful for your conversion use case?","modal_options":{"option_1":"Summaries of main concepts","option_2":"Key definitions or terms","option_3":"Real-world examples","option_4":"Practice questions or exercises"}}},"report":{"more":"More options","share":"Share","report":"Report","edit":"Edit","viewAnalytics":"View Analytics","flag_as_inappropriate":"Report as inappropriate","error":"There was an error while reporting this slideshow. Please try again.","flag":"Flag","copyright_complaint":"Copyright Complaint","select_a_reason":"Select a reason","select_your_reason":"Select your reason for reporting this presentation as inappropriate.","none":"None","porn":"Pornographic","defamatory":"Defamatory","ultraviolence":"Extremely Violent or Promotes Terrorism","hate_speech":"Hate Speech","offensive":"Offensive Language or Threatening","spam":"Spam or Scam","form":{"title":"Report content","description":"If you are the copyright owner of this document and want to report it, please visit the \u003cCustomLink href='example.com'\u003ecopyright infringement notice page\u003c/CustomLink\u003e to submit a report.","error_category":"Select a category to submit your report","error_subtype":"Select a sub-category to submit your report","default_subtype":"Select an option...","category":{"illegal":{"label":"Illegal","description":"Content that breaks the law or promotes illegal activities.","subtypes":{"child_exploitation":"Minor Exploitation","child_sexual_abuse_material":"Child Sexual Abuse","dangerous_products_or_services":"Dangerous Products/Services","non_violent_crime":"Non-Violent Offenses","sex_related_crime":"Sexual Offenses","violent_crime":"Violent Offenses","terrorism":"Terrorism","general":"Other"}},"explicit":{"label":"Explicit","description":"Content that is graphic, offensive, or disturbing.","subtypes":{"sexually_explicit_content":"Sexually Explicit","shocking_content":"Shocking or Disturbing","general":"Other"}},"dangerous_and_deragatory":{"label":"Dangerous \u0026 Derogatory","description":"Content that encourages harmful, threatening, or hateful behavior.","subtypes":{"menacing":"Threatening Behavior","incitement":"Inciting Violence or Hatred","self_harm":"Self-harm","general":"Other"}},"deceptive_and_fraudulent":{"label":"Deceptive \u0026 Fraudulent","description":"Content that intentionally misleads, deceives, or engages in fraudulent activities.","subtypes":{"academic_integrity":"Academic Dishonesty","misinformation":"Spreading False Information","general":"Other"}},"guideline_ignoring":{"label":"Intellectual Property","description":"Content that uses someone else's protected work without permission.","subtypes":{"ip_infringement_copyright":"IP infringement (copyright)","ip_infringement_non_copyright":"IP infringement (non-copyright)","general":"Other"}},"privacy":{"label":"Privacy","description":"Content that misuses personal information.","subtypes":{"privacy_general":"General Privacy","privacy_child":"Child Privacy"}},"spam":{"label":"Spam","description":"Unsolicited and repetitive content that disrupts your experience."},"low_quality":{"label":"Low Quality","description":"Content that fails to meet minimum standards for clarity, relevance, or completeness."}}}},"share_modal":{"close":"Close","embed_title":"Embed","embed_size":"Size (px)","link":"Link","start":"Start on","title":"Share this SlideShare","share_facebook":"Share on Facebook","share_linkedin":"Share on Linkedin","share_twitter":"Tweet on Twitter"},"next_slideshow":{}}},"initialLocale":"en","ns":["common","player","metadata","report","share_modal","next_slideshow"],"userConfig":null},"_sentryTraceData":"a3179e0ca0c34e37b164fbb6f77ab836-e06b79f264c3d14f-1","_sentryBaggage":"sentry-environment=production,sentry-public_key=7e7cafa2920448ed81ac67de08abbeed,sentry-trace_id=a3179e0ca0c34e37b164fbb6f77ab836,sentry-sample_rate=1,sentry-transaction=%2Fslideshow%2F%5Btitle%5D%2F%5Bid%5D,sentry-sampled=true"},"__N_SSP":true},"page":"/slideshow/[title]/[id]","query":{"title":"mongoose-h4d-2021-lessons-learned-248856080","id":"248856080"},"buildId":"b5e752549b9bd9a6933b5e828d6464a4c991c335","assetPrefix":"https://public.slidesharecdn.com","runtimeConfig":{"assetPrefix":"https://public.slidesharecdn.com"},"isFallback":false,"isExperimentalCompile":false,"gssp":true,"locale":"en","locales":["en","de","es","pt","fr"],"defaultLocale":"en","domainLocales":[{"domain":"www.slideshare.net","defaultLocale":"en"},{"domain":"de.slideshare.net","defaultLocale":"de"},{"domain":"es.slideshare.net","defaultLocale":"es"},{"domain":"pt.slideshare.net","defaultLocale":"pt"},{"domain":"fr.slideshare.net","defaultLocale":"fr"}],"scriptLoader":[]}</script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10