SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
World®
’16
Securing	Mobile	Payments:	Applying	
Lessons	Learned	in	the	Real	World
James	Rendell	- VP	Payment	Security	Strategy	– CA	Technologies
SCX34S
SECURITY
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
For	Informational	Purposes	Only	
Terms	of	this	Presentation
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.	The	presentation	provided at	CA	
World	2016	is	intended	for	information	purposes	only	and	does	not	form	any	type	of	warranty.	Some	of	the	specific	slides	with customer	
references	relate	to	customer's	specific	use	and	experience	of	CA	products	and	solutions	so	actual	results	may	vary.	
Certain	information	in	this	presentation	may	outline	CA’s	general	product	direction.	This	presentation	shall	not	serve	to	(i)	affect	the	rights	
and/or	obligations	of	CA	or	its	licensees	under	any	existing	or	future	license	agreement	or	services	agreement	relating	to	any	CA	software	
product;	or	(ii)	amend	any	product	documentation	or	specifications	for	any	CA	software	product.	This	presentation	is	based	on current	
information	and	resource	allocations	as	of	November	1,	2016,	and	is	subject	to	change	or	withdrawal	by	CA	at	any	time	without notice.	The	
development,	release	and	timing	of	any	features	or	functionality	described	in	this	presentation	remain	at	CA’s	sole	discretion.	
Notwithstanding	anything	in	this	presentation	to	the	contrary,	upon	the	general	availability	of	any	future	CA	product	release referenced	in	
this	presentation,	CA	may	make	such	release	available	to	new	licensees	in	the	form	of	a	regularly	scheduled	major	product	release.	Such	
release	may	be	made	available	to	licensees	of	the	product	who	are	active	subscribers	to	CA	maintenance	and	support,	on	a	when and	if-
available	basis.	The	information	in	this	presentation	is	not	deemed	to	be	incorporated	into	any	contract.
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	
of	warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
Mobile	is	the	new	black—the	way	people	work,	shop	and	connect.	Taking	a	cue	from	the	
payment	point	of	view,	this	session	will	present	best	practices	for	securing	mobile	payments	and	
how	these	practices	are	relevant	across	the	enterprise.
James	
Rendell
CA	Technologies
VP	Payment	Security	
Strategy
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
INTRODUCTION:	SECURING	MOBILE	PAYMENTS
MOBILE	AUTHENTICATION
SUMMARY
RISK	ANALYTICS	REAL-TIME	NETWORK
NFC	MOBILE	WALLET	PROVISIONING
SECURING	MOBILE	IN-APP	PURCHASES
1
2
3
4
5
6
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Strategy	for	Secure	Mobile	Payments
Secure	
Mobile	
Payment
Mobile	
Authentication
In-App	purchase
Mobile	wallet
Real-Time	Risk
Mobile	Push	Notification
• Multi-factor	authentication
• Push	Notification	and	disconnected	OTP	options
• Complies	with	emerging	mandates,	e.g.	PSD2	
MasterCard	Identity	Check
• Biometric	authentication	options
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Mobile	Authentication:	Mobile	Push	Notification
§ Mobile	device	as	virtual	identity
§ Out-of-Band	Authentication
§ Transaction	inflight	Push	Notification	on	mobile	
§ Fingerprint	Authentication	on	Apple	devices
– Roadmap	will	incorporate	Android	etc.	devices	with	
similar	capabilities
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Deployment	Options:	Mobile	OTP*
§ Passcode	Generation	on	Mobile	Device
§ Offline	OTP	generation
§ Supports	multiple	cards	on	single	App
§ Available	in	both	OAuth	and	EMV	modes
*Planned	Service	Availability	for	Payment	Security	during	2017
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Feature	Highlights
§ Out-Of-Band	Authentication	for	3-D	Secure	2.0
§ Easy-to-use	Over-the-Air	provisioning	for	cardholders
§ Based	on	Industry	standard	EMV	Algorithm	(CAP	Certified	and	DPA	Compliant)
§ Credentials	are	software	locked	to	the	provisioned	device
§ Strong	protection	against	SIM-Swap
§ Cryptographic	Camouflage	technology	prevents	brute	force	attack
§ Fine-Grained	Authentication	Controls	using	CA	Risk	Analytics
§ Suitable	for	Enterprise	and	Consumer	digital	channels
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Multiple	Provisioning	Options
§ During	3-D	Secure	Transaction	Flow
§ Via	Online	Banking	Channel
– Online	Banking	provides	an	option	to	enroll	in	Mobile	Authentication	
by	integrating	with	our	exposed	Web	Service
§ Via	Issuer	Mobile	App
– Using	an	“Add	Account”	option	from	within	the	Issuer	Mobile	App
§ Via	APIs	for	enterprise	system	integration
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Business	
function
Channels
Online	
servicing
CA-Strong	
Authentication
Payments
(3-D	Secure)
Enterprise	
application
Risk	
evaluation	
and	scoring
• Rules
• Machine	
learning
• Statistical
• Behavioral
3-D	
Secure
Biometric
Device	
ID
Case	
Management	
/	Reporting
Wearables
MFA
Mobile	
browser
Notification
CNP Traditional	
browser
In-store	
tablet
Telephone	
/	IVR
OmniChannel	Enabler:	Enterprise	and	Consumer
Apple	Pay Android	Pay
Google	Wallet
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Strategy	for	Secure	Mobile	Payments
Secure	
Mobile	
Payment
Mobile	
Authentication
In-App	purchase
Mobile	wallet
Real-Time	Risk
Risk	Analytics	Real-Time	Network
• Device	Identity	is	a	key	fraud	
indicator
• Leverage	global	device	identity	/	
reputation
• Real-Time	model	updates
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Risk	Analytics	Real-Time	Network
1. Predictive	model	learns	bank-specific	cardholder	
behavior	and	fraud	patterns.
2. Devices	may	be	used	across	banks,	hence	
complementary	Device	Distillates	are	
incorporated	in	the	Risk	Analytics	Network	
model.
3. Device	Distillates	updated	in	real-time	as	
transactions	are	processed.
4. Score	will	be	higher	when	devices	previously	
associated	with	probable	fraud	are	used.
Bank	1 Bank	2 Bank	3
Real-time	update
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Risk	Analytics	Real-Time	Network	Explained
Fraud	Not	Detected	by	Current	Risk	Analytics	Model
Time
Card	Pivot	
CARD1
BSYKB,	
12.5	GBP
DEVICE1
20130411:14:48:03
20130502:12:01:45
20130527:19:09:36
5
3
8
8
51
0
20130508:10:03:12
40
5
GOAL
8.0	GBP
DEVICE2
RA	Model	Score
HUNGRYHOUSE
20.7	GBP
DEVICE1
TRADE	MEDIA
47.38	GBP
DEVICE3
Non	Fraud
Fraud
• There	are	4	transactions	on	
CARD1,	two	legit	and	two	
fraud
• Current	Risk	Analytics	Model	
scoring	not	high	enough	to	
detect	two	fraudulent	
transactions
• Lacking	visibility	into	
historical	transactions	across	
a	given	device
Date/Time	of	
Transaction
Merchant	
Name
Transaction	
Value
Device	ID
Risk	scores	not	high	enough	
(<600)	to	be	deemed	fraud.
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Risk	Analytics	Real-Time	Network	Explained
Improved	Fraud	Detection	by	Risk	Analytics	Network	Model
Non	Fraud
Fraud
Time
Card	Pivot
CARD1
BSYKB,	
12.5	GBP
DEVICE1
20130411:14:48:03
20130502:12:01:45
20130527:19:09:36
20130508:10:03:12
GOAL
8.0	GBP
DEVICE2
HUNGRYHOUSE
20.7	GBP
DEVICE1
TRADE	MEDIA
47.38	GBP
DEVICE3
6
2
11
4
RA	Network	Model	
Score
99
2
Device	Pivot
DEVICE2
20130508:09:49:36
GOAL
8.0	GBP
CARD3
610
20130508:09:48:16
GOAL
8.0	GBP
CARD2
237
20130508:09:56:39
GOAL
8.0	GBP
CARD4
997
20130508:10:37:43
GOAL
8.0	GBP
CARD5
976
20130508:10:49:01
GOAL
8.0	GBP
CARD6
994
96
0
Device	Pivot
DEVICE3
TRADE	MEDIA
47.38	GBP
CARD5
20130527:15:57:24
142
TRADE	MEDIA
47.38	GBP
CARD7
20130527:16:46:40
801
TRADE	MEDIA
47.38	GBP
CARD8
20130527:19:06:05
942
TRADE	MEDIA
47.38	GBP
CARD4
20130527:19:24:13
978
• New	device	pivots	(i.e.	DEVICE2	and	DEVICE3)	are	
included	in	Risk	Analytics	Network	model.
• Allows	us	to	also	consider	the	historical	transactions	by	
device	in	evaluation	scoring.
• Result	is	that	the	new	model	scores	high	on	the	two	
fraudulent	transactions	on	CARD1;	stopping	the	fraud.
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Strategy	for	Secure	Mobile	Payments
Secure	
Mobile	
Payment
Mobile	
Authentication
In-App	purchase
Mobile	wallet
Real-Time	Risk
NFC	Mobile	Wallet	Provisioning
• Cardholder	authentication	when	provisioning	
card	data	to	mobile	device
• Accelerate	time-to-market	for	issuers	wanting	to	
embrace	“*Pay”	programs.
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	Is	Mobile	Payment	Enablement
Adding	a	customer’s	
payment	method	to	
a	mobile	platform	
or	wallet
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Wallets	Are	Not	New…	They	Are	Not	Mature	Either
Financial	
Services
PayPal
Venmo
Chase
CurrentC
Square
Retail	
Merchants
Starbucks
Amazon
Walmart
Wholefoods
Traditional	
Payments
MasterCard
Visa
Amex
VeriFone
Device	
Makers
Google
Apple
Samsung
Existing	Wallet	Market…	Everyone	Wants	to	Capture	the	Loyalty
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Mobile	Wallets:	Apple	Pay	Provisioning	Security
§ Early	NFC	Mobile	wallet	deployments	had	provisioning	weaknesses
§ Stolen	card	data	could	be	provisioned	to	NFC	Mobile	devices
– Coupled	with	contactless	Point	of	Sale,	effectively	cloning	EMV	cards!!
§ CA	developed	an	incubator	offering	to	do	OTP	cardholder	authentication	during	
NFC	Mobile	Wallet	provisioning,	increasing	the	assurance	that	card	data	is	being	
provisioned	to	the	cardholder’s	phone	and	not	a	fraudster’s
§ Accelerated	Time-to-Market	for	“*Pay”	NFC	Mobile	implementations
Onboarding Provisioning Transaction Support
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Provisioning	Flow
Enroll Eligible?
Authenticate OTP
Activation
Wallet
provider Card	Scheme
CA	on
Issuer’s	behalf
Return	
Activation
data
OTP	Delivery
OTP	Validation	/	authentication
Token
Confirmation
American	
Express
Apple	Pay
Android	Pay
Google	Wallet
Samsung	Pay
Android	Pay
MasterCard
Visa
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Strategy	for	Secure	Mobile	Payments
Secure	
Mobile	
Payment
Mobile	
Authentication
In-App	purchase
Mobile	wallet
Real-Time	Risk
In-app	purchase
• 3-D	Secure	2.0	native	support	for	
in-app	purchase
• Rich	data	evaluation,	fraud	risk	
scoring,	and	mobile	authentication	
challenge.
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Evolution	of	3-D	Secure
Building	Trust
Goals
Actions
Results
Build	confidence	
in	e-commerce
Reduce	fraud	
displaced	by	EMV	
implementation
Improve	customer	
Experience.	Reduce	
abandonments.
Better	authorization	
rates.	Access	to	more	
channels.	
Liability	shift	for	
participating	
merchants
Simplify	enrolment	to	
drive	adoption.	
Strengthen	
authentication	
options
First	steps	in	
application	of	
analytics	and	
predictive	
modelling
3-D	Secure	2.0.	
Sophisticated	Data	
Science.
Authorization	
Integration.
Fragmentation	
and	scheme-by-
scheme	service	
introduction
Adoption	rates	
increase	
worldwide
More	effective	
fraud	reduction
Increase	
authorization	rates	
and	lending.	Access	
to	more	
transactions.	
Reduce	Fraud.	
Optimized	user	
experience.
Fighting	Fraud
Minimizing
Friction
“Smart	
Authorization”
2001
2006
2010
2016
2018
Insight	and	
Personalization
Reach	new	markets	and	
customer	segments	by	
leveraging	rich	data.
Analytics.	Data	
Feeds	to	marketing,	
personalization,	
and	CRM	systems.
Grow	customer	
base.	Develop	high	
value	partnerships	
and	relationships.	
Reinforce	brand	
strength.
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Problems	With	3-D	Secure	1.0.2
§ 3-D	Secure	1.0.2	was	designed	for	the	PC-based	online	shopping	world
§ User	experience	on	mobile	browsers	is	often	poor
§ Merchants	wary	of	invoking	3-D	Secure	with	mobile	transactions
§ No	support	for	in-app	purchase
Material	derived	by	reference	to	public	domain	information.	See:
https://www.emvco.com/about_emvco.aspx?id=306
http://www.emvco.com/faq.aspx?id=305
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
3-D	Secure	2.0
§ Developed	and	owned	by	EMVCo
– Manages	and	controls	the	EMV	standards
§ Designed	for	in-app	purchase
– Native	app	and	HTML	UI	support
– Flexible	authentication	options
§ Browser	specification	replacement	for	1.0.2
§ Designed	to	optimize	user	experience
– By	passing	detailed	data	from	the	mobile	device	only	a	small	percentage	of	transactions	
would	need	to	be	challenged
– =>	The	leaders	in	this	new	world	will	be	those	who	can	leverage	world-class	Data	Science
Material	derived	by	reference	to	public	domain	information.	See:
https://www.emvco.com/about_emvco.aspx?id=306
http://www.emvco.com/faq.aspx?id=305
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What’s	New	in	3-D	Secure	2.0?
§ Rich	data
§ Early	risk	evaluation
§ Frictionless,	Challenge,	and	Out	of	Band	Authentication	Flows
§ In-app	purchase	integration
§ New	browser	specification
§ ID&V	Flows
Material	derived	by	reference	to	public	domain	information.	See:
https://www.emvco.com/about_emvco.aspx?id=306
http://www.emvco.com/faq.aspx?id=305
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Early	Rich	Data
§ Enhanced	data	passed	up-front	in	the	equivalent	of	the	VEReq	message
– Device	ID	/	fingerprint
– Merchant	Category	Code
– Purchase	amount,	currency
– Optional	cardholder	billing	/	delivery	details
§ Enhanced	fraud	detection
§ Optimize	user	experience
– Majority	of	transactions	will	never	be	challenged
Material	derived	by	reference	to	public	domain	information.	See:
https://www.emvco.com/about_emvco.aspx?id=306
http://www.emvco.com/faq.aspx?id=305
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Tying	It	All	Together
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Summary:	CA	Strategy	for	Securing	Mobile	Payments
••Native	mobile	
user	experience
••Rich	data	
evaluation
••Provisioning	
security
••Cardholder	
authentication
••Mobile	Strong	
Authentication
••Omni	Channel	
enablement
••Neural	
Networks
••Device	Identity
Transaction	
Risk
Authentication
Mobile	appsMobile	Wallets
Neural	
Networks
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Don’t	Miss	Our	INTERACTIVE
Security	Demo	Experience!
SNEAK
PEEK!
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Security
For	more	information	on	Security,	please	visit:	
http://cainc.to/EtfYyw

Mais conteúdo relacionado

Mais procurados

Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®CA Technologies
 
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...CA Technologies
 
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5CA Technologies
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentCA Technologies
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionCA Technologies
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...CA Technologies
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelCA Technologies
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadCA Technologies
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Technologies
 
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...CA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
 
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...CA Technologies
 
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Technologies
 
Introduction to Service Virtualization
Introduction to Service VirtualizationIntroduction to Service Virtualization
Introduction to Service VirtualizationCA Technologies
 
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?CA Technologies
 
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...CA Technologies
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyCA Technologies
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...CA Technologies
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital AgeCA Technologies
 
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyTech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyCA Technologies
 

Mais procurados (20)

Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®
 
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
 
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
 
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
 
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
 
Introduction to Service Virtualization
Introduction to Service VirtualizationIntroduction to Service Virtualization
Introduction to Service Virtualization
 
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
 
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyTech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
 

Destaque

Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
 
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadTech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadCA Technologies
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationCA Technologies
 
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentBest Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentCA Technologies
 
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part IApplication Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part ICA Technologies
 
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part IModernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part ICA Technologies
 
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemTools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemCA Technologies
 
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part IAdvanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part ICA Technologies
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSCA Technologies
 
CA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA Technologies
 
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)CA Technologies
 
Advanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part IIAdvanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part IICA Technologies
 
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IIModernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IICA Technologies
 
Application Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part IIApplication Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part IICA Technologies
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA DatacomCA Technologies
 
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...CA Technologies
 
CA IDMS Performance and Tuning
CA IDMS Performance and TuningCA IDMS Performance and Tuning
CA IDMS Performance and TuningCA Technologies
 
system requirements for android projects
system requirements for android projectssystem requirements for android projects
system requirements for android projectsparry prabhu
 
CA IDMS Database Navigation
CA IDMS Database NavigationCA IDMS Database Navigation
CA IDMS Database NavigationCA Technologies
 

Destaque (20)

Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadTech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced Authentication
 
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentBest Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
 
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part IApplication Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part I
 
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part IModernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part I
 
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemTools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
 
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part IAdvanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part I
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
CA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
 
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)
 
Advanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part IIAdvanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part II
 
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IIModernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
 
CA IDMS Buffer Tuning
CA IDMS Buffer TuningCA IDMS Buffer Tuning
CA IDMS Buffer Tuning
 
Application Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part IIApplication Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part II
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA Datacom
 
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
 
CA IDMS Performance and Tuning
CA IDMS Performance and TuningCA IDMS Performance and Tuning
CA IDMS Performance and Tuning
 
system requirements for android projects
system requirements for android projectssystem requirements for android projects
system requirements for android projects
 
CA IDMS Database Navigation
CA IDMS Database NavigationCA IDMS Database Navigation
CA IDMS Database Navigation
 

Semelhante a Securing Mobile Payments: Applying Lessons Learned in the Real World

Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...CA Technologies
 
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...CA Technologies
 
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?CA Technologies
 
Pre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep DivePre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep DiveCA Technologies
 
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service VirtualizationPre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service VirtualizationCA Technologies
 
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...CA Technologies
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesCA Technologies
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...CA Technologies
 
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure VisibilityFrom Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure VisibilityCA Technologies
 
CA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best PracticesCA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best PracticesCA Technologies
 
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?CA Technologies
 
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your OrganizationPre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your OrganizationCA Technologies
 
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...CA Technologies
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...CA Technologies
 
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...CA Technologies
 
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New FeaturesPre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New FeaturesCA Technologies
 
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create ReportsPre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create ReportsCA Technologies
 
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's AheadPre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's AheadCA Technologies
 
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery PortfolioVision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery PortfolioCA Technologies
 
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek CA Technologies
 

Semelhante a Securing Mobile Payments: Applying Lessons Learned in the Real World (20)

Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
 
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?
 
Pre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep DivePre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep Dive
 
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service VirtualizationPre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
 
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
 
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure VisibilityFrom Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
 
CA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best PracticesCA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best Practices
 
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
 
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your OrganizationPre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
 
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
 
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
 
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New FeaturesPre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
 
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create ReportsPre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
 
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's AheadPre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
 
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery PortfolioVision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
 
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
 

Mais de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Mais de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Último

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Último (20)

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Securing Mobile Payments: Applying Lessons Learned in the Real World