(Go: >> BACK << -|- >> HOME <<)

SlideShare a Scribd company logo
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Security	and	GDPR	
	
Mark	Swarbrick	MySQL	Principal	Sales	Consultant	
Mark.swarbrick@oracle.com
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Safe	Harbor	Statement	
The	following	is	intended	to	outline	our	general	product	direction.	It	is	intended	for	
information	purposes	only,	and	may	not	be	incorporated	into	any	contract.	It	is	not	a	
commitment	to	deliver	any	material,	code,	or	functionality,	and	should	not	be	relied	upon	
in	making	purchasing	decisions.	The	development,	release,	and	timing	of	any	features	or	
functionality	described	for	Oracle’s	products	remains	at	the	sole	discretion	of	Oracle.	
2
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Introduction	
•  The	E.U.	General	Data	Protection	Regulation	(GDPR)	comes	into	effect	in	
May	2018	
•  GDPR	is	a	European	Union	“EU”-wide	framework		
– Protection	of	personal	data	of	EU-based	individuals	
– Restrictions	to	movement	of	that	data	
•  Published	May	2016,	Enforceable	by	May	2018	
•  Fines	for	GDPR	violations	are		
– The	greater	of	20,000,000	Euros	or	4%	of	annual	revenue	(R150,	A83)	
Confidential	–	Oracle	Internal	 4
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
GDPR:	Who	and	What	
•  Who	does	the	GDPR	affect?	
– The	GDPR	not	only	applies	to	organisations	located	within	the	EU	but	it	will	also	apply	
to	organisations	located	outside	of	the	EU	if	they	offer	goods	or	services	to,	or	
monitor	the	behaviour	of,	EU	data	subjects.	It	applies	to	all	companies	processing	and	
holding	the	personal	data	of	data	subjects	residing	in	the	European	Union,	regardless	
of	the	company’s	location.	
•  What	constitutes	personal	data?	
– Any	information	related	to	a	natural	person	or	‘Data	Subject’,	that	can	be	used	to	
directly	or	indirectly	identify	the	person.	It	can	be	anything	from	a	name,	a	photo,	an	
email	address,	bank	details,	posts	on	social	networking	websites,	medical	
information,	or	a	computer	IP	address.	
5	
http://www.eugdpr.org/gdpr-faqs.html
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Appropriate	Security	Controls	
•  Data	must	be	processed	with	controls	that	provide																											
“appropriate	security	and	confidentiality	“		
– Recitals	of	note	-	R74-78,	R81,	R83,	R87,	R90,	A5,	A24-25,	A28,	A32,	A35)	
•  Exact	security	controls	are	not	specified	in	the	GDPR	
– WHAT	to	do		
– Not	HOW	to	do	it	
Confidential	–	Oracle	Internal	 6
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
EU	General	Data	Protection	Regulation	(GDPR)	
•  Data	privacy	as	a	fundamental	right	
•  Defines	Data	protection	responsibilities,	baselines,	principles	
•  Provides	Enforcement	Powers	
Focus	is	on	3	Areas	
•  Assessment	–	Processes,	Profiles,	Data	Sensitivity,	Ricks	
•  Prevention	–	Encryption,	Anonymization,	Access	Controls,	Separation	of	Duties	
•  Detection	–	Auditing,	Activity	monitoring,	Alerting,	Reporting	
7
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Complexity	grows	
Risk	Grows	
8
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
GDPR	and	MySQL	
•  We	can’t	be	entirely	prescriptive	
•  We	have	many	things	that	can	be	applied	towards	attaining	compliance	
– Products	
– Features	
– Best	Practices	
– Documents	
– Integrations	
9
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
10	
Enterprise	
Security	Architecture	 ¡ Workbench
• Model
• Data
• Audit Data
• User Management
¡ ¡ Enterprise Monitor
• Identifies Vulnerabilities
• Security hardening policies
• Monitoring & Alerting
• User Monitoring
• Password Monitoring
• Schema Change Monitoring
• Backup Monitoring
¡ Data Encryption
• TDE
• Encryption
• PKI
¡ Firewall
¡ Key Vault
¡ Enterprise Authentication
• SSO - LDAP, AD, PAM
¡ Network Encryption
¡ Enterprise Audit
• Powerful Rules Engine
¡ Audit Vault
¡ Strong Authentication
¡ Access Controls
¡ Assess
¡ Prevent
¡ Detect
¡ Recover
¡ Enterprise Backup
• Encrypted
¡ HA
• Innodb Cluster
¡ Thread Pool
• Attack minimization
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Assess	Security	Risks	
11	
Discover	
Personal	
Data	
Scan	
Security	
Configuration	
Privilege	
Analysis
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Assess	-	MySQL	Enterprise	Features	and	GDPR	
•  Assess	Risks	(Articles	35,	90,	91)	
– MySQL	Enterprise	Monitor	
•  Account	assessment	and	reporting	
•  Identifies	Security	Vulnerabilities	–	discover	security	holes,	advises	remediating	actions	
– Advisors	provide	rules	designed	to	enforce	security	best	practices	and	alert	upon	discovering	vulnerabilities	
– MySQL	Workbench	EE	
•  Discover	tables	and	columns	containing	“Personal	Data”	
•  Data	Modeling	tool	-	Reverse	Engineering	of	Data	Model	to	review	data	stored	in	the	database	
•  Schema	Inspector,	Table	Inspectors	–	for	schema	assessment,	grant	inspection	
– MySQL	Security	Best	Practices	Guidelines	
	
12
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Monitor	
•  Enforce	MySQL	Security	Best	Practices	
–  Identifies	Vulnerabilities	
–  Assesses	current	setup	against	security	hardening	policies	
•  Monitoring	&	Alerting	
–  User	Monitoring	
–  Password	Monitoring	
–  Schema	Change	Monitoring	
–  Backup	Monitoring	
–  Configuration	Management	
–  Configuration	Tuning	Advice	
•  Centralized	User	Management	
13	
"I definitely recommend the MySQL Enterprise
Monitor to DBAs who don't have a ton of
MySQL experience. It makes monitoring
MySQL security, performance and availability
very easy to understand and to act on.”
Sandi Barr
Sr. Software Engineer
Schneider Electric
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Assess	MySQL	Authorization	
•  Administrative	Privileges	
•  Database	Privileges	
•  Session	Limits	and	Object	Privileges	
•  User	privileges		
– Creating,	altering	and	deleting	databases		
– Creating,	altering	and	deleting	tables		
– Execute	INSERT,	SELECT,	UPDATE,	DELETE	queries		
– Create,	execute,	or	delete	stored	procedures	and	with	what	rights	
– Create	or	delete	indexes	
14	
Security Privilege Management in MySQL Workbench
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Authentication	
15	
•  Integrate	with	Centralized	Authentication	Infrastructure		
– Centralized	Account	Management	
– Password	Policy	Management	
– Groups	&	Roles	
•  PAM	(Pluggable	Authentication	Modules)	
– Standard	interface	(Unix,	LDAP,	Kerberos,	others)	
– Windows		
•  Access	native	Windows	service	-	Use	to	Authenticate	users	using	Windows	
Active	Directory	or	to	a	native	host	
Integrates	MySQL	with	existing	
security	infrastructures
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Authentication:	PAM	
•  Standard	Interface	
– LDAP	
– Unix/Linux	
•  Proxy	Users	
16
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Authentication:	Windows	
•  Windows	Active	Directory	
•  Windows	Native	Services	
17
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Assess	your	data	and	data	model	using	MySQL	Workbench	
18
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Prevent	-	MySQL	Enterprise	Features	and	GDPR	
•  Prevent	Attacks	(Articles	32,	83,	28,	26,	5,	20,	27,	30,	64)	
– MySQL	Enterprise	Security	–	Transparent	Data	Encryption	
•  Includes	Key	Management	
•  Protects	Tablespace	via	Encryption,	Keys	via	Key	Manager/Vault	integration	
– MySQL	Enterprise	Security	–	Firewall	
•  MySQL	Firewall	Statement/User/IP	Whitelists,	Rules	
– MySQL	Enterprise	Authentication	
– DBA	configurable	IP	whitelisting,	Connection	Limits,	…	
•  Via	server	level	and	via	per	Account	IP/Hostname	Controls,	Account	resource	limits,		
– In	transit	data	encryption	-	
•  Full	support	for	TLS	1.2	-	X509,	Certificate	Authorities,	Exclude	Lists,	etc.	
– Granular	access	controls	
•  Table	Grants,	Database	Views,	Stored	Procedures,	Functions	
19
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Firewall:	Overview	
20	
Inbound
SQL Traffic
Web
Applications
SQL Injection Attack
Via Brower
ALLOW
BLOCK
DETECT
1
2
3
Instance
MySQL Enterprise FirewallInternet
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Firewall	
•  Block	SQL	Injection	Attacks	
– Allow:	SQL	Statements	that	match	Whitelist	
– Block:	SQL	statements	that	are	not	on	Whitelist		
•  Intrusion	Detection	System	
– Detect:	SQL	statements	that	are	not	on	Whitelist	
•  SQL	Statements	execute	and	alert	administrators	
	
21	
Select * from employee where id=22
Select * from employee where id=22 or 1=1
Block✖
Allow✔
White List
Applications
Detect & Alert
Intrusion Detection
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Firewall	
•  Real	Time	Protection	
– Queries	analyzed	and	matched	against	White	List	
•  Blocks	SQL	Injection	Attacks	
– Positive	Security	Model	
•  Block	Suspicious	Traffic	
– Out	of	Policy	Transactions	detected	&	blocked	
•  Learns	White	List		
– Automated	creation	of	approved	list	of	SQL	command	patterns	on	a	per	user	basis	
•  Transparent	
– No	changes	to	application	required	
22	
MySQL Enterprise Firewall monitoring
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Key	Vault	High-Level	Architecture	
Standby
Administration
Console, Alerts,
Reports
Secure Backups
= Credential Files/Other
Wallets
= Password/
phrases
Keystores
= Certificates
Databases
Servers
Middleware
23
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL Database
Encrypted
Tablespace
Files
Protected
Key
Hacker /
Dishonest OS User
Accesses
Files Directly
Information
Access Blocked
By Encryption
MySQL	TDE	–	Protects	against	Attacks	on	Database	Files
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Key	Vault	
MySQL	Enterprise	Transparent	Data	Encryption	
	2	Tier	Architecture	
MySQL	Database	
Tablespace	Keys	
	
	
	
	
	
	
	
	
MySQL	
Server	
Plugin	&	
Services		
Infrastructure	
InnoDB	
Client	
Keyring	
plugins	
	
•  Master	Key	
•  Stored	outside	the	database	
•  Oracle	Key	Vault		
•  SafeNet	KeySecure	
•  KMIP	1.1	Compliant	Key	Vault	
•  Tablespace	Key	
•  Protected	by	master	key	
Master	Key	
Plain Text
Encrypted 2
Encrypted 1
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Detect	-	MySQL	Enterprise	Features	and	GDPR	–	1	of	2	
•  Detect	(Articles	30,	82,	33)	
– MySQL	Enterprise	Security	–	Audit	
•  Policy-based	auditing	solution	–	gather	audit	log	of	activity	
•  Use	to	spot	database	misuse	
•  Use	to	prove	compliance	to	GDPR	
– MySQL	Enterprise	Security	–	Firewall	
•  Real-time	protection	against	database	specific	attacks		
•  Use	to	alert	and/or	block	nefarious	activity	–	such	as	personal	data	leakage	
26
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Focus	on	MySQL	EE	Audit	
•  GDPR	
– Mandates	recording	or	auditing	of	the	activities	on	the	Personal	Data		
– Recommends	records	must	be	maintained	centrally		
•  Under	the	responsibility	of	the	Controller.		
– Processors	and	third-parties	must	not	be	able	to	tamper	or	destroy	the	audit	records.		
– In	addition	to	book-keeping,	auditing	helps	in	forensic	analysis	in	case	of	a	breach.	
•  MySQL	Enterprise	Audit	Audit	data	can	be	
– Maintained	in	Oracle	Audit	Value	–	certified	
– Outputs	standard	XML	or	JSON	that	easily	integrate	with	various	3rd	party	solutions	
– Supports	encryption	(MySQL	5.7.18+)	
– Can	direct	security	logs	to	write-once	storage	
27
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Audit	-	Work	Flow	
28
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Detect	-	MySQL	Enterprise	Features	and	GDPR	–	2	of	2	
– MySQL	Workbench	EE	
•  Security	related	–		
– Inspect	Audit	Data	
– Configure	Firewall	
– Manage	Users	
– MySQL	Enterprise	Monitor	
•  Monitor/Alert	on	Firewall,	Audit,	Backups	and	more	
•  Detect	configuration	changes	
29
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Additional	Security	Controls	
Hashing,	Signing,	Encryption	Functions	
– Symmetric	Encryption	–	AES	
– Hashing	–	SHA-2,	SHA-1	
– Asymmetric	Public	Key	Encryption	(RSA)	
– Asymmetric	Private	Key	Decryption	(RSA)	
– Generate	Public/Private	Key	(RSA,	DSA,	DH)	
– Derive	Symmetric	Keys	from	Public	and	Private	Key	pairs	(DH)	
– Digitally	Sign	Data	(RSA,	DSA)	
– Verify	Data	Signature	(RSA,	DSA)	
– Validation	Data	Authenticity	(RSA,	DSA)	
Confidential	–	Oracle	Internal	 30
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Additional	Security	Controls	
•  HA	
– Traditional	Replication	
– MySQL	InnoDB	Cluster	
•  Disaster	Recovery	
– Traditional	Replication	
– MySQL	InnoDB	Cluster	
•  Backup	
– MySQL	Enterprise	Backup		
•  Includes	encryption	
•  Support	for	MySQL	TDE	
Confidential	–	Oracle	Internal	 31
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Cloud	Service	
•  Designed	for	security	
•  MySQL	Enterprise	Features	
•  Backup	&	Recovery	
– Based	on	MySQL	Enterprise	Backup	
•  Support	(with	consultative	support)	
Confidential	–	Oracle	Internal	 32	Confidential	–	Oracle	Internal	 32	
+
MySQL Enterprise Edition
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
References	
Confidential	–	Oracle	Internal	 33	
•  Home	page	EU	GDPR	
– http://www.eugdpr.org/	
•  MySQL	Enterprise	
– https://www.mysql.com/products/enterprise/	
•  MySQL	PCI	DSS	
– https://www.mysql.com/it/why-mysql/white-papers/mysql-pci-data-security-
compliance/	
•  MySQL	Security	Best	Practices	
– https://www.mysql.com/it/why-mysql/presentations/mysql-security-best-practices/
MySQL + GDPR

More Related Content

What's hot

Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPR
Corporater
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
Cvent
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
technakama
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
Vicky Dallas
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
PECB
 
KSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdfKSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdf
DaviesParker
 
Tiedonhallintalain toimeenpano tiedonhallintayksikössä
Tiedonhallintalain toimeenpano tiedonhallintayksikössäTiedonhallintalain toimeenpano tiedonhallintayksikössä
Tiedonhallintalain toimeenpano tiedonhallintayksikössä
Mikael Vakkari
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
Data Security
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
ShivamSharma909
 
GDPR
GDPRGDPR
GDPR
Gopi PD
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
CloudFronts Technologies LLP.
 
Data protection
Data protectionData protection
Data protection
Lewis Silkin
 
ISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptx
foram74
 
NQA ISO 27701 Implementation Guide
NQA ISO 27701 Implementation GuideNQA ISO 27701 Implementation Guide
NQA ISO 27701 Implementation Guide
NA Putra
 
PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)
Hairul Hafiz Hasbullah
 
ISO 27001
ISO 27001ISO 27001
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Radhakrishnan Govindan
 
Soc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organizationSoc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organization
VISTA InfoSec
 

What's hot (20)

Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPR
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
KSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdfKSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdf
 
Tiedonhallintalain toimeenpano tiedonhallintayksikössä
Tiedonhallintalain toimeenpano tiedonhallintayksikössäTiedonhallintalain toimeenpano tiedonhallintayksikössä
Tiedonhallintalain toimeenpano tiedonhallintayksikössä
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
 
GDPR
GDPRGDPR
GDPR
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
 
Data protection
Data protectionData protection
Data protection
 
ISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptx
 
NQA ISO 27701 Implementation Guide
NQA ISO 27701 Implementation GuideNQA ISO 27701 Implementation Guide
NQA ISO 27701 Implementation Guide
 
PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
Soc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organizationSoc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organization
 

Similar to MySQL + GDPR

MySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL DaysMySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL Days
Mark Swarbrick
 
TLV - MySQL Security overview
TLV - MySQL Security overviewTLV - MySQL Security overview
TLV - MySQL Security overview
Mark Swarbrick
 
Percona Live - Dublin 02 security + tuning
Percona Live - Dublin 02 security + tuningPercona Live - Dublin 02 security + tuning
Percona Live - Dublin 02 security + tuning
Mark Swarbrick
 
MySQL Security Best Practises
MySQL Security Best PractisesMySQL Security Best Practises
MySQL Security Best Practises
Mark Swarbrick
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
MarketingArrowECS_CZ
 
Developing MySQL applications in the Cloud
Developing MySQL applications in the CloudDeveloping MySQL applications in the Cloud
Developing MySQL applications in the Cloud
Mark Swarbrick
 
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Getting value from IoT, Integration and Data Analytics
 
Chicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFMChicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFM
Alithya
 
Data Management in a Microservices World
Data Management in a Microservices WorldData Management in a Microservices World
Data Management in a Microservices World
gvenzl
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Luca Martelli
 
MySQL Security & GDPR
MySQL Security & GDPRMySQL Security & GDPR
MySQL Security & GDPR
Mark Swarbrick
 
MySQL Enterprise Cloud
MySQL Enterprise Cloud MySQL Enterprise Cloud
MySQL Enterprise Cloud
Mark Swarbrick
 
MySQL Enterprise Cloud
MySQL Enterprise CloudMySQL Enterprise Cloud
MySQL Enterprise Cloud
Mark Swarbrick
 
MySQL Clusters
MySQL ClustersMySQL Clusters
MySQL Clusters
Mark Swarbrick
 
MySQL HA
MySQL HAMySQL HA
MySQL HA
Mark Swarbrick
 
Percona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clustersPercona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clusters
Mark Swarbrick
 
MySQL as a Document Store
MySQL as a Document StoreMySQL as a Document Store
MySQL as a Document Store
Mark Swarbrick
 
Percona Live - Dublin 03 ee + cloud
Percona Live - Dublin 03 ee + cloudPercona Live - Dublin 03 ee + cloud
Percona Live - Dublin 03 ee + cloud
Mark Swarbrick
 
MySQL as a Service OOW 2018 PRO4601
MySQL as a Service OOW 2018 PRO4601MySQL as a Service OOW 2018 PRO4601
MySQL as a Service OOW 2018 PRO4601
Airton Lastori
 
MySQL Enterprise Monitor 3
MySQL Enterprise Monitor 3MySQL Enterprise Monitor 3
MySQL Enterprise Monitor 3
Mark Swarbrick
 

Similar to MySQL + GDPR (20)

MySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL DaysMySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL Days
 
TLV - MySQL Security overview
TLV - MySQL Security overviewTLV - MySQL Security overview
TLV - MySQL Security overview
 
Percona Live - Dublin 02 security + tuning
Percona Live - Dublin 02 security + tuningPercona Live - Dublin 02 security + tuning
Percona Live - Dublin 02 security + tuning
 
MySQL Security Best Practises
MySQL Security Best PractisesMySQL Security Best Practises
MySQL Security Best Practises
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
Developing MySQL applications in the Cloud
Developing MySQL applications in the CloudDeveloping MySQL applications in the Cloud
Developing MySQL applications in the Cloud
 
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
 
Chicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFMChicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFM
 
Data Management in a Microservices World
Data Management in a Microservices WorldData Management in a Microservices World
Data Management in a Microservices World
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
MySQL Security & GDPR
MySQL Security & GDPRMySQL Security & GDPR
MySQL Security & GDPR
 
MySQL Enterprise Cloud
MySQL Enterprise Cloud MySQL Enterprise Cloud
MySQL Enterprise Cloud
 
MySQL Enterprise Cloud
MySQL Enterprise CloudMySQL Enterprise Cloud
MySQL Enterprise Cloud
 
MySQL Clusters
MySQL ClustersMySQL Clusters
MySQL Clusters
 
MySQL HA
MySQL HAMySQL HA
MySQL HA
 
Percona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clustersPercona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clusters
 
MySQL as a Document Store
MySQL as a Document StoreMySQL as a Document Store
MySQL as a Document Store
 
Percona Live - Dublin 03 ee + cloud
Percona Live - Dublin 03 ee + cloudPercona Live - Dublin 03 ee + cloud
Percona Live - Dublin 03 ee + cloud
 
MySQL as a Service OOW 2018 PRO4601
MySQL as a Service OOW 2018 PRO4601MySQL as a Service OOW 2018 PRO4601
MySQL as a Service OOW 2018 PRO4601
 
MySQL Enterprise Monitor 3
MySQL Enterprise Monitor 3MySQL Enterprise Monitor 3
MySQL Enterprise Monitor 3
 

More from Mark Swarbrick

MySQL NoSQL Document Store
MySQL NoSQL Document StoreMySQL NoSQL Document Store
MySQL NoSQL Document Store
Mark Swarbrick
 
MySQL @ the University Of Nottingham
MySQL @ the University Of NottinghamMySQL @ the University Of Nottingham
MySQL @ the University Of Nottingham
Mark Swarbrick
 
InnoDb Vs NDB Cluster
InnoDb Vs NDB ClusterInnoDb Vs NDB Cluster
InnoDb Vs NDB Cluster
Mark Swarbrick
 
Intro To MySQL 2019
Intro To MySQL 2019Intro To MySQL 2019
Intro To MySQL 2019
Mark Swarbrick
 
MySQL 8
MySQL 8MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
Mark Swarbrick
 
MySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the DolphinMySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the Dolphin
Mark Swarbrick
 
Oracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document StoreOracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document Store
Mark Swarbrick
 
TLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + CloudTLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + Cloud
Mark Swarbrick
 
TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8
Mark Swarbrick
 
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL DaysMySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL Days
Mark Swarbrick
 
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL DaysMySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
Mark Swarbrick
 
MySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL DaysMySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL Days
Mark Swarbrick
 
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL DaysMySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
Mark Swarbrick
 
MySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL DaysMySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL Days
Mark Swarbrick
 
MySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL DaysMySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL Days
Mark Swarbrick
 
MySQL Cluster Whats New
MySQL Cluster Whats NewMySQL Cluster Whats New
MySQL Cluster Whats New
Mark Swarbrick
 
Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1
Mark Swarbrick
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
Mark Swarbrick
 
Why MySQL High Availability Matters
Why MySQL High Availability MattersWhy MySQL High Availability Matters
Why MySQL High Availability Matters
Mark Swarbrick
 

More from Mark Swarbrick (20)

MySQL NoSQL Document Store
MySQL NoSQL Document StoreMySQL NoSQL Document Store
MySQL NoSQL Document Store
 
MySQL @ the University Of Nottingham
MySQL @ the University Of NottinghamMySQL @ the University Of Nottingham
MySQL @ the University Of Nottingham
 
InnoDb Vs NDB Cluster
InnoDb Vs NDB ClusterInnoDb Vs NDB Cluster
InnoDb Vs NDB Cluster
 
Intro To MySQL 2019
Intro To MySQL 2019Intro To MySQL 2019
Intro To MySQL 2019
 
MySQL 8
MySQL 8MySQL 8
MySQL 8
 
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
 
MySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the DolphinMySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the Dolphin
 
Oracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document StoreOracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document Store
 
TLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + CloudTLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + Cloud
 
TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8
 
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL DaysMySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL Days
 
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL DaysMySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
 
MySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL DaysMySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL Days
 
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL DaysMySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
 
MySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL DaysMySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL Days
 
MySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL DaysMySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL Days
 
MySQL Cluster Whats New
MySQL Cluster Whats NewMySQL Cluster Whats New
MySQL Cluster Whats New
 
Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
 
Why MySQL High Availability Matters
Why MySQL High Availability MattersWhy MySQL High Availability Matters
Why MySQL High Availability Matters
 

Recently uploaded

It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
Zilliz
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024
siddu769252
 
What's New in Teams Calling, Meetings, Devices June 2024
What's New in Teams Calling, Meetings, Devices June 2024What's New in Teams Calling, Meetings, Devices June 2024
What's New in Teams Calling, Meetings, Devices June 2024
Stephanie Beckett
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Zilliz
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptxFIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Alliance
 
Latest Tech Trends Series 2024 By EY India
Latest Tech Trends Series 2024 By EY IndiaLatest Tech Trends Series 2024 By EY India
Latest Tech Trends Series 2024 By EY India
EYIndia1
 
Demystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity ApplicationsDemystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
Baishakhi Ray
 
Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...
Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...
Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...
Snarky Security
 
Smart Mobility Market:Revolutionizing Transportation.pdf
Smart Mobility Market:Revolutionizing Transportation.pdfSmart Mobility Market:Revolutionizing Transportation.pdf
Smart Mobility Market:Revolutionizing Transportation.pdf
Market.us
 
"Making .NET Application Even Faster", Sergey Teplyakov.pptx
"Making .NET Application Even Faster", Sergey Teplyakov.pptx"Making .NET Application Even Faster", Sergey Teplyakov.pptx
"Making .NET Application Even Faster", Sergey Teplyakov.pptx
Fwdays
 
The History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal EmbeddingsThe History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal Embeddings
Zilliz
 
Exchange, Entra ID, Conectores, RAML: Todo, a la vez, en todas partes
Exchange, Entra ID, Conectores, RAML: Todo, a la vez, en todas partesExchange, Entra ID, Conectores, RAML: Todo, a la vez, en todas partes
Exchange, Entra ID, Conectores, RAML: Todo, a la vez, en todas partes
jorgelebrato
 
History and Introduction for Generative AI ( GenAI )
History and Introduction for Generative AI ( GenAI )History and Introduction for Generative AI ( GenAI )
History and Introduction for Generative AI ( GenAI )
Badri_Bady
 
Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024
Michael Price
 
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptxFIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Alliance
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
Bhajan Mehta
 
Choosing the Best Outlook OST to PST Converter: Key Features and Considerations
Choosing the Best Outlook OST to PST Converter: Key Features and ConsiderationsChoosing the Best Outlook OST to PST Converter: Key Features and Considerations
Choosing the Best Outlook OST to PST Converter: Key Features and Considerations
webbyacad software
 

Recently uploaded (20)

It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
 
Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024
 
What's New in Teams Calling, Meetings, Devices June 2024
What's New in Teams Calling, Meetings, Devices June 2024What's New in Teams Calling, Meetings, Devices June 2024
What's New in Teams Calling, Meetings, Devices June 2024
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptxFIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
 
Latest Tech Trends Series 2024 By EY India
Latest Tech Trends Series 2024 By EY IndiaLatest Tech Trends Series 2024 By EY India
Latest Tech Trends Series 2024 By EY India
 
Demystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity ApplicationsDemystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity Applications
 
Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
 
Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...
Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...
Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...
 
Smart Mobility Market:Revolutionizing Transportation.pdf
Smart Mobility Market:Revolutionizing Transportation.pdfSmart Mobility Market:Revolutionizing Transportation.pdf
Smart Mobility Market:Revolutionizing Transportation.pdf
 
"Making .NET Application Even Faster", Sergey Teplyakov.pptx
"Making .NET Application Even Faster", Sergey Teplyakov.pptx"Making .NET Application Even Faster", Sergey Teplyakov.pptx
"Making .NET Application Even Faster", Sergey Teplyakov.pptx
 
The History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal EmbeddingsThe History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal Embeddings
 
Exchange, Entra ID, Conectores, RAML: Todo, a la vez, en todas partes
Exchange, Entra ID, Conectores, RAML: Todo, a la vez, en todas partesExchange, Entra ID, Conectores, RAML: Todo, a la vez, en todas partes
Exchange, Entra ID, Conectores, RAML: Todo, a la vez, en todas partes
 
History and Introduction for Generative AI ( GenAI )
History and Introduction for Generative AI ( GenAI )History and Introduction for Generative AI ( GenAI )
History and Introduction for Generative AI ( GenAI )
 
Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024
 
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptxFIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
 
Choosing the Best Outlook OST to PST Converter: Key Features and Considerations
Choosing the Best Outlook OST to PST Converter: Key Features and ConsiderationsChoosing the Best Outlook OST to PST Converter: Key Features and Considerations
Choosing the Best Outlook OST to PST Converter: Key Features and Considerations
 

MySQL + GDPR