SlideShare a Scribd company logo
1 of 50
Download to read offline
Active Directory !
securing and auditing

GraphDay Amsterdam June 6 2017!
Kees Vegter – Field Engineer!
IAM and Neo4j
Securing and Auditing Active Directory
AGENDA:
Demo
The Business Impact!
The Business Impact: SONY!
•  Stocks tumbled 10%!
•  Estimated loss of $100 million!
•  Employees forced to use fax, snail-mail and
phones only for weeks!
•  Public reputations tarnished!
Problem statement from a Fortune 50
Customer!
“Our IAM analysts are unable to accurately
identify and manage security risks in an
acceptable timeframe using tools that rely on our
existing Active Directory implementation.”!
!
Ac#ve	Directory	Implementa#on	
Common	Prac*ces
AD	Solely	managed	by	IT	
•  IAM	is	typically	the	responsibility	of	IT	
•  IT	personnel	rarely	have	insight	into	overall	organiza8onal	
structure.	
•  Group	and	account	naming,	as	well	as	policy	and	permission	
associa8on	become	confusing	or	cryp8c	and	lingo-laden.		
•  Group	and	account	descrip8ons	neglected.	
Account:	
HR_DEF_BAS02	
Group:	
HR_RW_NOIT_1A	
Account:	
HRSOM01
Managing	groups	without	understanding	AD	structure	
and	rela#onships	
•  Unmanaged	AD	growth	leads	to	unintended	or	
misunderstood	group	nes8ng.	
•  Nested	groups	inherit	permissions	and	policies.	
•  Deeply	nested	groups	increase	the	risk	of	unexpected	
unintended	inheritance.	
•  All	leads	to	unnecessary	and	/	or	unauthorized	access
Unmanaged	growth	and	limited	monitoring	
•  AD	structure	is	constantly	evolving	to	reflect	the	reality	of	
your	IAM	effort.	
•  Groups	and	account	management	is	a	demanding,	ongoing	
process	that	requires	an	in-depth,	and	up-to-date	
understanding	of	content	and	structure.
Rigid hierarchies have
defined how we have built
IAM-tools in the past
Ideal	organic	growth
Real	organic	growth
Audi#ng	AD	in	Neo4j	
Real	customer	ques*ons
Business	ques#ons	of	a	Fortune	50	customer	
“How	many	accounts	have	‘Local	Admin’	access	to	a	
par8cular	resource	at	a	par8cular	8me?”
Business	ques#ons	of	a	Fortune	50	customer	
“How	can	I	define	and	determine	which	groups,	
accounts	and	servers	have	the	highest	risk?”
Business	ques#ons	of	a	Fortune	50	customer	
“How	can	I	understand	the	impact	of	pruning	groups	
from	my	domains?”
Business	ques#ons	of	a	Fortune	50	customer	
“What	is	the	most	efficient	way	to	assign	access	to	a	
par8cular	resource?”
Audi#ng	AD	in	Neo4j	
An	actual	audit:	Risk	Measures
Defining	Risk:		Accounts
Defining	Risk:		Servers
Defining	Risk:		Groups	
What’s	the	business	impact	if	an	
account	in	this	group	is	compromised?
Drilling	Down:		Exploring	Risk	Through	Traversal
Drilling	Down:		Exploring	Risk	Through	Traversal
Drilling	Down:		Exploring	Risk	Through	Traversal
Quick	Start:	Plan	Your	Project
Quick	Start:	Plan	Your	Project	
Expired	guest	account	with	
local	admin	access	via	7	
rela8onships	and	5	nested	
groups
Path	Risk
Path	Risk
Customer	Example:	Neo4j	AD	Audit	feedback	loop	
Ac#ve	
Directory	
Graph	Database	Cluster	
Neo4j	 Neo4j	 Neo4j	
AD	Audit	and	
Visualiza#on	
Dashboard	
Dat	
Scien#st	
End	User	
Neo4j	AD	
Graph	ETL	
Engine	
AD	data	processed	in	batch	or	in	real-#me
IAM and Neo4j
Securing and Auditing Active Directory
AGENDA:
Demo
Show	case	an	example	AD	monitor.	
•  Analyze	AD	structure	and	event	data		
in	the	databse	
•  Solu8on	architecture	
	
•  An	example	applica8on	showing	the	power	of	graph	
visualiza8on	in	your	business	applica8on.	
•  There	are	a	lot	of	visualiza8on	products	available	today...	
Neo4j	
AD	Data	 Demo	
Applica8on
Demo
Demo	2	
•  The	size	of	the	database	is	not	affec8ng	your	
(local)	query	performance	
•  It	is	possible	to	add	data,	which	will	give	new	
possibili8es	
•  For	this	demo	it	is	'Logon	data',	but	in	theory	it	
can	be	anything.
IAM and Neo4j
Securing and Auditing Active Directory
AGENDA:
Demo
GRAPH THINKING:
Identity And Access Management
TRUSTS
TRUSTS
AUTHENTICATES
NEO4j USE CASES
Real Time Recommendations
Master Data Management
Fraud Detection
Identity & Access Management
Graph Based Search
Network & IT-Operations
CAN_READ
and for the right reason
at the right time,
Who gets access to what,
Identity & Access Management (IAM)
& Access Management
Identity
Defining	Iden8ty
& Access Management
Identity
The	structure	of	organisa8ons
Traditional IAM-systems
2) Underlying assumption
that organisations are
hierarchal
1) Static idea of Identity
Emerging Complexity of Identity
Complexity of Digital Identities
Serial # Unique idPersonal Customer Partner
Consumer Citizen
User identities
 Identity of Things
Device <-> Service
Security End to EndIdentity of users
Identity of things
Applications
and services
Complexity of Digital Identities
Access Management is traditionally
designed with the underlying assumption
that everything is hierarchal
Rigid hierarchies have
defined how we have built
IAM-systems in the past
Representing your organisation as a
graph, enables you to build stronger
and more accurate IAM
Parent-Child	rela8onships	
Ideal World
Query	complex	rela8onships	in	real-8me	
Real World
Identity Relationship ManagementIdentity Access Management
Applications
and data
Endpoints
People
Customers
(millions)
Partners and
Suppliers
Workforce
(thousands)
PCs
 Tablets
On-premises
 Private Cloud
 Public Cloud
Things
(Tens of
millions)
Wearables
Phones
PCs
Customers
(millions)
On-premises
Applications
and data
Endpoints
People
1.  Build your IAM as a Graph
2.  Augment your existing IAM with Neo4j
Different	ways	of	adop8ng	Neo4j	for	IAM
Q & A
!
Kees Vegter, kees@neotechnology.com!
Neo4j!AD Data!
Tomcat!
Web App!
Browser App!
Software Architecture
Demo!

More Related Content

What's hot

Symantec SOC - Register-Guard Oct 2012
Symantec SOC - Register-Guard Oct 2012Symantec SOC - Register-Guard Oct 2012
Symantec SOC - Register-Guard Oct 2012
Grant Chapman
 
The Cicayda Difference Slides
The Cicayda Difference SlidesThe Cicayda Difference Slides
The Cicayda Difference Slides
Aaron Vick
 
Information Security
Information SecurityInformation Security
Information Security
Brian Hacker
 

What's hot (20)

Ketnote: GraphTour Boston
Ketnote: GraphTour BostonKetnote: GraphTour Boston
Ketnote: GraphTour Boston
 
Smart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NC
Smart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NCSmart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NC
Smart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NC
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Symantec SOC - Register-Guard Oct 2012
Symantec SOC - Register-Guard Oct 2012Symantec SOC - Register-Guard Oct 2012
Symantec SOC - Register-Guard Oct 2012
 
How Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsHow Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers Millions
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
 
BigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy managementBigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy management
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own Identity
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
[Webinar] GDPR: A Misunderstood Piece of Data Privacy Legislation
[Webinar] GDPR: A Misunderstood Piece of Data Privacy Legislation[Webinar] GDPR: A Misunderstood Piece of Data Privacy Legislation
[Webinar] GDPR: A Misunderstood Piece of Data Privacy Legislation
 
The Cicayda Difference Slides
The Cicayda Difference SlidesThe Cicayda Difference Slides
The Cicayda Difference Slides
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use Cases
 
Distributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchainDistributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchain
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
 
Information Security
Information SecurityInformation Security
Information Security
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
 

Similar to Neo4j GraphDay - Securing and Auditing Active Directory - Kees Vegter, Neo4j

A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 

Similar to Neo4j GraphDay - Securing and Auditing Active Directory - Kees Vegter, Neo4j (20)

Identity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and RecoveryIdentity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and Recovery
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
 
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...
No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...
No AI Without IA: Information Architecture as a Critical Enabler - Dino Eliop...
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 

More from Neo4j

More from Neo4j (20)

From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptxFrom Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
 
Novo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMsNovo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMs
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansQIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
 
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafosBBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
 
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)
 
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdfNeo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
 
Enabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsEnabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge Graphs
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Neo4j GraphDay - Securing and Auditing Active Directory - Kees Vegter, Neo4j