Spaces:
Paused
Paused
| { | |
| "timestamp": "2025-12-17T02:35:17.955056", | |
| "stats": { | |
| "searches": 33, | |
| "presentations_found": 495, | |
| "saved_to_neo4j": 494, | |
| "errors": 0 | |
| }, | |
| "presentations": [ | |
| { | |
| "title": "Presentation from 163240780", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-163240780/163240780", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:34.830211" | |
| }, | |
| { | |
| "title": "Presentation from 251309910", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-policy-and-practice-251309910/251309910", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.027254" | |
| }, | |
| { | |
| "title": "Presentation from 251859392", | |
| "url": "https://www.slideshare.net/slideshow/reimagining-ot-cybersecurity-strategy-deloitte/251859392", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.091458" | |
| }, | |
| { | |
| "title": "Presentation from 222108263", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-222108263/222108263", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.176437" | |
| }, | |
| { | |
| "title": "Presentation from 249933437", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-strategybrieftoitc-final17apr2015/249933437", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.323823" | |
| }, | |
| { | |
| "title": "Presentation from 259183825", | |
| "url": "https://www.slideshare.net/slideshow/defenceindepth-cybersecurity-strategy/259183825", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.374559" | |
| }, | |
| { | |
| "title": "Presentation from 190989896", | |
| "url": "https://www.slideshare.net/slideshow/singapore-cybersecurity-strategy-and-legislation-for-smu-law-school-2019/190989896", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.428785" | |
| }, | |
| { | |
| "title": "Presentation from 114007918", | |
| "url": "https://www.slideshare.net/slideshow/singapore-cybersecurity-strategy-and-legislation-2018/114007918", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.483336" | |
| }, | |
| { | |
| "title": "Presentation from 43476233", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-rmf-strategy/43476233", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.549737" | |
| }, | |
| { | |
| "title": "Presentation from 49382155", | |
| "url": "https://www.slideshare.net/slideshow/guidelines-for-smart-grid-cybersecurity-strategy/49382155", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.666104" | |
| }, | |
| { | |
| "title": "Presentation from 269548883", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-building-a-balanced-scorecard-with-effective-kpis/269548883", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.721759" | |
| }, | |
| { | |
| "title": "Presentation from 259536297", | |
| "url": "https://www.slideshare.net/slideshow/overview-of-national-cybersecurity-strategy-2023pdf/259536297", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.810036" | |
| }, | |
| { | |
| "title": "Presentation from 138603686", | |
| "url": "https://www.slideshare.net/slideshow/insights-to-building-an-effective-industrial-cybersecurity-strategy-for-your-organization/138603686", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.871751" | |
| }, | |
| { | |
| "title": "Presentation from 258512407", | |
| "url": "https://www.slideshare.net/slideshow/secureweb3-developing-a-comprehensive-cybersecurity-strategy-for-the-decentralized-future/258512407", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:35.943080" | |
| }, | |
| { | |
| "title": "Presentation from 253074630", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-law-and-policy-group-assignment/253074630", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cybersecurity strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:36.000739" | |
| }, | |
| { | |
| "title": "Presentation from 272155619", | |
| "url": "https://www.slideshare.net/slideshow/modern-security-operations-building-and-leading-modern-soc/272155619", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:47.873137" | |
| }, | |
| { | |
| "title": "Presentation from 270020253", | |
| "url": "https://www.slideshare.net/slideshow/introduction-to-security-operations-center-soc/270020253", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:47.950797" | |
| }, | |
| { | |
| "title": "Presentation from 280154718", | |
| "url": "https://www.slideshare.net/slideshow/security-operations-center-soc-cisco-certificate/280154718", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.032413" | |
| }, | |
| { | |
| "title": "Presentation from 4678952", | |
| "url": "https://www.slideshare.net/slideshow/rothke-secure360-building-a-security-operations-center-soc/4678952", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.098631" | |
| }, | |
| { | |
| "title": "Presentation from 74478214", | |
| "url": "https://www.slideshare.net/slideshow/building-a-nextgeneration-security-operations-center-soc/74478214", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.157532" | |
| }, | |
| { | |
| "title": "Presentation from 24691810", | |
| "url": "https://www.slideshare.net/slideshow/rothke-rsa-2012-building-a-security-operations-center-soc/24691810", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.214929" | |
| }, | |
| { | |
| "title": "Presentation from 150245309", | |
| "url": "https://www.slideshare.net/slideshow/cyber-security-operations-center-csoc/150245309", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.269624" | |
| }, | |
| { | |
| "title": "Presentation from 88105697", | |
| "url": "https://www.slideshare.net/slideshow/security-operation-centers/88105697", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.347875" | |
| }, | |
| { | |
| "title": "Presentation from 267023230", | |
| "url": "https://www.slideshare.net/slideshow/future-of-soc-more-security-less-operations/267023230", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.398577" | |
| }, | |
| { | |
| "title": "Presentation from 253358381", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-security-leadership-creating-a-world-class-security-operations-center-soc/253358381", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.463254" | |
| }, | |
| { | |
| "title": "Presentation from 97285609", | |
| "url": "https://www.slideshare.net/slideshow/what-is-security-operations-centre-types-need-and-benefits-of-soc/97285609", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.524979" | |
| }, | |
| { | |
| "title": "Presentation from 78688363", | |
| "url": "https://www.slideshare.net/slideshow/manoj-purandare-strategy-towards-an-effective-security-operations-centre-soc/78688363", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.588371" | |
| }, | |
| { | |
| "title": "Presentation from 269287424", | |
| "url": "https://www.slideshare.net/slideshow/implementing-security-operations-center-soc-strategies-for-success-in-2024/269287424", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.651271" | |
| }, | |
| { | |
| "title": "Presentation from 273459049", | |
| "url": "https://www.slideshare.net/slideshow/security-operations-center-soc-by-aadit-technologies/273459049", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.724969" | |
| }, | |
| { | |
| "title": "Presentation from 78688196", | |
| "url": "https://www.slideshare.net/slideshow/manoj-purandare-stratergy-towards-an-effective-soc/78688196", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOC security operations", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:28:48.771778" | |
| }, | |
| { | |
| "title": "Presentation from 272583551", | |
| "url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-cti-lifecycle-and-cti-framework/272583551", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:00.457336" | |
| }, | |
| { | |
| "title": "Presentation from 281734837", | |
| "url": "https://www.slideshare.net/slideshow/threat-intelligence-cti-blue-teams-pptx/281734837", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:00.521563" | |
| }, | |
| { | |
| "title": "Presentation from 68988770", | |
| "url": "https://www.slideshare.net/slideshow/security-strategy-and-tactic-with-cyber-threat-intelligence-cti-68988770/68988770", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:00.584677" | |
| }, | |
| { | |
| "title": "Presentation from 280950116", | |
| "url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-staying-ahead-of-attacks-doc/280950116", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:00.651130" | |
| }, | |
| { | |
| "title": "Presentation from 236250782", | |
| "url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-la-rilevanza-del-dato-per-il-business/236250782", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:00.708485" | |
| }, | |
| { | |
| "title": "Presentation from 81134400", | |
| "url": "https://www.slideshare.net/slideshow/gabor-munk-cti-and-information-sharing/81134400", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:00.770708" | |
| }, | |
| { | |
| "title": "Presentation from 247219270", | |
| "url": "https://www.slideshare.net/slideshow/welcome-to-the-world-of-cyber-threat-intelligence/247219270", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:00.831763" | |
| }, | |
| { | |
| "title": "Presentation from 249451706", | |
| "url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-information-to-insight/249451706", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:00.919887" | |
| }, | |
| { | |
| "title": "Presentation from 270927433", | |
| "url": "https://www.slideshare.net/slideshow/the-disclosure-dilemma-ensuring-defense/270927433", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:00.975087" | |
| }, | |
| { | |
| "title": "Presentation from 273094626", | |
| "url": "https://www.slideshare.net/slideshow/socradar-s-2024-cyber-threat-intelligence-solution/273094626", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:01.041774" | |
| }, | |
| { | |
| "title": "Presentation from 141297630", | |
| "url": "https://www.slideshare.net/slideshow/effective-threat-hunting-with-tactical-threat-intelligence/141297630", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:01.089769" | |
| }, | |
| { | |
| "title": "Presentation from 249967976", | |
| "url": "https://www.slideshare.net/slideshow/cti-ant-hunting-for-chinese-threat-intelligence/249967976", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:01.149304" | |
| }, | |
| { | |
| "title": "Presentation from 65718513", | |
| "url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-what-do-we-want-the-incident-response-and-technology-risk-management-perspectives/65718513", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:01.302066" | |
| }, | |
| { | |
| "title": "Presentation from 256799647", | |
| "url": "https://www.slideshare.net/slideshow/stop-tilting-at-windmills-3-key-lessons-that-cti-teams-should-learn-from-the-past-sans-cti-summit-2020/256799647", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:01.357734" | |
| }, | |
| { | |
| "title": "Presentation from 69859022", | |
| "url": "https://www.slideshare.net/slideshow/security-strategy-and-tactic-with-cyber-threat-intelligence-cti-69859022/69859022", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "threat intelligence CTI", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:01.416572" | |
| }, | |
| { | |
| "title": "Presentation from 61866350", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-61866350/61866350", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:12.809425" | |
| }, | |
| { | |
| "title": "Presentation from 67359492", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-67359492/67359492", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:12.991477" | |
| }, | |
| { | |
| "title": "Presentation from 251184906", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-methodology/251184906", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:13.158047" | |
| }, | |
| { | |
| "title": "Presentation from 164038375", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-164038375/164038375", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:13.239500" | |
| }, | |
| { | |
| "title": "Presentation from 253758024", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-security/253758024", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:13.350357" | |
| }, | |
| { | |
| "title": "Presentation from 258495954", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-vs-incident-detectionpdf/258495954", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:13.536925" | |
| }, | |
| { | |
| "title": "Presentation from 23593938", | |
| "url": "https://www.slideshare.net/slideshow/proactive-incident-response/23593938", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:13.907852" | |
| }, | |
| { | |
| "title": "Presentation from 146275477", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-overview/146275477", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:14.488860" | |
| }, | |
| { | |
| "title": "Presentation from 1476119", | |
| "url": "https://www.slideshare.net/slideshow/malwareincidentresponse/1476119", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:14.573206" | |
| }, | |
| { | |
| "title": "Presentation from 106759454", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-in-cloudvandanaverma/106759454", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:14.683819" | |
| }, | |
| { | |
| "title": "Presentation from 91059409", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-system-irs/91059409", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:14.819876" | |
| }, | |
| { | |
| "title": "Presentation from 129018068", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-process-129018068/129018068", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:14.890492" | |
| }, | |
| { | |
| "title": "Presentation from 1733422", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-swimlanes/1733422", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:15.010592" | |
| }, | |
| { | |
| "title": "Presentation from 277217362", | |
| "url": "https://www.slideshare.net/slideshow/incident-response-lifecyclepresentation-pptx/277217362", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:15.163852" | |
| }, | |
| { | |
| "title": "Presentation from 73022623", | |
| "url": "https://www.slideshare.net/slideshow/sample-incident-response-plan/73022623", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "incident response", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:15.207858" | |
| }, | |
| { | |
| "title": "Presentation from 272708349", | |
| "url": "https://www.slideshare.net/slideshow/nis2-directive-readiness-compliance-challenges-and-recommendations-docx/272708349", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:26.799092" | |
| }, | |
| { | |
| "title": "Presentation from 283086014", | |
| "url": "https://www.slideshare.net/slideshow/nis2-event-directive-information-overview/283086014", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:26.869369" | |
| }, | |
| { | |
| "title": "Presentation from 281242029", | |
| "url": "https://www.slideshare.net/slideshow/nis2-compliance-for-msps-roadmap-benefits-cybersecurity-trends-2025-guide/281242029", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:27.074260" | |
| }, | |
| { | |
| "title": "Presentation from 273001934", | |
| "url": "https://www.slideshare.net/slideshow/nis-2-and-details-about-implementation-watchguard/273001934", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:27.348452" | |
| }, | |
| { | |
| "title": "Presentation from 260999351", | |
| "url": "https://www.slideshare.net/slideshow/dachnug50-bigfix-nis2pdf/260999351", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:27.514383" | |
| }, | |
| { | |
| "title": "Presentation from 283086010", | |
| "url": "https://www.slideshare.net/slideshow/2024-04-21-nis2-and-dora-introduction-of-activities/283086010", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:27.570216" | |
| }, | |
| { | |
| "title": "Presentation from 278737660", | |
| "url": "https://www.slideshare.net/slideshow/europe-tightens-cybersecurity-rules-with-nis2-directive-pdf/278737660", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:27.703202" | |
| }, | |
| { | |
| "title": "Presentation from 278961759", | |
| "url": "https://www.slideshare.net/slideshow/eu-and-you-eu-and-you-upcoming-regulation/278961759", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:27.823283" | |
| }, | |
| { | |
| "title": "Presentation from 275587035", | |
| "url": "https://www.slideshare.net/slideshow/map-of-security-related-eu-legislations/275587035", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:27.892496" | |
| }, | |
| { | |
| "title": "Presentation from 272311967", | |
| "url": "https://www.slideshare.net/slideshow/is-your-codebase-ready-for-nis2-and-the-cyber-resilience-act/272311967", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:27.985394" | |
| }, | |
| { | |
| "title": "Presentation from 283588646", | |
| "url": "https://www.slideshare.net/slideshow/nis2-complete-view-framework-guide-manual/283588646", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:28.090806" | |
| }, | |
| { | |
| "title": "Presentation from 281036749", | |
| "url": "https://www.slideshare.net/slideshow/quantum-threats-are-closer-than-you-think-act-now-to-stay-secure/281036749", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:28.270650" | |
| }, | |
| { | |
| "title": "Presentation from 274868244", | |
| "url": "https://www.slideshare.net/slideshow/trustarc-webinar-data-privacy-in-the-eu_-what-you-need-to-know/274868244", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:28.329088" | |
| }, | |
| { | |
| "title": "Presentation from 268755068", | |
| "url": "https://www.slideshare.net/slideshow/pecific-pac34-slidedeck-v1-for-website-pptx/268755068", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:28.403888" | |
| }, | |
| { | |
| "title": "Presentation from 282061727", | |
| "url": "https://www.slideshare.net/slideshow/data-protection-resilience-in-focus-pdf/282061727", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "NIS2 directive", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:28.482043" | |
| }, | |
| { | |
| "title": "Presentation from 252679729", | |
| "url": "https://www.slideshare.net/slideshow/sock-puppetpptx/252679729", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:40.082176" | |
| }, | |
| { | |
| "title": "Presentation from 249384223", | |
| "url": "https://www.slideshare.net/slideshow/from-research-to-investigation-digital-traces-and-their-use-in-data-journalism-and-osint/249384223", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:40.153024" | |
| }, | |
| { | |
| "title": "Presentation from 58641706", | |
| "url": "https://www.slideshare.net/slideshow/osint-open-source-intelligence-leading-investigation-and-investigation-technique/58641706", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:40.849505" | |
| }, | |
| { | |
| "title": "Presentation from 259938752", | |
| "url": "https://www.slideshare.net/slideshow/open-source-intelligence-researcher/259938752", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:41.071188" | |
| }, | |
| { | |
| "title": "Presentation from 260078444", | |
| "url": "https://www.slideshare.net/slideshow/osint-service/260078444", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:41.657567" | |
| }, | |
| { | |
| "title": "Presentation from 252497260", | |
| "url": "https://www.slideshare.net/slideshow/csi-osint-specialist/252497260", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:41.720425" | |
| }, | |
| { | |
| "title": "Presentation from 212354373", | |
| "url": "https://www.slideshare.net/slideshow/dr-dayu-kao-the-investigation-forensics-and-governance-of-atm-heist-threats-in-law-enforcement-agencies/212354373", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:41.919981" | |
| }, | |
| { | |
| "title": "Presentation from 278055321", | |
| "url": "https://www.slideshare.net/slideshow/how-to-create-500-m-and-get-away-with-it-pptx/278055321", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:43.529673" | |
| }, | |
| { | |
| "title": "Presentation from 253492110", | |
| "url": "https://www.slideshare.net/slideshow/intelligence-against-the-war-on-terrorismyou-serve-on-the-staff-docx/253492110", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:43.897938" | |
| }, | |
| { | |
| "title": "Presentation from 276567593", | |
| "url": "https://www.slideshare.net/slideshow/social-media-crime-investigation-by-pptx/276567593", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:43.970082" | |
| }, | |
| { | |
| "title": "Presentation from 149521869", | |
| "url": "https://www.slideshare.net/slideshow/p19-open-source-investigationsdeciphering-criminals-digital-footprintmatasphillips61319/149521869", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:44.067045" | |
| }, | |
| { | |
| "title": "Presentation from 261539049", | |
| "url": "https://www.slideshare.net/slideshow/definitive-guide-to-tiktokpdf/261539049", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:44.136502" | |
| }, | |
| { | |
| "title": "Presentation from 65875731", | |
| "url": "https://www.slideshare.net/slideshow/soc2016-the-investigation-labyrinth/65875731", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:44.307938" | |
| }, | |
| { | |
| "title": "Presentation from 253379004", | |
| "url": "https://www.slideshare.net/slideshow/captech-talksosint-dr-kellup-charles-10622pptx/253379004", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:44.380213" | |
| }, | |
| { | |
| "title": "Presentation from 279085381", | |
| "url": "https://www.slideshare.net/slideshow/osint-part-1-use-osint-for-basic-factfinding-pptx/279085381", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "OSINT investigation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:44.440451" | |
| }, | |
| { | |
| "title": "Presentation from 22258827", | |
| "url": "https://www.slideshare.net/slideshow/intro-topentesting/22258827", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:56.066682" | |
| }, | |
| { | |
| "title": "Presentation from 129522525", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-129522525/129522525", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:56.196729" | |
| }, | |
| { | |
| "title": "Presentation from 10902959", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-10902959/10902959", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:56.284006" | |
| }, | |
| { | |
| "title": "Presentation from 23103088", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-presentation-practical-guide/23103088", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:56.394710" | |
| }, | |
| { | |
| "title": "Presentation from 251035795", | |
| "url": "https://www.slideshare.net/slideshow/azure-penetration-testing-251035795/251035795", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:56.465723" | |
| }, | |
| { | |
| "title": "Presentation from 233799681", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-233799681/233799681", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:56.582223" | |
| }, | |
| { | |
| "title": "Presentation from 232999770", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-guide-232999770/232999770", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:56.663763" | |
| }, | |
| { | |
| "title": "Presentation from 25286617", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-services-25286617/25286617", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:56.756964" | |
| }, | |
| { | |
| "title": "Presentation from 131880275", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-tutorial-penetration-testing-tools-cyber-security-training-edureka/131880275", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:56.837371" | |
| }, | |
| { | |
| "title": "Presentation from 239410696", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-overview/239410696", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:56.989736" | |
| }, | |
| { | |
| "title": "Presentation from 76932778", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-services-76932778/76932778", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:57.208810" | |
| }, | |
| { | |
| "title": "Presentation from 127275224", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-tutorial-127275224/127275224", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:57.350163" | |
| }, | |
| { | |
| "title": "Presentation from 283659128", | |
| "url": "https://www.slideshare.net/slideshow/introduction-to-penetration-testing-and-penetration-testing-proccess-pptx/283659128", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:57.646648" | |
| }, | |
| { | |
| "title": "Presentation from 227351035", | |
| "url": "https://www.slideshare.net/slideshow/penetration-testing-services-penetration-testing/227351035", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:57.817838" | |
| }, | |
| { | |
| "title": "Presentation from 264761279", | |
| "url": "https://www.slideshare.net/slideshow/vulnerability-assessment-and-penetration-testing/264761279", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "penetration testing", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:29:57.994634" | |
| }, | |
| { | |
| "title": "Presentation from 266893383", | |
| "url": "https://www.slideshare.net/slideshow/ransomware-defense-and-remediation-with-pure-storage/266893383", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:09.539644" | |
| }, | |
| { | |
| "title": "Presentation from 97495510", | |
| "url": "https://www.slideshare.net/slideshow/webinar-three-reasons-why-object-storage-is-the-best-defense-against-ransomware-attacks/97495510", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:09.665554" | |
| }, | |
| { | |
| "title": "Presentation from 270483028", | |
| "url": "https://www.slideshare.net/slideshow/ist-blueprint-for-ransomware-defense-pdf/270483028", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:09.782650" | |
| }, | |
| { | |
| "title": "Presentation from 77139476", | |
| "url": "https://www.slideshare.net/slideshow/ransomware-defensefordummies/77139476", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:09.837772" | |
| }, | |
| { | |
| "title": "Presentation from 264143595", | |
| "url": "https://www.slideshare.net/slideshow/ransomware-is-knocking-your-doorfinalpdf/264143595", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:09.975156" | |
| }, | |
| { | |
| "title": "Presentation from 235829822", | |
| "url": "https://www.slideshare.net/slideshow/ransomware-defensefordummies-235829822/235829822", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:10.060959" | |
| }, | |
| { | |
| "title": "Presentation from 94114986", | |
| "url": "https://www.slideshare.net/slideshow/atelier-technique-cisco-acss-2018/94114986", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:10.121911" | |
| }, | |
| { | |
| "title": "Presentation from 269861792", | |
| "url": "https://www.slideshare.net/slideshow/brian-tarbox-s3-sophisticated-storage-system/269861792", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:10.246434" | |
| }, | |
| { | |
| "title": "Presentation from 72044971", | |
| "url": "https://www.slideshare.net/slideshow/eextortion-trends-and-defense/72044971", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:10.364947" | |
| }, | |
| { | |
| "title": "Presentation from 78040475", | |
| "url": "https://www.slideshare.net/slideshow/how-to-protect-my-cloud-workload-from-ransomware/78040475", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:10.454004" | |
| }, | |
| { | |
| "title": "Presentation from 269556769", | |
| "url": "https://www.slideshare.net/slideshow/guarding-against-ransomware-strategies-for-robust-data-protection/269556769", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:10.548750" | |
| }, | |
| { | |
| "title": "Presentation from 58459850", | |
| "url": "https://www.slideshare.net/slideshow/panda-adaptive-defense-360-cyber-extortion-guide/58459850", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:10.635492" | |
| }, | |
| { | |
| "title": "Presentation from 77790382", | |
| "url": "https://www.slideshare.net/slideshow/preventing-todays-malware/77790382", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:10.752239" | |
| }, | |
| { | |
| "title": "Presentation from 269341812", | |
| "url": "https://www.slideshare.net/slideshow/alphv-site-taken-down-en-pdf/269341812", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:10.943887" | |
| }, | |
| { | |
| "title": "Presentation from 284291228", | |
| "url": "https://www.slideshare.net/slideshow/approaches-to-ransomware-protection-with-netapp-monitoring/284291228", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ransomware defense", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:11.072921" | |
| }, | |
| { | |
| "title": "Presentation from 250434569", | |
| "url": "https://www.slideshare.net/slideshow/zero-trust-architecture-250434569/250434569", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:22.922115" | |
| }, | |
| { | |
| "title": "Presentation from 250846285", | |
| "url": "https://www.slideshare.net/slideshow/zero-trust-architecture-digital-trust-framework/250846285", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:23.277572" | |
| }, | |
| { | |
| "title": "Presentation from 230728692", | |
| "url": "https://www.slideshare.net/slideshow/round-table-zeroing-in-on-zero-trust-architecture/230728692", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:23.791846" | |
| }, | |
| { | |
| "title": "Presentation from 269219866", | |
| "url": "https://www.slideshare.net/slideshow/zero-trust-architecture-allendevaux-pdf/269219866", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:23.850512" | |
| }, | |
| { | |
| "title": "Presentation from 85856061", | |
| "url": "https://www.slideshare.net/slideshow/zero-trust-in-a-hybrid-architecture/85856061", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:23.916852" | |
| }, | |
| { | |
| "title": "Presentation from 279591509", | |
| "url": "https://www.slideshare.net/slideshow/introduction-to-zero-trust-architecture-abhishek-r-singh-agnidipta-sarkar/279591509", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:23.972650" | |
| }, | |
| { | |
| "title": "Presentation from 254877581", | |
| "url": "https://www.slideshare.net/slideshow/hitcon-freetalk-2022-zero-trust-architecture/254877581", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:24.032760" | |
| }, | |
| { | |
| "title": "Presentation from 270979964", | |
| "url": "https://www.slideshare.net/slideshow/what-is-zero-trust-architecture-and-why-do-you-need-it-pdf/270979964", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:24.091682" | |
| }, | |
| { | |
| "title": "Presentation from 248620491", | |
| "url": "https://www.slideshare.net/slideshow/implementing-zero-trust-architecture-in-azure-hybrid-cloud/248620491", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:24.152842" | |
| }, | |
| { | |
| "title": "Presentation from 254931407", | |
| "url": "https://www.slideshare.net/slideshow/zero-trust-architecture-and-electric-vehicle-cyberrisks/254931407", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:24.225792" | |
| }, | |
| { | |
| "title": "Presentation from 257487085", | |
| "url": "https://www.slideshare.net/slideshow/pillars-of-zero-trust-architecture/257487085", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:24.291695" | |
| }, | |
| { | |
| "title": "Presentation from 268613064", | |
| "url": "https://www.slideshare.net/slideshow/understanding-the-zero-trust-architecture-market-a-comprehensive-overview/268613064", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:24.407209" | |
| }, | |
| { | |
| "title": "Presentation from 283056123", | |
| "url": "https://www.slideshare.net/slideshow/securing-the-digital-perimeter-with-zero-trust-architecture/283056123", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:24.464323" | |
| }, | |
| { | |
| "title": "Presentation from 229198327", | |
| "url": "https://www.slideshare.net/slideshow/sacon-jim-hietala-zero-trust-architecture-from-hype-to-reality/229198327", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:24.541380" | |
| }, | |
| { | |
| "title": "Presentation from 216485074", | |
| "url": "https://www.slideshare.net/slideshow/zero-trust-model-presentation/216485074", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "zero trust architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:24.592541" | |
| }, | |
| { | |
| "title": "Presentation from 270782745", | |
| "url": "https://www.slideshare.net/slideshow/leveraging-ai-for-enhanced-cybersecurity/270782745", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:35.694852" | |
| }, | |
| { | |
| "title": "Presentation from 239308946", | |
| "url": "https://www.slideshare.net/slideshow/ai-cybersecurity/239308946", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:35.743806" | |
| }, | |
| { | |
| "title": "Presentation from 281425948", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-for-ai-and-genai-updated-pdf/281425948", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:35.803743" | |
| }, | |
| { | |
| "title": "Presentation from 263455905", | |
| "url": "https://www.slideshare.net/slideshow/ai-in-cybersecurity-2023/263455905", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:35.867204" | |
| }, | |
| { | |
| "title": "Presentation from 276191991", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-and-ai-a-comprehensive-guide/276191991", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:35.934885" | |
| }, | |
| { | |
| "title": "Presentation from 265302129", | |
| "url": "https://www.slideshare.net/slideshow/aipowered-cybersecurity-threatspdf/265302129", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:35.982180" | |
| }, | |
| { | |
| "title": "Presentation from 271030318", | |
| "url": "https://www.slideshare.net/slideshow/ai-in-cybersecurity-allendevaux-company-pdf/271030318", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:36.059616" | |
| }, | |
| { | |
| "title": "Presentation from 265936632", | |
| "url": "https://www.slideshare.net/slideshow/leading-cybersecurity-training-with-ai-in-kerala/265936632", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:36.110407" | |
| }, | |
| { | |
| "title": "Presentation from 267166210", | |
| "url": "https://www.slideshare.net/slideshow/ai-cybersecurity-pros-cons-ai-is-reshaping-cybersecurity/267166210", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:36.169067" | |
| }, | |
| { | |
| "title": "Presentation from 239309002", | |
| "url": "https://www.slideshare.net/slideshow/blackbox-testing-in-ai-cybersecurity/239309002", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:36.243528" | |
| }, | |
| { | |
| "title": "Presentation from 283843595", | |
| "url": "https://www.slideshare.net/slideshow/ai-cybersecurity-framework-for-the-quantum-era-pdf-c736/283843595", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:36.303363" | |
| }, | |
| { | |
| "title": "Presentation from 266188931", | |
| "url": "https://www.slideshare.net/slideshow/how-ai-is-revolutionizing-cybersecurity-1pdf/266188931", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:36.355976" | |
| }, | |
| { | |
| "title": "Presentation from 259692683", | |
| "url": "https://www.slideshare.net/slideshow/how-ai-can-help-with-cybersecurity/259692683", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:36.417788" | |
| }, | |
| { | |
| "title": "Presentation from 185253765", | |
| "url": "https://www.slideshare.net/slideshow/ai-and-the-impact-on-cybersecurity/185253765", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:36.483593" | |
| }, | |
| { | |
| "title": "Presentation from 162316228", | |
| "url": "https://www.slideshare.net/slideshow/ai-for-cybersecurity-162316228/162316228", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI cybersecurity", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:36.545142" | |
| }, | |
| { | |
| "title": "Presentation from 149818229", | |
| "url": "https://www.slideshare.net/slideshow/machine-learning-for-security/149818229", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.393277" | |
| }, | |
| { | |
| "title": "Presentation from 149291369", | |
| "url": "https://www.slideshare.net/slideshow/machine-learning-for-security-analysts-149291369/149291369", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.439121" | |
| }, | |
| { | |
| "title": "Presentation from 44526971", | |
| "url": "https://www.slideshare.net/slideshow/financial-security-and-machine-learning/44526971", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.481234" | |
| }, | |
| { | |
| "title": "Presentation from 190988681", | |
| "url": "https://www.slideshare.net/slideshow/machine-learning-implications-in-security/190988681", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.529589" | |
| }, | |
| { | |
| "title": "Presentation from 1814548", | |
| "url": "https://www.slideshare.net/slideshow/computer-security-using-machine-learning-1814548/1814548", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.583711" | |
| }, | |
| { | |
| "title": "Presentation from 75087457", | |
| "url": "https://www.slideshare.net/slideshow/machine-learning-in-cyber-security-domain/75087457", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.636798" | |
| }, | |
| { | |
| "title": "Presentation from 246138998", | |
| "url": "https://www.slideshare.net/slideshow/machine-learning-in-computer-security/246138998", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.683752" | |
| }, | |
| { | |
| "title": "Presentation from 198126937", | |
| "url": "https://www.slideshare.net/slideshow/security-of-machine-learning/198126937", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.748766" | |
| }, | |
| { | |
| "title": "Presentation from 114967870", | |
| "url": "https://www.slideshare.net/slideshow/machine-learning-in-cyber-security/114967870", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.788245" | |
| }, | |
| { | |
| "title": "Presentation from 101870144", | |
| "url": "https://www.slideshare.net/slideshow/security-and-privacy-of-machine-learning/101870144", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.850860" | |
| }, | |
| { | |
| "title": "Presentation from 174520109", | |
| "url": "https://www.slideshare.net/slideshow/data-compression-data-security-and-machine-learning/174520109", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.896661" | |
| }, | |
| { | |
| "title": "Presentation from 248628491", | |
| "url": "https://www.slideshare.net/slideshow/ai-security-security-machine-learning-deep-learning-computer-vision-security/248628491", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.941768" | |
| }, | |
| { | |
| "title": "Presentation from 81355518", | |
| "url": "https://www.slideshare.net/slideshow/enhance-security-domain-with-machine-learning/81355518", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:47.992636" | |
| }, | |
| { | |
| "title": "Presentation from 130002222", | |
| "url": "https://www.slideshare.net/slideshow/security-automation-and-machine-learning/130002222", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:48.033179" | |
| }, | |
| { | |
| "title": "Presentation from 62354620", | |
| "url": "https://www.slideshare.net/slideshow/machine-learning-security-detect-atypical-behaviour-in-logs-62354620/62354620", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "machine learning security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:48.075419" | |
| }, | |
| { | |
| "title": "Presentation from 259244201", | |
| "url": "https://www.slideshare.net/slideshow/the-impact-of-gpt-on-the-workplace/259244201", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.357704" | |
| }, | |
| { | |
| "title": "Presentation from 261888221", | |
| "url": "https://www.slideshare.net/slideshow/how-do-openai-gpt-models-work-misconceptions-and-tips-for-developers/261888221", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.424097" | |
| }, | |
| { | |
| "title": "Presentation from 261116169", | |
| "url": "https://www.slideshare.net/slideshow/openai-gpt-in-depth-questions-and-misconceptions/261116169", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.470773" | |
| }, | |
| { | |
| "title": "Presentation from 273905269", | |
| "url": "https://www.slideshare.net/slideshow/exploring-openai-models-strengths-and-weaknesses/273905269", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.514553" | |
| }, | |
| { | |
| "title": "Presentation from 281316618", | |
| "url": "https://www.slideshare.net/slideshow/ai-coding-assistants-test-automation-a-simplified-suitability-analysis/281316618", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.564746" | |
| }, | |
| { | |
| "title": "Presentation from 282872616", | |
| "url": "https://www.slideshare.net/slideshow/newmind-ai-journal-monthly-chronicles-august-2025/282872616", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.617425" | |
| }, | |
| { | |
| "title": "Presentation from 283722107", | |
| "url": "https://www.slideshare.net/slideshow/scale-your-content-with-custom-ai-tools-by-victoria-olsina-custom-gpts/283722107", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.655503" | |
| }, | |
| { | |
| "title": "Presentation from 279397520", | |
| "url": "https://www.slideshare.net/slideshow/is-generative-ai-the-new-future-of-salesforce-and-how-does-it-impact-your-business/279397520", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.722902" | |
| }, | |
| { | |
| "title": "Presentation from 283396927", | |
| "url": "https://www.slideshare.net/slideshow/spotting_genuine_ai_automation_for_small_business-pptx/283396927", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.769379" | |
| }, | |
| { | |
| "title": "Presentation from 284277020", | |
| "url": "https://www.slideshare.net/slideshow/generative-ai-deep-dive-architectures-mechanics-and-future-applications/284277020", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.806686" | |
| }, | |
| { | |
| "title": "Presentation from 270021808", | |
| "url": "https://www.slideshare.net/slideshow/uipath-community-day-krakow-devs4devs-conference/270021808", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.860690" | |
| }, | |
| { | |
| "title": "Presentation from 282296554", | |
| "url": "https://www.slideshare.net/slideshow/openai-gpt-5-launch-highlights-and-features/282296554", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.905393" | |
| }, | |
| { | |
| "title": "Presentation from 282920504", | |
| "url": "https://www.slideshare.net/slideshow/prompt-gpt-5-like-a-pro-practical-guide-pdf-pdf/282920504", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:30:59.964615" | |
| }, | |
| { | |
| "title": "Presentation from 280776716", | |
| "url": "https://www.slideshare.net/slideshow/azure-ai-foundry-the-ai-app-and-agent-factory/280776716", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:00.042169" | |
| }, | |
| { | |
| "title": "Presentation from 266913132", | |
| "url": "https://www.slideshare.net/slideshow/transforming-pmo-success-with-ai-discover-oneplan-strategic-portfolio-work-management-platform-webinar-21mar24pdf/266913132", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GPT enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:00.093495" | |
| }, | |
| { | |
| "title": "Presentation from 269523727", | |
| "url": "https://www.slideshare.net/slideshow/a-beginner-s-guide-to-generative-ai-for-business/269523727", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.267424" | |
| }, | |
| { | |
| "title": "Presentation from 270410479", | |
| "url": "https://www.slideshare.net/slideshow/strategic-steps-to-success-generative-ai-for-business-it-leaders-pptx/270410479", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.370747" | |
| }, | |
| { | |
| "title": "Presentation from 265513191", | |
| "url": "https://www.slideshare.net/slideshow/generative-ai-business-transformation/265513191", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.434892" | |
| }, | |
| { | |
| "title": "Presentation from 262033987", | |
| "url": "https://www.slideshare.net/slideshow/top-5-ways-generative-ai-and-rpa-helps-business-scale-up-your-business-process-with-the-gen-ai-rpa/262033987", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.488788" | |
| }, | |
| { | |
| "title": "Presentation from 275814839", | |
| "url": "https://www.slideshare.net/slideshow/why-generative-ai-is-essential-for-business-growth/275814839", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.543374" | |
| }, | |
| { | |
| "title": "Presentation from 283676052", | |
| "url": "https://www.slideshare.net/slideshow/agentic-ai-vs-generative-ai-key-distinctions-and-business-value/283676052", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.593523" | |
| }, | |
| { | |
| "title": "Presentation from 267200076", | |
| "url": "https://www.slideshare.net/slideshow/potential-of-ai-generative-ai-in-business-learnings-and-insights/267200076", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.638868" | |
| }, | |
| { | |
| "title": "Presentation from 266025011", | |
| "url": "https://www.slideshare.net/slideshow/generative-ai-genai-business-and-intellectual-property/266025011", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.685717" | |
| }, | |
| { | |
| "title": "Presentation from 265165227", | |
| "url": "https://www.slideshare.net/slideshow/business-talk-harnessing-generative-ai-with-data-analytics-maturity/265165227", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.742348" | |
| }, | |
| { | |
| "title": "Presentation from 269942104", | |
| "url": "https://www.slideshare.net/slideshow/harnessing-the-power-of-generative-ai-for-your-business-by-siddharth-pdf/269942104", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.781651" | |
| }, | |
| { | |
| "title": "Presentation from 269602290", | |
| "url": "https://www.slideshare.net/slideshow/skybuffer-ai-advanced-conversational-and-generative-ai-solution-on-sap-business-technology-platform-btp/269602290", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.829005" | |
| }, | |
| { | |
| "title": "Presentation from 277270942", | |
| "url": "https://www.slideshare.net/slideshow/harnessing-iot-business-process-services-and-generative-ai-for-innovation/277270942", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.891196" | |
| }, | |
| { | |
| "title": "Presentation from 273119465", | |
| "url": "https://www.slideshare.net/slideshow/unlock-innovation-with-aws-generative-ai-transform-your-business-with-scalable-ai-driven-solutions-for-enhanced-customer-engagement-improved-decision-making-and-operational-efficiency/273119465", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:11.951371" | |
| }, | |
| { | |
| "title": "Presentation from 281820105", | |
| "url": "https://www.slideshare.net/slideshow/how-generative-ai-is-powering-business-transformation/281820105", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:12.002053" | |
| }, | |
| { | |
| "title": "Presentation from 270610767", | |
| "url": "https://www.slideshare.net/slideshow/the-era-of-generative-ai-astute-business/270610767", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "generative AI business", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:12.045328" | |
| }, | |
| { | |
| "title": "Presentation from 270281636", | |
| "url": "https://www.slideshare.net/slideshow/ai-2030-academy-modern-data-management-and-enterprise-ai-strategy/270281636", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.217805" | |
| }, | |
| { | |
| "title": "Presentation from 237345545", | |
| "url": "https://www.slideshare.net/slideshow/creating-an-enterprise-ai-strategy-237345545/237345545", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.263744" | |
| }, | |
| { | |
| "title": "Presentation from 249860597", | |
| "url": "https://www.slideshare.net/slideshow/rahat-yasir-enterprise-data-ai-strategy-platform-designing/249860597", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.473729" | |
| }, | |
| { | |
| "title": "Presentation from 107171877", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-artificial-intelligence-strategy/107171877", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.552624" | |
| }, | |
| { | |
| "title": "Presentation from 267749698", | |
| "url": "https://www.slideshare.net/slideshow/how-to-create-an-effective-enterprise-ai-strategy-pdf/267749698", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.609454" | |
| }, | |
| { | |
| "title": "Presentation from 251045895", | |
| "url": "https://www.slideshare.net/slideshow/25-tips-on-how-a-perfect-ai-strategy-can-help-your-business/251045895", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.658586" | |
| }, | |
| { | |
| "title": "Presentation from 250230485", | |
| "url": "https://www.slideshare.net/slideshow/rahat-yasir-enterprise-data-ai-strategy-platform-designing-250230485/250230485", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.705489" | |
| }, | |
| { | |
| "title": "Presentation from 250796278", | |
| "url": "https://www.slideshare.net/slideshow/pillars-of-ai-strategy/250796278", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.747625" | |
| }, | |
| { | |
| "title": "Presentation from 278014333", | |
| "url": "https://www.slideshare.net/slideshow/vady-enterprise-ai-real-time-insights-predictive-intelligence-for-smarter-strategy/278014333", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.803706" | |
| }, | |
| { | |
| "title": "Presentation from 283098030", | |
| "url": "https://www.slideshare.net/slideshow/jim-kaskade-resume-artificial-intelligence-ai-082825-docx/283098030", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.840897" | |
| }, | |
| { | |
| "title": "Presentation from 265324317", | |
| "url": "https://www.slideshare.net/slideshow/generative-ai-guide-to-business-implementation/265324317", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.894914" | |
| }, | |
| { | |
| "title": "Presentation from 284283391", | |
| "url": "https://www.slideshare.net/slideshow/jim-kaskade-resume-artificial-intelligence-111725-pdf/284283391", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.939428" | |
| }, | |
| { | |
| "title": "Presentation from 284087154", | |
| "url": "https://www.slideshare.net/slideshow/8-best-ai-courses-for-chief-executing-officers-ceos-to-future-proof-your-career-in-2025-pptx/284087154", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:23.990495" | |
| }, | |
| { | |
| "title": "Presentation from 282929318", | |
| "url": "https://www.slideshare.net/slideshow/applying-agentic-ai-in-enterprise-automation/282929318", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:24.055727" | |
| }, | |
| { | |
| "title": "Presentation from 96188578", | |
| "url": "https://www.slideshare.net/slideshow/gamifying-strategy-enterprise-ai-use-cases-on-agentbased-simulation-and-reinforcement-learning/96188578", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AI strategy enterprise", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:24.106648" | |
| }, | |
| { | |
| "title": "Presentation from 280616023", | |
| "url": "https://www.slideshare.net/slideshow/solulab-com-llm-use-cases-and-applications/280616023", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.435917" | |
| }, | |
| { | |
| "title": "Presentation from 269494536", | |
| "url": "https://www.slideshare.net/slideshow/large-language-model-llm-and-it-s-geospatial-applications/269494536", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.485750" | |
| }, | |
| { | |
| "title": "Presentation from 266682165", | |
| "url": "https://www.slideshare.net/slideshow/gaurdrails-for-large-language-model-based-applications/266682165", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.550819" | |
| }, | |
| { | |
| "title": "Presentation from 261368477", | |
| "url": "https://www.slideshare.net/slideshow/building-and-deploying-llm-applications-with-apache-airflow/261368477", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.594763" | |
| }, | |
| { | |
| "title": "Presentation from 273622488", | |
| "url": "https://www.slideshare.net/slideshow/llm-agent-observability-lessons-learned-from-real-world-applications/273622488", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.643126" | |
| }, | |
| { | |
| "title": "Presentation from 274076949", | |
| "url": "https://www.slideshare.net/slideshow/increasing-the-accuracy-of-llm-applications-with-graph-based-rag_-practical-implementations-pdf/274076949", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.705037" | |
| }, | |
| { | |
| "title": "Presentation from 274077168", | |
| "url": "https://www.slideshare.net/slideshow/increasing-the-accuracy-of-llm-applications-with-graph-based-rag-practical-implementations-falkordb-at-google-cloud-experts-hub/274077168", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.742937" | |
| }, | |
| { | |
| "title": "Presentation from 280616027", | |
| "url": "https://www.slideshare.net/slideshow/solulab-com-comparison-of-large-language-models-the-ultimate-guide-1-pdf/280616027", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.801434" | |
| }, | |
| { | |
| "title": "Presentation from 280616024", | |
| "url": "https://www.slideshare.net/slideshow/solulab-com-create-custom-llms-for-enterprise-solutions-1-pdf/280616024", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.849568" | |
| }, | |
| { | |
| "title": "Presentation from 261796251", | |
| "url": "https://www.slideshare.net/slideshow/clicks2conversationspdf/261796251", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.900857" | |
| }, | |
| { | |
| "title": "Presentation from 272662438", | |
| "url": "https://www.slideshare.net/slideshow/best-practices-for-building-successful-llm-applications/272662438", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.942636" | |
| }, | |
| { | |
| "title": "Presentation from 269724242", | |
| "url": "https://www.slideshare.net/slideshow/exploring-llms-in-the-world-of-artificial-intelligence-ai-2-pdf/269724242", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:35.989079" | |
| }, | |
| { | |
| "title": "Presentation from 281651329", | |
| "url": "https://www.slideshare.net/slideshow/what-are-generative-al-models-a-deep-dive-blog-docx/281651329", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:36.042352" | |
| }, | |
| { | |
| "title": "Presentation from 263427009", | |
| "url": "https://www.slideshare.net/slideshow/use-case-patterns-for-llm-applications-1pdf/263427009", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:36.087360" | |
| }, | |
| { | |
| "title": "Presentation from 271857149", | |
| "url": "https://www.slideshare.net/slideshow/connector-corners-building-llm-applications-with-genai-activities/271857149", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "LLM applications", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:36.150591" | |
| }, | |
| { | |
| "title": "Presentation from 193563751", | |
| "url": "https://www.slideshare.net/slideshow/multi-cloud-security-architecture/193563751", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.418513" | |
| }, | |
| { | |
| "title": "Presentation from 232734409", | |
| "url": "https://www.slideshare.net/slideshow/cloud-security-architecture-a-different-approach/232734409", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.473484" | |
| }, | |
| { | |
| "title": "Presentation from 72206028", | |
| "url": "https://www.slideshare.net/slideshow/nist-cloud-computing-security-reference-architecture-800299/72206028", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.515152" | |
| }, | |
| { | |
| "title": "Presentation from 26365895", | |
| "url": "https://www.slideshare.net/slideshow/cloud-security-guide/26365895", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.570199" | |
| }, | |
| { | |
| "title": "Presentation from 279821468", | |
| "url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/279821468", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.613626" | |
| }, | |
| { | |
| "title": "Presentation from 281451917", | |
| "url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/281451917", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.667930" | |
| }, | |
| { | |
| "title": "Presentation from 280764015", | |
| "url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/280764015", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.711616" | |
| }, | |
| { | |
| "title": "Presentation from 277437734", | |
| "url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/277437734", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.760399" | |
| }, | |
| { | |
| "title": "Presentation from 276278106", | |
| "url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/276278106", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.818931" | |
| }, | |
| { | |
| "title": "Presentation from 81978797", | |
| "url": "https://www.slideshare.net/slideshow/sacon-cloud-security-architecture-moshe-ferber/81978797", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.871878" | |
| }, | |
| { | |
| "title": "Presentation from 279561726", | |
| "url": "https://www.slideshare.net/slideshow/cloud-to-edgeware-wireless-grid-applications-architecture-and-security-for-the-internet-of-things-lee-w-mcknight/279561726", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.906870" | |
| }, | |
| { | |
| "title": "Presentation from 59367012", | |
| "url": "https://www.slideshare.net/slideshow/take-it-to-the-cloud-the-evolution-of-security-architecture/59367012", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:47.978406" | |
| }, | |
| { | |
| "title": "Presentation from 274875729", | |
| "url": "https://www.slideshare.net/slideshow/full-download-cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl-pdf-docx/274875729", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:48.020241" | |
| }, | |
| { | |
| "title": "Presentation from 64961757", | |
| "url": "https://www.slideshare.net/slideshow/security-in-multi-cloud-data-storage-with-sic-architecture/64961757", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:48.068996" | |
| }, | |
| { | |
| "title": "Presentation from 170550816", | |
| "url": "https://www.slideshare.net/slideshow/understanding-the-determinants-of-security-and-privacy-in-cloud-computing-architecture/170550816", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud security architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:48.127542" | |
| }, | |
| { | |
| "title": "Presentation from 78096461", | |
| "url": "https://www.slideshare.net/slideshow/azure-security-78096461/78096461", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.478939" | |
| }, | |
| { | |
| "title": "Presentation from 72703635", | |
| "url": "https://www.slideshare.net/slideshow/azure-security-center-72703635/72703635", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.531349" | |
| }, | |
| { | |
| "title": "Presentation from 88395266", | |
| "url": "https://www.slideshare.net/slideshow/azure-security-architecture-88395266/88395266", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.576218" | |
| }, | |
| { | |
| "title": "Presentation from 133846922", | |
| "url": "https://www.slideshare.net/slideshow/azure-security-and-compliance/133846922", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.625608" | |
| }, | |
| { | |
| "title": "Presentation from 136361188", | |
| "url": "https://www.slideshare.net/slideshow/azure-security-fundamentals-136361188/136361188", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.670320" | |
| }, | |
| { | |
| "title": "Presentation from 269972862", | |
| "url": "https://www.slideshare.net/slideshow/azure-security-infrastructure-overview-pptx/269972862", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.735675" | |
| }, | |
| { | |
| "title": "Presentation from 81029695", | |
| "url": "https://www.slideshare.net/slideshow/microsoft-azure-security-overview/81029695", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.791203" | |
| }, | |
| { | |
| "title": "Presentation from 258153971", | |
| "url": "https://www.slideshare.net/slideshow/azure-security-258153971/258153971", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.828868" | |
| }, | |
| { | |
| "title": "Presentation from 76690361", | |
| "url": "https://www.slideshare.net/slideshow/azure-cloud-security/76690361", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.874724" | |
| }, | |
| { | |
| "title": "Presentation from 94631808", | |
| "url": "https://www.slideshare.net/slideshow/global-azure-bootcamp-2018-azure-security-center/94631808", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.914717" | |
| }, | |
| { | |
| "title": "Presentation from 248322371", | |
| "url": "https://www.slideshare.net/slideshow/what-is-microsoft-azure-securitymicrosoft-azure-security/248322371", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:31:59.961762" | |
| }, | |
| { | |
| "title": "Presentation from 24258865", | |
| "url": "https://www.slideshare.net/slideshow/windows-azure-security-compliance/24258865", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:00.007905" | |
| }, | |
| { | |
| "title": "Presentation from 81707637", | |
| "url": "https://www.slideshare.net/slideshow/microsoft-azure-security-overview-microsoft-css-dallas-azure/81707637", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:00.069952" | |
| }, | |
| { | |
| "title": "Presentation from 270779929", | |
| "url": "https://www.slideshare.net/slideshow/azure-security-compass-v1-1-presentation-pptx/270779929", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:00.105618" | |
| }, | |
| { | |
| "title": "Presentation from 149283748", | |
| "url": "https://www.slideshare.net/slideshow/azure-security-center-zero-to-hero/149283748", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "Azure security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:00.162504" | |
| }, | |
| { | |
| "title": "Presentation from 76279416", | |
| "url": "https://www.slideshare.net/slideshow/aws-security-best-practices-terraform-aws-security/76279416", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.402117" | |
| }, | |
| { | |
| "title": "Presentation from 125029823", | |
| "url": "https://www.slideshare.net/slideshow/aws-security-best-practices-125029823/125029823", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.455070" | |
| }, | |
| { | |
| "title": "Presentation from 130677843", | |
| "url": "https://www.slideshare.net/slideshow/aws-security-best-practices-130677843/130677843", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.502336" | |
| }, | |
| { | |
| "title": "Presentation from 73590801", | |
| "url": "https://www.slideshare.net/slideshow/aws-security-best-practices-march-2017/73590801", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.548391" | |
| }, | |
| { | |
| "title": "Presentation from 72059547", | |
| "url": "https://www.slideshare.net/slideshow/security-best-practices-aws-awsome-day-management-track/72059547", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.598379" | |
| }, | |
| { | |
| "title": "Presentation from 61453144", | |
| "url": "https://www.slideshare.net/slideshow/cloud-security-best-practices-in-aws-by-ankit-giri/61453144", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.647591" | |
| }, | |
| { | |
| "title": "Presentation from 86038172", | |
| "url": "https://www.slideshare.net/slideshow/gdpr-top-10-aws-security-and-compliance-best-practices/86038172", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.697364" | |
| }, | |
| { | |
| "title": "Presentation from 46781085", | |
| "url": "https://www.slideshare.net/slideshow/aws-security-best-practices-for-effective-threat-detection-and-response/46781085", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.766641" | |
| }, | |
| { | |
| "title": "Presentation from 92175305", | |
| "url": "https://www.slideshare.net/slideshow/migrating-and-managing-security-in-an-aws-environment-best-practices/92175305", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.812210" | |
| }, | |
| { | |
| "title": "Presentation from 73183383", | |
| "url": "https://www.slideshare.net/slideshow/aws-cyber-security-best-practices/73183383", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.864643" | |
| }, | |
| { | |
| "title": "Presentation from 66629804", | |
| "url": "https://www.slideshare.net/slideshow/aws-security-strategy-66629804/66629804", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.909045" | |
| }, | |
| { | |
| "title": "Presentation from 181072016", | |
| "url": "https://www.slideshare.net/slideshow/eks-security-best-practices-181072016/181072016", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:11.949597" | |
| }, | |
| { | |
| "title": "Presentation from 29275486", | |
| "url": "https://www.slideshare.net/slideshow/security-best-practices-on-aws-cloud/29275486", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:12.006080" | |
| }, | |
| { | |
| "title": "Presentation from 126482222", | |
| "url": "https://www.slideshare.net/slideshow/cloud-security-fundamentals-webinar/126482222", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:12.053729" | |
| }, | |
| { | |
| "title": "Presentation from 276592234", | |
| "url": "https://www.slideshare.net/slideshow/cloud-security-best-practices-documentation/276592234", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "AWS security best practices", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:12.104178" | |
| }, | |
| { | |
| "title": "Presentation from 52844353", | |
| "url": "https://www.slideshare.net/slideshow/multi-cloud-strategy/52844353", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:23.443244" | |
| }, | |
| { | |
| "title": "Presentation from 125571766", | |
| "url": "https://www.slideshare.net/slideshow/multicloud-strategy-for-enterprise/125571766", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:23.490562" | |
| }, | |
| { | |
| "title": "Presentation from 250617664", | |
| "url": "https://www.slideshare.net/slideshow/multi-cloud-strategy-250617664/250617664", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:23.545832" | |
| }, | |
| { | |
| "title": "Presentation from 284494586", | |
| "url": "https://www.slideshare.net/slideshow/hybrid-cloud-vs-multi-cloud-strategy-2025/284494586", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:23.596106" | |
| }, | |
| { | |
| "title": "Presentation from 282868348", | |
| "url": "https://www.slideshare.net/slideshow/multi-cloud-strategy-a-complete-guide-for-multi-cloud-adoption/282868348", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:23.788058" | |
| }, | |
| { | |
| "title": "Presentation from 119059110", | |
| "url": "https://www.slideshare.net/slideshow/why-a-multicloud-strategy-is-essential/119059110", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:23.830712" | |
| }, | |
| { | |
| "title": "Presentation from 125497350", | |
| "url": "https://www.slideshare.net/slideshow/multicloud-strategy/125497350", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:23.873266" | |
| }, | |
| { | |
| "title": "Presentation from 87436834", | |
| "url": "https://www.slideshare.net/slideshow/got-a-multicloud-strategy-how-rightscale-cmp-helps/87436834", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:23.935899" | |
| }, | |
| { | |
| "title": "Presentation from 269780805", | |
| "url": "https://www.slideshare.net/slideshow/hybrid-cloud-vs-multi-cloud-which-strategy-is-right-for-your-business/269780805", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:23.974838" | |
| }, | |
| { | |
| "title": "Presentation from 28538546", | |
| "url": "https://www.slideshare.net/slideshow/from-the-network-to-multi-cloud/28538546", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:24.021782" | |
| }, | |
| { | |
| "title": "Presentation from 262879815", | |
| "url": "https://www.slideshare.net/slideshow/how-powerful-is-a-multicloud-strategy-everything-you-need-to-know-enterprise-wired/262879815", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:24.070381" | |
| }, | |
| { | |
| "title": "Presentation from 259202469", | |
| "url": "https://www.slideshare.net/slideshow/why-do-organizations-choose-a-multicloud-strategy-259202469/259202469", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:24.116575" | |
| }, | |
| { | |
| "title": "Presentation from 249549962", | |
| "url": "https://www.slideshare.net/slideshow/reinventing-and-simplifying-data-management-for-a-successful-hybrid-and-multicloud-strategy/249549962", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:24.167199" | |
| }, | |
| { | |
| "title": "Presentation from 245031667", | |
| "url": "https://www.slideshare.net/slideshow/which-postgresql-is-right-for-your-multi-cloud-strategy-p2/245031667", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:24.217058" | |
| }, | |
| { | |
| "title": "Presentation from 259252333", | |
| "url": "https://www.slideshare.net/slideshow/why-do-organizations-choose-a-multicloud-strategy-259252333/259252333", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "multi-cloud strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:24.262816" | |
| }, | |
| { | |
| "title": "Presentation from 280150201", | |
| "url": "https://www.slideshare.net/slideshow/vmware-to-cloud-migration-security-solutions-pdf-471a/280150201", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:35.496140" | |
| }, | |
| { | |
| "title": "Presentation from 256349929", | |
| "url": "https://www.slideshare.net/slideshow/security-concerns-of-cloud-migration-and-its-implications-on-cloudenabled-business-transformationpdf/256349929", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:35.536691" | |
| }, | |
| { | |
| "title": "Presentation from 281272483", | |
| "url": "https://www.slideshare.net/slideshow/your-cloud-data-migration-security-checklist-before-during-and-after/281272483", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:35.604937" | |
| }, | |
| { | |
| "title": "Presentation from 270860325", | |
| "url": "https://www.slideshare.net/slideshow/vmware-to-cloud-migration-security-solutions-pdf/270860325", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:35.675821" | |
| }, | |
| { | |
| "title": "Presentation from 239093090", | |
| "url": "https://www.slideshare.net/slideshow/migration-of-virtual-machine-to-improve-the-security-in-cloud-computing/239093090", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:35.731590" | |
| }, | |
| { | |
| "title": "Presentation from 269897242", | |
| "url": "https://www.slideshare.net/slideshow/cloud-data-migration-challenges-navigating-security-and-technicalities-with-a-smile/269897242", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:35.784302" | |
| }, | |
| { | |
| "title": "Presentation from 274539350", | |
| "url": "https://www.slideshare.net/slideshow/vmware-to-cloud-migration-security-solutions-for-a-seamless-transition-pdf/274539350", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:35.827405" | |
| }, | |
| { | |
| "title": "Presentation from 49219466", | |
| "url": "https://www.slideshare.net/slideshow/cloud-migration-application-modernization-and-security/49219466", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:35.874207" | |
| }, | |
| { | |
| "title": "Presentation from 79423612", | |
| "url": "https://www.slideshare.net/slideshow/solidit-services-english/79423612", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:35.919131" | |
| }, | |
| { | |
| "title": "Presentation from 274242448", | |
| "url": "https://www.slideshare.net/slideshow/what-are-managed-cloud-migration-services-and-why-are-they-important/274242448", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:35.989606" | |
| }, | |
| { | |
| "title": "Presentation from 255599914", | |
| "url": "https://www.slideshare.net/slideshow/advantages-of-partnering-with-a-cloud-migration-consulting-service/255599914", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:36.032254" | |
| }, | |
| { | |
| "title": "Presentation from 275207107", | |
| "url": "https://www.slideshare.net/slideshow/what-are-cloud-migration-services-and-why-are-they-important/275207107", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:36.095515" | |
| }, | |
| { | |
| "title": "Presentation from 166886859", | |
| "url": "https://www.slideshare.net/slideshow/2019-0827-sikkerhetsfestivalencloudsecurityinfinitystonespresenten/166886859", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:36.142881" | |
| }, | |
| { | |
| "title": "Presentation from 254215444", | |
| "url": "https://www.slideshare.net/slideshow/successive-cloud-migration-servicespdf/254215444", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:36.185692" | |
| }, | |
| { | |
| "title": "Presentation from 257555749", | |
| "url": "https://www.slideshare.net/slideshow/cloud-migrationpdf-257555749/257555749", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cloud migration security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:36.240165" | |
| }, | |
| { | |
| "title": "Presentation from 120402479", | |
| "url": "https://www.slideshare.net/slideshow/strategydigital-transformation/120402479", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:47.527692" | |
| }, | |
| { | |
| "title": "Presentation from 237570825", | |
| "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-237570825/237570825", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:47.587773" | |
| }, | |
| { | |
| "title": "Presentation from 66727606", | |
| "url": "https://www.slideshare.net/slideshow/digital-strategy-66727606/66727606", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:47.637198" | |
| }, | |
| { | |
| "title": "Presentation from 272286870", | |
| "url": "https://www.slideshare.net/slideshow/business-digital-transformation-strategy/272286870", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:47.684555" | |
| }, | |
| { | |
| "title": "Presentation from 271204931", | |
| "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-vision/271204931", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:47.733419" | |
| }, | |
| { | |
| "title": "Presentation from 148990096", | |
| "url": "https://www.slideshare.net/slideshow/workshop-digital-transformation-strategy-digital-roadmap-training/148990096", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:47.791256" | |
| }, | |
| { | |
| "title": "Presentation from 253754137", | |
| "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-mit-id-innovation/253754137", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:47.835136" | |
| }, | |
| { | |
| "title": "Presentation from 209855993", | |
| "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-certificate/209855993", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:47.882852" | |
| }, | |
| { | |
| "title": "Presentation from 236098455", | |
| "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-236098455/236098455", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:47.934319" | |
| }, | |
| { | |
| "title": "Presentation from 249761976", | |
| "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-powerpoint-presentation-slides-249761976/249761976", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:47.987005" | |
| }, | |
| { | |
| "title": "Presentation from 267089239", | |
| "url": "https://www.slideshare.net/slideshow/bigdatadigital-transformation-and-strategy/267089239", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:48.031237" | |
| }, | |
| { | |
| "title": "Presentation from 251959906", | |
| "url": "https://www.slideshare.net/slideshow/digital-strategy-and-transformation/251959906", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:48.095122" | |
| }, | |
| { | |
| "title": "Presentation from 279704330", | |
| "url": "https://www.slideshare.net/slideshow/strategy-in-the-digital-age-mastering-digital-transformation-1st-edition-michael-lenox/279704330", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:48.141089" | |
| }, | |
| { | |
| "title": "Presentation from 76362712", | |
| "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-framework-by-exmckinsey/76362712", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:48.189328" | |
| }, | |
| { | |
| "title": "Presentation from 265223821", | |
| "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-framework-tools/265223821", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "digital transformation strategy", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:48.254585" | |
| }, | |
| { | |
| "title": "Presentation from 30808256", | |
| "url": "https://www.slideshare.net/slideshow/canvassed-in-a-business-it-strategy-canvas-baseline-roadmap/30808256", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:59.533211" | |
| }, | |
| { | |
| "title": "Presentation from 248478719", | |
| "url": "https://www.slideshare.net/slideshow/it-simplification-assessment-strategy-alignment-business-roadmap-evaluating/248478719", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:59.592153" | |
| }, | |
| { | |
| "title": "Presentation from 56014983", | |
| "url": "https://www.slideshare.net/slideshow/define-an-it-strategy-and-roadmap/56014983", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:59.641864" | |
| }, | |
| { | |
| "title": "Presentation from 123549089", | |
| "url": "https://www.slideshare.net/slideshow/how-to-build-a-strategic-roadmap-and-execute-using-agile-planning/123549089", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:59.706383" | |
| }, | |
| { | |
| "title": "Presentation from 86072050", | |
| "url": "https://www.slideshare.net/slideshow/big-data-consulting-slideshare-v04-86072050/86072050", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:59.758169" | |
| }, | |
| { | |
| "title": "Presentation from 45856722", | |
| "url": "https://www.slideshare.net/slideshow/augmenting-it-strategy-with-enterprise-architecture-assessment/45856722", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:59.808222" | |
| }, | |
| { | |
| "title": "Presentation from 265069198", | |
| "url": "https://www.slideshare.net/slideshow/mega-solution-footprint-v5pptx/265069198", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:32:59.844933" | |
| }, | |
| { | |
| "title": "Presentation from 56878088", | |
| "url": "https://www.slideshare.net/slideshow/product-roadmaps-tips-on-how-to-create-and-manage-roadmaps/56878088", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:00.072108" | |
| }, | |
| { | |
| "title": "Presentation from 8274555", | |
| "url": "https://www.slideshare.net/slideshow/mcc11-developing-a-digital-strategy-amp-roadmap/8274555", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:00.123039" | |
| }, | |
| { | |
| "title": "Presentation from 32665708", | |
| "url": "https://www.slideshare.net/slideshow/girlguiding-digital-strategy-201415/32665708", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:00.171822" | |
| }, | |
| { | |
| "title": "Presentation from 250619976", | |
| "url": "https://www.slideshare.net/slideshow/the-product-journey-roadmaps-are-dead-long-live-roadmaps/250619976", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:00.358624" | |
| }, | |
| { | |
| "title": "Presentation from 77383920", | |
| "url": "https://www.slideshare.net/slideshow/how-to-define-your-product-roadmap-by-dan-olsen/77383920", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:00.857981" | |
| }, | |
| { | |
| "title": "Presentation from 234338113", | |
| "url": "https://www.slideshare.net/slideshow/building-digital-strategy-roadmap-for-digital-transformation-complete-deck/234338113", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:00.903021" | |
| }, | |
| { | |
| "title": "Presentation from 49944496", | |
| "url": "https://www.slideshare.net/slideshow/pragmatic-guide-for-preparing-great-product-roadmap/49944496", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:00.965282" | |
| }, | |
| { | |
| "title": "Presentation from 106387292", | |
| "url": "https://www.slideshare.net/slideshow/digital-transformation-roadmap-16th-july-2018-v11-106387292/106387292", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "IT strategy roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:01.024102" | |
| }, | |
| { | |
| "title": "Presentation from 29970260", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-29970260/29970260", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.343543" | |
| }, | |
| { | |
| "title": "Presentation from 39372369", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-39372369/39372369", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.393133" | |
| }, | |
| { | |
| "title": "Presentation from 3155735", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-3155735/3155735", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.440387" | |
| }, | |
| { | |
| "title": "Presentation from 50952403", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-draftpresentablenotesvikasgroverv01a-50952403/50952403", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.476838" | |
| }, | |
| { | |
| "title": "Presentation from 63984606", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-security-architecture-63984606/63984606", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.544535" | |
| }, | |
| { | |
| "title": "Presentation from 26339996", | |
| "url": "https://www.slideshare.net/slideshow/ea-presentation-togaf/26339996", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.595016" | |
| }, | |
| { | |
| "title": "Presentation from 121938463", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-governance-121938463/121938463", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.638541" | |
| }, | |
| { | |
| "title": "Presentation from 84295707", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-enterprise-architecture-consulting-services-enterprise-architecture-consulting/84295707", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.699496" | |
| }, | |
| { | |
| "title": "Presentation from 271237620", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-and-enterprise-structure-pptx/271237620", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.753296" | |
| }, | |
| { | |
| "title": "Presentation from 32113666", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-32113666/32113666", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.803467" | |
| }, | |
| { | |
| "title": "Presentation from 69587204", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-frameworks-69587204/69587204", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.841638" | |
| }, | |
| { | |
| "title": "Presentation from 262419655", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-2f31/262419655", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.892154" | |
| }, | |
| { | |
| "title": "Presentation from 31023634", | |
| "url": "https://www.slideshare.net/slideshow/the-ultimate-tools-to-manage-isit-and-avoid-the-bush-telegraph/31023634", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.939042" | |
| }, | |
| { | |
| "title": "Presentation from 271237660", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-architecture-and-enterprise-structure-pptx-6a4d/271237660", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:12.982503" | |
| }, | |
| { | |
| "title": "Presentation from 68891998", | |
| "url": "https://www.slideshare.net/slideshow/enterprise-security-architecture-by-arnab-chattopadhayay-bikash/68891998", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "enterprise architecture", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:13.019368" | |
| }, | |
| { | |
| "title": "Presentation from 281321143", | |
| "url": "https://www.slideshare.net/slideshow/technology-roadmap-an-important-aspect-of-technology-management/281321143", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.357872" | |
| }, | |
| { | |
| "title": "Presentation from 30976348", | |
| "url": "https://www.slideshare.net/slideshow/technology-roadmap-06022014/30976348", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.403167" | |
| }, | |
| { | |
| "title": "Presentation from 61125806", | |
| "url": "https://www.slideshare.net/slideshow/technology-roadmap-highlightsreport-2015/61125806", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.446981" | |
| }, | |
| { | |
| "title": "Presentation from 30140805", | |
| "url": "https://www.slideshare.net/slideshow/mei-2014-technology-roadmap/30140805", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.496628" | |
| }, | |
| { | |
| "title": "Presentation from 280396010", | |
| "url": "https://www.slideshare.net/slideshow/iea-technology-roadmaps-technology-roadmap-wind-energy-oecd/280396010", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.554203" | |
| }, | |
| { | |
| "title": "Presentation from 280398759", | |
| "url": "https://www.slideshare.net/slideshow/technology-roadmap-solar-thermal-electricity-oecd/280398759", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.597094" | |
| }, | |
| { | |
| "title": "Presentation from 63461432", | |
| "url": "https://www.slideshare.net/slideshow/technology-developing-and-implementing-a-roadmap/63461432", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.652038" | |
| }, | |
| { | |
| "title": "Presentation from 11480985", | |
| "url": "https://www.slideshare.net/slideshow/sap-technology-roadmap-dec-2011-update/11480985", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.720710" | |
| }, | |
| { | |
| "title": "Presentation from 76546051", | |
| "url": "https://www.slideshare.net/slideshow/does-your-technology-roadmap-have-a-financial-roadmap/76546051", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.772921" | |
| }, | |
| { | |
| "title": "Presentation from 280351019", | |
| "url": "https://www.slideshare.net/slideshow/iea-technology-roadmap-smart-grids-oecd-iea/280351019", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.817707" | |
| }, | |
| { | |
| "title": "Presentation from 280396656", | |
| "url": "https://www.slideshare.net/slideshow/technology-roadmap-lowcarbon-technology-for-the-indian-cement-industry-oecd/280396656", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.862529" | |
| }, | |
| { | |
| "title": "Presentation from 280398769", | |
| "url": "https://www.slideshare.net/slideshow/technology-roadmap-solar-photovoltaic-energy-2014-edition-oecd/280398769", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.908776" | |
| }, | |
| { | |
| "title": "Presentation from 276531279", | |
| "url": "https://www.slideshare.net/slideshow/technology-roadmap-solar-photovoltaic-energy-2014-edition-edition-oecd/276531279", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:24.960951" | |
| }, | |
| { | |
| "title": "Presentation from 280351021", | |
| "url": "https://www.slideshare.net/slideshow/iea-technology-roadmap-geothermal-heat-and-power-oecd-iea/280351021", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:25.000983" | |
| }, | |
| { | |
| "title": "Presentation from 5395802", | |
| "url": "https://www.slideshare.net/slideshow/national-space-technology-roadmap-workshop-presentation/5395802", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "technology roadmap", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:25.059321" | |
| }, | |
| { | |
| "title": "Presentation from 99520391", | |
| "url": "https://www.slideshare.net/slideshow/gdpr-compliance-99520391/99520391", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.270971" | |
| }, | |
| { | |
| "title": "Presentation from 249186947", | |
| "url": "https://www.slideshare.net/slideshow/accelerating-the-path-to-gdpr-compliance/249186947", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.338350" | |
| }, | |
| { | |
| "title": "Presentation from 78641253", | |
| "url": "https://www.slideshare.net/slideshow/presentation-gdpr-how-to-ensure-compliance/78641253", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.390097" | |
| }, | |
| { | |
| "title": "Presentation from 89183906", | |
| "url": "https://www.slideshare.net/slideshow/establishing-sustainable-gdpr-compliance-89183906/89183906", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.435360" | |
| }, | |
| { | |
| "title": "Presentation from 78261191", | |
| "url": "https://www.slideshare.net/slideshow/five-strategies-for-gdpr-compliance/78261191", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.488263" | |
| }, | |
| { | |
| "title": "Presentation from 78929113", | |
| "url": "https://www.slideshare.net/slideshow/dcvast-gdpr-compliance-one-pager/78929113", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.538001" | |
| }, | |
| { | |
| "title": "Presentation from 262027285", | |
| "url": "https://www.slideshare.net/slideshow/gdpr-compliance-kpis-and-kris/262027285", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.587309" | |
| }, | |
| { | |
| "title": "Presentation from 76935466", | |
| "url": "https://www.slideshare.net/slideshow/iab-europes-gdpr-compliance-primer/76935466", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.629288" | |
| }, | |
| { | |
| "title": "Presentation from 272105061", | |
| "url": "https://www.slideshare.net/slideshow/archiving-and-gdpr-compliance-presentation-dvm-gdpr-sap-pdf/272105061", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.692384" | |
| }, | |
| { | |
| "title": "Presentation from 115602823", | |
| "url": "https://www.slideshare.net/slideshow/office-365-features-for-gdpr-compliance-webinar/115602823", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.752500" | |
| }, | |
| { | |
| "title": "Presentation from 102697596", | |
| "url": "https://www.slideshare.net/slideshow/gdpr-software-general-data-protection-regulation-gdpr-dashboard/102697596", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.809694" | |
| }, | |
| { | |
| "title": "Presentation from 98258400", | |
| "url": "https://www.slideshare.net/slideshow/gdpr-compliance-with-wso2-identity-server-98258400/98258400", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.850722" | |
| }, | |
| { | |
| "title": "Presentation from 73164127", | |
| "url": "https://www.slideshare.net/slideshow/gdpr-compliance-presentation-for-consulegis-lawyers-network/73164127", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.913247" | |
| }, | |
| { | |
| "title": "Presentation from 247762024", | |
| "url": "https://www.slideshare.net/slideshow/qubole-gdpr-security-and-compliance-whitepaper/247762024", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:36.964830" | |
| }, | |
| { | |
| "title": "Presentation from 80211772", | |
| "url": "https://www.slideshare.net/slideshow/convince-your-board-ten-steps-to-gdpr-compliance/80211772", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "GDPR compliance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:37.007411" | |
| }, | |
| { | |
| "title": "Presentation from 279570271", | |
| "url": "https://www.slideshare.net/slideshow/iso-27001-certification-iso-27001-certification-4fc1/279570271", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.229726" | |
| }, | |
| { | |
| "title": "Presentation from 12892342", | |
| "url": "https://www.slideshare.net/slideshow/iso-27001-12892342/12892342", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.278566" | |
| }, | |
| { | |
| "title": "Presentation from 256207597", | |
| "url": "https://www.slideshare.net/slideshow/iso-27001-awarenesstransitionpptx/256207597", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.350818" | |
| }, | |
| { | |
| "title": "Presentation from 279639045", | |
| "url": "https://www.slideshare.net/slideshow/iso-iec-27001-awareness_presentation-pptx/279639045", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.392107" | |
| }, | |
| { | |
| "title": "Presentation from 7269377", | |
| "url": "https://www.slideshare.net/slideshow/iso-27001-7269377/7269377", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.431194" | |
| }, | |
| { | |
| "title": "Presentation from 252008941", | |
| "url": "https://www.slideshare.net/slideshow/2022-webinar-iso-27001-certificationpdf/252008941", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.483873" | |
| }, | |
| { | |
| "title": "Presentation from 238276266", | |
| "url": "https://www.slideshare.net/slideshow/iso-27001-auditsguide/238276266", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.531812" | |
| }, | |
| { | |
| "title": "Presentation from 12671067", | |
| "url": "https://www.slideshare.net/slideshow/iso-27001-10apr2006/12671067", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.583138" | |
| }, | |
| { | |
| "title": "Presentation from 239372003", | |
| "url": "https://www.slideshare.net/slideshow/iso-27001-239372003/239372003", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.629444" | |
| }, | |
| { | |
| "title": "Presentation from 33864016", | |
| "url": "https://www.slideshare.net/slideshow/iso-27001-implementationdocumentationmandatorylist/33864016", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.677777" | |
| }, | |
| { | |
| "title": "Presentation from 62890558", | |
| "url": "https://www.slideshare.net/slideshow/what-is-iso-27001-isms-62890558/62890558", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.745398" | |
| }, | |
| { | |
| "title": "Presentation from 53265783", | |
| "url": "https://www.slideshare.net/slideshow/it-security-iso-27001/53265783", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.794146" | |
| }, | |
| { | |
| "title": "Presentation from 253340176", | |
| "url": "https://www.slideshare.net/slideshow/iso-survey-2021-iso-27001pdf/253340176", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.862482" | |
| }, | |
| { | |
| "title": "Presentation from 254487937", | |
| "url": "https://www.slideshare.net/slideshow/iso-270012022-introduction/254487937", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.912637" | |
| }, | |
| { | |
| "title": "Presentation from 26200502", | |
| "url": "https://www.slideshare.net/slideshow/iso-270012013/26200502", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "ISO 27001", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:33:48.958089" | |
| }, | |
| { | |
| "title": "Presentation from 85816125", | |
| "url": "https://www.slideshare.net/slideshow/cyber-risk-management-85816125/85816125", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.174034" | |
| }, | |
| { | |
| "title": "Presentation from 86365441", | |
| "url": "https://www.slideshare.net/slideshow/risk-management-approach-to-cyber-security/86365441", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.237715" | |
| }, | |
| { | |
| "title": "Presentation from 272072114", | |
| "url": "https://www.slideshare.net/slideshow/cyber-security-risk-management-strategies-for-saudi-arabia-pdf/272072114", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.285439" | |
| }, | |
| { | |
| "title": "Presentation from 280976724", | |
| "url": "https://www.slideshare.net/slideshow/transdisciplinary-perspectives-on-risk-management-and-cyber-intelligence-1st-edition-luisa-dall-acqua/280976724", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.334196" | |
| }, | |
| { | |
| "title": "Presentation from 279178190", | |
| "url": "https://www.slideshare.net/slideshow/transdisciplinary-perspectives-on-risk-management-and-cyber-intelligence-1st-edition-luisa-dallacqua/279178190", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.378163" | |
| }, | |
| { | |
| "title": "Presentation from 69699271", | |
| "url": "https://www.slideshare.net/slideshow/cyber-liability-insurance-risk-management-and-preparation/69699271", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.419922" | |
| }, | |
| { | |
| "title": "Presentation from 58688451", | |
| "url": "https://www.slideshare.net/slideshow/archer-users-group-southern-risk-council-2016-enterprise-risk-management-and-cyber-security/58688451", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.463735" | |
| }, | |
| { | |
| "title": "Presentation from 90501725", | |
| "url": "https://www.slideshare.net/slideshow/third-party-risk-management-with-cyber-threat-intelligence/90501725", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.504537" | |
| }, | |
| { | |
| "title": "Presentation from 73257031", | |
| "url": "https://www.slideshare.net/slideshow/cyber-security-vendor-risk-management-supply-chain-risk-management/73257031", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.548306" | |
| }, | |
| { | |
| "title": "Presentation from 282839231", | |
| "url": "https://www.slideshare.net/slideshow/file-08-cyber-risk-management-ict-5418-cyber-crime-and-cyber-terrorism-pptx/282839231", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.589859" | |
| }, | |
| { | |
| "title": "Presentation from 76951143", | |
| "url": "https://www.slideshare.net/slideshow/cyber-risk-management-in-2017-challenges-recommendations-76951143/76951143", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.627927" | |
| }, | |
| { | |
| "title": "Presentation from 117820390", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-cyber-risk-management-for-banks-financial-institutions/117820390", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.673556" | |
| }, | |
| { | |
| "title": "Presentation from 36884035", | |
| "url": "https://www.slideshare.net/slideshow/cyber-risk-management/36884035", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.726716" | |
| }, | |
| { | |
| "title": "Presentation from 70012744", | |
| "url": "https://www.slideshare.net/slideshow/cyber-risk-management-in-2017-challenges-recommendations/70012744", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.803623" | |
| }, | |
| { | |
| "title": "Presentation from 243625807", | |
| "url": "https://www.slideshare.net/slideshow/cyber-security-services-risk-management-solutions-ampcus-inc-243625807/243625807", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "cyber risk management", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:00.846982" | |
| }, | |
| { | |
| "title": "Presentation from 64116600", | |
| "url": "https://www.slideshare.net/slideshow/securitygovernance/64116600", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:11.849591" | |
| }, | |
| { | |
| "title": "Presentation from 78957257", | |
| "url": "https://www.slideshare.net/slideshow/cloud-security-governance-78957257/78957257", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:11.913290" | |
| }, | |
| { | |
| "title": "Presentation from 81168738", | |
| "url": "https://www.slideshare.net/slideshow/information-security-governance-and-strategy/81168738", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:11.962210" | |
| }, | |
| { | |
| "title": "Presentation from 255127663", | |
| "url": "https://www.slideshare.net/slideshow/information-security-governance-framework/255127663", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.027669" | |
| }, | |
| { | |
| "title": "Presentation from 239680101", | |
| "url": "https://www.slideshare.net/slideshow/cyber-security-governance/239680101", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.081263" | |
| }, | |
| { | |
| "title": "Presentation from 63926821", | |
| "url": "https://www.slideshare.net/slideshow/big-data-security-and-governance/63926821", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.136627" | |
| }, | |
| { | |
| "title": "Presentation from 2848176", | |
| "url": "https://www.slideshare.net/slideshow/security-governance-isp-eng-2848176/2848176", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.197142" | |
| }, | |
| { | |
| "title": "Presentation from 248302214", | |
| "url": "https://www.slideshare.net/slideshow/an-information-security-governance-framework/248302214", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.252322" | |
| }, | |
| { | |
| "title": "Presentation from 81726908", | |
| "url": "https://www.slideshare.net/slideshow/information-security-governance-and-strategy-3/81726908", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.311068" | |
| }, | |
| { | |
| "title": "Presentation from 23974559", | |
| "url": "https://www.slideshare.net/slideshow/journal-december-2012/23974559", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.367082" | |
| }, | |
| { | |
| "title": "Presentation from 81855272", | |
| "url": "https://www.slideshare.net/slideshow/information-security-governance-2a/81855272", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.414547" | |
| }, | |
| { | |
| "title": "Presentation from 81855635", | |
| "url": "https://www.slideshare.net/slideshow/information-security-governance-2a-81855635/81855635", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.467214" | |
| }, | |
| { | |
| "title": "Presentation from 12806723", | |
| "url": "https://www.slideshare.net/slideshow/effective-it-security-governance-leo-de-sousa/12806723", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.520285" | |
| }, | |
| { | |
| "title": "Presentation from 39539511", | |
| "url": "https://www.slideshare.net/slideshow/security-governance-primer/39539511", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.571328" | |
| }, | |
| { | |
| "title": "Presentation from 77890469", | |
| "url": "https://www.slideshare.net/slideshow/information-security-in-public-governance/77890469", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "security governance", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:12.621314" | |
| }, | |
| { | |
| "title": "Presentation from 265982988", | |
| "url": "https://www.slideshare.net/slideshow/top-5-urgent-reasons-for-siem-implementation-allendevauxpdf/265982988", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:24.355420" | |
| }, | |
| { | |
| "title": "Presentation from 10590169", | |
| "url": "https://www.slideshare.net/slideshow/misti-infosec-2010-siem-implementation/10590169", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:24.433359" | |
| }, | |
| { | |
| "title": "Presentation from 82386670", | |
| "url": "https://www.slideshare.net/slideshow/gdpr-9-step-siem-implementation-checklist/82386670", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:24.516909" | |
| }, | |
| { | |
| "title": "Presentation from 8721331", | |
| "url": "https://www.slideshare.net/slideshow/five-best-and-five-worst-practices-for-siem-by-dr-anton-chuvakin-8721331/8721331", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:24.580295" | |
| }, | |
| { | |
| "title": "Presentation from 8721324", | |
| "url": "https://www.slideshare.net/slideshow/five-best-and-five-worst-practices-for-siem-by-dr-anton-chuvakin/8721324", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:24.643049" | |
| }, | |
| { | |
| "title": "Presentation from 59267489", | |
| "url": "https://www.slideshare.net/slideshow/why-so-many-siem-implmentations-fail/59267489", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:24.695124" | |
| }, | |
| { | |
| "title": "Presentation from 122722414", | |
| "url": "https://www.slideshare.net/slideshow/which-generation-of-siem/122722414", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:24.744735" | |
| }, | |
| { | |
| "title": "Presentation from 47721367", | |
| "url": "https://www.slideshare.net/slideshow/surelog-largescale-siem-implementation-in-a-distributed-it-security-world/47721367", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:24.804051" | |
| }, | |
| { | |
| "title": "Presentation from 254143533", | |
| "url": "https://www.slideshare.net/slideshow/isol532-final-project-assignmentproject-assignmentthis-prdocx/254143533", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:25.236496" | |
| }, | |
| { | |
| "title": "Presentation from 33420158", | |
| "url": "https://www.slideshare.net/slideshow/siem-for-beginners/33420158", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:25.291072" | |
| }, | |
| { | |
| "title": "Presentation from 254143525", | |
| "url": "https://www.slideshare.net/slideshow/ism3013-final-project-assignment-project-assignment-docx/254143525", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:25.343978" | |
| }, | |
| { | |
| "title": "Presentation from 75051640", | |
| "url": "https://www.slideshare.net/slideshow/apply-big-data-and-data-lake-for-processing-security-data-collections/75051640", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:25.433678" | |
| }, | |
| { | |
| "title": "Presentation from 264350308", | |
| "url": "https://www.slideshare.net/slideshow/exploring-critical-vulnerabilities-in-siem-implementation-and-soc-service-procurement-an-indepth-analysis-of-highrisk-scenarios/264350308", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:25.488766" | |
| }, | |
| { | |
| "title": "Presentation from 78590806", | |
| "url": "https://www.slideshare.net/slideshow/security-meetup-scotland-august-2017-deconstructing-siem/78590806", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:25.554127" | |
| }, | |
| { | |
| "title": "Presentation from 284613369", | |
| "url": "https://www.slideshare.net/slideshow/managed-splunk-partner-vs-in-house-cost-risk-value-comparison/284613369", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SIEM implementation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:25.599130" | |
| }, | |
| { | |
| "title": "Presentation from 276376589", | |
| "url": "https://www.slideshare.net/slideshow/understanding-endpoint-detection-and-response-edr/276376589", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:36.650757" | |
| }, | |
| { | |
| "title": "Presentation from 273403604", | |
| "url": "https://www.slideshare.net/slideshow/the-future-of-endpoint-detection-and-response-edr-trends-to-watch/273403604", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:36.720472" | |
| }, | |
| { | |
| "title": "Presentation from 273114064", | |
| "url": "https://www.slideshare.net/slideshow/the-importance-of-edr-security-in-modern-cyber-defense/273114064", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:36.774992" | |
| }, | |
| { | |
| "title": "Presentation from 234873558", | |
| "url": "https://www.slideshare.net/slideshow/mcafee-mcafee-active-response-mar-endpoint-detection-response-edr/234873558", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:36.845379" | |
| }, | |
| { | |
| "title": "Presentation from 251626062", | |
| "url": "https://www.slideshare.net/slideshow/xdr-solution-company-in-usapptx/251626062", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:36.896635" | |
| }, | |
| { | |
| "title": "Presentation from 276386330", | |
| "url": "https://www.slideshare.net/slideshow/strengthen-endpoint-security-with-seqrite-edr/276386330", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:36.988514" | |
| }, | |
| { | |
| "title": "Presentation from 273887201", | |
| "url": "https://www.slideshare.net/slideshow/opentext-mxdr-advanced-edr-agent-with-autonomous-next-gen-protection/273887201", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:37.038237" | |
| }, | |
| { | |
| "title": "Presentation from 57183518", | |
| "url": "https://www.slideshare.net/slideshow/panda-adaptive-defense-360/57183518", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:37.093666" | |
| }, | |
| { | |
| "title": "Presentation from 279695970", | |
| "url": "https://www.slideshare.net/slideshow/understanding-endpoint-security-in-a-soc/279695970", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:37.149331" | |
| }, | |
| { | |
| "title": "Presentation from 77150440", | |
| "url": "https://www.slideshare.net/slideshow/maturing-endpoint-security-5-key-considerations/77150440", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:37.197858" | |
| }, | |
| { | |
| "title": "Presentation from 86381079", | |
| "url": "https://www.slideshare.net/slideshow/edr-vs-siem-the-fight-is-on/86381079", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:37.255433" | |
| }, | |
| { | |
| "title": "Presentation from 267282982", | |
| "url": "https://www.slideshare.net/slideshow/stay-ahead-in-2024-with-these-cybersecuritypdf/267282982", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:37.301548" | |
| }, | |
| { | |
| "title": "Presentation from 262859993", | |
| "url": "https://www.slideshare.net/slideshow/tidying-up-your-nest-validating-attck-technique-coverage-using-edr-telemetry/262859993", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:37.363024" | |
| }, | |
| { | |
| "title": "Presentation from 236312406", | |
| "url": "https://www.slideshare.net/slideshow/managed-end-point-security/236312406", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:37.408563" | |
| }, | |
| { | |
| "title": "Presentation from 272430482", | |
| "url": "https://www.slideshare.net/slideshow/key-features-of-endpoint-security-tools-presentation/272430482", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "EDR endpoint detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:37.472312" | |
| }, | |
| { | |
| "title": "Presentation from 250663705", | |
| "url": "https://www.slideshare.net/slideshow/managed-detection-and-response-mdr-whitepaper/250663705", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:48.741229" | |
| }, | |
| { | |
| "title": "Presentation from 251044856", | |
| "url": "https://www.slideshare.net/slideshow/what-is-managed-detection-and-response-mdr-security-services/251044856", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:48.799775" | |
| }, | |
| { | |
| "title": "Presentation from 264315547", | |
| "url": "https://www.slideshare.net/slideshow/understanding-managed-detection-and-response-mdr-proarchs-approach/264315547", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:48.854630" | |
| }, | |
| { | |
| "title": "Presentation from 116947143", | |
| "url": "https://www.slideshare.net/slideshow/critical-capabilities-for-mdr-services-what-to-know-before-you-buy/116947143", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:48.922320" | |
| }, | |
| { | |
| "title": "Presentation from 282084528", | |
| "url": "https://www.slideshare.net/slideshow/top-10-mdr-tools-in-2025-boost-your-cyber-defence/282084528", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:49.016151" | |
| }, | |
| { | |
| "title": "Presentation from 276013274", | |
| "url": "https://www.slideshare.net/slideshow/mdr-as-a-service-proactive-threat-detection-response-pptx/276013274", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:49.070612" | |
| }, | |
| { | |
| "title": "Presentation from 284129547", | |
| "url": "https://www.slideshare.net/slideshow/managed-detection-anmanaged-detection-and-responsed/284129547", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:49.186323" | |
| }, | |
| { | |
| "title": "Presentation from 270340331", | |
| "url": "https://www.slideshare.net/slideshow/comparing-mdr-to-traditional-cybersecurity-approaches-pptx/270340331", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:49.246454" | |
| }, | |
| { | |
| "title": "Presentation from 238781172", | |
| "url": "https://www.slideshare.net/slideshow/managed-detection-and-response-selective-outsourcing-for-understaffed-socs-and-the-platforms-that-enable-mdr-services/238781172", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:49.294752" | |
| }, | |
| { | |
| "title": "Presentation from 78750593", | |
| "url": "https://www.slideshare.net/slideshow/netwatcher-customer-overview/78750593", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:49.356878" | |
| }, | |
| { | |
| "title": "Presentation from 95662374", | |
| "url": "https://www.slideshare.net/slideshow/a-case-for-managed-detection-and-response/95662374", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:49.402228" | |
| }, | |
| { | |
| "title": "Presentation from 258246148", | |
| "url": "https://www.slideshare.net/slideshow/cyber-security-companies-uk/258246148", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:49.485185" | |
| }, | |
| { | |
| "title": "Presentation from 250054999", | |
| "url": "https://www.slideshare.net/slideshow/managed-detection-and-response-analyst-report/250054999", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:49.536842" | |
| }, | |
| { | |
| "title": "Presentation from 119818967", | |
| "url": "https://www.slideshare.net/slideshow/infocyte-q3-partner-update/119818967", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "MDR managed detection", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:34:49.594307" | |
| }, | |
| { | |
| "title": "Presentation from 251485851", | |
| "url": "https://www.slideshare.net/slideshow/extended-detection-and-response-xdran-overhyped-product-category-with-ultimate-security-potential/251485851", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.075693" | |
| }, | |
| { | |
| "title": "Presentation from 275382112", | |
| "url": "https://www.slideshare.net/slideshow/kaspersky-next-xdr-expert-product-presentation-1909-en-pptx/275382112", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.141900" | |
| }, | |
| { | |
| "title": "Presentation from 267378203", | |
| "url": "https://www.slideshare.net/slideshow/cybersecurity-leaders-guide-to-xdr-for-business/267378203", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.199180" | |
| }, | |
| { | |
| "title": "Presentation from 283062942", | |
| "url": "https://www.slideshare.net/slideshow/strengthening-security-with-extended-detection-and-response-docx/283062942", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.266715" | |
| }, | |
| { | |
| "title": "Presentation from 251595542", | |
| "url": "https://www.slideshare.net/slideshow/2022-apisecuremonitoring-your-apis-for-attacks-using-siem-versus-xdr/251595542", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.335251" | |
| }, | |
| { | |
| "title": "Presentation from 272862807", | |
| "url": "https://www.slideshare.net/slideshow/understanding-xdr-solutions-the-future-of-cybersecurity/272862807", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.385994" | |
| }, | |
| { | |
| "title": "Presentation from 274591312", | |
| "url": "https://www.slideshare.net/slideshow/maximizing-soc-benefits-with-xdr-a-game-changer-for-cybersecurity/274591312", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.459666" | |
| }, | |
| { | |
| "title": "Presentation from 270659578", | |
| "url": "https://www.slideshare.net/slideshow/top-10-cybersecurity-trends-in-2024-benefits-challenges-insider-market-research/270659578", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.529240" | |
| }, | |
| { | |
| "title": "Presentation from 282575659", | |
| "url": "https://www.slideshare.net/slideshow/cloud-native-ai-powered-xdr-drives-endpoint-security-platforms-market-toward-us-23-9-billion-by-2030/282575659", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.585036" | |
| }, | |
| { | |
| "title": "Presentation from 269416276", | |
| "url": "https://www.slideshare.net/slideshow/what-are-the-latest-trends-in-endpoint-security-for-2024-2dbe/269416276", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.630456" | |
| }, | |
| { | |
| "title": "Presentation from 277509200", | |
| "url": "https://www.slideshare.net/slideshow/empowering-cyber-resilience-with-seqrite-xdr-the-future-of-data-privacy-threat-detection/277509200", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.735149" | |
| }, | |
| { | |
| "title": "Presentation from 246645180", | |
| "url": "https://www.slideshare.net/slideshow/microsoft-defender-and-azure-sentinel/246645180", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.777105" | |
| }, | |
| { | |
| "title": "Presentation from 280464073", | |
| "url": "https://www.slideshare.net/slideshow/xdr-buyer-guide-by-infopercept-cybersecurity/280464073", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.843722" | |
| }, | |
| { | |
| "title": "Presentation from 274615294", | |
| "url": "https://www.slideshare.net/slideshow/proactive-protection-and-real-time-threat-response/274615294", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.888477" | |
| }, | |
| { | |
| "title": "Presentation from 262424624", | |
| "url": "https://www.slideshare.net/slideshow/why-should-organizations-consider-extended-detection-and-response-xdr/262424624", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "XDR security", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:01.956137" | |
| }, | |
| { | |
| "title": "Presentation from 280610952", | |
| "url": "https://www.slideshare.net/slideshow/enhancing-cyber-defense-with-security-orchestration-and-automation-soar-pdf/280610952", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:12.857711" | |
| }, | |
| { | |
| "title": "Presentation from 251630629", | |
| "url": "https://www.slideshare.net/slideshow/soar-platformpptx/251630629", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:12.943432" | |
| }, | |
| { | |
| "title": "Presentation from 250900642", | |
| "url": "https://www.slideshare.net/slideshow/optimize-your-cyber-security-with-soar-tools/250900642", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:12.993457" | |
| }, | |
| { | |
| "title": "Presentation from 250266792", | |
| "url": "https://www.slideshare.net/slideshow/ug-soar-22sep21/250266792", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.071519" | |
| }, | |
| { | |
| "title": "Presentation from 115009387", | |
| "url": "https://www.slideshare.net/slideshow/splunk-phantom-soar-roundtable/115009387", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.133164" | |
| }, | |
| { | |
| "title": "Presentation from 251142089", | |
| "url": "https://www.slideshare.net/slideshow/understanding-soar-security/251142089", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.239197" | |
| }, | |
| { | |
| "title": "Presentation from 238931481", | |
| "url": "https://www.slideshare.net/slideshow/security-orchestration-automation-and-response-soar-market/238931481", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.294370" | |
| }, | |
| { | |
| "title": "Presentation from 136244078", | |
| "url": "https://www.slideshare.net/slideshow/automating-cybersecurity/136244078", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.340599" | |
| }, | |
| { | |
| "title": "Presentation from 260379674", | |
| "url": "https://www.slideshare.net/slideshow/three-things-we-see-fix-in-every-struggling-security-automation-project/260379674", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.405282" | |
| }, | |
| { | |
| "title": "Presentation from 277826584", | |
| "url": "https://www.slideshare.net/slideshow/soar-security-systems-revolutionizing-cybersecurity-through-orchestration-and-automation/277826584", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.453710" | |
| }, | |
| { | |
| "title": "Presentation from 230330814", | |
| "url": "https://www.slideshare.net/slideshow/journey-to-the-center-of-security-operations/230330814", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.516758" | |
| }, | |
| { | |
| "title": "Presentation from 260379741", | |
| "url": "https://www.slideshare.net/slideshow/how-to-reduce-the-financial-impact-of-security-incidents-by-90-or-more-with-smart-soar/260379741", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.570041" | |
| }, | |
| { | |
| "title": "Presentation from 122800602", | |
| "url": "https://www.slideshare.net/slideshow/introducing-siemplify-v425-security-orchestration-automation-and-response-soar-platform/122800602", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.614718" | |
| }, | |
| { | |
| "title": "Presentation from 218391449", | |
| "url": "https://www.slideshare.net/slideshow/transform-your-security-operations-with-security-automation-and-orchestration/218391449", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.665398" | |
| }, | |
| { | |
| "title": "Presentation from 137941992", | |
| "url": "https://www.slideshare.net/slideshow/secops-ir-and-forensic-workflows-python-security-automation/137941992", | |
| "description": "", | |
| "author": "", | |
| "views": 0, | |
| "search_query": "SOAR automation", | |
| "source": "slideshare", | |
| "harvested_at": "2025-12-17T02:35:13.717268" | |
| } | |
| ] | |
| } |