Kraft102's picture
Update backend source
34367da verified
{
"timestamp": "2025-12-17T02:35:17.955056",
"stats": {
"searches": 33,
"presentations_found": 495,
"saved_to_neo4j": 494,
"errors": 0
},
"presentations": [
{
"title": "Presentation from 163240780",
"url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-163240780/163240780",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:34.830211"
},
{
"title": "Presentation from 251309910",
"url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-policy-and-practice-251309910/251309910",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.027254"
},
{
"title": "Presentation from 251859392",
"url": "https://www.slideshare.net/slideshow/reimagining-ot-cybersecurity-strategy-deloitte/251859392",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.091458"
},
{
"title": "Presentation from 222108263",
"url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-222108263/222108263",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.176437"
},
{
"title": "Presentation from 249933437",
"url": "https://www.slideshare.net/slideshow/cybersecurity-strategybrieftoitc-final17apr2015/249933437",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.323823"
},
{
"title": "Presentation from 259183825",
"url": "https://www.slideshare.net/slideshow/defenceindepth-cybersecurity-strategy/259183825",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.374559"
},
{
"title": "Presentation from 190989896",
"url": "https://www.slideshare.net/slideshow/singapore-cybersecurity-strategy-and-legislation-for-smu-law-school-2019/190989896",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.428785"
},
{
"title": "Presentation from 114007918",
"url": "https://www.slideshare.net/slideshow/singapore-cybersecurity-strategy-and-legislation-2018/114007918",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.483336"
},
{
"title": "Presentation from 43476233",
"url": "https://www.slideshare.net/slideshow/cybersecurity-rmf-strategy/43476233",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.549737"
},
{
"title": "Presentation from 49382155",
"url": "https://www.slideshare.net/slideshow/guidelines-for-smart-grid-cybersecurity-strategy/49382155",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.666104"
},
{
"title": "Presentation from 269548883",
"url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-building-a-balanced-scorecard-with-effective-kpis/269548883",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.721759"
},
{
"title": "Presentation from 259536297",
"url": "https://www.slideshare.net/slideshow/overview-of-national-cybersecurity-strategy-2023pdf/259536297",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.810036"
},
{
"title": "Presentation from 138603686",
"url": "https://www.slideshare.net/slideshow/insights-to-building-an-effective-industrial-cybersecurity-strategy-for-your-organization/138603686",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.871751"
},
{
"title": "Presentation from 258512407",
"url": "https://www.slideshare.net/slideshow/secureweb3-developing-a-comprehensive-cybersecurity-strategy-for-the-decentralized-future/258512407",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:35.943080"
},
{
"title": "Presentation from 253074630",
"url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-law-and-policy-group-assignment/253074630",
"description": "",
"author": "",
"views": 0,
"search_query": "cybersecurity strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:36.000739"
},
{
"title": "Presentation from 272155619",
"url": "https://www.slideshare.net/slideshow/modern-security-operations-building-and-leading-modern-soc/272155619",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:47.873137"
},
{
"title": "Presentation from 270020253",
"url": "https://www.slideshare.net/slideshow/introduction-to-security-operations-center-soc/270020253",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:47.950797"
},
{
"title": "Presentation from 280154718",
"url": "https://www.slideshare.net/slideshow/security-operations-center-soc-cisco-certificate/280154718",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.032413"
},
{
"title": "Presentation from 4678952",
"url": "https://www.slideshare.net/slideshow/rothke-secure360-building-a-security-operations-center-soc/4678952",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.098631"
},
{
"title": "Presentation from 74478214",
"url": "https://www.slideshare.net/slideshow/building-a-nextgeneration-security-operations-center-soc/74478214",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.157532"
},
{
"title": "Presentation from 24691810",
"url": "https://www.slideshare.net/slideshow/rothke-rsa-2012-building-a-security-operations-center-soc/24691810",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.214929"
},
{
"title": "Presentation from 150245309",
"url": "https://www.slideshare.net/slideshow/cyber-security-operations-center-csoc/150245309",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.269624"
},
{
"title": "Presentation from 88105697",
"url": "https://www.slideshare.net/slideshow/security-operation-centers/88105697",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.347875"
},
{
"title": "Presentation from 267023230",
"url": "https://www.slideshare.net/slideshow/future-of-soc-more-security-less-operations/267023230",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.398577"
},
{
"title": "Presentation from 253358381",
"url": "https://www.slideshare.net/slideshow/enterprise-security-leadership-creating-a-world-class-security-operations-center-soc/253358381",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.463254"
},
{
"title": "Presentation from 97285609",
"url": "https://www.slideshare.net/slideshow/what-is-security-operations-centre-types-need-and-benefits-of-soc/97285609",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.524979"
},
{
"title": "Presentation from 78688363",
"url": "https://www.slideshare.net/slideshow/manoj-purandare-strategy-towards-an-effective-security-operations-centre-soc/78688363",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.588371"
},
{
"title": "Presentation from 269287424",
"url": "https://www.slideshare.net/slideshow/implementing-security-operations-center-soc-strategies-for-success-in-2024/269287424",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.651271"
},
{
"title": "Presentation from 273459049",
"url": "https://www.slideshare.net/slideshow/security-operations-center-soc-by-aadit-technologies/273459049",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.724969"
},
{
"title": "Presentation from 78688196",
"url": "https://www.slideshare.net/slideshow/manoj-purandare-stratergy-towards-an-effective-soc/78688196",
"description": "",
"author": "",
"views": 0,
"search_query": "SOC security operations",
"source": "slideshare",
"harvested_at": "2025-12-17T02:28:48.771778"
},
{
"title": "Presentation from 272583551",
"url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-cti-lifecycle-and-cti-framework/272583551",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:00.457336"
},
{
"title": "Presentation from 281734837",
"url": "https://www.slideshare.net/slideshow/threat-intelligence-cti-blue-teams-pptx/281734837",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:00.521563"
},
{
"title": "Presentation from 68988770",
"url": "https://www.slideshare.net/slideshow/security-strategy-and-tactic-with-cyber-threat-intelligence-cti-68988770/68988770",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:00.584677"
},
{
"title": "Presentation from 280950116",
"url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-staying-ahead-of-attacks-doc/280950116",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:00.651130"
},
{
"title": "Presentation from 236250782",
"url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-la-rilevanza-del-dato-per-il-business/236250782",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:00.708485"
},
{
"title": "Presentation from 81134400",
"url": "https://www.slideshare.net/slideshow/gabor-munk-cti-and-information-sharing/81134400",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:00.770708"
},
{
"title": "Presentation from 247219270",
"url": "https://www.slideshare.net/slideshow/welcome-to-the-world-of-cyber-threat-intelligence/247219270",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:00.831763"
},
{
"title": "Presentation from 249451706",
"url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-information-to-insight/249451706",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:00.919887"
},
{
"title": "Presentation from 270927433",
"url": "https://www.slideshare.net/slideshow/the-disclosure-dilemma-ensuring-defense/270927433",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:00.975087"
},
{
"title": "Presentation from 273094626",
"url": "https://www.slideshare.net/slideshow/socradar-s-2024-cyber-threat-intelligence-solution/273094626",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:01.041774"
},
{
"title": "Presentation from 141297630",
"url": "https://www.slideshare.net/slideshow/effective-threat-hunting-with-tactical-threat-intelligence/141297630",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:01.089769"
},
{
"title": "Presentation from 249967976",
"url": "https://www.slideshare.net/slideshow/cti-ant-hunting-for-chinese-threat-intelligence/249967976",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:01.149304"
},
{
"title": "Presentation from 65718513",
"url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-what-do-we-want-the-incident-response-and-technology-risk-management-perspectives/65718513",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:01.302066"
},
{
"title": "Presentation from 256799647",
"url": "https://www.slideshare.net/slideshow/stop-tilting-at-windmills-3-key-lessons-that-cti-teams-should-learn-from-the-past-sans-cti-summit-2020/256799647",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:01.357734"
},
{
"title": "Presentation from 69859022",
"url": "https://www.slideshare.net/slideshow/security-strategy-and-tactic-with-cyber-threat-intelligence-cti-69859022/69859022",
"description": "",
"author": "",
"views": 0,
"search_query": "threat intelligence CTI",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:01.416572"
},
{
"title": "Presentation from 61866350",
"url": "https://www.slideshare.net/slideshow/incident-response-61866350/61866350",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:12.809425"
},
{
"title": "Presentation from 67359492",
"url": "https://www.slideshare.net/slideshow/incident-response-67359492/67359492",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:12.991477"
},
{
"title": "Presentation from 251184906",
"url": "https://www.slideshare.net/slideshow/incident-response-methodology/251184906",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:13.158047"
},
{
"title": "Presentation from 164038375",
"url": "https://www.slideshare.net/slideshow/incident-response-164038375/164038375",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:13.239500"
},
{
"title": "Presentation from 253758024",
"url": "https://www.slideshare.net/slideshow/incident-response-security/253758024",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:13.350357"
},
{
"title": "Presentation from 258495954",
"url": "https://www.slideshare.net/slideshow/incident-response-vs-incident-detectionpdf/258495954",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:13.536925"
},
{
"title": "Presentation from 23593938",
"url": "https://www.slideshare.net/slideshow/proactive-incident-response/23593938",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:13.907852"
},
{
"title": "Presentation from 146275477",
"url": "https://www.slideshare.net/slideshow/incident-response-overview/146275477",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:14.488860"
},
{
"title": "Presentation from 1476119",
"url": "https://www.slideshare.net/slideshow/malwareincidentresponse/1476119",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:14.573206"
},
{
"title": "Presentation from 106759454",
"url": "https://www.slideshare.net/slideshow/incident-response-in-cloudvandanaverma/106759454",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:14.683819"
},
{
"title": "Presentation from 91059409",
"url": "https://www.slideshare.net/slideshow/incident-response-system-irs/91059409",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:14.819876"
},
{
"title": "Presentation from 129018068",
"url": "https://www.slideshare.net/slideshow/incident-response-process-129018068/129018068",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:14.890492"
},
{
"title": "Presentation from 1733422",
"url": "https://www.slideshare.net/slideshow/incident-response-swimlanes/1733422",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:15.010592"
},
{
"title": "Presentation from 277217362",
"url": "https://www.slideshare.net/slideshow/incident-response-lifecyclepresentation-pptx/277217362",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:15.163852"
},
{
"title": "Presentation from 73022623",
"url": "https://www.slideshare.net/slideshow/sample-incident-response-plan/73022623",
"description": "",
"author": "",
"views": 0,
"search_query": "incident response",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:15.207858"
},
{
"title": "Presentation from 272708349",
"url": "https://www.slideshare.net/slideshow/nis2-directive-readiness-compliance-challenges-and-recommendations-docx/272708349",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:26.799092"
},
{
"title": "Presentation from 283086014",
"url": "https://www.slideshare.net/slideshow/nis2-event-directive-information-overview/283086014",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:26.869369"
},
{
"title": "Presentation from 281242029",
"url": "https://www.slideshare.net/slideshow/nis2-compliance-for-msps-roadmap-benefits-cybersecurity-trends-2025-guide/281242029",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:27.074260"
},
{
"title": "Presentation from 273001934",
"url": "https://www.slideshare.net/slideshow/nis-2-and-details-about-implementation-watchguard/273001934",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:27.348452"
},
{
"title": "Presentation from 260999351",
"url": "https://www.slideshare.net/slideshow/dachnug50-bigfix-nis2pdf/260999351",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:27.514383"
},
{
"title": "Presentation from 283086010",
"url": "https://www.slideshare.net/slideshow/2024-04-21-nis2-and-dora-introduction-of-activities/283086010",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:27.570216"
},
{
"title": "Presentation from 278737660",
"url": "https://www.slideshare.net/slideshow/europe-tightens-cybersecurity-rules-with-nis2-directive-pdf/278737660",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:27.703202"
},
{
"title": "Presentation from 278961759",
"url": "https://www.slideshare.net/slideshow/eu-and-you-eu-and-you-upcoming-regulation/278961759",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:27.823283"
},
{
"title": "Presentation from 275587035",
"url": "https://www.slideshare.net/slideshow/map-of-security-related-eu-legislations/275587035",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:27.892496"
},
{
"title": "Presentation from 272311967",
"url": "https://www.slideshare.net/slideshow/is-your-codebase-ready-for-nis2-and-the-cyber-resilience-act/272311967",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:27.985394"
},
{
"title": "Presentation from 283588646",
"url": "https://www.slideshare.net/slideshow/nis2-complete-view-framework-guide-manual/283588646",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:28.090806"
},
{
"title": "Presentation from 281036749",
"url": "https://www.slideshare.net/slideshow/quantum-threats-are-closer-than-you-think-act-now-to-stay-secure/281036749",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:28.270650"
},
{
"title": "Presentation from 274868244",
"url": "https://www.slideshare.net/slideshow/trustarc-webinar-data-privacy-in-the-eu_-what-you-need-to-know/274868244",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:28.329088"
},
{
"title": "Presentation from 268755068",
"url": "https://www.slideshare.net/slideshow/pecific-pac34-slidedeck-v1-for-website-pptx/268755068",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:28.403888"
},
{
"title": "Presentation from 282061727",
"url": "https://www.slideshare.net/slideshow/data-protection-resilience-in-focus-pdf/282061727",
"description": "",
"author": "",
"views": 0,
"search_query": "NIS2 directive",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:28.482043"
},
{
"title": "Presentation from 252679729",
"url": "https://www.slideshare.net/slideshow/sock-puppetpptx/252679729",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:40.082176"
},
{
"title": "Presentation from 249384223",
"url": "https://www.slideshare.net/slideshow/from-research-to-investigation-digital-traces-and-their-use-in-data-journalism-and-osint/249384223",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:40.153024"
},
{
"title": "Presentation from 58641706",
"url": "https://www.slideshare.net/slideshow/osint-open-source-intelligence-leading-investigation-and-investigation-technique/58641706",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:40.849505"
},
{
"title": "Presentation from 259938752",
"url": "https://www.slideshare.net/slideshow/open-source-intelligence-researcher/259938752",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:41.071188"
},
{
"title": "Presentation from 260078444",
"url": "https://www.slideshare.net/slideshow/osint-service/260078444",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:41.657567"
},
{
"title": "Presentation from 252497260",
"url": "https://www.slideshare.net/slideshow/csi-osint-specialist/252497260",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:41.720425"
},
{
"title": "Presentation from 212354373",
"url": "https://www.slideshare.net/slideshow/dr-dayu-kao-the-investigation-forensics-and-governance-of-atm-heist-threats-in-law-enforcement-agencies/212354373",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:41.919981"
},
{
"title": "Presentation from 278055321",
"url": "https://www.slideshare.net/slideshow/how-to-create-500-m-and-get-away-with-it-pptx/278055321",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:43.529673"
},
{
"title": "Presentation from 253492110",
"url": "https://www.slideshare.net/slideshow/intelligence-against-the-war-on-terrorismyou-serve-on-the-staff-docx/253492110",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:43.897938"
},
{
"title": "Presentation from 276567593",
"url": "https://www.slideshare.net/slideshow/social-media-crime-investigation-by-pptx/276567593",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:43.970082"
},
{
"title": "Presentation from 149521869",
"url": "https://www.slideshare.net/slideshow/p19-open-source-investigationsdeciphering-criminals-digital-footprintmatasphillips61319/149521869",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:44.067045"
},
{
"title": "Presentation from 261539049",
"url": "https://www.slideshare.net/slideshow/definitive-guide-to-tiktokpdf/261539049",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:44.136502"
},
{
"title": "Presentation from 65875731",
"url": "https://www.slideshare.net/slideshow/soc2016-the-investigation-labyrinth/65875731",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:44.307938"
},
{
"title": "Presentation from 253379004",
"url": "https://www.slideshare.net/slideshow/captech-talksosint-dr-kellup-charles-10622pptx/253379004",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:44.380213"
},
{
"title": "Presentation from 279085381",
"url": "https://www.slideshare.net/slideshow/osint-part-1-use-osint-for-basic-factfinding-pptx/279085381",
"description": "",
"author": "",
"views": 0,
"search_query": "OSINT investigation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:44.440451"
},
{
"title": "Presentation from 22258827",
"url": "https://www.slideshare.net/slideshow/intro-topentesting/22258827",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:56.066682"
},
{
"title": "Presentation from 129522525",
"url": "https://www.slideshare.net/slideshow/penetration-testing-129522525/129522525",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:56.196729"
},
{
"title": "Presentation from 10902959",
"url": "https://www.slideshare.net/slideshow/penetration-testing-10902959/10902959",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:56.284006"
},
{
"title": "Presentation from 23103088",
"url": "https://www.slideshare.net/slideshow/penetration-testing-presentation-practical-guide/23103088",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:56.394710"
},
{
"title": "Presentation from 251035795",
"url": "https://www.slideshare.net/slideshow/azure-penetration-testing-251035795/251035795",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:56.465723"
},
{
"title": "Presentation from 233799681",
"url": "https://www.slideshare.net/slideshow/penetration-testing-233799681/233799681",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:56.582223"
},
{
"title": "Presentation from 232999770",
"url": "https://www.slideshare.net/slideshow/penetration-testing-guide-232999770/232999770",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:56.663763"
},
{
"title": "Presentation from 25286617",
"url": "https://www.slideshare.net/slideshow/penetration-testing-services-25286617/25286617",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:56.756964"
},
{
"title": "Presentation from 131880275",
"url": "https://www.slideshare.net/slideshow/penetration-testing-tutorial-penetration-testing-tools-cyber-security-training-edureka/131880275",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:56.837371"
},
{
"title": "Presentation from 239410696",
"url": "https://www.slideshare.net/slideshow/penetration-testing-overview/239410696",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:56.989736"
},
{
"title": "Presentation from 76932778",
"url": "https://www.slideshare.net/slideshow/penetration-testing-services-76932778/76932778",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:57.208810"
},
{
"title": "Presentation from 127275224",
"url": "https://www.slideshare.net/slideshow/penetration-testing-tutorial-127275224/127275224",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:57.350163"
},
{
"title": "Presentation from 283659128",
"url": "https://www.slideshare.net/slideshow/introduction-to-penetration-testing-and-penetration-testing-proccess-pptx/283659128",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:57.646648"
},
{
"title": "Presentation from 227351035",
"url": "https://www.slideshare.net/slideshow/penetration-testing-services-penetration-testing/227351035",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:57.817838"
},
{
"title": "Presentation from 264761279",
"url": "https://www.slideshare.net/slideshow/vulnerability-assessment-and-penetration-testing/264761279",
"description": "",
"author": "",
"views": 0,
"search_query": "penetration testing",
"source": "slideshare",
"harvested_at": "2025-12-17T02:29:57.994634"
},
{
"title": "Presentation from 266893383",
"url": "https://www.slideshare.net/slideshow/ransomware-defense-and-remediation-with-pure-storage/266893383",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:09.539644"
},
{
"title": "Presentation from 97495510",
"url": "https://www.slideshare.net/slideshow/webinar-three-reasons-why-object-storage-is-the-best-defense-against-ransomware-attacks/97495510",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:09.665554"
},
{
"title": "Presentation from 270483028",
"url": "https://www.slideshare.net/slideshow/ist-blueprint-for-ransomware-defense-pdf/270483028",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:09.782650"
},
{
"title": "Presentation from 77139476",
"url": "https://www.slideshare.net/slideshow/ransomware-defensefordummies/77139476",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:09.837772"
},
{
"title": "Presentation from 264143595",
"url": "https://www.slideshare.net/slideshow/ransomware-is-knocking-your-doorfinalpdf/264143595",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:09.975156"
},
{
"title": "Presentation from 235829822",
"url": "https://www.slideshare.net/slideshow/ransomware-defensefordummies-235829822/235829822",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:10.060959"
},
{
"title": "Presentation from 94114986",
"url": "https://www.slideshare.net/slideshow/atelier-technique-cisco-acss-2018/94114986",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:10.121911"
},
{
"title": "Presentation from 269861792",
"url": "https://www.slideshare.net/slideshow/brian-tarbox-s3-sophisticated-storage-system/269861792",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:10.246434"
},
{
"title": "Presentation from 72044971",
"url": "https://www.slideshare.net/slideshow/eextortion-trends-and-defense/72044971",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:10.364947"
},
{
"title": "Presentation from 78040475",
"url": "https://www.slideshare.net/slideshow/how-to-protect-my-cloud-workload-from-ransomware/78040475",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:10.454004"
},
{
"title": "Presentation from 269556769",
"url": "https://www.slideshare.net/slideshow/guarding-against-ransomware-strategies-for-robust-data-protection/269556769",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:10.548750"
},
{
"title": "Presentation from 58459850",
"url": "https://www.slideshare.net/slideshow/panda-adaptive-defense-360-cyber-extortion-guide/58459850",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:10.635492"
},
{
"title": "Presentation from 77790382",
"url": "https://www.slideshare.net/slideshow/preventing-todays-malware/77790382",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:10.752239"
},
{
"title": "Presentation from 269341812",
"url": "https://www.slideshare.net/slideshow/alphv-site-taken-down-en-pdf/269341812",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:10.943887"
},
{
"title": "Presentation from 284291228",
"url": "https://www.slideshare.net/slideshow/approaches-to-ransomware-protection-with-netapp-monitoring/284291228",
"description": "",
"author": "",
"views": 0,
"search_query": "ransomware defense",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:11.072921"
},
{
"title": "Presentation from 250434569",
"url": "https://www.slideshare.net/slideshow/zero-trust-architecture-250434569/250434569",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:22.922115"
},
{
"title": "Presentation from 250846285",
"url": "https://www.slideshare.net/slideshow/zero-trust-architecture-digital-trust-framework/250846285",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:23.277572"
},
{
"title": "Presentation from 230728692",
"url": "https://www.slideshare.net/slideshow/round-table-zeroing-in-on-zero-trust-architecture/230728692",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:23.791846"
},
{
"title": "Presentation from 269219866",
"url": "https://www.slideshare.net/slideshow/zero-trust-architecture-allendevaux-pdf/269219866",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:23.850512"
},
{
"title": "Presentation from 85856061",
"url": "https://www.slideshare.net/slideshow/zero-trust-in-a-hybrid-architecture/85856061",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:23.916852"
},
{
"title": "Presentation from 279591509",
"url": "https://www.slideshare.net/slideshow/introduction-to-zero-trust-architecture-abhishek-r-singh-agnidipta-sarkar/279591509",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:23.972650"
},
{
"title": "Presentation from 254877581",
"url": "https://www.slideshare.net/slideshow/hitcon-freetalk-2022-zero-trust-architecture/254877581",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:24.032760"
},
{
"title": "Presentation from 270979964",
"url": "https://www.slideshare.net/slideshow/what-is-zero-trust-architecture-and-why-do-you-need-it-pdf/270979964",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:24.091682"
},
{
"title": "Presentation from 248620491",
"url": "https://www.slideshare.net/slideshow/implementing-zero-trust-architecture-in-azure-hybrid-cloud/248620491",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:24.152842"
},
{
"title": "Presentation from 254931407",
"url": "https://www.slideshare.net/slideshow/zero-trust-architecture-and-electric-vehicle-cyberrisks/254931407",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:24.225792"
},
{
"title": "Presentation from 257487085",
"url": "https://www.slideshare.net/slideshow/pillars-of-zero-trust-architecture/257487085",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:24.291695"
},
{
"title": "Presentation from 268613064",
"url": "https://www.slideshare.net/slideshow/understanding-the-zero-trust-architecture-market-a-comprehensive-overview/268613064",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:24.407209"
},
{
"title": "Presentation from 283056123",
"url": "https://www.slideshare.net/slideshow/securing-the-digital-perimeter-with-zero-trust-architecture/283056123",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:24.464323"
},
{
"title": "Presentation from 229198327",
"url": "https://www.slideshare.net/slideshow/sacon-jim-hietala-zero-trust-architecture-from-hype-to-reality/229198327",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:24.541380"
},
{
"title": "Presentation from 216485074",
"url": "https://www.slideshare.net/slideshow/zero-trust-model-presentation/216485074",
"description": "",
"author": "",
"views": 0,
"search_query": "zero trust architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:24.592541"
},
{
"title": "Presentation from 270782745",
"url": "https://www.slideshare.net/slideshow/leveraging-ai-for-enhanced-cybersecurity/270782745",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:35.694852"
},
{
"title": "Presentation from 239308946",
"url": "https://www.slideshare.net/slideshow/ai-cybersecurity/239308946",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:35.743806"
},
{
"title": "Presentation from 281425948",
"url": "https://www.slideshare.net/slideshow/cybersecurity-for-ai-and-genai-updated-pdf/281425948",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:35.803743"
},
{
"title": "Presentation from 263455905",
"url": "https://www.slideshare.net/slideshow/ai-in-cybersecurity-2023/263455905",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:35.867204"
},
{
"title": "Presentation from 276191991",
"url": "https://www.slideshare.net/slideshow/cybersecurity-and-ai-a-comprehensive-guide/276191991",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:35.934885"
},
{
"title": "Presentation from 265302129",
"url": "https://www.slideshare.net/slideshow/aipowered-cybersecurity-threatspdf/265302129",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:35.982180"
},
{
"title": "Presentation from 271030318",
"url": "https://www.slideshare.net/slideshow/ai-in-cybersecurity-allendevaux-company-pdf/271030318",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:36.059616"
},
{
"title": "Presentation from 265936632",
"url": "https://www.slideshare.net/slideshow/leading-cybersecurity-training-with-ai-in-kerala/265936632",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:36.110407"
},
{
"title": "Presentation from 267166210",
"url": "https://www.slideshare.net/slideshow/ai-cybersecurity-pros-cons-ai-is-reshaping-cybersecurity/267166210",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:36.169067"
},
{
"title": "Presentation from 239309002",
"url": "https://www.slideshare.net/slideshow/blackbox-testing-in-ai-cybersecurity/239309002",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:36.243528"
},
{
"title": "Presentation from 283843595",
"url": "https://www.slideshare.net/slideshow/ai-cybersecurity-framework-for-the-quantum-era-pdf-c736/283843595",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:36.303363"
},
{
"title": "Presentation from 266188931",
"url": "https://www.slideshare.net/slideshow/how-ai-is-revolutionizing-cybersecurity-1pdf/266188931",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:36.355976"
},
{
"title": "Presentation from 259692683",
"url": "https://www.slideshare.net/slideshow/how-ai-can-help-with-cybersecurity/259692683",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:36.417788"
},
{
"title": "Presentation from 185253765",
"url": "https://www.slideshare.net/slideshow/ai-and-the-impact-on-cybersecurity/185253765",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:36.483593"
},
{
"title": "Presentation from 162316228",
"url": "https://www.slideshare.net/slideshow/ai-for-cybersecurity-162316228/162316228",
"description": "",
"author": "",
"views": 0,
"search_query": "AI cybersecurity",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:36.545142"
},
{
"title": "Presentation from 149818229",
"url": "https://www.slideshare.net/slideshow/machine-learning-for-security/149818229",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.393277"
},
{
"title": "Presentation from 149291369",
"url": "https://www.slideshare.net/slideshow/machine-learning-for-security-analysts-149291369/149291369",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.439121"
},
{
"title": "Presentation from 44526971",
"url": "https://www.slideshare.net/slideshow/financial-security-and-machine-learning/44526971",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.481234"
},
{
"title": "Presentation from 190988681",
"url": "https://www.slideshare.net/slideshow/machine-learning-implications-in-security/190988681",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.529589"
},
{
"title": "Presentation from 1814548",
"url": "https://www.slideshare.net/slideshow/computer-security-using-machine-learning-1814548/1814548",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.583711"
},
{
"title": "Presentation from 75087457",
"url": "https://www.slideshare.net/slideshow/machine-learning-in-cyber-security-domain/75087457",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.636798"
},
{
"title": "Presentation from 246138998",
"url": "https://www.slideshare.net/slideshow/machine-learning-in-computer-security/246138998",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.683752"
},
{
"title": "Presentation from 198126937",
"url": "https://www.slideshare.net/slideshow/security-of-machine-learning/198126937",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.748766"
},
{
"title": "Presentation from 114967870",
"url": "https://www.slideshare.net/slideshow/machine-learning-in-cyber-security/114967870",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.788245"
},
{
"title": "Presentation from 101870144",
"url": "https://www.slideshare.net/slideshow/security-and-privacy-of-machine-learning/101870144",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.850860"
},
{
"title": "Presentation from 174520109",
"url": "https://www.slideshare.net/slideshow/data-compression-data-security-and-machine-learning/174520109",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.896661"
},
{
"title": "Presentation from 248628491",
"url": "https://www.slideshare.net/slideshow/ai-security-security-machine-learning-deep-learning-computer-vision-security/248628491",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.941768"
},
{
"title": "Presentation from 81355518",
"url": "https://www.slideshare.net/slideshow/enhance-security-domain-with-machine-learning/81355518",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:47.992636"
},
{
"title": "Presentation from 130002222",
"url": "https://www.slideshare.net/slideshow/security-automation-and-machine-learning/130002222",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:48.033179"
},
{
"title": "Presentation from 62354620",
"url": "https://www.slideshare.net/slideshow/machine-learning-security-detect-atypical-behaviour-in-logs-62354620/62354620",
"description": "",
"author": "",
"views": 0,
"search_query": "machine learning security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:48.075419"
},
{
"title": "Presentation from 259244201",
"url": "https://www.slideshare.net/slideshow/the-impact-of-gpt-on-the-workplace/259244201",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.357704"
},
{
"title": "Presentation from 261888221",
"url": "https://www.slideshare.net/slideshow/how-do-openai-gpt-models-work-misconceptions-and-tips-for-developers/261888221",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.424097"
},
{
"title": "Presentation from 261116169",
"url": "https://www.slideshare.net/slideshow/openai-gpt-in-depth-questions-and-misconceptions/261116169",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.470773"
},
{
"title": "Presentation from 273905269",
"url": "https://www.slideshare.net/slideshow/exploring-openai-models-strengths-and-weaknesses/273905269",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.514553"
},
{
"title": "Presentation from 281316618",
"url": "https://www.slideshare.net/slideshow/ai-coding-assistants-test-automation-a-simplified-suitability-analysis/281316618",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.564746"
},
{
"title": "Presentation from 282872616",
"url": "https://www.slideshare.net/slideshow/newmind-ai-journal-monthly-chronicles-august-2025/282872616",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.617425"
},
{
"title": "Presentation from 283722107",
"url": "https://www.slideshare.net/slideshow/scale-your-content-with-custom-ai-tools-by-victoria-olsina-custom-gpts/283722107",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.655503"
},
{
"title": "Presentation from 279397520",
"url": "https://www.slideshare.net/slideshow/is-generative-ai-the-new-future-of-salesforce-and-how-does-it-impact-your-business/279397520",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.722902"
},
{
"title": "Presentation from 283396927",
"url": "https://www.slideshare.net/slideshow/spotting_genuine_ai_automation_for_small_business-pptx/283396927",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.769379"
},
{
"title": "Presentation from 284277020",
"url": "https://www.slideshare.net/slideshow/generative-ai-deep-dive-architectures-mechanics-and-future-applications/284277020",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.806686"
},
{
"title": "Presentation from 270021808",
"url": "https://www.slideshare.net/slideshow/uipath-community-day-krakow-devs4devs-conference/270021808",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.860690"
},
{
"title": "Presentation from 282296554",
"url": "https://www.slideshare.net/slideshow/openai-gpt-5-launch-highlights-and-features/282296554",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.905393"
},
{
"title": "Presentation from 282920504",
"url": "https://www.slideshare.net/slideshow/prompt-gpt-5-like-a-pro-practical-guide-pdf-pdf/282920504",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:30:59.964615"
},
{
"title": "Presentation from 280776716",
"url": "https://www.slideshare.net/slideshow/azure-ai-foundry-the-ai-app-and-agent-factory/280776716",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:00.042169"
},
{
"title": "Presentation from 266913132",
"url": "https://www.slideshare.net/slideshow/transforming-pmo-success-with-ai-discover-oneplan-strategic-portfolio-work-management-platform-webinar-21mar24pdf/266913132",
"description": "",
"author": "",
"views": 0,
"search_query": "GPT enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:00.093495"
},
{
"title": "Presentation from 269523727",
"url": "https://www.slideshare.net/slideshow/a-beginner-s-guide-to-generative-ai-for-business/269523727",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.267424"
},
{
"title": "Presentation from 270410479",
"url": "https://www.slideshare.net/slideshow/strategic-steps-to-success-generative-ai-for-business-it-leaders-pptx/270410479",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.370747"
},
{
"title": "Presentation from 265513191",
"url": "https://www.slideshare.net/slideshow/generative-ai-business-transformation/265513191",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.434892"
},
{
"title": "Presentation from 262033987",
"url": "https://www.slideshare.net/slideshow/top-5-ways-generative-ai-and-rpa-helps-business-scale-up-your-business-process-with-the-gen-ai-rpa/262033987",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.488788"
},
{
"title": "Presentation from 275814839",
"url": "https://www.slideshare.net/slideshow/why-generative-ai-is-essential-for-business-growth/275814839",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.543374"
},
{
"title": "Presentation from 283676052",
"url": "https://www.slideshare.net/slideshow/agentic-ai-vs-generative-ai-key-distinctions-and-business-value/283676052",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.593523"
},
{
"title": "Presentation from 267200076",
"url": "https://www.slideshare.net/slideshow/potential-of-ai-generative-ai-in-business-learnings-and-insights/267200076",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.638868"
},
{
"title": "Presentation from 266025011",
"url": "https://www.slideshare.net/slideshow/generative-ai-genai-business-and-intellectual-property/266025011",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.685717"
},
{
"title": "Presentation from 265165227",
"url": "https://www.slideshare.net/slideshow/business-talk-harnessing-generative-ai-with-data-analytics-maturity/265165227",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.742348"
},
{
"title": "Presentation from 269942104",
"url": "https://www.slideshare.net/slideshow/harnessing-the-power-of-generative-ai-for-your-business-by-siddharth-pdf/269942104",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.781651"
},
{
"title": "Presentation from 269602290",
"url": "https://www.slideshare.net/slideshow/skybuffer-ai-advanced-conversational-and-generative-ai-solution-on-sap-business-technology-platform-btp/269602290",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.829005"
},
{
"title": "Presentation from 277270942",
"url": "https://www.slideshare.net/slideshow/harnessing-iot-business-process-services-and-generative-ai-for-innovation/277270942",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.891196"
},
{
"title": "Presentation from 273119465",
"url": "https://www.slideshare.net/slideshow/unlock-innovation-with-aws-generative-ai-transform-your-business-with-scalable-ai-driven-solutions-for-enhanced-customer-engagement-improved-decision-making-and-operational-efficiency/273119465",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:11.951371"
},
{
"title": "Presentation from 281820105",
"url": "https://www.slideshare.net/slideshow/how-generative-ai-is-powering-business-transformation/281820105",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:12.002053"
},
{
"title": "Presentation from 270610767",
"url": "https://www.slideshare.net/slideshow/the-era-of-generative-ai-astute-business/270610767",
"description": "",
"author": "",
"views": 0,
"search_query": "generative AI business",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:12.045328"
},
{
"title": "Presentation from 270281636",
"url": "https://www.slideshare.net/slideshow/ai-2030-academy-modern-data-management-and-enterprise-ai-strategy/270281636",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.217805"
},
{
"title": "Presentation from 237345545",
"url": "https://www.slideshare.net/slideshow/creating-an-enterprise-ai-strategy-237345545/237345545",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.263744"
},
{
"title": "Presentation from 249860597",
"url": "https://www.slideshare.net/slideshow/rahat-yasir-enterprise-data-ai-strategy-platform-designing/249860597",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.473729"
},
{
"title": "Presentation from 107171877",
"url": "https://www.slideshare.net/slideshow/enterprise-artificial-intelligence-strategy/107171877",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.552624"
},
{
"title": "Presentation from 267749698",
"url": "https://www.slideshare.net/slideshow/how-to-create-an-effective-enterprise-ai-strategy-pdf/267749698",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.609454"
},
{
"title": "Presentation from 251045895",
"url": "https://www.slideshare.net/slideshow/25-tips-on-how-a-perfect-ai-strategy-can-help-your-business/251045895",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.658586"
},
{
"title": "Presentation from 250230485",
"url": "https://www.slideshare.net/slideshow/rahat-yasir-enterprise-data-ai-strategy-platform-designing-250230485/250230485",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.705489"
},
{
"title": "Presentation from 250796278",
"url": "https://www.slideshare.net/slideshow/pillars-of-ai-strategy/250796278",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.747625"
},
{
"title": "Presentation from 278014333",
"url": "https://www.slideshare.net/slideshow/vady-enterprise-ai-real-time-insights-predictive-intelligence-for-smarter-strategy/278014333",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.803706"
},
{
"title": "Presentation from 283098030",
"url": "https://www.slideshare.net/slideshow/jim-kaskade-resume-artificial-intelligence-ai-082825-docx/283098030",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.840897"
},
{
"title": "Presentation from 265324317",
"url": "https://www.slideshare.net/slideshow/generative-ai-guide-to-business-implementation/265324317",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.894914"
},
{
"title": "Presentation from 284283391",
"url": "https://www.slideshare.net/slideshow/jim-kaskade-resume-artificial-intelligence-111725-pdf/284283391",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.939428"
},
{
"title": "Presentation from 284087154",
"url": "https://www.slideshare.net/slideshow/8-best-ai-courses-for-chief-executing-officers-ceos-to-future-proof-your-career-in-2025-pptx/284087154",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:23.990495"
},
{
"title": "Presentation from 282929318",
"url": "https://www.slideshare.net/slideshow/applying-agentic-ai-in-enterprise-automation/282929318",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:24.055727"
},
{
"title": "Presentation from 96188578",
"url": "https://www.slideshare.net/slideshow/gamifying-strategy-enterprise-ai-use-cases-on-agentbased-simulation-and-reinforcement-learning/96188578",
"description": "",
"author": "",
"views": 0,
"search_query": "AI strategy enterprise",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:24.106648"
},
{
"title": "Presentation from 280616023",
"url": "https://www.slideshare.net/slideshow/solulab-com-llm-use-cases-and-applications/280616023",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.435917"
},
{
"title": "Presentation from 269494536",
"url": "https://www.slideshare.net/slideshow/large-language-model-llm-and-it-s-geospatial-applications/269494536",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.485750"
},
{
"title": "Presentation from 266682165",
"url": "https://www.slideshare.net/slideshow/gaurdrails-for-large-language-model-based-applications/266682165",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.550819"
},
{
"title": "Presentation from 261368477",
"url": "https://www.slideshare.net/slideshow/building-and-deploying-llm-applications-with-apache-airflow/261368477",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.594763"
},
{
"title": "Presentation from 273622488",
"url": "https://www.slideshare.net/slideshow/llm-agent-observability-lessons-learned-from-real-world-applications/273622488",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.643126"
},
{
"title": "Presentation from 274076949",
"url": "https://www.slideshare.net/slideshow/increasing-the-accuracy-of-llm-applications-with-graph-based-rag_-practical-implementations-pdf/274076949",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.705037"
},
{
"title": "Presentation from 274077168",
"url": "https://www.slideshare.net/slideshow/increasing-the-accuracy-of-llm-applications-with-graph-based-rag-practical-implementations-falkordb-at-google-cloud-experts-hub/274077168",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.742937"
},
{
"title": "Presentation from 280616027",
"url": "https://www.slideshare.net/slideshow/solulab-com-comparison-of-large-language-models-the-ultimate-guide-1-pdf/280616027",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.801434"
},
{
"title": "Presentation from 280616024",
"url": "https://www.slideshare.net/slideshow/solulab-com-create-custom-llms-for-enterprise-solutions-1-pdf/280616024",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.849568"
},
{
"title": "Presentation from 261796251",
"url": "https://www.slideshare.net/slideshow/clicks2conversationspdf/261796251",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.900857"
},
{
"title": "Presentation from 272662438",
"url": "https://www.slideshare.net/slideshow/best-practices-for-building-successful-llm-applications/272662438",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.942636"
},
{
"title": "Presentation from 269724242",
"url": "https://www.slideshare.net/slideshow/exploring-llms-in-the-world-of-artificial-intelligence-ai-2-pdf/269724242",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:35.989079"
},
{
"title": "Presentation from 281651329",
"url": "https://www.slideshare.net/slideshow/what-are-generative-al-models-a-deep-dive-blog-docx/281651329",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:36.042352"
},
{
"title": "Presentation from 263427009",
"url": "https://www.slideshare.net/slideshow/use-case-patterns-for-llm-applications-1pdf/263427009",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:36.087360"
},
{
"title": "Presentation from 271857149",
"url": "https://www.slideshare.net/slideshow/connector-corners-building-llm-applications-with-genai-activities/271857149",
"description": "",
"author": "",
"views": 0,
"search_query": "LLM applications",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:36.150591"
},
{
"title": "Presentation from 193563751",
"url": "https://www.slideshare.net/slideshow/multi-cloud-security-architecture/193563751",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.418513"
},
{
"title": "Presentation from 232734409",
"url": "https://www.slideshare.net/slideshow/cloud-security-architecture-a-different-approach/232734409",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.473484"
},
{
"title": "Presentation from 72206028",
"url": "https://www.slideshare.net/slideshow/nist-cloud-computing-security-reference-architecture-800299/72206028",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.515152"
},
{
"title": "Presentation from 26365895",
"url": "https://www.slideshare.net/slideshow/cloud-security-guide/26365895",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.570199"
},
{
"title": "Presentation from 279821468",
"url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/279821468",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.613626"
},
{
"title": "Presentation from 281451917",
"url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/281451917",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.667930"
},
{
"title": "Presentation from 280764015",
"url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/280764015",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.711616"
},
{
"title": "Presentation from 277437734",
"url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/277437734",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.760399"
},
{
"title": "Presentation from 276278106",
"url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/276278106",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.818931"
},
{
"title": "Presentation from 81978797",
"url": "https://www.slideshare.net/slideshow/sacon-cloud-security-architecture-moshe-ferber/81978797",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.871878"
},
{
"title": "Presentation from 279561726",
"url": "https://www.slideshare.net/slideshow/cloud-to-edgeware-wireless-grid-applications-architecture-and-security-for-the-internet-of-things-lee-w-mcknight/279561726",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.906870"
},
{
"title": "Presentation from 59367012",
"url": "https://www.slideshare.net/slideshow/take-it-to-the-cloud-the-evolution-of-security-architecture/59367012",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:47.978406"
},
{
"title": "Presentation from 274875729",
"url": "https://www.slideshare.net/slideshow/full-download-cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl-pdf-docx/274875729",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:48.020241"
},
{
"title": "Presentation from 64961757",
"url": "https://www.slideshare.net/slideshow/security-in-multi-cloud-data-storage-with-sic-architecture/64961757",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:48.068996"
},
{
"title": "Presentation from 170550816",
"url": "https://www.slideshare.net/slideshow/understanding-the-determinants-of-security-and-privacy-in-cloud-computing-architecture/170550816",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud security architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:48.127542"
},
{
"title": "Presentation from 78096461",
"url": "https://www.slideshare.net/slideshow/azure-security-78096461/78096461",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.478939"
},
{
"title": "Presentation from 72703635",
"url": "https://www.slideshare.net/slideshow/azure-security-center-72703635/72703635",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.531349"
},
{
"title": "Presentation from 88395266",
"url": "https://www.slideshare.net/slideshow/azure-security-architecture-88395266/88395266",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.576218"
},
{
"title": "Presentation from 133846922",
"url": "https://www.slideshare.net/slideshow/azure-security-and-compliance/133846922",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.625608"
},
{
"title": "Presentation from 136361188",
"url": "https://www.slideshare.net/slideshow/azure-security-fundamentals-136361188/136361188",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.670320"
},
{
"title": "Presentation from 269972862",
"url": "https://www.slideshare.net/slideshow/azure-security-infrastructure-overview-pptx/269972862",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.735675"
},
{
"title": "Presentation from 81029695",
"url": "https://www.slideshare.net/slideshow/microsoft-azure-security-overview/81029695",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.791203"
},
{
"title": "Presentation from 258153971",
"url": "https://www.slideshare.net/slideshow/azure-security-258153971/258153971",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.828868"
},
{
"title": "Presentation from 76690361",
"url": "https://www.slideshare.net/slideshow/azure-cloud-security/76690361",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.874724"
},
{
"title": "Presentation from 94631808",
"url": "https://www.slideshare.net/slideshow/global-azure-bootcamp-2018-azure-security-center/94631808",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.914717"
},
{
"title": "Presentation from 248322371",
"url": "https://www.slideshare.net/slideshow/what-is-microsoft-azure-securitymicrosoft-azure-security/248322371",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:31:59.961762"
},
{
"title": "Presentation from 24258865",
"url": "https://www.slideshare.net/slideshow/windows-azure-security-compliance/24258865",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:00.007905"
},
{
"title": "Presentation from 81707637",
"url": "https://www.slideshare.net/slideshow/microsoft-azure-security-overview-microsoft-css-dallas-azure/81707637",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:00.069952"
},
{
"title": "Presentation from 270779929",
"url": "https://www.slideshare.net/slideshow/azure-security-compass-v1-1-presentation-pptx/270779929",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:00.105618"
},
{
"title": "Presentation from 149283748",
"url": "https://www.slideshare.net/slideshow/azure-security-center-zero-to-hero/149283748",
"description": "",
"author": "",
"views": 0,
"search_query": "Azure security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:00.162504"
},
{
"title": "Presentation from 76279416",
"url": "https://www.slideshare.net/slideshow/aws-security-best-practices-terraform-aws-security/76279416",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.402117"
},
{
"title": "Presentation from 125029823",
"url": "https://www.slideshare.net/slideshow/aws-security-best-practices-125029823/125029823",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.455070"
},
{
"title": "Presentation from 130677843",
"url": "https://www.slideshare.net/slideshow/aws-security-best-practices-130677843/130677843",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.502336"
},
{
"title": "Presentation from 73590801",
"url": "https://www.slideshare.net/slideshow/aws-security-best-practices-march-2017/73590801",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.548391"
},
{
"title": "Presentation from 72059547",
"url": "https://www.slideshare.net/slideshow/security-best-practices-aws-awsome-day-management-track/72059547",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.598379"
},
{
"title": "Presentation from 61453144",
"url": "https://www.slideshare.net/slideshow/cloud-security-best-practices-in-aws-by-ankit-giri/61453144",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.647591"
},
{
"title": "Presentation from 86038172",
"url": "https://www.slideshare.net/slideshow/gdpr-top-10-aws-security-and-compliance-best-practices/86038172",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.697364"
},
{
"title": "Presentation from 46781085",
"url": "https://www.slideshare.net/slideshow/aws-security-best-practices-for-effective-threat-detection-and-response/46781085",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.766641"
},
{
"title": "Presentation from 92175305",
"url": "https://www.slideshare.net/slideshow/migrating-and-managing-security-in-an-aws-environment-best-practices/92175305",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.812210"
},
{
"title": "Presentation from 73183383",
"url": "https://www.slideshare.net/slideshow/aws-cyber-security-best-practices/73183383",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.864643"
},
{
"title": "Presentation from 66629804",
"url": "https://www.slideshare.net/slideshow/aws-security-strategy-66629804/66629804",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.909045"
},
{
"title": "Presentation from 181072016",
"url": "https://www.slideshare.net/slideshow/eks-security-best-practices-181072016/181072016",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:11.949597"
},
{
"title": "Presentation from 29275486",
"url": "https://www.slideshare.net/slideshow/security-best-practices-on-aws-cloud/29275486",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:12.006080"
},
{
"title": "Presentation from 126482222",
"url": "https://www.slideshare.net/slideshow/cloud-security-fundamentals-webinar/126482222",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:12.053729"
},
{
"title": "Presentation from 276592234",
"url": "https://www.slideshare.net/slideshow/cloud-security-best-practices-documentation/276592234",
"description": "",
"author": "",
"views": 0,
"search_query": "AWS security best practices",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:12.104178"
},
{
"title": "Presentation from 52844353",
"url": "https://www.slideshare.net/slideshow/multi-cloud-strategy/52844353",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:23.443244"
},
{
"title": "Presentation from 125571766",
"url": "https://www.slideshare.net/slideshow/multicloud-strategy-for-enterprise/125571766",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:23.490562"
},
{
"title": "Presentation from 250617664",
"url": "https://www.slideshare.net/slideshow/multi-cloud-strategy-250617664/250617664",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:23.545832"
},
{
"title": "Presentation from 284494586",
"url": "https://www.slideshare.net/slideshow/hybrid-cloud-vs-multi-cloud-strategy-2025/284494586",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:23.596106"
},
{
"title": "Presentation from 282868348",
"url": "https://www.slideshare.net/slideshow/multi-cloud-strategy-a-complete-guide-for-multi-cloud-adoption/282868348",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:23.788058"
},
{
"title": "Presentation from 119059110",
"url": "https://www.slideshare.net/slideshow/why-a-multicloud-strategy-is-essential/119059110",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:23.830712"
},
{
"title": "Presentation from 125497350",
"url": "https://www.slideshare.net/slideshow/multicloud-strategy/125497350",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:23.873266"
},
{
"title": "Presentation from 87436834",
"url": "https://www.slideshare.net/slideshow/got-a-multicloud-strategy-how-rightscale-cmp-helps/87436834",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:23.935899"
},
{
"title": "Presentation from 269780805",
"url": "https://www.slideshare.net/slideshow/hybrid-cloud-vs-multi-cloud-which-strategy-is-right-for-your-business/269780805",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:23.974838"
},
{
"title": "Presentation from 28538546",
"url": "https://www.slideshare.net/slideshow/from-the-network-to-multi-cloud/28538546",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:24.021782"
},
{
"title": "Presentation from 262879815",
"url": "https://www.slideshare.net/slideshow/how-powerful-is-a-multicloud-strategy-everything-you-need-to-know-enterprise-wired/262879815",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:24.070381"
},
{
"title": "Presentation from 259202469",
"url": "https://www.slideshare.net/slideshow/why-do-organizations-choose-a-multicloud-strategy-259202469/259202469",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:24.116575"
},
{
"title": "Presentation from 249549962",
"url": "https://www.slideshare.net/slideshow/reinventing-and-simplifying-data-management-for-a-successful-hybrid-and-multicloud-strategy/249549962",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:24.167199"
},
{
"title": "Presentation from 245031667",
"url": "https://www.slideshare.net/slideshow/which-postgresql-is-right-for-your-multi-cloud-strategy-p2/245031667",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:24.217058"
},
{
"title": "Presentation from 259252333",
"url": "https://www.slideshare.net/slideshow/why-do-organizations-choose-a-multicloud-strategy-259252333/259252333",
"description": "",
"author": "",
"views": 0,
"search_query": "multi-cloud strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:24.262816"
},
{
"title": "Presentation from 280150201",
"url": "https://www.slideshare.net/slideshow/vmware-to-cloud-migration-security-solutions-pdf-471a/280150201",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:35.496140"
},
{
"title": "Presentation from 256349929",
"url": "https://www.slideshare.net/slideshow/security-concerns-of-cloud-migration-and-its-implications-on-cloudenabled-business-transformationpdf/256349929",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:35.536691"
},
{
"title": "Presentation from 281272483",
"url": "https://www.slideshare.net/slideshow/your-cloud-data-migration-security-checklist-before-during-and-after/281272483",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:35.604937"
},
{
"title": "Presentation from 270860325",
"url": "https://www.slideshare.net/slideshow/vmware-to-cloud-migration-security-solutions-pdf/270860325",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:35.675821"
},
{
"title": "Presentation from 239093090",
"url": "https://www.slideshare.net/slideshow/migration-of-virtual-machine-to-improve-the-security-in-cloud-computing/239093090",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:35.731590"
},
{
"title": "Presentation from 269897242",
"url": "https://www.slideshare.net/slideshow/cloud-data-migration-challenges-navigating-security-and-technicalities-with-a-smile/269897242",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:35.784302"
},
{
"title": "Presentation from 274539350",
"url": "https://www.slideshare.net/slideshow/vmware-to-cloud-migration-security-solutions-for-a-seamless-transition-pdf/274539350",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:35.827405"
},
{
"title": "Presentation from 49219466",
"url": "https://www.slideshare.net/slideshow/cloud-migration-application-modernization-and-security/49219466",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:35.874207"
},
{
"title": "Presentation from 79423612",
"url": "https://www.slideshare.net/slideshow/solidit-services-english/79423612",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:35.919131"
},
{
"title": "Presentation from 274242448",
"url": "https://www.slideshare.net/slideshow/what-are-managed-cloud-migration-services-and-why-are-they-important/274242448",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:35.989606"
},
{
"title": "Presentation from 255599914",
"url": "https://www.slideshare.net/slideshow/advantages-of-partnering-with-a-cloud-migration-consulting-service/255599914",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:36.032254"
},
{
"title": "Presentation from 275207107",
"url": "https://www.slideshare.net/slideshow/what-are-cloud-migration-services-and-why-are-they-important/275207107",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:36.095515"
},
{
"title": "Presentation from 166886859",
"url": "https://www.slideshare.net/slideshow/2019-0827-sikkerhetsfestivalencloudsecurityinfinitystonespresenten/166886859",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:36.142881"
},
{
"title": "Presentation from 254215444",
"url": "https://www.slideshare.net/slideshow/successive-cloud-migration-servicespdf/254215444",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:36.185692"
},
{
"title": "Presentation from 257555749",
"url": "https://www.slideshare.net/slideshow/cloud-migrationpdf-257555749/257555749",
"description": "",
"author": "",
"views": 0,
"search_query": "cloud migration security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:36.240165"
},
{
"title": "Presentation from 120402479",
"url": "https://www.slideshare.net/slideshow/strategydigital-transformation/120402479",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:47.527692"
},
{
"title": "Presentation from 237570825",
"url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-237570825/237570825",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:47.587773"
},
{
"title": "Presentation from 66727606",
"url": "https://www.slideshare.net/slideshow/digital-strategy-66727606/66727606",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:47.637198"
},
{
"title": "Presentation from 272286870",
"url": "https://www.slideshare.net/slideshow/business-digital-transformation-strategy/272286870",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:47.684555"
},
{
"title": "Presentation from 271204931",
"url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-vision/271204931",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:47.733419"
},
{
"title": "Presentation from 148990096",
"url": "https://www.slideshare.net/slideshow/workshop-digital-transformation-strategy-digital-roadmap-training/148990096",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:47.791256"
},
{
"title": "Presentation from 253754137",
"url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-mit-id-innovation/253754137",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:47.835136"
},
{
"title": "Presentation from 209855993",
"url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-certificate/209855993",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:47.882852"
},
{
"title": "Presentation from 236098455",
"url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-236098455/236098455",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:47.934319"
},
{
"title": "Presentation from 249761976",
"url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-powerpoint-presentation-slides-249761976/249761976",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:47.987005"
},
{
"title": "Presentation from 267089239",
"url": "https://www.slideshare.net/slideshow/bigdatadigital-transformation-and-strategy/267089239",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:48.031237"
},
{
"title": "Presentation from 251959906",
"url": "https://www.slideshare.net/slideshow/digital-strategy-and-transformation/251959906",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:48.095122"
},
{
"title": "Presentation from 279704330",
"url": "https://www.slideshare.net/slideshow/strategy-in-the-digital-age-mastering-digital-transformation-1st-edition-michael-lenox/279704330",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:48.141089"
},
{
"title": "Presentation from 76362712",
"url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-framework-by-exmckinsey/76362712",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:48.189328"
},
{
"title": "Presentation from 265223821",
"url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-framework-tools/265223821",
"description": "",
"author": "",
"views": 0,
"search_query": "digital transformation strategy",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:48.254585"
},
{
"title": "Presentation from 30808256",
"url": "https://www.slideshare.net/slideshow/canvassed-in-a-business-it-strategy-canvas-baseline-roadmap/30808256",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:59.533211"
},
{
"title": "Presentation from 248478719",
"url": "https://www.slideshare.net/slideshow/it-simplification-assessment-strategy-alignment-business-roadmap-evaluating/248478719",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:59.592153"
},
{
"title": "Presentation from 56014983",
"url": "https://www.slideshare.net/slideshow/define-an-it-strategy-and-roadmap/56014983",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:59.641864"
},
{
"title": "Presentation from 123549089",
"url": "https://www.slideshare.net/slideshow/how-to-build-a-strategic-roadmap-and-execute-using-agile-planning/123549089",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:59.706383"
},
{
"title": "Presentation from 86072050",
"url": "https://www.slideshare.net/slideshow/big-data-consulting-slideshare-v04-86072050/86072050",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:59.758169"
},
{
"title": "Presentation from 45856722",
"url": "https://www.slideshare.net/slideshow/augmenting-it-strategy-with-enterprise-architecture-assessment/45856722",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:59.808222"
},
{
"title": "Presentation from 265069198",
"url": "https://www.slideshare.net/slideshow/mega-solution-footprint-v5pptx/265069198",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:32:59.844933"
},
{
"title": "Presentation from 56878088",
"url": "https://www.slideshare.net/slideshow/product-roadmaps-tips-on-how-to-create-and-manage-roadmaps/56878088",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:00.072108"
},
{
"title": "Presentation from 8274555",
"url": "https://www.slideshare.net/slideshow/mcc11-developing-a-digital-strategy-amp-roadmap/8274555",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:00.123039"
},
{
"title": "Presentation from 32665708",
"url": "https://www.slideshare.net/slideshow/girlguiding-digital-strategy-201415/32665708",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:00.171822"
},
{
"title": "Presentation from 250619976",
"url": "https://www.slideshare.net/slideshow/the-product-journey-roadmaps-are-dead-long-live-roadmaps/250619976",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:00.358624"
},
{
"title": "Presentation from 77383920",
"url": "https://www.slideshare.net/slideshow/how-to-define-your-product-roadmap-by-dan-olsen/77383920",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:00.857981"
},
{
"title": "Presentation from 234338113",
"url": "https://www.slideshare.net/slideshow/building-digital-strategy-roadmap-for-digital-transformation-complete-deck/234338113",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:00.903021"
},
{
"title": "Presentation from 49944496",
"url": "https://www.slideshare.net/slideshow/pragmatic-guide-for-preparing-great-product-roadmap/49944496",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:00.965282"
},
{
"title": "Presentation from 106387292",
"url": "https://www.slideshare.net/slideshow/digital-transformation-roadmap-16th-july-2018-v11-106387292/106387292",
"description": "",
"author": "",
"views": 0,
"search_query": "IT strategy roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:01.024102"
},
{
"title": "Presentation from 29970260",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-29970260/29970260",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.343543"
},
{
"title": "Presentation from 39372369",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-39372369/39372369",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.393133"
},
{
"title": "Presentation from 3155735",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-3155735/3155735",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.440387"
},
{
"title": "Presentation from 50952403",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-draftpresentablenotesvikasgroverv01a-50952403/50952403",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.476838"
},
{
"title": "Presentation from 63984606",
"url": "https://www.slideshare.net/slideshow/enterprise-security-architecture-63984606/63984606",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.544535"
},
{
"title": "Presentation from 26339996",
"url": "https://www.slideshare.net/slideshow/ea-presentation-togaf/26339996",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.595016"
},
{
"title": "Presentation from 121938463",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-governance-121938463/121938463",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.638541"
},
{
"title": "Presentation from 84295707",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-enterprise-architecture-consulting-services-enterprise-architecture-consulting/84295707",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.699496"
},
{
"title": "Presentation from 271237620",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-and-enterprise-structure-pptx/271237620",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.753296"
},
{
"title": "Presentation from 32113666",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-32113666/32113666",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.803467"
},
{
"title": "Presentation from 69587204",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-frameworks-69587204/69587204",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.841638"
},
{
"title": "Presentation from 262419655",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-2f31/262419655",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.892154"
},
{
"title": "Presentation from 31023634",
"url": "https://www.slideshare.net/slideshow/the-ultimate-tools-to-manage-isit-and-avoid-the-bush-telegraph/31023634",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.939042"
},
{
"title": "Presentation from 271237660",
"url": "https://www.slideshare.net/slideshow/enterprise-architecture-and-enterprise-structure-pptx-6a4d/271237660",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:12.982503"
},
{
"title": "Presentation from 68891998",
"url": "https://www.slideshare.net/slideshow/enterprise-security-architecture-by-arnab-chattopadhayay-bikash/68891998",
"description": "",
"author": "",
"views": 0,
"search_query": "enterprise architecture",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:13.019368"
},
{
"title": "Presentation from 281321143",
"url": "https://www.slideshare.net/slideshow/technology-roadmap-an-important-aspect-of-technology-management/281321143",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.357872"
},
{
"title": "Presentation from 30976348",
"url": "https://www.slideshare.net/slideshow/technology-roadmap-06022014/30976348",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.403167"
},
{
"title": "Presentation from 61125806",
"url": "https://www.slideshare.net/slideshow/technology-roadmap-highlightsreport-2015/61125806",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.446981"
},
{
"title": "Presentation from 30140805",
"url": "https://www.slideshare.net/slideshow/mei-2014-technology-roadmap/30140805",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.496628"
},
{
"title": "Presentation from 280396010",
"url": "https://www.slideshare.net/slideshow/iea-technology-roadmaps-technology-roadmap-wind-energy-oecd/280396010",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.554203"
},
{
"title": "Presentation from 280398759",
"url": "https://www.slideshare.net/slideshow/technology-roadmap-solar-thermal-electricity-oecd/280398759",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.597094"
},
{
"title": "Presentation from 63461432",
"url": "https://www.slideshare.net/slideshow/technology-developing-and-implementing-a-roadmap/63461432",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.652038"
},
{
"title": "Presentation from 11480985",
"url": "https://www.slideshare.net/slideshow/sap-technology-roadmap-dec-2011-update/11480985",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.720710"
},
{
"title": "Presentation from 76546051",
"url": "https://www.slideshare.net/slideshow/does-your-technology-roadmap-have-a-financial-roadmap/76546051",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.772921"
},
{
"title": "Presentation from 280351019",
"url": "https://www.slideshare.net/slideshow/iea-technology-roadmap-smart-grids-oecd-iea/280351019",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.817707"
},
{
"title": "Presentation from 280396656",
"url": "https://www.slideshare.net/slideshow/technology-roadmap-lowcarbon-technology-for-the-indian-cement-industry-oecd/280396656",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.862529"
},
{
"title": "Presentation from 280398769",
"url": "https://www.slideshare.net/slideshow/technology-roadmap-solar-photovoltaic-energy-2014-edition-oecd/280398769",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.908776"
},
{
"title": "Presentation from 276531279",
"url": "https://www.slideshare.net/slideshow/technology-roadmap-solar-photovoltaic-energy-2014-edition-edition-oecd/276531279",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:24.960951"
},
{
"title": "Presentation from 280351021",
"url": "https://www.slideshare.net/slideshow/iea-technology-roadmap-geothermal-heat-and-power-oecd-iea/280351021",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:25.000983"
},
{
"title": "Presentation from 5395802",
"url": "https://www.slideshare.net/slideshow/national-space-technology-roadmap-workshop-presentation/5395802",
"description": "",
"author": "",
"views": 0,
"search_query": "technology roadmap",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:25.059321"
},
{
"title": "Presentation from 99520391",
"url": "https://www.slideshare.net/slideshow/gdpr-compliance-99520391/99520391",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.270971"
},
{
"title": "Presentation from 249186947",
"url": "https://www.slideshare.net/slideshow/accelerating-the-path-to-gdpr-compliance/249186947",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.338350"
},
{
"title": "Presentation from 78641253",
"url": "https://www.slideshare.net/slideshow/presentation-gdpr-how-to-ensure-compliance/78641253",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.390097"
},
{
"title": "Presentation from 89183906",
"url": "https://www.slideshare.net/slideshow/establishing-sustainable-gdpr-compliance-89183906/89183906",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.435360"
},
{
"title": "Presentation from 78261191",
"url": "https://www.slideshare.net/slideshow/five-strategies-for-gdpr-compliance/78261191",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.488263"
},
{
"title": "Presentation from 78929113",
"url": "https://www.slideshare.net/slideshow/dcvast-gdpr-compliance-one-pager/78929113",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.538001"
},
{
"title": "Presentation from 262027285",
"url": "https://www.slideshare.net/slideshow/gdpr-compliance-kpis-and-kris/262027285",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.587309"
},
{
"title": "Presentation from 76935466",
"url": "https://www.slideshare.net/slideshow/iab-europes-gdpr-compliance-primer/76935466",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.629288"
},
{
"title": "Presentation from 272105061",
"url": "https://www.slideshare.net/slideshow/archiving-and-gdpr-compliance-presentation-dvm-gdpr-sap-pdf/272105061",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.692384"
},
{
"title": "Presentation from 115602823",
"url": "https://www.slideshare.net/slideshow/office-365-features-for-gdpr-compliance-webinar/115602823",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.752500"
},
{
"title": "Presentation from 102697596",
"url": "https://www.slideshare.net/slideshow/gdpr-software-general-data-protection-regulation-gdpr-dashboard/102697596",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.809694"
},
{
"title": "Presentation from 98258400",
"url": "https://www.slideshare.net/slideshow/gdpr-compliance-with-wso2-identity-server-98258400/98258400",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.850722"
},
{
"title": "Presentation from 73164127",
"url": "https://www.slideshare.net/slideshow/gdpr-compliance-presentation-for-consulegis-lawyers-network/73164127",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.913247"
},
{
"title": "Presentation from 247762024",
"url": "https://www.slideshare.net/slideshow/qubole-gdpr-security-and-compliance-whitepaper/247762024",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:36.964830"
},
{
"title": "Presentation from 80211772",
"url": "https://www.slideshare.net/slideshow/convince-your-board-ten-steps-to-gdpr-compliance/80211772",
"description": "",
"author": "",
"views": 0,
"search_query": "GDPR compliance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:37.007411"
},
{
"title": "Presentation from 279570271",
"url": "https://www.slideshare.net/slideshow/iso-27001-certification-iso-27001-certification-4fc1/279570271",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.229726"
},
{
"title": "Presentation from 12892342",
"url": "https://www.slideshare.net/slideshow/iso-27001-12892342/12892342",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.278566"
},
{
"title": "Presentation from 256207597",
"url": "https://www.slideshare.net/slideshow/iso-27001-awarenesstransitionpptx/256207597",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.350818"
},
{
"title": "Presentation from 279639045",
"url": "https://www.slideshare.net/slideshow/iso-iec-27001-awareness_presentation-pptx/279639045",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.392107"
},
{
"title": "Presentation from 7269377",
"url": "https://www.slideshare.net/slideshow/iso-27001-7269377/7269377",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.431194"
},
{
"title": "Presentation from 252008941",
"url": "https://www.slideshare.net/slideshow/2022-webinar-iso-27001-certificationpdf/252008941",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.483873"
},
{
"title": "Presentation from 238276266",
"url": "https://www.slideshare.net/slideshow/iso-27001-auditsguide/238276266",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.531812"
},
{
"title": "Presentation from 12671067",
"url": "https://www.slideshare.net/slideshow/iso-27001-10apr2006/12671067",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.583138"
},
{
"title": "Presentation from 239372003",
"url": "https://www.slideshare.net/slideshow/iso-27001-239372003/239372003",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.629444"
},
{
"title": "Presentation from 33864016",
"url": "https://www.slideshare.net/slideshow/iso-27001-implementationdocumentationmandatorylist/33864016",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.677777"
},
{
"title": "Presentation from 62890558",
"url": "https://www.slideshare.net/slideshow/what-is-iso-27001-isms-62890558/62890558",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.745398"
},
{
"title": "Presentation from 53265783",
"url": "https://www.slideshare.net/slideshow/it-security-iso-27001/53265783",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.794146"
},
{
"title": "Presentation from 253340176",
"url": "https://www.slideshare.net/slideshow/iso-survey-2021-iso-27001pdf/253340176",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.862482"
},
{
"title": "Presentation from 254487937",
"url": "https://www.slideshare.net/slideshow/iso-270012022-introduction/254487937",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.912637"
},
{
"title": "Presentation from 26200502",
"url": "https://www.slideshare.net/slideshow/iso-270012013/26200502",
"description": "",
"author": "",
"views": 0,
"search_query": "ISO 27001",
"source": "slideshare",
"harvested_at": "2025-12-17T02:33:48.958089"
},
{
"title": "Presentation from 85816125",
"url": "https://www.slideshare.net/slideshow/cyber-risk-management-85816125/85816125",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.174034"
},
{
"title": "Presentation from 86365441",
"url": "https://www.slideshare.net/slideshow/risk-management-approach-to-cyber-security/86365441",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.237715"
},
{
"title": "Presentation from 272072114",
"url": "https://www.slideshare.net/slideshow/cyber-security-risk-management-strategies-for-saudi-arabia-pdf/272072114",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.285439"
},
{
"title": "Presentation from 280976724",
"url": "https://www.slideshare.net/slideshow/transdisciplinary-perspectives-on-risk-management-and-cyber-intelligence-1st-edition-luisa-dall-acqua/280976724",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.334196"
},
{
"title": "Presentation from 279178190",
"url": "https://www.slideshare.net/slideshow/transdisciplinary-perspectives-on-risk-management-and-cyber-intelligence-1st-edition-luisa-dallacqua/279178190",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.378163"
},
{
"title": "Presentation from 69699271",
"url": "https://www.slideshare.net/slideshow/cyber-liability-insurance-risk-management-and-preparation/69699271",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.419922"
},
{
"title": "Presentation from 58688451",
"url": "https://www.slideshare.net/slideshow/archer-users-group-southern-risk-council-2016-enterprise-risk-management-and-cyber-security/58688451",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.463735"
},
{
"title": "Presentation from 90501725",
"url": "https://www.slideshare.net/slideshow/third-party-risk-management-with-cyber-threat-intelligence/90501725",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.504537"
},
{
"title": "Presentation from 73257031",
"url": "https://www.slideshare.net/slideshow/cyber-security-vendor-risk-management-supply-chain-risk-management/73257031",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.548306"
},
{
"title": "Presentation from 282839231",
"url": "https://www.slideshare.net/slideshow/file-08-cyber-risk-management-ict-5418-cyber-crime-and-cyber-terrorism-pptx/282839231",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.589859"
},
{
"title": "Presentation from 76951143",
"url": "https://www.slideshare.net/slideshow/cyber-risk-management-in-2017-challenges-recommendations-76951143/76951143",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.627927"
},
{
"title": "Presentation from 117820390",
"url": "https://www.slideshare.net/slideshow/cybersecurity-cyber-risk-management-for-banks-financial-institutions/117820390",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.673556"
},
{
"title": "Presentation from 36884035",
"url": "https://www.slideshare.net/slideshow/cyber-risk-management/36884035",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.726716"
},
{
"title": "Presentation from 70012744",
"url": "https://www.slideshare.net/slideshow/cyber-risk-management-in-2017-challenges-recommendations/70012744",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.803623"
},
{
"title": "Presentation from 243625807",
"url": "https://www.slideshare.net/slideshow/cyber-security-services-risk-management-solutions-ampcus-inc-243625807/243625807",
"description": "",
"author": "",
"views": 0,
"search_query": "cyber risk management",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:00.846982"
},
{
"title": "Presentation from 64116600",
"url": "https://www.slideshare.net/slideshow/securitygovernance/64116600",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:11.849591"
},
{
"title": "Presentation from 78957257",
"url": "https://www.slideshare.net/slideshow/cloud-security-governance-78957257/78957257",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:11.913290"
},
{
"title": "Presentation from 81168738",
"url": "https://www.slideshare.net/slideshow/information-security-governance-and-strategy/81168738",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:11.962210"
},
{
"title": "Presentation from 255127663",
"url": "https://www.slideshare.net/slideshow/information-security-governance-framework/255127663",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.027669"
},
{
"title": "Presentation from 239680101",
"url": "https://www.slideshare.net/slideshow/cyber-security-governance/239680101",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.081263"
},
{
"title": "Presentation from 63926821",
"url": "https://www.slideshare.net/slideshow/big-data-security-and-governance/63926821",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.136627"
},
{
"title": "Presentation from 2848176",
"url": "https://www.slideshare.net/slideshow/security-governance-isp-eng-2848176/2848176",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.197142"
},
{
"title": "Presentation from 248302214",
"url": "https://www.slideshare.net/slideshow/an-information-security-governance-framework/248302214",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.252322"
},
{
"title": "Presentation from 81726908",
"url": "https://www.slideshare.net/slideshow/information-security-governance-and-strategy-3/81726908",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.311068"
},
{
"title": "Presentation from 23974559",
"url": "https://www.slideshare.net/slideshow/journal-december-2012/23974559",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.367082"
},
{
"title": "Presentation from 81855272",
"url": "https://www.slideshare.net/slideshow/information-security-governance-2a/81855272",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.414547"
},
{
"title": "Presentation from 81855635",
"url": "https://www.slideshare.net/slideshow/information-security-governance-2a-81855635/81855635",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.467214"
},
{
"title": "Presentation from 12806723",
"url": "https://www.slideshare.net/slideshow/effective-it-security-governance-leo-de-sousa/12806723",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.520285"
},
{
"title": "Presentation from 39539511",
"url": "https://www.slideshare.net/slideshow/security-governance-primer/39539511",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.571328"
},
{
"title": "Presentation from 77890469",
"url": "https://www.slideshare.net/slideshow/information-security-in-public-governance/77890469",
"description": "",
"author": "",
"views": 0,
"search_query": "security governance",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:12.621314"
},
{
"title": "Presentation from 265982988",
"url": "https://www.slideshare.net/slideshow/top-5-urgent-reasons-for-siem-implementation-allendevauxpdf/265982988",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:24.355420"
},
{
"title": "Presentation from 10590169",
"url": "https://www.slideshare.net/slideshow/misti-infosec-2010-siem-implementation/10590169",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:24.433359"
},
{
"title": "Presentation from 82386670",
"url": "https://www.slideshare.net/slideshow/gdpr-9-step-siem-implementation-checklist/82386670",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:24.516909"
},
{
"title": "Presentation from 8721331",
"url": "https://www.slideshare.net/slideshow/five-best-and-five-worst-practices-for-siem-by-dr-anton-chuvakin-8721331/8721331",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:24.580295"
},
{
"title": "Presentation from 8721324",
"url": "https://www.slideshare.net/slideshow/five-best-and-five-worst-practices-for-siem-by-dr-anton-chuvakin/8721324",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:24.643049"
},
{
"title": "Presentation from 59267489",
"url": "https://www.slideshare.net/slideshow/why-so-many-siem-implmentations-fail/59267489",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:24.695124"
},
{
"title": "Presentation from 122722414",
"url": "https://www.slideshare.net/slideshow/which-generation-of-siem/122722414",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:24.744735"
},
{
"title": "Presentation from 47721367",
"url": "https://www.slideshare.net/slideshow/surelog-largescale-siem-implementation-in-a-distributed-it-security-world/47721367",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:24.804051"
},
{
"title": "Presentation from 254143533",
"url": "https://www.slideshare.net/slideshow/isol532-final-project-assignmentproject-assignmentthis-prdocx/254143533",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:25.236496"
},
{
"title": "Presentation from 33420158",
"url": "https://www.slideshare.net/slideshow/siem-for-beginners/33420158",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:25.291072"
},
{
"title": "Presentation from 254143525",
"url": "https://www.slideshare.net/slideshow/ism3013-final-project-assignment-project-assignment-docx/254143525",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:25.343978"
},
{
"title": "Presentation from 75051640",
"url": "https://www.slideshare.net/slideshow/apply-big-data-and-data-lake-for-processing-security-data-collections/75051640",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:25.433678"
},
{
"title": "Presentation from 264350308",
"url": "https://www.slideshare.net/slideshow/exploring-critical-vulnerabilities-in-siem-implementation-and-soc-service-procurement-an-indepth-analysis-of-highrisk-scenarios/264350308",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:25.488766"
},
{
"title": "Presentation from 78590806",
"url": "https://www.slideshare.net/slideshow/security-meetup-scotland-august-2017-deconstructing-siem/78590806",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:25.554127"
},
{
"title": "Presentation from 284613369",
"url": "https://www.slideshare.net/slideshow/managed-splunk-partner-vs-in-house-cost-risk-value-comparison/284613369",
"description": "",
"author": "",
"views": 0,
"search_query": "SIEM implementation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:25.599130"
},
{
"title": "Presentation from 276376589",
"url": "https://www.slideshare.net/slideshow/understanding-endpoint-detection-and-response-edr/276376589",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:36.650757"
},
{
"title": "Presentation from 273403604",
"url": "https://www.slideshare.net/slideshow/the-future-of-endpoint-detection-and-response-edr-trends-to-watch/273403604",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:36.720472"
},
{
"title": "Presentation from 273114064",
"url": "https://www.slideshare.net/slideshow/the-importance-of-edr-security-in-modern-cyber-defense/273114064",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:36.774992"
},
{
"title": "Presentation from 234873558",
"url": "https://www.slideshare.net/slideshow/mcafee-mcafee-active-response-mar-endpoint-detection-response-edr/234873558",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:36.845379"
},
{
"title": "Presentation from 251626062",
"url": "https://www.slideshare.net/slideshow/xdr-solution-company-in-usapptx/251626062",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:36.896635"
},
{
"title": "Presentation from 276386330",
"url": "https://www.slideshare.net/slideshow/strengthen-endpoint-security-with-seqrite-edr/276386330",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:36.988514"
},
{
"title": "Presentation from 273887201",
"url": "https://www.slideshare.net/slideshow/opentext-mxdr-advanced-edr-agent-with-autonomous-next-gen-protection/273887201",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:37.038237"
},
{
"title": "Presentation from 57183518",
"url": "https://www.slideshare.net/slideshow/panda-adaptive-defense-360/57183518",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:37.093666"
},
{
"title": "Presentation from 279695970",
"url": "https://www.slideshare.net/slideshow/understanding-endpoint-security-in-a-soc/279695970",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:37.149331"
},
{
"title": "Presentation from 77150440",
"url": "https://www.slideshare.net/slideshow/maturing-endpoint-security-5-key-considerations/77150440",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:37.197858"
},
{
"title": "Presentation from 86381079",
"url": "https://www.slideshare.net/slideshow/edr-vs-siem-the-fight-is-on/86381079",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:37.255433"
},
{
"title": "Presentation from 267282982",
"url": "https://www.slideshare.net/slideshow/stay-ahead-in-2024-with-these-cybersecuritypdf/267282982",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:37.301548"
},
{
"title": "Presentation from 262859993",
"url": "https://www.slideshare.net/slideshow/tidying-up-your-nest-validating-attck-technique-coverage-using-edr-telemetry/262859993",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:37.363024"
},
{
"title": "Presentation from 236312406",
"url": "https://www.slideshare.net/slideshow/managed-end-point-security/236312406",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:37.408563"
},
{
"title": "Presentation from 272430482",
"url": "https://www.slideshare.net/slideshow/key-features-of-endpoint-security-tools-presentation/272430482",
"description": "",
"author": "",
"views": 0,
"search_query": "EDR endpoint detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:37.472312"
},
{
"title": "Presentation from 250663705",
"url": "https://www.slideshare.net/slideshow/managed-detection-and-response-mdr-whitepaper/250663705",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:48.741229"
},
{
"title": "Presentation from 251044856",
"url": "https://www.slideshare.net/slideshow/what-is-managed-detection-and-response-mdr-security-services/251044856",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:48.799775"
},
{
"title": "Presentation from 264315547",
"url": "https://www.slideshare.net/slideshow/understanding-managed-detection-and-response-mdr-proarchs-approach/264315547",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:48.854630"
},
{
"title": "Presentation from 116947143",
"url": "https://www.slideshare.net/slideshow/critical-capabilities-for-mdr-services-what-to-know-before-you-buy/116947143",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:48.922320"
},
{
"title": "Presentation from 282084528",
"url": "https://www.slideshare.net/slideshow/top-10-mdr-tools-in-2025-boost-your-cyber-defence/282084528",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:49.016151"
},
{
"title": "Presentation from 276013274",
"url": "https://www.slideshare.net/slideshow/mdr-as-a-service-proactive-threat-detection-response-pptx/276013274",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:49.070612"
},
{
"title": "Presentation from 284129547",
"url": "https://www.slideshare.net/slideshow/managed-detection-anmanaged-detection-and-responsed/284129547",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:49.186323"
},
{
"title": "Presentation from 270340331",
"url": "https://www.slideshare.net/slideshow/comparing-mdr-to-traditional-cybersecurity-approaches-pptx/270340331",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:49.246454"
},
{
"title": "Presentation from 238781172",
"url": "https://www.slideshare.net/slideshow/managed-detection-and-response-selective-outsourcing-for-understaffed-socs-and-the-platforms-that-enable-mdr-services/238781172",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:49.294752"
},
{
"title": "Presentation from 78750593",
"url": "https://www.slideshare.net/slideshow/netwatcher-customer-overview/78750593",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:49.356878"
},
{
"title": "Presentation from 95662374",
"url": "https://www.slideshare.net/slideshow/a-case-for-managed-detection-and-response/95662374",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:49.402228"
},
{
"title": "Presentation from 258246148",
"url": "https://www.slideshare.net/slideshow/cyber-security-companies-uk/258246148",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:49.485185"
},
{
"title": "Presentation from 250054999",
"url": "https://www.slideshare.net/slideshow/managed-detection-and-response-analyst-report/250054999",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:49.536842"
},
{
"title": "Presentation from 119818967",
"url": "https://www.slideshare.net/slideshow/infocyte-q3-partner-update/119818967",
"description": "",
"author": "",
"views": 0,
"search_query": "MDR managed detection",
"source": "slideshare",
"harvested_at": "2025-12-17T02:34:49.594307"
},
{
"title": "Presentation from 251485851",
"url": "https://www.slideshare.net/slideshow/extended-detection-and-response-xdran-overhyped-product-category-with-ultimate-security-potential/251485851",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.075693"
},
{
"title": "Presentation from 275382112",
"url": "https://www.slideshare.net/slideshow/kaspersky-next-xdr-expert-product-presentation-1909-en-pptx/275382112",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.141900"
},
{
"title": "Presentation from 267378203",
"url": "https://www.slideshare.net/slideshow/cybersecurity-leaders-guide-to-xdr-for-business/267378203",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.199180"
},
{
"title": "Presentation from 283062942",
"url": "https://www.slideshare.net/slideshow/strengthening-security-with-extended-detection-and-response-docx/283062942",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.266715"
},
{
"title": "Presentation from 251595542",
"url": "https://www.slideshare.net/slideshow/2022-apisecuremonitoring-your-apis-for-attacks-using-siem-versus-xdr/251595542",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.335251"
},
{
"title": "Presentation from 272862807",
"url": "https://www.slideshare.net/slideshow/understanding-xdr-solutions-the-future-of-cybersecurity/272862807",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.385994"
},
{
"title": "Presentation from 274591312",
"url": "https://www.slideshare.net/slideshow/maximizing-soc-benefits-with-xdr-a-game-changer-for-cybersecurity/274591312",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.459666"
},
{
"title": "Presentation from 270659578",
"url": "https://www.slideshare.net/slideshow/top-10-cybersecurity-trends-in-2024-benefits-challenges-insider-market-research/270659578",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.529240"
},
{
"title": "Presentation from 282575659",
"url": "https://www.slideshare.net/slideshow/cloud-native-ai-powered-xdr-drives-endpoint-security-platforms-market-toward-us-23-9-billion-by-2030/282575659",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.585036"
},
{
"title": "Presentation from 269416276",
"url": "https://www.slideshare.net/slideshow/what-are-the-latest-trends-in-endpoint-security-for-2024-2dbe/269416276",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.630456"
},
{
"title": "Presentation from 277509200",
"url": "https://www.slideshare.net/slideshow/empowering-cyber-resilience-with-seqrite-xdr-the-future-of-data-privacy-threat-detection/277509200",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.735149"
},
{
"title": "Presentation from 246645180",
"url": "https://www.slideshare.net/slideshow/microsoft-defender-and-azure-sentinel/246645180",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.777105"
},
{
"title": "Presentation from 280464073",
"url": "https://www.slideshare.net/slideshow/xdr-buyer-guide-by-infopercept-cybersecurity/280464073",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.843722"
},
{
"title": "Presentation from 274615294",
"url": "https://www.slideshare.net/slideshow/proactive-protection-and-real-time-threat-response/274615294",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.888477"
},
{
"title": "Presentation from 262424624",
"url": "https://www.slideshare.net/slideshow/why-should-organizations-consider-extended-detection-and-response-xdr/262424624",
"description": "",
"author": "",
"views": 0,
"search_query": "XDR security",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:01.956137"
},
{
"title": "Presentation from 280610952",
"url": "https://www.slideshare.net/slideshow/enhancing-cyber-defense-with-security-orchestration-and-automation-soar-pdf/280610952",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:12.857711"
},
{
"title": "Presentation from 251630629",
"url": "https://www.slideshare.net/slideshow/soar-platformpptx/251630629",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:12.943432"
},
{
"title": "Presentation from 250900642",
"url": "https://www.slideshare.net/slideshow/optimize-your-cyber-security-with-soar-tools/250900642",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:12.993457"
},
{
"title": "Presentation from 250266792",
"url": "https://www.slideshare.net/slideshow/ug-soar-22sep21/250266792",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.071519"
},
{
"title": "Presentation from 115009387",
"url": "https://www.slideshare.net/slideshow/splunk-phantom-soar-roundtable/115009387",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.133164"
},
{
"title": "Presentation from 251142089",
"url": "https://www.slideshare.net/slideshow/understanding-soar-security/251142089",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.239197"
},
{
"title": "Presentation from 238931481",
"url": "https://www.slideshare.net/slideshow/security-orchestration-automation-and-response-soar-market/238931481",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.294370"
},
{
"title": "Presentation from 136244078",
"url": "https://www.slideshare.net/slideshow/automating-cybersecurity/136244078",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.340599"
},
{
"title": "Presentation from 260379674",
"url": "https://www.slideshare.net/slideshow/three-things-we-see-fix-in-every-struggling-security-automation-project/260379674",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.405282"
},
{
"title": "Presentation from 277826584",
"url": "https://www.slideshare.net/slideshow/soar-security-systems-revolutionizing-cybersecurity-through-orchestration-and-automation/277826584",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.453710"
},
{
"title": "Presentation from 230330814",
"url": "https://www.slideshare.net/slideshow/journey-to-the-center-of-security-operations/230330814",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.516758"
},
{
"title": "Presentation from 260379741",
"url": "https://www.slideshare.net/slideshow/how-to-reduce-the-financial-impact-of-security-incidents-by-90-or-more-with-smart-soar/260379741",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.570041"
},
{
"title": "Presentation from 122800602",
"url": "https://www.slideshare.net/slideshow/introducing-siemplify-v425-security-orchestration-automation-and-response-soar-platform/122800602",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.614718"
},
{
"title": "Presentation from 218391449",
"url": "https://www.slideshare.net/slideshow/transform-your-security-operations-with-security-automation-and-orchestration/218391449",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.665398"
},
{
"title": "Presentation from 137941992",
"url": "https://www.slideshare.net/slideshow/secops-ir-and-forensic-workflows-python-security-automation/137941992",
"description": "",
"author": "",
"views": 0,
"search_query": "SOAR automation",
"source": "slideshare",
"harvested_at": "2025-12-17T02:35:13.717268"
}
]
}