{ "timestamp": "2025-12-17T02:35:17.955056", "stats": { "searches": 33, "presentations_found": 495, "saved_to_neo4j": 494, "errors": 0 }, "presentations": [ { "title": "Presentation from 163240780", "url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-163240780/163240780", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:34.830211" }, { "title": "Presentation from 251309910", "url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-policy-and-practice-251309910/251309910", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.027254" }, { "title": "Presentation from 251859392", "url": "https://www.slideshare.net/slideshow/reimagining-ot-cybersecurity-strategy-deloitte/251859392", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.091458" }, { "title": "Presentation from 222108263", "url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-222108263/222108263", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.176437" }, { "title": "Presentation from 249933437", "url": "https://www.slideshare.net/slideshow/cybersecurity-strategybrieftoitc-final17apr2015/249933437", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.323823" }, { "title": "Presentation from 259183825", "url": "https://www.slideshare.net/slideshow/defenceindepth-cybersecurity-strategy/259183825", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.374559" }, { "title": "Presentation from 190989896", "url": "https://www.slideshare.net/slideshow/singapore-cybersecurity-strategy-and-legislation-for-smu-law-school-2019/190989896", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.428785" }, { "title": "Presentation from 114007918", "url": "https://www.slideshare.net/slideshow/singapore-cybersecurity-strategy-and-legislation-2018/114007918", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.483336" }, { "title": "Presentation from 43476233", "url": "https://www.slideshare.net/slideshow/cybersecurity-rmf-strategy/43476233", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.549737" }, { "title": "Presentation from 49382155", "url": "https://www.slideshare.net/slideshow/guidelines-for-smart-grid-cybersecurity-strategy/49382155", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.666104" }, { "title": "Presentation from 269548883", "url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-building-a-balanced-scorecard-with-effective-kpis/269548883", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.721759" }, { "title": "Presentation from 259536297", "url": "https://www.slideshare.net/slideshow/overview-of-national-cybersecurity-strategy-2023pdf/259536297", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.810036" }, { "title": "Presentation from 138603686", "url": "https://www.slideshare.net/slideshow/insights-to-building-an-effective-industrial-cybersecurity-strategy-for-your-organization/138603686", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.871751" }, { "title": "Presentation from 258512407", "url": "https://www.slideshare.net/slideshow/secureweb3-developing-a-comprehensive-cybersecurity-strategy-for-the-decentralized-future/258512407", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:35.943080" }, { "title": "Presentation from 253074630", "url": "https://www.slideshare.net/slideshow/cybersecurity-strategy-law-and-policy-group-assignment/253074630", "description": "", "author": "", "views": 0, "search_query": "cybersecurity strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:28:36.000739" }, { "title": "Presentation from 272155619", "url": "https://www.slideshare.net/slideshow/modern-security-operations-building-and-leading-modern-soc/272155619", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:47.873137" }, { "title": "Presentation from 270020253", "url": "https://www.slideshare.net/slideshow/introduction-to-security-operations-center-soc/270020253", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:47.950797" }, { "title": "Presentation from 280154718", "url": "https://www.slideshare.net/slideshow/security-operations-center-soc-cisco-certificate/280154718", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.032413" }, { "title": "Presentation from 4678952", "url": "https://www.slideshare.net/slideshow/rothke-secure360-building-a-security-operations-center-soc/4678952", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.098631" }, { "title": "Presentation from 74478214", "url": "https://www.slideshare.net/slideshow/building-a-nextgeneration-security-operations-center-soc/74478214", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.157532" }, { "title": "Presentation from 24691810", "url": "https://www.slideshare.net/slideshow/rothke-rsa-2012-building-a-security-operations-center-soc/24691810", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.214929" }, { "title": "Presentation from 150245309", "url": "https://www.slideshare.net/slideshow/cyber-security-operations-center-csoc/150245309", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.269624" }, { "title": "Presentation from 88105697", "url": "https://www.slideshare.net/slideshow/security-operation-centers/88105697", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.347875" }, { "title": "Presentation from 267023230", "url": "https://www.slideshare.net/slideshow/future-of-soc-more-security-less-operations/267023230", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.398577" }, { "title": "Presentation from 253358381", "url": "https://www.slideshare.net/slideshow/enterprise-security-leadership-creating-a-world-class-security-operations-center-soc/253358381", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.463254" }, { "title": "Presentation from 97285609", "url": "https://www.slideshare.net/slideshow/what-is-security-operations-centre-types-need-and-benefits-of-soc/97285609", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.524979" }, { "title": "Presentation from 78688363", "url": "https://www.slideshare.net/slideshow/manoj-purandare-strategy-towards-an-effective-security-operations-centre-soc/78688363", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.588371" }, { "title": "Presentation from 269287424", "url": "https://www.slideshare.net/slideshow/implementing-security-operations-center-soc-strategies-for-success-in-2024/269287424", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.651271" }, { "title": "Presentation from 273459049", "url": "https://www.slideshare.net/slideshow/security-operations-center-soc-by-aadit-technologies/273459049", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.724969" }, { "title": "Presentation from 78688196", "url": "https://www.slideshare.net/slideshow/manoj-purandare-stratergy-towards-an-effective-soc/78688196", "description": "", "author": "", "views": 0, "search_query": "SOC security operations", "source": "slideshare", "harvested_at": "2025-12-17T02:28:48.771778" }, { "title": "Presentation from 272583551", "url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-cti-lifecycle-and-cti-framework/272583551", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:00.457336" }, { "title": "Presentation from 281734837", "url": "https://www.slideshare.net/slideshow/threat-intelligence-cti-blue-teams-pptx/281734837", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:00.521563" }, { "title": "Presentation from 68988770", "url": "https://www.slideshare.net/slideshow/security-strategy-and-tactic-with-cyber-threat-intelligence-cti-68988770/68988770", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:00.584677" }, { "title": "Presentation from 280950116", "url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-staying-ahead-of-attacks-doc/280950116", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:00.651130" }, { "title": "Presentation from 236250782", "url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-la-rilevanza-del-dato-per-il-business/236250782", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:00.708485" }, { "title": "Presentation from 81134400", "url": "https://www.slideshare.net/slideshow/gabor-munk-cti-and-information-sharing/81134400", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:00.770708" }, { "title": "Presentation from 247219270", "url": "https://www.slideshare.net/slideshow/welcome-to-the-world-of-cyber-threat-intelligence/247219270", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:00.831763" }, { "title": "Presentation from 249451706", "url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-information-to-insight/249451706", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:00.919887" }, { "title": "Presentation from 270927433", "url": "https://www.slideshare.net/slideshow/the-disclosure-dilemma-ensuring-defense/270927433", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:00.975087" }, { "title": "Presentation from 273094626", "url": "https://www.slideshare.net/slideshow/socradar-s-2024-cyber-threat-intelligence-solution/273094626", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:01.041774" }, { "title": "Presentation from 141297630", "url": "https://www.slideshare.net/slideshow/effective-threat-hunting-with-tactical-threat-intelligence/141297630", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:01.089769" }, { "title": "Presentation from 249967976", "url": "https://www.slideshare.net/slideshow/cti-ant-hunting-for-chinese-threat-intelligence/249967976", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:01.149304" }, { "title": "Presentation from 65718513", "url": "https://www.slideshare.net/slideshow/cyber-threat-intelligence-what-do-we-want-the-incident-response-and-technology-risk-management-perspectives/65718513", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:01.302066" }, { "title": "Presentation from 256799647", "url": "https://www.slideshare.net/slideshow/stop-tilting-at-windmills-3-key-lessons-that-cti-teams-should-learn-from-the-past-sans-cti-summit-2020/256799647", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:01.357734" }, { "title": "Presentation from 69859022", "url": "https://www.slideshare.net/slideshow/security-strategy-and-tactic-with-cyber-threat-intelligence-cti-69859022/69859022", "description": "", "author": "", "views": 0, "search_query": "threat intelligence CTI", "source": "slideshare", "harvested_at": "2025-12-17T02:29:01.416572" }, { "title": "Presentation from 61866350", "url": "https://www.slideshare.net/slideshow/incident-response-61866350/61866350", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:12.809425" }, { "title": "Presentation from 67359492", "url": "https://www.slideshare.net/slideshow/incident-response-67359492/67359492", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:12.991477" }, { "title": "Presentation from 251184906", "url": "https://www.slideshare.net/slideshow/incident-response-methodology/251184906", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:13.158047" }, { "title": "Presentation from 164038375", "url": "https://www.slideshare.net/slideshow/incident-response-164038375/164038375", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:13.239500" }, { "title": "Presentation from 253758024", "url": "https://www.slideshare.net/slideshow/incident-response-security/253758024", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:13.350357" }, { "title": "Presentation from 258495954", "url": "https://www.slideshare.net/slideshow/incident-response-vs-incident-detectionpdf/258495954", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:13.536925" }, { "title": "Presentation from 23593938", "url": "https://www.slideshare.net/slideshow/proactive-incident-response/23593938", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:13.907852" }, { "title": "Presentation from 146275477", "url": "https://www.slideshare.net/slideshow/incident-response-overview/146275477", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:14.488860" }, { "title": "Presentation from 1476119", "url": "https://www.slideshare.net/slideshow/malwareincidentresponse/1476119", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:14.573206" }, { "title": "Presentation from 106759454", "url": "https://www.slideshare.net/slideshow/incident-response-in-cloudvandanaverma/106759454", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:14.683819" }, { "title": "Presentation from 91059409", "url": "https://www.slideshare.net/slideshow/incident-response-system-irs/91059409", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:14.819876" }, { "title": "Presentation from 129018068", "url": "https://www.slideshare.net/slideshow/incident-response-process-129018068/129018068", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:14.890492" }, { "title": "Presentation from 1733422", "url": "https://www.slideshare.net/slideshow/incident-response-swimlanes/1733422", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:15.010592" }, { "title": "Presentation from 277217362", "url": "https://www.slideshare.net/slideshow/incident-response-lifecyclepresentation-pptx/277217362", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:15.163852" }, { "title": "Presentation from 73022623", "url": "https://www.slideshare.net/slideshow/sample-incident-response-plan/73022623", "description": "", "author": "", "views": 0, "search_query": "incident response", "source": "slideshare", "harvested_at": "2025-12-17T02:29:15.207858" }, { "title": "Presentation from 272708349", "url": "https://www.slideshare.net/slideshow/nis2-directive-readiness-compliance-challenges-and-recommendations-docx/272708349", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:26.799092" }, { "title": "Presentation from 283086014", "url": "https://www.slideshare.net/slideshow/nis2-event-directive-information-overview/283086014", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:26.869369" }, { "title": "Presentation from 281242029", "url": "https://www.slideshare.net/slideshow/nis2-compliance-for-msps-roadmap-benefits-cybersecurity-trends-2025-guide/281242029", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:27.074260" }, { "title": "Presentation from 273001934", "url": "https://www.slideshare.net/slideshow/nis-2-and-details-about-implementation-watchguard/273001934", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:27.348452" }, { "title": "Presentation from 260999351", "url": "https://www.slideshare.net/slideshow/dachnug50-bigfix-nis2pdf/260999351", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:27.514383" }, { "title": "Presentation from 283086010", "url": "https://www.slideshare.net/slideshow/2024-04-21-nis2-and-dora-introduction-of-activities/283086010", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:27.570216" }, { "title": "Presentation from 278737660", "url": "https://www.slideshare.net/slideshow/europe-tightens-cybersecurity-rules-with-nis2-directive-pdf/278737660", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:27.703202" }, { "title": "Presentation from 278961759", "url": "https://www.slideshare.net/slideshow/eu-and-you-eu-and-you-upcoming-regulation/278961759", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:27.823283" }, { "title": "Presentation from 275587035", "url": "https://www.slideshare.net/slideshow/map-of-security-related-eu-legislations/275587035", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:27.892496" }, { "title": "Presentation from 272311967", "url": "https://www.slideshare.net/slideshow/is-your-codebase-ready-for-nis2-and-the-cyber-resilience-act/272311967", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:27.985394" }, { "title": "Presentation from 283588646", "url": "https://www.slideshare.net/slideshow/nis2-complete-view-framework-guide-manual/283588646", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:28.090806" }, { "title": "Presentation from 281036749", "url": "https://www.slideshare.net/slideshow/quantum-threats-are-closer-than-you-think-act-now-to-stay-secure/281036749", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:28.270650" }, { "title": "Presentation from 274868244", "url": "https://www.slideshare.net/slideshow/trustarc-webinar-data-privacy-in-the-eu_-what-you-need-to-know/274868244", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:28.329088" }, { "title": "Presentation from 268755068", "url": "https://www.slideshare.net/slideshow/pecific-pac34-slidedeck-v1-for-website-pptx/268755068", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:28.403888" }, { "title": "Presentation from 282061727", "url": "https://www.slideshare.net/slideshow/data-protection-resilience-in-focus-pdf/282061727", "description": "", "author": "", "views": 0, "search_query": "NIS2 directive", "source": "slideshare", "harvested_at": "2025-12-17T02:29:28.482043" }, { "title": "Presentation from 252679729", "url": "https://www.slideshare.net/slideshow/sock-puppetpptx/252679729", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:40.082176" }, { "title": "Presentation from 249384223", "url": "https://www.slideshare.net/slideshow/from-research-to-investigation-digital-traces-and-their-use-in-data-journalism-and-osint/249384223", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:40.153024" }, { "title": "Presentation from 58641706", "url": "https://www.slideshare.net/slideshow/osint-open-source-intelligence-leading-investigation-and-investigation-technique/58641706", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:40.849505" }, { "title": "Presentation from 259938752", "url": "https://www.slideshare.net/slideshow/open-source-intelligence-researcher/259938752", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:41.071188" }, { "title": "Presentation from 260078444", "url": "https://www.slideshare.net/slideshow/osint-service/260078444", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:41.657567" }, { "title": "Presentation from 252497260", "url": "https://www.slideshare.net/slideshow/csi-osint-specialist/252497260", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:41.720425" }, { "title": "Presentation from 212354373", "url": "https://www.slideshare.net/slideshow/dr-dayu-kao-the-investigation-forensics-and-governance-of-atm-heist-threats-in-law-enforcement-agencies/212354373", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:41.919981" }, { "title": "Presentation from 278055321", "url": "https://www.slideshare.net/slideshow/how-to-create-500-m-and-get-away-with-it-pptx/278055321", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:43.529673" }, { "title": "Presentation from 253492110", "url": "https://www.slideshare.net/slideshow/intelligence-against-the-war-on-terrorismyou-serve-on-the-staff-docx/253492110", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:43.897938" }, { "title": "Presentation from 276567593", "url": "https://www.slideshare.net/slideshow/social-media-crime-investigation-by-pptx/276567593", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:43.970082" }, { "title": "Presentation from 149521869", "url": "https://www.slideshare.net/slideshow/p19-open-source-investigationsdeciphering-criminals-digital-footprintmatasphillips61319/149521869", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:44.067045" }, { "title": "Presentation from 261539049", "url": "https://www.slideshare.net/slideshow/definitive-guide-to-tiktokpdf/261539049", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:44.136502" }, { "title": "Presentation from 65875731", "url": "https://www.slideshare.net/slideshow/soc2016-the-investigation-labyrinth/65875731", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:44.307938" }, { "title": "Presentation from 253379004", "url": "https://www.slideshare.net/slideshow/captech-talksosint-dr-kellup-charles-10622pptx/253379004", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:44.380213" }, { "title": "Presentation from 279085381", "url": "https://www.slideshare.net/slideshow/osint-part-1-use-osint-for-basic-factfinding-pptx/279085381", "description": "", "author": "", "views": 0, "search_query": "OSINT investigation", "source": "slideshare", "harvested_at": "2025-12-17T02:29:44.440451" }, { "title": "Presentation from 22258827", "url": "https://www.slideshare.net/slideshow/intro-topentesting/22258827", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:56.066682" }, { "title": "Presentation from 129522525", "url": "https://www.slideshare.net/slideshow/penetration-testing-129522525/129522525", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:56.196729" }, { "title": "Presentation from 10902959", "url": "https://www.slideshare.net/slideshow/penetration-testing-10902959/10902959", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:56.284006" }, { "title": "Presentation from 23103088", "url": "https://www.slideshare.net/slideshow/penetration-testing-presentation-practical-guide/23103088", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:56.394710" }, { "title": "Presentation from 251035795", "url": "https://www.slideshare.net/slideshow/azure-penetration-testing-251035795/251035795", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:56.465723" }, { "title": "Presentation from 233799681", "url": "https://www.slideshare.net/slideshow/penetration-testing-233799681/233799681", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:56.582223" }, { "title": "Presentation from 232999770", "url": "https://www.slideshare.net/slideshow/penetration-testing-guide-232999770/232999770", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:56.663763" }, { "title": "Presentation from 25286617", "url": "https://www.slideshare.net/slideshow/penetration-testing-services-25286617/25286617", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:56.756964" }, { "title": "Presentation from 131880275", "url": "https://www.slideshare.net/slideshow/penetration-testing-tutorial-penetration-testing-tools-cyber-security-training-edureka/131880275", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:56.837371" }, { "title": "Presentation from 239410696", "url": "https://www.slideshare.net/slideshow/penetration-testing-overview/239410696", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:56.989736" }, { "title": "Presentation from 76932778", "url": "https://www.slideshare.net/slideshow/penetration-testing-services-76932778/76932778", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:57.208810" }, { "title": "Presentation from 127275224", "url": "https://www.slideshare.net/slideshow/penetration-testing-tutorial-127275224/127275224", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:57.350163" }, { "title": "Presentation from 283659128", "url": "https://www.slideshare.net/slideshow/introduction-to-penetration-testing-and-penetration-testing-proccess-pptx/283659128", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:57.646648" }, { "title": "Presentation from 227351035", "url": "https://www.slideshare.net/slideshow/penetration-testing-services-penetration-testing/227351035", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:57.817838" }, { "title": "Presentation from 264761279", "url": "https://www.slideshare.net/slideshow/vulnerability-assessment-and-penetration-testing/264761279", "description": "", "author": "", "views": 0, "search_query": "penetration testing", "source": "slideshare", "harvested_at": "2025-12-17T02:29:57.994634" }, { "title": "Presentation from 266893383", "url": "https://www.slideshare.net/slideshow/ransomware-defense-and-remediation-with-pure-storage/266893383", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:09.539644" }, { "title": "Presentation from 97495510", "url": "https://www.slideshare.net/slideshow/webinar-three-reasons-why-object-storage-is-the-best-defense-against-ransomware-attacks/97495510", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:09.665554" }, { "title": "Presentation from 270483028", "url": "https://www.slideshare.net/slideshow/ist-blueprint-for-ransomware-defense-pdf/270483028", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:09.782650" }, { "title": "Presentation from 77139476", "url": "https://www.slideshare.net/slideshow/ransomware-defensefordummies/77139476", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:09.837772" }, { "title": "Presentation from 264143595", "url": "https://www.slideshare.net/slideshow/ransomware-is-knocking-your-doorfinalpdf/264143595", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:09.975156" }, { "title": "Presentation from 235829822", "url": "https://www.slideshare.net/slideshow/ransomware-defensefordummies-235829822/235829822", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:10.060959" }, { "title": "Presentation from 94114986", "url": "https://www.slideshare.net/slideshow/atelier-technique-cisco-acss-2018/94114986", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:10.121911" }, { "title": "Presentation from 269861792", "url": "https://www.slideshare.net/slideshow/brian-tarbox-s3-sophisticated-storage-system/269861792", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:10.246434" }, { "title": "Presentation from 72044971", "url": "https://www.slideshare.net/slideshow/eextortion-trends-and-defense/72044971", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:10.364947" }, { "title": "Presentation from 78040475", "url": "https://www.slideshare.net/slideshow/how-to-protect-my-cloud-workload-from-ransomware/78040475", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:10.454004" }, { "title": "Presentation from 269556769", "url": "https://www.slideshare.net/slideshow/guarding-against-ransomware-strategies-for-robust-data-protection/269556769", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:10.548750" }, { "title": "Presentation from 58459850", "url": "https://www.slideshare.net/slideshow/panda-adaptive-defense-360-cyber-extortion-guide/58459850", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:10.635492" }, { "title": "Presentation from 77790382", "url": "https://www.slideshare.net/slideshow/preventing-todays-malware/77790382", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:10.752239" }, { "title": "Presentation from 269341812", "url": "https://www.slideshare.net/slideshow/alphv-site-taken-down-en-pdf/269341812", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:10.943887" }, { "title": "Presentation from 284291228", "url": "https://www.slideshare.net/slideshow/approaches-to-ransomware-protection-with-netapp-monitoring/284291228", "description": "", "author": "", "views": 0, "search_query": "ransomware defense", "source": "slideshare", "harvested_at": "2025-12-17T02:30:11.072921" }, { "title": "Presentation from 250434569", "url": "https://www.slideshare.net/slideshow/zero-trust-architecture-250434569/250434569", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:22.922115" }, { "title": "Presentation from 250846285", "url": "https://www.slideshare.net/slideshow/zero-trust-architecture-digital-trust-framework/250846285", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:23.277572" }, { "title": "Presentation from 230728692", "url": "https://www.slideshare.net/slideshow/round-table-zeroing-in-on-zero-trust-architecture/230728692", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:23.791846" }, { "title": "Presentation from 269219866", "url": "https://www.slideshare.net/slideshow/zero-trust-architecture-allendevaux-pdf/269219866", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:23.850512" }, { "title": "Presentation from 85856061", "url": "https://www.slideshare.net/slideshow/zero-trust-in-a-hybrid-architecture/85856061", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:23.916852" }, { "title": "Presentation from 279591509", "url": "https://www.slideshare.net/slideshow/introduction-to-zero-trust-architecture-abhishek-r-singh-agnidipta-sarkar/279591509", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:23.972650" }, { "title": "Presentation from 254877581", "url": "https://www.slideshare.net/slideshow/hitcon-freetalk-2022-zero-trust-architecture/254877581", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:24.032760" }, { "title": "Presentation from 270979964", "url": "https://www.slideshare.net/slideshow/what-is-zero-trust-architecture-and-why-do-you-need-it-pdf/270979964", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:24.091682" }, { "title": "Presentation from 248620491", "url": "https://www.slideshare.net/slideshow/implementing-zero-trust-architecture-in-azure-hybrid-cloud/248620491", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:24.152842" }, { "title": "Presentation from 254931407", "url": "https://www.slideshare.net/slideshow/zero-trust-architecture-and-electric-vehicle-cyberrisks/254931407", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:24.225792" }, { "title": "Presentation from 257487085", "url": "https://www.slideshare.net/slideshow/pillars-of-zero-trust-architecture/257487085", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:24.291695" }, { "title": "Presentation from 268613064", "url": "https://www.slideshare.net/slideshow/understanding-the-zero-trust-architecture-market-a-comprehensive-overview/268613064", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:24.407209" }, { "title": "Presentation from 283056123", "url": "https://www.slideshare.net/slideshow/securing-the-digital-perimeter-with-zero-trust-architecture/283056123", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:24.464323" }, { "title": "Presentation from 229198327", "url": "https://www.slideshare.net/slideshow/sacon-jim-hietala-zero-trust-architecture-from-hype-to-reality/229198327", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:24.541380" }, { "title": "Presentation from 216485074", "url": "https://www.slideshare.net/slideshow/zero-trust-model-presentation/216485074", "description": "", "author": "", "views": 0, "search_query": "zero trust architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:30:24.592541" }, { "title": "Presentation from 270782745", "url": "https://www.slideshare.net/slideshow/leveraging-ai-for-enhanced-cybersecurity/270782745", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:35.694852" }, { "title": "Presentation from 239308946", "url": "https://www.slideshare.net/slideshow/ai-cybersecurity/239308946", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:35.743806" }, { "title": "Presentation from 281425948", "url": "https://www.slideshare.net/slideshow/cybersecurity-for-ai-and-genai-updated-pdf/281425948", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:35.803743" }, { "title": "Presentation from 263455905", "url": "https://www.slideshare.net/slideshow/ai-in-cybersecurity-2023/263455905", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:35.867204" }, { "title": "Presentation from 276191991", "url": "https://www.slideshare.net/slideshow/cybersecurity-and-ai-a-comprehensive-guide/276191991", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:35.934885" }, { "title": "Presentation from 265302129", "url": "https://www.slideshare.net/slideshow/aipowered-cybersecurity-threatspdf/265302129", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:35.982180" }, { "title": "Presentation from 271030318", "url": "https://www.slideshare.net/slideshow/ai-in-cybersecurity-allendevaux-company-pdf/271030318", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:36.059616" }, { "title": "Presentation from 265936632", "url": "https://www.slideshare.net/slideshow/leading-cybersecurity-training-with-ai-in-kerala/265936632", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:36.110407" }, { "title": "Presentation from 267166210", "url": "https://www.slideshare.net/slideshow/ai-cybersecurity-pros-cons-ai-is-reshaping-cybersecurity/267166210", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:36.169067" }, { "title": "Presentation from 239309002", "url": "https://www.slideshare.net/slideshow/blackbox-testing-in-ai-cybersecurity/239309002", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:36.243528" }, { "title": "Presentation from 283843595", "url": "https://www.slideshare.net/slideshow/ai-cybersecurity-framework-for-the-quantum-era-pdf-c736/283843595", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:36.303363" }, { "title": "Presentation from 266188931", "url": "https://www.slideshare.net/slideshow/how-ai-is-revolutionizing-cybersecurity-1pdf/266188931", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:36.355976" }, { "title": "Presentation from 259692683", "url": "https://www.slideshare.net/slideshow/how-ai-can-help-with-cybersecurity/259692683", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:36.417788" }, { "title": "Presentation from 185253765", "url": "https://www.slideshare.net/slideshow/ai-and-the-impact-on-cybersecurity/185253765", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:36.483593" }, { "title": "Presentation from 162316228", "url": "https://www.slideshare.net/slideshow/ai-for-cybersecurity-162316228/162316228", "description": "", "author": "", "views": 0, "search_query": "AI cybersecurity", "source": "slideshare", "harvested_at": "2025-12-17T02:30:36.545142" }, { "title": "Presentation from 149818229", "url": "https://www.slideshare.net/slideshow/machine-learning-for-security/149818229", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.393277" }, { "title": "Presentation from 149291369", "url": "https://www.slideshare.net/slideshow/machine-learning-for-security-analysts-149291369/149291369", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.439121" }, { "title": "Presentation from 44526971", "url": "https://www.slideshare.net/slideshow/financial-security-and-machine-learning/44526971", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.481234" }, { "title": "Presentation from 190988681", "url": "https://www.slideshare.net/slideshow/machine-learning-implications-in-security/190988681", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.529589" }, { "title": "Presentation from 1814548", "url": "https://www.slideshare.net/slideshow/computer-security-using-machine-learning-1814548/1814548", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.583711" }, { "title": "Presentation from 75087457", "url": "https://www.slideshare.net/slideshow/machine-learning-in-cyber-security-domain/75087457", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.636798" }, { "title": "Presentation from 246138998", "url": "https://www.slideshare.net/slideshow/machine-learning-in-computer-security/246138998", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.683752" }, { "title": "Presentation from 198126937", "url": "https://www.slideshare.net/slideshow/security-of-machine-learning/198126937", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.748766" }, { "title": "Presentation from 114967870", "url": "https://www.slideshare.net/slideshow/machine-learning-in-cyber-security/114967870", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.788245" }, { "title": "Presentation from 101870144", "url": "https://www.slideshare.net/slideshow/security-and-privacy-of-machine-learning/101870144", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.850860" }, { "title": "Presentation from 174520109", "url": "https://www.slideshare.net/slideshow/data-compression-data-security-and-machine-learning/174520109", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.896661" }, { "title": "Presentation from 248628491", "url": "https://www.slideshare.net/slideshow/ai-security-security-machine-learning-deep-learning-computer-vision-security/248628491", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.941768" }, { "title": "Presentation from 81355518", "url": "https://www.slideshare.net/slideshow/enhance-security-domain-with-machine-learning/81355518", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:47.992636" }, { "title": "Presentation from 130002222", "url": "https://www.slideshare.net/slideshow/security-automation-and-machine-learning/130002222", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:48.033179" }, { "title": "Presentation from 62354620", "url": "https://www.slideshare.net/slideshow/machine-learning-security-detect-atypical-behaviour-in-logs-62354620/62354620", "description": "", "author": "", "views": 0, "search_query": "machine learning security", "source": "slideshare", "harvested_at": "2025-12-17T02:30:48.075419" }, { "title": "Presentation from 259244201", "url": "https://www.slideshare.net/slideshow/the-impact-of-gpt-on-the-workplace/259244201", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.357704" }, { "title": "Presentation from 261888221", "url": "https://www.slideshare.net/slideshow/how-do-openai-gpt-models-work-misconceptions-and-tips-for-developers/261888221", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.424097" }, { "title": "Presentation from 261116169", "url": "https://www.slideshare.net/slideshow/openai-gpt-in-depth-questions-and-misconceptions/261116169", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.470773" }, { "title": "Presentation from 273905269", "url": "https://www.slideshare.net/slideshow/exploring-openai-models-strengths-and-weaknesses/273905269", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.514553" }, { "title": "Presentation from 281316618", "url": "https://www.slideshare.net/slideshow/ai-coding-assistants-test-automation-a-simplified-suitability-analysis/281316618", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.564746" }, { "title": "Presentation from 282872616", "url": "https://www.slideshare.net/slideshow/newmind-ai-journal-monthly-chronicles-august-2025/282872616", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.617425" }, { "title": "Presentation from 283722107", "url": "https://www.slideshare.net/slideshow/scale-your-content-with-custom-ai-tools-by-victoria-olsina-custom-gpts/283722107", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.655503" }, { "title": "Presentation from 279397520", "url": "https://www.slideshare.net/slideshow/is-generative-ai-the-new-future-of-salesforce-and-how-does-it-impact-your-business/279397520", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.722902" }, { "title": "Presentation from 283396927", "url": "https://www.slideshare.net/slideshow/spotting_genuine_ai_automation_for_small_business-pptx/283396927", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.769379" }, { "title": "Presentation from 284277020", "url": "https://www.slideshare.net/slideshow/generative-ai-deep-dive-architectures-mechanics-and-future-applications/284277020", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.806686" }, { "title": "Presentation from 270021808", "url": "https://www.slideshare.net/slideshow/uipath-community-day-krakow-devs4devs-conference/270021808", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.860690" }, { "title": "Presentation from 282296554", "url": "https://www.slideshare.net/slideshow/openai-gpt-5-launch-highlights-and-features/282296554", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.905393" }, { "title": "Presentation from 282920504", "url": "https://www.slideshare.net/slideshow/prompt-gpt-5-like-a-pro-practical-guide-pdf-pdf/282920504", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:30:59.964615" }, { "title": "Presentation from 280776716", "url": "https://www.slideshare.net/slideshow/azure-ai-foundry-the-ai-app-and-agent-factory/280776716", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:00.042169" }, { "title": "Presentation from 266913132", "url": "https://www.slideshare.net/slideshow/transforming-pmo-success-with-ai-discover-oneplan-strategic-portfolio-work-management-platform-webinar-21mar24pdf/266913132", "description": "", "author": "", "views": 0, "search_query": "GPT enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:00.093495" }, { "title": "Presentation from 269523727", "url": "https://www.slideshare.net/slideshow/a-beginner-s-guide-to-generative-ai-for-business/269523727", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.267424" }, { "title": "Presentation from 270410479", "url": "https://www.slideshare.net/slideshow/strategic-steps-to-success-generative-ai-for-business-it-leaders-pptx/270410479", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.370747" }, { "title": "Presentation from 265513191", "url": "https://www.slideshare.net/slideshow/generative-ai-business-transformation/265513191", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.434892" }, { "title": "Presentation from 262033987", "url": "https://www.slideshare.net/slideshow/top-5-ways-generative-ai-and-rpa-helps-business-scale-up-your-business-process-with-the-gen-ai-rpa/262033987", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.488788" }, { "title": "Presentation from 275814839", "url": "https://www.slideshare.net/slideshow/why-generative-ai-is-essential-for-business-growth/275814839", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.543374" }, { "title": "Presentation from 283676052", "url": "https://www.slideshare.net/slideshow/agentic-ai-vs-generative-ai-key-distinctions-and-business-value/283676052", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.593523" }, { "title": "Presentation from 267200076", "url": "https://www.slideshare.net/slideshow/potential-of-ai-generative-ai-in-business-learnings-and-insights/267200076", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.638868" }, { "title": "Presentation from 266025011", "url": "https://www.slideshare.net/slideshow/generative-ai-genai-business-and-intellectual-property/266025011", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.685717" }, { "title": "Presentation from 265165227", "url": "https://www.slideshare.net/slideshow/business-talk-harnessing-generative-ai-with-data-analytics-maturity/265165227", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.742348" }, { "title": "Presentation from 269942104", "url": "https://www.slideshare.net/slideshow/harnessing-the-power-of-generative-ai-for-your-business-by-siddharth-pdf/269942104", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.781651" }, { "title": "Presentation from 269602290", "url": "https://www.slideshare.net/slideshow/skybuffer-ai-advanced-conversational-and-generative-ai-solution-on-sap-business-technology-platform-btp/269602290", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.829005" }, { "title": "Presentation from 277270942", "url": "https://www.slideshare.net/slideshow/harnessing-iot-business-process-services-and-generative-ai-for-innovation/277270942", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.891196" }, { "title": "Presentation from 273119465", "url": "https://www.slideshare.net/slideshow/unlock-innovation-with-aws-generative-ai-transform-your-business-with-scalable-ai-driven-solutions-for-enhanced-customer-engagement-improved-decision-making-and-operational-efficiency/273119465", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:11.951371" }, { "title": "Presentation from 281820105", "url": "https://www.slideshare.net/slideshow/how-generative-ai-is-powering-business-transformation/281820105", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:12.002053" }, { "title": "Presentation from 270610767", "url": "https://www.slideshare.net/slideshow/the-era-of-generative-ai-astute-business/270610767", "description": "", "author": "", "views": 0, "search_query": "generative AI business", "source": "slideshare", "harvested_at": "2025-12-17T02:31:12.045328" }, { "title": "Presentation from 270281636", "url": "https://www.slideshare.net/slideshow/ai-2030-academy-modern-data-management-and-enterprise-ai-strategy/270281636", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.217805" }, { "title": "Presentation from 237345545", "url": "https://www.slideshare.net/slideshow/creating-an-enterprise-ai-strategy-237345545/237345545", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.263744" }, { "title": "Presentation from 249860597", "url": "https://www.slideshare.net/slideshow/rahat-yasir-enterprise-data-ai-strategy-platform-designing/249860597", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.473729" }, { "title": "Presentation from 107171877", "url": "https://www.slideshare.net/slideshow/enterprise-artificial-intelligence-strategy/107171877", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.552624" }, { "title": "Presentation from 267749698", "url": "https://www.slideshare.net/slideshow/how-to-create-an-effective-enterprise-ai-strategy-pdf/267749698", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.609454" }, { "title": "Presentation from 251045895", "url": "https://www.slideshare.net/slideshow/25-tips-on-how-a-perfect-ai-strategy-can-help-your-business/251045895", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.658586" }, { "title": "Presentation from 250230485", "url": "https://www.slideshare.net/slideshow/rahat-yasir-enterprise-data-ai-strategy-platform-designing-250230485/250230485", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.705489" }, { "title": "Presentation from 250796278", "url": "https://www.slideshare.net/slideshow/pillars-of-ai-strategy/250796278", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.747625" }, { "title": "Presentation from 278014333", "url": "https://www.slideshare.net/slideshow/vady-enterprise-ai-real-time-insights-predictive-intelligence-for-smarter-strategy/278014333", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.803706" }, { "title": "Presentation from 283098030", "url": "https://www.slideshare.net/slideshow/jim-kaskade-resume-artificial-intelligence-ai-082825-docx/283098030", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.840897" }, { "title": "Presentation from 265324317", "url": "https://www.slideshare.net/slideshow/generative-ai-guide-to-business-implementation/265324317", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.894914" }, { "title": "Presentation from 284283391", "url": "https://www.slideshare.net/slideshow/jim-kaskade-resume-artificial-intelligence-111725-pdf/284283391", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.939428" }, { "title": "Presentation from 284087154", "url": "https://www.slideshare.net/slideshow/8-best-ai-courses-for-chief-executing-officers-ceos-to-future-proof-your-career-in-2025-pptx/284087154", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:23.990495" }, { "title": "Presentation from 282929318", "url": "https://www.slideshare.net/slideshow/applying-agentic-ai-in-enterprise-automation/282929318", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:24.055727" }, { "title": "Presentation from 96188578", "url": "https://www.slideshare.net/slideshow/gamifying-strategy-enterprise-ai-use-cases-on-agentbased-simulation-and-reinforcement-learning/96188578", "description": "", "author": "", "views": 0, "search_query": "AI strategy enterprise", "source": "slideshare", "harvested_at": "2025-12-17T02:31:24.106648" }, { "title": "Presentation from 280616023", "url": "https://www.slideshare.net/slideshow/solulab-com-llm-use-cases-and-applications/280616023", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.435917" }, { "title": "Presentation from 269494536", "url": "https://www.slideshare.net/slideshow/large-language-model-llm-and-it-s-geospatial-applications/269494536", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.485750" }, { "title": "Presentation from 266682165", "url": "https://www.slideshare.net/slideshow/gaurdrails-for-large-language-model-based-applications/266682165", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.550819" }, { "title": "Presentation from 261368477", "url": "https://www.slideshare.net/slideshow/building-and-deploying-llm-applications-with-apache-airflow/261368477", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.594763" }, { "title": "Presentation from 273622488", "url": "https://www.slideshare.net/slideshow/llm-agent-observability-lessons-learned-from-real-world-applications/273622488", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.643126" }, { "title": "Presentation from 274076949", "url": "https://www.slideshare.net/slideshow/increasing-the-accuracy-of-llm-applications-with-graph-based-rag_-practical-implementations-pdf/274076949", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.705037" }, { "title": "Presentation from 274077168", "url": "https://www.slideshare.net/slideshow/increasing-the-accuracy-of-llm-applications-with-graph-based-rag-practical-implementations-falkordb-at-google-cloud-experts-hub/274077168", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.742937" }, { "title": "Presentation from 280616027", "url": "https://www.slideshare.net/slideshow/solulab-com-comparison-of-large-language-models-the-ultimate-guide-1-pdf/280616027", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.801434" }, { "title": "Presentation from 280616024", "url": "https://www.slideshare.net/slideshow/solulab-com-create-custom-llms-for-enterprise-solutions-1-pdf/280616024", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.849568" }, { "title": "Presentation from 261796251", "url": "https://www.slideshare.net/slideshow/clicks2conversationspdf/261796251", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.900857" }, { "title": "Presentation from 272662438", "url": "https://www.slideshare.net/slideshow/best-practices-for-building-successful-llm-applications/272662438", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.942636" }, { "title": "Presentation from 269724242", "url": "https://www.slideshare.net/slideshow/exploring-llms-in-the-world-of-artificial-intelligence-ai-2-pdf/269724242", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:35.989079" }, { "title": "Presentation from 281651329", "url": "https://www.slideshare.net/slideshow/what-are-generative-al-models-a-deep-dive-blog-docx/281651329", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:36.042352" }, { "title": "Presentation from 263427009", "url": "https://www.slideshare.net/slideshow/use-case-patterns-for-llm-applications-1pdf/263427009", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:36.087360" }, { "title": "Presentation from 271857149", "url": "https://www.slideshare.net/slideshow/connector-corners-building-llm-applications-with-genai-activities/271857149", "description": "", "author": "", "views": 0, "search_query": "LLM applications", "source": "slideshare", "harvested_at": "2025-12-17T02:31:36.150591" }, { "title": "Presentation from 193563751", "url": "https://www.slideshare.net/slideshow/multi-cloud-security-architecture/193563751", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.418513" }, { "title": "Presentation from 232734409", "url": "https://www.slideshare.net/slideshow/cloud-security-architecture-a-different-approach/232734409", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.473484" }, { "title": "Presentation from 72206028", "url": "https://www.slideshare.net/slideshow/nist-cloud-computing-security-reference-architecture-800299/72206028", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.515152" }, { "title": "Presentation from 26365895", "url": "https://www.slideshare.net/slideshow/cloud-security-guide/26365895", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.570199" }, { "title": "Presentation from 279821468", "url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/279821468", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.613626" }, { "title": "Presentation from 281451917", "url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/281451917", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.667930" }, { "title": "Presentation from 280764015", "url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/280764015", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.711616" }, { "title": "Presentation from 277437734", "url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/277437734", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.760399" }, { "title": "Presentation from 276278106", "url": "https://www.slideshare.net/slideshow/cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl/276278106", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.818931" }, { "title": "Presentation from 81978797", "url": "https://www.slideshare.net/slideshow/sacon-cloud-security-architecture-moshe-ferber/81978797", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.871878" }, { "title": "Presentation from 279561726", "url": "https://www.slideshare.net/slideshow/cloud-to-edgeware-wireless-grid-applications-architecture-and-security-for-the-internet-of-things-lee-w-mcknight/279561726", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.906870" }, { "title": "Presentation from 59367012", "url": "https://www.slideshare.net/slideshow/take-it-to-the-cloud-the-evolution-of-security-architecture/59367012", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:47.978406" }, { "title": "Presentation from 274875729", "url": "https://www.slideshare.net/slideshow/full-download-cloud-computing-concepts-technology-security-and-architecture-second-edition-thomas-erl-pdf-docx/274875729", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:48.020241" }, { "title": "Presentation from 64961757", "url": "https://www.slideshare.net/slideshow/security-in-multi-cloud-data-storage-with-sic-architecture/64961757", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:48.068996" }, { "title": "Presentation from 170550816", "url": "https://www.slideshare.net/slideshow/understanding-the-determinants-of-security-and-privacy-in-cloud-computing-architecture/170550816", "description": "", "author": "", "views": 0, "search_query": "cloud security architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:31:48.127542" }, { "title": "Presentation from 78096461", "url": "https://www.slideshare.net/slideshow/azure-security-78096461/78096461", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.478939" }, { "title": "Presentation from 72703635", "url": "https://www.slideshare.net/slideshow/azure-security-center-72703635/72703635", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.531349" }, { "title": "Presentation from 88395266", "url": "https://www.slideshare.net/slideshow/azure-security-architecture-88395266/88395266", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.576218" }, { "title": "Presentation from 133846922", "url": "https://www.slideshare.net/slideshow/azure-security-and-compliance/133846922", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.625608" }, { "title": "Presentation from 136361188", "url": "https://www.slideshare.net/slideshow/azure-security-fundamentals-136361188/136361188", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.670320" }, { "title": "Presentation from 269972862", "url": "https://www.slideshare.net/slideshow/azure-security-infrastructure-overview-pptx/269972862", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.735675" }, { "title": "Presentation from 81029695", "url": "https://www.slideshare.net/slideshow/microsoft-azure-security-overview/81029695", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.791203" }, { "title": "Presentation from 258153971", "url": "https://www.slideshare.net/slideshow/azure-security-258153971/258153971", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.828868" }, { "title": "Presentation from 76690361", "url": "https://www.slideshare.net/slideshow/azure-cloud-security/76690361", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.874724" }, { "title": "Presentation from 94631808", "url": "https://www.slideshare.net/slideshow/global-azure-bootcamp-2018-azure-security-center/94631808", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.914717" }, { "title": "Presentation from 248322371", "url": "https://www.slideshare.net/slideshow/what-is-microsoft-azure-securitymicrosoft-azure-security/248322371", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:31:59.961762" }, { "title": "Presentation from 24258865", "url": "https://www.slideshare.net/slideshow/windows-azure-security-compliance/24258865", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:00.007905" }, { "title": "Presentation from 81707637", "url": "https://www.slideshare.net/slideshow/microsoft-azure-security-overview-microsoft-css-dallas-azure/81707637", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:00.069952" }, { "title": "Presentation from 270779929", "url": "https://www.slideshare.net/slideshow/azure-security-compass-v1-1-presentation-pptx/270779929", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:00.105618" }, { "title": "Presentation from 149283748", "url": "https://www.slideshare.net/slideshow/azure-security-center-zero-to-hero/149283748", "description": "", "author": "", "views": 0, "search_query": "Azure security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:00.162504" }, { "title": "Presentation from 76279416", "url": "https://www.slideshare.net/slideshow/aws-security-best-practices-terraform-aws-security/76279416", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.402117" }, { "title": "Presentation from 125029823", "url": "https://www.slideshare.net/slideshow/aws-security-best-practices-125029823/125029823", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.455070" }, { "title": "Presentation from 130677843", "url": "https://www.slideshare.net/slideshow/aws-security-best-practices-130677843/130677843", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.502336" }, { "title": "Presentation from 73590801", "url": "https://www.slideshare.net/slideshow/aws-security-best-practices-march-2017/73590801", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.548391" }, { "title": "Presentation from 72059547", "url": "https://www.slideshare.net/slideshow/security-best-practices-aws-awsome-day-management-track/72059547", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.598379" }, { "title": "Presentation from 61453144", "url": "https://www.slideshare.net/slideshow/cloud-security-best-practices-in-aws-by-ankit-giri/61453144", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.647591" }, { "title": "Presentation from 86038172", "url": "https://www.slideshare.net/slideshow/gdpr-top-10-aws-security-and-compliance-best-practices/86038172", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.697364" }, { "title": "Presentation from 46781085", "url": "https://www.slideshare.net/slideshow/aws-security-best-practices-for-effective-threat-detection-and-response/46781085", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.766641" }, { "title": "Presentation from 92175305", "url": "https://www.slideshare.net/slideshow/migrating-and-managing-security-in-an-aws-environment-best-practices/92175305", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.812210" }, { "title": "Presentation from 73183383", "url": "https://www.slideshare.net/slideshow/aws-cyber-security-best-practices/73183383", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.864643" }, { "title": "Presentation from 66629804", "url": "https://www.slideshare.net/slideshow/aws-security-strategy-66629804/66629804", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.909045" }, { "title": "Presentation from 181072016", "url": "https://www.slideshare.net/slideshow/eks-security-best-practices-181072016/181072016", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:11.949597" }, { "title": "Presentation from 29275486", "url": "https://www.slideshare.net/slideshow/security-best-practices-on-aws-cloud/29275486", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:12.006080" }, { "title": "Presentation from 126482222", "url": "https://www.slideshare.net/slideshow/cloud-security-fundamentals-webinar/126482222", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:12.053729" }, { "title": "Presentation from 276592234", "url": "https://www.slideshare.net/slideshow/cloud-security-best-practices-documentation/276592234", "description": "", "author": "", "views": 0, "search_query": "AWS security best practices", "source": "slideshare", "harvested_at": "2025-12-17T02:32:12.104178" }, { "title": "Presentation from 52844353", "url": "https://www.slideshare.net/slideshow/multi-cloud-strategy/52844353", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:23.443244" }, { "title": "Presentation from 125571766", "url": "https://www.slideshare.net/slideshow/multicloud-strategy-for-enterprise/125571766", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:23.490562" }, { "title": "Presentation from 250617664", "url": "https://www.slideshare.net/slideshow/multi-cloud-strategy-250617664/250617664", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:23.545832" }, { "title": "Presentation from 284494586", "url": "https://www.slideshare.net/slideshow/hybrid-cloud-vs-multi-cloud-strategy-2025/284494586", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:23.596106" }, { "title": "Presentation from 282868348", "url": "https://www.slideshare.net/slideshow/multi-cloud-strategy-a-complete-guide-for-multi-cloud-adoption/282868348", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:23.788058" }, { "title": "Presentation from 119059110", "url": "https://www.slideshare.net/slideshow/why-a-multicloud-strategy-is-essential/119059110", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:23.830712" }, { "title": "Presentation from 125497350", "url": "https://www.slideshare.net/slideshow/multicloud-strategy/125497350", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:23.873266" }, { "title": "Presentation from 87436834", "url": "https://www.slideshare.net/slideshow/got-a-multicloud-strategy-how-rightscale-cmp-helps/87436834", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:23.935899" }, { "title": "Presentation from 269780805", "url": "https://www.slideshare.net/slideshow/hybrid-cloud-vs-multi-cloud-which-strategy-is-right-for-your-business/269780805", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:23.974838" }, { "title": "Presentation from 28538546", "url": "https://www.slideshare.net/slideshow/from-the-network-to-multi-cloud/28538546", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:24.021782" }, { "title": "Presentation from 262879815", "url": "https://www.slideshare.net/slideshow/how-powerful-is-a-multicloud-strategy-everything-you-need-to-know-enterprise-wired/262879815", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:24.070381" }, { "title": "Presentation from 259202469", "url": "https://www.slideshare.net/slideshow/why-do-organizations-choose-a-multicloud-strategy-259202469/259202469", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:24.116575" }, { "title": "Presentation from 249549962", "url": "https://www.slideshare.net/slideshow/reinventing-and-simplifying-data-management-for-a-successful-hybrid-and-multicloud-strategy/249549962", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:24.167199" }, { "title": "Presentation from 245031667", "url": "https://www.slideshare.net/slideshow/which-postgresql-is-right-for-your-multi-cloud-strategy-p2/245031667", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:24.217058" }, { "title": "Presentation from 259252333", "url": "https://www.slideshare.net/slideshow/why-do-organizations-choose-a-multicloud-strategy-259252333/259252333", "description": "", "author": "", "views": 0, "search_query": "multi-cloud strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:24.262816" }, { "title": "Presentation from 280150201", "url": "https://www.slideshare.net/slideshow/vmware-to-cloud-migration-security-solutions-pdf-471a/280150201", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:35.496140" }, { "title": "Presentation from 256349929", "url": "https://www.slideshare.net/slideshow/security-concerns-of-cloud-migration-and-its-implications-on-cloudenabled-business-transformationpdf/256349929", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:35.536691" }, { "title": "Presentation from 281272483", "url": "https://www.slideshare.net/slideshow/your-cloud-data-migration-security-checklist-before-during-and-after/281272483", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:35.604937" }, { "title": "Presentation from 270860325", "url": "https://www.slideshare.net/slideshow/vmware-to-cloud-migration-security-solutions-pdf/270860325", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:35.675821" }, { "title": "Presentation from 239093090", "url": "https://www.slideshare.net/slideshow/migration-of-virtual-machine-to-improve-the-security-in-cloud-computing/239093090", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:35.731590" }, { "title": "Presentation from 269897242", "url": "https://www.slideshare.net/slideshow/cloud-data-migration-challenges-navigating-security-and-technicalities-with-a-smile/269897242", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:35.784302" }, { "title": "Presentation from 274539350", "url": "https://www.slideshare.net/slideshow/vmware-to-cloud-migration-security-solutions-for-a-seamless-transition-pdf/274539350", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:35.827405" }, { "title": "Presentation from 49219466", "url": "https://www.slideshare.net/slideshow/cloud-migration-application-modernization-and-security/49219466", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:35.874207" }, { "title": "Presentation from 79423612", "url": "https://www.slideshare.net/slideshow/solidit-services-english/79423612", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:35.919131" }, { "title": "Presentation from 274242448", "url": "https://www.slideshare.net/slideshow/what-are-managed-cloud-migration-services-and-why-are-they-important/274242448", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:35.989606" }, { "title": "Presentation from 255599914", "url": "https://www.slideshare.net/slideshow/advantages-of-partnering-with-a-cloud-migration-consulting-service/255599914", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:36.032254" }, { "title": "Presentation from 275207107", "url": "https://www.slideshare.net/slideshow/what-are-cloud-migration-services-and-why-are-they-important/275207107", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:36.095515" }, { "title": "Presentation from 166886859", "url": "https://www.slideshare.net/slideshow/2019-0827-sikkerhetsfestivalencloudsecurityinfinitystonespresenten/166886859", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:36.142881" }, { "title": "Presentation from 254215444", "url": "https://www.slideshare.net/slideshow/successive-cloud-migration-servicespdf/254215444", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:36.185692" }, { "title": "Presentation from 257555749", "url": "https://www.slideshare.net/slideshow/cloud-migrationpdf-257555749/257555749", "description": "", "author": "", "views": 0, "search_query": "cloud migration security", "source": "slideshare", "harvested_at": "2025-12-17T02:32:36.240165" }, { "title": "Presentation from 120402479", "url": "https://www.slideshare.net/slideshow/strategydigital-transformation/120402479", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:47.527692" }, { "title": "Presentation from 237570825", "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-237570825/237570825", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:47.587773" }, { "title": "Presentation from 66727606", "url": "https://www.slideshare.net/slideshow/digital-strategy-66727606/66727606", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:47.637198" }, { "title": "Presentation from 272286870", "url": "https://www.slideshare.net/slideshow/business-digital-transformation-strategy/272286870", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:47.684555" }, { "title": "Presentation from 271204931", "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-vision/271204931", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:47.733419" }, { "title": "Presentation from 148990096", "url": "https://www.slideshare.net/slideshow/workshop-digital-transformation-strategy-digital-roadmap-training/148990096", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:47.791256" }, { "title": "Presentation from 253754137", "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-mit-id-innovation/253754137", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:47.835136" }, { "title": "Presentation from 209855993", "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-certificate/209855993", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:47.882852" }, { "title": "Presentation from 236098455", "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-236098455/236098455", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:47.934319" }, { "title": "Presentation from 249761976", "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-powerpoint-presentation-slides-249761976/249761976", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:47.987005" }, { "title": "Presentation from 267089239", "url": "https://www.slideshare.net/slideshow/bigdatadigital-transformation-and-strategy/267089239", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:48.031237" }, { "title": "Presentation from 251959906", "url": "https://www.slideshare.net/slideshow/digital-strategy-and-transformation/251959906", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:48.095122" }, { "title": "Presentation from 279704330", "url": "https://www.slideshare.net/slideshow/strategy-in-the-digital-age-mastering-digital-transformation-1st-edition-michael-lenox/279704330", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:48.141089" }, { "title": "Presentation from 76362712", "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-framework-by-exmckinsey/76362712", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:48.189328" }, { "title": "Presentation from 265223821", "url": "https://www.slideshare.net/slideshow/digital-transformation-strategy-framework-tools/265223821", "description": "", "author": "", "views": 0, "search_query": "digital transformation strategy", "source": "slideshare", "harvested_at": "2025-12-17T02:32:48.254585" }, { "title": "Presentation from 30808256", "url": "https://www.slideshare.net/slideshow/canvassed-in-a-business-it-strategy-canvas-baseline-roadmap/30808256", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:32:59.533211" }, { "title": "Presentation from 248478719", "url": "https://www.slideshare.net/slideshow/it-simplification-assessment-strategy-alignment-business-roadmap-evaluating/248478719", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:32:59.592153" }, { "title": "Presentation from 56014983", "url": "https://www.slideshare.net/slideshow/define-an-it-strategy-and-roadmap/56014983", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:32:59.641864" }, { "title": "Presentation from 123549089", "url": "https://www.slideshare.net/slideshow/how-to-build-a-strategic-roadmap-and-execute-using-agile-planning/123549089", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:32:59.706383" }, { "title": "Presentation from 86072050", "url": "https://www.slideshare.net/slideshow/big-data-consulting-slideshare-v04-86072050/86072050", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:32:59.758169" }, { "title": "Presentation from 45856722", "url": "https://www.slideshare.net/slideshow/augmenting-it-strategy-with-enterprise-architecture-assessment/45856722", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:32:59.808222" }, { "title": "Presentation from 265069198", "url": "https://www.slideshare.net/slideshow/mega-solution-footprint-v5pptx/265069198", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:32:59.844933" }, { "title": "Presentation from 56878088", "url": "https://www.slideshare.net/slideshow/product-roadmaps-tips-on-how-to-create-and-manage-roadmaps/56878088", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:00.072108" }, { "title": "Presentation from 8274555", "url": "https://www.slideshare.net/slideshow/mcc11-developing-a-digital-strategy-amp-roadmap/8274555", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:00.123039" }, { "title": "Presentation from 32665708", "url": "https://www.slideshare.net/slideshow/girlguiding-digital-strategy-201415/32665708", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:00.171822" }, { "title": "Presentation from 250619976", "url": "https://www.slideshare.net/slideshow/the-product-journey-roadmaps-are-dead-long-live-roadmaps/250619976", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:00.358624" }, { "title": "Presentation from 77383920", "url": "https://www.slideshare.net/slideshow/how-to-define-your-product-roadmap-by-dan-olsen/77383920", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:00.857981" }, { "title": "Presentation from 234338113", "url": "https://www.slideshare.net/slideshow/building-digital-strategy-roadmap-for-digital-transformation-complete-deck/234338113", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:00.903021" }, { "title": "Presentation from 49944496", "url": "https://www.slideshare.net/slideshow/pragmatic-guide-for-preparing-great-product-roadmap/49944496", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:00.965282" }, { "title": "Presentation from 106387292", "url": "https://www.slideshare.net/slideshow/digital-transformation-roadmap-16th-july-2018-v11-106387292/106387292", "description": "", "author": "", "views": 0, "search_query": "IT strategy roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:01.024102" }, { "title": "Presentation from 29970260", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-29970260/29970260", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.343543" }, { "title": "Presentation from 39372369", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-39372369/39372369", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.393133" }, { "title": "Presentation from 3155735", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-3155735/3155735", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.440387" }, { "title": "Presentation from 50952403", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-draftpresentablenotesvikasgroverv01a-50952403/50952403", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.476838" }, { "title": "Presentation from 63984606", "url": "https://www.slideshare.net/slideshow/enterprise-security-architecture-63984606/63984606", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.544535" }, { "title": "Presentation from 26339996", "url": "https://www.slideshare.net/slideshow/ea-presentation-togaf/26339996", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.595016" }, { "title": "Presentation from 121938463", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-governance-121938463/121938463", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.638541" }, { "title": "Presentation from 84295707", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-enterprise-architecture-consulting-services-enterprise-architecture-consulting/84295707", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.699496" }, { "title": "Presentation from 271237620", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-and-enterprise-structure-pptx/271237620", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.753296" }, { "title": "Presentation from 32113666", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-32113666/32113666", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.803467" }, { "title": "Presentation from 69587204", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-frameworks-69587204/69587204", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.841638" }, { "title": "Presentation from 262419655", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-2f31/262419655", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.892154" }, { "title": "Presentation from 31023634", "url": "https://www.slideshare.net/slideshow/the-ultimate-tools-to-manage-isit-and-avoid-the-bush-telegraph/31023634", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.939042" }, { "title": "Presentation from 271237660", "url": "https://www.slideshare.net/slideshow/enterprise-architecture-and-enterprise-structure-pptx-6a4d/271237660", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:12.982503" }, { "title": "Presentation from 68891998", "url": "https://www.slideshare.net/slideshow/enterprise-security-architecture-by-arnab-chattopadhayay-bikash/68891998", "description": "", "author": "", "views": 0, "search_query": "enterprise architecture", "source": "slideshare", "harvested_at": "2025-12-17T02:33:13.019368" }, { "title": "Presentation from 281321143", "url": "https://www.slideshare.net/slideshow/technology-roadmap-an-important-aspect-of-technology-management/281321143", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.357872" }, { "title": "Presentation from 30976348", "url": "https://www.slideshare.net/slideshow/technology-roadmap-06022014/30976348", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.403167" }, { "title": "Presentation from 61125806", "url": "https://www.slideshare.net/slideshow/technology-roadmap-highlightsreport-2015/61125806", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.446981" }, { "title": "Presentation from 30140805", "url": "https://www.slideshare.net/slideshow/mei-2014-technology-roadmap/30140805", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.496628" }, { "title": "Presentation from 280396010", "url": "https://www.slideshare.net/slideshow/iea-technology-roadmaps-technology-roadmap-wind-energy-oecd/280396010", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.554203" }, { "title": "Presentation from 280398759", "url": "https://www.slideshare.net/slideshow/technology-roadmap-solar-thermal-electricity-oecd/280398759", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.597094" }, { "title": "Presentation from 63461432", "url": "https://www.slideshare.net/slideshow/technology-developing-and-implementing-a-roadmap/63461432", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.652038" }, { "title": "Presentation from 11480985", "url": "https://www.slideshare.net/slideshow/sap-technology-roadmap-dec-2011-update/11480985", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.720710" }, { "title": "Presentation from 76546051", "url": "https://www.slideshare.net/slideshow/does-your-technology-roadmap-have-a-financial-roadmap/76546051", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.772921" }, { "title": "Presentation from 280351019", "url": "https://www.slideshare.net/slideshow/iea-technology-roadmap-smart-grids-oecd-iea/280351019", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.817707" }, { "title": "Presentation from 280396656", "url": "https://www.slideshare.net/slideshow/technology-roadmap-lowcarbon-technology-for-the-indian-cement-industry-oecd/280396656", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.862529" }, { "title": "Presentation from 280398769", "url": "https://www.slideshare.net/slideshow/technology-roadmap-solar-photovoltaic-energy-2014-edition-oecd/280398769", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.908776" }, { "title": "Presentation from 276531279", "url": "https://www.slideshare.net/slideshow/technology-roadmap-solar-photovoltaic-energy-2014-edition-edition-oecd/276531279", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:24.960951" }, { "title": "Presentation from 280351021", "url": "https://www.slideshare.net/slideshow/iea-technology-roadmap-geothermal-heat-and-power-oecd-iea/280351021", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:25.000983" }, { "title": "Presentation from 5395802", "url": "https://www.slideshare.net/slideshow/national-space-technology-roadmap-workshop-presentation/5395802", "description": "", "author": "", "views": 0, "search_query": "technology roadmap", "source": "slideshare", "harvested_at": "2025-12-17T02:33:25.059321" }, { "title": "Presentation from 99520391", "url": "https://www.slideshare.net/slideshow/gdpr-compliance-99520391/99520391", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.270971" }, { "title": "Presentation from 249186947", "url": "https://www.slideshare.net/slideshow/accelerating-the-path-to-gdpr-compliance/249186947", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.338350" }, { "title": "Presentation from 78641253", "url": "https://www.slideshare.net/slideshow/presentation-gdpr-how-to-ensure-compliance/78641253", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.390097" }, { "title": "Presentation from 89183906", "url": "https://www.slideshare.net/slideshow/establishing-sustainable-gdpr-compliance-89183906/89183906", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.435360" }, { "title": "Presentation from 78261191", "url": "https://www.slideshare.net/slideshow/five-strategies-for-gdpr-compliance/78261191", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.488263" }, { "title": "Presentation from 78929113", "url": "https://www.slideshare.net/slideshow/dcvast-gdpr-compliance-one-pager/78929113", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.538001" }, { "title": "Presentation from 262027285", "url": "https://www.slideshare.net/slideshow/gdpr-compliance-kpis-and-kris/262027285", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.587309" }, { "title": "Presentation from 76935466", "url": "https://www.slideshare.net/slideshow/iab-europes-gdpr-compliance-primer/76935466", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.629288" }, { "title": "Presentation from 272105061", "url": "https://www.slideshare.net/slideshow/archiving-and-gdpr-compliance-presentation-dvm-gdpr-sap-pdf/272105061", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.692384" }, { "title": "Presentation from 115602823", "url": "https://www.slideshare.net/slideshow/office-365-features-for-gdpr-compliance-webinar/115602823", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.752500" }, { "title": "Presentation from 102697596", "url": "https://www.slideshare.net/slideshow/gdpr-software-general-data-protection-regulation-gdpr-dashboard/102697596", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.809694" }, { "title": "Presentation from 98258400", "url": "https://www.slideshare.net/slideshow/gdpr-compliance-with-wso2-identity-server-98258400/98258400", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.850722" }, { "title": "Presentation from 73164127", "url": "https://www.slideshare.net/slideshow/gdpr-compliance-presentation-for-consulegis-lawyers-network/73164127", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.913247" }, { "title": "Presentation from 247762024", "url": "https://www.slideshare.net/slideshow/qubole-gdpr-security-and-compliance-whitepaper/247762024", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:36.964830" }, { "title": "Presentation from 80211772", "url": "https://www.slideshare.net/slideshow/convince-your-board-ten-steps-to-gdpr-compliance/80211772", "description": "", "author": "", "views": 0, "search_query": "GDPR compliance", "source": "slideshare", "harvested_at": "2025-12-17T02:33:37.007411" }, { "title": "Presentation from 279570271", "url": "https://www.slideshare.net/slideshow/iso-27001-certification-iso-27001-certification-4fc1/279570271", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.229726" }, { "title": "Presentation from 12892342", "url": "https://www.slideshare.net/slideshow/iso-27001-12892342/12892342", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.278566" }, { "title": "Presentation from 256207597", "url": "https://www.slideshare.net/slideshow/iso-27001-awarenesstransitionpptx/256207597", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.350818" }, { "title": "Presentation from 279639045", "url": "https://www.slideshare.net/slideshow/iso-iec-27001-awareness_presentation-pptx/279639045", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.392107" }, { "title": "Presentation from 7269377", "url": "https://www.slideshare.net/slideshow/iso-27001-7269377/7269377", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.431194" }, { "title": "Presentation from 252008941", "url": "https://www.slideshare.net/slideshow/2022-webinar-iso-27001-certificationpdf/252008941", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.483873" }, { "title": "Presentation from 238276266", "url": "https://www.slideshare.net/slideshow/iso-27001-auditsguide/238276266", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.531812" }, { "title": "Presentation from 12671067", "url": "https://www.slideshare.net/slideshow/iso-27001-10apr2006/12671067", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.583138" }, { "title": "Presentation from 239372003", "url": "https://www.slideshare.net/slideshow/iso-27001-239372003/239372003", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.629444" }, { "title": "Presentation from 33864016", "url": "https://www.slideshare.net/slideshow/iso-27001-implementationdocumentationmandatorylist/33864016", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.677777" }, { "title": "Presentation from 62890558", "url": "https://www.slideshare.net/slideshow/what-is-iso-27001-isms-62890558/62890558", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.745398" }, { "title": "Presentation from 53265783", "url": "https://www.slideshare.net/slideshow/it-security-iso-27001/53265783", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.794146" }, { "title": "Presentation from 253340176", "url": "https://www.slideshare.net/slideshow/iso-survey-2021-iso-27001pdf/253340176", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.862482" }, { "title": "Presentation from 254487937", "url": "https://www.slideshare.net/slideshow/iso-270012022-introduction/254487937", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.912637" }, { "title": "Presentation from 26200502", "url": "https://www.slideshare.net/slideshow/iso-270012013/26200502", "description": "", "author": "", "views": 0, "search_query": "ISO 27001", "source": "slideshare", "harvested_at": "2025-12-17T02:33:48.958089" }, { "title": "Presentation from 85816125", "url": "https://www.slideshare.net/slideshow/cyber-risk-management-85816125/85816125", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.174034" }, { "title": "Presentation from 86365441", "url": "https://www.slideshare.net/slideshow/risk-management-approach-to-cyber-security/86365441", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.237715" }, { "title": "Presentation from 272072114", "url": "https://www.slideshare.net/slideshow/cyber-security-risk-management-strategies-for-saudi-arabia-pdf/272072114", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.285439" }, { "title": "Presentation from 280976724", "url": "https://www.slideshare.net/slideshow/transdisciplinary-perspectives-on-risk-management-and-cyber-intelligence-1st-edition-luisa-dall-acqua/280976724", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.334196" }, { "title": "Presentation from 279178190", "url": "https://www.slideshare.net/slideshow/transdisciplinary-perspectives-on-risk-management-and-cyber-intelligence-1st-edition-luisa-dallacqua/279178190", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.378163" }, { "title": "Presentation from 69699271", "url": "https://www.slideshare.net/slideshow/cyber-liability-insurance-risk-management-and-preparation/69699271", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.419922" }, { "title": "Presentation from 58688451", "url": "https://www.slideshare.net/slideshow/archer-users-group-southern-risk-council-2016-enterprise-risk-management-and-cyber-security/58688451", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.463735" }, { "title": "Presentation from 90501725", "url": "https://www.slideshare.net/slideshow/third-party-risk-management-with-cyber-threat-intelligence/90501725", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.504537" }, { "title": "Presentation from 73257031", "url": "https://www.slideshare.net/slideshow/cyber-security-vendor-risk-management-supply-chain-risk-management/73257031", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.548306" }, { "title": "Presentation from 282839231", "url": "https://www.slideshare.net/slideshow/file-08-cyber-risk-management-ict-5418-cyber-crime-and-cyber-terrorism-pptx/282839231", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.589859" }, { "title": "Presentation from 76951143", "url": "https://www.slideshare.net/slideshow/cyber-risk-management-in-2017-challenges-recommendations-76951143/76951143", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.627927" }, { "title": "Presentation from 117820390", "url": "https://www.slideshare.net/slideshow/cybersecurity-cyber-risk-management-for-banks-financial-institutions/117820390", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.673556" }, { "title": "Presentation from 36884035", "url": "https://www.slideshare.net/slideshow/cyber-risk-management/36884035", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.726716" }, { "title": "Presentation from 70012744", "url": "https://www.slideshare.net/slideshow/cyber-risk-management-in-2017-challenges-recommendations/70012744", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.803623" }, { "title": "Presentation from 243625807", "url": "https://www.slideshare.net/slideshow/cyber-security-services-risk-management-solutions-ampcus-inc-243625807/243625807", "description": "", "author": "", "views": 0, "search_query": "cyber risk management", "source": "slideshare", "harvested_at": "2025-12-17T02:34:00.846982" }, { "title": "Presentation from 64116600", "url": "https://www.slideshare.net/slideshow/securitygovernance/64116600", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:11.849591" }, { "title": "Presentation from 78957257", "url": "https://www.slideshare.net/slideshow/cloud-security-governance-78957257/78957257", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:11.913290" }, { "title": "Presentation from 81168738", "url": "https://www.slideshare.net/slideshow/information-security-governance-and-strategy/81168738", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:11.962210" }, { "title": "Presentation from 255127663", "url": "https://www.slideshare.net/slideshow/information-security-governance-framework/255127663", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.027669" }, { "title": "Presentation from 239680101", "url": "https://www.slideshare.net/slideshow/cyber-security-governance/239680101", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.081263" }, { "title": "Presentation from 63926821", "url": "https://www.slideshare.net/slideshow/big-data-security-and-governance/63926821", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.136627" }, { "title": "Presentation from 2848176", "url": "https://www.slideshare.net/slideshow/security-governance-isp-eng-2848176/2848176", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.197142" }, { "title": "Presentation from 248302214", "url": "https://www.slideshare.net/slideshow/an-information-security-governance-framework/248302214", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.252322" }, { "title": "Presentation from 81726908", "url": "https://www.slideshare.net/slideshow/information-security-governance-and-strategy-3/81726908", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.311068" }, { "title": "Presentation from 23974559", "url": "https://www.slideshare.net/slideshow/journal-december-2012/23974559", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.367082" }, { "title": "Presentation from 81855272", "url": "https://www.slideshare.net/slideshow/information-security-governance-2a/81855272", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.414547" }, { "title": "Presentation from 81855635", "url": "https://www.slideshare.net/slideshow/information-security-governance-2a-81855635/81855635", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.467214" }, { "title": "Presentation from 12806723", "url": "https://www.slideshare.net/slideshow/effective-it-security-governance-leo-de-sousa/12806723", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.520285" }, { "title": "Presentation from 39539511", "url": "https://www.slideshare.net/slideshow/security-governance-primer/39539511", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.571328" }, { "title": "Presentation from 77890469", "url": "https://www.slideshare.net/slideshow/information-security-in-public-governance/77890469", "description": "", "author": "", "views": 0, "search_query": "security governance", "source": "slideshare", "harvested_at": "2025-12-17T02:34:12.621314" }, { "title": "Presentation from 265982988", "url": "https://www.slideshare.net/slideshow/top-5-urgent-reasons-for-siem-implementation-allendevauxpdf/265982988", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:24.355420" }, { "title": "Presentation from 10590169", "url": "https://www.slideshare.net/slideshow/misti-infosec-2010-siem-implementation/10590169", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:24.433359" }, { "title": "Presentation from 82386670", "url": "https://www.slideshare.net/slideshow/gdpr-9-step-siem-implementation-checklist/82386670", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:24.516909" }, { "title": "Presentation from 8721331", "url": "https://www.slideshare.net/slideshow/five-best-and-five-worst-practices-for-siem-by-dr-anton-chuvakin-8721331/8721331", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:24.580295" }, { "title": "Presentation from 8721324", "url": "https://www.slideshare.net/slideshow/five-best-and-five-worst-practices-for-siem-by-dr-anton-chuvakin/8721324", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:24.643049" }, { "title": "Presentation from 59267489", "url": "https://www.slideshare.net/slideshow/why-so-many-siem-implmentations-fail/59267489", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:24.695124" }, { "title": "Presentation from 122722414", "url": "https://www.slideshare.net/slideshow/which-generation-of-siem/122722414", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:24.744735" }, { "title": "Presentation from 47721367", "url": "https://www.slideshare.net/slideshow/surelog-largescale-siem-implementation-in-a-distributed-it-security-world/47721367", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:24.804051" }, { "title": "Presentation from 254143533", "url": "https://www.slideshare.net/slideshow/isol532-final-project-assignmentproject-assignmentthis-prdocx/254143533", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:25.236496" }, { "title": "Presentation from 33420158", "url": "https://www.slideshare.net/slideshow/siem-for-beginners/33420158", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:25.291072" }, { "title": "Presentation from 254143525", "url": "https://www.slideshare.net/slideshow/ism3013-final-project-assignment-project-assignment-docx/254143525", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:25.343978" }, { "title": "Presentation from 75051640", "url": "https://www.slideshare.net/slideshow/apply-big-data-and-data-lake-for-processing-security-data-collections/75051640", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:25.433678" }, { "title": "Presentation from 264350308", "url": "https://www.slideshare.net/slideshow/exploring-critical-vulnerabilities-in-siem-implementation-and-soc-service-procurement-an-indepth-analysis-of-highrisk-scenarios/264350308", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:25.488766" }, { "title": "Presentation from 78590806", "url": "https://www.slideshare.net/slideshow/security-meetup-scotland-august-2017-deconstructing-siem/78590806", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:25.554127" }, { "title": "Presentation from 284613369", "url": "https://www.slideshare.net/slideshow/managed-splunk-partner-vs-in-house-cost-risk-value-comparison/284613369", "description": "", "author": "", "views": 0, "search_query": "SIEM implementation", "source": "slideshare", "harvested_at": "2025-12-17T02:34:25.599130" }, { "title": "Presentation from 276376589", "url": "https://www.slideshare.net/slideshow/understanding-endpoint-detection-and-response-edr/276376589", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:36.650757" }, { "title": "Presentation from 273403604", "url": "https://www.slideshare.net/slideshow/the-future-of-endpoint-detection-and-response-edr-trends-to-watch/273403604", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:36.720472" }, { "title": "Presentation from 273114064", "url": "https://www.slideshare.net/slideshow/the-importance-of-edr-security-in-modern-cyber-defense/273114064", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:36.774992" }, { "title": "Presentation from 234873558", "url": "https://www.slideshare.net/slideshow/mcafee-mcafee-active-response-mar-endpoint-detection-response-edr/234873558", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:36.845379" }, { "title": "Presentation from 251626062", "url": "https://www.slideshare.net/slideshow/xdr-solution-company-in-usapptx/251626062", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:36.896635" }, { "title": "Presentation from 276386330", "url": "https://www.slideshare.net/slideshow/strengthen-endpoint-security-with-seqrite-edr/276386330", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:36.988514" }, { "title": "Presentation from 273887201", "url": "https://www.slideshare.net/slideshow/opentext-mxdr-advanced-edr-agent-with-autonomous-next-gen-protection/273887201", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:37.038237" }, { "title": "Presentation from 57183518", "url": "https://www.slideshare.net/slideshow/panda-adaptive-defense-360/57183518", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:37.093666" }, { "title": "Presentation from 279695970", "url": "https://www.slideshare.net/slideshow/understanding-endpoint-security-in-a-soc/279695970", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:37.149331" }, { "title": "Presentation from 77150440", "url": "https://www.slideshare.net/slideshow/maturing-endpoint-security-5-key-considerations/77150440", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:37.197858" }, { "title": "Presentation from 86381079", "url": "https://www.slideshare.net/slideshow/edr-vs-siem-the-fight-is-on/86381079", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:37.255433" }, { "title": "Presentation from 267282982", "url": "https://www.slideshare.net/slideshow/stay-ahead-in-2024-with-these-cybersecuritypdf/267282982", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:37.301548" }, { "title": "Presentation from 262859993", "url": "https://www.slideshare.net/slideshow/tidying-up-your-nest-validating-attck-technique-coverage-using-edr-telemetry/262859993", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:37.363024" }, { "title": "Presentation from 236312406", "url": "https://www.slideshare.net/slideshow/managed-end-point-security/236312406", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:37.408563" }, { "title": "Presentation from 272430482", "url": "https://www.slideshare.net/slideshow/key-features-of-endpoint-security-tools-presentation/272430482", "description": "", "author": "", "views": 0, "search_query": "EDR endpoint detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:37.472312" }, { "title": "Presentation from 250663705", "url": "https://www.slideshare.net/slideshow/managed-detection-and-response-mdr-whitepaper/250663705", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:48.741229" }, { "title": "Presentation from 251044856", "url": "https://www.slideshare.net/slideshow/what-is-managed-detection-and-response-mdr-security-services/251044856", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:48.799775" }, { "title": "Presentation from 264315547", "url": "https://www.slideshare.net/slideshow/understanding-managed-detection-and-response-mdr-proarchs-approach/264315547", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:48.854630" }, { "title": "Presentation from 116947143", "url": "https://www.slideshare.net/slideshow/critical-capabilities-for-mdr-services-what-to-know-before-you-buy/116947143", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:48.922320" }, { "title": "Presentation from 282084528", "url": "https://www.slideshare.net/slideshow/top-10-mdr-tools-in-2025-boost-your-cyber-defence/282084528", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:49.016151" }, { "title": "Presentation from 276013274", "url": "https://www.slideshare.net/slideshow/mdr-as-a-service-proactive-threat-detection-response-pptx/276013274", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:49.070612" }, { "title": "Presentation from 284129547", "url": "https://www.slideshare.net/slideshow/managed-detection-anmanaged-detection-and-responsed/284129547", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:49.186323" }, { "title": "Presentation from 270340331", "url": "https://www.slideshare.net/slideshow/comparing-mdr-to-traditional-cybersecurity-approaches-pptx/270340331", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:49.246454" }, { "title": "Presentation from 238781172", "url": "https://www.slideshare.net/slideshow/managed-detection-and-response-selective-outsourcing-for-understaffed-socs-and-the-platforms-that-enable-mdr-services/238781172", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:49.294752" }, { "title": "Presentation from 78750593", "url": "https://www.slideshare.net/slideshow/netwatcher-customer-overview/78750593", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:49.356878" }, { "title": "Presentation from 95662374", "url": "https://www.slideshare.net/slideshow/a-case-for-managed-detection-and-response/95662374", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:49.402228" }, { "title": "Presentation from 258246148", "url": "https://www.slideshare.net/slideshow/cyber-security-companies-uk/258246148", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:49.485185" }, { "title": "Presentation from 250054999", "url": "https://www.slideshare.net/slideshow/managed-detection-and-response-analyst-report/250054999", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:49.536842" }, { "title": "Presentation from 119818967", "url": "https://www.slideshare.net/slideshow/infocyte-q3-partner-update/119818967", "description": "", "author": "", "views": 0, "search_query": "MDR managed detection", "source": "slideshare", "harvested_at": "2025-12-17T02:34:49.594307" }, { "title": "Presentation from 251485851", "url": "https://www.slideshare.net/slideshow/extended-detection-and-response-xdran-overhyped-product-category-with-ultimate-security-potential/251485851", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.075693" }, { "title": "Presentation from 275382112", "url": "https://www.slideshare.net/slideshow/kaspersky-next-xdr-expert-product-presentation-1909-en-pptx/275382112", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.141900" }, { "title": "Presentation from 267378203", "url": "https://www.slideshare.net/slideshow/cybersecurity-leaders-guide-to-xdr-for-business/267378203", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.199180" }, { "title": "Presentation from 283062942", "url": "https://www.slideshare.net/slideshow/strengthening-security-with-extended-detection-and-response-docx/283062942", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.266715" }, { "title": "Presentation from 251595542", "url": "https://www.slideshare.net/slideshow/2022-apisecuremonitoring-your-apis-for-attacks-using-siem-versus-xdr/251595542", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.335251" }, { "title": "Presentation from 272862807", "url": "https://www.slideshare.net/slideshow/understanding-xdr-solutions-the-future-of-cybersecurity/272862807", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.385994" }, { "title": "Presentation from 274591312", "url": "https://www.slideshare.net/slideshow/maximizing-soc-benefits-with-xdr-a-game-changer-for-cybersecurity/274591312", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.459666" }, { "title": "Presentation from 270659578", "url": "https://www.slideshare.net/slideshow/top-10-cybersecurity-trends-in-2024-benefits-challenges-insider-market-research/270659578", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.529240" }, { "title": "Presentation from 282575659", "url": "https://www.slideshare.net/slideshow/cloud-native-ai-powered-xdr-drives-endpoint-security-platforms-market-toward-us-23-9-billion-by-2030/282575659", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.585036" }, { "title": "Presentation from 269416276", "url": "https://www.slideshare.net/slideshow/what-are-the-latest-trends-in-endpoint-security-for-2024-2dbe/269416276", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.630456" }, { "title": "Presentation from 277509200", "url": "https://www.slideshare.net/slideshow/empowering-cyber-resilience-with-seqrite-xdr-the-future-of-data-privacy-threat-detection/277509200", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.735149" }, { "title": "Presentation from 246645180", "url": "https://www.slideshare.net/slideshow/microsoft-defender-and-azure-sentinel/246645180", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.777105" }, { "title": "Presentation from 280464073", "url": "https://www.slideshare.net/slideshow/xdr-buyer-guide-by-infopercept-cybersecurity/280464073", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.843722" }, { "title": "Presentation from 274615294", "url": "https://www.slideshare.net/slideshow/proactive-protection-and-real-time-threat-response/274615294", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.888477" }, { "title": "Presentation from 262424624", "url": "https://www.slideshare.net/slideshow/why-should-organizations-consider-extended-detection-and-response-xdr/262424624", "description": "", "author": "", "views": 0, "search_query": "XDR security", "source": "slideshare", "harvested_at": "2025-12-17T02:35:01.956137" }, { "title": "Presentation from 280610952", "url": "https://www.slideshare.net/slideshow/enhancing-cyber-defense-with-security-orchestration-and-automation-soar-pdf/280610952", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:12.857711" }, { "title": "Presentation from 251630629", "url": "https://www.slideshare.net/slideshow/soar-platformpptx/251630629", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:12.943432" }, { "title": "Presentation from 250900642", "url": "https://www.slideshare.net/slideshow/optimize-your-cyber-security-with-soar-tools/250900642", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:12.993457" }, { "title": "Presentation from 250266792", "url": "https://www.slideshare.net/slideshow/ug-soar-22sep21/250266792", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.071519" }, { "title": "Presentation from 115009387", "url": "https://www.slideshare.net/slideshow/splunk-phantom-soar-roundtable/115009387", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.133164" }, { "title": "Presentation from 251142089", "url": "https://www.slideshare.net/slideshow/understanding-soar-security/251142089", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.239197" }, { "title": "Presentation from 238931481", "url": "https://www.slideshare.net/slideshow/security-orchestration-automation-and-response-soar-market/238931481", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.294370" }, { "title": "Presentation from 136244078", "url": "https://www.slideshare.net/slideshow/automating-cybersecurity/136244078", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.340599" }, { "title": "Presentation from 260379674", "url": "https://www.slideshare.net/slideshow/three-things-we-see-fix-in-every-struggling-security-automation-project/260379674", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.405282" }, { "title": "Presentation from 277826584", "url": "https://www.slideshare.net/slideshow/soar-security-systems-revolutionizing-cybersecurity-through-orchestration-and-automation/277826584", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.453710" }, { "title": "Presentation from 230330814", "url": "https://www.slideshare.net/slideshow/journey-to-the-center-of-security-operations/230330814", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.516758" }, { "title": "Presentation from 260379741", "url": "https://www.slideshare.net/slideshow/how-to-reduce-the-financial-impact-of-security-incidents-by-90-or-more-with-smart-soar/260379741", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.570041" }, { "title": "Presentation from 122800602", "url": "https://www.slideshare.net/slideshow/introducing-siemplify-v425-security-orchestration-automation-and-response-soar-platform/122800602", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.614718" }, { "title": "Presentation from 218391449", "url": "https://www.slideshare.net/slideshow/transform-your-security-operations-with-security-automation-and-orchestration/218391449", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.665398" }, { "title": "Presentation from 137941992", "url": "https://www.slideshare.net/slideshow/secops-ir-and-forensic-workflows-python-security-automation/137941992", "description": "", "author": "", "views": 0, "search_query": "SOAR automation", "source": "slideshare", "harvested_at": "2025-12-17T02:35:13.717268" } ] }