SlideShare a Scribd company logo
1 of 71
Social Media
&
Security @brianhonan
Who Am I?
@brianhonan
What
is
Social Media?
Websites and applications that
enable users to create and share
content or to participate in social
networking.
- Oxford English Dictionary
Forms of electronic communication
(as Web sites for social networking
and microblogging) through which
users create online communities to
share information, ideas, personal
messages, and other content (as
videos) .
- Mirriam-Webster Dictionary
“A group of Internet-based
applications that build on the
ideological and technological
foundations of Web 2.0, and that
allow the creation and exchange of
user-generated content."
- Wikipedia
Courtesy of Instantcheckmate.com
Government Official Sacked
Forgot Boss was Facebook Friend
Posting They Are Not at Home
Yes, 53%
No, 47%
Courtesy of Legal & General Group PLC
Yes, 60%
No, 40%
Post About Nights Out
Courtesy of Legal & General Group PLC
Shared Images of Expensive Items
Yes, 24%
No, 76%
Courtesy of Legal & General Group PLC
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Social Media Scams
Competition Winners ??
Click on This Link …
Twitter Threats
Koobface
Courtesy TrendMicro
Zeus?
Do You Trust That App?
CourtesyofBitrebels.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Anthony Stancl
Secure Passwords?
Common Passwords
Password Reset
My Name is Marie
How Did I Steal Her ID?
Corporate Issues
Password Reuse
81%
61%
19%
39%
0% 20% 40% 60% 80% 100%
IT Pros
General
Courtesy Darkreading.com & welivesecurity.com
Social Media Treasure Trove
The Gift That Keeps on Giving
Social Engineering
Emily Williams & Robin Page
http://www.thesecurityblogger.com/?p=1903
Misinformation
Manipulation?
How To Defend
Establish Policies
Awareness
Be Careful
What You
Share
Update Privacy Settings
Twitterfall
Handling Security Breaches
Bad News
 Use All Channels.
 Use Social Media to Direct
People to More Information
 Update Regularly (Timezones,
etc.)
 Keep Webpage Updated
 Have Staff Trained
 Trust Employees
 Get Senior Representative to
Talk Early and Often
 Engage With Others
Use Social Media in IR
Monitor & Respond
Brian.honan@bhconsulting.ie
@brianhonan

More Related Content

What's hot

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011Donald E. Hester
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneInflection Point Global
 
Security and social media
Security and social mediaSecurity and social media
Security and social mediaJP Rains, MBA
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 

What's hot (20)

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Social media risk
Social media riskSocial media risk
Social media risk
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
Security and social media
Security and social mediaSecurity and social media
Security and social media
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 

Viewers also liked

Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...SpareBank 1 Gruppen AS
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
Juliana New York
Juliana  New YorkJuliana  New York
Juliana New Yorkguest3c3576
 
Learning from History
Learning from HistoryLearning from History
Learning from HistoryBrian Honan
 
P Gross Portfolio2008
P Gross Portfolio2008P Gross Portfolio2008
P Gross Portfolio2008pjgross
 
Optime 8 9 E 10 Giugno Frodi Assicurative
Optime 8 9 E 10 Giugno Frodi AssicurativeOptime 8 9 E 10 Giugno Frodi Assicurative
Optime 8 9 E 10 Giugno Frodi AssicurativeMarco Contini
 
Askartelukerho kevät 2011
Askartelukerho kevät 2011Askartelukerho kevät 2011
Askartelukerho kevät 2011Tiina Sarisalmi
 
eTwinning - lyhyt johdatus työpajatyöskentelyyn
eTwinning - lyhyt johdatus työpajatyöskentelyyneTwinning - lyhyt johdatus työpajatyöskentelyyn
eTwinning - lyhyt johdatus työpajatyöskentelyynTiina Sarisalmi
 
KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7phuphax
 
One Source Solutions
One Source SolutionsOne Source Solutions
One Source Solutionsscaster
 
etwinning Learning Events - Pedagogical Objectives
etwinning Learning Events - Pedagogical Objectivesetwinning Learning Events - Pedagogical Objectives
etwinning Learning Events - Pedagogical ObjectivesTiina Sarisalmi
 
Tactiek verdedigen
Tactiek verdedigenTactiek verdedigen
Tactiek verdedigenJohanda
 

Viewers also liked (20)

Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
PACE-IT: Common Network Security Issues
PACE-IT: Common Network Security IssuesPACE-IT: Common Network Security Issues
PACE-IT: Common Network Security Issues
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Voimaa verkostoitumalla
Voimaa verkostoitumallaVoimaa verkostoitumalla
Voimaa verkostoitumalla
 
Juliana New York
Juliana  New YorkJuliana  New York
Juliana New York
 
Idea
IdeaIdea
Idea
 
Learning from History
Learning from HistoryLearning from History
Learning from History
 
P Gross Portfolio2008
P Gross Portfolio2008P Gross Portfolio2008
P Gross Portfolio2008
 
Optime 8 9 E 10 Giugno Frodi Assicurative
Optime 8 9 E 10 Giugno Frodi AssicurativeOptime 8 9 E 10 Giugno Frodi Assicurative
Optime 8 9 E 10 Giugno Frodi Assicurative
 
Askartelukerho kevät 2011
Askartelukerho kevät 2011Askartelukerho kevät 2011
Askartelukerho kevät 2011
 
eTwinning - lyhyt johdatus työpajatyöskentelyyn
eTwinning - lyhyt johdatus työpajatyöskentelyyneTwinning - lyhyt johdatus työpajatyöskentelyyn
eTwinning - lyhyt johdatus työpajatyöskentelyyn
 
KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7
 
One Source Solutions
One Source SolutionsOne Source Solutions
One Source Solutions
 
etwinning Learning Events - Pedagogical Objectives
etwinning Learning Events - Pedagogical Objectivesetwinning Learning Events - Pedagogical Objectives
etwinning Learning Events - Pedagogical Objectives
 
Rok 09
Rok 09Rok 09
Rok 09
 
Tactiek verdedigen
Tactiek verdedigenTactiek verdedigen
Tactiek verdedigen
 

Similar to How to Like Social Media Network Security

Nonprofit Congress: Innovation
Nonprofit Congress:  InnovationNonprofit Congress:  Innovation
Nonprofit Congress: InnovationBarbaraKelly
 
Social media in hospitality
Social media in hospitalitySocial media in hospitality
Social media in hospitalityAnil Bilgihan
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 PrimerAYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 PrimerGrace Rodriguez
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 PresentationSteve Rath
 
CNCS Web 2.0
CNCS Web 2.0CNCS Web 2.0
CNCS Web 2.0jmproulx
 
social media for social change
social media for social changesocial media for social change
social media for social changeJoely Ross
 
Social Media For Social Change
Social Media For Social ChangeSocial Media For Social Change
Social Media For Social ChangeJason Scott
 
Social Media & Civic Engagement
Social Media & Civic EngagementSocial Media & Civic Engagement
Social Media & Civic EngagementMA Campus Compact
 
Social media colleges- t seymour
Social media   colleges- t seymourSocial media   colleges- t seymour
Social media colleges- t seymourTom Seymour, PhD
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAyelet Baron
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Merged may 19 webinar
Merged may 19 webinarMerged may 19 webinar
Merged may 19 webinarsslesperance
 
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing ForumOnline Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing ForumLode Broekman
 
Social Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian UsageSocial Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian UsageMoksh Juneja
 
Social Media Marketing - Introduction
Social Media Marketing - IntroductionSocial Media Marketing - Introduction
Social Media Marketing - IntroductionMoksh Juneja
 

Similar to How to Like Social Media Network Security (20)

Nonprofit Congress: Innovation
Nonprofit Congress:  InnovationNonprofit Congress:  Innovation
Nonprofit Congress: Innovation
 
Working with New Media
Working with New MediaWorking with New Media
Working with New Media
 
Social media in hospitality
Social media in hospitalitySocial media in hospitality
Social media in hospitality
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 PrimerAYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
Social Media101
Social Media101Social Media101
Social Media101
 
CNCS Web 2.0
CNCS Web 2.0CNCS Web 2.0
CNCS Web 2.0
 
social media for social change
social media for social changesocial media for social change
social media for social change
 
Social Media For Social Change
Social Media For Social ChangeSocial Media For Social Change
Social Media For Social Change
 
Social Media & Civic Engagement
Social Media & Civic EngagementSocial Media & Civic Engagement
Social Media & Civic Engagement
 
Social media colleges- t seymour
Social media   colleges- t seymourSocial media   colleges- t seymour
Social media colleges- t seymour
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
 
Ppt2
Ppt2Ppt2
Ppt2
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Abjs 2008 Veillette Web 20
Abjs 2008 Veillette Web 20Abjs 2008 Veillette Web 20
Abjs 2008 Veillette Web 20
 
Merged may 19 webinar
Merged may 19 webinarMerged may 19 webinar
Merged may 19 webinar
 
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing ForumOnline Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
 
Social Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian UsageSocial Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian Usage
 
Social Media Marketing - Introduction
Social Media Marketing - IntroductionSocial Media Marketing - Introduction
Social Media Marketing - Introduction
 

More from Brian Honan

Brian honan ipexpo keynote
Brian honan ipexpo keynoteBrian honan ipexpo keynote
Brian honan ipexpo keynoteBrian Honan
 
GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?Brian Honan
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention GuideBrian Honan
 
The dark side of the internet
The dark side of the internetThe dark side of the internet
The dark side of the internetBrian Honan
 
Data security brian honan
Data security   brian honanData security   brian honan
Data security brian honanBrian Honan
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Brian Honan
 
Incident Response in the Cloud
Incident Response in the CloudIncident Response in the Cloud
Incident Response in the CloudBrian Honan
 
Bridging the air gap
Bridging the air gapBridging the air gap
Bridging the air gapBrian Honan
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloudBrian Honan
 
Preparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponsePreparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponseBrian Honan
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log managementBrian Honan
 
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenLayer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenBrian Honan
 
Creating a CERT at WARP Speed
Creating a CERT at WARP SpeedCreating a CERT at WARP Speed
Creating a CERT at WARP SpeedBrian Honan
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsBrian Honan
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhBrian Honan
 
Knowing Me Knowing You
Knowing Me Knowing YouKnowing Me Knowing You
Knowing Me Knowing YouBrian Honan
 
Scare Ware From Ireland
Scare Ware From IrelandScare Ware From Ireland
Scare Ware From IrelandBrian Honan
 

More from Brian Honan (20)

Brian honan ipexpo keynote
Brian honan ipexpo keynoteBrian honan ipexpo keynote
Brian honan ipexpo keynote
 
GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Brian honan
Brian honanBrian honan
Brian honan
 
The dark side of the internet
The dark side of the internetThe dark side of the internet
The dark side of the internet
 
Data security brian honan
Data security   brian honanData security   brian honan
Data security brian honan
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
Incident Response in the Cloud
Incident Response in the CloudIncident Response in the Cloud
Incident Response in the Cloud
 
Bridging the air gap
Bridging the air gapBridging the air gap
Bridging the air gap
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloud
 
Preparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponsePreparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident Response
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log management
 
Cloud security
Cloud securityCloud security
Cloud security
 
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenLayer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
 
Creating a CERT at WARP Speed
Creating a CERT at WARP SpeedCreating a CERT at WARP Speed
Creating a CERT at WARP Speed
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp Bh
 
Knowing Me Knowing You
Knowing Me Knowing YouKnowing Me Knowing You
Knowing Me Knowing You
 
Scare Ware From Ireland
Scare Ware From IrelandScare Ware From Ireland
Scare Ware From Ireland
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

How to Like Social Media Network Security