[Cluj] Information Security Through Gamification

OWASP EEE
Information Security
Through Gamification
Learning | Training | Improving
Marius Corici:
Lazy entrepreneur (energy efficient):
Thinking a lot to do less, preserving energy, providing simplicity.
https://CTF365.com - Finalist Kaspersky Security Startup Challenge 2015
Wanna talk?
Email: marius@ctf365.com
Skype: marius.corici
https://www.linkedin.com/pub/marius-corici/12/73/73b
Source: http://www.juniperresearch.com/press/press-releases/iot-connected-devices-to-triple-to-38-bn-by-2020
IoT 38 Billion Devices by 2020
(In)Security Landscape
Information Security
Employment Landscape
Demand > Supply
-1.5M
2017
http://www.csoonline.com/article/2922381/infosec-careers/confronting-the-widening-infosec-skills-gap.html
https://www.isc2.org/uploadedFiles/%28ISC%292_Public_Content/2013%20Global%20Information%20Sec
urity%20Workforce%20Study%20Feb%202013.pdf
Employment ↑11.3%
“I know Information Security!”
● Security Training Companies
● CS Faculties
● Self – Taught
Are
We
Screwed?
Gamification
Gamification:
● Using game elements in non-game context.
Game ≠ Gaming ≠ Gamification
GAME
GAMING
GAMIFICATION
{
● Engagement
● Productivity
● Learning
● Employee Recruitment
● Evaluation
Learning Through Gamification
Educational, Entertaining, Challenging, Continuous Improvement, Community Driven, Hands On
Lecture
Reading
Audio/Visual
Demonstration
Discussion Group
Practice by Doing
Gamification
Teaching Others
5%
10%
20%
30%
50%
75%
80-90%
95%
Information Security
Training Hands-On
Information
Security
Security
Lab
Hands-On
Information Security is a journey not a destination
Information Security
Through Gamification
Challenging, Entertaining,
Community Driven
Information
Security
Security
Lab
Hands-On
Gamification
Badges, Ranks & Points
… To show user's expertise for different hacks and skills.
XSS, SQLi, Crypto, Deface, TakeOver BruteForce, Sniffing, etc.
Gamification – Why?
Progress
Motivation
Social Interaction
Mastery
Gamification Benefits
●
Improve Attendance
●
Improve Motivation
●
Improve Retention Rate
●
Increase Attainment
●
Speed up Learning Curve
Enterprise Gamification
2011: Gartner: Over 70 Percent of Global 2000 Organisations Will
Have at Least One Gamified Application by 2014*
* http://www.gartner.com/newsroom/id/1844115
http://blogs.clicksoftware.com/index/top-25-best-examples-of-gamification-in-business/
http://www.yukaichou.com/gamification-examples/top-10-enterprise-gamification-cases-employees-productive/#.VgGXdd9_c3o
Designing Gamification
2012: GARTNER Says by 2014, 80 Percent of Current Gamified Applications
Will Fail to Meet Business Objectives Primarily Due to Poor Design*
* http://www.gartner.com/newsroom/id/2251015
Player, Mission, Motivation, Mechanics, Challenge
https://CTF365.com
Getting your Infosec Certificate, makes you a Security Professional.
Keeping your hacking skills up to date, makes you an Expert.
1 of 17

Recommended

Cybersecurity Market 2020 - Bring the Noise by
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoisePhil Agcaoili
1.1K views38 slides
Next Generation Automotive Cybersecurity with Software Defined Perimeter & Bl... by
Next Generation Automotive Cybersecurity with Software Defined Perimeter & Bl...Next Generation Automotive Cybersecurity with Software Defined Perimeter & Bl...
Next Generation Automotive Cybersecurity with Software Defined Perimeter & Bl...Mahbubul Alam
545 views40 slides
Data Science Africa @ Arm Research Summit by
Data Science Africa @ Arm Research SummitData Science Africa @ Arm Research Summit
Data Science Africa @ Arm Research SummitDamon Civin
94 views44 slides
Cyber Security For Businesses by
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For BusinessesParliamentary Yearbook
200 views2 slides
Micorsoft CityNext Partner of the Year - Artis Group by
Micorsoft CityNext Partner of the Year - Artis GroupMicorsoft CityNext Partner of the Year - Artis Group
Micorsoft CityNext Partner of the Year - Artis GroupNeil Gunning
102 views1 slide
Cloud backup-for-endpoint-devices by
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
357 views5 slides

More Related Content

What's hot

Tech4Africa - Internet of Things for Enterprise by
Tech4Africa - Internet of Things for EnterpriseTech4Africa - Internet of Things for Enterprise
Tech4Africa - Internet of Things for Enterpriseheinkoen
205 views22 slides
An Overview on Internet of Things (IOT) by
An Overview on Internet of Things (IOT)An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)Dan Mo
613 views17 slides
Security Threats in IT Infographic by
Security Threats in IT InfographicSecurity Threats in IT Infographic
Security Threats in IT InfographicNTT Communications ICT Solutions
473 views1 slide
OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr... by
OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...
OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...innovationoecd
4.1K views34 slides
2019 technology innovations and investments by
2019 technology innovations and investments2019 technology innovations and investments
2019 technology innovations and investmentsMarko Paris
57 views10 slides
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014 by
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
873 views28 slides

What's hot(20)

Tech4Africa - Internet of Things for Enterprise by heinkoen
Tech4Africa - Internet of Things for EnterpriseTech4Africa - Internet of Things for Enterprise
Tech4Africa - Internet of Things for Enterprise
heinkoen205 views
An Overview on Internet of Things (IOT) by Dan Mo
An Overview on Internet of Things (IOT)An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)
Dan Mo613 views
OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr... by innovationoecd
OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...
OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...
innovationoecd4.1K views
2019 technology innovations and investments by Marko Paris
2019 technology innovations and investments2019 technology innovations and investments
2019 technology innovations and investments
Marko Paris57 views
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014 by Rick Huijbregts
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Rick Huijbregts873 views
SentinelOne - NOAH19 Tel Aviv by NOAH Advisors
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
NOAH Advisors1.6K views
[Webinar] The impact of innovation and technology for businesses in 2018 by Somo
[Webinar] The impact of innovation and technology for businesses in 2018[Webinar] The impact of innovation and technology for businesses in 2018
[Webinar] The impact of innovation and technology for businesses in 2018
Somo 229 views
Smart Tech = Smart Organizations : Building Smarter Organizations by Rick Huijbregts
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
Rick Huijbregts2.2K views
Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016 by Craig Rispin
Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016
Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016
Craig Rispin184 views
iot-bringing-trust-to-iot[1] by Haider Iqbal
iot-bringing-trust-to-iot[1]iot-bringing-trust-to-iot[1]
iot-bringing-trust-to-iot[1]
Haider Iqbal118 views
Future of Higher Education June 2019 by Robin Teigland
Future of Higher Education June 2019Future of Higher Education June 2019
Future of Higher Education June 2019
Robin Teigland1.8K views
Cisco IoT World Forum 2014: Airwatch Breakout Session by Basil Hashem
Cisco IoT World Forum 2014: Airwatch Breakout SessionCisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout Session
Basil Hashem92 views
The 2015 Tech Roundup by Robert Half
The 2015 Tech RoundupThe 2015 Tech Roundup
The 2015 Tech Roundup
Robert Half3.1K views
Tech Trend Predictions for 2018 by Rock Interview
Tech Trend Predictions for 2018Tech Trend Predictions for 2018
Tech Trend Predictions for 2018
Rock Interview178 views
Lisbon MRO Summit - Collaboration in Big Data Analytics by Michael Denis
Lisbon MRO Summit - Collaboration in Big Data AnalyticsLisbon MRO Summit - Collaboration in Big Data Analytics
Lisbon MRO Summit - Collaboration in Big Data Analytics
Michael Denis1.7K views
Is IT Really the Villain? - Future of Technology in the Enterprise by John Mancini
Is IT Really the Villain? - Future of Technology in the EnterpriseIs IT Really the Villain? - Future of Technology in the Enterprise
Is IT Really the Villain? - Future of Technology in the Enterprise
John Mancini9.2K views

Viewers also liked

[Bucharest] #DontTrustTheDarkSide by
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSideOWASP EEE
517 views35 slides
Tactics to beat the google de indexing by
Tactics to beat the google de indexingTactics to beat the google de indexing
Tactics to beat the google de indexingSmart Social Brand
91 views8 slides
[Bucharest] Reversing the Apple Sandbox by
[Bucharest] Reversing the Apple Sandbox[Bucharest] Reversing the Apple Sandbox
[Bucharest] Reversing the Apple SandboxOWASP EEE
338 views35 slides
[Russia] Building better product security by
[Russia] Building better product security[Russia] Building better product security
[Russia] Building better product securityOWASP EEE
382 views19 slides
Publico24 - DIGITAL PUBLISHING REINVENTED by
Publico24 - DIGITAL PUBLISHING REINVENTEDPublico24 - DIGITAL PUBLISHING REINVENTED
Publico24 - DIGITAL PUBLISHING REINVENTEDPublico24
290 views10 slides
[Bucharest] Your intents are dirty, droid! by
[Bucharest] Your intents are dirty, droid![Bucharest] Your intents are dirty, droid!
[Bucharest] Your intents are dirty, droid!OWASP EEE
390 views17 slides

Viewers also liked(12)

[Bucharest] #DontTrustTheDarkSide by OWASP EEE
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide
OWASP EEE517 views
[Bucharest] Reversing the Apple Sandbox by OWASP EEE
[Bucharest] Reversing the Apple Sandbox[Bucharest] Reversing the Apple Sandbox
[Bucharest] Reversing the Apple Sandbox
OWASP EEE338 views
[Russia] Building better product security by OWASP EEE
[Russia] Building better product security[Russia] Building better product security
[Russia] Building better product security
OWASP EEE382 views
Publico24 - DIGITAL PUBLISHING REINVENTED by Publico24
Publico24 - DIGITAL PUBLISHING REINVENTEDPublico24 - DIGITAL PUBLISHING REINVENTED
Publico24 - DIGITAL PUBLISHING REINVENTED
Publico24290 views
[Bucharest] Your intents are dirty, droid! by OWASP EEE
[Bucharest] Your intents are dirty, droid![Bucharest] Your intents are dirty, droid!
[Bucharest] Your intents are dirty, droid!
OWASP EEE390 views
[Lithuania] Cross-site request forgery: ways to exploit, ways to prevent by OWASP EEE
[Lithuania] Cross-site request forgery: ways to exploit, ways to prevent[Lithuania] Cross-site request forgery: ways to exploit, ways to prevent
[Lithuania] Cross-site request forgery: ways to exploit, ways to prevent
OWASP EEE774 views
[Austria] ZigBee exploited by OWASP EEE
[Austria] ZigBee exploited[Austria] ZigBee exploited
[Austria] ZigBee exploited
OWASP EEE747 views
Ulasan Singkat Tentang ISIS by Happy Islam
Ulasan Singkat Tentang ISISUlasan Singkat Tentang ISIS
Ulasan Singkat Tentang ISIS
Happy Islam2.3K views
올핏 사업계획서 by Namjung Kim
올핏 사업계획서올핏 사업계획서
올핏 사업계획서
Namjung Kim1.8K views
Kayıp Kaçak Yönetimi II:Kök Sorunlar ve Çözümler by ABDULLAH SEVİMLİ
 Kayıp Kaçak Yönetimi II:Kök Sorunlar ve Çözümler Kayıp Kaçak Yönetimi II:Kök Sorunlar ve Çözümler
Kayıp Kaçak Yönetimi II:Kök Sorunlar ve Çözümler
ABDULLAH SEVİMLİ1.2K views
[Bucharest] From SCADA to IoT Cyber Security by OWASP EEE
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE1.1K views

Similar to [Cluj] Information Security Through Gamification

Security, Compliance and Cloud - Jelecos by
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosErin_Jelecos
452 views21 slides
11272019 SafeAssign Originality Reporthttpsucumberlan.docx by
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
2 views26 slides
AI in Hacking by
AI in HackingAI in Hacking
AI in Hackingvenkatvajradhar1
30 views5 slides
Cyber security investments 2021 by
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
143 views24 slides
The 5 most trusted cyber security companies to watch. by
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
44 views36 slides
What is a smart factory by
What is a smart factoryWhat is a smart factory
What is a smart factorypaul young cpa, cga
539 views8 slides

Similar to [Cluj] Information Security Through Gamification(20)

Security, Compliance and Cloud - Jelecos by Erin_Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
Erin_Jelecos452 views
11272019 SafeAssign Originality Reporthttpsucumberlan.docx by aulasnilda
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
aulasnilda2 views
The 5 most trusted cyber security companies to watch. by Merry D'souza
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
Merry D'souza44 views
#BARM2022 01. Michele_Maritato_IIBA_Italy_BARM_2022 by IIBA-IT
#BARM2022 01. Michele_Maritato_IIBA_Italy_BARM_2022#BARM2022 01. Michele_Maritato_IIBA_Italy_BARM_2022
#BARM2022 01. Michele_Maritato_IIBA_Italy_BARM_2022
IIBA-IT31 views
SMACIC_Clean by Assad Jees
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
Assad Jees155 views
Key note in nyc the next breach target and how oracle can help - nyoug by Ulf Mattsson
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
Ulf Mattsson675 views
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom by IBM Security
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security2K views
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability by itnewsafrica
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica64 views
Magazine Febuary-2023-Preview.pdf by preetichaubey4
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
preetichaubey417 views
The 10 most recommended bio metric companies to watch in 2019 by Merry D'souza
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019
Merry D'souza65 views
2019 Enterprise IT Predictions by Mike Pastore
2019 Enterprise IT Predictions2019 Enterprise IT Predictions
2019 Enterprise IT Predictions
Mike Pastore22 views
The_BT_CIO_report_2016_the_digital_CIO by Glenn Mommens
The_BT_CIO_report_2016_the_digital_CIOThe_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIO
Glenn Mommens550 views

More from OWASP EEE

[Austria] Security by Design by
[Austria] Security by Design[Austria] Security by Design
[Austria] Security by DesignOWASP EEE
665 views16 slides
[Austria] How we hacked an online mobile banking Trojan by
[Austria] How we hacked an online mobile banking Trojan[Austria] How we hacked an online mobile banking Trojan
[Austria] How we hacked an online mobile banking TrojanOWASP EEE
654 views41 slides
[Poland] It's only about frontend by
[Poland] It's only about frontend[Poland] It's only about frontend
[Poland] It's only about frontendOWASP EEE
521 views56 slides
[Poland] SecOps live cooking with OWASP appsec tools by
[Poland] SecOps live cooking with OWASP appsec tools[Poland] SecOps live cooking with OWASP appsec tools
[Poland] SecOps live cooking with OWASP appsec toolsOWASP EEE
461 views35 slides
[Cluj] Turn SSL ON by
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ONOWASP EEE
406 views16 slides
[Cluj] CSP (Content Security Policy) by
[Cluj] CSP (Content Security Policy)[Cluj] CSP (Content Security Policy)
[Cluj] CSP (Content Security Policy)OWASP EEE
576 views13 slides

More from OWASP EEE(20)

[Austria] Security by Design by OWASP EEE
[Austria] Security by Design[Austria] Security by Design
[Austria] Security by Design
OWASP EEE665 views
[Austria] How we hacked an online mobile banking Trojan by OWASP EEE
[Austria] How we hacked an online mobile banking Trojan[Austria] How we hacked an online mobile banking Trojan
[Austria] How we hacked an online mobile banking Trojan
OWASP EEE654 views
[Poland] It's only about frontend by OWASP EEE
[Poland] It's only about frontend[Poland] It's only about frontend
[Poland] It's only about frontend
OWASP EEE521 views
[Poland] SecOps live cooking with OWASP appsec tools by OWASP EEE
[Poland] SecOps live cooking with OWASP appsec tools[Poland] SecOps live cooking with OWASP appsec tools
[Poland] SecOps live cooking with OWASP appsec tools
OWASP EEE461 views
[Cluj] Turn SSL ON by OWASP EEE
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
OWASP EEE406 views
[Cluj] CSP (Content Security Policy) by OWASP EEE
[Cluj] CSP (Content Security Policy)[Cluj] CSP (Content Security Policy)
[Cluj] CSP (Content Security Policy)
OWASP EEE576 views
[Cluj] A distributed - collaborative client certification system by OWASP EEE
[Cluj] A distributed - collaborative client certification system[Cluj] A distributed - collaborative client certification system
[Cluj] A distributed - collaborative client certification system
OWASP EEE163 views
[Russia] Node.JS - Architecture and Vulnerabilities by OWASP EEE
[Russia] Node.JS - Architecture and Vulnerabilities[Russia] Node.JS - Architecture and Vulnerabilities
[Russia] Node.JS - Architecture and Vulnerabilities
OWASP EEE560 views
[Russia] MySQL OOB injections by OWASP EEE
[Russia] MySQL OOB injections[Russia] MySQL OOB injections
[Russia] MySQL OOB injections
OWASP EEE1.6K views
[Russia] Bugs -> max, time <= T by OWASP EEE
[Russia] Bugs -> max, time <= T[Russia] Bugs -> max, time <= T
[Russia] Bugs -> max, time <= T
OWASP EEE346 views
[Russia] Give me a stable input by OWASP EEE
[Russia] Give me a stable input[Russia] Give me a stable input
[Russia] Give me a stable input
OWASP EEE335 views
[Lithuania] I am the cavalry by OWASP EEE
[Lithuania] I am the cavalry[Lithuania] I am the cavalry
[Lithuania] I am the cavalry
OWASP EEE539 views
[Lithuania] DigiCerts and DigiID to Enterprise apps by OWASP EEE
[Lithuania] DigiCerts and DigiID to Enterprise apps[Lithuania] DigiCerts and DigiID to Enterprise apps
[Lithuania] DigiCerts and DigiID to Enterprise apps
OWASP EEE350 views
[Lithuania] Introduction to threat modeling by OWASP EEE
[Lithuania] Introduction to threat modeling[Lithuania] Introduction to threat modeling
[Lithuania] Introduction to threat modeling
OWASP EEE444 views
[Hungary] I play Jack of Information Disclosure by OWASP EEE
[Hungary] I play Jack of Information Disclosure[Hungary] I play Jack of Information Disclosure
[Hungary] I play Jack of Information Disclosure
OWASP EEE510 views
[Hungary] Survival is not mandatory. The air force one has departured are you... by OWASP EEE
[Hungary] Survival is not mandatory. The air force one has departured are you...[Hungary] Survival is not mandatory. The air force one has departured are you...
[Hungary] Survival is not mandatory. The air force one has departured are you...
OWASP EEE378 views
[Hungary] Secure Software? Start appreciating your developers! by OWASP EEE
[Hungary] Secure Software? Start appreciating your developers![Hungary] Secure Software? Start appreciating your developers!
[Hungary] Secure Software? Start appreciating your developers!
OWASP EEE237 views
[Bucharest] Catching up with today's malicious actors by OWASP EEE
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
OWASP EEE431 views
[Bucharest] XML Based Attacks by OWASP EEE
[Bucharest] XML Based Attacks[Bucharest] XML Based Attacks
[Bucharest] XML Based Attacks
OWASP EEE610 views
[Bucharest] Attack is easy, let's talk defence by OWASP EEE
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE792 views

Recently uploaded

Marketing and Community Building in Web3 by
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
14 views64 slides
How to think like a threat actor for Kubernetes.pptx by
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
5 views33 slides
Affiliate Marketing by
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
17 views30 slides
The Dark Web : Hidden Services by
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
14 views24 slides
ATPMOUSE_융합2조.pptx by
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptxkts120898
35 views70 slides
hamro digital logics.pptx by
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
10 views36 slides

Recently uploaded(6)

Marketing and Community Building in Web3 by Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast14 views
How to think like a threat actor for Kubernetes.pptx by LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 views
The Dark Web : Hidden Services by Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh14 views
ATPMOUSE_융합2조.pptx by kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 views

[Cluj] Information Security Through Gamification