SlideShare a Scribd company logo
Submit Search
Upload
Be an Ogre
Report
Lorin Olsen
Chief Technologist at Lobo Strategies
Follow
•
0 likes
•
106 views
1
of
103
Be an Ogre
•
0 likes
•
106 views
Download Now
Download to read offline
Report
Technology
Privacy Presentation to the Fox Valley Computer Professionals Meeting on April 10, 2019
Read more
Lorin Olsen
Chief Technologist at Lobo Strategies
Follow
Recommended
Security In A Connected Society
CentraComm
185 views
•
33 slides
Michael Davis Bio
Michael Davis
230 views
•
1 slide
5 Cybersecurity Threats Your Business Can't Afford to Ignore
WSI WebAnalys
141 views
•
14 slides
500 Demo Day Batch 18: Inzmo
500 Startups
824 views
•
8 slides
Google & microsoft joins apple vs fbi
Ekankita Agrawalla
31 views
•
15 slides
Social Media Security
Del Belcher
638 views
•
18 slides
More Related Content
Similar to Be an Ogre
Hacker Halted 2009 - Owning People through Technology
Mike Murray
420 views
•
51 slides
Harrisburg BSides Presentation - 100219
Evan Francen
129 views
•
46 slides
Cyber Threat Landscape
Ernest (E.J.) Hilbert
498 views
•
16 slides
Building Human Intelligence – Pun Intended
EnergySec
920 views
•
20 slides
Data data every where!! Thomas O'Grady
tomo006
204 views
•
29 slides
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus
129 views
•
39 slides
Similar to Be an Ogre
(20)
Hacker Halted 2009 - Owning People through Technology
Mike Murray
•
420 views
Harrisburg BSides Presentation - 100219
Evan Francen
•
129 views
Cyber Threat Landscape
Ernest (E.J.) Hilbert
•
498 views
Building Human Intelligence – Pun Intended
EnergySec
•
920 views
Data data every where!! Thomas O'Grady
tomo006
•
204 views
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus
•
129 views
WANTED - People Committed to Solving Our Information Security Language Problem
Evan Francen
•
170 views
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
•
229 views
Keynote @ ISC2 Cyber Aware Dallas
Evan Francen
•
313 views
Are you at risk on the World Wide Web?
TechGenie
•
410 views
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Jason Hong
•
379 views
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Jason Hong
•
494 views
Social Penetration - Mike Murray and Mike Bailey
Security B-Sides
•
1.2K views
BLACKOPS_USCS CyberSecurity Literacy
Casey Fleming
•
269 views
Cybersecurity - Webinar Session
Kalilur Rahman
•
6.9K views
Cyber Security Protection
Mark Cook
•
141 views
SECURITY AND SOCIAL ENGINEERING.ppt
CakraWicaksono3
•
9 views
Security On The Internet Essay
Cheap Custom Written Papers Glenville
•
8 views
Cybersecurity for Dummies
Liberteks
•
196 views
Keys to Network Security & Shocking Statistics
Christine Spicuzza
•
2.1K views
More from Lorin Olsen
Fvcp 20210512 - Is It (Finally) Timne For Linux Phones?
Lorin Olsen
94 views
•
38 slides
Fvcp 20210414 - Wireless Infidelity
Lorin Olsen
81 views
•
56 slides
De-Google Your Life
Lorin Olsen
69 views
•
74 slides
Matrix Is A Protocol; Synapse Is The Matrix Server
Lorin Olsen
200 views
•
34 slides
FVCP 20200610
Lorin Olsen
32 views
•
43 slides
Personal Testimony of Lorin Olsen
Lorin Olsen
102 views
•
62 slides
More from Lorin Olsen
(10)
Fvcp 20210512 - Is It (Finally) Timne For Linux Phones?
Lorin Olsen
•
94 views
Fvcp 20210414 - Wireless Infidelity
Lorin Olsen
•
81 views
De-Google Your Life
Lorin Olsen
•
69 views
Matrix Is A Protocol; Synapse Is The Matrix Server
Lorin Olsen
•
200 views
FVCP 20200610
Lorin Olsen
•
32 views
Personal Testimony of Lorin Olsen
Lorin Olsen
•
102 views
FVCP 20191113
Lorin Olsen
•
53 views
Meet George Jetson: The State of Home Automation
Lorin Olsen
•
40 views
P2P: Grid-oriented Distribution Systems
Lorin Olsen
•
371 views
Grid Computing in a Commodity World (KCCMG, 2005)
Lorin Olsen
•
533 views
Recently uploaded
Web Dev - 1 PPT.pdf
gdsczhcet
49 views
•
45 slides
.conf Go 2023 - Data analysis as a routine
Splunk
85 views
•
12 slides
ChatGPT and AI for Web Developers
Maximiliano Firtman
161 views
•
82 slides
"Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad...
Fwdays
38 views
•
30 slides
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi
102 views
•
17 slides
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10
94 views
•
20 slides
Recently uploaded
(20)
Web Dev - 1 PPT.pdf
gdsczhcet
•
49 views
.conf Go 2023 - Data analysis as a routine
Splunk
•
85 views
ChatGPT and AI for Web Developers
Maximiliano Firtman
•
161 views
"Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad...
Fwdays
•
38 views
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi
•
102 views
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10
•
94 views
Liqid: Composable CXL Preview
CXL Forum
•
120 views
Photowave Presentation Slides - 11.8.23.pptx
CXL Forum
•
120 views
MemVerge: Gismo (Global IO-free Shared Memory Objects)
CXL Forum
•
112 views
AI: mind, matter, meaning, metaphors, being, becoming, life values
Twain Liu 刘秋艳
•
32 views
Microchip: CXL Use Cases and Enabling Ecosystem
CXL Forum
•
118 views
Samsung: CMM-H Tiered Memory Solution with Built-in DRAM
CXL Forum
•
101 views
Webinar : Competing for tomorrow’s leaders – How MENA insurers can win the wa...
The Digital Insurer
•
26 views
Five Things You SHOULD Know About Postman
Postman
•
22 views
Java 21 and Beyond- A Roadmap of Innovations .pdf
Ana-Maria Mihalceanu
•
54 views
Green Leaf Consulting: Capabilities Deck
GreenLeafConsulting
•
177 views
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada
•
106 views
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver
•
24 views
Micron CXL product and architecture update
CXL Forum
•
23 views
JCon Live 2023 - Lice coding some integration problems
Bernd Ruecker
•
62 views
Be an Ogre
1.
Be An Ogre! Lorin
B Olsen Chief Technologist Lobostrategies, Inc.
2.
Don't Worry, Be
Happy.
3.
Overview ● Overview ● Security
Challenges ● Privacy Challenges ● Mobile Demonstration
4.
Privacy, Security, Anonymity
5.
Privacy, Security, Anonymity
6.
Security Challenges
7.
US Breaches Are
Increasing
8.
Security Threats Are
Real
9.
Biggest US Data
Breaches
10.
Email Breach: 773M
Accounts + 21M Passwords https://www.techrepublic.com/article/enterprise-iot-adoption-to-hit-critical-mass-by-2019-but- security-remains-a-top-concern/
11.
Institutional Trust Corrosion
12.
Social Media Trust
Is Plummeting
13.
IT Security Spending
14.
National Monetary Cost
15.
Top Concerns
16.
What Should I
Do? Security Breaches
17.
Do Passwords Well
18.
Use Strong Passwords
19.
Don't Re-use Passwords
20.
Change Passwords Frequency
21.
Use A Password
Manager
22.
Usa Multi-Factor Authentication
23.
Privacy Is Paramount
Concern
24.
Privacy Challenges
25.
Risks From The
Government
26.
The Biggest Risk
27.
The Things We
Willingly Share
28.
When “Free” Costs
29.
Risks From Businesses
30.
Data Risk: Identity
31.
Data Risk: Location
32.
Data Risk: Location
33.
Sell Our Birthright
For Beans
34.
Is There Hope?
35.
What Should I
Do? Invasion of Privacy
36.
Strengthen Your Defenses
37.
Network Security
38.
Residential Router
39.
Residential VPN
40.
Network Privacy
41.
Use A Secure
Operating System
42.
'Most Secure' Operating System
43.
Harden Your Operating System
44.
Use A Secure
Web Browser
45.
'Most Secure' Web
Browser
46.
Harden Your Web
Browser
47.
Privacy Add-ons
48.
Privacy Add-ons (cont.)
49.
Mobile Security &
Privacy
50.
Demonstration ● My Mobile
Platform ● My Access Point / Router ● Android Pie
103.
Run, Baby, Run