SlideShare a Scribd company logo
Submit Search
Upload
Login
Signup
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
Report
Eric Vanderburg
Follow
Cybersecurity Leader | Consultant | Author | Cyber Investigator
Apr. 30, 2014
•
0 likes
•
7,976 views
1
of
11
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
Apr. 30, 2014
•
0 likes
•
7,976 views
Download Now
Download to read offline
Report
Education
Technology
Business
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
Eric Vanderburg
Follow
Cybersecurity Leader | Consultant | Author | Cyber Investigator
Recommended
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Eric Vanderburg
8.4K views
•
12 slides
Untangled Conference - November 8, 2014 - Security Awareness
Eric Vanderburg
12.5K views
•
28 slides
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Eric Vanderburg
12.1K views
•
42 slides
Cyber security and crime
Md. Sarowar Alam Saidi
175 views
•
16 slides
Internet Issues (How to Deal on Internet Security)
Hannah Jane del Castillo
3K views
•
19 slides
Internet Security
Mitesh Gupta
6K views
•
24 slides
More Related Content
What's hot
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
1K views
•
47 slides
Ethical hacking and cyber security intro
Abhilash Ak
1.1K views
•
28 slides
Cyber Security Awareness (Reduce Personal & Business Risk)
Gian Gentile
1.2K views
•
16 slides
Cyber security awareness
Jason Murray
6.5K views
•
32 slides
Cyber security awareness for students
Akhil Nadh PC
2.3K views
•
26 slides
Cyber Security and Cyber Awareness
Jay Nagar
823 views
•
44 slides
What's hot
(20)
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
•
1K views
Ethical hacking and cyber security intro
Abhilash Ak
•
1.1K views
Cyber Security Awareness (Reduce Personal & Business Risk)
Gian Gentile
•
1.2K views
Cyber security awareness
Jason Murray
•
6.5K views
Cyber security awareness for students
Akhil Nadh PC
•
2.3K views
Cyber Security and Cyber Awareness
Jay Nagar
•
823 views
Computer & internet Security
Gerard Lamusse
•
1.3K views
Network Security
Manoj Singh
•
11K views
Internet security powerpoint
Arifa Ali
•
41.8K views
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White
•
2.1K views
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
EMBplc.com
•
336 views
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
•
1.8K views
My presentation
sa12chindra
•
40 views
Internet Security
mjelson
•
9K views
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
•
536 views
Seminar (network security)
Gaurav Dalvi
•
8K views
Ppt on cyber security
Avani Patel
•
41.9K views
Cyber Security Awareness
Innocent Korie
•
1.9K views
Internet Security
Peter R. Egli
•
10.8K views
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
•
237 views
Similar to St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Eric Vanderburg
760 views
•
33 slides
Countering malware threats - Eric Vanderburg
Eric Vanderburg
501 views
•
17 slides
Cyber Crime.pptx
Syed Rizwan Ali
18 views
•
8 slides
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Imperva
1.8K views
•
39 slides
Data Breach Lessons from 2013 - Eric Vanderburg - CodeMash 2014
Eric Vanderburg
1.5K views
•
11 slides
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Eric Vanderburg
991 views
•
18 slides
Similar to St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
(20)
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Eric Vanderburg
•
760 views
Countering malware threats - Eric Vanderburg
Eric Vanderburg
•
501 views
Cyber Crime.pptx
Syed Rizwan Ali
•
18 views
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Imperva
•
1.8K views
Data Breach Lessons from 2013 - Eric Vanderburg - CodeMash 2014
Eric Vanderburg
•
1.5K views
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Eric Vanderburg
•
991 views
Digital citizenship.pptx
KnepperE
•
24 views
Cyber Security Tips for students_Deepak
Deepak Khari
•
1.2K views
Serianu - Data security
Myles Freedman
•
161 views
Renfrow Internet Safety
mrenfrow
•
154 views
2014 IAVM Technology Insights
Loretta Hudelot
•
435 views
Digi securitypres
FairSay
•
270 views
Anatomy of the Compromised Insider
Imperva
•
1.6K views
Cybersecurity awareness session.pptx
UmaraZahidLecturer
•
27 views
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Lancope, Inc.
•
910 views
Cybersecurity: A game of innovation
W2O Group
•
1.7K views
Prosequr-Professional Network Video Surveillance
Prosequr
•
347 views
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
Jimmy Shah
•
402 views
Security Awareness Training.pptx
MohammedYaseen638128
•
49 views
Smartphone_Security.pptx
Harish443270
•
2 views
More from Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
833 views
•
45 slides
Modern Security the way Equifax Should Have
Eric Vanderburg
238 views
•
11 slides
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
508 views
•
28 slides
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
10.4K views
•
45 slides
Mobile Forensics and Cybersecurity
Eric Vanderburg
7.9K views
•
26 slides
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
10.8K views
•
50 slides
More from Eric Vanderburg
(20)
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
•
833 views
Modern Security the way Equifax Should Have
Eric Vanderburg
•
238 views
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
•
508 views
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
•
10.4K views
Mobile Forensics and Cybersecurity
Eric Vanderburg
•
7.9K views
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
•
10.8K views
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
•
316 views
Emerging Technologies: Japan’s Position
Eric Vanderburg
•
78 views
Principles of technology management
Eric Vanderburg
•
262 views
Japanese railway technology
Eric Vanderburg
•
339 views
Evaluating japanese technological competitiveness
Eric Vanderburg
•
51 views
Japanese current and future technology management challenges
Eric Vanderburg
•
35 views
Technology management in Japan: Robotics
Eric Vanderburg
•
234 views
Incident response table top exercises
Eric Vanderburg
•
108 views
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
•
542 views
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
•
439 views
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
•
1.9K views
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
•
752 views
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
•
492 views
Physical security primer - JURINNOV - Eric Vanderburg
Eric Vanderburg
•
863 views
Recently uploaded
Expectation from Being a Postgraduate Student and Life Strategy as A Research...
BC Chew
1.1K views
•
26 slides
Types and Sources of impurities.pptx Pharmaceutical Inorganic chemistry UNIT-...
Ms. Pooja Bhandare
86 views
•
31 slides
Personal Brand Exploration - Michael Q Trucks
Michael Trucks
183 views
•
15 slides
Year 12 Information Evening 2023
WestHatch
66 views
•
46 slides
Nonprofit Law 101 for Black-led NPOs.pptx.pdf
TechSoup
65 views
•
18 slides
Vani-Oct 2023 issue.pdf
Savipriya Raghavendra
195 views
•
12 slides
Recently uploaded
(20)
Expectation from Being a Postgraduate Student and Life Strategy as A Research...
BC Chew
•
1.1K views
Types and Sources of impurities.pptx Pharmaceutical Inorganic chemistry UNIT-...
Ms. Pooja Bhandare
•
86 views
Personal Brand Exploration - Michael Q Trucks
Michael Trucks
•
183 views
Year 12 Information Evening 2023
WestHatch
•
66 views
Nonprofit Law 101 for Black-led NPOs.pptx.pdf
TechSoup
•
65 views
Vani-Oct 2023 issue.pdf
Savipriya Raghavendra
•
195 views
Acting Guidelines.pptx
Angelica Guevara
•
278 views
Mass spectrometry- full lecture
DRZIAMUHAMMAD2
•
97 views
Accessibility Overlays - the policy perspective
Roberto Scano
•
141 views
GenAI Cloud Jam.pdf
JAISHANABINDHUPRIYAJ
•
51 views
Advertising Strategy Lecture 1 2023.pptx
Neil Kelley
•
73 views
Project Management Starters.pptx
AnkitaNayak83
•
49 views
Food Hygiene 1 - Intro to food hygiene.pptx
CJMcErlean
•
101 views
ADC UNIT I PPT
LALITHAS47
•
53 views
SHEYA DEY - 23COMD18 & 33 & 57 ACCOUNTING WITH DRONES.pptx
Kumarasamy Dr.PK
•
80 views
Dale Mabry Library Slideshow Tour for SLS 1106 classes
DaleMabryLibrary
•
129 views
Cloud Study Jams 23-24 - DMCE
SARTHAK170317
•
101 views
Chemical Thermodynamics II
Royal College of Arts, Science and Commerce, Mira Road
•
145 views
Veer Gatha - Multimedia presentation (1).pptx
Michael Wilson
•
91 views
Evropski dan jezika
Ugostiteljskoturisti
•
135 views
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
1.
© 2014 JurInnov,
Ltd. All Rights Reserved April 14, 2014 Cyber Safety St. Mark Lutheran Dr. Eric Vanderburg Director, Cybersecurity and Information Systems eav@jurinnov.com @evanderburg 216-664-1100
2.
© 2014 JurInnov,
Ltd. All Rights Reserved 1 JurInnov: We know data. We… Protect it from harm Document it for evidence Obtain for discovery Organize it for litigation Forensics eDiscovery Lit Support Cyber Security
3.
© 2014 JurInnov,
Ltd. All Rights Reserved 2 Computer Use • Secure browsing • Popups and warnings • Certificate errors • Suspicious links
4.
© 2014 JurInnov,
Ltd. All Rights Reserved 3 Malware • Viruses – Detection – Defense
5.
© 2014 JurInnov,
Ltd. All Rights Reserved 4 Passwords • Passwords are like underwear – Change them often – Showing them to others can get you in trouble – Don’t leave them lying around • Use different passwords for different purposes • Complexity • Passphrase • http://www.passwordmeter.com/
6.
© 2014 JurInnov,
Ltd. All Rights Reserved 5 Things your mother probably told you • Don’t accept candy from strangers – Infected devices • It’s ok to ask questions – Challenge • Don’t leave your things lying around – Clean desk and locked screen • Be careful who your friends are – Social networking
7.
© 2014 JurInnov,
Ltd. All Rights Reserved 6 Social media • Privacy settings – Default – Per-post • Who should be your friend? • Geolocation • Watch out for social scams – Mugged on vacation – Free stuff – Spammed content and links
8.
© 2014 JurInnov,
Ltd. All Rights Reserved 7 Phishing • Email • Text • Chat • Craigslist • Games
9.
© 2014 JurInnov,
Ltd. All Rights Reserved 8 Social engineering • Social engineering preys on qualities of human nature: the desire to be helpful the tendency to trust people the fear of getting into trouble
10.
© 2014 JurInnov,
Ltd. All Rights Reserved 9 Virus Hoax
11.
© 2014 JurInnov,
Ltd. All Rights Reserved 10 Q&A Don’t be shy…