The document discusses Ivan's experience and qualifications in SEO and WordPress, including 18 years of experience, building 50 sites for testing, handling over 400 WordPress projects, and leading various meetup groups. It also provides information on becoming a client for Ivan's consulting and training services. The document serves as an introduction and overview of Ivan's background and available services.
This document discusses various types of AI, including text-to-text, text-to-image, text-to-speech, and text-to-video. It provides biographical information about Ivan So and his experience in SEO, WordPress, and organizing events. The document also lists client services such as consulting and training. It includes sections on what AI is and examples of different AI applications. Generative AI and parameters in AI are explained. Popular AI models like GPT-3 and techniques like GANs are mentioned.
The document discusses Ivan's experience and qualifications in SEO and WordPress, including 18 years of experience, building 50 sites for testing, handling over 400 WordPress projects, and leading various meetup groups. It also provides information on becoming a client for Ivan's consulting and training services. The document serves as an introduction and overview of Ivan's background and available services.
This document discusses various types of AI, including text-to-text, text-to-image, text-to-speech, and text-to-video. It provides biographical information about Ivan So and his experience in SEO, WordPress, and organizing events. The document also lists client services such as consulting and training. It includes sections on what AI is and examples of different AI applications. Generative AI and parameters in AI are explained. Popular AI models like GPT-3 and techniques like GANs are mentioned.
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Ralph Szeto, Chairman, Hong Kong Association of Interactive Marketing
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Saron Leung, Industry Head of Financial Services, Google Hong Kong
Inspire@eLC Chapter 3 - HKTVMall: Leading Technology Evolution for eCommerce Industry by Ms. Jelly Zhou, Executive Director and Chief Executive Officer (Hong Kong) of Hong Kong Technology Venture Company Limited
Digital Oasis is a Hong Kong-based technology company that specializes in innovative electronic products using patented material sound and conduction technologies. They design and manufacture thin, light audio devices that can play sound through materials like metal and can be painted with customizable designs. Their products include smart home speakers and sound wall panels for home theaters that combine audio and decorative art.
This document discusses the interaction between cyber security and school IT policy. It outlines various IT systems, applications, and devices used in schools, such as servers, networks, cloud services, and devices. It stresses the importance of having proper IT policies to govern operation, systems and applications, control, security, and management. The document provides examples of key policies including acceptable use, network, data protection, backup, email, and disaster recovery policies. It also discusses guidelines and rules around issues like passwords, verification, training, manuals, and applications. Finally, it provides tips for effective policy making like understanding needs, problems, requirements, training users, and ongoing evaluation.
This document summarizes the results of a vulnerability assessment performed on the networks of 6 schools by HKT. It found that around 25% of systems had web services, with an average risk score of 54 and scores ranging from 20 to 78. Manual review found that 33% of vulnerabilities were high or critical risks. Common high risk issues included SQL injection, cross-site scripting, and outdated software with known vulnerabilities. The document discusses ongoing challenges in security management like complexity, recruitment, and funding. It proposes a security-centric approach with centralized monitoring, automation, and remote support provided by a managed security service partner.
This document summarizes a presentation about assessing and managing school network security. It discusses the results of vulnerability assessments conducted on 50 school websites, which found over 110 critical vulnerabilities. The top issues were SQL injection, cross-site scripting, and outdated components. Managing security is challenging due to increasing systems, data, and user touchpoints. Trends include taking a security-centric approach across the network and adopting comprehensive managed security services. Key aspects of security management are people, technology, process and having a security operations center for monitoring, alerting and incident response.
This document summarizes cybersecurity trends and tips for 2020. It discusses the top passwords used, guidelines for strong passwords, and major cybersecurity incidents in 2019 such as data breaches affecting over 500 million records. It also provides tips on protecting against phishing attacks, risks of IoT devices, and ransomware. Emerging issues like deepfakes and security risks after technologies reach end of support are mentioned. The key message is that information security requires efforts from all stakeholders.
The document discusses security challenges and prevention measures for schools. It summarizes findings from a UK cyber security audit of 432 schools, which found that 83% experienced cyber incidents. While most schools had antivirus and firewalls, only 45% included IT services in risk assessments. The document also outlines common attacks schools face like phishing, ransomware, and data breaches. It provides prevention tips and emphasizes the importance of a holistic security approach involving people, processes, and technology.
The document summarizes the findings of a penetration test project conducted on the websites and applications of over 30 schools. It identifies over 240 critical vulnerabilities across the schools, including exposed personal data, outdated software with known vulnerabilities, and SQL injection issues. Recommendations include encouraging software vendors to provide ongoing patches, implementing regular vulnerability scanning, and ensuring systems and software are regularly updated to the latest versions. Best practices for schools outlined in the document include implementing firewalls, regular backups, web application firewalls, and security awareness training for practitioners.
As an independent security consultant, the author conducted penetration tests of ten K-12 school websites over 99 hours. They found over 1,700 vulnerabilities total, including 170 critical issues exposing over 20,000 student records. Common vulnerabilities included SQL injection, outdated systems, and unencrypted passwords. The author provided demonstrations of their scanning tools and process and recommendations to schools like regular scanning, patching systems, and relying less on vulnerable third-party vendor solutions.
26. 26
聯絡我們
熱線電話 2827 2827
傳真 2877 7026
網頁 www.pcpd.org.hk
電郵 enquiry@pcpd.org.hk
地址 香港灣仔
皇后大道東248號
陽光中心13樓1303室Copyright
This PowerPoint is licensed under a Creative Commons Attribution 4.0 International (CC BY 4.0) licence. In essence, you are free to share
and adapt this PowerPoint, as long as you attribute the work to the Office of the Privacy Commissioner for Personal Data, Hong Kong.
For details, please visit creativecommons.org/licenses/by/4.0.