7 Steps for Law Firms to Combat Cyber ThreatsAaron Vick
Malicious actors of all stripes recognize the value in attacking a law firm. Law firm security breaches are on the rise. The good news is that taking steps to defend your firm, and your clients by extension, does not have to be complicated or expensive. You can effectively deal with the vast majority of threats and reduce the risk of data loss by focusing on fundamentals. - https://cicaydasecure.com/
Resist Doxing & Take Back Your Online PrivacyKit O'Connell
Slides for a free class on computer security and online privacy offered in Austin, Texas by the Oh Shit! What Now? collective. We covered protecting yourself from doxing, boosting your privacy online, and using more secure passwords and encryption as well as some protest safety tips.
7 Steps for Law Firms to Combat Cyber ThreatsAaron Vick
Malicious actors of all stripes recognize the value in attacking a law firm. Law firm security breaches are on the rise. The good news is that taking steps to defend your firm, and your clients by extension, does not have to be complicated or expensive. You can effectively deal with the vast majority of threats and reduce the risk of data loss by focusing on fundamentals. - https://cicaydasecure.com/
Resist Doxing & Take Back Your Online PrivacyKit O'Connell
Slides for a free class on computer security and online privacy offered in Austin, Texas by the Oh Shit! What Now? collective. We covered protecting yourself from doxing, boosting your privacy online, and using more secure passwords and encryption as well as some protest safety tips.
Take Back Your Online Privacy: Simple Computer SecurityKit O'Connell
In this free class, we talked about how to select a VPN that meets your needs, and some other simple steps you can take to create a more secure online experience on your computer and phone, including Signal and other basic uses of encryption. We'll also discuss Wikileaks Vault7 release, and what it means for both activists and everyday computer users.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Software projects that involve cameras are hard for a number of reasons. Here are some key things to watch out for in your next CCTV or IP Camera development project.
Take Back Your Online Privacy: Simple Computer SecurityKit O'Connell
In this free class, we talked about how to select a VPN that meets your needs, and some other simple steps you can take to create a more secure online experience on your computer and phone, including Signal and other basic uses of encryption. We'll also discuss Wikileaks Vault7 release, and what it means for both activists and everyday computer users.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Software projects that involve cameras are hard for a number of reasons. Here are some key things to watch out for in your next CCTV or IP Camera development project.
Tips to secure yourself from identity theftsweblinkindia1
Can you count how many times in a day have you accessed your internet for opening the social media account, e-commerce transactions, messaging, e-governance or any other information technology (IT) enabled service?
Visit us at : - WeblinkIndia.net
If you don't already have a security training program, this presentation is a great tool for a new hire orientation or company-wide meeting. It includes all of our top 10 tips, plus examples of relevant news stories to drive home the point. You can customize it to include your own tips or insert individual slides in other presentations.
Download a customizable PPT here: www.sophos.com/staysafe
This wonderful presentation, appropriate for teens and young adults, was created by Symantec's Rayane Hazimeh for the Dubai Techfest, 2013. We thank her for generously sharing her content with the SlideShare community.
Exploring Career Paths in Cybersecurity for Technical CommunicatorsBen Woelk, CISSP, CPTC
Brief overview of career options in cybersecurity for technical communicators. Includes discussion of my career path, certification options, NICE and NIST resources.
NYSERNet TNCON2023 Presentation about instilling a sense of belonging and culture in a hybrid workforce. We discuss the challenges of fitting in when we don't see each other face to face. We also discuss the use of tools such as Slack and Zoom to create spaces for conversation and connections.
Many experts agree that engaged learners have better retention. Security Awareness programs are often seen only in the context of the information we provide to our audiences. Annual compliance training may not lead to changed behavior. What can we do differently? What does gamification mean for security awareness training and communication.
The presenter will discuss opportunities to introduce gamification into security awareness activities. He'll share from specific gamification initiatives undertaken at the Rochester Institute of Technology to increase user awareness. These activities include the development of a Digital Self Defense Dojo, an escape room, and positively-reinforced simulated phishing exercises.
Many introverts struggle to succeed in the workplace when asked to “think on their feet” or to make decisions without an array of facts in hand. Much workspace design is moving to open plans, where anyone, much less introverts, may struggle with distractions and lack of privacy. Some introverts may look for leadership opportunities, but feel stymied when trying to figure out how to move up. What are the best strategies for success in today's workplace?
Over the last year while recording the Hope for the Introvert podcast, I've had the privilege of interviewing introverted leaders in several industries about their strategies for success in the workplace. These honest and open discussions have provided practical solutions to many of the challenges we face. Join the presenter as he share proven strategies for success, leveraging our introvert strengths to excel in the workplace.
NYSERNET Conference presentation on building a cyber security culture in higher education: thinking strategically, building a communications plan, best practices in security awareness.
Western society lauds extroverted leaders and their accomplishments. However, introverts make great contributions and can be effective leaders, too. As technical communicators, many of us are introverts or work with a lot of introverts. As introverts, we may not believe or recognize that we have innate abilities that can provide a foundation for strong leadership skills, and we certainly don’t seem like the extroverted leaders that are the norm in Western society. Introverts possess a quiet confidence that commands respect. When we leverage the innate strengths of introverts; analytical skills, ability to think outside the box, and strong powers of concentration, we gain recognition as a leader and influencer. Attendees will
• Discover general and specific insights gained from personality and temperament typing
• Understand what drives their co-workers
• Identity their strengths and weaknesses
• Learn how to harness their innate skills
• Start their leadership journey
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18Ben Woelk, CISSP, CPTC
Many introverts struggle to succeed in the workplace when asked to “think on their feet” or to make decisions without an array of facts in hand. Much workspace design is moving to open plans, where anyone, much less introverts, may struggle with distractions and lack of privacy. Some introverts may look for leadership opportunities, but feel stymied when trying to figure out how to move up. Although not every introvert is interested in a formal leadership position (nor have the opportunity in their workplace), every introvert has the ability to become an influencer.
Join the presenter as we discuss how to identify our strengths and become influencers when we don’t have positional authority. We’ll discuss strategies that work for us and how to make sure we’re not passed over when leadership opportunities arise. We’ll also create an action plan for becoming that influencer or leader. Attendees will benefit most from the presentation if they know their Myers-Briggs/Keirsey temperament profile in advance or have used other tools such as Enneagram or Strengths Finder.
Follow the yellow brick road: A Leadership Journey to the Emerald CityBen Woelk, CISSP, CPTC
Slides for 20-minute Spotlight Talk at the 2017 Society for Technical Communication International Summit Conference. The talk discussed the main characters in the Wizard of Oz, Dorothy Gale, Scarecrow, Tin Woodman, and Lion as Leadership Types based on Keirsey Temperament Theory.
Collaboration introduces a variety of security challenges. This presentation provides a brief overview with recommendations for non profit organizations who would like to work online collaboratively.
Many of us might agree that Western society lauds extroverted leaders and their accomplishments. However, introverts make great contributions and can be effective leaders, too. Many of us are introverts who may feel unsuited or unequipped for leadership, but are not sure how to take that next step to increase influence and improve visibility. Have you wondered how to empower yourself and leverage your innate skills to become a leader? Join Ben as he shares his personal insights and the path to leadership with you. He will describe his journey from shy team member to recognized leader, and share key steps he took and experiences that have helped him become a successful leader.
Exploration of the Digital Self Defense Security Awareness program at the Rochester Institute of Technology. Delivered at the Rochester Security Summit, October 2015.
Threat landscape, strategies, and resources for cyber safety. Presented at Johanna Perrin Middle School, Fairport, New York as part of the Fairport STAR parents program.
Overview of Digital Self Defense security awareness program at the Rochester Institute of Technology. Presented at Pfizer Global Security AMER SSO/CIO Conference
My tongue-in-cheek Lightning Talk from Summit14. Our lightning talks are 20 slides in five minutes with each slide advanced automatically every 15 seconds.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Hi, I’m Ben Woelk. I’m the Policy and Awareness Analyst in the RIT information Security Office. Part of my role is to build a culture of security awareness. Today we’re going to learn about Shockproofing Your Use of Social Media. In other words, how to stay safe online.
Does anybody see anything wrong with this picture? Here’s the problem, Everyone is a Target. Identity theft is big business. It’s not done by hackers sitting in their basements. Well maybe some of the people committing identity theft are hackers in their basements, but they’re funded by organized crime.
Here’s the big problem: We’re all idiots. We need help. That’s what this presentation is all about—giving you ten tips to stay safe online.
Don’t roll the dice! College students are five times more likely to be a victim of identity theft than the general public. (http://www.ftpress.com/articles/article.aspx?p=2141481)
Tip #1:
Use a Passphrase. We’ve all heard about passwords. I want you to start using passphrases. Passphrases are long, but easier to remember than a password. Length is more important than complexity. Throw in some numbers and capital letters and the phrase on the screen becomes SoI’mf0llowingthe%map7thatleads2you. Easy to remember.
You may want to use a Password Safe or Vault. Two good ones are Password Gorilla and LastPass, a browser plug in. The vault generates long complex passwords and stores them. You protect your password safe or vault with a long passphrase. When you visit a website, LastPass will supply the password you need to log in.
Tip # 2: Stay up to date. Attackers exploit vulnerabilities in software. Software vendors release patches to address these vulnerabilities. We all know that we need to keep our operating systems up to date. You also need to keep your applications up to date. Make sure you’ve turned on auto update.
Tip #3: Use Protection. No, there’s no such thing as an iCondom. However, one of the best ways to protect your computer is to use layers of security. Use anti-virus, a firewall, and anti-spyware. Mac users need antivirus and need to make sure your firewall is enabled. And don’t forget about your mobile devices. They’re starting to become more and more of a target.
Tip #4: Recognize Phishing and scams. Many of you met Phishy at move in. Phishy is here to help raise our awareness about phishing. It’s pretty basic. Never respond to email requests for your password. (Or over the phone)
Tip #5: Use Social Networks Safely. Don’t post information about where you live or where you’re going to be on Facebook or Twitter. Yes, it’s rare, but if you have an open profile on Facebook or you’re tweeting your whereabouts publicly, you’re putting yourself at risk.
Watch out for phishing on social networking sites. How many of you have a friend whose profile has been compromised because their password was hacked? Have you revealed enough information about yourself that someone could steal your identity? Can they figure out your mother’s maiden name?
Tip #6: Remember who else is there. Employers will try to find out as much about you as they can online. They may try to access your social media profiles. There was a court case this month, where the court decided that what you post online is not protected. Think before you post about the image you’re portraying.
Don’t post inappropriate photos. Untag inappropriate photos of you your friends post. Would you hire this guy? People WILL judge you by what you post online. Think before you post! Clean up your profiles now.
Tip #7: Be wary of others. How do you know the person claiming to be 19 years old isn’t a 40 something who’s masquerading as someone else? How do you know he or she isn’t a wolf in sheep’s clothing? Be careful.
Tip #8: Search for your name. Set up a Google Alert in Google Dashboard to let you know every day how your name is appearing online. You can set up a search for anything. So if there’s something you want to track online, set up the alert.
Tip #9: Guard your personal information. Wouldn’t you like to have a guard dog like this protecting your information? Hmm. Maybe not. Protecting your personal information hasn’t been a big deal for you so far. It will be as you develop a credit history.
Tip #10: Don’t assume privacy. In fact, assume that anything you post online is going to stay private. Think before you post about how information can be used. Do you want Facebook or anyone else tracking everything you do?
Remember. You’re the first line of defense. You’re the one that will notice if things aren’t right. Maybe your computer is running slowly. Maybe you’re receiving strange communications from somewhere. Do something about it. Run a scan. Call the Help Desk.
Finally, practice Digital Self Defense. Like us on social media before the end of September and you’ll be entered in a drawing for a $100 Barnes and Noble gift card. Thanks for listening. I’m Ben Woelk and I hope you have a great time at RIT.