SlideShare a Scribd company logo
4 ways to keep the cybersecurity conversation going after the crisis has passed

More Related Content

More from Cisco Abaram

Cybersecurity Threats: The Dauting Challenge Of Securing The Internet Of Things
Cybersecurity Threats: The Dauting Challenge Of Securing The Internet Of ThingsCybersecurity Threats: The Dauting Challenge Of Securing The Internet Of Things
Cybersecurity Threats: The Dauting Challenge Of Securing The Internet Of Things
Cisco Abaram
 
Cybersecurity tips for university students
Cybersecurity tips for university studentsCybersecurity tips for university students
Cybersecurity tips for university students
Cisco Abaram
 
Tips for Preventing ransomware during remote learning
Tips for Preventing ransomware during remote learningTips for Preventing ransomware during remote learning
Tips for Preventing ransomware during remote learning
Cisco Abaram
 
How Cybersecurity Newbs Can Start Out on the Right Foot
How Cybersecurity Newbs Can Start Out on the Right FootHow Cybersecurity Newbs Can Start Out on the Right Foot
How Cybersecurity Newbs Can Start Out on the Right Foot
Cisco Abaram
 
Standardize cybersecurity terms to get everyone correct service
Standardize cybersecurity terms to get everyone correct serviceStandardize cybersecurity terms to get everyone correct service
Standardize cybersecurity terms to get everyone correct service
Cisco Abaram
 
50 Technology Driving the Cybersecurity Evolution
50 Technology Driving the Cybersecurity Evolution50 Technology Driving the Cybersecurity Evolution
50 Technology Driving the Cybersecurity Evolution
Cisco Abaram
 
The importance of time anf speed in cybersecurity
The importance of time anf speed in cybersecurityThe importance of time anf speed in cybersecurity
The importance of time anf speed in cybersecurity
Cisco Abaram
 
2021 Cybersecurity Trends: Bigger Budget, Endpoint Emphasis and Cloud
2021 Cybersecurity Trends: Bigger Budget, Endpoint Emphasis and Cloud2021 Cybersecurity Trends: Bigger Budget, Endpoint Emphasis and Cloud
2021 Cybersecurity Trends: Bigger Budget, Endpoint Emphasis and Cloud
Cisco Abaram
 
Five tips to avoid cybersecurity burnout
Five tips to avoid cybersecurity burnoutFive tips to avoid cybersecurity burnout
Five tips to avoid cybersecurity burnout
Cisco Abaram
 
3 Cybersecurity Measures to Ensure Safety in 2021
3 Cybersecurity Measures to Ensure Safety in 20213 Cybersecurity Measures to Ensure Safety in 2021
3 Cybersecurity Measures to Ensure Safety in 2021
Cisco Abaram
 
Cybercrime Expected to Rise At an Unprecedented Rate in 2021
Cybercrime Expected to Rise At an Unprecedented Rate in 2021Cybercrime Expected to Rise At an Unprecedented Rate in 2021
Cybercrime Expected to Rise At an Unprecedented Rate in 2021
Cisco Abaram
 
Cybersecurity attack: 5 things you can do right now to protect yourself
Cybersecurity attack: 5 things you can do right now to protect yourselfCybersecurity attack: 5 things you can do right now to protect yourself
Cybersecurity attack: 5 things you can do right now to protect yourself
Cisco Abaram
 
Top 10 Cybersecurity tips for small busniess
Top 10 Cybersecurity tips for small busniessTop 10 Cybersecurity tips for small busniess
Top 10 Cybersecurity tips for small busniess
Cisco Abaram
 
Cybersecurity in the new normal: Good enough is no longer enough
Cybersecurity in the new normal: Good enough is no longer enoughCybersecurity in the new normal: Good enough is no longer enough
Cybersecurity in the new normal: Good enough is no longer enough
Cisco Abaram
 
Useful tips for better network security: 3 Massive Breach Cases
Useful tips for better network security: 3 Massive Breach CasesUseful tips for better network security: 3 Massive Breach Cases
Useful tips for better network security: 3 Massive Breach Cases
Cisco Abaram
 
Why Cybersecurity for Small Business is more Necessary now than ever before
Why Cybersecurity for Small Business is more Necessary now than ever beforeWhy Cybersecurity for Small Business is more Necessary now than ever before
Why Cybersecurity for Small Business is more Necessary now than ever before
Cisco Abaram
 
12 Steps to improve your web browsing and cybersecurity
12 Steps to improve your web browsing and cybersecurity12 Steps to improve your web browsing and cybersecurity
12 Steps to improve your web browsing and cybersecurity
Cisco Abaram
 
Covid-19: Cyber Safety Tips for Working from Home
Covid-19: Cyber Safety Tips for Working from HomeCovid-19: Cyber Safety Tips for Working from Home
Covid-19: Cyber Safety Tips for Working from Home
Cisco Abaram
 
5 Ways to be cbr secure at work-Cybersecurity awareness month
5 Ways to be cbr secure at work-Cybersecurity awareness month5 Ways to be cbr secure at work-Cybersecurity awareness month
5 Ways to be cbr secure at work-Cybersecurity awareness month
Cisco Abaram
 
Don't let these scary cyber safety risks creep up on you
Don't let these scary cyber safety risks creep up on youDon't let these scary cyber safety risks creep up on you
Don't let these scary cyber safety risks creep up on you
Cisco Abaram
 

More from Cisco Abaram (20)

Cybersecurity Threats: The Dauting Challenge Of Securing The Internet Of Things
Cybersecurity Threats: The Dauting Challenge Of Securing The Internet Of ThingsCybersecurity Threats: The Dauting Challenge Of Securing The Internet Of Things
Cybersecurity Threats: The Dauting Challenge Of Securing The Internet Of Things
 
Cybersecurity tips for university students
Cybersecurity tips for university studentsCybersecurity tips for university students
Cybersecurity tips for university students
 
Tips for Preventing ransomware during remote learning
Tips for Preventing ransomware during remote learningTips for Preventing ransomware during remote learning
Tips for Preventing ransomware during remote learning
 
How Cybersecurity Newbs Can Start Out on the Right Foot
How Cybersecurity Newbs Can Start Out on the Right FootHow Cybersecurity Newbs Can Start Out on the Right Foot
How Cybersecurity Newbs Can Start Out on the Right Foot
 
Standardize cybersecurity terms to get everyone correct service
Standardize cybersecurity terms to get everyone correct serviceStandardize cybersecurity terms to get everyone correct service
Standardize cybersecurity terms to get everyone correct service
 
50 Technology Driving the Cybersecurity Evolution
50 Technology Driving the Cybersecurity Evolution50 Technology Driving the Cybersecurity Evolution
50 Technology Driving the Cybersecurity Evolution
 
The importance of time anf speed in cybersecurity
The importance of time anf speed in cybersecurityThe importance of time anf speed in cybersecurity
The importance of time anf speed in cybersecurity
 
2021 Cybersecurity Trends: Bigger Budget, Endpoint Emphasis and Cloud
2021 Cybersecurity Trends: Bigger Budget, Endpoint Emphasis and Cloud2021 Cybersecurity Trends: Bigger Budget, Endpoint Emphasis and Cloud
2021 Cybersecurity Trends: Bigger Budget, Endpoint Emphasis and Cloud
 
Five tips to avoid cybersecurity burnout
Five tips to avoid cybersecurity burnoutFive tips to avoid cybersecurity burnout
Five tips to avoid cybersecurity burnout
 
3 Cybersecurity Measures to Ensure Safety in 2021
3 Cybersecurity Measures to Ensure Safety in 20213 Cybersecurity Measures to Ensure Safety in 2021
3 Cybersecurity Measures to Ensure Safety in 2021
 
Cybercrime Expected to Rise At an Unprecedented Rate in 2021
Cybercrime Expected to Rise At an Unprecedented Rate in 2021Cybercrime Expected to Rise At an Unprecedented Rate in 2021
Cybercrime Expected to Rise At an Unprecedented Rate in 2021
 
Cybersecurity attack: 5 things you can do right now to protect yourself
Cybersecurity attack: 5 things you can do right now to protect yourselfCybersecurity attack: 5 things you can do right now to protect yourself
Cybersecurity attack: 5 things you can do right now to protect yourself
 
Top 10 Cybersecurity tips for small busniess
Top 10 Cybersecurity tips for small busniessTop 10 Cybersecurity tips for small busniess
Top 10 Cybersecurity tips for small busniess
 
Cybersecurity in the new normal: Good enough is no longer enough
Cybersecurity in the new normal: Good enough is no longer enoughCybersecurity in the new normal: Good enough is no longer enough
Cybersecurity in the new normal: Good enough is no longer enough
 
Useful tips for better network security: 3 Massive Breach Cases
Useful tips for better network security: 3 Massive Breach CasesUseful tips for better network security: 3 Massive Breach Cases
Useful tips for better network security: 3 Massive Breach Cases
 
Why Cybersecurity for Small Business is more Necessary now than ever before
Why Cybersecurity for Small Business is more Necessary now than ever beforeWhy Cybersecurity for Small Business is more Necessary now than ever before
Why Cybersecurity for Small Business is more Necessary now than ever before
 
12 Steps to improve your web browsing and cybersecurity
12 Steps to improve your web browsing and cybersecurity12 Steps to improve your web browsing and cybersecurity
12 Steps to improve your web browsing and cybersecurity
 
Covid-19: Cyber Safety Tips for Working from Home
Covid-19: Cyber Safety Tips for Working from HomeCovid-19: Cyber Safety Tips for Working from Home
Covid-19: Cyber Safety Tips for Working from Home
 
5 Ways to be cbr secure at work-Cybersecurity awareness month
5 Ways to be cbr secure at work-Cybersecurity awareness month5 Ways to be cbr secure at work-Cybersecurity awareness month
5 Ways to be cbr secure at work-Cybersecurity awareness month
 
Don't let these scary cyber safety risks creep up on you
Don't let these scary cyber safety risks creep up on youDon't let these scary cyber safety risks creep up on you
Don't let these scary cyber safety risks creep up on you
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...