SlideShare a Scribd company logo
Social Media
&
Security @brianhonan
Who Am I?
@brianhonan
What
is
Social Media?
Websites and applications that
enable users to create and share
content or to participate in social
networking.
- Oxford English Dictionary
Forms of electronic communication
(as Web sites for social networking
and microblogging) through which
users create online communities to
share information, ideas, personal
messages, and other content (as
videos) .
- Mirriam-Webster Dictionary
“A group of Internet-based
applications that build on the
ideological and technological
foundations of Web 2.0, and that
allow the creation and exchange of
user-generated content."
- Wikipedia
Courtesy of Instantcheckmate.com
Government Official Sacked
Forgot Boss was Facebook Friend
Posting They Are Not at Home
Yes, 53%
No, 47%
Courtesy of Legal & General Group PLC
Yes, 60%
No, 40%
Post About Nights Out
Courtesy of Legal & General Group PLC
Shared Images of Expensive Items
Yes, 24%
No, 76%
Courtesy of Legal & General Group PLC
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Social Media Scams
Competition Winners ??
Click on This Link …
Twitter Threats
Koobface
Courtesy TrendMicro
Zeus?
Do You Trust That App?
CourtesyofBitrebels.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Anthony Stancl
Secure Passwords?
Common Passwords
Password Reset
My Name is Marie
How Did I Steal Her ID?
Corporate Issues
Password Reuse
81%
61%
19%
39%
0% 20% 40% 60% 80% 100%
IT Pros
General
Courtesy Darkreading.com & welivesecurity.com
Social Media Treasure Trove
The Gift That Keeps on Giving
Social Engineering
Emily Williams & Robin Page
http://www.thesecurityblogger.com/?p=1903
Misinformation
Manipulation?
How To Defend
Establish Policies
Awareness
Be Careful
What You
Share
Update Privacy Settings
Twitterfall
Handling Security Breaches
Bad News
 Use All Channels.
 Use Social Media to Direct
People to More Information
 Update Regularly (Timezones,
etc.)
 Keep Webpage Updated
 Have Staff Trained
 Trust Employees
 Get Senior Representative to
Talk Early and Often
 Engage With Others
Use Social Media in IR
Monitor & Respond
Brian.honan@bhconsulting.ie
@brianhonan

More Related Content

What's hot

KCB207 ASSIGNMENT 2 n7556608
KCB207 ASSIGNMENT 2 n7556608KCB207 ASSIGNMENT 2 n7556608
KCB207 ASSIGNMENT 2 n7556608ckeating_0110
 
effect of internet on today's generation
effect of internet on today's generationeffect of internet on today's generation
effect of internet on today's generation
Nupendra Verma
 
Internet Sehat dan Literasi Digital
Internet Sehat dan Literasi DigitalInternet Sehat dan Literasi Digital
Internet Sehat dan Literasi Digital
ICT Watch
 
Effects of social media on youth.
Effects of social media on youth.Effects of social media on youth.
Effects of social media on youth.
ALI IRFAN ASHRAF
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.Jagdeep Gill
 
What The Hell
What The HellWhat The Hell
What The Hellnick tadd
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
Sukriti Singh
 
The power of social media
The power of social mediaThe power of social media
The power of social media
Chamara Nanayakkara
 
The effects of Social Networking upon society
The effects of Social Networking upon societyThe effects of Social Networking upon society
The effects of Social Networking upon society
Bishrul Haq
 
Introduction to Social Media for Journalists
Introduction to Social Media for JournalistsIntroduction to Social Media for Journalists
Introduction to Social Media for Journalists
Rabab Khan
 
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USAJohn Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
John Blue
 
Social Media for Law Enforcement Agencies
Social Media for Law Enforcement AgenciesSocial Media for Law Enforcement Agencies
Social Media for Law Enforcement Agencies
Small World Social
 
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USAJohn Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
John Blue
 
English presentation 1 (social media)
English presentation 1 (social media)English presentation 1 (social media)
English presentation 1 (social media)
Usama Khan
 
The social dilemma
The social dilemmaThe social dilemma
The social dilemma
HimanshuPachpute
 
Data Science for Teens
Data Science for TeensData Science for Teens
Data Science for Teens
Ismail Fahmi
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
sanju prasad
 
76 s201907
76 s20190776 s201907
76 s201907
IJRAT
 
The effect-of-social-networking-sites
The effect-of-social-networking-sitesThe effect-of-social-networking-sites
The effect-of-social-networking-sitesRam Patil
 
Social media and impact on economy and society
Social media and impact on economy and societySocial media and impact on economy and society
Social media and impact on economy and society
Bhaswati Guha Majumder
 

What's hot (20)

KCB207 ASSIGNMENT 2 n7556608
KCB207 ASSIGNMENT 2 n7556608KCB207 ASSIGNMENT 2 n7556608
KCB207 ASSIGNMENT 2 n7556608
 
effect of internet on today's generation
effect of internet on today's generationeffect of internet on today's generation
effect of internet on today's generation
 
Internet Sehat dan Literasi Digital
Internet Sehat dan Literasi DigitalInternet Sehat dan Literasi Digital
Internet Sehat dan Literasi Digital
 
Effects of social media on youth.
Effects of social media on youth.Effects of social media on youth.
Effects of social media on youth.
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.
 
What The Hell
What The HellWhat The Hell
What The Hell
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
 
The power of social media
The power of social mediaThe power of social media
The power of social media
 
The effects of Social Networking upon society
The effects of Social Networking upon societyThe effects of Social Networking upon society
The effects of Social Networking upon society
 
Introduction to Social Media for Journalists
Introduction to Social Media for JournalistsIntroduction to Social Media for Journalists
Introduction to Social Media for Journalists
 
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USAJohn Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
 
Social Media for Law Enforcement Agencies
Social Media for Law Enforcement AgenciesSocial Media for Law Enforcement Agencies
Social Media for Law Enforcement Agencies
 
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USAJohn Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
 
English presentation 1 (social media)
English presentation 1 (social media)English presentation 1 (social media)
English presentation 1 (social media)
 
The social dilemma
The social dilemmaThe social dilemma
The social dilemma
 
Data Science for Teens
Data Science for TeensData Science for Teens
Data Science for Teens
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
 
76 s201907
76 s20190776 s201907
76 s201907
 
The effect-of-social-networking-sites
The effect-of-social-networking-sitesThe effect-of-social-networking-sites
The effect-of-social-networking-sites
 
Social media and impact on economy and society
Social media and impact on economy and societySocial media and impact on economy and society
Social media and impact on economy and society
 

Viewers also liked

Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
Source Conference
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
Source Conference
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
Source Conference
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
Source Conference
 
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI MeasuresWhite Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
Nisum
 

Viewers also liked (6)

Ken Smith - Tokenization
Ken Smith - TokenizationKen Smith - Tokenization
Ken Smith - Tokenization
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI MeasuresWhite Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
 

Similar to How to Like Social Media Network Security

Nonprofit Congress: Innovation
Nonprofit Congress:  InnovationNonprofit Congress:  Innovation
Nonprofit Congress: Innovation
BarbaraKelly
 
Working with New Media
Working with New MediaWorking with New Media
Social media in hospitality
Social media in hospitalitySocial media in hospitality
Social media in hospitalityAnil Bilgihan
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
Andrew Krzmarzick
 
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 PrimerAYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
Grace Rodriguez
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
Steve Rath
 
CNCS Web 2.0
CNCS Web 2.0CNCS Web 2.0
CNCS Web 2.0
jmproulx
 
Social Media For Social Change
Social Media For Social ChangeSocial Media For Social Change
Social Media For Social Change
Jason Scott
 
social media for social change
social media for social changesocial media for social change
social media for social change
Joely Ross
 
Social Media & Civic Engagement
Social Media & Civic EngagementSocial Media & Civic Engagement
Social Media & Civic Engagement
MA Campus Compact
 
Social media colleges- t seymour
Social media   colleges- t seymourSocial media   colleges- t seymour
Social media colleges- t seymour
Tom Seymour, PhD
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAyelet Baron
 
Ppt2
Ppt2Ppt2
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
Case IQ
 
Merged may 19 webinar
Merged may 19 webinarMerged may 19 webinar
Merged may 19 webinarsslesperance
 
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing ForumOnline Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
Lode Broekman
 
Social Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian UsageSocial Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian Usage
Moksh Juneja
 
Social Media Marketing - Introduction
Social Media Marketing - IntroductionSocial Media Marketing - Introduction
Social Media Marketing - Introduction
Moksh Juneja
 

Similar to How to Like Social Media Network Security (20)

Nonprofit Congress: Innovation
Nonprofit Congress:  InnovationNonprofit Congress:  Innovation
Nonprofit Congress: Innovation
 
Working with New Media
Working with New MediaWorking with New Media
Working with New Media
 
Social media in hospitality
Social media in hospitalitySocial media in hospitality
Social media in hospitality
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 PrimerAYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
Social Media101
Social Media101Social Media101
Social Media101
 
CNCS Web 2.0
CNCS Web 2.0CNCS Web 2.0
CNCS Web 2.0
 
Social Media For Social Change
Social Media For Social ChangeSocial Media For Social Change
Social Media For Social Change
 
social media for social change
social media for social changesocial media for social change
social media for social change
 
Social Media & Civic Engagement
Social Media & Civic EngagementSocial Media & Civic Engagement
Social Media & Civic Engagement
 
Social media colleges- t seymour
Social media   colleges- t seymourSocial media   colleges- t seymour
Social media colleges- t seymour
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
 
Ppt2
Ppt2Ppt2
Ppt2
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Abjs 2008 Veillette Web 20
Abjs 2008 Veillette Web 20Abjs 2008 Veillette Web 20
Abjs 2008 Veillette Web 20
 
Merged may 19 webinar
Merged may 19 webinarMerged may 19 webinar
Merged may 19 webinar
 
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing ForumOnline Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
 
Social Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian UsageSocial Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian Usage
 
Social Media Marketing - Introduction
Social Media Marketing - IntroductionSocial Media Marketing - Introduction
Social Media Marketing - Introduction
 

More from Source Conference

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
Source Conference
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
Source Conference
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
Source Conference
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
Source Conference
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
Source Conference
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
Source Conference
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
Source Conference
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
Source Conference
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
Source Conference
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
Source Conference
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Source Conference
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
Source Conference
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
Source Conference
 
JSF Security
JSF SecurityJSF Security
JSF Security
Source Conference
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
Source Conference
 
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationEverything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
Source Conference
 
Keynote
KeynoteKeynote
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet BlacklistsReputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
Source Conference
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best Practices
Source Conference
 
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual MachineForensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Source Conference
 

More from Source Conference (20)

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationEverything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
 
Keynote
KeynoteKeynote
Keynote
 
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet BlacklistsReputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best Practices
 
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual MachineForensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual Machine
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

How to Like Social Media Network Security