SlideShare a Scribd company logo
1 of 1
Download to read offline
Certificate
SECURE: throughout the day - Part 2
The Corporate Security Office and
the Chief Information Security Officer attest that
Shailendra Singh
(Z0034KHA)
has successfully completed the web-based Security Training
"SECURE: throughout the day - Part 2".
Training Content
In the web-based training (WBT), the participant accompanies a Siemens employee through his/her day and
through different day-to-day situations. The employee, together with the protagonist of the WBT, actively
participates in solving security challenges and sees how he/she can directly improve the security level at
Siemens and support our business.
The WBT focuses specifically on the following topics:
- Importance of Information and Corporate Security
- Improving the overall awareness for Information and Corporate Security
- Protection classes for documents and information
- Handling requirements related to the protection classes
- Protection of corporate information when dealing with external business partners
Munich, 24.1.2013
Siegfried Russwurm
Member of the Managing Board
Responsible for CIT and CSO
intranet.siemens.com/csts

More Related Content

Similar to Certificate

IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
360 BSI
 
STRENGTHENING WORKPLACE SAFETY: CONDUCTING SAFETY TRAINING AND MAINTAINING RE...
STRENGTHENING WORKPLACE SAFETY: CONDUCTING SAFETY TRAINING AND MAINTAINING RE...STRENGTHENING WORKPLACE SAFETY: CONDUCTING SAFETY TRAINING AND MAINTAINING RE...
STRENGTHENING WORKPLACE SAFETY: CONDUCTING SAFETY TRAINING AND MAINTAINING RE...
Semakula Allan Kinene
 

Similar to Certificate (20)

Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Game based learning for safety and security education
Game based learning for safety and security educationGame based learning for safety and security education
Game based learning for safety and security education
 
Cyber Guru Overview - en v1
Cyber Guru Overview - en v1Cyber Guru Overview - en v1
Cyber Guru Overview - en v1
 
Cyber Guru Overview - en - v1
Cyber Guru Overview - en - v1Cyber Guru Overview - en - v1
Cyber Guru Overview - en - v1
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
STRENGTHENING WORKPLACE SAFETY: CONDUCTING SAFETY TRAINING AND MAINTAINING RE...
STRENGTHENING WORKPLACE SAFETY: CONDUCTING SAFETY TRAINING AND MAINTAINING RE...STRENGTHENING WORKPLACE SAFETY: CONDUCTING SAFETY TRAINING AND MAINTAINING RE...
STRENGTHENING WORKPLACE SAFETY: CONDUCTING SAFETY TRAINING AND MAINTAINING RE...
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
5.6 it stream moderator (mauritius)
5.6 it stream moderator (mauritius)5.6 it stream moderator (mauritius)
5.6 it stream moderator (mauritius)
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
 
IRJET- Factors that Influence Safety Performance & Strategies for Promoti...
IRJET-  	  Factors that Influence Safety Performance & Strategies for Promoti...IRJET-  	  Factors that Influence Safety Performance & Strategies for Promoti...
IRJET- Factors that Influence Safety Performance & Strategies for Promoti...
 
Whitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdfWhitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdf
 
Why Cyber Security Is important?
Why Cyber Security Is important?Why Cyber Security Is important?
Why Cyber Security Is important?
 

Certificate

  • 1. Certificate SECURE: throughout the day - Part 2 The Corporate Security Office and the Chief Information Security Officer attest that Shailendra Singh (Z0034KHA) has successfully completed the web-based Security Training "SECURE: throughout the day - Part 2". Training Content In the web-based training (WBT), the participant accompanies a Siemens employee through his/her day and through different day-to-day situations. The employee, together with the protagonist of the WBT, actively participates in solving security challenges and sees how he/she can directly improve the security level at Siemens and support our business. The WBT focuses specifically on the following topics: - Importance of Information and Corporate Security - Improving the overall awareness for Information and Corporate Security - Protection classes for documents and information - Handling requirements related to the protection classes - Protection of corporate information when dealing with external business partners Munich, 24.1.2013 Siegfried Russwurm Member of the Managing Board Responsible for CIT and CSO intranet.siemens.com/csts