SlideShare a Scribd company logo
Cyber Security Primer - Awareness - Using Marketing Techniques for Security Awareness

More Related Content

More from Mark Stafford

Cyber Security Primer - Awareness - The Social Engineering of Phishing
Cyber Security Primer - Awareness - The Social Engineering of PhishingCyber Security Primer - Awareness - The Social Engineering of Phishing
Cyber Security Primer - Awareness - The Social Engineering of Phishing
Mark Stafford
 
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
Mark Stafford
 
Cyber Security Primer - Assets - Control Number One
Cyber Security Primer - Assets - Control Number OneCyber Security Primer - Assets - Control Number One
Cyber Security Primer - Assets - Control Number One
Mark Stafford
 
Cyber Security Primer - Operations - Transforming Security Operations with Cl...
Cyber Security Primer - Operations - Transforming Security Operations with Cl...Cyber Security Primer - Operations - Transforming Security Operations with Cl...
Cyber Security Primer - Operations - Transforming Security Operations with Cl...
Mark Stafford
 
Cyber Security Primer - Data Analytics - Having Clear Goals
Cyber Security Primer - Data Analytics - Having Clear GoalsCyber Security Primer - Data Analytics - Having Clear Goals
Cyber Security Primer - Data Analytics - Having Clear Goals
Mark Stafford
 
Cyber Security Primer - Data Analytics - Avoiding False Positives
Cyber Security Primer - Data Analytics - Avoiding False PositivesCyber Security Primer - Data Analytics - Avoiding False Positives
Cyber Security Primer - Data Analytics - Avoiding False Positives
Mark Stafford
 
Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk an...
Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk an...Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk an...
Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk an...
Mark Stafford
 
NIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram PosterNIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram Poster
Mark Stafford
 
Handy Infogram for the NIST Cyber Security Framework
Handy Infogram for the NIST Cyber Security FrameworkHandy Infogram for the NIST Cyber Security Framework
Handy Infogram for the NIST Cyber Security Framework
Mark Stafford
 
Cyber Security Primers - Business Change - Supply Chain
Cyber Security Primers - Business Change - Supply ChainCyber Security Primers - Business Change - Supply Chain
Cyber Security Primers - Business Change - Supply Chain
Mark Stafford
 
Cyber Security Primer - Business Change - Moving to the cloud
Cyber Security Primer - Business Change - Moving to the cloud Cyber Security Primer - Business Change - Moving to the cloud
Cyber Security Primer - Business Change - Moving to the cloud
Mark Stafford
 
Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
Cyber Security Primers - Actors - Political Pressure Group and (H)activists. Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
Mark Stafford
 
Cyber Security Primer - Business Change - Divestment
Cyber Security Primer - Business Change - DivestmentCyber Security Primer - Business Change - Divestment
Cyber Security Primer - Business Change - Divestment
Mark Stafford
 
Cyber Security Primer - Actors - Legitimate Users
Cyber Security Primer - Actors - Legitimate UsersCyber Security Primer - Actors - Legitimate Users
Cyber Security Primer - Actors - Legitimate Users
Mark Stafford
 
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking. Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
Mark Stafford
 
Cyber Security Primer - Actors - Organised Criminal Groups
Cyber Security Primer - Actors - Organised Criminal GroupsCyber Security Primer - Actors - Organised Criminal Groups
Cyber Security Primer - Actors - Organised Criminal Groups
Mark Stafford
 
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
Mark Stafford
 
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
Mark Stafford
 
Cyber Security Primer - Actors - Its all in the hat!
Cyber Security Primer - Actors - Its all in the hat!Cyber Security Primer - Actors - Its all in the hat!
Cyber Security Primer - Actors - Its all in the hat!
Mark Stafford
 
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
Mark Stafford
 

More from Mark Stafford (20)

Cyber Security Primer - Awareness - The Social Engineering of Phishing
Cyber Security Primer - Awareness - The Social Engineering of PhishingCyber Security Primer - Awareness - The Social Engineering of Phishing
Cyber Security Primer - Awareness - The Social Engineering of Phishing
 
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
 
Cyber Security Primer - Assets - Control Number One
Cyber Security Primer - Assets - Control Number OneCyber Security Primer - Assets - Control Number One
Cyber Security Primer - Assets - Control Number One
 
Cyber Security Primer - Operations - Transforming Security Operations with Cl...
Cyber Security Primer - Operations - Transforming Security Operations with Cl...Cyber Security Primer - Operations - Transforming Security Operations with Cl...
Cyber Security Primer - Operations - Transforming Security Operations with Cl...
 
Cyber Security Primer - Data Analytics - Having Clear Goals
Cyber Security Primer - Data Analytics - Having Clear GoalsCyber Security Primer - Data Analytics - Having Clear Goals
Cyber Security Primer - Data Analytics - Having Clear Goals
 
Cyber Security Primer - Data Analytics - Avoiding False Positives
Cyber Security Primer - Data Analytics - Avoiding False PositivesCyber Security Primer - Data Analytics - Avoiding False Positives
Cyber Security Primer - Data Analytics - Avoiding False Positives
 
Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk an...
Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk an...Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk an...
Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk an...
 
NIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram PosterNIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram Poster
 
Handy Infogram for the NIST Cyber Security Framework
Handy Infogram for the NIST Cyber Security FrameworkHandy Infogram for the NIST Cyber Security Framework
Handy Infogram for the NIST Cyber Security Framework
 
Cyber Security Primers - Business Change - Supply Chain
Cyber Security Primers - Business Change - Supply ChainCyber Security Primers - Business Change - Supply Chain
Cyber Security Primers - Business Change - Supply Chain
 
Cyber Security Primer - Business Change - Moving to the cloud
Cyber Security Primer - Business Change - Moving to the cloud Cyber Security Primer - Business Change - Moving to the cloud
Cyber Security Primer - Business Change - Moving to the cloud
 
Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
Cyber Security Primers - Actors - Political Pressure Group and (H)activists. Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
 
Cyber Security Primer - Business Change - Divestment
Cyber Security Primer - Business Change - DivestmentCyber Security Primer - Business Change - Divestment
Cyber Security Primer - Business Change - Divestment
 
Cyber Security Primer - Actors - Legitimate Users
Cyber Security Primer - Actors - Legitimate UsersCyber Security Primer - Actors - Legitimate Users
Cyber Security Primer - Actors - Legitimate Users
 
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking. Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
 
Cyber Security Primer - Actors - Organised Criminal Groups
Cyber Security Primer - Actors - Organised Criminal GroupsCyber Security Primer - Actors - Organised Criminal Groups
Cyber Security Primer - Actors - Organised Criminal Groups
 
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
 
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
 
Cyber Security Primer - Actors - Its all in the hat!
Cyber Security Primer - Actors - Its all in the hat!Cyber Security Primer - Actors - Its all in the hat!
Cyber Security Primer - Actors - Its all in the hat!
 
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story