SlideShare a Scribd company logo
Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk and Vulnerability

More Related Content

More from Mark Stafford

Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning f...
Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning f...Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning f...
Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning f...
Mark Stafford
 
Cyber Security Primer - Awareness - The Social Engineering of Phishing
Cyber Security Primer - Awareness - The Social Engineering of PhishingCyber Security Primer - Awareness - The Social Engineering of Phishing
Cyber Security Primer - Awareness - The Social Engineering of Phishing
Mark Stafford
 
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
Mark Stafford
 
Cyber Security Primer - Assets - Control Number One
Cyber Security Primer - Assets - Control Number OneCyber Security Primer - Assets - Control Number One
Cyber Security Primer - Assets - Control Number One
Mark Stafford
 
Cyber Security Primer - Operations - Transforming Security Operations with Cl...
Cyber Security Primer - Operations - Transforming Security Operations with Cl...Cyber Security Primer - Operations - Transforming Security Operations with Cl...
Cyber Security Primer - Operations - Transforming Security Operations with Cl...
Mark Stafford
 
Cyber Security Primer - Data Analytics - Having Clear Goals
Cyber Security Primer - Data Analytics - Having Clear GoalsCyber Security Primer - Data Analytics - Having Clear Goals
Cyber Security Primer - Data Analytics - Having Clear Goals
Mark Stafford
 
Cyber Security Primer - Data Analytics - Avoiding False Positives
Cyber Security Primer - Data Analytics - Avoiding False PositivesCyber Security Primer - Data Analytics - Avoiding False Positives
Cyber Security Primer - Data Analytics - Avoiding False Positives
Mark Stafford
 
NIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram PosterNIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram Poster
Mark Stafford
 
Handy Infogram for the NIST Cyber Security Framework
Handy Infogram for the NIST Cyber Security FrameworkHandy Infogram for the NIST Cyber Security Framework
Handy Infogram for the NIST Cyber Security Framework
Mark Stafford
 
Cyber Security Primers - Business Change - Supply Chain
Cyber Security Primers - Business Change - Supply ChainCyber Security Primers - Business Change - Supply Chain
Cyber Security Primers - Business Change - Supply Chain
Mark Stafford
 
Cyber Security Primer - Business Change - Moving to the cloud
Cyber Security Primer - Business Change - Moving to the cloud Cyber Security Primer - Business Change - Moving to the cloud
Cyber Security Primer - Business Change - Moving to the cloud
Mark Stafford
 
Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
Cyber Security Primers - Actors - Political Pressure Group and (H)activists. Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
Mark Stafford
 
Cyber Security Primer - Business Change - Divestment
Cyber Security Primer - Business Change - DivestmentCyber Security Primer - Business Change - Divestment
Cyber Security Primer - Business Change - Divestment
Mark Stafford
 
Cyber Security Primer - Actors - Legitimate Users
Cyber Security Primer - Actors - Legitimate UsersCyber Security Primer - Actors - Legitimate Users
Cyber Security Primer - Actors - Legitimate Users
Mark Stafford
 
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking. Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
Mark Stafford
 
Cyber Security Primer - Actors - Organised Criminal Groups
Cyber Security Primer - Actors - Organised Criminal GroupsCyber Security Primer - Actors - Organised Criminal Groups
Cyber Security Primer - Actors - Organised Criminal Groups
Mark Stafford
 
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
Mark Stafford
 
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
Mark Stafford
 
Cyber Security Primer - Actors - Its all in the hat!
Cyber Security Primer - Actors - Its all in the hat!Cyber Security Primer - Actors - Its all in the hat!
Cyber Security Primer - Actors - Its all in the hat!
Mark Stafford
 
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
Mark Stafford
 

More from Mark Stafford (20)

Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning f...
Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning f...Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning f...
Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning f...
 
Cyber Security Primer - Awareness - The Social Engineering of Phishing
Cyber Security Primer - Awareness - The Social Engineering of PhishingCyber Security Primer - Awareness - The Social Engineering of Phishing
Cyber Security Primer - Awareness - The Social Engineering of Phishing
 
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The O...
 
Cyber Security Primer - Assets - Control Number One
Cyber Security Primer - Assets - Control Number OneCyber Security Primer - Assets - Control Number One
Cyber Security Primer - Assets - Control Number One
 
Cyber Security Primer - Operations - Transforming Security Operations with Cl...
Cyber Security Primer - Operations - Transforming Security Operations with Cl...Cyber Security Primer - Operations - Transforming Security Operations with Cl...
Cyber Security Primer - Operations - Transforming Security Operations with Cl...
 
Cyber Security Primer - Data Analytics - Having Clear Goals
Cyber Security Primer - Data Analytics - Having Clear GoalsCyber Security Primer - Data Analytics - Having Clear Goals
Cyber Security Primer - Data Analytics - Having Clear Goals
 
Cyber Security Primer - Data Analytics - Avoiding False Positives
Cyber Security Primer - Data Analytics - Avoiding False PositivesCyber Security Primer - Data Analytics - Avoiding False Positives
Cyber Security Primer - Data Analytics - Avoiding False Positives
 
NIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram PosterNIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram Poster
 
Handy Infogram for the NIST Cyber Security Framework
Handy Infogram for the NIST Cyber Security FrameworkHandy Infogram for the NIST Cyber Security Framework
Handy Infogram for the NIST Cyber Security Framework
 
Cyber Security Primers - Business Change - Supply Chain
Cyber Security Primers - Business Change - Supply ChainCyber Security Primers - Business Change - Supply Chain
Cyber Security Primers - Business Change - Supply Chain
 
Cyber Security Primer - Business Change - Moving to the cloud
Cyber Security Primer - Business Change - Moving to the cloud Cyber Security Primer - Business Change - Moving to the cloud
Cyber Security Primer - Business Change - Moving to the cloud
 
Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
Cyber Security Primers - Actors - Political Pressure Group and (H)activists. Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
Cyber Security Primers - Actors - Political Pressure Group and (H)activists.
 
Cyber Security Primer - Business Change - Divestment
Cyber Security Primer - Business Change - DivestmentCyber Security Primer - Business Change - Divestment
Cyber Security Primer - Business Change - Divestment
 
Cyber Security Primer - Actors - Legitimate Users
Cyber Security Primer - Actors - Legitimate UsersCyber Security Primer - Actors - Legitimate Users
Cyber Security Primer - Actors - Legitimate Users
 
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking. Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
Cyber Security Primer - Operations - Moving from 2D Thinking to 4D thinking.
 
Cyber Security Primer - Actors - Organised Criminal Groups
Cyber Security Primer - Actors - Organised Criminal GroupsCyber Security Primer - Actors - Organised Criminal Groups
Cyber Security Primer - Actors - Organised Criminal Groups
 
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
Cyber Security Primer - Playbooks - Building playbooks from Experience and Th...
 
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
Cyber Security Primer - FOAM - Getting to the Facts to Ensure Situational Awa...
 
Cyber Security Primer - Actors - Its all in the hat!
Cyber Security Primer - Actors - Its all in the hat!Cyber Security Primer - Actors - Its all in the hat!
Cyber Security Primer - Actors - Its all in the hat!
 
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
Cyber Security Primer - Skill Sets - Why Gamers make great Cyber Security Per...
 

Recently uploaded

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 

Recently uploaded (20)

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...