SlideShare a Scribd company logo
A NEW PERSPECTIVE:
CYBERSECURITY CHALLENGES
CYBERFORPEOPLE.COM
Wang Yangming Chinese philosopher born - 1472 / 1529
CYBEREASON brings a new
holistic approach to cybersecurity. As
the digital world continues to innovate
and become more connected, the next
generation must know how to protect
themselves against cyber threats.
My vision is to EDUCATE PEOPLE TO ACT (EDUACT) and reveal their
HIGHDENTITY.
Through education we can create a safer world - a world where we can be
connected and free.
EDUCATE CYBER
EDUCATE HIGHDENTITY
EDUACT
POLITICAL
DIVERSION
Totalitarianism (Big Brother), Anarchy
WE ARE EXPOSED TO
MANY TYPES OF CYBER THREATS
CONSUMER
PRIVACY
Economic Destabilization, Data Breaches
PHYSICAL
ATTACKS
Terrorism, Wars
A FEW RELEVANT STATS
AN INDIVIDUAL IS
ATTACKED EVERY 20
SECONDS
A BUSINESS IS
ATTACKED EVERY 2
MINUTES
600,000 FB ACCOUNTS
ARE COMPROMISED
EVERY DAY
99% OF COMPUTERS ARE
VULNERABLE TO CYBER
ATTACKS
CYBERCRIME IS THE 2ND
MOST REPORTED CRIME
(PWC SOURCE)
NEARLY 700 MILLION
PEOPLE IN 21
COUNTRIES HAVE
EXPERIENCED SOME
FORM OF CYBERCRIME
33% OF ADULTS SAY THEY
SHARE THEIR ACCOUNT
CREDENTIALS WITH OTHERS
43% OF ADULTS ADMIT TO
SHOPPING ONLINE VIA PUBLIC
WIFI
76% OF CONSUMERS IN 21
COUNTRIES RECOGNIZE THE
IMPORTANCE OF SECURING
THEIR ACCOUNT INFORMATION,
BUT MANY STILL SHARE
PASSWORDS
63% OF CONFIRMED DATA
VIOLATIONS USE A WEAK,
DEFAULT, OR STOLEN
PASSWORD
80% OF VICTIMS OF CYBER
ATTACKS DO NOT REALIZE
THAT THEY HAVE BEEN
ATTACKED FOR A WEEK OR
MORE. ( 7% FOR MORE THAN A
YEAR)
IN 2016, 34% OF TEENS
REPORTED BEING VICTIMS OF
CYBERBULLYING. (2007: 18%)
THE NUMBER OF CHILDREN
HOSPITALIZED FOR
ATTEMPTED SUICIDE OR WHO
HAVE SUICIDAL THOUGHTS
DOUBLED BETWEEN 2008
AND 2015
34% OF STUDENTS REPORTED
BEING BULLIED ONLINE AT
LEAST ONCE IN THEIR LIFE
90% OF TEENS WHO WERE
INTIMIDATED BY SOCIAL
MEDIA SAID THEY IGNORE IT
CYBER
ATTACKS
PROTECTION
AWARENESS
YOUNG
PEOPLE
POLITICAL
DIVERSION
CONSUMER
PRIVACY
In an ultra-connected world,
where the internet is a necessity,
individuals are forced to assume the risk Cyber
Threats pose.
PHYSICAL
ATTACKS
Although the individual’s level of
knowledge is higher than ever before, the
prevalence of threats often leaves the
individual disarmed and feeling helpless.
Although fighting against solicitation and
threats is a daily challenge, many
individuals lack the tools and knowledge
they need to adequately secure their
identity.
THE INDIVIDUAL
GRADUALLY
SURRENDERS
THEIR IDENTITY
RESIGNATION
IGNORANCE
RESULT :
SURRENDERING
ONE’S
IDENTITY
LACK OF DISCERNMENT
INTERNET
SOCIAL MEDIA
VIRTUAL
MESSAGING
SMARTPHONES
COMPUTERS
IoT
TO BE OR NOT TO
BE BORN
CONNECTED IS THE
QUESTION
TO BE BORN CONNECTED
From birth, the individual
gradually builds and shape
their identity.
LOSS OF FREEDOM OF
CHOICE
LOSS OF FREE WILL
ACCEPTANCE OF
DEHUMANIZATION
LESS REAL-LIFE
INTERACTIONS &
INTERESTS
DISCONNECTION
1 2 3
THE GENERATIONS
OF THE 21ST CENTURY
ARE CONNECTED EVEN
BEFORE THEIR IDENTITY
EXISTS.
DISCONNECT FROM THE MATRIX AND REGAIN
POSSESSION OF YOUR IDENTITY.
THE CONCEPT OF HIGHDENTITY IS NOT ONLY TO
EDUCATE THE PUBLIC SO THEY UNDERSTAND THE
IMPORTANCE OF PROTECTING THEIR IDENTITY, BUT
TO PROVIDE THEM WITH THE MEANS TO ACT.
IT IS THE ROLE OF CYBERSECURITY TO GIVE
INDIVIDUALS THE KNOWLEDGE AND TOOLS THEY
NEED TO ELEVATE THEIR HIGHDENTITY.
EDUCATE TO REVEAL
ONE’S HIGHDENTITY
IF NOTHING IS DONE TO SECURE ONE’S IDENTITY, THE
INDIVIDUAL WILL BE DISPOSSESSED FROM THE FIRST
MOMENT THEY BECOME CONNECTED. BLACK MIRROR IS
NOT A PROJECTION OF THE FUTURE, BUT RATHER A
MIRROR OF THE PRESENT.
HIGHDENTITY IS THE
RED MATRIX PILL.
ILAN DRAY / March 2018
CYBERSECURITY
HELPS PROTECT THE
IDENTITY OF
INDIVIDUALS
THE INDIVIDUAL IS
GROWING IN
CREATING THEIR
IDENTITY
EDUCATION CAN PLAY A HUGE ROLE IN INCREASING CYBERSECURITY AWARENESS. FROM THE
EARLIEST AGE, INDIVIDUALS MUST BE EXPOSED TO THE BASIC NOTIONS OF CYBER SECURITY AND
THE CONSEQUENCES OF AN OPEN AND CONNECTED WORLD.
EDUCATE TO ACT : EDUACT
HIGHDENTITY
EDUCATE TO ACT
(EDUACT)
PROTECTING
IDENTITY
BUILDING
IDENTITY
NOT EDUCATED
TO ACT
EDUCATED
TO ACT
THE INDIVIDUAL IS THE FIRST LINE OF DEFENSETHE INDIVIDUAL IS THE WEAKEST LINK
La securite collective commence par la securite individuelle. Elle necessite de former l’individu aux risques qu’ils courent.
EX : TO ALERT AUTHORITIES ABOUT A
SUSPICIOUS SUITCASE IN THE STREETEX : A VIRAL MAIL WITH MALWARE
EDUACT: COLLECTIVE SECURITY STARTS WITH
THE INDIVIDUAL
EDUCATE CYBER
EDUCATE HIGHDENTITY
CONFERENCES AND ONGOING
INTERVENTIONS IN SCHOOLS
(KINDERGARTEN TO UNIVERSITY)
CONFERENCES AND
INTERVENTIONS WITH PARENTS,
TEACHERS, AND ADULTS
MAKING CYBERSECURITY A
DISCIPLINE IN THE SCHOOL
CURRICULUM
INSERT CYBERSECURITY
EDUCATION IN PSYCHOMETRIC
EXAMS TO OBTAIN THE
HIGHDENTITY CERTIFICATE
INFLUENCE THIS WAY OF THINKING
THROUGH THE INTERNET, SOCIAL
NETWORKS, TV, CINEMA, PRESS
CREATE EDUACT TRAINING CENTER
AND CBR CERTIFICATE PROGRAM
E D U A C T
EDUACT TO REVEAL YOUR HIGHDENTITY
ILAN’S WAY
Ilan in his way of life
represents the exact
persona that can be
listened by the people.
Everything about his
lifestyle and his position
within Cybereason makes
him the perfect interlocutor
and allows to implement
this vision.
THANK
YOU.

More Related Content

What's hot

Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
João Rufino de Sales
 
McAfee Stop.Think.Connect
McAfee Stop.Think.ConnectMcAfee Stop.Think.Connect
McAfee Stop.Think.Connect
cbazilewich
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Matter
caitystew
 
ISACA UW Handbook 2016
ISACA UW Handbook 2016ISACA UW Handbook 2016
ISACA UW Handbook 2016
Daniel Kapellmann Zafra
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 
A (very) brief history of US Internet safety
A (very) brief history of US Internet safetyA (very) brief history of US Internet safety
A (very) brief history of US Internet safety
Anne Collier
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
Jenny O'Meara
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
Mike Hasley
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels Cyberwar
Elyssa Durant
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
Beckusq
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
Grant Ward
 
Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
Ronald E. Laub Jr
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
IanMJB
 
Wk4 project
Wk4 projectWk4 project
Wk4 project
Toby Edwards
 
Internet Sehat Goes to Seluas
Internet Sehat Goes to SeluasInternet Sehat Goes to Seluas
Internet Sehat Goes to Seluas
Dwi Wahyudi
 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for Dummies
Liberteks
 
Internet Safety Infographic
Internet Safety InfographicInternet Safety Infographic
Internet Safety Infographic
uKnow.com
 

What's hot (19)

Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
McAfee Stop.Think.Connect
McAfee Stop.Think.ConnectMcAfee Stop.Think.Connect
McAfee Stop.Think.Connect
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Matter
 
ISACA UW Handbook 2016
ISACA UW Handbook 2016ISACA UW Handbook 2016
ISACA UW Handbook 2016
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
A (very) brief history of US Internet safety
A (very) brief history of US Internet safetyA (very) brief history of US Internet safety
A (very) brief history of US Internet safety
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels Cyberwar
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Wk4 project
Wk4 projectWk4 project
Wk4 project
 
Internet Sehat Goes to Seluas
Internet Sehat Goes to SeluasInternet Sehat Goes to Seluas
Internet Sehat Goes to Seluas
 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for Dummies
 
Internet Safety Infographic
Internet Safety InfographicInternet Safety Infographic
Internet Safety Infographic
 

Similar to Eduact version definitive_17062018

Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
TopCyberNewsMAGAZINE
 
Cyber safety
Cyber  safetyCyber  safety
Cyber safety
VibhorSrivastava30
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
Nikhil Chaudhary
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
Mantenso Skido-Achulo
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
Debabrata Samanta
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
Ludmila Morozova-Buss
 
Increasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at CyberspaceIncreasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at Cyberspace
ijtsrd
 
ES_16 Author- Niyati Khandelwal
ES_16 Author- Niyati KhandelwalES_16 Author- Niyati Khandelwal
ES_16 Author- Niyati Khandelwal
Cy-Fi Arts Festival 2019
 
Paper 8 culture studies
Paper 8 culture studiesPaper 8 culture studies
Paper 8 culture studies
AlishaVaghasiya
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
Larry Magid
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
Dharani Adusumalli
 
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Kasperi Lötjönen
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
mbmh111980
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
Sarah Jarvis
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
Custom Paper Services
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
Bradford Sims
 

Similar to Eduact version definitive_17062018 (18)

Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
Cyber safety
Cyber  safetyCyber  safety
Cyber safety
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Increasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at CyberspaceIncreasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at Cyberspace
 
ES_16 Author- Niyati Khandelwal
ES_16 Author- Niyati KhandelwalES_16 Author- Niyati Khandelwal
ES_16 Author- Niyati Khandelwal
 
Paper 8 culture studies
Paper 8 culture studiesPaper 8 culture studies
Paper 8 culture studies
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 

Recently uploaded

假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 

Recently uploaded (20)

假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 

Eduact version definitive_17062018

  • 1. A NEW PERSPECTIVE: CYBERSECURITY CHALLENGES CYBERFORPEOPLE.COM
  • 2. Wang Yangming Chinese philosopher born - 1472 / 1529
  • 3. CYBEREASON brings a new holistic approach to cybersecurity. As the digital world continues to innovate and become more connected, the next generation must know how to protect themselves against cyber threats. My vision is to EDUCATE PEOPLE TO ACT (EDUACT) and reveal their HIGHDENTITY. Through education we can create a safer world - a world where we can be connected and free. EDUCATE CYBER EDUCATE HIGHDENTITY EDUACT
  • 4.
  • 5. POLITICAL DIVERSION Totalitarianism (Big Brother), Anarchy WE ARE EXPOSED TO MANY TYPES OF CYBER THREATS CONSUMER PRIVACY Economic Destabilization, Data Breaches PHYSICAL ATTACKS Terrorism, Wars
  • 6. A FEW RELEVANT STATS AN INDIVIDUAL IS ATTACKED EVERY 20 SECONDS A BUSINESS IS ATTACKED EVERY 2 MINUTES 600,000 FB ACCOUNTS ARE COMPROMISED EVERY DAY 99% OF COMPUTERS ARE VULNERABLE TO CYBER ATTACKS CYBERCRIME IS THE 2ND MOST REPORTED CRIME (PWC SOURCE) NEARLY 700 MILLION PEOPLE IN 21 COUNTRIES HAVE EXPERIENCED SOME FORM OF CYBERCRIME 33% OF ADULTS SAY THEY SHARE THEIR ACCOUNT CREDENTIALS WITH OTHERS 43% OF ADULTS ADMIT TO SHOPPING ONLINE VIA PUBLIC WIFI 76% OF CONSUMERS IN 21 COUNTRIES RECOGNIZE THE IMPORTANCE OF SECURING THEIR ACCOUNT INFORMATION, BUT MANY STILL SHARE PASSWORDS 63% OF CONFIRMED DATA VIOLATIONS USE A WEAK, DEFAULT, OR STOLEN PASSWORD 80% OF VICTIMS OF CYBER ATTACKS DO NOT REALIZE THAT THEY HAVE BEEN ATTACKED FOR A WEEK OR MORE. ( 7% FOR MORE THAN A YEAR) IN 2016, 34% OF TEENS REPORTED BEING VICTIMS OF CYBERBULLYING. (2007: 18%) THE NUMBER OF CHILDREN HOSPITALIZED FOR ATTEMPTED SUICIDE OR WHO HAVE SUICIDAL THOUGHTS DOUBLED BETWEEN 2008 AND 2015 34% OF STUDENTS REPORTED BEING BULLIED ONLINE AT LEAST ONCE IN THEIR LIFE 90% OF TEENS WHO WERE INTIMIDATED BY SOCIAL MEDIA SAID THEY IGNORE IT CYBER ATTACKS PROTECTION AWARENESS YOUNG PEOPLE
  • 7. POLITICAL DIVERSION CONSUMER PRIVACY In an ultra-connected world, where the internet is a necessity, individuals are forced to assume the risk Cyber Threats pose. PHYSICAL ATTACKS Although the individual’s level of knowledge is higher than ever before, the prevalence of threats often leaves the individual disarmed and feeling helpless. Although fighting against solicitation and threats is a daily challenge, many individuals lack the tools and knowledge they need to adequately secure their identity. THE INDIVIDUAL GRADUALLY SURRENDERS THEIR IDENTITY RESIGNATION IGNORANCE RESULT : SURRENDERING ONE’S IDENTITY LACK OF DISCERNMENT
  • 8. INTERNET SOCIAL MEDIA VIRTUAL MESSAGING SMARTPHONES COMPUTERS IoT TO BE OR NOT TO BE BORN CONNECTED IS THE QUESTION TO BE BORN CONNECTED From birth, the individual gradually builds and shape their identity. LOSS OF FREEDOM OF CHOICE LOSS OF FREE WILL ACCEPTANCE OF DEHUMANIZATION LESS REAL-LIFE INTERACTIONS & INTERESTS DISCONNECTION 1 2 3 THE GENERATIONS OF THE 21ST CENTURY ARE CONNECTED EVEN BEFORE THEIR IDENTITY EXISTS.
  • 9.
  • 10. DISCONNECT FROM THE MATRIX AND REGAIN POSSESSION OF YOUR IDENTITY. THE CONCEPT OF HIGHDENTITY IS NOT ONLY TO EDUCATE THE PUBLIC SO THEY UNDERSTAND THE IMPORTANCE OF PROTECTING THEIR IDENTITY, BUT TO PROVIDE THEM WITH THE MEANS TO ACT. IT IS THE ROLE OF CYBERSECURITY TO GIVE INDIVIDUALS THE KNOWLEDGE AND TOOLS THEY NEED TO ELEVATE THEIR HIGHDENTITY. EDUCATE TO REVEAL ONE’S HIGHDENTITY IF NOTHING IS DONE TO SECURE ONE’S IDENTITY, THE INDIVIDUAL WILL BE DISPOSSESSED FROM THE FIRST MOMENT THEY BECOME CONNECTED. BLACK MIRROR IS NOT A PROJECTION OF THE FUTURE, BUT RATHER A MIRROR OF THE PRESENT. HIGHDENTITY IS THE RED MATRIX PILL. ILAN DRAY / March 2018
  • 11. CYBERSECURITY HELPS PROTECT THE IDENTITY OF INDIVIDUALS THE INDIVIDUAL IS GROWING IN CREATING THEIR IDENTITY EDUCATION CAN PLAY A HUGE ROLE IN INCREASING CYBERSECURITY AWARENESS. FROM THE EARLIEST AGE, INDIVIDUALS MUST BE EXPOSED TO THE BASIC NOTIONS OF CYBER SECURITY AND THE CONSEQUENCES OF AN OPEN AND CONNECTED WORLD. EDUCATE TO ACT : EDUACT HIGHDENTITY EDUCATE TO ACT (EDUACT) PROTECTING IDENTITY BUILDING IDENTITY
  • 12. NOT EDUCATED TO ACT EDUCATED TO ACT THE INDIVIDUAL IS THE FIRST LINE OF DEFENSETHE INDIVIDUAL IS THE WEAKEST LINK La securite collective commence par la securite individuelle. Elle necessite de former l’individu aux risques qu’ils courent. EX : TO ALERT AUTHORITIES ABOUT A SUSPICIOUS SUITCASE IN THE STREETEX : A VIRAL MAIL WITH MALWARE EDUACT: COLLECTIVE SECURITY STARTS WITH THE INDIVIDUAL
  • 13. EDUCATE CYBER EDUCATE HIGHDENTITY CONFERENCES AND ONGOING INTERVENTIONS IN SCHOOLS (KINDERGARTEN TO UNIVERSITY) CONFERENCES AND INTERVENTIONS WITH PARENTS, TEACHERS, AND ADULTS MAKING CYBERSECURITY A DISCIPLINE IN THE SCHOOL CURRICULUM INSERT CYBERSECURITY EDUCATION IN PSYCHOMETRIC EXAMS TO OBTAIN THE HIGHDENTITY CERTIFICATE INFLUENCE THIS WAY OF THINKING THROUGH THE INTERNET, SOCIAL NETWORKS, TV, CINEMA, PRESS CREATE EDUACT TRAINING CENTER AND CBR CERTIFICATE PROGRAM E D U A C T
  • 14. EDUACT TO REVEAL YOUR HIGHDENTITY ILAN’S WAY Ilan in his way of life represents the exact persona that can be listened by the people. Everything about his lifestyle and his position within Cybereason makes him the perfect interlocutor and allows to implement this vision.