SlideShare a Scribd company logo
Never Share
Passwords
They should be as unique as your
Fingerprint
CYBER SECURITY AWARENESS TRAINING datahops.com
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
MAKE YOUR PASSWORD
STRONG AND
SPECIAL
$!&^%@#
M!ch@el#19
!LikCh**s*0nT0as#
Am@z!ngGra3e
*****
1. Use a strong and different passwords
2. Create strong passwords for all accounts
3. Use a Passphrase (three random words)
4. Turn on 2-step authentication
5. Save passwords using a password manager
Protect Your
INFORMATION
Cyber Awareness Training www.datahops.com
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
IF YOU HAVE LOTS OF PASSWORDS
THEN MAKE USE OF A
PASSWORD MANAGER
login
**********
Forgot password?
USERNAME Password Manager
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
!Lik2Sw!!m
SECURE PASSWORDS
USE A PASSPHRASE
Myn@m3!sH3nr#
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
USE STRONG PASSWORDS
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
NEVER LEAVE PASSWORDS
WHERE THEY CAN EASILY BE
READ
WRITTEN DOWN
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
DON’T USE COMMON
AS PART OF THE PASSWORD
ACCOUNTS NAMES
login
John-Doe-Admin-123
Forgot password?
USERNAME
PASSWORD
JohnDoe.admin
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
NEVER SHARE PASSWORDS
THEY SHOULD BE AS UNIQUE AS
YOUR FINGERPRINT!
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
THE LONGER THE BETTER
SECURE PASSWORDS
************
AT LEAST 12 TO 14 CHARACTERS
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
DON’T MAKE YOUR
PASSWORD
EASY TO GUESS
QWERTY
Abc 123
Iloveyou
12345678
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
STRONG PASSWORD
A BIRTHDAY
IS NOT A
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
CHANGE YOUR PASSWORDS
JUST LIKE YOUR TOOTHBRUSH
REGULARLY
Never Share
Passwords
They should be as unique as your
Fingerprint
CYBER SECURITY AWARENESS TRAINING datahops.com
Never Share
Passwords
Fingerprint
They should be as unique as your
CYBER SECURITY AWARENESS TRAINING datahops.com
CAUTION
USE
CYBERSECURITY AWARENESS TRAINING datahops.com
STRONG
PASSWORDS
MAKE
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
YOUR
STRONG
PASSWORDS
DO NOT
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
SHARE
PASSWORDS
DO NOT
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
WRITE DOWN
PASSWORDS
YOUR DOG’S NAME
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
A PASSWORD
IS NOT
********
YOUR RABBIT’S NAME
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
A PASSWORD
IS NOT
********
YOUR CATS NAME
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
A PASSWORD
IS NOT
********
NO BANK
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
PASSWORD
WILL EVER ASK FOR
YOUR ONE TIME
BY TEXT, EMAIL,PHONE
CALL
OTP
*
* * *
DO NOT SHARE
TRY A PASSPHRASE
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
PASSWORD
TO CREATE A STRONG
Myn@m3!sH3nr#
!Lik2Sw!!m
BITE BACK
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
CREATE STRONG
PASSWORDS
USING THE PASSWORD
ARE YOU STILL
CYBERSECURITYAWARENESS
datahops.com
LOCK THEMOUT
“PASSWORD”?
USING THE PASSWORD
ARE YOU STILL
CYBERSECURITYAWARENESS
datahops.com
LOCK THEMOUT
“QWERTY”?
USING THE PASSWORD
ARE YOU STILL
CYBERSECURITYAWARENESS
datahops.com
LOCK THEMOUT
“123456”?
YOUR ADDRESS
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
IS NOT
A PASSWORD
Mr. Password
1234 Password Lane
Found on Social media
DO NOT USE
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
WITH CONSECUTIVE
PASSWORDS
NUMBERS AND LETTERS
D
1 2 3 4
A B C
PASSWORD
CODE
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
THE CRIMINALS REQUESTED IT
IGNORE IT
YOU DIDN’T REQUEST
Reset Your Password
Password
Confirm Password
Cancel
Continue
MAKES STRONG
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
A DOZEN
CHARACTERS
PASSWORDS
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
STRONG
Protect all your files and devices with Strong
passwords and encryption
!?@*^%$#>
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
LONG, UNIQUE
AND COMPLEX
Make your passwords strong. At least 12
characters long, mixture of lowercase,
uppercase and special characters. Use one
password per account. Never reuse passwords
v v
v v v
v v
v
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
CHANGE FROM
THE NORM.
Change all default passwords immediately. Use
different login details for all services, devices
and data capture sites
1234567
Password
qwerty
CHANGE YOUR
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
PASSWORD
S REGULARLY
JUST LIKE YOUR TOOTHBRUSH
YOUR BIRTHDAY
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
IS NOT
A PASSWORD
Passphrase
3 random words add
Numbers, letters,
special characters
and jumble them up
MFA
Multi Factor Authentication
Secure login with:
What you have
What you know
Who you are
Password managers
They store your
passwords securely
and can generate new
and unique ones for you
Login Securely
Cybersecurity awareness training datahops.com
MFA
What you have
Multi Factor Authentication
An added layer of protection
What you know
Who you are
Password
Use IT
Cybersecurity awareness training datahops.com
Secure your information
Choose a password that cannot be guessed.
Choose a password you can remember.
Choose different passwords for different services
Choose complex passwords you can remember
Cybersecurity awareness training datahops.com
Password Healthcheck!.
Don’t share passwords
Don’t reuse passwords
Don’t write them down
Don’t use common words
Don’t make them easy
Cybersecurity awareness training datahops.com
Protect your information.
Never reuse passwords!
Each login should be unique
Use 2-factor authentication
for added security
Don’t share passwords
with other people
Don’t leave passwords
written down
passwords must be strong
$3&!GbR@-njRUTdfd12_
Cybersecurity awareness training datahops.com
USE STRONG PASSWORDS
Protect your information!
Cybersecurity awareness training datahops.com
Downloading……
Lock them out!
ACCESS DENIED
Keep security in mind!
● Use a password manager to store strong unique
passwords for all of your accounts.
● They can also generate new strong passwords for
you
● They can enter your credentials automatically
Safe
Storage
Password Manager
Cybersecurity awareness training datahops.com
GOOD
PASSWORDS
MUST BE:
Cybersecurity awareness training datahops.com
Y0um^$M@k3Y0*r?aSsw0%D$$t&0nG
STRONG
UNIQUE
COMPLEX
USE STRONG PASSWORDS
Protect your information!
Cybersecurity awareness training datahops.com
Downloading……
Don’t let them get away with IT
MAKE YOUR PASSWORDS
STRONG
M@k3Y0*r?aSsw0%D$$t&0nG
● 12 or more characters
● Letters , Numbers,Characters
Protect yourself and your Information
Cybersecurity awareness training datahops.com
Use a separate password for your work
account in case it gets compromised!
Use
STRONG Passwords
Cybersecurity awareness training datahops.com
Combine three random words together to create
strong and memorable passwords. Avoid using
information that can be found online like:
Birthday, pet names,address,phone number etc..
Use
STRONG Passwords
Cybersecurity awareness training datahops.com
Use 2 step verification or multi-factor authentication
for sensitive logins like banking and email.
This provides and extra layer of protection.
Use
STRONG Passwords
Cybersecurity awareness training datahops.com
SAFE?
REALLY
Cybersecurity awareness training datahops.com
ARE YOU
STRONG PASSWORDS-PROTECT YOUR INFORMATION

More Related Content

Similar to FREE A4 Cyber Security Awareness Posters-Passwords

World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 Thycotic
 
Password Management
Password ManagementPassword Management
Password ManagementDavon Smart
 
Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwordsclcewing
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
LastPass Password Manager - the last password you'll ever have to remember
LastPass Password Manager - the last password you'll ever have to rememberLastPass Password Manager - the last password you'll ever have to remember
LastPass Password Manager - the last password you'll ever have to rememberiSiteBuild.com
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password CreationnFront Security
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Kimberley Dray
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
So Many Passwords So Little Mind
So Many Passwords So Little MindSo Many Passwords So Little Mind
So Many Passwords So Little MindAlain Lemay
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)David Herrington
 
Password Storage Explained
Password Storage ExplainedPassword Storage Explained
Password Storage Explainedjeetendra mandal
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
Lesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxLesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxAllanGuevarra1
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Mike Barker
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOVHcloud
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 

Similar to FREE A4 Cyber Security Awareness Posters-Passwords (20)

World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
Password Management
Password ManagementPassword Management
Password Management
 
Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwords
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
LastPass Password Manager - the last password you'll ever have to remember
LastPass Password Manager - the last password you'll ever have to rememberLastPass Password Manager - the last password you'll ever have to remember
LastPass Password Manager - the last password you'll ever have to remember
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
So Many Passwords So Little Mind
So Many Passwords So Little MindSo Many Passwords So Little Mind
So Many Passwords So Little Mind
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Password Storage Explained
Password Storage ExplainedPassword Storage Explained
Password Storage Explained
 
Getting authentication right
Getting authentication rightGetting authentication right
Getting authentication right
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
Lesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxLesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptx
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattack
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
issue15
issue15issue15
issue15
 

More from Data Hops

FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPRData Hops
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRData Hops
 
FREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPRFREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPRData Hops
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable DeviceData Hops
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareData Hops
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingData Hops
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringData Hops
 
FREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data PrivacyFREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data PrivacyData Hops
 
FREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityFREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityData Hops
 
Free Digital Signage Cybersecurity Screensavers Part 1
Free  Digital Signage Cybersecurity Screensavers Part 1Free  Digital Signage Cybersecurity Screensavers Part 1
Free Digital Signage Cybersecurity Screensavers Part 1Data Hops
 
Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11Data Hops
 
A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9Data Hops
 
A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7Data Hops
 
A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6Data Hops
 
A4 Cybersecurity Awareness Posters Part 5
A4 Cybersecurity Awareness Posters Part 5A4 Cybersecurity Awareness Posters Part 5
A4 Cybersecurity Awareness Posters Part 5Data Hops
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdfData Hops
 
Phishing Alert
Phishing AlertPhishing Alert
Phishing AlertData Hops
 

More from Data Hops (17)

FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
 
FREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPRFREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPR
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
 
FREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data PrivacyFREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data Privacy
 
FREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityFREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device Security
 
Free Digital Signage Cybersecurity Screensavers Part 1
Free  Digital Signage Cybersecurity Screensavers Part 1Free  Digital Signage Cybersecurity Screensavers Part 1
Free Digital Signage Cybersecurity Screensavers Part 1
 
Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11
 
A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9
 
A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7
 
A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6
 
A4 Cybersecurity Awareness Posters Part 5
A4 Cybersecurity Awareness Posters Part 5A4 Cybersecurity Awareness Posters Part 5
A4 Cybersecurity Awareness Posters Part 5
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 
Phishing Alert
Phishing AlertPhishing Alert
Phishing Alert
 

Recently uploaded

Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Server-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineServer-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineUXDXConf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfalexjohnson7307
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Boni Yeamin
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 

Recently uploaded (20)

Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Server-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineServer-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at Priceline
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 

FREE A4 Cyber Security Awareness Posters-Passwords