Given at the BugCrowd conference in January 2019, this was the first time for doing this deck.:
For 25 years or more we have fought the battle of passwords and patches while all around us, the world has developed, data has exponentially increased, attack surfaces are everywhere and technology had quite simply forced the human race to consider the evolution cycle in single lifespans as opposed to millennia. During the last 25 years we have done little to protect the charges we are responsible for, we have failed to secure systems, allowed financial attacks, infrastructure attacks, and now attacks directly against humans. At what point will we be able to stem the bleeding and actually take charge of our realm? Have we left it too late, or are we still able to claw back out of the abyss and face our adversary in a more asymmetrical defensive manner? Can we actually provide safety and security to our charges or will we continue to fail? And, critically, how do we communicate this, and educate a population that is content to watch from the sidelines, while they are being digitally eviscerated.
Voting Systems - ISSA Chicago Presentation 2020Chris Roberts
One person, one vote… that’s what we keep telling ourselves, although let’s be honest that really isn’t how it works, at least in the US because of the cockeyed electoral college thing, so it’s more like “some states, most of the votes” AND we can break that down even further by “Electoral College, ALL the votes” because they don’t have to give a damn what you think OR who’s most popular in your state.
Slides from a talk given in Tel Aviv's Cyber Week talking about AI and ML (Artificial Intelligence and Machine Learning) in the IT/InfoSec industry....
Given at the BugCrowd conference in January 2019, this was the first time for doing this deck.:
For 25 years or more we have fought the battle of passwords and patches while all around us, the world has developed, data has exponentially increased, attack surfaces are everywhere and technology had quite simply forced the human race to consider the evolution cycle in single lifespans as opposed to millennia. During the last 25 years we have done little to protect the charges we are responsible for, we have failed to secure systems, allowed financial attacks, infrastructure attacks, and now attacks directly against humans. At what point will we be able to stem the bleeding and actually take charge of our realm? Have we left it too late, or are we still able to claw back out of the abyss and face our adversary in a more asymmetrical defensive manner? Can we actually provide safety and security to our charges or will we continue to fail? And, critically, how do we communicate this, and educate a population that is content to watch from the sidelines, while they are being digitally eviscerated.
Voting Systems - ISSA Chicago Presentation 2020Chris Roberts
One person, one vote… that’s what we keep telling ourselves, although let’s be honest that really isn’t how it works, at least in the US because of the cockeyed electoral college thing, so it’s more like “some states, most of the votes” AND we can break that down even further by “Electoral College, ALL the votes” because they don’t have to give a damn what you think OR who’s most popular in your state.
Slides from a talk given in Tel Aviv's Cyber Week talking about AI and ML (Artificial Intelligence and Machine Learning) in the IT/InfoSec industry....
This talk will focus on a concept first described as “the internet of things” and subsequently as the “internet of everything” and “the programmable world/internet.”
Machine Learning for Non-technical Peopleindico data
Machine learning is one of the most promising and most difficult to understand fields of the modern age. Here are the slides from Slater Victoroff's (CEO of indico) talk at General Assembly Boston for non-technical folks on how to separate the signal from the noise -- stay tuned for the next time he speaks:
https://generalassemb.ly/education/machine-learning-for-non-technical-people
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
Cyberspace and Cyberethics and Social Networking
discusses the new realities of global computer networks, the intertwining of global economies, monopolies and their economic implications, globalization, emerging issues like global ethics, culture, and the development of the lingua franca for the Internet. It also focuses the discussion on the new realities of social networking.
Soccnx10 Man versus Machine – A Story About Embracing Innovation Femke Goedhart
Presentation as given on June 7th in Toronto by Francie Tanner & Femke Goedhart:
Technology and innovation impacts every industry, line of business and profession in ways we could not imagine even 50 years ago. While IT is meant to make things more efficient, the pace of IT evolution makes it hard to think of the future as being “easier”. History shows that companies which are unable to innovate are driven out of the market, which leaves adoption as a central key to dealing with that new social platform, CRM and other innovation. But how do you get people to embrace change? Some people claim that adoption is a purely human affair where it’s all about people, while others believe that adoption should be technology driven and enforced in an automated way. Join Femke Goedhart and Francie Tanner and learn all about adoption tools, methods and strategies that will help you make any new deployment a measurable success.
Lee Rainie, director of Internet and Technology research at the Pew Research Center, gave the Holmes Distinguished Lecture at Colorado State University on April 13, 2018. He discussed the research the Center conducted with Elon University’s Imagining the Internet Center about the future of the internet and the way digital technologies will spread to become the “internet of everywhere” and “artificial intelligence” everywhere. He also explored the ways in which experts say this will create improvements in people’s lives and the new challenges – including privacy, digital divides, anti-social behavior and stress tests for how human social and political systems adapt.
AI - Artificial Intelligence - Implications for LibrariesBrian Pichman
What does the world of AI (artificial intelligence) mean for libraries? Can AI replace library services or how can libraries leverage the technology for more streamlined services. From Smart Houses, to Robots, to technology yet to be mainstreamed, this session will cover it all to help you better prepare and plan for the future.
How can children take advantages of internet without danger?
How can you be secure your children are doing the best use of the net?
What are iwith.org recipies for parents?
This talk will focus on a concept first described as “the internet of things” and subsequently as the “internet of everything” and “the programmable world/internet.”
Machine Learning for Non-technical Peopleindico data
Machine learning is one of the most promising and most difficult to understand fields of the modern age. Here are the slides from Slater Victoroff's (CEO of indico) talk at General Assembly Boston for non-technical folks on how to separate the signal from the noise -- stay tuned for the next time he speaks:
https://generalassemb.ly/education/machine-learning-for-non-technical-people
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
Cyberspace and Cyberethics and Social Networking
discusses the new realities of global computer networks, the intertwining of global economies, monopolies and their economic implications, globalization, emerging issues like global ethics, culture, and the development of the lingua franca for the Internet. It also focuses the discussion on the new realities of social networking.
Soccnx10 Man versus Machine – A Story About Embracing Innovation Femke Goedhart
Presentation as given on June 7th in Toronto by Francie Tanner & Femke Goedhart:
Technology and innovation impacts every industry, line of business and profession in ways we could not imagine even 50 years ago. While IT is meant to make things more efficient, the pace of IT evolution makes it hard to think of the future as being “easier”. History shows that companies which are unable to innovate are driven out of the market, which leaves adoption as a central key to dealing with that new social platform, CRM and other innovation. But how do you get people to embrace change? Some people claim that adoption is a purely human affair where it’s all about people, while others believe that adoption should be technology driven and enforced in an automated way. Join Femke Goedhart and Francie Tanner and learn all about adoption tools, methods and strategies that will help you make any new deployment a measurable success.
Lee Rainie, director of Internet and Technology research at the Pew Research Center, gave the Holmes Distinguished Lecture at Colorado State University on April 13, 2018. He discussed the research the Center conducted with Elon University’s Imagining the Internet Center about the future of the internet and the way digital technologies will spread to become the “internet of everywhere” and “artificial intelligence” everywhere. He also explored the ways in which experts say this will create improvements in people’s lives and the new challenges – including privacy, digital divides, anti-social behavior and stress tests for how human social and political systems adapt.
AI - Artificial Intelligence - Implications for LibrariesBrian Pichman
What does the world of AI (artificial intelligence) mean for libraries? Can AI replace library services or how can libraries leverage the technology for more streamlined services. From Smart Houses, to Robots, to technology yet to be mainstreamed, this session will cover it all to help you better prepare and plan for the future.
How can children take advantages of internet without danger?
How can you be secure your children are doing the best use of the net?
What are iwith.org recipies for parents?
“When it comes to the future, there are three kinds of people: those who let it happen, those who make it happen, and those who wonder what happened.”
-- John M. Richardson, Jr.
The rate of change that both customers and businesses have to deal with today, is nothing short of phenomenal. Now imagine the world that the children of today and your customers of tomorrow are going to grow up in…
Delving into the Net Generation and the Next Net Generation, this keynote is a trip into the future, through the eyes of the children that will grow up in it. Part inspiring, part scary - Future Kids Future Customers is an in-depth examination of how our culture will become affected by the technology around us and the social and market changes it is causing. It will make you re-look at your business model, re-examine your customer service strategy, re-invent your products and re-convene your strategy team.
The future waits for no one. Better to be prepared.
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
This particular presentation covers, at a high level, our national cybersecurity initiative. The content targets prospective high school students and delves into areas of computer science, information systems, and policy.
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
An hour long presentation I gave for LYRASIS. It introduces many topics in security and privacy on the internet and computers and any other type of device with an ip address. IOT Internet of things, browsers, portable devices and more.
Online Security and How to Make Money Online Nader Alkeinay
Prepared by Nader Yahya Alkeinay , to learn more about how to earn up to $3000 per month contact us at zcholar.com one of the top academic social network.
in association with 2ech.com magazine and sponsored by tenrm.com
What's digital profiling and its impact on your privacyFabrizio Gramuglio
My speech at ECB / Be@Ware about security at home: digital profiling, emotion recognition, personal information hacking, and everyday life profiling technologies available today around you
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Gunning for granny
1. Gunning
for
Grandma…
How
the
Internet
targets
YOU,
and
what
you
can
do
to
remain
safe.
2. Today’s
Focus
Your
Internet:
My
front
door
You,
why
are
you
a
target?
Why
are
we
here?
Some
sobering
staEsEcs
(and
why
you
shouldn’t
trust
anyone)
Shoot
the
microwave,
the
fridge….and
the
toaster!
Fed
up
of
being
a
staEsEc:
Minions
revoluEon!
SoluEons
One
through
six..
Scams,
the
top
ones
and
how
to
recognize!
The
Government’s
soluEon
J
More
realisEc
opEons…
3. The
ONE
Rule
PLEASE
ASK
QUESTIONS
!!
We
are
in
this
room
for
2
hours…and
I’m
NOT
doing
all
the
talking.
There
are
NO
stupid
quesEons…
4. Why
Me
?
Couple
of
reasons:
I’ve
got
almost
as
much
grey
hair
as
most
of
you
It
was
gained
(mostly)
in
this
industry
Lost
the
hair
ON
my
head
because
of
this
industry
This
is
actually
more
fun
than
talking
with
execuEves!
…and
probably
more
producEve
Mostly
though
because
Mark
though
it
would
be
a
cool
idea
Thank
you
Mr.
Teter!
J
8. Your
Data…
Every
month
I
excavate
from
the
Internet:
In
excess
of
750,000,000
“targets”
(IRC/I2P/P2P/FTP/HTTP)
Over
550,000
live
and
usable
Credit
Cards
Over
500,000
usable
Healthcare
records
Over
150,000
live
idenEEes
(SSN,
Passport
etc.)
YOUR
INFORMATION
YOUR
IDENTITY
YOUR
Intellectual
Property
YOUR
Companies
Info…
Your
Info,
bought,
sold,
traded.
9. Why
You?
You
don’t
like
to
ask
quesEons
You
don’t
like
to
admit
you
might
be
wrong
You
don’t
have
the
“nasEness”
that
modern
society
has
You
have
money,
healthcare
history
and
Eme
You
have
credit
history
Technology
is
moving
faster
than
most
of
us
can
track
You
are
polite,
civilized
and
trust
people
You
make
bad
witnesses
(exploitaEon
Emeline
etc.)
You
make
an
aaracEve
target
(long/fruibul
life
etc.)
10. “Not
the
world
I
grew
up
in”
Correct,
but
it
IS
the
world
you
now
live
in,
operate
in
and
HAVE
to
deal
with:
You
built
bombs,
we
build
viruses
and
malware.
You
built
rockets,
my
iPhone’s
got
more
compuEng
power.
You
cured
Polio,
I
can
kill
you
remotely
using
RFID/Wireless.
You
had
ENIAC
(Vacuum
tubes),
we
have
nanotechnology.
You
put
TV
in
the
house,
we
put
it
on
our
watches.
Your
crime
was
personal,
ours
reaches
from
across
the
globe.
Your
data
was
in
filing
cabinets,
ours
is
in
the
cloud.
You
built
Rock
n’
Roll…
that
one’s
a
keeper!!
11. Shoot
the
Coffee
Machine…
All
your
data
belongs
to:
Samsung
(your
TV
viewing
habits,
and
regular
screenshots)
Google…yes,
preay
much
anything
you
do
Apple…see
above
Your
car…welcome
to
the
infotainment
systems
Map
Apps….who
are
working
with
the
adverEsers
(and
your
car)
Social
media…that’s
more
your
fault
than
anyone
else!
Your
toaster…it’s
connected
to
the
smart-‐system
in
your
house
J
Your
coffee
company…they
KNOW
you
need
coffee
at
8am
Etc.
Welcome
to
the
Internet
of
everything,
all
your
data
belongs
to
????
14. Sobering
StaEsEcs
for
2014
EsEmated
$300
Billion
per
year
to
the
economy
Financial
impacts
(financial,
technology,
pharmaceuEcal)
Data
losses
(intellectual
property
etc.)
Over
300
“major”
breaches
Major
being
the
Really
nasty
ones….
80
Million
peoples
idenEEes
lost
That’s
just
the
ones
we
know
about…
Millions
of
new
malware
programs
“found”
Recycle
a
good
idea
and
re-‐use
it
to
target
other
data…
15. So
Far…2015
153,351,000
records
lost,
stolen,
taken
or
misplaced.
YOUR
IdenEty
Your
Healthcare
records
Your
credit
card,
bank
account
etc.
16. Healthcare
(less)
Since
record
keeping
on
breaches
started
(around
2005):
Healthcare
has
managed
to
lose
around
715,000,000
records
(Public
disclosure
and
Darknet
research)
That’s
EACH
of
us...Twice!
18. EvoluEon
The
bad
guys
USED
to
be
easy
to
spot
(clubs,
swords,
guns
etc.)
nowadays
they
are
likely
to
be
simply
armed
with
a
keyboard
or
a
USB
sEck.
21. Minions
RevoluEon!
We
are
more
than
JUST
a
number,
a
staEsEc
or
a
line
item
on
a
Cyber
Liability
insurance
claim!
22. The
Sharp
End
Simply
fed
up
with
the
human
element
and
how
they
handle
some
of
the
basic
security
issues
that
are
facing
them
in
this
day
and
age.
Done
dealing
with
companies,
organizaEons,
enEEes,
and
governments
that
simply
want
to
carry
on
going
along
in
the
same
manner.
Frustrated
and
resenbul
of
execuEves
who
don’t
care
or
who
feel
that
security
is
a
burden
or
something
that’ll
eventually
disappear.
Intolerant
of
humans
who
think
that
security
is
something
that
happens
to
others,
who
don’t
feel
they
need
to
be
concerned
by
it,
or
who
figure
that
someone
else
will
deal
with
it.
23. Horses!
You
can
lead
a
human
to
knowledge
but
you
can’t
make
him
think.
26. One:
Protect
YOUR
Data
We
spend
our
Eme
on
patching
our
computers,
updaEng
our
firewalls
and
renewing
our
anE-‐virus…
Wrong
approach
(don’t
stop
doing
this,
but
it’s
not
the
FOCUS)
YOUR
data:
Where
are
your
taxes?
(paper
or
online
or
on
the
computer?)
Where
do
you
keep
bank
records?
Where
do
you
keep
passwords?
(how
many
different
ones?)
Where
are
your
medical
records?
Social
Media:
Facebook
is
NOT
your
friend,
neither
is
Google
Ancestry
websites:
Amazing
places
to
research
family
AND
amazing
places
to
be
researched
on!
(Scam
arEsts
love
these
sites!)
27. One
Airline,
One
Month
How
many
of
these
are
encrypted
or
have
some
basic
“locate
me”
enabled?
…answer
NOT
many!
28. Two:
Know
Yourself
What
data
is
out
there
already
about
me?
Social
media
(Facebook
etc.)
What
data
do
I
have
stored
in
electronic
format?
Taxes?
Bank/Saving/Fidelity
accounts?
Passwords?
Who
has
access
to
my
data?
Friends
and
family
Caregivers
Where
IS
my
data?
Doctors/healthcare
providers
Shops/stores/Walgreen/CVS/Etc.
29. Simplifying
You
This
is
you
This
is
you
at
home
This
is
you
at
your
friends
This
is
your
family
This
is
you
at
the
doctors
facility
These
are
your
caregivers
YOU
are
everywhere.
So
am
I.
30. Three:
Who’s
Already
Inside?
We
always
focus
on
who’s
“out
there”
and
forget
people
already
inside
our
circle
of
trust.
Employees
Caregivers
Family
Friends
Our
electronics
How’s
that
computer
of
yours
working?
Phones,
iPads,
Fitbits
and
other
ways
in…
32. Grandchildren…
When
the
liale
one
wants
to
“borrow”
your
computer
When
your
kids
bring
their
“liale
ones”
over
to
spend
grandparent
Eme…
When
the
rugrats
are
gemng
too
rambuncEous
DON’T
LET
THEM
ON
YOUR
COMPUTER,
DON’T
LET
THEM
INSTALL
APPS
ON
YOUR
IPAD!
Taser
them…
in
the
long
run
it’s
simpler.
34. Four:
Vigilance
Increase
your
awareness
Do
a
liale
research
(you
do
have
the
Eme)
Increase
your
monitoring
How
onen
do
you
check
your
accounts?
Credit
monitoring
(the
good/bad/ugly)
Increase
the
quesEons
Second
“factor”
of
authenEcaEon
Those
patches
and
that
AnEvirus
blinky
light?
They
are
important…not
great
at
protecEon,
but
beaer
than
nothing!
35. NSA
IF
we
are
being
watched,
then
the
least
they
could
do
is
fix
the
spam
problem!!
36. Five:
It’s
a
Mobile
World…
A
Lot
of
what
we
know
is
going
mobile
Paying
for
your
shopping
with
your
phone
or
watch
Online
banking
right
from
the
phone
Social
media
A
Lot
of
what’s
going
mobile
is
NOT
secure
Password
storage
“handshakes”
between
systems
Who
made
the
applicaEon?
And
where’s
my
data
going?
We
CAN
use
the
mobile
world
for
good
Response
systems
Healthcare
remote
capabiliEes
(when
implemented
correctly)
37. If
You
Use
These…
123456
password
12345
12345678
qwerty
123456789
1234
baseball
dragon
football
monkey
letmein
abc123
111111
mustang
access
shadow
master
michael
superman
696969
123123
batman
trustno1
Don’t
use
a
favorite
sport
as
your
password:
“baseball”
and
“football”
are
in
top
10,
and
“hockey,”
“soccer”
and
“golfer”
are
in
the
top
100.
Don’t
use
a
favorite
team
either:
“yankees,”
“eagles,”
“steelers,”
“rangers,”
and
“lakers”
are
all
in
the
top
100.
Don’t
use
your
birthday
or
especially
just
your
birth
year:
1989,
1990,
1991,
and
1992
are
all
in
the
top
100.
Don’t
use
baby
names
as
sources
for
picking
passwords:
“michael,”
“jennifer,”
“thomas,”
“jordan,”
“hunter,”
“michelle,”
“charlie,”
“andrew,”
and
“daniel”
are
all
in
the
top
50.
38. Six:
Time…
Take
the
Eme
to
understand
this
world
Most
of
us
in
it
don’t
profess
to
understand
it
all!
We
rely
on
friends
and
colleagues
to
help
us
Take
the
Eme
to
research
this
world
Social
engineering
is
defeated
9
Emes
out
of
10
Scams
and
basic
aaacks
are
defeated
this
way
Take
the
Eme
to
ask
quesEons
about
this
world
Most
of
us
in
it
are
happy
to
help
Many
of
us
dedicate
Eme
to
help
mentor
people
Many
of
us
work
for
chariEes,
we
are
happy
to
help!
Google
can
be
a
friend
someEmes…research
online.
41. Countdown…
Sweepstake
Scams:
You
are
ALWAYS
a
winner…unEl
you
loose
your
money
because
of
the
fees
or
taxes
you
have
to
pay
in
advance
Click
Here!
Click
here
to
watch
“x”…while
I
download
malware
to
your
computer.
Robot
Calling:
Hi,
I’m
from
Visa
and
I
can
lower
your
interest
rate/help
pay
off
your
card….Oh,
and
I
can
steal
the
number.
Government
Grants:
You’ve
been
selected
to
parEcipate
in
the
grant
program,
all
you
need
to
do
is
pay
the
taxes
or
fees….and
I
take
your
informaEon.
Family
Emergency!
I’m
stuck
in
Europe
because
I
got
robbed,
please
help…send
me
money
please…
let
me
rob
you
while
tugging
at
heartstrings.
43. ConEnues...
Medical
Alert:
Your
family
is
concerned,
have
this
device
sent
to
you,
give
us
your
credit
card
or
bank
info…
No
device
and
an
empty
credit
card…
Copycat
Website:
If
it’s
seems
too
good
to
be
true…then
it
probably
is!
Counterfeit
heaven.
Fake
Caller
ID:
Your
number
is
calling
you??
Simple
way
to
get
you
to
pick
up
the
phone…and
that’s
½
my
baale,
if
I
can
engage
you
then
I
win!
Technical
support:
Hi
I’m
from
Microson/IBM/CenturyLink
your
computer
is
infected,
let
me
help
you…oh
and
while
I’m
doing
that
I’m
going
to
install
a
back
door.
ArresEng
You!
IRS,
Feds
or
someone
else
is
coming
to
serve
a
warrant
unless
you
pay
the
bond/fees/amount
due…
Pay
now
over
the
phone
while
I
steal
your
informaEon.
44. We
Call
it
Social
Engineering
Fake
e-‐mails
are
more
common
than
ever.
20%
of
people
will
fall
for
fake
E-‐Mail,
75%
will
fall
for
fake
websites
and
fake
calls.
Sites
that
seem
to
be
legiEmate
and
“require”
the
receiver
to
enter
their
username
and
password.
Same
goes
for
phone
calls
by
fake
federal
agents,
etc.,
asking
for
password
compliance
or
informaEon.
We
need
beaer
communicaEon
on
how
to
avoid
such
scenarios.
45. The
Internet…
There
are
a
few
of
us
who’d
like
to
do
this
to
“some”
of
the
users
of
the
Internet…
46. Good
Grief
More??
TelemarkeEng
Fraud:
Yes
the
offer
IS
great,
Yes
I’ll
act
now…here’s
me
hanging
up
the
phone.
Nigerian
Leaer
or
“419”
Fraud:
No!
The
banker
in
Kenya
is
NOT
simng
on
$6M
and
No
he
won’t
share
it
with
you!
IdenEty
Then
and
Credit
Card
Fraud:
Really
quesEon
EVERY
Eme
you
hand
over
your
credit
card!!
Craigslist
schemes:
Sending
me
a
check
for
$2000
to
pay
for
a
$100
item
is
NOT
going
to
get
you
$1900
of
MY
money…Goodbye!
RedempEon
/
Strawman
/
Bond
Fraud:
Those
bank
document
or
bond
documents
are
probably
Photoshopped!
Internet
AucEon
Fraud:
Only
thing
here
is
PLEASE
do
your
research!!
If
in
doubt
walk
away!
OR
put
the
money
in
the
middle
unEl
ALL
parEes
are
happy.
Non-‐Delivery
of
Merchandise:
Do
your
homework
and
research!
“Reach
out
and
touch
someone”
trust
and
then
VALIDATE!
48. Ok,
Enough
Scams
(For
Now)
What’s
the
Government
got
to
say
about
this?
49. Government’s
PosiEon
Robert
Mueller,
former
FBI
Director,
recently
stated:
“There
are
only
two
types
of
companies:
Those
that
have
been
hacked,
and
those
that
will
be.”
Even
that
is
merging
into
one
category:
“Those
that
have
been
hacked
and
will
be
again”
50. Our
Federal
Colleagues
FBI’s
got
a
scam
safety
site
(PLEASE
visit
it!)
Health
Care
Fraud
or
Health
Insurance
Fraud
Counterfeit
PrescripEon
Drugs
Funeral
and
Cemetery
Fraud
Fraudulent
“AnE-‐Aging”
Products
TelemarkeEng
Fraud
Internet
Fraud
Investment
Schemes
Reverse
Mortgage
Scams
haps://www.si.gov/scams-‐safety/
51. FBI’s
Common
Denominator?
Carefully
review…
Be
mindful…
Be
an
informed
consumer…
Research
thoroughly…
Always
ask,
always
check…
Be
suspicious…
It
ALL
comes
down
to
someone
being
able
to
FOOL
YOU,
please
don’t
let
them
win.
52. Simple
SoluEons
We
talk
about
reducing
your
footprint
on
the
Internet…this
is
one
step,
get
ON
the
list
and
stop
the
callers.
(This
way
you
get
to
filter
out
the
scams
a
LOT
more
effecEvely)
53. Simple
SoluEons
We
talk
about
watching
yourself…this
is
one
step,
research
the
opEons.
(This
way
you
get
to
have
someone
else
watch
YOU
24*7)
55. Passwords…
This
IS
how
we
feel
when
you
leave
your
password
on
a
post-‐it-‐note,
under
the
keyboard,
taped
to
the
desk,
in
the
draw
or
use
the
SAME
one
all
the
Eme…
58. Remember
the
Why
You?
You
don’t
like
to
ask
quesEons
You
don’t
like
to
admit
you
might
be
wrong
You
don’t
have
the
“nasEness”
that
modern
society
has
You
have
money,
healthcare
history
and
Eme
You
have
credit
history
Technology
is
moving
faster
than
most
of
us
can
track
You
are
polite,
civilized
and
trust
people
You
make
bad
witnesses
(exploitaEon
Emeline
etc.)
You
make
an
aaracEve
target
(long/fruibul
life
etc.)
59. Why
NOT
you!
You
now
ask
a
LOT
more
quesEons…AND
YOU
RESEARCH!
You
will
admit
when
you’ve
goaen
it
wrong…AND
YOU
LEARN.
You
are
a
liale
more
cynical…TRUST
AND
VALIDATE.
You
have
money
and
healthcare
history…AND
YOU
PROTECT
IT!
You
have
credit
history…AND
YOU
MONITOR
IT!
Technology
is
moving
faster…AND
YOU
ASK
QUESTIONS!
You
are
polite,
civilized
and
trust
people…AND
VALIDATE
THEM!
You
make
bad
witnesses…BUT
YOU
KNOW
HOW
TO
RECORD
J
You
make
a
much
LESS
ATTRACTIVE
TARGET!
61. With
Thanks
To…
If
we’ve
goaen
this
far
and
we’ve
had
quesEons…
then
THANK
YOU!!
To
Mark
for
inviEng
me,
thank
you!
To
Eddie…for
everything!
Warner
Bros.
and
Chuck
Jones
for
the
various
images.
The
Minions,
the
squirrels,
the
cats
and
other
things
doaed
throughout
this
presentaEon.
62. “So
long
and
thanks
for
all
the
fish”
Douglas
Adams,
you
are
missed.