Erik de Jong - Cybersecurity - waar gaat het fout?Michiel Cazemier
Erik de Jong - Cybersecurity - waar gaat het fout?
Fox-IT
Holland Strikes Back 2016
www.hollandstrikesback.nl
Holland Strikes Back 2016
www.hollandstrikesback.nl
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
Learn about phishing, the internet's top cyberthreat, in this slide deck. To view the corresponding on-demand webinar, click here: http://bit.ly/2jowgvt
Erik de Jong - Cybersecurity - waar gaat het fout?Michiel Cazemier
Erik de Jong - Cybersecurity - waar gaat het fout?
Fox-IT
Holland Strikes Back 2016
www.hollandstrikesback.nl
Holland Strikes Back 2016
www.hollandstrikesback.nl
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
Learn about phishing, the internet's top cyberthreat, in this slide deck. To view the corresponding on-demand webinar, click here: http://bit.ly/2jowgvt
What do companies such as Slack and Porter Airlines have in common? Not only do they have well-designed interfaces that get your users’ job done, but also content that is clear, intentional, and serves a unique purpose. In an age where great design is won or lost at the user experience (UX) level, how can we ensure that we deliver websites or apps that are not just pretty but also purposeful in both design and content?
In this session, we will be using a UX research technique called “Contextual Personas” to kickstart your content design process. We will be mashing up the time-honoured techniques of persona creation – such as user interviews, contextual inquiry, etc. – with strategic foresight methods to identify some user types and content strategies for your target audience. By identifying users across their most critical and uncertain needs, we will be able to pinpoint what exactly do they want out of our product or service and how we can achieve their goals through our copy, through our design, and throughout their user journey.
Don’t let “lorem ipsum” hold you back! Let contextual personas deliver the insight you need to build digital products that users love.
(Presented at WordCamp Toronto, August 7, 2016)
Real Estate - Open the Door to Your Next Sale Using an Effective Social Media...Charlie Conard
97% of businesses use social media; only 20% are seeing measurable results. How are you doing?
If you’re frustrated, you’re not alone. Today’s business owner not only has be an expert at what they do, but they also are expected to have a presence and reach to current and potential customers on social media.
This seminar will help you develop a Social Media Strategy and Action Plan that can lead towards positive results for your business.
Some of what you will learn includes:
- How social media works and why you need to be using it
An action plan that saves you 75% of the time you would spend without one
- A survey of five popular social media platforms, how they differ from one another, and what kind of businesses find the most success with each one.
- Facebook, Twitter, Instagram, Pinterest and LinkedIn: What’s Next?
About the Speaker
Charlie Conard, co-founder and principal of Social Go To, specializes in creating social media strategies that grow audiences, increase engagement, and transform prospects into customers. Charlie has worked with brands including L’Oreal, Mount Sinai Medical Center, Continental Airlines, United Way, Publishers Weekly, and KitchenAid.
Slides with annotation from a seminar presented to a prominent real estate brokerage on 01/13/16.
Step-by-step guide to writing media pitches to gain press attention, getting your brand noticed, and measure public relations success without the PR flack. Especially relevant for the tech and startup industry, but with key insights for B2B and B2C consumer brands. Includes key steps to writing a great pitch, sample templates and common missteps.
Also features quick tips on how to measure PR success by utilizing coverage tracking, mentions, Google Analytics, and branded searches.
More information at: www.pinegrovepr.com
Want to get in touch?
ashley@pinegrovepr.com
Written and published by Pinegrove Public Relations, Seattle, WA, all content belongs directly to PPR.
De-Mystifying Twitter for Small Business - 2016Charlie Conard
Cut through the common confusion about Twitter & discover how this social media platform can help grow your small business. Charlie Conard answers common questions about Twitter for business owners, including:
- Getting Your Business started on Twitter
- How do Hashtags work, & Why they are Important?
- Learning to Write an effective Tweet –in under 140 Characters!
- Case Studies: See how Twitter has helped other Small Business Owners Transform
You’ll leave this lecture with a clear understanding of how Twitter works & the ways it can help your small business build sales.
About the Speaker
Charlie Conard, co-founder and principal of Social Go To, specializes in creating social media strategies that grow audiences, increase engagement, and transform prospects into customers. Charlie has worked with brands including L’Oreal, Mount Sinai Medical Center, Continental Airlines, United Way, Publishers Weekly, and KitchenAid.
Select slides with annotation from a seminar presented at the New York Science, Industry, and Business Library Small Business Resource Center (New York Public Library) on 02/09/16.
Learn how to pitch your little startup heart out and actually get somewhere with the media peeps!
Join tech journalist Erica Swallow for an overview of how to interact with tech media as a startup. You'll learn the basics of PR for startups, including how to engage and build relationships with the media, how to craft a press release, top tips for writing an awesome email pitch, what "exclusive" and "embargo" mean, which assets are useful for journalists and what not to do. This class will also include a number of case studies from recent pitches that Erica has received. She will show you a behind-the-scenes look at how she was pitched and where each pitch led. Of course, questions are welcome, so bring your queries and a notebook for taking down your top learnings!
Learn more about Erica's class on Skillshare: http://www.skillshare.com/PR-for-Startups/2036846353
Why is it important to engage people in user research?Roman Schöneboom
If a tree falls in a rainforest and no one sees it, did it really happen? The same goes for research – if your insights live in a shiny report in your execs drawer gathering dust , what good did that research do to the humans that use your services every day? The act of sharing your research insights and getting it into the collective design brain of your team is as important as the research it self. Service Designer for One Tesco, Roman Schoeneboom, shares the techniques we have been using to bring our design team and stakeholders to the coal face of customer research. One Tesco is a service design led transformation programme at Tesco, which places customer need firmly at the heart of the design process.
Growth Hackers Amsterdam Meetup - PR Hacking with Robin Wauters, Founding Edi...Growth Tribe
Growth Hackers Amsterdam Meetup invited Robin Wauters, Founding Editor of Tech.eu to give a workshop about PR Hacking. Wednesday 15 April 2015
Twitter Robin Wauters: https://twitter.com/robinwauters
Growth Hackers Amsterdam Meetup: http://www.meetup.com/Growth-Hackers-Amsterdam/
Clever Hacks for Hiring – June 2016 LondonLever Inc.
Valuable recruiting tips on the topics of how to write reachouts well; how to create a human candidate experience; and how to punch above your weight in employer branding, courtesy of Talentful, Lost My Name and Lever.
Shared responsibility model: Why and how to choose the right 2 fa method for ...ConorGilsenan1
Service providers have a responsibility to provide two factor authentication (2FA) and help their users make informed decisions about which 2FA method(s) to enable.
In this talk, I discuss the AWS Shared Responsibility Model and highlight that implementing 2FA follows a similar pattern. I dive into the details of the 4 most common methods of 2FA and explain the security and usability tradeoffs of each. I cover SMS, time-based one-time passwords (TOTP), push notifications, and Universal 2nd Factor (U2F).
Audio and slides on YouTube: https://www.youtube.com/watch?v=ub7tU6ZLxAs
Google Trends, Grammarly, Content Audit, Prowly and many more.
Learn about tools that can help you find out what content is important to your audience and how to build and cater content to them.
About Prowly Academy:
Our program is designed for professionals looking to expand their knowledge of the Brand Journalism and Public Relations field. Here, you can stay up to date through today’s ever changing media landscape and learn key insights that you can apply to your work immediately. Take a look at our course offerings and feel free to ask us a question. We look forward to exploring the ins and out of these fascinating topics with you: http://academy.prowly.com/
Effective 2FA - Part 1: the technical stuffConorGilsenan1
Two-factor authentication (2FA) is the most straightforward way for companies to drastically improve the security of their user authentication process. However, not all 2FA implementations are created equal. Thinking of quickly throwing together a workflow using SMS and calling it a day? Think again! Though popular, 2FA via SMS has many security issues and was actually deprecated by NIST in 2017. In this presentation, I dive into the technical details of the most common 2FA implementations and highlight security and usability trade-offs. You will learn how to develop a 2FA implementation strategy that will best serve your users.
What do companies such as Slack and Porter Airlines have in common? Not only do they have well-designed interfaces that get your users’ job done, but also content that is clear, intentional, and serves a unique purpose. In an age where great design is won or lost at the user experience (UX) level, how can we ensure that we deliver websites or apps that are not just pretty but also purposeful in both design and content?
In this session, we will be using a UX research technique called “Contextual Personas” to kickstart your content design process. We will be mashing up the time-honoured techniques of persona creation – such as user interviews, contextual inquiry, etc. – with strategic foresight methods to identify some user types and content strategies for your target audience. By identifying users across their most critical and uncertain needs, we will be able to pinpoint what exactly do they want out of our product or service and how we can achieve their goals through our copy, through our design, and throughout their user journey.
Don’t let “lorem ipsum” hold you back! Let contextual personas deliver the insight you need to build digital products that users love.
(Presented at WordCamp Toronto, August 7, 2016)
Real Estate - Open the Door to Your Next Sale Using an Effective Social Media...Charlie Conard
97% of businesses use social media; only 20% are seeing measurable results. How are you doing?
If you’re frustrated, you’re not alone. Today’s business owner not only has be an expert at what they do, but they also are expected to have a presence and reach to current and potential customers on social media.
This seminar will help you develop a Social Media Strategy and Action Plan that can lead towards positive results for your business.
Some of what you will learn includes:
- How social media works and why you need to be using it
An action plan that saves you 75% of the time you would spend without one
- A survey of five popular social media platforms, how they differ from one another, and what kind of businesses find the most success with each one.
- Facebook, Twitter, Instagram, Pinterest and LinkedIn: What’s Next?
About the Speaker
Charlie Conard, co-founder and principal of Social Go To, specializes in creating social media strategies that grow audiences, increase engagement, and transform prospects into customers. Charlie has worked with brands including L’Oreal, Mount Sinai Medical Center, Continental Airlines, United Way, Publishers Weekly, and KitchenAid.
Slides with annotation from a seminar presented to a prominent real estate brokerage on 01/13/16.
Step-by-step guide to writing media pitches to gain press attention, getting your brand noticed, and measure public relations success without the PR flack. Especially relevant for the tech and startup industry, but with key insights for B2B and B2C consumer brands. Includes key steps to writing a great pitch, sample templates and common missteps.
Also features quick tips on how to measure PR success by utilizing coverage tracking, mentions, Google Analytics, and branded searches.
More information at: www.pinegrovepr.com
Want to get in touch?
ashley@pinegrovepr.com
Written and published by Pinegrove Public Relations, Seattle, WA, all content belongs directly to PPR.
De-Mystifying Twitter for Small Business - 2016Charlie Conard
Cut through the common confusion about Twitter & discover how this social media platform can help grow your small business. Charlie Conard answers common questions about Twitter for business owners, including:
- Getting Your Business started on Twitter
- How do Hashtags work, & Why they are Important?
- Learning to Write an effective Tweet –in under 140 Characters!
- Case Studies: See how Twitter has helped other Small Business Owners Transform
You’ll leave this lecture with a clear understanding of how Twitter works & the ways it can help your small business build sales.
About the Speaker
Charlie Conard, co-founder and principal of Social Go To, specializes in creating social media strategies that grow audiences, increase engagement, and transform prospects into customers. Charlie has worked with brands including L’Oreal, Mount Sinai Medical Center, Continental Airlines, United Way, Publishers Weekly, and KitchenAid.
Select slides with annotation from a seminar presented at the New York Science, Industry, and Business Library Small Business Resource Center (New York Public Library) on 02/09/16.
Learn how to pitch your little startup heart out and actually get somewhere with the media peeps!
Join tech journalist Erica Swallow for an overview of how to interact with tech media as a startup. You'll learn the basics of PR for startups, including how to engage and build relationships with the media, how to craft a press release, top tips for writing an awesome email pitch, what "exclusive" and "embargo" mean, which assets are useful for journalists and what not to do. This class will also include a number of case studies from recent pitches that Erica has received. She will show you a behind-the-scenes look at how she was pitched and where each pitch led. Of course, questions are welcome, so bring your queries and a notebook for taking down your top learnings!
Learn more about Erica's class on Skillshare: http://www.skillshare.com/PR-for-Startups/2036846353
Why is it important to engage people in user research?Roman Schöneboom
If a tree falls in a rainforest and no one sees it, did it really happen? The same goes for research – if your insights live in a shiny report in your execs drawer gathering dust , what good did that research do to the humans that use your services every day? The act of sharing your research insights and getting it into the collective design brain of your team is as important as the research it self. Service Designer for One Tesco, Roman Schoeneboom, shares the techniques we have been using to bring our design team and stakeholders to the coal face of customer research. One Tesco is a service design led transformation programme at Tesco, which places customer need firmly at the heart of the design process.
Growth Hackers Amsterdam Meetup - PR Hacking with Robin Wauters, Founding Edi...Growth Tribe
Growth Hackers Amsterdam Meetup invited Robin Wauters, Founding Editor of Tech.eu to give a workshop about PR Hacking. Wednesday 15 April 2015
Twitter Robin Wauters: https://twitter.com/robinwauters
Growth Hackers Amsterdam Meetup: http://www.meetup.com/Growth-Hackers-Amsterdam/
Clever Hacks for Hiring – June 2016 LondonLever Inc.
Valuable recruiting tips on the topics of how to write reachouts well; how to create a human candidate experience; and how to punch above your weight in employer branding, courtesy of Talentful, Lost My Name and Lever.
Shared responsibility model: Why and how to choose the right 2 fa method for ...ConorGilsenan1
Service providers have a responsibility to provide two factor authentication (2FA) and help their users make informed decisions about which 2FA method(s) to enable.
In this talk, I discuss the AWS Shared Responsibility Model and highlight that implementing 2FA follows a similar pattern. I dive into the details of the 4 most common methods of 2FA and explain the security and usability tradeoffs of each. I cover SMS, time-based one-time passwords (TOTP), push notifications, and Universal 2nd Factor (U2F).
Audio and slides on YouTube: https://www.youtube.com/watch?v=ub7tU6ZLxAs
Google Trends, Grammarly, Content Audit, Prowly and many more.
Learn about tools that can help you find out what content is important to your audience and how to build and cater content to them.
About Prowly Academy:
Our program is designed for professionals looking to expand their knowledge of the Brand Journalism and Public Relations field. Here, you can stay up to date through today’s ever changing media landscape and learn key insights that you can apply to your work immediately. Take a look at our course offerings and feel free to ask us a question. We look forward to exploring the ins and out of these fascinating topics with you: http://academy.prowly.com/
Effective 2FA - Part 1: the technical stuffConorGilsenan1
Two-factor authentication (2FA) is the most straightforward way for companies to drastically improve the security of their user authentication process. However, not all 2FA implementations are created equal. Thinking of quickly throwing together a workflow using SMS and calling it a day? Think again! Though popular, 2FA via SMS has many security issues and was actually deprecated by NIST in 2017. In this presentation, I dive into the technical details of the most common 2FA implementations and highlight security and usability trade-offs. You will learn how to develop a 2FA implementation strategy that will best serve your users.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...JeyaPerumal1
A cellular network, frequently referred to as a mobile network, is a type of communication system that enables wireless communication between mobile devices. The final stage of connectivity is achieved by segmenting the comprehensive service area into several compact zones, each called a cell.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Melanie Rieback - The Good, the Bad, and the Ugly
1. Dr. Melanie Rieback, John Sinteur, Niko Schmidt,
Marcus Bointon, Boi Sletterink, Frouke van Ommeren,
Rob Wiegertjes, & Peter Mosmans
Oct 4, 2016 melanie@radical.sexy
Adventures in
Spearphishing: the Good,
the Bad, and the Ugly
2. Oct 4, 2016
Introduction
● A customer asked us to
conduct their spearphish
test for 2016.
● Objectives:
– Spearphish the entire
organization (~150
people)
● “Low and slow” phishing
attack
3. Oct 4, 2016
Setting the Stage
● We registered an
innocuous sounding
domain:
clickanalytics.amsterdam
● Malware is out of scope.
Click tracking only.
● We setup a landing page
that says 'insert malicious
code here', and then
redirects the victim to what
he expects to see.
4. Oct 4, 2016
Our first experiment...
● We started our targeting
slowly and patiently...
● We know via-via that our
PoC likes running
● So let's send him a
RUNNING newsletter!
5. Oct 4, 2016
We shoot...
● We grabbed a Dutch
running newsletter, and
instrumented the URLs to
direct to our landing page.
● It took us a day to put
together a good looking
pretext
● Excited and hopeful, we
sent off the email...
6. Oct 4, 2016
We miss.
● We waited...
● And waited...
● He didn't click.
● Hmmmm.. maybe this is
going to be harder than
we thought.
● Especially if we need to
sent 'targeted' emails to
~150 people
7. Oct 4, 2016
Okay. Time for Plan B.
● The realization slowly
dawns on us that it will be
impossible to individually
target 150 people within
time and budget.
● So we need to take a
broader approach.
● Automation is going to be
needed...
8. Oct 4, 2016
Coming up with a new idea..
● How about using spam as a
phishing vector?
● People are used to receiving
it. (Also at work).
● Spam causes annoyance
rather than suspicion
● It's easy to harvest, rip
instrument, and send in an
automated fashion (crucial
for targeting 150 people).
9. Oct 4, 2016
Targeted vs. Generic
●
Less targeted "spam" (i.e. fake
LinkedIn invites, obviously
commercial advertisements,
etc..) is, ironically enough, far
more effective in getting clicks
●
It is also far less risky (in terms
of getting caught) than phishing
emails that are more targeted to
their audience
13. Oct 4, 2016
This gave us some knobs to turn
●
We could adjust the
batch sizes and the
degree of "targeting"
(tailoring the pretext
towards the organization)
●
This gave us some
surprising results....
15. Oct 4, 2016
Detailed Breakdown
●
Total target addresses: 145
●
Total mailings: 14
●
Total messages: 528
●
Total opened: 261
●
Total clicks: 46
●
Unique click IP addresses: 29
●
Most clicked pretext was
LinkedIn: 8
16. Oct 4, 2016
Arch Nemesis: The Spamfilter
●
Our largest hindrance with the
"spam-based" phishing approach
was the spam filter.
●
We started researching SPF
values, to get through the spam
filter.
●
We found that the optimum batch
size of "phishing spam" seems to
be: batches large enough to hit *as
many targets as possible*, without
getting marked by the spam filter.
17. Oct 4, 2016
The gig is up!
●
As we got closer to the
deadline, we got increasingly
aggressive with our targeting
and batch sizes.
●
In short.. we wanted to know
how much we could “push it”
before we got caught.
●
A Bridge Too Far: fake Mozilla
security update to the CSIRT
●
6 clicks (presumably from a
sandboxed environment) ;-)
18. Oct 4, 2016
The Excrement Hits the Fan
●
Things really exploded when
our SETUP pretext escaped the
customer environment
●
Some staff members posted
angry tweets about SETUP for
“spamming” them
●
SETUP thought they had a data
breach, and launched a full
investigation
●
Angry folks. Damage control.
19. Oct 4, 2016
Ethical Issues in Spearphishing
●
This leads to some interesting
ethical issues, actually..
●
It's industry standard to use 3rd
parties as pretexts for phishing
tests. But is that okay?
●
If not, how can we do that
properly?
●
Can we put together a pool of
organizations that give
permission for this?
20. Oct 4, 2016
Technical Lessons Learned
●
Check SPF and DKIM on
inbound email
●
Disable default image loading in
email clients
●
Flag newly registered domains
as suspicious
●
Security awareness training
●
Monitor network traffic (useful
for incident response later)