SlideShare a Scribd company logo
@NTXISSA			#NTXISSACSC4
Hacking	Performance	Management
The	Blue	Green	Game
Dr.	Branden	R.	Williams
Director
Union	Bank
8	October	2016
@NTXISSA			#NTXISSACSC4
A quick poll
(Write your answers down)
Before	we	start…
@NTXISSA			#NTXISSACSC4
• 1.	Performance	measures:	
• a.	Have	little	or	no	impact	on	behavior	
• b.	Have	a	moderate	impact	on	behavior,	but	are	
not	a	major	factor	
• c.	Determine	how	individuals	behave
@NTXISSA			#NTXISSACSC4
• 2.	It	is	most	important	that	performance	
measures	should:	
• a.	Accurately	reflect	past	performance	
• b.	Correctly	influence	future	behaviors
@NTXISSA			#NTXISSACSC4
• 3.	Performance	measurement	should	focus	
on	the	department	level	and	encourage	
optimal	departmental	performance.
• a.	True	
• b.	False
@NTXISSA			#NTXISSACSC4
Game Theory Primer:
The Prisoner’s Dilemma
A	Quick	Primer
Source:	https://youtu.be/t9Lo2fgxWHw
Stay	Silent	(Cooperate) Confess	(Defect)
Stay	Silent	
(Cooperate)
(-1,	-1) (-3,	0)
Confess	
(Defect)
(0,	-3) (-2,	-2)
Prisoner	Bob
Prisoner	Alice
@NTXISSA			#NTXISSACSC4
COMMON QUIPS ABOUT PERFORMANCE
MANAGEMENT
@NTXISSA			#NTXISSACSC4
• Kerr	(1975)	argues	that	formal	reward	systems	should	positively	
reinforce	desired	behavior,	and	not	constitute	an	obstacle	for	
the	organization	and	its	employees	to	overcome.
• Johnson	and	Kaplan	(1987)	expose	the	inherent	flaws	of	
traditional	management	accounting	systems	and	describe	
dysfunctional	behaviors	from	traditional	performance	measures.	
(Management	Accounting)
• Kaplan	and	Norton	(1992,	1996)	further	highlight	the	
weaknesses	of	traditional	measurement	systems	that	lead	to	
inappropriate	behaviors	such	as	short-term	thinking,	lack	of	
strategic	focus,	failure	to	reinforce	continuous	improvement,	
and	the	resulting	suboptimal	system	performance.	(Balanced	
Scorecard)	
Copied	and	formatted	from	Umble &	Umble (2012).
@NTXISSA			#NTXISSACSC4
• Goldratt (1990)	wrote	“Tell	me	how	you	measure	
me,	and	I	will	tell	you	how	I	will	behave.”	AND	“If	
you	measure	me	in	an	illogical	manner,	do	not	
complain	about	illogical	behavior.”	(The	Goal)
• Chenhall and	Langfield-Smith	(2007)	argue	that	the	
effectiveness	of	performance	measurement	
systems	depends	on	how	they	impact	individuals’	
behavior.	
• Radnor	and	Barnes	(2007)	suggest	that	
performance	measurement	systems	should	
promote	appropriate	behaviors.	
Copied	and	formatted	from	Umble &	Umble (2012).
@NTXISSA			#NTXISSACSC4
Any examples of poor performance
management?
Before	we	play	the	game…
@NTXISSA			#NTXISSACSC4
And now, on to the game!
@NTXISSA			#NTXISSACSC4
RULES
Let’s	play	the	Blue	Green	game	(Umble &	Umble)	
and	win	some	coffee!
Split	into	FOUR	TEAMS.
Elect	a	manager!
If	a	department	cannot	reach	a	
consensus	on	the	color	of	chip	to	
submit,	the	manager	is	authorized	to	
make	the	final	decision
Team	with	the	best	score	wins!
Every	member	of	the	winning	team	wins	a	$5	STARBUCKS	GIFT	CARD!
Yes,	they	actually	work,	and	I’m	not	messing	with	you.
@NTXISSA			#NTXISSACSC4
THE BLUE-GREEN GAME
Five rounds of play.
Notes:
• Points DOUBLE in Round 3
• Points TRIPLE in Round 5
Distribution	of	Chips Number	of	Points	Won/Lost
4	Blue,	0	Green Each department	wins	1	point
3	Blue,	1	Green Blue Departments
Green	Departments
Lose	1	point
Win 3	points
2	Blue,	2	Green Blue Departments
Green	Departments
Lose	2	point
Win 2	points
1	Blue, 3	Green Blue Departments
Green	Departments
Lose	3	point
Win 1	points
0	Blue,	4 Green Each	department	loses	1 point
@NTXISSA			#NTXISSACSC4
Round 1
Submit	a	chip!
@NTXISSA			#NTXISSACSC4
SCORING
Distribution	of	Chips Number	of	Points	Won/Lost
4	Blue,	0	Green Each department	wins	1	point
3	Blue,	1	Green Blue Departments
Green	Departments
Lose	1	point
Win 3	points
2	Blue,	2	Green Blue Departments
Green	Departments
Lose	2	points
Win 2	points
1	Blue, 3	Green Blue Departments
Green	Departments
Lose	3	points
Win 1	point
0	Blue,	4 Green Each	department	loses	1 point
@NTXISSA			#NTXISSACSC4
Round 2
Submit	a	chip!
@NTXISSA			#NTXISSACSC4
SCORING
Distribution	of	Chips Number	of	Points	Won/Lost
4	Blue,	0	Green Each department	wins	1	point
3	Blue,	1	Green Blue Departments
Green	Departments
Lose	1	point
Win 3	points
2	Blue,	2	Green Blue Departments
Green	Departments
Lose	2	points
Win 2	points
1	Blue, 3	Green Blue Departments
Green	Departments
Lose	3	points
Win 1	point
0	Blue,	4 Green Each	department	loses	1 point
@NTXISSA			#NTXISSACSC4
Round 3
Submit	a	chip!
@NTXISSA			#NTXISSACSC4
SCORING
Distribution	of	Chips Number	of	Points	Won/Lost
4	Blue,	0	Green Each department	wins	2	points
3	Blue,	1	Green Blue Departments
Green	Departments
Lose	2	points
Win 6	points
2	Blue,	2	Green Blue Departments
Green	Departments
Lose	4	points
Win 4	points
1	Blue, 3	Green Blue Departments
Green	Departments
Lose	6	points
Win 2	points
0	Blue,	4 Green Each	department	loses	2 points
@NTXISSA			#NTXISSACSC4
Round 4
Submit	a	chip!
@NTXISSA			#NTXISSACSC4
SCORING
Distribution	of	Chips Number	of	Points	Won/Lost
4	Blue,	0	Green Each department	wins	2	points
3	Blue,	1	Green Blue Departments
Green	Departments
Lose	2	points
Win 6	points
2	Blue,	2	Green Blue Departments
Green	Departments
Lose	4	points
Win 4	points
1	Blue, 3	Green Blue Departments
Green	Departments
Lose	6	points
Win 2	points
0	Blue,	4 Green Each	department	loses	2 points
@NTXISSA			#NTXISSACSC4
Round 5
FINAL ROUND
Submit	a	chip!
@NTXISSA			#NTXISSACSC4
SCORING
Distribution	of	Chips Number	of	Points	Won/Lost
4	Blue,	0	Green Each department	wins	3	points
3	Blue,	1	Green Blue Departments
Green	Departments
Lose	3	points
Win 9	points
2	Blue,	2	Green Blue Departments
Green	Departments
Lose	6	points
Win 6	points
1	Blue, 3	Green Blue Departments
Green	Departments
Lose	9	points
Win 3	points
0	Blue,	4 Green Each	department	loses	3 points
@NTXISSA			#NTXISSACSC4
AND THE WINNER IS….
Each	group	announce	their	points
@NTXISSA			#NTXISSACSC4
A quick poll
(Write your answers down)
Have	things	changed?
@NTXISSA			#NTXISSACSC4
• 1.	Performance	measures:	
• a.	Have	little	or	no	impact	on	behavior	
• b.	Have	a	moderate	impact	on	behavior,	but	are	
not	a	major	factor	
• c.	Determine	how	individuals	behave
@NTXISSA			#NTXISSACSC4
• 2.	It	is	most	important	that	performance	
measures	should:	
• a.	Accurately	reflect	past	performance	
• b.	Correctly	influence	future	behaviors
@NTXISSA			#NTXISSACSC4
• 3.	Performance	measurement	should	focus	
on	the	department	level	and	encourage	
optimal	departmental	performance.
• a.	True	
• b.	False
@NTXISSA			#NTXISSACSC4
What did we learn?
Let’s	debrief	before	the	next	slides.
@NTXISSA			#NTXISSACSC4
RESULTS
Silos	promote	bad	behavior,	allowing	each	
organization	to	attempt	to	maximize	their	payoffs.
Rational	players	act	to	maximize	their	
payoffs,	even	at	the	expense	of	others
Poor	transparency	of	goals	and	
performance	promotes	bad	behavior
Given	the	opportunity,	individuals	will	
take	advantage	of	poorly	constructed	
plans
Pro	tip:	TEST	performance	management	systems	after	you	construct	
them.	See	what	would	happen	if	you	aim	to	maximize	a	particular	
payoff.	Reward	systems	are	effective,	at	times	to	a	determent!
@NTXISSA			#NTXISSACSC4
TYING TO SECURITY
Organizational	metrics	are	often	not	optimized	to	
allow	employees	to	contribute	to	global	optimum.
Security	metric	of	most	closed	
vulnerabilities
Security	metric	of	most	blocked	
attacks	(which	is	sketch	to	begin	
with)
Number	of	systems	moved	into	
compliance	with	X	standard
• Better	Options:
%	of	systems	that	meet	X
Length	of	security	patch	deployment,	by	severity
@NTXISSA			#NTXISSACSC4
GAME THEORY FUN
People	often	take	aggressive	postures	that	lead	to	mutually	bad	outcomes	even	
though	mutual	cooperation	is	mutually	preferable.
Even	if	everyone	agrees	that	an	outcome	is	everyone’s	favorite,	they	might	not	get	
that	outcome.
Closing	roads	can	improve	everyone’s	commute	time.	
Everyone	might	mimic	everyone	else	just	because	two	people	chose	to	do	the	
same	thing.
You	shouldn’t	try	to	maximize	your	score	in	Words	with	Friends/Scrabble.	
As	drug	tests	become	more	accurate,	they	should	be	implemented	less	often.	
Source:	https://williamspaniel.com/2014/05/25/game-theory-is-really-counterintuitive/
@NTXISSA			#NTXISSACSC4
References
• Chenhall,	R.	H.,	&	Langfield-Smith,	K.	(2007).	Multiple	perspectives	of	performance	measures.	
European	Management	Journal,	25(4),	266–282.
• Goldratt,	E.	M.	(1990).	The	haystack	syndrome:	Sifting	information	out	of	the	data	ocean.	
Croton-on-Hudson,	NY:	North	River	Press.
• Johnson,	H.	T.,	&	Kaplan,	R.	S.	(1987).	Relevance	lost:	The	rise	and	fall	of	management	
accounting.	Boston,	MA:	Harvard	Business	School	Press.
• Kaplan,	R.	S.,	&	Norton,	D.	P.	(1992).	The	balanced	scorecard—measures	that	drive	
performance.	Harvard	Business	Review,	70(1),	71–79.
• Kaplan,	R.	S.,	&	Norton,	D.	P.	(1996).	Using	the	balanced	scorecard	as	a	strategic	management	
system.	Harvard	Business	Review,	74(1),	75–87.
• Kerr,	S.	(1975).	On	the	folly	of	rewarding	A,	while	hoping	for	B.	Academy	of	Management	
Journal,	18(4),	769–783.
• Poundstone,	W.	(1992).	Prisoner’s	dilemma.	New	York,	NY:	Doubleday.
• Radnor,	Z.	J.,	&	Barnes,	D.	(2007).	Historical	analysis	of	performance	measurement	and	
management	in	operations	management.	International	Journal	of	Productivity	and	
Performance	Management,	56(5/6),	384–396.
• Umble,	E.,	&	Umble,	M.	(2012).	Illustrating	the	Impact	of	Performance	Measurement	Systems	
on	Organizational	Performance:	The	Blue-Green	Game.	Decision	Sciences	Journal	of	Innovative	
Education,	10(3),	461–467.
@NTXISSA			#NTXISSACSC4
That’s	it,	that’s	the	end!
@BrandenWilliams
brw@brandenwilliams.com
@NTXISSA			#NTXISSACSC4@NTXISSA			#NTXISSACSC4
The Collin College Engineering Department
Collin College Student	Chapter	of	the	North	Texas	ISSA
North	Texas	ISSA	(Information	Systems	Security	Association)
NTX	ISSA	Cyber	Security	Conference	– October	7-8,	2016 37
Thank	you

More Related Content

What's hot

Are You Finding True Root Causes?
Are You Finding True Root Causes?Are You Finding True Root Causes?
Are You Finding True Root Causes?
EMMAIntl
 
DSA Presentation 3
DSA Presentation 3DSA Presentation 3
DSA Presentation 3
Akankshi Mody
 
Hurley Symposium 2017 fake news survey
Hurley Symposium 2017 fake news surveyHurley Symposium 2017 fake news survey
Hurley Symposium 2017 fake news survey
Reynolds Journalism Institute (RJI)
 
Crowdsourced Probability Estimates: A Field Guide
Crowdsourced Probability Estimates: A Field GuideCrowdsourced Probability Estimates: A Field Guide
Crowdsourced Probability Estimates: A Field Guide
Tony Martin-Vegue
 
How to run a social media listening program, presented by Keith McArthur
How to run a social media listening program, presented by Keith McArthurHow to run a social media listening program, presented by Keith McArthur
How to run a social media listening program, presented by Keith McArthur
SocialMedia.org
 
BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
BSides Augusta 2015 - Building a Better Analyst Using Cognitive PsychologyBSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
chrissanders88
 
Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1
Shiftup
 
ATSYD 13 - Social Media Monitoring Panel
ATSYD 13 - Social Media Monitoring Panel ATSYD 13 - Social Media Monitoring Panel
ATSYD 13 - Social Media Monitoring Panel Gavin Stewart
 
HR Innovation Day Celpax presentation 2018
HR Innovation Day Celpax  presentation 2018HR Innovation Day Celpax  presentation 2018
HR Innovation Day Celpax presentation 2018
HRM - HTWK Leipzig
 
Data is worthless
Data is worthlessData is worthless
Data is worthless
Prince Barai
 
The Behavioral Methods Behind Effective Communication
The Behavioral Methods Behind Effective CommunicationThe Behavioral Methods Behind Effective Communication
The Behavioral Methods Behind Effective Communication
Erik Johnson
 
Minding the Metacognitive Gap - BSides NOLA
Minding the Metacognitive Gap - BSides NOLAMinding the Metacognitive Gap - BSides NOLA
Minding the Metacognitive Gap - BSides NOLA
chrissanders88
 
Game On: Using Digital Games to Transform Learning and Assessment
Game On: Using Digital Games to Transform Learning and AssessmentGame On: Using Digital Games to Transform Learning and Assessment
Game On: Using Digital Games to Transform Learning and Assessment
SeriousGamesAssoc
 
Think Like Your Visitors to Increase Website Conversions
Think Like Your Visitors to Increase Website ConversionsThink Like Your Visitors to Increase Website Conversions
Think Like Your Visitors to Increase Website Conversions
Erik Johnson
 
Maximising Capital Investments - is guesswork eroding your bottomline?
Maximising Capital Investments - is guesswork eroding your bottomline?Maximising Capital Investments - is guesswork eroding your bottomline?
Maximising Capital Investments - is guesswork eroding your bottomline?
Michael McKeon
 
What people analytics can't capture
What people analytics can't captureWhat people analytics can't capture
What people analytics can't capture
UrvashiNigam1
 
Breaking up with "Engagement"
Breaking up with "Engagement"Breaking up with "Engagement"
Breaking up with "Engagement"
Dena Walker
 
How to Analyze Survey Data | SoGoSurvey
How to Analyze Survey Data | SoGoSurveyHow to Analyze Survey Data | SoGoSurvey
How to Analyze Survey Data | SoGoSurvey
Sogolytics
 
Ryan Ripley - The #NoEstimatesMovement
Ryan Ripley - The #NoEstimatesMovementRyan Ripley - The #NoEstimatesMovement
Ryan Ripley - The #NoEstimatesMovement
ProjectCon
 
Indeed Engineering and The Lead Developer Present: Tech Leadership and Manage...
Indeed Engineering and The Lead Developer Present: Tech Leadership and Manage...Indeed Engineering and The Lead Developer Present: Tech Leadership and Manage...
Indeed Engineering and The Lead Developer Present: Tech Leadership and Manage...
indeedeng
 

What's hot (20)

Are You Finding True Root Causes?
Are You Finding True Root Causes?Are You Finding True Root Causes?
Are You Finding True Root Causes?
 
DSA Presentation 3
DSA Presentation 3DSA Presentation 3
DSA Presentation 3
 
Hurley Symposium 2017 fake news survey
Hurley Symposium 2017 fake news surveyHurley Symposium 2017 fake news survey
Hurley Symposium 2017 fake news survey
 
Crowdsourced Probability Estimates: A Field Guide
Crowdsourced Probability Estimates: A Field GuideCrowdsourced Probability Estimates: A Field Guide
Crowdsourced Probability Estimates: A Field Guide
 
How to run a social media listening program, presented by Keith McArthur
How to run a social media listening program, presented by Keith McArthurHow to run a social media listening program, presented by Keith McArthur
How to run a social media listening program, presented by Keith McArthur
 
BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
BSides Augusta 2015 - Building a Better Analyst Using Cognitive PsychologyBSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
 
Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1
 
ATSYD 13 - Social Media Monitoring Panel
ATSYD 13 - Social Media Monitoring Panel ATSYD 13 - Social Media Monitoring Panel
ATSYD 13 - Social Media Monitoring Panel
 
HR Innovation Day Celpax presentation 2018
HR Innovation Day Celpax  presentation 2018HR Innovation Day Celpax  presentation 2018
HR Innovation Day Celpax presentation 2018
 
Data is worthless
Data is worthlessData is worthless
Data is worthless
 
The Behavioral Methods Behind Effective Communication
The Behavioral Methods Behind Effective CommunicationThe Behavioral Methods Behind Effective Communication
The Behavioral Methods Behind Effective Communication
 
Minding the Metacognitive Gap - BSides NOLA
Minding the Metacognitive Gap - BSides NOLAMinding the Metacognitive Gap - BSides NOLA
Minding the Metacognitive Gap - BSides NOLA
 
Game On: Using Digital Games to Transform Learning and Assessment
Game On: Using Digital Games to Transform Learning and AssessmentGame On: Using Digital Games to Transform Learning and Assessment
Game On: Using Digital Games to Transform Learning and Assessment
 
Think Like Your Visitors to Increase Website Conversions
Think Like Your Visitors to Increase Website ConversionsThink Like Your Visitors to Increase Website Conversions
Think Like Your Visitors to Increase Website Conversions
 
Maximising Capital Investments - is guesswork eroding your bottomline?
Maximising Capital Investments - is guesswork eroding your bottomline?Maximising Capital Investments - is guesswork eroding your bottomline?
Maximising Capital Investments - is guesswork eroding your bottomline?
 
What people analytics can't capture
What people analytics can't captureWhat people analytics can't capture
What people analytics can't capture
 
Breaking up with "Engagement"
Breaking up with "Engagement"Breaking up with "Engagement"
Breaking up with "Engagement"
 
How to Analyze Survey Data | SoGoSurvey
How to Analyze Survey Data | SoGoSurveyHow to Analyze Survey Data | SoGoSurvey
How to Analyze Survey Data | SoGoSurvey
 
Ryan Ripley - The #NoEstimatesMovement
Ryan Ripley - The #NoEstimatesMovementRyan Ripley - The #NoEstimatesMovement
Ryan Ripley - The #NoEstimatesMovement
 
Indeed Engineering and The Lead Developer Present: Tech Leadership and Manage...
Indeed Engineering and The Lead Developer Present: Tech Leadership and Manage...Indeed Engineering and The Lead Developer Present: Tech Leadership and Manage...
Indeed Engineering and The Lead Developer Present: Tech Leadership and Manage...
 

Viewers also liked

NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
North Texas Chapter of the ISSA
 
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic FailuresNTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic Failures
North Texas Chapter of the ISSA
 
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-VirusNTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-Virus
North Texas Chapter of the ISSA
 
NTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan HorseNTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan Horse
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret WeaponNTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
North Texas Chapter of the ISSA
 
NTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of DiscoveryNTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of Discovery
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & MitigationNTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
North Texas Chapter of the ISSA
 
NTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Day in the Life of a CISONTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Day in the Life of a CISO
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions ArchitectNTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human DashboardNTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
North Texas Chapter of the ISSA
 

Viewers also liked (20)

NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
 
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
 
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic FailuresNTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic Failures
 
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-VirusNTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-Virus
 
NTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan HorseNTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan Horse
 
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret WeaponNTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
 
NTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of DiscoveryNTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of Discovery
 
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & MitigationNTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
 
NTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Day in the Life of a CISONTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Day in the Life of a CISO
 
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions ArchitectNTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human DashboardNTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
 
NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
 

Similar to NTXISSACSC4 - Hacking Performance Management, the Blue Green Game

Guide to Social Video Marketing
Guide to Social Video MarketingGuide to Social Video Marketing
Guide to Social Video Marketing
Michelle Stinson Ross
 
Visualizing Search Analysis By Ryan Jones
Visualizing Search Analysis By Ryan JonesVisualizing Search Analysis By Ryan Jones
Visualizing Search Analysis By Ryan Jones
Search Marketing Expo - SMX
 
The Steampunk's Guide to Prioritizing and Publishing By Michelle Stinson Ross
The Steampunk's Guide to Prioritizing and Publishing By Michelle Stinson RossThe Steampunk's Guide to Prioritizing and Publishing By Michelle Stinson Ross
The Steampunk's Guide to Prioritizing and Publishing By Michelle Stinson Ross
Marketing Land
 
Busting Google's Black Box: Navigating Google Algorithms in a Post-Update Wor...
Busting Google's Black Box: Navigating Google Algorithms in a Post-Update Wor...Busting Google's Black Box: Navigating Google Algorithms in a Post-Update Wor...
Busting Google's Black Box: Navigating Google Algorithms in a Post-Update Wor...
Search Marketing Expo - SMX
 
How Atlassian's User Research Went Agile (and So Can Yours)
How Atlassian's User Research Went Agile (and So Can Yours)How Atlassian's User Research Went Agile (and So Can Yours)
How Atlassian's User Research Went Agile (and So Can Yours)
Atlassian
 
Survey analysis in a nutshell with Jeffrey Henning
Survey analysis in a nutshell with Jeffrey HenningSurvey analysis in a nutshell with Jeffrey Henning
Survey analysis in a nutshell with Jeffrey Henning
Annie Pettit, Research Methodologist
 
Peanut Labs Webinar - Survey Analysis In A Nutshell
Peanut Labs Webinar - Survey Analysis In A NutshellPeanut Labs Webinar - Survey Analysis In A Nutshell
Peanut Labs Webinar - Survey Analysis In A NutshellPeanut Labs
 
Solving SEO Issues In Google's Post Update World: How To Track Unconfirmed Al...
Solving SEO Issues In Google's Post Update World: How To Track Unconfirmed Al...Solving SEO Issues In Google's Post Update World: How To Track Unconfirmed Al...
Solving SEO Issues In Google's Post Update World: How To Track Unconfirmed Al...
Search Marketing Expo - SMX
 
Simplifiedws - Solving SEO issues in google's post update world 2017
Simplifiedws - Solving SEO issues in google's post update world 2017Simplifiedws - Solving SEO issues in google's post update world 2017
Simplifiedws - Solving SEO issues in google's post update world 2017
sandeep paul
 
SXSW 2017: Why Conducting Great Design Research Is So Hard
SXSW 2017: Why Conducting Great Design Research Is So HardSXSW 2017: Why Conducting Great Design Research Is So Hard
SXSW 2017: Why Conducting Great Design Research Is So Hard
Allison Abbott
 
How to Streamline the Content Creation Process
How to Streamline the Content Creation Process How to Streamline the Content Creation Process
How to Streamline the Content Creation Process
Search Engine Journal
 
Diversity Matters: How to Be the Change you Seek
Diversity Matters: How to Be the Change you SeekDiversity Matters: How to Be the Change you Seek
Diversity Matters: How to Be the Change you Seek
Atlassian
 

Similar to NTXISSACSC4 - Hacking Performance Management, the Blue Green Game (12)

Guide to Social Video Marketing
Guide to Social Video MarketingGuide to Social Video Marketing
Guide to Social Video Marketing
 
Visualizing Search Analysis By Ryan Jones
Visualizing Search Analysis By Ryan JonesVisualizing Search Analysis By Ryan Jones
Visualizing Search Analysis By Ryan Jones
 
The Steampunk's Guide to Prioritizing and Publishing By Michelle Stinson Ross
The Steampunk's Guide to Prioritizing and Publishing By Michelle Stinson RossThe Steampunk's Guide to Prioritizing and Publishing By Michelle Stinson Ross
The Steampunk's Guide to Prioritizing and Publishing By Michelle Stinson Ross
 
Busting Google's Black Box: Navigating Google Algorithms in a Post-Update Wor...
Busting Google's Black Box: Navigating Google Algorithms in a Post-Update Wor...Busting Google's Black Box: Navigating Google Algorithms in a Post-Update Wor...
Busting Google's Black Box: Navigating Google Algorithms in a Post-Update Wor...
 
How Atlassian's User Research Went Agile (and So Can Yours)
How Atlassian's User Research Went Agile (and So Can Yours)How Atlassian's User Research Went Agile (and So Can Yours)
How Atlassian's User Research Went Agile (and So Can Yours)
 
Survey analysis in a nutshell with Jeffrey Henning
Survey analysis in a nutshell with Jeffrey HenningSurvey analysis in a nutshell with Jeffrey Henning
Survey analysis in a nutshell with Jeffrey Henning
 
Peanut Labs Webinar - Survey Analysis In A Nutshell
Peanut Labs Webinar - Survey Analysis In A NutshellPeanut Labs Webinar - Survey Analysis In A Nutshell
Peanut Labs Webinar - Survey Analysis In A Nutshell
 
Solving SEO Issues In Google's Post Update World: How To Track Unconfirmed Al...
Solving SEO Issues In Google's Post Update World: How To Track Unconfirmed Al...Solving SEO Issues In Google's Post Update World: How To Track Unconfirmed Al...
Solving SEO Issues In Google's Post Update World: How To Track Unconfirmed Al...
 
Simplifiedws - Solving SEO issues in google's post update world 2017
Simplifiedws - Solving SEO issues in google's post update world 2017Simplifiedws - Solving SEO issues in google's post update world 2017
Simplifiedws - Solving SEO issues in google's post update world 2017
 
SXSW 2017: Why Conducting Great Design Research Is So Hard
SXSW 2017: Why Conducting Great Design Research Is So HardSXSW 2017: Why Conducting Great Design Research Is So Hard
SXSW 2017: Why Conducting Great Design Research Is So Hard
 
How to Streamline the Content Creation Process
How to Streamline the Content Creation Process How to Streamline the Content Creation Process
How to Streamline the Content Creation Process
 
Diversity Matters: How to Be the Change you Seek
Diversity Matters: How to Be the Change you SeekDiversity Matters: How to Be the Change you Seek
Diversity Matters: How to Be the Change you Seek
 

More from North Texas Chapter of the ISSA

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
North Texas Chapter of the ISSA
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
North Texas Chapter of the ISSA
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
North Texas Chapter of the ISSA
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
North Texas Chapter of the ISSA
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
North Texas Chapter of the ISSA
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
North Texas Chapter of the ISSA
 

More from North Texas Chapter of the ISSA (20)

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
 

Recently uploaded

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 

Recently uploaded (16)

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 

NTXISSACSC4 - Hacking Performance Management, the Blue Green Game