SlideShare a Scribd company logo
www.seef.reputelligence.com
FOR IMMEDIATE RELEASE
Logo wars, the fight for attention and resources
BURGISTEIN, Switzerland, September 1st
2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social
engineering engagement framework (SEEF), will release the first known social engineering icons, today.
The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to
think. People recognize icons faster than words. Visual perception is one of the most productive ways through which
people can obtain information and process it.
The SEEF social engineering icons can be used in many ways:
 Risk assessments and documentation
 Vulnerability reporting
 Attack vector development
 Information security briefings
 Information security awareness trainings
The benefits of using SEEF social engineering icons:
 People are visually-driven creatures;
 Icons have a tendency to stick better;
 Improving general comprehension;
 Conveying a memorable message from c-level to technical experts.
Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing
way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing,
dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation,
shoulder surfing, or impersonation. In total, there about 38 icons.
The initiative for developing these icons came from the author, who often speaks at security conferences, has
authored a book about social engineering, and works as a senior security consultant for the top international
companies and governmental organizations. He quotes: “Social engineering is a very complex and abstract topic to
grasp. It is not so obvious like technical vulnerabilities in a system; it is about the vulnerabilities of the human mind. I
needed a visually-driven way to convey this message. For other vulnerabilities, there are logos available,
communicating in a memorable and appealing way the risk associated with such a vulnerability. But for social
engineering, as one of the top advanced persistent threats, there were none. So I had to develop the icons myself. So
far, the use of the icons was a full success. For my clients and briefings, I can now use a set comprehensive icons,
communicating in a powerful way the risks of social engineering attack vectors.”
Contact: Dominique C. BRACK
Reputelligence Publishing,
Muttlen 131, CH3664
Tel: +41798721995
Email: publishing@reputelligence.com
Website: seef.reputelligence.com
www.seef.reputelligence.com
As the author was quoted at one of his security conference speeches: “Using the social engineering icons will give you
10% more budget, and you will get the hero bonus too.”
They are now available for download. As a free version for using based on the respective license agreement and a paid
version which includes vector files.
Related Links:
http://selz.co/Ny-y91s5Z
https://seef.reputelligence.com
https://www.youtube.com/watch?v=NcpmhsSVzuM&feature=youtu.be
###

More Related Content

Similar to Press release social engineering engagement framework seef social engineering icons

Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
Chuck Brooks
 
Power of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology AdoptionPower of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology Adoption
Software Park Thailand
 
Visualization for Software Analytics
Visualization for Software AnalyticsVisualization for Software Analytics
Visualization for Software Analytics
Margaret-Anne Storey
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
Pavlos Isaris
 
10 Page Essay
10 Page Essay10 Page Essay
10 Page Essay
Essay Help .
 
10 Page Essay
10 Page Essay10 Page Essay
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting International
Chuck Brooks
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
Bradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
TopCyberNewsMAGAZINE
 
Reimagining Risk Management: How Restorative Practices Can Transform Informat...
Reimagining Risk Management: How Restorative Practices Can Transform Informat...Reimagining Risk Management: How Restorative Practices Can Transform Informat...
Reimagining Risk Management: How Restorative Practices Can Transform Informat...
Michele Chubirka
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Keith Redman
 
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE GmbH
 
MAHESWARI_Resume
MAHESWARI_ResumeMAHESWARI_Resume
MAHESWARI_Resume
Maheswari Marimuthu
 
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
Michael Altendorf
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014
iDIALOGHI
 
User Interfaces in Cybersecurity
User Interfaces in CybersecurityUser Interfaces in Cybersecurity
User Interfaces in Cybersecurity
Regina Grogan
 
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
stirlingvwriters
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
Cyber Security Alliance
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks
 

Similar to Press release social engineering engagement framework seef social engineering icons (20)

Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
Power of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology AdoptionPower of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology Adoption
 
Visualization for Software Analytics
Visualization for Software AnalyticsVisualization for Software Analytics
Visualization for Software Analytics
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
 
10 Page Essay
10 Page Essay10 Page Essay
10 Page Essay
 
10 Page Essay
10 Page Essay10 Page Essay
10 Page Essay
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting International
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
Reimagining Risk Management: How Restorative Practices Can Transform Informat...
Reimagining Risk Management: How Restorative Practices Can Transform Informat...Reimagining Risk Management: How Restorative Practices Can Transform Informat...
Reimagining Risk Management: How Restorative Practices Can Transform Informat...
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
 
MAHESWARI_Resume
MAHESWARI_ResumeMAHESWARI_Resume
MAHESWARI_Resume
 
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014
 
User Interfaces in Cybersecurity
User Interfaces in CybersecurityUser Interfaces in Cybersecurity
User Interfaces in Cybersecurity
 
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
 

More from Reputelligence

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.de
Reputelligence
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...
Reputelligence
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup Process
Reputelligence
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
Reputelligence
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2
Reputelligence
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk management
Reputelligence
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...
Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
Reputelligence
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef
Reputelligence
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentation
Reputelligence
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Reputelligence
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcb
Reputelligence
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
Reputelligence
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
Reputelligence
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)
Reputelligence
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rollout
Reputelligence
 
Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1
Reputelligence
 
Hack back series how to spot fake linked in profiles - a way to figure out f...
Hack back series  how to spot fake linked in profiles - a way to figure out f...Hack back series  how to spot fake linked in profiles - a way to figure out f...
Hack back series how to spot fake linked in profiles - a way to figure out f...
Reputelligence
 

More from Reputelligence (20)

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.de
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup Process
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk management
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentation
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcb
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rollout
 
Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1
 
Hack back series how to spot fake linked in profiles - a way to figure out f...
Hack back series  how to spot fake linked in profiles - a way to figure out f...Hack back series  how to spot fake linked in profiles - a way to figure out f...
Hack back series how to spot fake linked in profiles - a way to figure out f...
 

Recently uploaded

Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
Pinta Partners
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
Ram V Chary
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
Bill641377
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
Rob Healy
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
Dr. Christine Ngari ,Ph.D (HRM)
 
Risk-Management-presentation for cooperatives
Risk-Management-presentation for cooperativesRisk-Management-presentation for cooperatives
Risk-Management-presentation for cooperatives
bernanbumatay1
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
spandane
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
stuwilson.co.uk
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
Credit Management training seminar power point presentation
Credit Management training seminar power point presentationCredit Management training seminar power point presentation
Credit Management training seminar power point presentation
bernanbumatay1
 
Credit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentationCredit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentation
bernanbumatay1
 
Strategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptxStrategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptx
KarthikRaghu8
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
Alberto Brandolini
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
8p28uk6g
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
dsnow9802
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Dr. Nazrul Islam
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
Matthew Sinclair
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
tdt5v4b
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
Ahmed AbdelMoneim
 

Recently uploaded (20)

Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
 
Risk-Management-presentation for cooperatives
Risk-Management-presentation for cooperativesRisk-Management-presentation for cooperatives
Risk-Management-presentation for cooperatives
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
Credit Management training seminar power point presentation
Credit Management training seminar power point presentationCredit Management training seminar power point presentation
Credit Management training seminar power point presentation
 
Credit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentationCredit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentation
 
Strategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptxStrategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptx
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
 

Press release social engineering engagement framework seef social engineering icons

  • 1. www.seef.reputelligence.com FOR IMMEDIATE RELEASE Logo wars, the fight for attention and resources BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today. The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it. The SEEF social engineering icons can be used in many ways:  Risk assessments and documentation  Vulnerability reporting  Attack vector development  Information security briefings  Information security awareness trainings The benefits of using SEEF social engineering icons:  People are visually-driven creatures;  Icons have a tendency to stick better;  Improving general comprehension;  Conveying a memorable message from c-level to technical experts. Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons. The initiative for developing these icons came from the author, who often speaks at security conferences, has authored a book about social engineering, and works as a senior security consultant for the top international companies and governmental organizations. He quotes: “Social engineering is a very complex and abstract topic to grasp. It is not so obvious like technical vulnerabilities in a system; it is about the vulnerabilities of the human mind. I needed a visually-driven way to convey this message. For other vulnerabilities, there are logos available, communicating in a memorable and appealing way the risk associated with such a vulnerability. But for social engineering, as one of the top advanced persistent threats, there were none. So I had to develop the icons myself. So far, the use of the icons was a full success. For my clients and briefings, I can now use a set comprehensive icons, communicating in a powerful way the risks of social engineering attack vectors.” Contact: Dominique C. BRACK Reputelligence Publishing, Muttlen 131, CH3664 Tel: +41798721995 Email: publishing@reputelligence.com Website: seef.reputelligence.com
  • 2. www.seef.reputelligence.com As the author was quoted at one of his security conference speeches: “Using the social engineering icons will give you 10% more budget, and you will get the hero bonus too.” They are now available for download. As a free version for using based on the respective license agreement and a paid version which includes vector files. Related Links: http://selz.co/Ny-y91s5Z https://seef.reputelligence.com https://www.youtube.com/watch?v=NcpmhsSVzuM&feature=youtu.be ###