SlideShare a Scribd company logo
1 of 1
Download to read offline
Certificate
SECURE: throughout the day - Episode III
Siemens Information Technology and
the Chief Information Security Officer attest that
Kresimir Popovic
(Z001NVMP)
has successfully completed the Security Online Training
"SECURE: throughout the day Episode III" on Jun 2, 2014.
Training Content
This training program focuses on an on-going and dangerous form of cyber-attack, called Advanced Persistent
Threats (APT). The web-based training shows how these attacks work and which patterns they follow.
Furthermore, handling rules are given to help minimize the risk of a successful APT within our company. A
second key point of the training is the secure usage of Social Media and how to protect against Social
Engineering - both commonly used by potential attackers in order to gain information on their potential target.
Additionally there is a concise characterization of the protection classes and the related handling requirements.
Munich, Jun 2, 2014
This is an automatically generated document and therefore valid without signature.
Siegfried Russwurm
Member of the Managing Board
Responsible for IT
intranet.siemens.com/csts

More Related Content

Similar to SECURE- Throughout the day - Part 3.pdf

Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELIJCSEIT Journal
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineeringijtsrd
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdfFahadZaman38
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
Comparative Analysis of Phishing Tools
Comparative Analysis of Phishing ToolsComparative Analysis of Phishing Tools
Comparative Analysis of Phishing Toolsijtsrd
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyGovernment
 
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...Ivanti
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersCrawsec
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021TrustwaveHoldings
 

Similar to SECURE- Throughout the day - Part 3.pdf (20)

Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Certificate
CertificateCertificate
Certificate
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Comparative Analysis of Phishing Tools
Comparative Analysis of Phishing ToolsComparative Analysis of Phishing Tools
Comparative Analysis of Phishing Tools
 
ICAO SMS M 02 – Basic safety.pptx
ICAO SMS M 02 – Basic safety.pptxICAO SMS M 02 – Basic safety.pptx
ICAO SMS M 02 – Basic safety.pptx
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Untitled (1).pptx
Untitled (1).pptxUntitled (1).pptx
Untitled (1).pptx
 
Untitled (1).pptx
Untitled (1).pptxUntitled (1).pptx
Untitled (1).pptx
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
 

More from Kresimir Popovic

Amazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdfAmazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdfKresimir Popovic
 
Zero_Harm_Culture_@_IC_for_Employees.pdf
Zero_Harm_Culture_@_IC_for_Employees.pdfZero_Harm_Culture_@_IC_for_Employees.pdf
Zero_Harm_Culture_@_IC_for_Employees.pdfKresimir Popovic
 
Functional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdfFunctional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdfKresimir Popovic
 
Open_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdfOpen_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdfKresimir Popovic
 
Open_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdfOpen_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdfKresimir Popovic
 
Global Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdfGlobal Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdfKresimir Popovic
 
Siemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdfSiemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdfKresimir Popovic
 
Global Competition Certificate.pdf
Global Competition Certificate.pdfGlobal Competition Certificate.pdf
Global Competition Certificate.pdfKresimir Popovic
 
Business Conduct Guidelines (BCG) Certificate.pdf
Business Conduct Guidelines (BCG) Certificate.pdfBusiness Conduct Guidelines (BCG) Certificate.pdf
Business Conduct Guidelines (BCG) Certificate.pdfKresimir Popovic
 
udemy - oauth2 and openid crash course.pdf
udemy - oauth2 and openid crash course.pdfudemy - oauth2 and openid crash course.pdf
udemy - oauth2 and openid crash course.pdfKresimir Popovic
 
Udemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdfUdemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdfKresimir Popovic
 
Kubernetes_DeepDive_02-2022.pdf
Kubernetes_DeepDive_02-2022.pdfKubernetes_DeepDive_02-2022.pdf
Kubernetes_DeepDive_02-2022.pdfKresimir Popovic
 
NGINX Server Deep Dive March 2002.pdf
NGINX Server Deep Dive March 2002.pdfNGINX Server Deep Dive March 2002.pdf
NGINX Server Deep Dive March 2002.pdfKresimir Popovic
 
dockerquickstartlegacy-190215093445.pdf
dockerquickstartlegacy-190215093445.pdfdockerquickstartlegacy-190215093445.pdf
dockerquickstartlegacy-190215093445.pdfKresimir Popovic
 
Remote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdfRemote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdfKresimir Popovic
 
Atos Financial Management Training.pdf
Atos Financial Management Training.pdfAtos Financial Management Training.pdf
Atos Financial Management Training.pdfKresimir Popovic
 
Stepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdfStepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdfKresimir Popovic
 
Conquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdfConquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdfKresimir Popovic
 
Capturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdfCapturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdfKresimir Popovic
 
Security and Safety awareness.pdf
Security and Safety awareness.pdfSecurity and Safety awareness.pdf
Security and Safety awareness.pdfKresimir Popovic
 

More from Kresimir Popovic (20)

Amazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdfAmazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdf
 
Zero_Harm_Culture_@_IC_for_Employees.pdf
Zero_Harm_Culture_@_IC_for_Employees.pdfZero_Harm_Culture_@_IC_for_Employees.pdf
Zero_Harm_Culture_@_IC_for_Employees.pdf
 
Functional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdfFunctional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdf
 
Open_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdfOpen_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdf
 
Open_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdfOpen_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdf
 
Global Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdfGlobal Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdf
 
Siemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdfSiemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdf
 
Global Competition Certificate.pdf
Global Competition Certificate.pdfGlobal Competition Certificate.pdf
Global Competition Certificate.pdf
 
Business Conduct Guidelines (BCG) Certificate.pdf
Business Conduct Guidelines (BCG) Certificate.pdfBusiness Conduct Guidelines (BCG) Certificate.pdf
Business Conduct Guidelines (BCG) Certificate.pdf
 
udemy - oauth2 and openid crash course.pdf
udemy - oauth2 and openid crash course.pdfudemy - oauth2 and openid crash course.pdf
udemy - oauth2 and openid crash course.pdf
 
Udemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdfUdemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdf
 
Kubernetes_DeepDive_02-2022.pdf
Kubernetes_DeepDive_02-2022.pdfKubernetes_DeepDive_02-2022.pdf
Kubernetes_DeepDive_02-2022.pdf
 
NGINX Server Deep Dive March 2002.pdf
NGINX Server Deep Dive March 2002.pdfNGINX Server Deep Dive March 2002.pdf
NGINX Server Deep Dive March 2002.pdf
 
dockerquickstartlegacy-190215093445.pdf
dockerquickstartlegacy-190215093445.pdfdockerquickstartlegacy-190215093445.pdf
dockerquickstartlegacy-190215093445.pdf
 
Remote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdfRemote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdf
 
Atos Financial Management Training.pdf
Atos Financial Management Training.pdfAtos Financial Management Training.pdf
Atos Financial Management Training.pdf
 
Stepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdfStepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdf
 
Conquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdfConquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdf
 
Capturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdfCapturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdf
 
Security and Safety awareness.pdf
Security and Safety awareness.pdfSecurity and Safety awareness.pdf
Security and Safety awareness.pdf
 

Recently uploaded

Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

SECURE- Throughout the day - Part 3.pdf

  • 1. Certificate SECURE: throughout the day - Episode III Siemens Information Technology and the Chief Information Security Officer attest that Kresimir Popovic (Z001NVMP) has successfully completed the Security Online Training "SECURE: throughout the day Episode III" on Jun 2, 2014. Training Content This training program focuses on an on-going and dangerous form of cyber-attack, called Advanced Persistent Threats (APT). The web-based training shows how these attacks work and which patterns they follow. Furthermore, handling rules are given to help minimize the risk of a successful APT within our company. A second key point of the training is the secure usage of Social Media and how to protect against Social Engineering - both commonly used by potential attackers in order to gain information on their potential target. Additionally there is a concise characterization of the protection classes and the related handling requirements. Munich, Jun 2, 2014 This is an automatically generated document and therefore valid without signature. Siegfried Russwurm Member of the Managing Board Responsible for IT intranet.siemens.com/csts