This presentation gives an overview of how social networks are used in companies and what are the risks associated with them. Some actions points are proposed to mitigate those risks.
Social Media & Networking - Boon or Bane?Yash Mittal
A presentation on Social Networking - a boon or bane? The presentation takes a person through the history of social networking - how people interact today as compared to earlier times and mentions the social networks used by today's generation. Then it reviews the advantages and disadvantages of Social Networking and follows up with some Do's and Don'ts.
Social Media & Networking - Boon or Bane?Yash Mittal
A presentation on Social Networking - a boon or bane? The presentation takes a person through the history of social networking - how people interact today as compared to earlier times and mentions the social networks used by today's generation. Then it reviews the advantages and disadvantages of Social Networking and follows up with some Do's and Don'ts.
What would your life be like without the internet? The majority of the world is unable to use the internet and smart phone technology effectively because of the language barrier. Now there is a solution available that will open up vast, untapped markets by being the first company to take advantage of Linguist Software's breakthrough technology to connect with the world. The translation capabilities of this tech advancement will make smart phones far more necessary than ever before. Find out more in this informational deck.
TITLES
SOCIAL MEDIA
WHAT IS SOCIAL MEDIA
WHY SOCIAL MEDIA IS IMPORTENT
WHAT IS SOCIAL MEDIA MARKING
BENEFITS FOR STUDENTS AND BUSINESS
NEGATIVE IMPACT
TYPES OF SOCIAL MEDIA
TWITTER
FACEBOOK
YOUTUBE
INSTAGRAM
LINKEDIN
TELEGRAM
ADVANTAGE OF SOCIAL MEDIA
DISADVANTAGES OF SOCIAL MEDIA
HOW TO USE SOCIAL MEDIA SAFELY
CONCLESION
Social Media & it's Impact in Today's WorldStephen Mokiwa
Social media and it's impacts on today's world. On Politics, Business and Society.
I was invited by and presented this to the Rotaract Club of Dar City, Tanzania on 8th August 2015.
Introduction to Social Media, Types of Social Media, Professional Uses of Social Media, Impact of Social Media, Negative Side of Social Media, Cyber Bullying, Safety Tips are included in this ppt.
This presentation was researched and developed to introduce the small businesses and not for profits that the idea of social media is not a new fad. My goal was to break down any preconceived notions about the power of Social Media today and in the future.
Presented at Hofstra University on 3/9/12 in the Leo Guthart Cultural Center Theater. Topics discussed included the evolution of marketing, advertising, and how to best use social media for personal branding use.
What would your life be like without the internet? The majority of the world is unable to use the internet and smart phone technology effectively because of the language barrier. Now there is a solution available that will open up vast, untapped markets by being the first company to take advantage of Linguist Software's breakthrough technology to connect with the world. The translation capabilities of this tech advancement will make smart phones far more necessary than ever before. Find out more in this informational deck.
TITLES
SOCIAL MEDIA
WHAT IS SOCIAL MEDIA
WHY SOCIAL MEDIA IS IMPORTENT
WHAT IS SOCIAL MEDIA MARKING
BENEFITS FOR STUDENTS AND BUSINESS
NEGATIVE IMPACT
TYPES OF SOCIAL MEDIA
TWITTER
FACEBOOK
YOUTUBE
INSTAGRAM
LINKEDIN
TELEGRAM
ADVANTAGE OF SOCIAL MEDIA
DISADVANTAGES OF SOCIAL MEDIA
HOW TO USE SOCIAL MEDIA SAFELY
CONCLESION
Social Media & it's Impact in Today's WorldStephen Mokiwa
Social media and it's impacts on today's world. On Politics, Business and Society.
I was invited by and presented this to the Rotaract Club of Dar City, Tanzania on 8th August 2015.
Introduction to Social Media, Types of Social Media, Professional Uses of Social Media, Impact of Social Media, Negative Side of Social Media, Cyber Bullying, Safety Tips are included in this ppt.
This presentation was researched and developed to introduce the small businesses and not for profits that the idea of social media is not a new fad. My goal was to break down any preconceived notions about the power of Social Media today and in the future.
Presented at Hofstra University on 3/9/12 in the Leo Guthart Cultural Center Theater. Topics discussed included the evolution of marketing, advertising, and how to best use social media for personal branding use.
10 Steps of Project Management in Digital Agencies Alemsah Ozturk
This is part of our ( 41? 29! ) agency's culture series. Basicly this series of documents helps our teams learn the foundation of agency culture, basic rules to do their work. We are all about sharing the data & know how, so here we are ;)
Start-up Chile Marketing & Advertising Tribe session on Data Analysis tools for startups. Written by Pedro Villalobos (Lagiar.com), Felipe del Sol (Admetricks.com), Liane Siebenhaar (Mewe.co). This is a selection of tools you can use to shape your pitch and product. If you have any questions, don't hesitate to contact us.
Social Media for Internal Company Communications by @JoeySheppEarthsite
Social Media isn’t just for marketing; it’s for sharing, collaborating, and networking. In this presentation you will learn how Social Media is being applied in the workplace. Get up to date with the latest social media trends and best practices. See case studies of how corporate programs are leveraging social media for employee engagement, work team collaboration, and remote training. You’ll walk away with concrete implementation steps and best-of-class software recommendations. Presentation by JoeyShepp.com, New Media Maven and CEO of Earthsite.net
Enterprise Open Source Intelligence GatheringTom Eston
Presented at the Ohio Information Security Summit, October 30, 2009.
What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition? We all know information or intelligence gathering is one of the most important phases of a penetration test. However, gathering information and intelligence about your own company is even more valuable and can help an organization proactively determine the information that may damage your brand, reputation and help mitigate leakage of confidential information.
This presentation will cover what the risks are to an organization regarding publicly available open source intelligence. How can your enterprise put an open source intelligence gathering program in place without additional resources or money. What free tools are available for gathering intelligence including how to find your company information on social networks and how metadata can expose potential vulnerabilities about your company and applications. Next, we will explore how to get information you may not want posted about your company removed and how sensitive metadata information you may not be aware of can be removed or limited. Finally, we will discuss how to build a Internet posting policy for your company and why this is more important then ever.
SocialSafe is your business social media library.
SocialSafe creates a full archive of all your Facebook, Facebook Pages, Twitter, LinkedIn, Google+, Blogs, Instagram, Pinterest social media posts, interactions and followers, to meet your legal compliance needs.
In addition SocialSafe provides excellent capabilities to support engagement monitoring across your social media use with Search, Insights and more.
As social media use increases throughout your organisation SocialSafe is THE cost-effective tool to support both regulatory compliance and engagement monitoring.
Presented to a group of interior design professionals in Mountain View, CA hosted by Doreen Yun of Windows & Beyond.
This is a followup presentation to one I did back in the Spring - it has updated tools and I hope you find them valuable and useful!
Similar to Social Networks - The Good and the Bad (20)
HTTP For the Good or the Bad - FSEC EditionXavier Mertens
A review of the webshells used by bad guys. How they are protected but also mistakes in their implementation. This talk was updated and presented at the FSEC conference in Croatia, September 2017.
A review of the webshells used by bad guys. How they are protected but also mistakes in their implementation. This talk was presented at the OWASP Belgium Chapter Meeting in May 2017.
This is the talk I gave at SOURCE Dublin in May 2013 about improving information security by dynamically reconfiguring security devices already in place.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
3. $ cat disclaimer.txt
“The opinions expressed in this presentation
are those of the speaker and do not reflect
those of past, present or future employers,
partners or customers”
6. Some Facts
• Technology changed the way people
communicate
• “Usage of social networks by the Fortune 500
companies has seen an explosive growth in
2010 with 83% of the companies using at
least one of the social media sites”
• The usage of blogs has also increased by 50%
(corporate blogs)
• Around 34% have developed policies to
govern blogging by their employees
(Source: socialtimes.com)
10. Definition?
“Social network sites are defined as web-
based services that allow individuals or
organizations to construct a public or semi-
public profile within a bounded system,
articulate a list of other users with whom
they share a connection, and view and
traverse their list of connections and those
made by others within the system. ”
11. Common Usages
• Communication about company & brands
(marketing)
• Live support
• Technology & competition follow-up
• Human Resources
12. Marketing
• Social Networks give a sense of “dynamic”
company
• Direct Reach / Close to customers.
• Extended circle of contacts at low costs
• Personal touch
13. Live Support
• Close contact with customers
• Low Costs
• Give a sense of “Real time”
14. Follow Up
• What are doing my competitors?
• What’s new in my field of activity?
• Almost real-time news trending
18. Barbara Streisand
The “Streisand Effect” is a
primarily online phenomenon
in which an attempt to hide or
remove a piece of information
has the unintended
consequence of publicizing the
information more widely.
19. The Belgian Jeweler
In 2009, a Belgian Jeweler made a buzz with
Belgian Twitter users with a complete
misunderstanding of the social networks
impacts.
20. Domino’s Pizza
A Domino’s Pizza employee inserted nasal
mucus on pizza’s. He was fired but video was
posted on Youtube. 250.000+ views!
23. Malware & Viruses
• Corporate devices used to access Social
Networks
• They are based on Web technologies. All
known attacks are usable
(see the OWASP Top-10)
• URL shorteners / QRcodes (“click”-
generation)
24. Wasted Resources
• In big companies, usage of Social Network
can waste a lot of bandwidth!
Example: Facebook on a network of
10000+ users: 200GB/day
• Waste of time by employees
• Peak of wasted resources during popular
events
25. “Users”
• Users remain the weakest link
• Facebook password same as Active
Directory password?
• Attackers use breaking news
• How many “friends” are really friends?
26. Mobiles & Apps
• People use mobile devices to access Social
Networks
• Suspicious browser extensions or 3rd party
apps
27. Data Leak
• People might post confidential information
• Intentional or not!
• Data Extrusion
• Bypass regular communication channels
(Skype)
29. Social Engineering
• All information to
conduct a social
engineering attack is
already online
• Google is your best
friend
• Tools like Maltego are
gold mines
30. Degraded Brand Image
• It takes years to build a brand image
• It takes minutes to kill it!
32. Reputation & Legal
Liability
• Disgruntled employees
• “My boss is a bastard!”
• “I’m pissed off by this f*cking job...”
• Employers could be held responsible for
failing to protect employees from accessing
“sensitive” material.
34. Official Support
• Information can’t be published by employee
self-initiative
• Social Media must be defined as a regular
communication channel with rules &
guidelines
35. Monitor Your Brand
• Even if not used immediately, register your
account (if not too late!)
• Google Alerts
• Commercial services (buzzcapture.com)
• Monitoring tools
36. Local Policies
• No Social Networks
access from business
critical environments.
• Restrict Social
Networks access
(“read-only”).
• Modern firewalls may
filter based on domains
37. Remote Policies
• Read carefully the Social Networks policies
• Follow updates & fix your profiles
(Ex: LinkedIn can use your profile picture)
• Similarities with cloud services
38. Security Awareness
• Add Social Networks to your existing
security awareness program.
• “What employers and employees need to
know.”
39. pastebin.com
• pastebin.com is a website where people can
anonymously post “pasties” (data)
• Track monitoring about your company
(Example: IP’s, domain names)