This document from iKeepSafe provides information and resources for families about online safety. It discusses iKeepSafe's history of providing internet safety education. It links to a video called "What Kids Do Online" and provides quick tip videos on cyberbullying and sexting. The document presents facts and statistics about bullying, cyberbullying, and the online abuse of professionals. It concludes with contact information for iKeepSafe and a note about questions.
The document discusses tips and recommendations for keeping children safe online. It provides statistics on children's technology use, such as spending an average of 7.5 hours per day on devices. It recommends that parents limit screen time to no more than 1-2 hours per day for children over age 2. The document also addresses online privacy, cyberbullying, and the importance of modeling good digital citizenship for children.
Delivered by Patrick Laverty and his daughter, this is about how kids can stay safe online. Various tips, suggestions and recommendations are given to keep children safe when they go on the internet.
Cyber security involves protecting networks, computers, programs and data from unauthorized access and damage. The National Cyber Security Awareness campaign promotes stopping to consider risks, thinking about how online actions can impact safety, and enjoying the internet with confidence by taking safety steps. Cyber threats to organizations like TVA can come from cyber terrorism, hacktivism, and scam artists seeking to steal valuable information or make political statements.
This document discusses digital crime and security, providing examples of internet safety procedures, acceptable use policies (AUP), computer hacking, and security software. It notes that children can accidentally access inappropriate websites and describes tools to prevent this like monitoring software, filters, and time limits. The document advises that educating children on internet safety is most important since not all content can be blocked. It also gives recommendations for schools to enforce AUPs, such as maintaining internet logs and discussing computer usage with students and parents. Finally, it defines computer hacking as the unauthorized access or use of computer resources and outlines prevention through security software and awareness of digital environments.
This document discusses building a foundation for success through the appropriate use of technology in classrooms. It outlines the iKeepSafe organization's mission to ensure children's safe use of technology. It recommends schools implement comprehensive student data privacy programs that identify risks, have clear and updated policies, create incident response plans, train employees, and educate students and parents. Specific policies around data sharing, technology use, and civil liberties are also discussed. The document provides resources for schools to download a roadmap and contact iKeepSafe for additional support and guidance.
The 6 Pillars of Digital Citizenship Successemilyensign
The document discusses the 6 pillars of digital citizenship and wellness according to the Internet Keep Safe Coalition. The coalition was established in 2005 and aims to educate people worldwide on safely using technology and the internet through research and partnerships. The objective is to promote ethical, responsible and resilient digital citizenship. The document also provides questions about screen time recommendations, cyberbullying, digital piracy, and online privacy and their impact on youth.
This document from iKeepSafe provides information and resources for families about online safety. It discusses iKeepSafe's history of providing internet safety education. It links to a video called "What Kids Do Online" and provides quick tip videos on cyberbullying and sexting. The document presents facts and statistics about bullying, cyberbullying, and the online abuse of professionals. It concludes with contact information for iKeepSafe and a note about questions.
The document discusses tips and recommendations for keeping children safe online. It provides statistics on children's technology use, such as spending an average of 7.5 hours per day on devices. It recommends that parents limit screen time to no more than 1-2 hours per day for children over age 2. The document also addresses online privacy, cyberbullying, and the importance of modeling good digital citizenship for children.
Delivered by Patrick Laverty and his daughter, this is about how kids can stay safe online. Various tips, suggestions and recommendations are given to keep children safe when they go on the internet.
Cyber security involves protecting networks, computers, programs and data from unauthorized access and damage. The National Cyber Security Awareness campaign promotes stopping to consider risks, thinking about how online actions can impact safety, and enjoying the internet with confidence by taking safety steps. Cyber threats to organizations like TVA can come from cyber terrorism, hacktivism, and scam artists seeking to steal valuable information or make political statements.
This document discusses digital crime and security, providing examples of internet safety procedures, acceptable use policies (AUP), computer hacking, and security software. It notes that children can accidentally access inappropriate websites and describes tools to prevent this like monitoring software, filters, and time limits. The document advises that educating children on internet safety is most important since not all content can be blocked. It also gives recommendations for schools to enforce AUPs, such as maintaining internet logs and discussing computer usage with students and parents. Finally, it defines computer hacking as the unauthorized access or use of computer resources and outlines prevention through security software and awareness of digital environments.
This document discusses building a foundation for success through the appropriate use of technology in classrooms. It outlines the iKeepSafe organization's mission to ensure children's safe use of technology. It recommends schools implement comprehensive student data privacy programs that identify risks, have clear and updated policies, create incident response plans, train employees, and educate students and parents. Specific policies around data sharing, technology use, and civil liberties are also discussed. The document provides resources for schools to download a roadmap and contact iKeepSafe for additional support and guidance.
The 6 Pillars of Digital Citizenship Successemilyensign
The document discusses the 6 pillars of digital citizenship and wellness according to the Internet Keep Safe Coalition. The coalition was established in 2005 and aims to educate people worldwide on safely using technology and the internet through research and partnerships. The objective is to promote ethical, responsible and resilient digital citizenship. The document also provides questions about screen time recommendations, cyberbullying, digital piracy, and online privacy and their impact on youth.
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
The document discusses the "One Good Thing" campaign to promote positive stories about how individuals have made the internet or world a better place. It encourages sharing brief stories, either in text or video under 50 words or 15-30 seconds, of things like comforting a friend online, teaching parents about safe social media use, or providing wise advice to others. The campaign website is OneGoodThing.org and aims to collect positive anecdotes to promote for Safer Internet Day in order to encourage safer and more responsible online behavior.
Innovation, agility, and a fight for survival a love storyv2Curtis A. Carver Jr.
This document discusses innovation, agility, and survival in the face of growing cyber threats. It notes that state-sponsored hacking groups like China's Unit 61398 pose serious risks, maintaining access to companies for over a year on average. To adapt, organizations must constantly innovate and fail gracefully to increase agility. CIOs must sense changes and threats to embrace their dual role of protecting systems while enabling innovation through controlled risk-taking. Threats and change create opportunities if met with the right response.
The document outlines programs and services from iKeepSafe to help schools and communities address digital citizenship issues. It includes assessments to measure digital practices, curriculum and programs to teach digital skills to students, and resources like an incident response plan and privacy roadmap to help schools respond to issues and establish policies. The goal is to bring multiple stakeholders together and take a comprehensive, public health approach to promoting thriving and safe digital environments.
The document discusses various topics relating to ethics and information technology including definitions of ethics, computer ethics, and issues like privacy, property, and access. It also covers computer viruses, types of computer crimes, hacking, software piracy, and ethical dilemmas. Computer viruses are defined as programs designed to spread and interfere with computers. Types of computer crimes include those targeting information, medium of attack, tools used, and motives like economic or psychological gain. Hacking and software piracy are also defined and their advantages and disadvantages discussed. Ethical dilemmas concern areas like privacy, information accuracy, access, and intellectual property rights.
The document discusses effective employee monitoring and provides guidance on complying with relevant data protection laws. It advises having clear objectives for monitoring, making employees aware of monitoring policies, and properly managing any data collected to ensure confidentiality, integrity and availability in accordance with the Data Protection Act. The Information Commissioner's Office provides guidance on employee monitoring and data protection on their website.
The HIghland Council E-Safety ApproachLouise Jones
The document discusses the Highland E-Safety Partnership which aims to educate professionals and the community about internet safety. It established training for over 210 professionals and provides resources to teach children about e-safety. The partnership evaluates its efforts and found that it effectively empowers educators and makes the community more aware of online risks. Going forward, it seeks to address vulnerabilities and expand its outreach to more groups.
As a security team, your focuses are on role-based access, segregation of duties, and making sure the right people have the right access to the right things at the right time.
But what about the employees within other functions? Are there employees who are putting you at an uncommon risk?
Here is a look into those employees and how you can mitigate their risk.
The Hacking Team Hack: Lessons Learned for Enterprise SecurityStephen Cobb
Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Enhance Systems Pvt. Ltd.
The document discusses the past, present, and future of intellectual security and cyber attacks. It notes that in the past, warfare relied on basic decoding and physical assets, while intellectual destruction was not a key strategy. However, today nearly all information exists in digital form, making it easily accessible through IT infrastructure breaches. Looking ahead, significant resources will need to focus not just on building systems but ensuring their security. Educating professionals on both tools and intellectual asset protection will be important.
This document discusses some fundamental problems in technology, including a lack of empathy and diversity in teams, an overvaluation of complexity, and misaligned incentives that prioritize growth and headlines over minimizing real-world harm. It argues that technology companies have not been proactively honest about downsides and have failed to learn from past mistakes. Some recommendations are made, including emphasizing empathy and diversity to better predict harm, shifting risk ownership, adjusting incentives away from complexity and towards harm prevention, and teaching these lessons in computer science education.
WANTED – People Committed to Solving our Information Security Language ProblemEvan Francen
The information security industry is broken. It's our duty to fix it, and it starts with getting on the same page. The model isn't broken, but our application is. How do we apply the basics and fundamentals on a wider scale? It starts with defining a common language and a common approach. Next, make it all free.
Digital citizenship can be summarized in 3 sentences:
Digital citizenship involves the ability to access, communicate, and engage in commerce via the internet as well as having the literacy, security practices, legal and ethical understanding, and health and wellness skills to do so effectively and responsibly. It encompasses key concepts such as digital access, communication, commerce, literacy, security, law, rights, etiquette, and health and wellness in a technology-driven world. Examples provided demonstrate how these concepts apply to internet and technology use by children, students, and communities.
This document discusses how families can safely use technology and stay in control. It covers how children use technology positively, challenges of new technology, and how schools teach online safety. It recommends that parents get involved in their children's online activities, support the school's e-safety teachings, and use tools to help manage online risks. Parents are encouraged to supervise children online, discuss managing risks, set rules for internet use, and use technical tools to help keep families safe online.
Chad olivard internet safety powerpoint presentation itc 525chadolivard
This document provides guidelines for internet safety. It discusses issues like sexual predators online, protecting personal information, cyberbullying, and fun educational games about internet safety. It addresses staying safe by not sharing private information with strangers, using privacy settings, and being aware of "location based services." Standards from the Pennsylvania Department of Education and International Society for Technology in Education regarding research, digital citizenship, and lifelong learning are also covered.
This document appears to be a survey about students' access to and use of the internet. It asks questions about how students access and rate the reliability of the internet at school and at home, what devices they use, and whether socioeconomic factors or skill levels affect access. The survey found that not all students had access outside of campus, with fiber being the most common means, and that outdated devices and poor connections prevented access for some. It also found correlations between access levels and skills, but not for all students.
This document outlines a role to establish requirements for ICT in learning and develop a renewed strategic action plan. It discusses gathering evidence on the current state, aligning with national policies, and the skills needed for the 3rd millennium like searching information critically. It reviews where ICT is now in learning and technologies that enable substitution, augmentation, modification and redefinition of tasks. The vision is for inspired learners using relevant technologies anywhere through efficient infrastructure, appropriate tools, good practice, school leadership and professional learning.
A presentation to the European network of Safer Internet Centers on how to use social media to promote their work. September 2013. The presentation focused on knowing your user, building a hub, an image and a brand that will last and grow with the evolution of the social web.
Security and Wearables: Success starts with securityStephen Cobb
This document discusses security challenges for wearable devices and the importance of data privacy. It notes that lack of security is a major threat to wearable projects and companies, as data breaches can damage brands and share prices. The document outlines the "attack surface" of potential vulnerabilities across wearables, smartphones, wireless networks and cloud infrastructure. It advises following the US Federal Trade Commission's guidelines on reasonable security practices to develop trust with customers and avoid regulatory penalties for data misuse. The key message is that wearable makers must prioritize security and privacy by design to avoid being exploited by "criminal tech" seeking personal data.
Big Challenges in Data Modeling: Ethical Data ModelingDATAVERSITY
What to do when you are asked to do wrong? What data modeling topics tend to run into ethical issues? Is DW/BI more prone to ethical issues? What if you are asked to model for sharing data you shouldn't be? Or using data that shouldn't be used that way? What if you see such things? Is a career limiting move worth it?
We invite you to join us in this monthly DATAVERSITY webinar series, “Big Challenges with Data Modeling” hosted by Karen Lopez.
This document discusses guidelines for proper online behavior and safety. It covers topics like netiquette, copyright, fair use, plagiarism, and safety on both the web and computers. Netiquette outlines proper etiquette for interacting online, such as treating others with respect and sharing knowledge. Copyright protects original creative works from being copied without permission. Fair use allows for limited use of copyrighted works for purposes like education. Plagiarism involves presenting others' work as your own. The document provides tips for staying safe online and on computers, including using secure connections and avoiding revealing too much personal information.
SENSUS INDUSTRI KREATIF DIGITAL KOTA MAKASSAR 2014Leanskill.com
DATA HASIL SURVEY SENSUS INDUSTRI KREATIF DIGITAL MAKASSAR 2014.
=========================
Makassar Creative Network adalah jaringan pelaku & pemangku aktivitas Ekonomi Kreatif di Kota Makassar.
Dengan mengedapankan sinergitas komunitas kreatif, akademisi, praktisi dan pemerintah.
Pada tahap awal ini MCN berfokus pada Ekonomi Kreatif berbasis Media, Desain & IPTEK. Seperti:
1. Startup & Software
2. Desain
3. Animasi
4. Game
5. Media Online
6. Digital Advertising
Kemudian menjadi wadah penguatan konektivitas, kolaborasi dan berbisnis.
Basecamp: Gedung Makassar Digital Lounge
Jl. Dr. Sam Ratulangi No.68
========================================
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
The document discusses the "One Good Thing" campaign to promote positive stories about how individuals have made the internet or world a better place. It encourages sharing brief stories, either in text or video under 50 words or 15-30 seconds, of things like comforting a friend online, teaching parents about safe social media use, or providing wise advice to others. The campaign website is OneGoodThing.org and aims to collect positive anecdotes to promote for Safer Internet Day in order to encourage safer and more responsible online behavior.
Innovation, agility, and a fight for survival a love storyv2Curtis A. Carver Jr.
This document discusses innovation, agility, and survival in the face of growing cyber threats. It notes that state-sponsored hacking groups like China's Unit 61398 pose serious risks, maintaining access to companies for over a year on average. To adapt, organizations must constantly innovate and fail gracefully to increase agility. CIOs must sense changes and threats to embrace their dual role of protecting systems while enabling innovation through controlled risk-taking. Threats and change create opportunities if met with the right response.
The document outlines programs and services from iKeepSafe to help schools and communities address digital citizenship issues. It includes assessments to measure digital practices, curriculum and programs to teach digital skills to students, and resources like an incident response plan and privacy roadmap to help schools respond to issues and establish policies. The goal is to bring multiple stakeholders together and take a comprehensive, public health approach to promoting thriving and safe digital environments.
The document discusses various topics relating to ethics and information technology including definitions of ethics, computer ethics, and issues like privacy, property, and access. It also covers computer viruses, types of computer crimes, hacking, software piracy, and ethical dilemmas. Computer viruses are defined as programs designed to spread and interfere with computers. Types of computer crimes include those targeting information, medium of attack, tools used, and motives like economic or psychological gain. Hacking and software piracy are also defined and their advantages and disadvantages discussed. Ethical dilemmas concern areas like privacy, information accuracy, access, and intellectual property rights.
The document discusses effective employee monitoring and provides guidance on complying with relevant data protection laws. It advises having clear objectives for monitoring, making employees aware of monitoring policies, and properly managing any data collected to ensure confidentiality, integrity and availability in accordance with the Data Protection Act. The Information Commissioner's Office provides guidance on employee monitoring and data protection on their website.
The HIghland Council E-Safety ApproachLouise Jones
The document discusses the Highland E-Safety Partnership which aims to educate professionals and the community about internet safety. It established training for over 210 professionals and provides resources to teach children about e-safety. The partnership evaluates its efforts and found that it effectively empowers educators and makes the community more aware of online risks. Going forward, it seeks to address vulnerabilities and expand its outreach to more groups.
As a security team, your focuses are on role-based access, segregation of duties, and making sure the right people have the right access to the right things at the right time.
But what about the employees within other functions? Are there employees who are putting you at an uncommon risk?
Here is a look into those employees and how you can mitigate their risk.
The Hacking Team Hack: Lessons Learned for Enterprise SecurityStephen Cobb
Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Enhance Systems Pvt. Ltd.
The document discusses the past, present, and future of intellectual security and cyber attacks. It notes that in the past, warfare relied on basic decoding and physical assets, while intellectual destruction was not a key strategy. However, today nearly all information exists in digital form, making it easily accessible through IT infrastructure breaches. Looking ahead, significant resources will need to focus not just on building systems but ensuring their security. Educating professionals on both tools and intellectual asset protection will be important.
This document discusses some fundamental problems in technology, including a lack of empathy and diversity in teams, an overvaluation of complexity, and misaligned incentives that prioritize growth and headlines over minimizing real-world harm. It argues that technology companies have not been proactively honest about downsides and have failed to learn from past mistakes. Some recommendations are made, including emphasizing empathy and diversity to better predict harm, shifting risk ownership, adjusting incentives away from complexity and towards harm prevention, and teaching these lessons in computer science education.
WANTED – People Committed to Solving our Information Security Language ProblemEvan Francen
The information security industry is broken. It's our duty to fix it, and it starts with getting on the same page. The model isn't broken, but our application is. How do we apply the basics and fundamentals on a wider scale? It starts with defining a common language and a common approach. Next, make it all free.
Digital citizenship can be summarized in 3 sentences:
Digital citizenship involves the ability to access, communicate, and engage in commerce via the internet as well as having the literacy, security practices, legal and ethical understanding, and health and wellness skills to do so effectively and responsibly. It encompasses key concepts such as digital access, communication, commerce, literacy, security, law, rights, etiquette, and health and wellness in a technology-driven world. Examples provided demonstrate how these concepts apply to internet and technology use by children, students, and communities.
This document discusses how families can safely use technology and stay in control. It covers how children use technology positively, challenges of new technology, and how schools teach online safety. It recommends that parents get involved in their children's online activities, support the school's e-safety teachings, and use tools to help manage online risks. Parents are encouraged to supervise children online, discuss managing risks, set rules for internet use, and use technical tools to help keep families safe online.
Chad olivard internet safety powerpoint presentation itc 525chadolivard
This document provides guidelines for internet safety. It discusses issues like sexual predators online, protecting personal information, cyberbullying, and fun educational games about internet safety. It addresses staying safe by not sharing private information with strangers, using privacy settings, and being aware of "location based services." Standards from the Pennsylvania Department of Education and International Society for Technology in Education regarding research, digital citizenship, and lifelong learning are also covered.
This document appears to be a survey about students' access to and use of the internet. It asks questions about how students access and rate the reliability of the internet at school and at home, what devices they use, and whether socioeconomic factors or skill levels affect access. The survey found that not all students had access outside of campus, with fiber being the most common means, and that outdated devices and poor connections prevented access for some. It also found correlations between access levels and skills, but not for all students.
This document outlines a role to establish requirements for ICT in learning and develop a renewed strategic action plan. It discusses gathering evidence on the current state, aligning with national policies, and the skills needed for the 3rd millennium like searching information critically. It reviews where ICT is now in learning and technologies that enable substitution, augmentation, modification and redefinition of tasks. The vision is for inspired learners using relevant technologies anywhere through efficient infrastructure, appropriate tools, good practice, school leadership and professional learning.
A presentation to the European network of Safer Internet Centers on how to use social media to promote their work. September 2013. The presentation focused on knowing your user, building a hub, an image and a brand that will last and grow with the evolution of the social web.
Security and Wearables: Success starts with securityStephen Cobb
This document discusses security challenges for wearable devices and the importance of data privacy. It notes that lack of security is a major threat to wearable projects and companies, as data breaches can damage brands and share prices. The document outlines the "attack surface" of potential vulnerabilities across wearables, smartphones, wireless networks and cloud infrastructure. It advises following the US Federal Trade Commission's guidelines on reasonable security practices to develop trust with customers and avoid regulatory penalties for data misuse. The key message is that wearable makers must prioritize security and privacy by design to avoid being exploited by "criminal tech" seeking personal data.
Big Challenges in Data Modeling: Ethical Data ModelingDATAVERSITY
What to do when you are asked to do wrong? What data modeling topics tend to run into ethical issues? Is DW/BI more prone to ethical issues? What if you are asked to model for sharing data you shouldn't be? Or using data that shouldn't be used that way? What if you see such things? Is a career limiting move worth it?
We invite you to join us in this monthly DATAVERSITY webinar series, “Big Challenges with Data Modeling” hosted by Karen Lopez.
This document discusses guidelines for proper online behavior and safety. It covers topics like netiquette, copyright, fair use, plagiarism, and safety on both the web and computers. Netiquette outlines proper etiquette for interacting online, such as treating others with respect and sharing knowledge. Copyright protects original creative works from being copied without permission. Fair use allows for limited use of copyrighted works for purposes like education. Plagiarism involves presenting others' work as your own. The document provides tips for staying safe online and on computers, including using secure connections and avoiding revealing too much personal information.
SENSUS INDUSTRI KREATIF DIGITAL KOTA MAKASSAR 2014Leanskill.com
DATA HASIL SURVEY SENSUS INDUSTRI KREATIF DIGITAL MAKASSAR 2014.
=========================
Makassar Creative Network adalah jaringan pelaku & pemangku aktivitas Ekonomi Kreatif di Kota Makassar.
Dengan mengedapankan sinergitas komunitas kreatif, akademisi, praktisi dan pemerintah.
Pada tahap awal ini MCN berfokus pada Ekonomi Kreatif berbasis Media, Desain & IPTEK. Seperti:
1. Startup & Software
2. Desain
3. Animasi
4. Game
5. Media Online
6. Digital Advertising
Kemudian menjadi wadah penguatan konektivitas, kolaborasi dan berbisnis.
Basecamp: Gedung Makassar Digital Lounge
Jl. Dr. Sam Ratulangi No.68
========================================
Maneras de transferir conocimiento de forma digitalfarfan93
Este documento discute el diseño de software educativo y la transferencia de conocimiento. Explica que las tecnologías han pasado de ser un fin en sí mismas a herramientas que potencian la enseñanza y el aprendizaje. También describe los objetivos y requisitos de un sistema de gestión del conocimiento, incluyendo la organización y presentación efectiva del conocimiento así como su preservación y transferencia a lo largo del tiempo.
El documento resume la evolución del derecho laboral y los sindicatos a través de la historia. Comenzó con las fraternidades de profesionales en los siglos XII-XIII, luego las asociaciones de compañeros en el siglo XVI. En 1861 surgió la fórmula de asociación profesional en Francia y en 1884 la palabra "sindicato". Las huelgas surgieron como medio de solución en el siglo XVIII. Leyes como la Ley Le Chapelier prohibían agrupamientos de trabajadores, mientras que la ley Waldeck-
Características de la Población de Quemados Adultos Hospitalizados Dr. Cristóbal Longton
Cristóbal Longton Brunet
Cirujano Plástico chileno egresado de la Escuela de Medicina de la Pontificia Universidad Católica de Chile, miembro asociado de la Sociedad Chilena de Cirugía Plástica Reconstructiva y Estética, como también de IPRAS y de FILACP.
Este documento describe el desarrollo de un optimizador de consultas llamado COneQL para consultas en SPARQL sobre la Nube Enlazada de Datos. COneQL produce planes de ejecución eficientes para consultas complejas evaluadas localmente. El optimizador recibe una consulta SPARQL, la procesa y genera un plan de ejecución óptimo a través de ciclos de generación de planes iniciales, aplicación de transformaciones y comparación de costos estimados entre planes. Experimentos sobre dos fuentes de datos muestran que COneQL puede producir planes ef
Este documento presenta el diseño de una unidad didáctica sobre psicología médica para estudiantes de nutrición. La unidad se impartirá de manera virtual a través de una plataforma educativa. El objetivo es que los estudiantes integren un enfoque biopsicosocial de la salud que les permita brindar un tratamiento integral a pacientes. La unidad se impartirá a 89 estudiantes de tercer semestre de la carrera de nutrición en la Universidad Autónoma de Sinaloa a lo largo de 15 semanas.
O documento descreve a Alemanha como o coração da Europa geograficamente e financeiramente, localizado no centro do continente e fazendo fronteira com vários países. Também menciona que é fácil viajar para a Alemanha de avião, embora dentro do país as viagens de trem sejam uma boa opção para ver grandes partes do país.
El documento presenta dos ejercicios de matemática para quinto año básico. El primer ejercicio pide amplificar fracciones según un valor dado, como 5/8 multiplicado por 2. El segundo ejercicio pide simplificar fracciones como 12/18, 9/15, 6/8 y 36/48 hasta obtener fracciones irreductibles.
Desforramiento de extremidades inferiores en pediatríaSebastian Villegas
Desforramiento de extremidades inferiores en pediatría, presentación realizada en la sección de Cirugía Plástica del XLI Congreso Chileno de Cirugía Pediátrica.
Incluye Clasificación, epidemiología, fisiopatología, diagnóstico y manejo de desforramientos, lesiones por avulsión o desguantamiento.
Se presentan casos clínicos de todos los tipos descritos.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
Cristóbal Longton Brunet
Cirujano Plástico chileno egresado de la Escuela de Medicina de la Pontificia Universidad Católica de Chile, miembro asociado de la Sociedad Chilena de Cirugía Plástica Reconstructiva y Estética, como también de IPRAS y de FILACP.
Presentación del Residente Vásquez (febrero 2015) sobre selladores de vasos. Describe mecanismos, ventajas y desventajas del bipolar avanzado y el armónico. Presenta el thunderbeat.
Introduction to Phase Change Materials #PSBPcomfortSu Butcher
PCMs are materials that store and release large amounts of heat as they change phase from solid to liquid, allowing them to regulate temperature without itself changing in temperature. They effectively store latent heat of phase change within a narrow temperature range. Microencapsulation provides effective packaging of PCMs by creating a huge surface area for heat transfer when incorporated into building materials. This allows PCMs to function as thermal mass to buffer temperature in the comfort range, absorbing and releasing heat more quickly than conventional building materials but over a narrower temperature band. PCMs should be used in conjunction with insulation, shading, orientation and ventilation strategies to effectively control interior temperatures.
Este documento trata sobre el manejo de pacientes quemados. Define una quemadura y discute su etiología, epidemiología, diagnóstico, clasificación de gravedad, manejo de quemaduras de vía aérea y diferentes fórmulas de fluidoterapia. También cubre criterios para derivación a una unidad de quemados y fórmulas específicas como la de Parkland.
Here is another creative presentation by your slide maker on the topic “ELECTROPLATING". Hope you like it. If you like it then please, *like*, *Download* and *Share*. By- Slide_maker4u (Abhishek Sharma) *******For presentation Orders, contact me on the Email addresses Written below
******** Email- Sharmaabhishek576@gmail.com or Sharmacomputers87@gmail.com
*******THANK YOU***************
Sara Tempest is a mature career professional currently seeking part-time work in Calgary, Alberta using her extensive retail, administrative, and consulting experience acquired over several decades working in various roles. She has a background in retail management, merchandising, marketing, administration, consulting, and volunteer work. Sara is dedicated to continuous learning and skill development. She is team-oriented, results-driven, and enjoys applying her expertise to help businesses improve their operations and sales.
Data Protection – How Not to Panic and Make it a PositiveTargetX
- Josh Dean discussed how Lancaster University approached data protection regulations in a positive way rather than panicking.
- They focused on educating staff, designating GDPR representatives, and building internal tools to help control data access while giving people what they need.
- Externally, they developed new privacy policies prioritizing students, only collecting necessary data, and providing contact options.
- Now, Lancaster has addressed the fundamentals of being GDPR compliant while still being able to function and communicate through preference centers and dynamic content based on consent.
- The future of data protection will involve increasingly complex laws internationally as systems strive to keep up and all organizations continue adapting to new regulations and technologies.
The document discusses online safety and how schools can prepare for Ofsted inspections by developing an online safety curriculum, training staff, establishing policies and reporting procedures, and educating students, staff, and parents on risks like grooming, bullying, and inappropriate content. It provides examples of questions an Ofsted inspector may ask school leaders and staff to evaluate a school's online safety practices and identifies indicators of good and outstanding practice. Resources and ideas are shared for creating age-appropriate online safety lessons and engaging parents.
This presentation was delivered to Minnesota manufacturing CEOs who attended the April 2019 Enterprise Minnesota event. Manufacturing companies face real information security threats that they need to prepare for.
Internet privacy ethics and online securityPaul Berryman
Internet privacy, ethics, and online security are important issues that affect everyone who uses the internet. These topics involve protecting personal information, behaving ethically online, and maintaining security. They are addressed through user education, technological tools, and administrative policies. Schools must take steps to educate students on privacy, ethics, and staying safe online as internet use grows and new issues like cyberbullying emerge.
This document contains a copyright notice for an educational presentation on information systems prepared by Arianto Muditomo for Perbanas Institute. It states that the presentation materials are for non-commercial educational use only and cannot be altered or used for commercial purposes without written permission. The document lists references used in the presentation and provides an outline of the presentation topics, which include information systems in business, IT strategic planning, business intelligence and decision support, ethics and security, e-business and e-commerce, and knowledge management.
Slide Deck - CISSP Mentor Program Class Session 1FRSecure
This document summarizes a presentation given as part of a CISSP mentor program. It discusses the history and structure of the mentor program, as well as an introduction to the CISSP certification. Key points include:
- The mentor program started in 2010 with 6 students and has grown significantly. Classes follow a typical structure of recapping content, questions, quizzes, lectures, and homework assignments.
- The CISSP certification is maintained by ISC2 and tests knowledge across 8 security domains. Becoming certified requires passing the exam as well as relevant work experience.
- Presenter Evan Francen has over 20 years of security experience and emphasizes the importance of listening, not assuming expertise, and focusing on security
Cyber security practices involve preventing malicious attacks on computers, servers, mobile devices, electronic systems, networks, and data. It is also called information technology security or electronic information security.
https://www.infosectrain.com/courses/ceh-v11-certification-training/
Information Security is NOT an IT IssueEvan Francen
This document summarizes a presentation about information security. The presentation argues that information security is not just an IT issue and should be viewed as a business issue. It explains that IT-centric security can overlook important administrative and physical controls. The presentation recommends establishing an information security committee with the right stakeholders to develop policies and oversee a security program. It also describes security services offered by FRSecure to help organizations assess and improve their information security.
Anyone handling sensitive information in this day and age needs to to have a solid security setup and a plan for when something goes wrong. This webinar aims to get you looking at your security with fresh eyes and give you an outline of an action plan.
This document discusses e-safety in schools and what Ofsted looks for during inspections. It aims to raise awareness of e-safety risks, understand how e-safety fits into the computing curriculum and inspection framework, and identify good practices. It provides examples of questions inspectors may ask school leaders and staff to evaluate e-safety policies, training, education, and incident response. A variety of resources are presented to help schools develop their own e-safety curriculum and support special needs students and parents.
This document provides details of an Internet safety unit designed for middle school students. The unit was created by John Dolan to teach students how to safely use the Internet. It is structured using the Understanding by Design framework. Over three weeks, students will learn about protecting private identity information online, analyzing website privacy policies, identifying safe and unsafe sites, and strategies for ethical online behavior. Lessons include class discussions, online activities and games to help students distinguish between private and personal information.
This document discusses internet security. It defines security as freedom from risk or danger and safety. It also discusses why security is needed, such as to protect financial information, medical records, and trade secrets. Those at risk include financial institutions, internet service providers, government agencies, and anyone on a network. Common security attacks are discussed like packet sniffing, firewalls, and social engineering. Countermeasures to these threats include encryption, access control with firewalls, education, and monitoring who has access to resources. In conclusion, while many solutions exist, humans remain vulnerable to manipulation and it is important to stay aware of latest security issues.
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
The document discusses how to build an effective security awareness program by empowering and engaging employees rather than intimidating them. It advocates treating employees as "cyber warriors" rather than victims by providing them with the right information and tools to help defend the organization from cyber threats. Some key points made include: focusing on employee engagement; using "nudging" tactics rather than scare tactics to motivate better security behaviors; tailoring the message to different audiences; and measuring the impact of the program through before-and-after baselines. The goal is to change employee mindsets around security and turn intimidated, confused workers into empowered protectors of organizational data and systems.
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
This assignment has been submitted as part fulfillment for a Masters Degree in Educational Technology at The American College of Education.
Any comments, opinions or suggestions, to improve this assignment are highly welcome. Please feel free to contact through email, mulingoh@hotmail.com, or at yahoo.com.
Thank you.
- The document discusses various topics related to technology use and ethics in education, including internet safety, cyberbullying prevention, copyright issues, and student monitoring policies. It provides resources for teaching about these topics and suggests educating students and working together to address ethical challenges.
ISACA talk - cybersecurity and security cultureCraig McGill
PwC's talented senior cybersecurity and infosec manager Ross Foley recently gave a great talk on the growing importance of security culture within infosec. Here are the slides to help raise awareness of this issue.
The document summarizes an online safety presentation given to St Wilfred's RC Primary school staff in Manchester in October 2018. It discusses the Be Internet Legends resources for teaching online safety to KS2 students, how students are using apps and social media, and considerations for integrating online safety into the curriculum. Useful online safety resources are also provided.
Similar to TIES 2013 Education Technology Conference (20)
WANTED - People Committed to Solving Our Information Security Language ProblemEvan Francen
The document discusses solving the language problem in information security. It begins by explaining that information security is about managing risk by assessing threats and vulnerabilities, and using administrative, physical, and technical controls. It then introduces the S2Score as a simple scoring system to communicate security in a common language. The document advocates for making security assessments free and accessible to all, and developing translation tools to map different organizations' risk scoring systems to a common scale. The overall goal is to establish a shared security language to improve understanding and coordination across the industry.
This document discusses solving the language problem in the information security industry. It proposes using a simple scoring system called S2Score to communicate security risk and status across organizations using a common language. S2Score assessments are available for free online and can also translate between different scoring systems used by organizations. The future of S2Score includes community involvement, integration with other tools, and adoption by vendors to help standardize security language industry-wide and make risk management more effective and efficient.
TITLE: WANTED – People Committed to Solving Our Information Security Language Problem, the presentation given at the inaugural BSides Harrisburg Conference on October 2nd, 2019.
Step Up Your Data Security Against Third-Party RisksEvan Francen
This presentation was delivered to the Hacks & Hops event attendees in the Spring of 2019. The event featured a short keynote following by a moderated panel discussion. The panel experts provided excellent guidance for all risk managers, CISOs, vendor managers, etc.
Simple Training for Information Security and Payment FraudEvan Francen
The document discusses payment fraud risks and protections. It summarizes a survey finding that 74% of organizations were victims of payment fraud in 2016. Checks and wire transfers are most commonly targeted. Business email compromise scams targeting wire transfers are on the rise. The document provides 7 tips for protection, including employing dual control for transactions and monitoring accounts daily.
People. The Social Engineer's Dream - TechPulse 2017Evan Francen
Presentation given by Evan Francen at TechPulse 2017. The presentation was about social engineering, including common tactics and basic protections. Topics such as phishing, vishing, and physical access attacks were discussed. Evan also shared some of the real-life stories that he has experienced during his 20+ career.
AFCOM - Information Security State of the UnionEvan Francen
A presentation delivered by FRSecure's president Evan Francen at the August, 2015 Twin Cities AFCOM Chapter Meeting. There were more than 50 people in attendance to learn about FRSecure, current information security events and threats, what companies are doing, and basic information security principles.
It's not our job to tell business not to use mobile devices, even personally-owned mobile devices. It's our job to enable business to use mobile devices securely for the benefit of the organization, customers, employees, and contractors.
In this presentation, given on April 30 at techpulse 2013, Evan Francen from FRSecure teaches how to secure mobile devices in today's business environments.
Information security challenges in today’s banking environmentEvan Francen
This presentation was delivered to by FRSecure's Evan Francen to the Uniforum User's Group on November 8th, 2012. There were more than 50 bankers in attendance, and the presentation was very well received.
Information Security in a Compliance WorldEvan Francen
Presented by Evan Francen at the 2012 RK Dixon Tech Summit
What drives information security in your organization?
What is information security?
Customer requirements
Compliance
Compliant = Secure?
Solution - Strategic Information Security
Top Five Things You Should Do (Tactically & Strategically)
Need Help? – Contact Us!
Information Security For Leaders, By a LeaderEvan Francen
Evan Francen, President of FRSecure, discusses the challenges of building an efficient and effective security program in today’s world. Learn why most leaders have a false assumption of security, and how you can avoid the security mistakes most organizations make. - Delivered on 4/17/12 at TechPulse 2012.
FRSecure's Ten Security Principles to Live (or die) ByEvan Francen
The document outlines ten principles for protecting information and customer data according to FRSecure LLC. The principles emphasize that information security is a shared responsibility, not just an IT issue, and that people are the biggest risks. While compliance is important, it does not guarantee security. Businesses need practical and cost-effective security that is tailored to their unique needs. There are no quick fixes for security problems.
Meaningful Use and Security Risk AnalysisEvan Francen
Presentation delivered by FRSecure president, Evan Francen to the 100+ Iowa CPSI User Group attendees on October 18th, 2011.
Meaningful Use Core Requirement "Security Risk Analysis"
An Introduction to Information SecurityEvan Francen
A recent presentation given by FRSecure at the Action, Inc. Data Security Event on August 17th, 2011. This presentation was delivered by FRSecure president, Evan Francen CISSP CISM CCSK
This document provides an overview of FRSecure LLC, a full-service information security consulting company. It describes FRSecure's services such as information security assessments, program development, management, penetration testing, and training. The document discusses the need for information security to protect organizations from risks. It also outlines FRSecure's approach to performing security assessments based on ISO 27002 standards and delivering actionable recommendations and implementation assistance. Presentation topics are provided to discuss the benefits of partnering with FRSecure.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
2. Topics
Introduction
Is K-12 Doing What We Should?
Protecting Private Data
Preparing Kids Well
You probably came to see something cool
Let‟s Work Together
3. Introduction – Evan Francen
• Co-founder of FRSecure
• Information security expert with 20 years of experience
• Areas of expertise include information security
governance, risk management, social engineering,
compliance, and the things nobody else likes to do
• Information security evangelist
• Nickname is “the truth”
4. Introduction – About FRSecure
• Information Security is all we do…
• Methodologies; we create and use a ton of „em
• Project Leaders all have 15+ years of experience
• Transparent; we value knowledge transfer
• Product agnostic means we can more easily serve
your needs without conflict
5. Protecting Private Data
• Types of data that K-12 is responsible for
• Types of people using our technology
How are we doing?
7. Since 2005, there have been 716 breaches of
educational institutions involving more than 13
million private records*
(Source: Privacy Rights Clearinghouse - https://www.privacyrights.org/databreach/new)
These are the breaches that we know about
8. Protecting Private Data
• People are the greatest risk
• We can‟t fix people with technology
How comfortable are you with the mundane?
(people want the new cool thing, but how “cool” is policy?)
9. Protecting Private Data – Three Things
Every school should do these three things well.
• Information security governance
• Information security training & awareness
• Information security incident response
How comfortable are you with the mundane?
10. Protecting Private Data – Three Things
Every school should do these three things well.
Information security governance – what are the rules?
• Management commitment
• Information security policies
• Information security processes
How comfortable are you with the mundane?
11. Protecting Private Data – Three Things
Every school should do these three things well.
Information security training & awareness – people need to know the rules
• Training & awareness are two separate, but related initiatives
• Training – teaching the audience how to do something specific
• Awareness – keeping a specific topic “top of mind”
How comfortable are you with the mundane?
12. Protecting Private Data – Three Things
Every school should do these three things well.
Information security incident response – what do you do if someone breaks
the rules or if the rules are ineffective?
• If you don‟t know of an incident, it doesn‟t mean that one hasn‟t happened
• Incident response should be a formalized, step-by-step process
• An incident doesn‟t mean a breach
How comfortable are you with the mundane?
13. Protecting Private Data – Three Things
Common deficiencies
Information security governance
• Everybody seems to think that information security is an IT issue
• If a school has policies, they are often ineffective and critical processes are
sometimes missed
• Compliance is not measured and/or enforced
How comfortable are you with the mundane?
14. Protecting Private Data – Three Things
Common deficiencies
Information security training & awareness
• There isn‟t a formal training & awareness program
• People assume that there‟s common sense
• Training is confused with awareness or vice versa
How comfortable are you with the mundane?
15. Preparing Kids Well
For a career in information security
We have a huge shortage of good information
security professionals, and the problem is only
expected to get worse.
17. Preparing Kids Well
For a career in information security
• Is there an opportunity to teach the kids real-world
information security skills in the classroom?
• Is there an opportunity to teach the kids real-world
information security skills after school?
18. Preparing Kids Well
For life
• Are the kids taught about identity theft and how to
protect themselves?
• Are the kids taught about regulatory
compliance, policies, password management, etc.?
19. Preparing Kids Well
Opportunity
FRSecure is very willing and able to work with K-12 to help
• Can we develop courses for the students?
• Can we develop after school activities for students?
How about a “Hacking Club”?
20. You probably came to see something cool
Didn‟t you?
Pretty basic, but still pretty cool.
1. ARP poisoning for passwords
2. Bypassing Website filtering
21. You probably came to see something cool
ARP Poisoning
We use ARP poisoning to audit networks, the bad guys use it to steal
passwords.
Using Cain & Abel
Want step-by-step instructions? Give me your business card and I‟ll email
you.
22. You probably came to see something cool
Bypassing your Web filtering
Works (almost) all the time.
Using Tor
Want step-by-step instructions? Give me your business card
and I‟ll email you.
23. Let’s work together!
FRSecure exists to solve difficult information security challenges
with our clients & friends.
We don’t have to do business together in order to work together.
Two things:
1. Helping you secure your information
2. Helping equip students