1) The document discusses the importance of personal disaster recovery planning and provides steps to build a plan including determining your digital assets, writing plans for yourself and others with different technical skills, and including important information like passwords, backups, finances, insurance, and points of contact.
2) It emphasizes the importance of offsite backups, testing plans, and dealing with complexities like updating plans and storing documentation.
3) The document aims to help readers prepare for potential disasters by having an organized plan while acknowledging this can feel overwhelming.
When it comes to intrusions and breaches, most security teams take a short-game view. This means that they look at events as discrete and individual and focus efforts on short-term goals. While not universally detrimental, this view does harm the overall security of an organization in the "long game”. Additionally, “active defense” has been hopelessly confused by marketing hype even though its meaning is powerful to security’s operational goals.
This talk focuses on how enterprise security defenders can adjust their mindset, refocus, and beat adversaries by leveraging active defense over the long game. The basis of this talk is the extensive research done in support of the threat intelligence solution blueprint, a comprehensive guide to understanding, architecting, operationalizing and maturing a threat intelligence program.
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
This presentation is part of the ConnXus myCBC Webinar Series. Tom Moore, Process and Technology Innovation at Altabos, covers the essentials of cybersecurity and how to minimize risks. Tom covers how to identify risks, evaluate the solutions, and ensure your company is prepared.
Presentation on data security for nonprofit organizations presented by Ken Robey, CISSP, of Security in Focus, Inc., as part of the Project Ignite forum series.
When it comes to intrusions and breaches, most security teams take a short-game view. This means that they look at events as discrete and individual and focus efforts on short-term goals. While not universally detrimental, this view does harm the overall security of an organization in the "long game”. Additionally, “active defense” has been hopelessly confused by marketing hype even though its meaning is powerful to security’s operational goals.
This talk focuses on how enterprise security defenders can adjust their mindset, refocus, and beat adversaries by leveraging active defense over the long game. The basis of this talk is the extensive research done in support of the threat intelligence solution blueprint, a comprehensive guide to understanding, architecting, operationalizing and maturing a threat intelligence program.
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
This presentation is part of the ConnXus myCBC Webinar Series. Tom Moore, Process and Technology Innovation at Altabos, covers the essentials of cybersecurity and how to minimize risks. Tom covers how to identify risks, evaluate the solutions, and ensure your company is prepared.
Presentation on data security for nonprofit organizations presented by Ken Robey, CISSP, of Security in Focus, Inc., as part of the Project Ignite forum series.
Running with Scissors: Balance between business and InfoSec needsMichael Scheidell
Presentation slides from a presentation given by Michael Scheidell, CISO Security Privateers at South Florida Chapter ISSA meeting in 2012.
Talks about the balance between business needs and information security and privacy needs.
If you don't have good security and privacy your business will get hacked and cost you. If you don't have good business sense, you spend too much on security and lock your clients and users out. and that will cost you.
See a whitepaper based on the presentation here:
http://www.net-security.org/article.php?id=1868
Running with scissors.Up or down.
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
Bobby Dominguez is an accomplished Internet pioneer and an acknowledged security, risk, and privacy expert. Mr. Dominguez has successfully integrated information security into top-level business initiatives at Home Shopping Network, PSCU Financial Services, and PNC Bank, where he implemented a new technology risk management framework. Under his leadership, the Sykes Global Security and Risk Management team was nominated and selected as one of the 5 best by 2008 SC Magazine “Best Security Team in the US.” Mr. Dominguez was also selected as one of the top 5 Chief Security Officers for the 2009, 2010, and 2013 SC Magazine “CSO of Year.” In 2012 he was a finalist for (ISC)2 Americas Information Security Leadership Awards.
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
An hour long presentation I gave for LYRASIS. It introduces many topics in security and privacy on the internet and computers and any other type of device with an ip address. IOT Internet of things, browsers, portable devices and more. In this hour I focused on things to train in libraries, security awareness training and other things relevant to people in libraries. Librarians and anyone else in a library. There's a focus on practical ways to secure yourself, browsers and other things. Also some dicussion on privacy
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
Carpe Diem Strategic Services (CDSS), a veteran owned service-disabled business that offers education and training which addresses threats to digital communications and online privacy.
Their mission is to assist individuals, families, and small businesses to understand, identify, and reduce threats and vulnerabilities that expose their business, financial, intellectual property, and sensitive personal data to potential exploitation and risk.
(Presentation, slides, and content created by AEGILITY)
TITLE: WANTED – People Committed to Solving Our Information Security Language Problem, the presentation given at the inaugural BSides Harrisburg Conference on October 2nd, 2019.
We need to get on the same page as an industry if we stand any hope of getting this right. It starts with understanding and agreeing to fundamentals, including the terminology we use.
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...AIIM International
Generally when we think of these instances, we think of cyber hackers as the cause. But, the threat may actually be closer to home. How do you make sure internal threats aren’t living in your office? How can you share your sensitive data and information to the intended recipients outside your firewalls safely and securely – and in a compliant manner? How can you ensure complete control, which is unique for your business, over shared content? Follow along with these webinar slides for the answers to these questions and more.
Want to follow along with the webinar replay? Download it here for free: http://info.aiim.org/remove-data-privacy-threats
State of Cyber: Views from an Industry InsiderBen Johnson
In order to understand how we might improve our defenses and our contributions to cyber safety, we must understand the power of the dark side. We look at some headline making hacks and call it some interesting aspects of those, then we shift to what can we all do for better cybersecurity and digital presence.
Running with Scissors: Balance between business and InfoSec needsMichael Scheidell
Presentation slides from a presentation given by Michael Scheidell, CISO Security Privateers at South Florida Chapter ISSA meeting in 2012.
Talks about the balance between business needs and information security and privacy needs.
If you don't have good security and privacy your business will get hacked and cost you. If you don't have good business sense, you spend too much on security and lock your clients and users out. and that will cost you.
See a whitepaper based on the presentation here:
http://www.net-security.org/article.php?id=1868
Running with scissors.Up or down.
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
Bobby Dominguez is an accomplished Internet pioneer and an acknowledged security, risk, and privacy expert. Mr. Dominguez has successfully integrated information security into top-level business initiatives at Home Shopping Network, PSCU Financial Services, and PNC Bank, where he implemented a new technology risk management framework. Under his leadership, the Sykes Global Security and Risk Management team was nominated and selected as one of the 5 best by 2008 SC Magazine “Best Security Team in the US.” Mr. Dominguez was also selected as one of the top 5 Chief Security Officers for the 2009, 2010, and 2013 SC Magazine “CSO of Year.” In 2012 he was a finalist for (ISC)2 Americas Information Security Leadership Awards.
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
An hour long presentation I gave for LYRASIS. It introduces many topics in security and privacy on the internet and computers and any other type of device with an ip address. IOT Internet of things, browsers, portable devices and more. In this hour I focused on things to train in libraries, security awareness training and other things relevant to people in libraries. Librarians and anyone else in a library. There's a focus on practical ways to secure yourself, browsers and other things. Also some dicussion on privacy
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
Carpe Diem Strategic Services (CDSS), a veteran owned service-disabled business that offers education and training which addresses threats to digital communications and online privacy.
Their mission is to assist individuals, families, and small businesses to understand, identify, and reduce threats and vulnerabilities that expose their business, financial, intellectual property, and sensitive personal data to potential exploitation and risk.
(Presentation, slides, and content created by AEGILITY)
TITLE: WANTED – People Committed to Solving Our Information Security Language Problem, the presentation given at the inaugural BSides Harrisburg Conference on October 2nd, 2019.
We need to get on the same page as an industry if we stand any hope of getting this right. It starts with understanding and agreeing to fundamentals, including the terminology we use.
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...AIIM International
Generally when we think of these instances, we think of cyber hackers as the cause. But, the threat may actually be closer to home. How do you make sure internal threats aren’t living in your office? How can you share your sensitive data and information to the intended recipients outside your firewalls safely and securely – and in a compliant manner? How can you ensure complete control, which is unique for your business, over shared content? Follow along with these webinar slides for the answers to these questions and more.
Want to follow along with the webinar replay? Download it here for free: http://info.aiim.org/remove-data-privacy-threats
State of Cyber: Views from an Industry InsiderBen Johnson
In order to understand how we might improve our defenses and our contributions to cyber safety, we must understand the power of the dark side. We look at some headline making hacks and call it some interesting aspects of those, then we shift to what can we all do for better cybersecurity and digital presence.
Similar to Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018 (20)
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
2. Talk Overview
1. Discuss why personal disaster recovery planning matters
2. Determine what makes up your digital life
3. Laugh at my personal failure
4. Build your own plan
5. Test your own plan
End Result: Prepared for the worst, hoping for the best.
13. Q3: Do you currently backup your files?
Answer
Yes, I have automatic, offsite backups
Yes, I have automatic, local backups
Yes, I copy stuff to a flash drive when I
remember…which is never
No, I live on the edge
14. Q4: Have you lost data before?
Answer
Yes, I was upset
Yes, but it was no big deal
Nope, I’m lucky and awesome
43. What’s even in
the plan?
Passwords
Backups
Financials
Healthcare and Insurance
Home Information
Technology / Security
Points of Contact
44. What’s even in
the plan?
Passwords
Backups
Financials
Healthcare and Insurance
Home Information
Technology / Security
Points of Contact
Passwords and decryption keys for:
◦ Any encrypted files, file vaults, disk encryption
◦ Your backups
◦ Your computer accounts
◦ Your online accounts (that’s a lot)
Make this easy on yourself, use a password manager
1Password Dashlane LastPass KeePass
45. OFFSITE backups
Bonus points for local and offsite backups
If it’s in the same ZIP code, it doesn’t count
File synchronization services count, but aren’t as robust
What’s even in
the plan?
Passwords
Backups
Financials
Healthcare and Insurance
Home Information
Technology / Security
Points of Contact Dropbox OneDrive
46. What’s even in
the plan?
Passwords
Backups
Financials
Healthcare and Insurance
Home Information
Technology / Security
Points of Contact
Credit Cards
Loans
Mortgages
Other Debts
Bank Accounts
Investment Accounts
Retirement Accounts
Cryptocurrency
Other Assets
47. What’s even in
the plan?
Passwords
Backups
Financials
Healthcare and Insurance
Home Information
Technology / Security
Points of Contact
Credit Bureaus
Government
48. What’s even in
the plan?
Passwords
Backups
Financials
Healthcare and Insurance
Home Information
Technology / Security
Points of Contact
Health Insurance
Dental Insurance
Vision Insurance
Life Insurance
Accidental Death &
Dismemberment
Short-term and Long-
term Disability
49. What’s even in
the plan?
Passwords
Backups
Financials
Healthcare and Insurance
Home Information
Technology / Security
Points of Contact
50. What’s even in
the plan?
Passwords
Backups
Financials
Healthcare and Insurance
Home Information
Technology / Security
Points of Contact
51. What’s even in
the plan?
Passwords
Backups
Financials
Healthcare and Insurance
Home Information
Technology / Security
Points of Contact Look at how much
fun we’re having
talking about
backups!
Knows
what
Bitcoin
is
52. BONUS:
Physical Kit
Backup USB chargers and cables
Backup multi-factor codes / keys
Copies of ID
First-Aid kit
Water (1 gal/person/day)
Non-perishable food
Battery or hand-crank radio
Flashlight, whistle, duct tape, extra batteries
Dust masks, plastic sheeting
Moist towelettes, garbage bags, plastic ties
See more at https://www.ready.gov