SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
!                        "        #             $                    %$ &
     '(                      •              )        "
                             •                      * +           , *#
                                      , -
                             •                                                   . / +
                             •    0             ,       1     2      *#-          $


3! 0 !          4            • "    #       $            %$ &
                             • 0, 5 6        6# ,      $# 1
    !           4            0, 0    . / 0,     5 #     . / +70
                                 , 1
0           )                • -      #.      ,       / ,,    8
                             • 6 -9 3 + #* 3              3
        $                    "      : 5         4 0, $          ,
                               ,  #
    )                        "    #       $            %$ &
        4                    • "          4$             ,  #
                             •         9;      *     %  &
        )           4        -            #    !    5!


                    <        0, 5 6                     6#,         $# 1
    !           <            •      )                   "
                             • - # "                                    9 0, .             =
                               3 ,    #
                             •                                           2         #
                                                                         $
                    5   #-   !                      #
* +#
                             !5       , #                                    + /           + /
                                                                  # ,    (
        )           <        •            /
                             •    "                 <$                       ,     #
                             •    6 /                !
    , +'(                                                                        6 /0

        <                    •    0, 5 6     6#,                          $# 1
                             •    0, $   " +   #                         0 9"  -


                                                                                       1
*                                               7
                                                 , ,  */                                                >
                                            •        # !               5                     #
                                                3 #


                            (                  #. / +
    0 ,             #3          #           ) , !5 !                   .            =    /

  .             (                           "             ($                             ,   #
0 ,          #3 #                           0,           / ,               3             # ), -         ), 7
               #    , !                     ) , 99       ),
            )     (                         • "             ($                                   ,    #
                                            • !5       , #                 + /                       # ,

                                            •   0, 0           . / 0,              5 #           . / +70
                                                   ,       1
0=                          (               •                          "
                                            •   "   #                                 $
                                            •   - #                                  7, .                  =
                                                3 ,   #


                            ?                        9$@           ,
    +                       :       5       "
                ?
                            ,               "     #                            $                       %$ &
 5
'!@                                                                        5         #
                50 ,            #                 #                            !                 3 /    0,

            *           ,               ?   "                      ,       #
            )               ?               •           9$@          ,
                                            • "           !         5                    ,
                                                                   #


                            A               - # "                                  70, .               =
                                            3 ,   #
                            ,               •      9$@                 ,
    5                                       • "                                                            8
            *           ,                   "                      ,       #
6       ,           A                       • !5 , #                       + /                       # ,

                                            •          #       /


                                                                                                       2
B #                                       A       •             #
                                                  •   )        #
    0 ,       #3                  #                           9$@             ,

    .                 A                               5       !       26 /                  ,

6                                                                     ,       #         #           C 0/ 9)
              "               "                   0               7                                   +
             7                :
3    #
    )             A                               6 /             ,
         )                A                       • "              2          A
                                                  •               .#,         ,             . /


                                      .   '       •       5       !           26 /                  ,

                                                  •                       ,                             , 1
         '                                        •       =       -
                                                  •                                2                     CB / %       &
                                              '                                        5    #
      . / +                                                                            5    #
    )    '                                                                             5    #
    .     '                                       •   -#                                9 #
                                                  •    =          -
                                                  •                                         5           #

    . /           +3                                                                   5        #
                                  '


                                      .               5       !       26 /                  ,

                                                  •   ),      6 +                                      "# #      0,
                                                  •   - # "                                         70, .             =
                                                      3 ,   #
                      ) +                         •
6 )                                               •       5           ,
B #                                               •                               = %                    &
                                                  •   6
                                                  •   0, !   ) , 2!                             5
.                                                 •    =   -
6   , ,
     0                                            •   6
    . /           +3                              •               #                                          6    7;*"


                                                                                                                  3
!9 ;.
                                        •    5 $ 0,       9 ),                          ,
                                          ),        -
     )                                  0, )    0    #   = 9 ,                           89
                                        6
*# 0 ,                                                9. D + @


                              .         ),           6 +            .              "##      0,
                                        •  =        -
                                        • -#                            9 #
                          !             - #                               7,                  =
                                          ,         #2
6    ,                            !@    •  =         -
                                        • -#                            9 #
. )          E                                            = % 9                &
6 )                                         #               ,            ,     #

     )                                  0, )          0    #     = 9 ,                   8
     .                                  •       #               ,      ,            #

                                        •    # ;
B #          !                     !@   • 0, )        #    = 9 ,                              8
                                        •      # , +      /
     . /             +3                 0, )        #   = 9 ,                        8

     ) +                                •       #               ,              ,    #

                                        •     # ;
                                        •           =                                    ,
         .       ,                      •      # , ,       F                             5
                                        • 6
!9            !@                        0, )      0 #  = 9 ,                             8
!                                        9            3 +
          )                                  # , +    /


$        !@ , #                                 2
                                            #               ,            ,     #

     <,                                 •       # ;
                                        •        #              ,              ,    #

)                                       0   # , +               /



                                                                                                  4
.                                        = :           ,       #!


     (,               •            # , +           /
                      •                      = :           ,        #
                          !
.                          #             3     #
.                              #     /


          )       4       #
    !@                !       5          3     #
.             4           #
          )       4   •         #"
                      •        ,"




                                                               5

Weitere ähnliche Inhalte

Was ist angesagt?

Institutional Presentation - 11/25/2008
Institutional Presentation - 11/25/2008Institutional Presentation - 11/25/2008
Institutional Presentation - 11/25/2008AES Eletropaulo
 
Boletim snt interlagos fev 2011
Boletim snt interlagos fev 2011Boletim snt interlagos fev 2011
Boletim snt interlagos fev 2011Edward Lake
 
Apresentação da Teleconferência 2T09
Apresentação da Teleconferência 2T09Apresentação da Teleconferência 2T09
Apresentação da Teleconferência 2T09AES Tietê
 
1Q09 Earnings Call Presentation
1Q09 Earnings Call Presentation1Q09 Earnings Call Presentation
1Q09 Earnings Call PresentationAES Tietê
 
Transició democràcia i autonomia
Transició democràcia i autonomiaTransició democràcia i autonomia
Transició democràcia i autonomiaEduard Costa
 
Pdf Tema 15: Transició, democràcia i autonomia
Pdf Tema 15: Transició, democràcia i autonomiaPdf Tema 15: Transició, democràcia i autonomia
Pdf Tema 15: Transició, democràcia i autonomiariberamontserrat
 
Règles d'or Sécurité à la Chasse Ficevy
Règles d'or Sécurité à la Chasse FicevyRègles d'or Sécurité à la Chasse Ficevy
Règles d'or Sécurité à la Chasse Ficevyelyaneforet
 
A.i. 2006.002.27583
A.i. 2006.002.27583A.i. 2006.002.27583
A.i. 2006.002.27583kduferraro
 
Gestão Compartilhada da Carteira de Projetos
Gestão Compartilhada da Carteira de ProjetosGestão Compartilhada da Carteira de Projetos
Gestão Compartilhada da Carteira de ProjetosProject Builder
 
HI 78a - Strengthening and Promoting Associations and Community Networks for ...
HI 78a - Strengthening and Promoting Associations and Community Networks for ...HI 78a - Strengthening and Promoting Associations and Community Networks for ...
HI 78a - Strengthening and Promoting Associations and Community Networks for ...Bernard hardy
 
Creating Leaderful Teams At2009 2up
Creating Leaderful Teams At2009 2upCreating Leaderful Teams At2009 2up
Creating Leaderful Teams At2009 2upPierre E. NEIS
 
Aix disk replacement
Aix disk replacementAix disk replacement
Aix disk replacementRanga Talari
 

Was ist angesagt? (16)

Institutional Presentation - 11/25/2008
Institutional Presentation - 11/25/2008Institutional Presentation - 11/25/2008
Institutional Presentation - 11/25/2008
 
Themenkatalog 2009
Themenkatalog 2009Themenkatalog 2009
Themenkatalog 2009
 
ENGLISH FOR AVIATION IMPLEMENTATION
ENGLISH FOR AVIATION IMPLEMENTATIONENGLISH FOR AVIATION IMPLEMENTATION
ENGLISH FOR AVIATION IMPLEMENTATION
 
Boletim snt interlagos fev 2011
Boletim snt interlagos fev 2011Boletim snt interlagos fev 2011
Boletim snt interlagos fev 2011
 
Apresentação da Teleconferência 2T09
Apresentação da Teleconferência 2T09Apresentação da Teleconferência 2T09
Apresentação da Teleconferência 2T09
 
1Q09 Earnings Call Presentation
1Q09 Earnings Call Presentation1Q09 Earnings Call Presentation
1Q09 Earnings Call Presentation
 
Transició democràcia i autonomia
Transició democràcia i autonomiaTransició democràcia i autonomia
Transició democràcia i autonomia
 
Pdf Tema 15: Transició, democràcia i autonomia
Pdf Tema 15: Transició, democràcia i autonomiaPdf Tema 15: Transició, democràcia i autonomia
Pdf Tema 15: Transició, democràcia i autonomia
 
Règles d'or Sécurité à la Chasse Ficevy
Règles d'or Sécurité à la Chasse FicevyRègles d'or Sécurité à la Chasse Ficevy
Règles d'or Sécurité à la Chasse Ficevy
 
A.i. 2006.002.27583
A.i. 2006.002.27583A.i. 2006.002.27583
A.i. 2006.002.27583
 
Scarica pdf
Scarica pdfScarica pdf
Scarica pdf
 
Gestão Compartilhada da Carteira de Projetos
Gestão Compartilhada da Carteira de ProjetosGestão Compartilhada da Carteira de Projetos
Gestão Compartilhada da Carteira de Projetos
 
HI 78a - Strengthening and Promoting Associations and Community Networks for ...
HI 78a - Strengthening and Promoting Associations and Community Networks for ...HI 78a - Strengthening and Promoting Associations and Community Networks for ...
HI 78a - Strengthening and Promoting Associations and Community Networks for ...
 
Creating Leaderful Teams At2009 2up
Creating Leaderful Teams At2009 2upCreating Leaderful Teams At2009 2up
Creating Leaderful Teams At2009 2up
 
Aix disk replacement
Aix disk replacementAix disk replacement
Aix disk replacement
 
3 marifatullah
3 marifatullah3 marifatullah
3 marifatullah
 

Andere mochten auch

The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 

Andere mochten auch (6)

The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 

Mehr von Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
 
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke   Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke   Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssBen Rothke
 

Mehr von Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke   Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke   Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
 

Rothke Talk

  • 1. ! " # $ %$ & '( • ) " • * + , *# , - • . / + • 0 , 1 2 *#- $ 3! 0 ! 4 • " # $ %$ & • 0, 5 6 6# , $# 1 ! 4 0, 0 . / 0, 5 # . / +70 , 1 0 ) • - #. , / ,, 8 • 6 -9 3 + #* 3 3 $ " : 5 4 0, $ , , # ) " # $ %$ & 4 • " 4$ , # • 9; * % & ) 4 - # ! 5! < 0, 5 6 6#, $# 1 ! < • ) " • - # " 9 0, . = 3 , # • 2 # $ 5 #- ! # * +# !5 , # + / + / # , ( ) < • / • " <$ , # • 6 / ! , +'( 6 /0 < • 0, 5 6 6#, $# 1 • 0, $ " + # 0 9" - 1
  • 2. * 7 , , */ > • # ! 5 # 3 # ( #. / + 0 , #3 # ) , !5 ! . = / . ( " ($ , # 0 , #3 # 0, / , 3 # ), - ), 7 # , ! ) , 99 ), ) ( • " ($ , # • !5 , # + / # , • 0, 0 . / 0, 5 # . / +70 , 1 0= ( • " • " # $ • - # 7, . = 3 , # ? 9$@ , + : 5 " ? , " # $ %$ & 5 '!@ 5 # 50 , # # ! 3 / 0, * , ? " , # ) ? • 9$@ , • " ! 5 , # A - # " 70, . = 3 , # , • 9$@ , 5 • " 8 * , " , # 6 , A • !5 , # + / # , • # / 2
  • 3. B # A • # • ) # 0 , #3 # 9$@ , . A 5 ! 26 / , 6 , # # C 0/ 9) " " 0 7 + 7 : 3 # ) A 6 / , ) A • " 2 A • .#, , . / . ' • 5 ! 26 / , • , , 1 ' • = - • 2 CB / % & ' 5 # . / + 5 # ) ' 5 # . ' • -# 9 # • = - • 5 # . / +3 5 # ' . 5 ! 26 / , • ), 6 + "# # 0, • - # " 70, . = 3 , # ) + • 6 ) • 5 , B # • = % & • 6 • 0, ! ) , 2! 5 . • = - 6 , , 0 • 6 . / +3 • # 6 7;*" 3
  • 4. !9 ;. • 5 $ 0, 9 ), , ), - ) 0, ) 0 # = 9 , 89 6 *# 0 , 9. D + @ . ), 6 + . "## 0, • = - • -# 9 # ! - # 7, = , #2 6 , !@ • = - • -# 9 # . ) E = % 9 & 6 ) # , , # ) 0, ) 0 # = 9 , 8 . • # , , # • # ; B # ! !@ • 0, ) # = 9 , 8 • # , + / . / +3 0, ) # = 9 , 8 ) + • # , , # • # ; • = , . , • # , , F 5 • 6 !9 !@ 0, ) 0 # = 9 , 8 ! 9 3 + ) # , + / $ !@ , # 2 # , , # <, • # ; • # , , # ) 0 # , + / 4
  • 5. . = : , #! (, • # , + / • = : , # ! . # 3 # . # / ) 4 # !@ ! 5 3 # . 4 # ) 4 • #" • ," 5