SlideShare ist ein Scribd-Unternehmen logo
1 von 89
Downloaden Sie, um offline zu lesen
Social media
is okay —
jeopardizing
security isn’t
I am Jordan Wollman
Executive Creative Director & Partner @ Aria
I’m 28
years old
(although my wife
may beg to differ)
I’m married to
     a fantastic
photographer:
        Briana
I have a
one-month
old daughter:
Remy
I generally talk about
  design, marketing,
    social media,
  music and movies
I have 357 followers on
   Twitter, 401 friends on
    Facebook, and 241
connections on LinkedIn
I love Star Wars
Some people call me Jedi Master
I am a Husband,
        Father,
      Advertiser,
  Avid snowboarder,
   Wine enthusiast,
Social media navigator.
You can find me on   Twitter, Facebook,
                     LinkedIn, Google+,
                     Behance, About.me,
                     Wordpress, projeqt, Virb,
                     Spotify, Vimeo, YouTube,
                     Last.fm, Pandora,
                     Delicious, Tumblr, Flickr,
                     Gowalla, Foursquare,
                     Klout, Ping.fm
                     ...
All that information,
and a lot more, you can find on

Facebook
A digital agency —
   we design the
experience of brands.
We design the
     experience of brands...
In one of many ways, online and
     through social media
Ihere?
        am
 o, why
S
    Let’s talk
    Social Media
Why should
 you care
about Social
  Media?
In 2011

  110 billion
minutes were
spent on social
  networks &
    blogs       [Source: Nielsen]
In 2011

          has 500
 million users.
That’s 1 in every
 13 people on
      earth.
In 2011

55 million
tweets are
 published
 each day
In 2011

300,000
users join
each day
In 2011




exceeds
2 billion
 views
each day
In 2011
  On the professional side,

        has
 over 100
million users
world wide
In 2011
  On the professional side,

 And a new
  user joins
every second
  of the day
Those are
your clients...
And they’re
  talking
about you.
It’s about the
disproportionate
    power of 1

    says my true reach is 270
     klout.com/#/jordanwollman
Yeah. Yeah. Yeah.
But is it safe?
In a lot of ways, yes.


In others...?
It’s the
 wild, wild west.
The rules are being
written in real-time.
Two sides to the safety coin:
1) Your personal safety
2) Your client’s safety
then
Okay

 Let’s look at a
 few case studies
@PrincessTweep
asks to be robbed,
and gets... robbed
“Well, I was ‘checking in’ on Foursquare all over
town today. I know it’s risky — but I lost one of
my mayorships last week and I’m not going to
      let that happen again.” said Tweep.
“A new website called PleaseRobMe.com
does nothing more than aggregate publicly
shared check-ins, but its name and purpose
attempt to shed more light on the dangerous
      side effects of location-sharing.”


                    via
“Many of us location-sharers get so caught
 up in the novelty and bonuses associated
    with our behavior that we forget the
         implications of our actions.”



                    via
“Some law enforcement agencies are referring
   to check-ins as recent empty homes”




                     via
✓   Foursquare
                ✓
Tools you       ✓
                    Gowalla
                    Loopt
willingly       ✓
                ✓
                    Google Buzz
                    Google+
check in with   ✓   Facebook
                ✓   Twitter
✓ Transit swipe-cards
              ✓
Things that   ✓
                Swipe cards for doors
                Electronic tolling (TollTag)
track your    ✓
              ✓
                Cellphones
                Location searches on
location        your PDA
              ✓ Free Wi-Fi
passively     ✓ Parking meters you call to
                add money



                                 [Source: eff.org]
Creepy: cree.py
is an application that allows you
to gather geolocation related
information about users from
social networking platforms
and image hosting services.
Hackers hacking
 July, 2011: AntiSec claimed credit for the
Booz Allen hack. It published a list of 90,000
military e-mail addresses, apparently stolen
          from Booz Allen's systems.



                      via
London fights back at RIM

 August, 2011: In the wake of ongoing riots in
   London, Blackberry maker Research in
  Motion’s website was hacked on Tuesday.




                      via
London fights back at RIM

“No Blackberry you will NOT assist the police,”
 wrote one hacker on a Research in Motion blog”
Social networking sites leak
   personal information
     ...a new study has found, raising the
   possibility that users of such sites can be
      tracked everywhere they go online




                       via
Social networking sites leak
   personal information
The study looked at twelve social networking sites:
 Bebo, Digg, Facebook, Friendster, Hi5, Imeem,
 LinkedIn, LiveJournal, MySpace, Orkut, Twitter,
                   and Xanga



                        via
Social networking sites leak
   personal information
   "Not only do they know where I'm visiting,
     they know who I am," said Wills. "And
              that's disconcerting."




                       via
Social networking sites leak
   personal information
    The report found that between 55%
    and 90% of users keep the default
            privacy settings




                   via
Can it be dangerous? Yes.




But the time is now!
Keeping
yourself safe
Privacy
Settings
Get to know who can and
can’t see your information
it
             e t!,
            e i
           s e
          n ar
     y  a h
     Privacy
       c s
    e n
  th Settings
If y ca
 theGet to know who can and
    can’t see your information
Photo by Jennifer Daniel




                           Only friend
                           friends
                           It’s not a popularity contest
                           Facebook will cap you at 5,001 anyway
Checking-in
 is okay...
  But do it as you leave,
    not as you arrive
Don’t check-in
  at home
    And don’t let your
    friends do it either
Frank
                                  Annie




 Photo-tagging
        Is generally associated
           with Geo-Tagging
Keeping your
 clients safe
Have a plan
     Know the dangers & pitfalls
     before you start out
State your terms
of use clearly
And report violators
to Facebook, Twitter,
YouTube, etc.
Don’t feed
 the trolls
 The only want to incite riot
— just report, then ignore them
Choose
a partner
   Maximize opportunity
   & avoid pitfalls
If not, choose
  a good tool
Verify
 age
 Well... do what you can.
Asking for check-
   ins is risky

     Make sure your clients
    are aware of the dangers
ASL
Don’t ask for, or require
 Age, Sex, Location
Moderate the
conversation
It’s okay to delete other’s comments,
or use profanity filtering
It may be risky,
   but go forth
 and conquer!
Because
✓ Over 50% of the       ✓ If Facebook were a
  world is under 30       country it would be
                          the world’s 3rd
✓ In 10 years over        largest and 2x the
  40% of the Fortune      size of the U.S.
  500 won’t be here
                        ✓ 2009 study revealed
✓ Facebook tops           that online students
  Google for weekly       out performed those
  traffic in the U.S.     receiving face-to-
                          face instruction
Where your
audience is
  hiding
There’s plenty of
info out there on
  the big boys
The new kid on the block
A total mystery to marketers:
they aren’t playing by the rules!
Google+ is about individuals
     — not businesses,
 organizations, corporations
Individuals
    are
 authentic
Individuals
    are
  flawed
Individuals
    are
interesting
Individuals
    are
identifiable
Who’s
done it
right?
Until...
That’s Fabio!
That’s Fabio!


No... really!
Individuals
    are
 willing to
advocate a
good cause
Conclusion
✓ Brave it... the       ✓ Be authentic.
  time is now!            That’s what the
                          ever-growing 50%,
✓ It may be               under 30
  dangerous, but          population wants
  with a little           from brands
  common sense,
  it’s worth the
  investment and risk
And remember.
What happens in
Vegas...

...stays on Facebook,
YouTube, and Flickr
Q&A
w ariaagency.com
t @jordanwollman
f /jordanwollman

Weitere ähnliche Inhalte

Was ist angesagt?

Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentationsahrdebeck52
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Michelle Ferrier
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet SafetyJessica Punke
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
 
Fys social media explosion1
Fys social media explosion1Fys social media explosion1
Fys social media explosion1kayleebreeann
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comeducatedcommuni79
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonJohn Florentino E Echon
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Jim Adler
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineHolly Solomon
 
Paul muller flip book 2jun17
Paul muller flip book 2jun17Paul muller flip book 2jun17
Paul muller flip book 2jun17Paul Muller
 
Presentation
PresentationPresentation
PresentationLHSICT
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital FootprintsEric Cole
 
Digital footprints final
Digital footprints finalDigital footprints final
Digital footprints finalseanclimbs
 

Was ist angesagt? (20)

Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
Davy Lunch & Learn
Davy Lunch & LearnDavy Lunch & Learn
Davy Lunch & Learn
 
Web pp
Web ppWeb pp
Web pp
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentation
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet Safety
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 
Fys social media explosion1
Fys social media explosion1Fys social media explosion1
Fys social media explosion1
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.com
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane Abdon
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Facebook- Women- Smoking
Facebook- Women- SmokingFacebook- Women- Smoking
Facebook- Women- Smoking
 
Paul muller flip book 2jun17
Paul muller flip book 2jun17Paul muller flip book 2jun17
Paul muller flip book 2jun17
 
Unit 35
Unit 35Unit 35
Unit 35
 
Presentation
PresentationPresentation
Presentation
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital Footprints
 
Digital footprints final
Digital footprints finalDigital footprints final
Digital footprints final
 

Andere mochten auch

Andere mochten auch (7)

R.Smith Art
R.Smith ArtR.Smith Art
R.Smith Art
 
Building Muscle
Building MuscleBuilding Muscle
Building Muscle
 
The Big Four
The Big FourThe Big Four
The Big Four
 
DNA
DNADNA
DNA
 
R.Smith Art
R.Smith ArtR.Smith Art
R.Smith Art
 
Fungus
FungusFungus
Fungus
 
Molecular Genetics
Molecular GeneticsMolecular Genetics
Molecular Genetics
 

Ähnlich wie Social Media is Okay - Jeopardizing Security Isn't

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceFive Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceDave LaFontaine
 
Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social mediaDave LaFontaine
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& dataminingPaige Jaeger
 
Do not put too much information pdf
Do not put too much information pdfDo not put too much information pdf
Do not put too much information pdfShangli Jiang
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPSmicaja
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Dave Briggs
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Bex Lewis
 
A Social Media Evolution - Whats Next
A Social Media Evolution - Whats NextA Social Media Evolution - Whats Next
A Social Media Evolution - Whats NextSocial Media Bootcamp
 

Ähnlich wie Social Media is Okay - Jeopardizing Security Isn't (20)

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
03 dllo davidlafontaine
03 dllo davidlafontaine03 dllo davidlafontaine
03 dllo davidlafontaine
 
Rent Wiki Social Prez
Rent Wiki Social PrezRent Wiki Social Prez
Rent Wiki Social Prez
 
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceFive Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
 
Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social media
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Social web for grannies
Social web for granniesSocial web for grannies
Social web for grannies
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
Facebook
FacebookFacebook
Facebook
 
Do not put too much information pdf
Do not put too much information pdfDo not put too much information pdf
Do not put too much information pdf
 
Digital footprints fetc13
Digital footprints fetc13Digital footprints fetc13
Digital footprints fetc13
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPS
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
 
A Social Media Evolution - Whats Next
A Social Media Evolution - Whats NextA Social Media Evolution - Whats Next
A Social Media Evolution - Whats Next
 

Kürzlich hochgeladen

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 

Kürzlich hochgeladen (20)

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 

Social Media is Okay - Jeopardizing Security Isn't