SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
www.seef.reputelligence.com
FOR IMMEDIATE RELEASE
Logo wars, the fight for attention and resources
BURGISTEIN, Switzerland, September 1st
2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social
engineering engagement framework (SEEF), will release the first known social engineering icons, today.
The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to
think. People recognize icons faster than words. Visual perception is one of the most productive ways through which
people can obtain information and process it.
The SEEF social engineering icons can be used in many ways:
 Risk assessments and documentation
 Vulnerability reporting
 Attack vector development
 Information security briefings
 Information security awareness trainings
The benefits of using SEEF social engineering icons:
 People are visually-driven creatures;
 Icons have a tendency to stick better;
 Improving general comprehension;
 Conveying a memorable message from c-level to technical experts.
Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing
way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing,
dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation,
shoulder surfing, or impersonation. In total, there about 38 icons.
The initiative for developing these icons came from the author, who often speaks at security conferences, has
authored a book about social engineering, and works as a senior security consultant for the top international
companies and governmental organizations. He quotes: “Social engineering is a very complex and abstract topic to
grasp. It is not so obvious like technical vulnerabilities in a system; it is about the vulnerabilities of the human mind. I
needed a visually-driven way to convey this message. For other vulnerabilities, there are logos available,
communicating in a memorable and appealing way the risk associated with such a vulnerability. But for social
engineering, as one of the top advanced persistent threats, there were none. So I had to develop the icons myself. So
far, the use of the icons was a full success. For my clients and briefings, I can now use a set comprehensive icons,
communicating in a powerful way the risks of social engineering attack vectors.”
Contact: Dominique C. BRACK
Reputelligence Publishing,
Muttlen 131, CH3664
Tel: +41798721995
Email: publishing@reputelligence.com
Website: seef.reputelligence.com
www.seef.reputelligence.com
As the author was quoted at one of his security conference speeches: “Using the social engineering icons will give you
10% more budget, and you will get the hero bonus too.”
They are now available for download. As a free version for using based on the respective license agreement and a paid
version which includes vector files.
Related Links:
http://selz.co/Ny-y91s5Z
https://seef.reputelligence.com
https://www.youtube.com/watch?v=NcpmhsSVzuM&feature=youtu.be
###

Weitere ähnliche Inhalte

Ähnlich wie Press release social engineering engagement framework seef social engineering icons

Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
Pavlos Isaris
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
TopCyberNewsMAGAZINE
 
Reimagining Risk Management: How Restorative Practices Can Transform Informat...
Reimagining Risk Management: How Restorative Practices Can Transform Informat...Reimagining Risk Management: How Restorative Practices Can Transform Informat...
Reimagining Risk Management: How Restorative Practices Can Transform Informat...
Michele Chubirka
 
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE GmbH
 
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
Michael Altendorf
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014
iDIALOGHI
 
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
stirlingvwriters
 

Ähnlich wie Press release social engineering engagement framework seef social engineering icons (20)

Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
Power of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology AdoptionPower of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology Adoption
 
Visualization for Software Analytics
Visualization for Software AnalyticsVisualization for Software Analytics
Visualization for Software Analytics
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
 
10 Page Essay
10 Page Essay10 Page Essay
10 Page Essay
 
10 Page Essay
10 Page Essay10 Page Essay
10 Page Essay
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting International
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
Reimagining Risk Management: How Restorative Practices Can Transform Informat...
Reimagining Risk Management: How Restorative Practices Can Transform Informat...Reimagining Risk Management: How Restorative Practices Can Transform Informat...
Reimagining Risk Management: How Restorative Practices Can Transform Informat...
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
 
MAHESWARI_Resume
MAHESWARI_ResumeMAHESWARI_Resume
MAHESWARI_Resume
 
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
ADTELLIGENCE White Paper: Monetizationof strategies and business models for S...
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014
 
User Interfaces in Cybersecurity
User Interfaces in CybersecurityUser Interfaces in Cybersecurity
User Interfaces in Cybersecurity
 
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
 

Mehr von Reputelligence

Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
Reputelligence
 

Mehr von Reputelligence (20)

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.de
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup Process
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk management
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentation
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcb
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rollout
 
Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1
 
Hack back series how to spot fake linked in profiles - a way to figure out f...
Hack back series  how to spot fake linked in profiles - a way to figure out f...Hack back series  how to spot fake linked in profiles - a way to figure out f...
Hack back series how to spot fake linked in profiles - a way to figure out f...
 

Kürzlich hochgeladen

The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
SandaliGurusinghe2
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Riyadh +966572737505 get cytotec
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
AllTops
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
Nimot Muili
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
alinstan901
 

Kürzlich hochgeladen (17)

digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdf
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
 
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
Independent Escorts Vikaspuri / 9899900591 High Profile Escort Service in Delhi
Independent Escorts Vikaspuri  / 9899900591 High Profile Escort Service in DelhiIndependent Escorts Vikaspuri  / 9899900591 High Profile Escort Service in Delhi
Independent Escorts Vikaspuri / 9899900591 High Profile Escort Service in Delhi
 
Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
Strategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal AnalsysisStrategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal Analsysis
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 
Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptx
 

Press release social engineering engagement framework seef social engineering icons

  • 1. www.seef.reputelligence.com FOR IMMEDIATE RELEASE Logo wars, the fight for attention and resources BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today. The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it. The SEEF social engineering icons can be used in many ways:  Risk assessments and documentation  Vulnerability reporting  Attack vector development  Information security briefings  Information security awareness trainings The benefits of using SEEF social engineering icons:  People are visually-driven creatures;  Icons have a tendency to stick better;  Improving general comprehension;  Conveying a memorable message from c-level to technical experts. Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons. The initiative for developing these icons came from the author, who often speaks at security conferences, has authored a book about social engineering, and works as a senior security consultant for the top international companies and governmental organizations. He quotes: “Social engineering is a very complex and abstract topic to grasp. It is not so obvious like technical vulnerabilities in a system; it is about the vulnerabilities of the human mind. I needed a visually-driven way to convey this message. For other vulnerabilities, there are logos available, communicating in a memorable and appealing way the risk associated with such a vulnerability. But for social engineering, as one of the top advanced persistent threats, there were none. So I had to develop the icons myself. So far, the use of the icons was a full success. For my clients and briefings, I can now use a set comprehensive icons, communicating in a powerful way the risks of social engineering attack vectors.” Contact: Dominique C. BRACK Reputelligence Publishing, Muttlen 131, CH3664 Tel: +41798721995 Email: publishing@reputelligence.com Website: seef.reputelligence.com
  • 2. www.seef.reputelligence.com As the author was quoted at one of his security conference speeches: “Using the social engineering icons will give you 10% more budget, and you will get the hero bonus too.” They are now available for download. As a free version for using based on the respective license agreement and a paid version which includes vector files. Related Links: http://selz.co/Ny-y91s5Z https://seef.reputelligence.com https://www.youtube.com/watch?v=NcpmhsSVzuM&feature=youtu.be ###