SlideShare a Scribd company logo
1 of 21
Security Best Practices Benji Jasik, salesforce.com IT Executive: Chief Innovation Officer
Safe Harbor Statement ,[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risks in today’s world ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Large companies trust salesforce.com ~1,700 Subscribers ~1,300 Subscribers ~1,500 Subscribers ~7,600 Subscribers ~1,000 Subscribers ~4,200 Subscribers ~5,100 Subscribers ~2,000 Subscribers ~2,500 Subscribers ~5,000 Subscribers ~15,000 Subscribers ~15,000 Subscribers ~5,500 Subscribers ~1,800 Subscribers ~2,600 Subscribers ~5,500 Subscribers ~2,030 Subscribers ~25,000 Subscribers ~2,600 Subscribers ~4,000 Subscribers
Salesforce.com Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Salesforce.com Security Highlights ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Trade-Offs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Salesforce Security Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Salesforce Security Features ,[object Object],[object Object]
Password Management ,[object Object]
Single Sign On and LDAP Integration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Data Restrictions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Desktop Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Future Directions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anatomy of a phishing attack Forged email address Forged image Verify your account! Link goes to forged site Not addressed by name
End user training ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What can you do today? ,[object Object],[object Object],[object Object],[object Object]
Session Feedback Let us know how we’re doing! ,[object Object],[object Object],[object Object],[object Object],[object Object],We strive to improve, t hank you for filling out our survey. ,[object Object],[object Object]
Questions

More Related Content

Viewers also liked

Security testing fundamentals
Security testing fundamentalsSecurity testing fundamentals
Security testing fundamentalsCygnet Infotech
 
Penetration testing as an internal audit activity
Penetration testing as an internal audit activityPenetration testing as an internal audit activity
Penetration testing as an internal audit activityTranscendent Group
 
Mamma, da grande voglio essere un Penetration Tester HackInBo 2016 Winter
Mamma, da grande voglio essere un Penetration Tester HackInBo  2016 WinterMamma, da grande voglio essere un Penetration Tester HackInBo  2016 Winter
Mamma, da grande voglio essere un Penetration Tester HackInBo 2016 WinterSimone Onofri
 
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...Simone Onofri
 
Advanced mainframe hacking
Advanced mainframe hackingAdvanced mainframe hacking
Advanced mainframe hackingPhilip Young
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Penetration Testing con Python - Network Sniffer
Penetration Testing con Python - Network SnifferPenetration Testing con Python - Network Sniffer
Penetration Testing con Python - Network SnifferSimone Onofri
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by FortinetAtlantic Training, LLC.
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & TestingDeepu S Nath
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Peter R. Egli
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016Accenture Technology
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

Viewers also liked (16)

Security testing fundamentals
Security testing fundamentalsSecurity testing fundamentals
Security testing fundamentals
 
Penetration testing as an internal audit activity
Penetration testing as an internal audit activityPenetration testing as an internal audit activity
Penetration testing as an internal audit activity
 
Mamma, da grande voglio essere un Penetration Tester HackInBo 2016 Winter
Mamma, da grande voglio essere un Penetration Tester HackInBo  2016 WinterMamma, da grande voglio essere un Penetration Tester HackInBo  2016 Winter
Mamma, da grande voglio essere un Penetration Tester HackInBo 2016 Winter
 
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
 
Advanced mainframe hacking
Advanced mainframe hackingAdvanced mainframe hacking
Advanced mainframe hacking
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Penetration Testing con Python - Network Sniffer
Penetration Testing con Python - Network SnifferPenetration Testing con Python - Network Sniffer
Penetration Testing con Python - Network Sniffer
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Information security management
Information security managementInformation security management
Information security management
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

More from Dreamforce07

M A S008 Whiteley 091907
M A S008  Whiteley 091907M A S008  Whiteley 091907
M A S008 Whiteley 091907Dreamforce07
 
M A S003 Wildt 091707
M A S003  Wildt 091707M A S003  Wildt 091707
M A S003 Wildt 091707Dreamforce07
 
M A S005 Wildt 091807
M A S005  Wildt 091807M A S005  Wildt 091807
M A S005 Wildt 091807Dreamforce07
 
M A S009 Burbridge 091907
M A S009  Burbridge 091907M A S009  Burbridge 091907
M A S009 Burbridge 091907Dreamforce07
 
M A S006 Grenney 091807
M A S006  Grenney 091807M A S006  Grenney 091807
M A S006 Grenney 091807Dreamforce07
 
M A S007 Plotczyk 091807
M A S007  Plotczyk 091807M A S007  Plotczyk 091807
M A S007 Plotczyk 091807Dreamforce07
 
S D M002 Roth 091707
S D M002  Roth 091707S D M002  Roth 091707
S D M002 Roth 091707Dreamforce07
 
S D M001 Sechrist 091707
S D M001  Sechrist 091707S D M001  Sechrist 091707
S D M001 Sechrist 091707Dreamforce07
 
S D M004 Garoutte 091807
S D M004  Garoutte 091807S D M004  Garoutte 091807
S D M004 Garoutte 091807Dreamforce07
 
S D M103 Cismoski 091707
S D M103  Cismoski 091707S D M103  Cismoski 091707
S D M103 Cismoski 091707Dreamforce07
 
S O P001 Garoutte 091707
S O P001  Garoutte 091707S O P001  Garoutte 091707
S O P001 Garoutte 091707Dreamforce07
 
S O P009 Saxena 091907
S O P009  Saxena 091907S O P009  Saxena 091907
S O P009 Saxena 091907Dreamforce07
 
S O P005 Tenenblat 091807
S O P005  Tenenblat 091807S O P005  Tenenblat 091807
S O P005 Tenenblat 091807Dreamforce07
 
S O P003 Garoutte 091707
S O P003  Garoutte 091707S O P003  Garoutte 091707
S O P003 Garoutte 091707Dreamforce07
 
S O P006 Chan 091807
S O P006  Chan 091807S O P006  Chan 091807
S O P006 Chan 091807Dreamforce07
 
S O P002 Queener 091707
S O P002  Queener 091707S O P002  Queener 091707
S O P002 Queener 091707Dreamforce07
 
S C P003 Kuruganti 091707
S C P003  Kuruganti 091707S C P003  Kuruganti 091707
S C P003 Kuruganti 091707Dreamforce07
 
S C P001 Cohen 091707
S C P001  Cohen 091707S C P001  Cohen 091707
S C P001 Cohen 091707Dreamforce07
 
S C P004 Morris 091807
S C P004  Morris 091807S C P004  Morris 091807
S C P004 Morris 091807Dreamforce07
 
S C P009 Fullmore 091907
S C P009  Fullmore 091907S C P009  Fullmore 091907
S C P009 Fullmore 091907Dreamforce07
 

More from Dreamforce07 (20)

M A S008 Whiteley 091907
M A S008  Whiteley 091907M A S008  Whiteley 091907
M A S008 Whiteley 091907
 
M A S003 Wildt 091707
M A S003  Wildt 091707M A S003  Wildt 091707
M A S003 Wildt 091707
 
M A S005 Wildt 091807
M A S005  Wildt 091807M A S005  Wildt 091807
M A S005 Wildt 091807
 
M A S009 Burbridge 091907
M A S009  Burbridge 091907M A S009  Burbridge 091907
M A S009 Burbridge 091907
 
M A S006 Grenney 091807
M A S006  Grenney 091807M A S006  Grenney 091807
M A S006 Grenney 091807
 
M A S007 Plotczyk 091807
M A S007  Plotczyk 091807M A S007  Plotczyk 091807
M A S007 Plotczyk 091807
 
S D M002 Roth 091707
S D M002  Roth 091707S D M002  Roth 091707
S D M002 Roth 091707
 
S D M001 Sechrist 091707
S D M001  Sechrist 091707S D M001  Sechrist 091707
S D M001 Sechrist 091707
 
S D M004 Garoutte 091807
S D M004  Garoutte 091807S D M004  Garoutte 091807
S D M004 Garoutte 091807
 
S D M103 Cismoski 091707
S D M103  Cismoski 091707S D M103  Cismoski 091707
S D M103 Cismoski 091707
 
S O P001 Garoutte 091707
S O P001  Garoutte 091707S O P001  Garoutte 091707
S O P001 Garoutte 091707
 
S O P009 Saxena 091907
S O P009  Saxena 091907S O P009  Saxena 091907
S O P009 Saxena 091907
 
S O P005 Tenenblat 091807
S O P005  Tenenblat 091807S O P005  Tenenblat 091807
S O P005 Tenenblat 091807
 
S O P003 Garoutte 091707
S O P003  Garoutte 091707S O P003  Garoutte 091707
S O P003 Garoutte 091707
 
S O P006 Chan 091807
S O P006  Chan 091807S O P006  Chan 091807
S O P006 Chan 091807
 
S O P002 Queener 091707
S O P002  Queener 091707S O P002  Queener 091707
S O P002 Queener 091707
 
S C P003 Kuruganti 091707
S C P003  Kuruganti 091707S C P003  Kuruganti 091707
S C P003 Kuruganti 091707
 
S C P001 Cohen 091707
S C P001  Cohen 091707S C P001  Cohen 091707
S C P001 Cohen 091707
 
S C P004 Morris 091807
S C P004  Morris 091807S C P004  Morris 091807
S C P004 Morris 091807
 
S C P009 Fullmore 091907
S C P009  Fullmore 091907S C P009  Fullmore 091907
S C P009 Fullmore 091907
 

Recently uploaded

7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...amitlee9823
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 

Recently uploaded (20)

7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 

I T E010 Jasik 091907

  • 1. Security Best Practices Benji Jasik, salesforce.com IT Executive: Chief Innovation Officer
  • 2.
  • 3.
  • 4.
  • 5. Large companies trust salesforce.com ~1,700 Subscribers ~1,300 Subscribers ~1,500 Subscribers ~7,600 Subscribers ~1,000 Subscribers ~4,200 Subscribers ~5,100 Subscribers ~2,000 Subscribers ~2,500 Subscribers ~5,000 Subscribers ~15,000 Subscribers ~15,000 Subscribers ~5,500 Subscribers ~1,800 Subscribers ~2,600 Subscribers ~5,500 Subscribers ~2,030 Subscribers ~25,000 Subscribers ~2,600 Subscribers ~4,000 Subscribers
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.  
  • 14.
  • 15.
  • 16.
  • 17. Anatomy of a phishing attack Forged email address Forged image Verify your account! Link goes to forged site Not addressed by name
  • 18.
  • 19.
  • 20.