際際滷shows by User: MarkStafford14 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: MarkStafford14 / Fri, 30 Aug 2019 18:54:01 GMT 際際滷Share feed for 際際滷shows by User: MarkStafford14 Npower Being Human Beings /slideshow/npower-being-human-beings/167822776 npower-beinghumanbeings-190830185401
Talk to the NPower Students in Dallas 08/30]]>

Talk to the NPower Students in Dallas 08/30]]>
Fri, 30 Aug 2019 18:54:01 GMT /slideshow/npower-being-human-beings/167822776 MarkStafford14@slideshare.net(MarkStafford14) Npower Being Human Beings MarkStafford14 Talk to the NPower Students in Dallas 08/30 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/npower-beinghumanbeings-190830185401-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Talk to the NPower Students in Dallas 08/30
Npower Being Human Beings from Mark Stafford
]]>
510 1 https://cdn.slidesharecdn.com/ss_thumbnails/npower-beinghumanbeings-190830185401-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Operations Transformation /slideshow/security-operations-tranformation/111162362 securitytransformation-180823162112
Rather than having an agenda of the now, you need to have principles to determine your approach to security operations. Without a mission, everything is reactive and that's not the way to success in mitigation, in fact its setting you up to fail. Here's my primer on setting principles in Security Operations. ]]>

Rather than having an agenda of the now, you need to have principles to determine your approach to security operations. Without a mission, everything is reactive and that's not the way to success in mitigation, in fact its setting you up to fail. Here's my primer on setting principles in Security Operations. ]]>
Thu, 23 Aug 2018 16:21:12 GMT /slideshow/security-operations-tranformation/111162362 MarkStafford14@slideshare.net(MarkStafford14) Security Operations Transformation MarkStafford14 Rather than having an agenda of the now, you need to have principles to determine your approach to security operations. Without a mission, everything is reactive and that's not the way to success in mitigation, in fact its setting you up to fail. Here's my primer on setting principles in Security Operations. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securitytransformation-180823162112-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Rather than having an agenda of the now, you need to have principles to determine your approach to security operations. Without a mission, everything is reactive and that&#39;s not the way to success in mitigation, in fact its setting you up to fail. Here&#39;s my primer on setting principles in Security Operations.
Security Operations Transformation from Mark Stafford
]]>
564 2 https://cdn.slidesharecdn.com/ss_thumbnails/securitytransformation-180823162112-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber security transformational themes - Cyber Security Primer /slideshow/cyber-security-transformational-themes-cyber-security-primer/110953424 cybersecuritytransformationalthemes-180822030116
The common themes of Digital Transformation are equally applicable to cyber security. In fact why wouldn't they be? Cyber Security is about protecting digital assets so that they can be exploited and monetized by the organisation that owns them, not the criminals. However most orgs are still reactive... to be proactive and get ahead of threats, transformation is necessary. ]]>

The common themes of Digital Transformation are equally applicable to cyber security. In fact why wouldn't they be? Cyber Security is about protecting digital assets so that they can be exploited and monetized by the organisation that owns them, not the criminals. However most orgs are still reactive... to be proactive and get ahead of threats, transformation is necessary. ]]>
Wed, 22 Aug 2018 03:01:16 GMT /slideshow/cyber-security-transformational-themes-cyber-security-primer/110953424 MarkStafford14@slideshare.net(MarkStafford14) Cyber security transformational themes - Cyber Security Primer MarkStafford14 The common themes of Digital Transformation are equally applicable to cyber security. In fact why wouldn't they be? Cyber Security is about protecting digital assets so that they can be exploited and monetized by the organisation that owns them, not the criminals. However most orgs are still reactive... to be proactive and get ahead of threats, transformation is necessary. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritytransformationalthemes-180822030116-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The common themes of Digital Transformation are equally applicable to cyber security. In fact why wouldn&#39;t they be? Cyber Security is about protecting digital assets so that they can be exploited and monetized by the organisation that owns them, not the criminals. However most orgs are still reactive... to be proactive and get ahead of threats, transformation is necessary.
Cyber security transformational themes - Cyber Security Primer from Mark Stafford
]]>
561 2 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritytransformationalthemes-180822030116-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CIS Critical Controls - Posters /MarkStafford14/cis-critical-controls-posters csct20v7posters-180719204950
The Center for Internet Security Critical Security Controls Top 20 in a series of posters. These are shared for NON COMMERCIAL USE and are watermarked. The Trademark of the CIS is recognized. A3 Format for ease of printing, useful as a quick visual guide to the controls, without having to read through pages of text. First three posters are the control sets, followed by a two posters for each control, a control overview and then a control service view.]]>

The Center for Internet Security Critical Security Controls Top 20 in a series of posters. These are shared for NON COMMERCIAL USE and are watermarked. The Trademark of the CIS is recognized. A3 Format for ease of printing, useful as a quick visual guide to the controls, without having to read through pages of text. First three posters are the control sets, followed by a two posters for each control, a control overview and then a control service view.]]>
Thu, 19 Jul 2018 20:49:50 GMT /MarkStafford14/cis-critical-controls-posters MarkStafford14@slideshare.net(MarkStafford14) CIS Critical Controls - Posters MarkStafford14 The Center for Internet Security Critical Security Controls Top 20 in a series of posters. These are shared for NON COMMERCIAL USE and are watermarked. The Trademark of the CIS is recognized. A3 Format for ease of printing, useful as a quick visual guide to the controls, without having to read through pages of text. First three posters are the control sets, followed by a two posters for each control, a control overview and then a control service view. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/csct20v7posters-180719204950-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Center for Internet Security Critical Security Controls Top 20 in a series of posters. These are shared for NON COMMERCIAL USE and are watermarked. The Trademark of the CIS is recognized. A3 Format for ease of printing, useful as a quick visual guide to the controls, without having to read through pages of text. First three posters are the control sets, followed by a two posters for each control, a control overview and then a control service view.
CIS Critical Controls - Posters from Mark Stafford
]]>
941 4 https://cdn.slidesharecdn.com/ss_thumbnails/csct20v7posters-180719204950-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - IOT - The Cyber Security Challenges with IOT /slideshow/cyber-security-primer-iot-the-cyber-security-challenges-with-iot/98689811 iotsecuritychallenges-180525144159
Cyber Security Primer - IOT - The Cyber Security Challenges with IOT]]>

Cyber Security Primer - IOT - The Cyber Security Challenges with IOT]]>
Fri, 25 May 2018 14:41:59 GMT /slideshow/cyber-security-primer-iot-the-cyber-security-challenges-with-iot/98689811 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - IOT - The Cyber Security Challenges with IOT MarkStafford14 Cyber Security Primer - IOT - The Cyber Security Challenges with IOT <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iotsecuritychallenges-180525144159-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - IOT - The Cyber Security Challenges with IOT
Cyber Security Primer - IOT - The Cyber Security Challenges with IOT from Mark Stafford
]]>
632 4 https://cdn.slidesharecdn.com/ss_thumbnails/iotsecuritychallenges-180525144159-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Awareness - Using Marketing Techniques for Security Awareness /slideshow/cyber-security-primer-awareness-using-marketing-techniques-for-security-awareness/98333294 usingmarketingforsecurityawareness-180523201403
Cyber Security Primer - Awareness - Using Marketing Techniques for Security Awareness]]>

Cyber Security Primer - Awareness - Using Marketing Techniques for Security Awareness]]>
Wed, 23 May 2018 20:14:03 GMT /slideshow/cyber-security-primer-awareness-using-marketing-techniques-for-security-awareness/98333294 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Awareness - Using Marketing Techniques for Security Awareness MarkStafford14 Cyber Security Primer - Awareness - Using Marketing Techniques for Security Awareness <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/usingmarketingforsecurityawareness-180523201403-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Awareness - Using Marketing Techniques for Security Awareness
Cyber Security Primer - Awareness - Using Marketing Techniques for Security Awareness from Mark Stafford
]]>
327 1 https://cdn.slidesharecdn.com/ss_thumbnails/usingmarketingforsecurityawareness-180523201403-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Policy - The Good Policy Wheel /slideshow/cyber-security-primer-policy-the-good-policy-wheel/98186621 thegoodpolicywheel-180523015312
Cyber Security Primer - Policy - The Good Policy Wheel ]]>

Cyber Security Primer - Policy - The Good Policy Wheel ]]>
Wed, 23 May 2018 01:53:12 GMT /slideshow/cyber-security-primer-policy-the-good-policy-wheel/98186621 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Policy - The Good Policy Wheel MarkStafford14 Cyber Security Primer - Policy - The Good Policy Wheel <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thegoodpolicywheel-180523015312-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Policy - The Good Policy Wheel
Cyber Security Primer - Policy - The Good Policy Wheel from Mark Stafford
]]>
387 2 https://cdn.slidesharecdn.com/ss_thumbnails/thegoodpolicywheel-180523015312-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Skill Sets - Data Science Skills for the SOC /slideshow/cyber-security-primer-skill-sets-data-science-skills-for-the-soc/98083952 dataanalyst-180522142058
Cyber Security Primer - Skill Sets - Data Science Skills for the SOC]]>

Cyber Security Primer - Skill Sets - Data Science Skills for the SOC]]>
Tue, 22 May 2018 14:20:57 GMT /slideshow/cyber-security-primer-skill-sets-data-science-skills-for-the-soc/98083952 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Skill Sets - Data Science Skills for the SOC MarkStafford14 Cyber Security Primer - Skill Sets - Data Science Skills for the SOC <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dataanalyst-180522142058-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Skill Sets - Data Science Skills for the SOC
Cyber Security Primer - Skill Sets - Data Science Skills for the SOC from Mark Stafford
]]>
152 3 https://cdn.slidesharecdn.com/ss_thumbnails/dataanalyst-180522142058-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning for Cyber. /slideshow/cyber-security-primer-operations-ai-machine-learning-and-deep-learning-for-cyber/97876894 aimachinelearningcyber-180521141647
Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning for Cyber.]]>

Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning for Cyber.]]>
Mon, 21 May 2018 14:16:47 GMT /slideshow/cyber-security-primer-operations-ai-machine-learning-and-deep-learning-for-cyber/97876894 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning for Cyber. MarkStafford14 Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning for Cyber. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/aimachinelearningcyber-180521141647-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning for Cyber.
Cyber Security Primer - Operations - AI, Machine Learning and Deep Learning for Cyber. from Mark Stafford
]]>
174 1 https://cdn.slidesharecdn.com/ss_thumbnails/aimachinelearningcyber-180521141647-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Awareness - The Social Engineering of Phishing /slideshow/cyber-security-primer-awareness-the-social-engineering-of-phishing/97426851 phishing-180517194415
Cyber Security Primer - Awareness - The Social Engineering of Phishing]]>

Cyber Security Primer - Awareness - The Social Engineering of Phishing]]>
Thu, 17 May 2018 19:44:15 GMT /slideshow/cyber-security-primer-awareness-the-social-engineering-of-phishing/97426851 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Awareness - The Social Engineering of Phishing MarkStafford14 Cyber Security Primer - Awareness - The Social Engineering of Phishing <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/phishing-180517194415-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Awareness - The Social Engineering of Phishing
Cyber Security Primer - Awareness - The Social Engineering of Phishing from Mark Stafford
]]>
152 1 https://cdn.slidesharecdn.com/ss_thumbnails/phishing-180517194415-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The OODA Loop /MarkStafford14/cyber-security-primer-playbooks-building-simple-threat-models-using-the-ooda-loop oodaforthreatmodelling-180516152000
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The OODA Loop]]>

Cyber Security Primer - Playbooks - Building Simple Threat Models Using The OODA Loop]]>
Wed, 16 May 2018 15:20:00 GMT /MarkStafford14/cyber-security-primer-playbooks-building-simple-threat-models-using-the-ooda-loop MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Playbooks - Building Simple Threat Models Using The OODA Loop MarkStafford14 Cyber Security Primer - Playbooks - Building Simple Threat Models Using The OODA Loop <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oodaforthreatmodelling-180516152000-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Playbooks - Building Simple Threat Models Using The OODA Loop
Cyber Security Primer - Playbooks - Building Simple Threat Models Using The OODA Loop from Mark Stafford
]]>
236 1 https://cdn.slidesharecdn.com/ss_thumbnails/oodaforthreatmodelling-180516152000-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Assets - Control Number One /slideshow/cyber-security-primer-assets-control-number-one/97173067 controlnumberone-180515145404
Cyber Security Primer - Assets - Control Number One]]>

Cyber Security Primer - Assets - Control Number One]]>
Tue, 15 May 2018 14:54:03 GMT /slideshow/cyber-security-primer-assets-control-number-one/97173067 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Assets - Control Number One MarkStafford14 Cyber Security Primer - Assets - Control Number One <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/controlnumberone-180515145404-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Assets - Control Number One
Cyber Security Primer - Assets - Control Number One from Mark Stafford
]]>
112 1 https://cdn.slidesharecdn.com/ss_thumbnails/controlnumberone-180515145404-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Operations - Transforming Security Operations with Clear Principles. /slideshow/cyber-security-primer-operations-transforming-security-operations-with-clear-principles/97056701 securitytransformation-180514161953
Cyber Security Primer - Operations - Transforming Security Operations with Clear Principles.]]>

Cyber Security Primer - Operations - Transforming Security Operations with Clear Principles.]]>
Mon, 14 May 2018 16:19:53 GMT /slideshow/cyber-security-primer-operations-transforming-security-operations-with-clear-principles/97056701 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Operations - Transforming Security Operations with Clear Principles. MarkStafford14 Cyber Security Primer - Operations - Transforming Security Operations with Clear Principles. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securitytransformation-180514161953-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Operations - Transforming Security Operations with Clear Principles.
Cyber Security Primer - Operations - Transforming Security Operations with Clear Principles. from Mark Stafford
]]>
138 2 https://cdn.slidesharecdn.com/ss_thumbnails/securitytransformation-180514161953-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Data Analytics - Having Clear Goals /slideshow/cyber-security-primer-data-analytics-having-clear-goals/96768530 dataanalytics-goals-180511235820
Cyber Security Primer - Data Analytics - Having Clear Goals]]>

Cyber Security Primer - Data Analytics - Having Clear Goals]]>
Fri, 11 May 2018 23:58:20 GMT /slideshow/cyber-security-primer-data-analytics-having-clear-goals/96768530 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Data Analytics - Having Clear Goals MarkStafford14 Cyber Security Primer - Data Analytics - Having Clear Goals <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dataanalytics-goals-180511235820-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Data Analytics - Having Clear Goals
Cyber Security Primer - Data Analytics - Having Clear Goals from Mark Stafford
]]>
152 2 https://cdn.slidesharecdn.com/ss_thumbnails/dataanalytics-goals-180511235820-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Data Analytics - Avoiding False Positives /slideshow/cyber-security-primer-data-analytics-avoiding-false-positives/95980108 dataanalyticsfalsepositives-180504182413
Cyber Security Primer - Data Analytics - Avoiding False Positives]]>

Cyber Security Primer - Data Analytics - Avoiding False Positives]]>
Fri, 04 May 2018 18:24:13 GMT /slideshow/cyber-security-primer-data-analytics-avoiding-false-positives/95980108 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Data Analytics - Avoiding False Positives MarkStafford14 Cyber Security Primer - Data Analytics - Avoiding False Positives <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dataanalyticsfalsepositives-180504182413-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Data Analytics - Avoiding False Positives
Cyber Security Primer - Data Analytics - Avoiding False Positives from Mark Stafford
]]>
197 2 https://cdn.slidesharecdn.com/ss_thumbnails/dataanalyticsfalsepositives-180504182413-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk and Vulnerability /slideshow/cyber-security-primer-situational-awareness-3d-thinking-threat-risk-and-vulnerability/95830114 sa3d-180503141653
Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk and Vulnerability]]>

Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk and Vulnerability]]>
Thu, 03 May 2018 14:16:53 GMT /slideshow/cyber-security-primer-situational-awareness-3d-thinking-threat-risk-and-vulnerability/95830114 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk and Vulnerability MarkStafford14 Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk and Vulnerability <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sa3d-180503141653-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk and Vulnerability
Cyber Security Primer - Situational Awareness - 3D Thinking - Threat, Risk and Vulnerability from Mark Stafford
]]>
152 4 https://cdn.slidesharecdn.com/ss_thumbnails/sa3d-180503141653-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
NIST Cyber Security Framework V1.1 - Infogram Poster /slideshow/nist-cyber-security-framework-v11-infogram-poster/95829625 nistcsf-poster11-180503141237
NIST Cyber Security Framework V1.1 - Infogram Poster]]>

NIST Cyber Security Framework V1.1 - Infogram Poster]]>
Thu, 03 May 2018 14:12:37 GMT /slideshow/nist-cyber-security-framework-v11-infogram-poster/95829625 MarkStafford14@slideshare.net(MarkStafford14) NIST Cyber Security Framework V1.1 - Infogram Poster MarkStafford14 NIST Cyber Security Framework V1.1 - Infogram Poster <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nistcsf-poster11-180503141237-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> NIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram Poster from Mark Stafford
]]>
7529 5 https://cdn.slidesharecdn.com/ss_thumbnails/nistcsf-poster11-180503141237-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Handy Infogram for the NIST Cyber Security Framework /slideshow/handy-infogram-for-the-nist-cyber-security-framework/95744323 nistcsf11-180502191657
Handy Infogram for the NIST Cyber Security Framework]]>

Handy Infogram for the NIST Cyber Security Framework]]>
Wed, 02 May 2018 19:16:57 GMT /slideshow/handy-infogram-for-the-nist-cyber-security-framework/95744323 MarkStafford14@slideshare.net(MarkStafford14) Handy Infogram for the NIST Cyber Security Framework MarkStafford14 Handy Infogram for the NIST Cyber Security Framework <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nistcsf11-180502191657-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Handy Infogram for the NIST Cyber Security Framework
Handy Infogram for the NIST Cyber Security Framework from Mark Stafford
]]>
560 4 https://cdn.slidesharecdn.com/ss_thumbnails/nistcsf11-180502191657-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primers - Business Change - Supply Chain /slideshow/cyber-security-primers-business-change-supply-chain/95730508 supplychainchange-180502173341
Cyber Security Primers - Business Change - Supply Chain]]>

Cyber Security Primers - Business Change - Supply Chain]]>
Wed, 02 May 2018 17:33:41 GMT /slideshow/cyber-security-primers-business-change-supply-chain/95730508 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primers - Business Change - Supply Chain MarkStafford14 Cyber Security Primers - Business Change - Supply Chain <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/supplychainchange-180502173341-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primers - Business Change - Supply Chain
Cyber Security Primers - Business Change - Supply Chain from Mark Stafford
]]>
124 2 https://cdn.slidesharecdn.com/ss_thumbnails/supplychainchange-180502173341-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Primer - Business Change - Moving to the cloud /slideshow/cyber-security-primer-business-change-moving-to-the-cloud/95509088 movingtothecloud-180430161059
Cyber Security Primer - Business Change - Moving to the cloud ]]>

Cyber Security Primer - Business Change - Moving to the cloud ]]>
Mon, 30 Apr 2018 16:10:59 GMT /slideshow/cyber-security-primer-business-change-moving-to-the-cloud/95509088 MarkStafford14@slideshare.net(MarkStafford14) Cyber Security Primer - Business Change - Moving to the cloud MarkStafford14 Cyber Security Primer - Business Change - Moving to the cloud <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/movingtothecloud-180430161059-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Primer - Business Change - Moving to the cloud
Cyber Security Primer - Business Change - Moving to the cloud from Mark Stafford
]]>
98 2 https://cdn.slidesharecdn.com/ss_thumbnails/movingtothecloud-180430161059-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/npower-beinghumanbeings-190830185401-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/npower-being-human-beings/167822776 Npower Being Human B... https://cdn.slidesharecdn.com/ss_thumbnails/securitytransformation-180823162112-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/security-operations-tranformation/111162362 Security Operations Tr... https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritytransformationalthemes-180822030116-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyber-security-transformational-themes-cyber-security-primer/110953424 Cyber security transfo...