狠狠撸shows by User: RamiroCid / http://www.slideshare.net/images/logo.gif 狠狠撸shows by User: RamiroCid / Thu, 17 May 2018 14:33:01 GMT 狠狠撸Share feed for 狠狠撸shows by User: RamiroCid Seminario sobre ciberseguridad https://es.slideshare.net/slideshow/seminario-sobre-ciberseguridad/97401847 seminariosobreciberseguridad-180517143302
Cybersecurity seminar which include a long list of topics like introduction to cybersecurity, logic and physical control, digital threats, social engineering, tehnical and non-technical cyber solutions/controls, IT assets best practices, confidential information management, password management, etc.]]>

Cybersecurity seminar which include a long list of topics like introduction to cybersecurity, logic and physical control, digital threats, social engineering, tehnical and non-technical cyber solutions/controls, IT assets best practices, confidential information management, password management, etc.]]>
Thu, 17 May 2018 14:33:01 GMT https://es.slideshare.net/slideshow/seminario-sobre-ciberseguridad/97401847 RamiroCid@slideshare.net(RamiroCid) Seminario sobre ciberseguridad RamiroCid Cybersecurity seminar which include a long list of topics like introduction to cybersecurity, logic and physical control, digital threats, social engineering, tehnical and non-technical cyber solutions/controls, IT assets best practices, confidential information management, password management, etc. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seminariosobreciberseguridad-180517143302-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cybersecurity seminar which include a long list of topics like introduction to cybersecurity, logic and physical control, digital threats, social engineering, tehnical and non-technical cyber solutions/controls, IT assets best practices, confidential information management, password management, etc.
from Ramiro Cid
]]>
1346 2 https://cdn.slidesharecdn.com/ss_thumbnails/seminariosobreciberseguridad-180517143302-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Captaci贸n y registro de comunicaciones orales y de imagen https://es.slideshare.net/slideshow/captacin-y-registro-de-comunicaciones-orales-y-de-imagen/75269593 captacinyregistrodecomunicacionesoralesydeimagen-170421074502
La presentaci贸n detalla los conceptos principales de la Ley Org谩nica 13/2005 que regula en Espa帽a la captaci贸n de comunicaciones orales y de imagen - Registros remotos de dispositivos inform谩ticos. Una de las caracter铆sticas principales de modificaci贸n de la Ley de Enjuiciamiento Criminal (LECrim) para el fortalecimiento de las garant铆as procesales y la regulaci贸n de las medidas de investigaci贸n tecnol贸gica permite a la Polic铆a Judicial la captaci贸n y grabaci贸n de comunicaciones orales mediante la utilizaci贸n de dispositivos electr贸nicos y la utilizaci贸n de dispositivos t茅cnicos de captaci贸n de la imagen, seguimiento y de localizaci贸n. ]]>

La presentaci贸n detalla los conceptos principales de la Ley Org谩nica 13/2005 que regula en Espa帽a la captaci贸n de comunicaciones orales y de imagen - Registros remotos de dispositivos inform谩ticos. Una de las caracter铆sticas principales de modificaci贸n de la Ley de Enjuiciamiento Criminal (LECrim) para el fortalecimiento de las garant铆as procesales y la regulaci贸n de las medidas de investigaci贸n tecnol贸gica permite a la Polic铆a Judicial la captaci贸n y grabaci贸n de comunicaciones orales mediante la utilizaci贸n de dispositivos electr贸nicos y la utilizaci贸n de dispositivos t茅cnicos de captaci贸n de la imagen, seguimiento y de localizaci贸n. ]]>
Fri, 21 Apr 2017 07:45:02 GMT https://es.slideshare.net/slideshow/captacin-y-registro-de-comunicaciones-orales-y-de-imagen/75269593 RamiroCid@slideshare.net(RamiroCid) Captaci贸n y registro de comunicaciones orales y de imagen RamiroCid La presentaci贸n detalla los conceptos principales de la Ley Org谩nica 13/2005 que regula en Espa帽a la captaci贸n de comunicaciones orales y de imagen - Registros remotos de dispositivos inform谩ticos. Una de las caracter铆sticas principales de modificaci贸n de la Ley de Enjuiciamiento Criminal (LECrim) para el fortalecimiento de las garant铆as procesales y la regulaci贸n de las medidas de investigaci贸n tecnol贸gica permite a la Polic铆a Judicial la captaci贸n y grabaci贸n de comunicaciones orales mediante la utilizaci贸n de dispositivos electr贸nicos y la utilizaci贸n de dispositivos t茅cnicos de captaci贸n de la imagen, seguimiento y de localizaci贸n. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/captacinyregistrodecomunicacionesoralesydeimagen-170421074502-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> La presentaci贸n detalla los conceptos principales de la Ley Org谩nica 13/2005 que regula en Espa帽a la captaci贸n de comunicaciones orales y de imagen - Registros remotos de dispositivos inform谩ticos. Una de las caracter铆sticas principales de modificaci贸n de la Ley de Enjuiciamiento Criminal (LECrim) para el fortalecimiento de las garant铆as procesales y la regulaci贸n de las medidas de investigaci贸n tecnol贸gica permite a la Polic铆a Judicial la captaci贸n y grabaci贸n de comunicaciones orales mediante la utilizaci贸n de dispositivos electr贸nicos y la utilizaci贸n de dispositivos t茅cnicos de captaci贸n de la imagen, seguimiento y de localizaci贸n.
from Ramiro Cid
]]>
519 4 https://cdn.slidesharecdn.com/ss_thumbnails/captacinyregistrodecomunicacionesoralesydeimagen-170421074502-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Passwords for sale /slideshow/passwords-for-sale/72906084 passwordsforsale-170307153200
In the last years we are reading more and more news about massive (millions) breach of passwords in web services as communities, emails services, cloud services and others. Hackers simply are obtaining money stealing passwords and selling or misusing them. This presentation is focus on how to protect our accounts and with this also keep sure our digital identity, our image and also our money safe from hackers businesses.]]>

In the last years we are reading more and more news about massive (millions) breach of passwords in web services as communities, emails services, cloud services and others. Hackers simply are obtaining money stealing passwords and selling or misusing them. This presentation is focus on how to protect our accounts and with this also keep sure our digital identity, our image and also our money safe from hackers businesses.]]>
Tue, 07 Mar 2017 15:31:59 GMT /slideshow/passwords-for-sale/72906084 RamiroCid@slideshare.net(RamiroCid) Passwords for sale RamiroCid In the last years we are reading more and more news about massive (millions) breach of passwords in web services as communities, emails services, cloud services and others. Hackers simply are obtaining money stealing passwords and selling or misusing them. This presentation is focus on how to protect our accounts and with this also keep sure our digital identity, our image and also our money safe from hackers businesses. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/passwordsforsale-170307153200-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In the last years we are reading more and more news about massive (millions) breach of passwords in web services as communities, emails services, cloud services and others. Hackers simply are obtaining money stealing passwords and selling or misusing them. This presentation is focus on how to protect our accounts and with this also keep sure our digital identity, our image and also our money safe from hackers businesses.
Passwords for sale from Ramiro Cid
]]>
783 2 https://cdn.slidesharecdn.com/ss_thumbnails/passwordsforsale-170307153200-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber security threats for 2017 /slideshow/cyber-security-threats-for-2017/71060562 cybersecuritythreatsfor2017-170116141017
The current presentation is based on different Cyber Security Threats for 2017 published in Internet. All threats are explained at a high level but at the end of this presentation all references URL are present if you want to investigate deeply any threat. ]]>

The current presentation is based on different Cyber Security Threats for 2017 published in Internet. All threats are explained at a high level but at the end of this presentation all references URL are present if you want to investigate deeply any threat. ]]>
Mon, 16 Jan 2017 14:10:17 GMT /slideshow/cyber-security-threats-for-2017/71060562 RamiroCid@slideshare.net(RamiroCid) Cyber security threats for 2017 RamiroCid The current presentation is based on different Cyber Security Threats for 2017 published in Internet. All threats are explained at a high level but at the end of this presentation all references URL are present if you want to investigate deeply any threat. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritythreatsfor2017-170116141017-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The current presentation is based on different Cyber Security Threats for 2017 published in Internet. All threats are explained at a high level but at the end of this presentation all references URL are present if you want to investigate deeply any threat.
Cyber security threats for 2017 from Ramiro Cid
]]>
26514 51 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritythreatsfor2017-170116141017-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
驴Cu谩les son los peligros a los que se enfrenta su sistema inform谩tico? https://es.slideshare.net/RamiroCid/cules-son-los-peligros-a-los-que-se-enfrenta-su-sistema-informtico culessonlospeligrosalosqueseenfrentasusistemainformtico-161129224547
Cada vez es mayor el reto que supone proteger nuestros activos TI frente a las crecientes amenazas y ataques. Una vez que alguna aplicaci贸n maliciosa entra en nuestras redes, puede desplazarse r谩pidamente con el tr谩fico y causar estragos en toda la red.]]>

Cada vez es mayor el reto que supone proteger nuestros activos TI frente a las crecientes amenazas y ataques. Una vez que alguna aplicaci贸n maliciosa entra en nuestras redes, puede desplazarse r谩pidamente con el tr谩fico y causar estragos en toda la red.]]>
Tue, 29 Nov 2016 22:45:47 GMT https://es.slideshare.net/RamiroCid/cules-son-los-peligros-a-los-que-se-enfrenta-su-sistema-informtico RamiroCid@slideshare.net(RamiroCid) 驴Cu谩les son los peligros a los que se enfrenta su sistema inform谩tico? RamiroCid Cada vez es mayor el reto que supone proteger nuestros activos TI frente a las crecientes amenazas y ataques. Una vez que alguna aplicaci贸n maliciosa entra en nuestras redes, puede desplazarse r谩pidamente con el tr谩fico y causar estragos en toda la red. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/culessonlospeligrosalosqueseenfrentasusistemainformtico-161129224547-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cada vez es mayor el reto que supone proteger nuestros activos TI frente a las crecientes amenazas y ataques. Una vez que alguna aplicaci贸n maliciosa entra en nuestras redes, puede desplazarse r谩pidamente con el tr谩fico y causar estragos en toda la red.
from Ramiro Cid
]]>
648 3 https://cdn.slidesharecdn.com/ss_thumbnails/culessonlospeligrosalosqueseenfrentasusistemainformtico-161129224547-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cloud Computing, IoT, BYOD 锟紿a muerto el per铆metro corporativo. 锟铰縴 ahora qu茅? https://es.slideshare.net/slideshow/cloud-computing-iot-byod-ha-muerto-el-permetro-corporativo-y-ahora-qu/66732888 muertedelperimetral-161004182653
Con la llegada de Cloud Computing, IoT, BYOD ha muerto nuestro per铆metro de seguridad corporativo, entonces 驴qu茅 debemos hacer a partir de ahora?]]>

Con la llegada de Cloud Computing, IoT, BYOD ha muerto nuestro per铆metro de seguridad corporativo, entonces 驴qu茅 debemos hacer a partir de ahora?]]>
Tue, 04 Oct 2016 18:26:53 GMT https://es.slideshare.net/slideshow/cloud-computing-iot-byod-ha-muerto-el-permetro-corporativo-y-ahora-qu/66732888 RamiroCid@slideshare.net(RamiroCid) Cloud Computing, IoT, BYOD 锟紿a muerto el per铆metro corporativo. 锟铰縴 ahora qu茅? RamiroCid Con la llegada de Cloud Computing, IoT, BYOD ha muerto nuestro per铆metro de seguridad corporativo, entonces 驴qu茅 debemos hacer a partir de ahora? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/muertedelperimetral-161004182653-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Con la llegada de Cloud Computing, IoT, BYOD ha muerto nuestro per铆metro de seguridad corporativo, entonces 驴qu茅 debemos hacer a partir de ahora?
from Ramiro Cid
]]>
527 4 https://cdn.slidesharecdn.com/ss_thumbnails/muertedelperimetral-161004182653-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Lean Six Sigma methodology /slideshow/lean-six-sigma-methodology/65784322 leansixsigmamethodology-160907150009
Lean Six Sigma is a process improvement methodology that relies on a collaborative team effort to improve performance by systematically removing waste, combining Lean and Six Sigma to eliminate the eight kinds of waste Lean Six Sigma projects comprise aspects of Lean's waste elimination and the Six Sigma focus on reducing defects]]>

Lean Six Sigma is a process improvement methodology that relies on a collaborative team effort to improve performance by systematically removing waste, combining Lean and Six Sigma to eliminate the eight kinds of waste Lean Six Sigma projects comprise aspects of Lean's waste elimination and the Six Sigma focus on reducing defects]]>
Wed, 07 Sep 2016 15:00:09 GMT /slideshow/lean-six-sigma-methodology/65784322 RamiroCid@slideshare.net(RamiroCid) Lean Six Sigma methodology RamiroCid Lean Six Sigma is a process improvement methodology that relies on a collaborative team effort to improve performance by systematically removing waste, combining Lean and Six Sigma to eliminate the eight kinds of waste Lean Six Sigma projects comprise aspects of Lean's waste elimination and the Six Sigma focus on reducing defects <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/leansixsigmamethodology-160907150009-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Lean Six Sigma is a process improvement methodology that relies on a collaborative team effort to improve performance by systematically removing waste, combining Lean and Six Sigma to eliminate the eight kinds of waste Lean Six Sigma projects comprise aspects of Lean&#39;s waste elimination and the Six Sigma focus on reducing defects
Lean Six Sigma methodology from Ramiro Cid
]]>
15220 9 https://cdn.slidesharecdn.com/ss_thumbnails/leansixsigmamethodology-160907150009-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IT Governance & ISO 38500 /slideshow/it-governance-iso-38500/64575586 itgovernanceiso38500-160801104802
IT Governance or Corporate governance of information technology is a subset discipline of corporate governance, focused on information and technology (IT) and its performance and risk management. The interest in IT Governance is due to the ongoing need within organizations to focus value creation efforts on an organization's strategic objectives and to better manage the performance of those responsible for creating this value in the best interest of all stakeholders.]]>

IT Governance or Corporate governance of information technology is a subset discipline of corporate governance, focused on information and technology (IT) and its performance and risk management. The interest in IT Governance is due to the ongoing need within organizations to focus value creation efforts on an organization's strategic objectives and to better manage the performance of those responsible for creating this value in the best interest of all stakeholders.]]>
Mon, 01 Aug 2016 10:48:02 GMT /slideshow/it-governance-iso-38500/64575586 RamiroCid@slideshare.net(RamiroCid) IT Governance & ISO 38500 RamiroCid IT Governance or Corporate governance of information technology is a subset discipline of corporate governance, focused on information and technology (IT) and its performance and risk management. The interest in IT Governance is due to the ongoing need within organizations to focus value creation efforts on an organization's strategic objectives and to better manage the performance of those responsible for creating this value in the best interest of all stakeholders. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/itgovernanceiso38500-160801104802-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> IT Governance or Corporate governance of information technology is a subset discipline of corporate governance, focused on information and technology (IT) and its performance and risk management. The interest in IT Governance is due to the ongoing need within organizations to focus value creation efforts on an organization&#39;s strategic objectives and to better manage the performance of those responsible for creating this value in the best interest of all stakeholders.
IT Governance & ISO 38500 from Ramiro Cid
]]>
8331 8 https://cdn.slidesharecdn.com/ss_thumbnails/itgovernanceiso38500-160801104802-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Resilience & Risk Aggregation /RamiroCid/cyber-security-resilience-risk-aggregation cybersecurityresilienceriskaggregation-160702115218
This presentation talks about the relation between Cyber Security Resilience & risk aggregation. Both concepts have a near relationship because Risk aggregation refers to efforts done by firms to develop quantitative risk measures that incorporate multiple types or sources of risk. Cyber Security Resilience is the capacity to have different Cyber controls which can provide the organization an adequate resilience according the organization risk appetite by doing risk management of the aggregation of multiple types or sources of risk. ]]>

This presentation talks about the relation between Cyber Security Resilience & risk aggregation. Both concepts have a near relationship because Risk aggregation refers to efforts done by firms to develop quantitative risk measures that incorporate multiple types or sources of risk. Cyber Security Resilience is the capacity to have different Cyber controls which can provide the organization an adequate resilience according the organization risk appetite by doing risk management of the aggregation of multiple types or sources of risk. ]]>
Sat, 02 Jul 2016 11:52:18 GMT /RamiroCid/cyber-security-resilience-risk-aggregation RamiroCid@slideshare.net(RamiroCid) Cyber Security Resilience & Risk Aggregation RamiroCid This presentation talks about the relation between Cyber Security Resilience & risk aggregation. Both concepts have a near relationship because Risk aggregation refers to efforts done by firms to develop quantitative risk measures that incorporate multiple types or sources of risk. Cyber Security Resilience is the capacity to have different Cyber controls which can provide the organization an adequate resilience according the organization risk appetite by doing risk management of the aggregation of multiple types or sources of risk. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityresilienceriskaggregation-160702115218-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation talks about the relation between Cyber Security Resilience &amp; risk aggregation. Both concepts have a near relationship because Risk aggregation refers to efforts done by firms to develop quantitative risk measures that incorporate multiple types or sources of risk. Cyber Security Resilience is the capacity to have different Cyber controls which can provide the organization an adequate resilience according the organization risk appetite by doing risk management of the aggregation of multiple types or sources of risk.
Cyber Security Resilience & Risk Aggregation from Ramiro Cid
]]>
1471 6 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityresilienceriskaggregation-160702115218-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
EU General Data Protection Regulation /slideshow/eu-general-data-protection-regulation-62652548/62652548 eugeneraldataprotectionregulation-160602105500
On 14/4/2016 EU Data Privacy had been approved the regulation which is, nowadays, mandatory. However companies have 2 years to carry out its suitability before receiving an economic penalty for not having completed it - deadline: 25/05/2016]]>

On 14/4/2016 EU Data Privacy had been approved the regulation which is, nowadays, mandatory. However companies have 2 years to carry out its suitability before receiving an economic penalty for not having completed it - deadline: 25/05/2016]]>
Thu, 02 Jun 2016 10:55:00 GMT /slideshow/eu-general-data-protection-regulation-62652548/62652548 RamiroCid@slideshare.net(RamiroCid) EU General Data Protection Regulation RamiroCid On 14/4/2016 EU Data Privacy had been approved the regulation which is, nowadays, mandatory. However companies have 2 years to carry out its suitability before receiving an economic penalty for not having completed it - deadline: 25/05/2016 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eugeneraldataprotectionregulation-160602105500-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> On 14/4/2016 EU Data Privacy had been approved the regulation which is, nowadays, mandatory. However companies have 2 years to carry out its suitability before receiving an economic penalty for not having completed it - deadline: 25/05/2016
EU General Data Protection Regulation from Ramiro Cid
]]>
3046 7 https://cdn.slidesharecdn.com/ss_thumbnails/eugeneraldataprotectionregulation-160602105500-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Payment fraud /slideshow/payment-fraud/62133241 paymentfraud-160518084848
Nowadays the payment fraud landscape is changing quite fast. Changing from classic schemes as bank cheque fraud, faked manual payment orders to organized crime with corporates as targets]]>

Nowadays the payment fraud landscape is changing quite fast. Changing from classic schemes as bank cheque fraud, faked manual payment orders to organized crime with corporates as targets]]>
Wed, 18 May 2016 08:48:47 GMT /slideshow/payment-fraud/62133241 RamiroCid@slideshare.net(RamiroCid) Payment fraud RamiroCid Nowadays the payment fraud landscape is changing quite fast. Changing from classic schemes as bank cheque fraud, faked manual payment orders to organized crime with corporates as targets <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/paymentfraud-160518084848-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Nowadays the payment fraud landscape is changing quite fast. Changing from classic schemes as bank cheque fraud, faked manual payment orders to organized crime with corporates as targets
Payment fraud from Ramiro Cid
]]>
2864 11 https://cdn.slidesharecdn.com/ss_thumbnails/paymentfraud-160518084848-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Social engineering attacks /RamiroCid/social-engineering-attacks socialengineeringattacks-160511131810
Currently, market has a wide range of systems, products and services focused on computer security services: Antivirus, Antispyware, Firewalls, IPS, WAF, SIEM systems, etc. All these measures are indispensable and have become a priority for any company or organization towards ensuring its assets, but social engineering plays with the advantage that you can use techniques that violate own vulnerabilities inherent in human beings and, as is well known, for this there is no patch or upgrade that provides effective protection against such attacks. People is normally 鈥渢he weak link in the chain鈥.]]>

Currently, market has a wide range of systems, products and services focused on computer security services: Antivirus, Antispyware, Firewalls, IPS, WAF, SIEM systems, etc. All these measures are indispensable and have become a priority for any company or organization towards ensuring its assets, but social engineering plays with the advantage that you can use techniques that violate own vulnerabilities inherent in human beings and, as is well known, for this there is no patch or upgrade that provides effective protection against such attacks. People is normally 鈥渢he weak link in the chain鈥.]]>
Wed, 11 May 2016 13:18:10 GMT /RamiroCid/social-engineering-attacks RamiroCid@slideshare.net(RamiroCid) Social engineering attacks RamiroCid Currently, market has a wide range of systems, products and services focused on computer security services: Antivirus, Antispyware, Firewalls, IPS, WAF, SIEM systems, etc. 锟紸ll these measures are indispensable and have become a priority for any company or organization towards ensuring its assets, but social engineering plays with the advantage that you can use techniques that violate own vulnerabilities inherent in human beings and, as is well known, for this there is no patch or upgrade that provides effective protection against such attacks. People is normally 鈥渢he weak link in the chain鈥. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/socialengineeringattacks-160511131810-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Currently, market has a wide range of systems, products and services focused on computer security services: Antivirus, Antispyware, Firewalls, IPS, WAF, SIEM systems, etc. 锟紸ll these measures are indispensable and have become a priority for any company or organization towards ensuring its assets, but social engineering plays with the advantage that you can use techniques that violate own vulnerabilities inherent in human beings and, as is well known, for this there is no patch or upgrade that provides effective protection against such attacks. People is normally 鈥渢he weak link in the chain鈥.
Social engineering attacks from Ramiro Cid
]]>
7158 8 https://cdn.slidesharecdn.com/ss_thumbnails/socialengineeringattacks-160511131810-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Thinking on risk analysis /slideshow/thinking-on-risk-analysis/54091030 thinkingonriskanalysis-151018210706-lva1-app6891
Some of you maybe made some risk analysis in the past, and maybe some others use to do risk analysis in a regular basis. Some people use Octave, CRAMM, NIST or other risk analysis methodologies, but鈥 Have you ever though if you have a GAP in the way you use to do your analysis? Have you ever thought that you may have a lack of visibility in the way it makes your analysis? This presentation if focuses on the last question.]]>

Some of you maybe made some risk analysis in the past, and maybe some others use to do risk analysis in a regular basis. Some people use Octave, CRAMM, NIST or other risk analysis methodologies, but鈥 Have you ever though if you have a GAP in the way you use to do your analysis? Have you ever thought that you may have a lack of visibility in the way it makes your analysis? This presentation if focuses on the last question.]]>
Sun, 18 Oct 2015 21:07:06 GMT /slideshow/thinking-on-risk-analysis/54091030 RamiroCid@slideshare.net(RamiroCid) Thinking on risk analysis RamiroCid Some of you maybe made some risk analysis in the past, and maybe some others use to do risk analysis in a regular basis. Some people use Octave, CRAMM, NIST or other risk analysis methodologies, but鈥 Have you ever though if you have a GAP in the way you use to do your analysis? Have you ever thought that you may have a lack of visibility in the way it makes your analysis? This presentation if focuses on the last question. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thinkingonriskanalysis-151018210706-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Some of you maybe made some risk analysis in the past, and maybe some others use to do risk analysis in a regular basis. Some people use Octave, CRAMM, NIST or other risk analysis methodologies, but鈥 Have you ever though if you have a GAP in the way you use to do your analysis? Have you ever thought that you may have a lack of visibility in the way it makes your analysis? This presentation if focuses on the last question.
Thinking on risk analysis from Ramiro Cid
]]>
1119 7 https://cdn.slidesharecdn.com/ss_thumbnails/thinkingonriskanalysis-151018210706-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Drones and their use on critical infrastructure /RamiroCid/drones-and-their-use-on-critical-infrastructure dronesandtheiruseoncriticalinfrastructure-151011222904-lva1-app6892
The use of unmanned aerial vehicles (drones) is increasing for both leisure and commercial purposes, so it is more and more an extended practice. The different uses are many and the list continue growing, thus some issues started to appear which need regulations and best practices to try to control the use in a correct way.]]>

The use of unmanned aerial vehicles (drones) is increasing for both leisure and commercial purposes, so it is more and more an extended practice. The different uses are many and the list continue growing, thus some issues started to appear which need regulations and best practices to try to control the use in a correct way.]]>
Sun, 11 Oct 2015 22:29:04 GMT /RamiroCid/drones-and-their-use-on-critical-infrastructure RamiroCid@slideshare.net(RamiroCid) Drones and their use on critical infrastructure RamiroCid The use of unmanned aerial vehicles (drones) is increasing for both leisure and commercial purposes, so it is more and more an extended practice. The different uses are many and the list continue growing, thus some issues started to appear which need regulations and best practices to try to control the use in a correct way. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dronesandtheiruseoncriticalinfrastructure-151011222904-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The use of unmanned aerial vehicles (drones) is increasing for both leisure and commercial purposes, so it is more and more an extended practice. The different uses are many and the list continue growing, thus some issues started to appear which need regulations and best practices to try to control the use in a correct way.
Drones and their use on critical infrastructure from Ramiro Cid
]]>
1249 6 https://cdn.slidesharecdn.com/ss_thumbnails/dronesandtheiruseoncriticalinfrastructure-151011222904-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Internet of things, big data & mobility vs privacy /slideshow/internet-of-things-big-data-mobility-vs-privacy/50733312 internetofthingsbigdatamobilityvsprivacy-150720213617-lva1-app6891
Relationship between Internet of things, big data & mobility vs privacy. How to protect ourselves against a misuse of our private data and protect our privacy?]]>

Relationship between Internet of things, big data & mobility vs privacy. How to protect ourselves against a misuse of our private data and protect our privacy?]]>
Mon, 20 Jul 2015 21:36:16 GMT /slideshow/internet-of-things-big-data-mobility-vs-privacy/50733312 RamiroCid@slideshare.net(RamiroCid) Internet of things, big data & mobility vs privacy RamiroCid Relationship between Internet of things, big data & mobility vs privacy. How to protect ourselves against a misuse of our private data and protect our privacy? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/internetofthingsbigdatamobilityvsprivacy-150720213617-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Relationship between Internet of things, big data &amp; mobility vs privacy. How to protect ourselves against a misuse of our private data and protect our privacy?
Internet of things, big data & mobility vs privacy from Ramiro Cid
]]>
907 7 https://cdn.slidesharecdn.com/ss_thumbnails/internetofthingsbigdatamobilityvsprivacy-150720213617-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Space computing /RamiroCid/space-computing spacecomputing-150630231312-lva1-app6891
Until now, when people talk about cloud computing, it鈥檚 usually understood that the cloud is a metaphor for groups of remote, networked servers. Now 鈥渟pace computing鈥 means it literally: physical servers operating in outer space.]]>

Until now, when people talk about cloud computing, it鈥檚 usually understood that the cloud is a metaphor for groups of remote, networked servers. Now 鈥渟pace computing鈥 means it literally: physical servers operating in outer space.]]>
Tue, 30 Jun 2015 23:13:11 GMT /RamiroCid/space-computing RamiroCid@slideshare.net(RamiroCid) Space computing RamiroCid Until now, when people talk about cloud computing, it鈥檚 usually understood that the cloud is a metaphor for groups of remote, networked servers. Now 鈥渟pace computing鈥 means it literally: physical servers operating in outer space. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/spacecomputing-150630231312-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Until now, when people talk about cloud computing, it鈥檚 usually understood that the cloud is a metaphor for groups of remote, networked servers. Now 鈥渟pace computing鈥 means it literally: physical servers operating in outer space.
Space computing from Ramiro Cid
]]>
1058 5 https://cdn.slidesharecdn.com/ss_thumbnails/spacecomputing-150630231312-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The relation between internet of things, critical infrastructure and cyber security /slideshow/the-relation-between-internet-of-things-critical-infrastructure-and-cyber-security/42948066 therelationbetweeninternetofthingscriticalinfrastructureandcybersecurity-141222180503-conversion-gate02
In this presentation you will be able to see the relation between Internet of Things, Critical Infrastructure and Cyber Security]]>

In this presentation you will be able to see the relation between Internet of Things, Critical Infrastructure and Cyber Security]]>
Mon, 22 Dec 2014 18:05:03 GMT /slideshow/the-relation-between-internet-of-things-critical-infrastructure-and-cyber-security/42948066 RamiroCid@slideshare.net(RamiroCid) The relation between internet of things, critical infrastructure and cyber security RamiroCid In this presentation you will be able to see the relation between Internet of Things, Critical Infrastructure and Cyber Security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/therelationbetweeninternetofthingscriticalinfrastructureandcybersecurity-141222180503-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation you will be able to see the relation between Internet of Things, Critical Infrastructure and Cyber Security
The relation between internet of things, critical infrastructure and cyber security from Ramiro Cid
]]>
1177 3 https://cdn.slidesharecdn.com/ss_thumbnails/therelationbetweeninternetofthingscriticalinfrastructureandcybersecurity-141222180503-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Internet of things /slideshow/internet-of-things-42451518/42451518 internetofthings-141207182843-conversion-gate02
Internet of Things ( IoT ) will be all in the future, are we ready for this 4th revolution ? My presentation will show the main topics regarging IoT, including the history, the applications and some arguments behind it, including criticism and controversies.]]>

Internet of Things ( IoT ) will be all in the future, are we ready for this 4th revolution ? My presentation will show the main topics regarging IoT, including the history, the applications and some arguments behind it, including criticism and controversies.]]>
Sun, 07 Dec 2014 18:28:42 GMT /slideshow/internet-of-things-42451518/42451518 RamiroCid@slideshare.net(RamiroCid) Internet of things RamiroCid Internet of Things ( IoT ) will be all in the future, are we ready for this 4th revolution ? My presentation will show the main topics regarging IoT, including the history, the applications and some arguments behind it, including criticism and controversies. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/internetofthings-141207182843-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Internet of Things ( IoT ) will be all in the future, are we ready for this 4th revolution ? My presentation will show the main topics regarging IoT, including the history, the applications and some arguments behind it, including criticism and controversies.
Internet of things from Ramiro Cid
]]>
2259 1 https://cdn.slidesharecdn.com/ss_thumbnails/internetofthings-141207182843-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security /RamiroCid/cyber-security-41376829 cybersecurity-141110164226-conversion-gate01
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market]]>

Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market]]>
Mon, 10 Nov 2014 16:42:26 GMT /RamiroCid/cyber-security-41376829 RamiroCid@slideshare.net(RamiroCid) Cyber Security RamiroCid Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-141110164226-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
Cyber Security from Ramiro Cid
]]>
7657 3 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-141110164226-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Awareness /slideshow/cyber-security-awareness-41375715/41375715 cybersecurityawareness-141110161024-conversion-gate01
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?]]>

Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?]]>
Mon, 10 Nov 2014 16:10:24 GMT /slideshow/cyber-security-awareness-41375715/41375715 RamiroCid@slideshare.net(RamiroCid) Cyber Security Awareness RamiroCid Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityawareness-141110161024-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
Cyber Security Awareness from Ramiro Cid
]]>
11699 8 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityawareness-141110161024-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-RamiroCid-48x48.jpg?cb=1583776875 Bachelor鈥檚 degree in Organizational Management Systems. Buenos Aires University, Postgraduate Diploma in Business Direction, Business Administration. Pompeu Fabra University (Barcelona) with more than 15 years of experience in Systems Departments. Dynamic, used to work for professional projects. High-pressure tolerance. Teamwork and team management; with great dedication to service and always looking for alignment with the business. Able to generate value for the organization by proposing and implementing new ideas and initiatives for the resolution of needs. Continuous improvement and work quality are part of my culture and IT Security is part of my DNA. ramirocid.com https://cdn.slidesharecdn.com/ss_thumbnails/seminariosobreciberseguridad-180517143302-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/seminario-sobre-ciberseguridad/97401847 Seminario sobre cibers... https://cdn.slidesharecdn.com/ss_thumbnails/captacinyregistrodecomunicacionesoralesydeimagen-170421074502-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/captacin-y-registro-de-comunicaciones-orales-y-de-imagen/75269593 Captaci贸n y registro d... https://cdn.slidesharecdn.com/ss_thumbnails/passwordsforsale-170307153200-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/passwords-for-sale/72906084 Passwords for sale