şÝşÝߣshows by User: slideshare807am / http://www.slideshare.net/images/logo.gif şÝşÝߣshows by User: slideshare807am / Tue, 25 Dec 2018 13:54:54 GMT şÝşÝߣShare feed for şÝşÝߣshows by User: slideshare807am Sicherheit welche gefahren durch drohnen drohen golem.de https://de.slideshare.net/slideshow/sicherheit-welche-gefahren-durch-drohnen-drohen-golemde/126689444 sicherheitwelchegefahrendurchdrohnendrohen-golem-181225135454
Flugobjekte mit biologischen Kampfstoffen, Motorsäge oder Pistole: 140 Risiken durch Drohnen hat der Sicherheitsexterte Dominique Brack gesammelt. Die geplanten Angriffe sind dabei gar nicht die schlimmsten. Der für das Schweizer Telekommunikationsunternehmen Swisscom tätige Sicherheitsexperte Dominique Brack analysiert zusammen mit anderen Anbietern kritischer Infrastrukturen mögliche Angriffsszenarien mit kommerziell erhältlichen Drohnen. Auf der Sicherheitskonferenz Deepsec in Wien hat er seine Ergebnisse vorgestellt. ]]>

Flugobjekte mit biologischen Kampfstoffen, Motorsäge oder Pistole: 140 Risiken durch Drohnen hat der Sicherheitsexterte Dominique Brack gesammelt. Die geplanten Angriffe sind dabei gar nicht die schlimmsten. Der für das Schweizer Telekommunikationsunternehmen Swisscom tätige Sicherheitsexperte Dominique Brack analysiert zusammen mit anderen Anbietern kritischer Infrastrukturen mögliche Angriffsszenarien mit kommerziell erhältlichen Drohnen. Auf der Sicherheitskonferenz Deepsec in Wien hat er seine Ergebnisse vorgestellt. ]]>
Tue, 25 Dec 2018 13:54:54 GMT https://de.slideshare.net/slideshow/sicherheit-welche-gefahren-durch-drohnen-drohen-golemde/126689444 slideshare807am@slideshare.net(slideshare807am) Sicherheit welche gefahren durch drohnen drohen golem.de slideshare807am Flugobjekte mit biologischen Kampfstoffen, Motorsäge oder Pistole: 140 Risiken durch Drohnen hat der Sicherheitsexterte Dominique Brack gesammelt. Die geplanten Angriffe sind dabei gar nicht die schlimmsten. Der für das Schweizer Telekommunikationsunternehmen Swisscom tätige Sicherheitsexperte Dominique Brack analysiert zusammen mit anderen Anbietern kritischer Infrastrukturen mögliche Angriffsszenarien mit kommerziell erhältlichen Drohnen. Auf der Sicherheitskonferenz Deepsec in Wien hat er seine Ergebnisse vorgestellt. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sicherheitwelchegefahrendurchdrohnendrohen-golem-181225135454-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Flugobjekte mit biologischen Kampfstoffen, Motorsäge oder Pistole: 140 Risiken durch Drohnen hat der Sicherheitsexterte Dominique Brack gesammelt. Die geplanten Angriffe sind dabei gar nicht die schlimmsten. Der für das Schweizer Telekommunikationsunternehmen Swisscom tätige Sicherheitsexperte Dominique Brack analysiert zusammen mit anderen Anbietern kritischer Infrastrukturen mögliche Angriffsszenarien mit kommerziell erhältlichen Drohnen. Auf der Sicherheitskonferenz Deepsec in Wien hat er seine Ergebnisse vorgestellt.
from Reputelligence
]]>
219 8 https://cdn.slidesharecdn.com/ss_thumbnails/sicherheitwelchegefahrendurchdrohnendrohen-golem-181225135454-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Intensity levels social engineering engagement framework (seef) first cut d.c. brack a. bahram /slideshare807am/intensity-levels-social-engineering-engagement-framework-seef-first-cut-dc-brack-a-bahram intensitylevelssocialengineeringengagementframeworkseef-firstcutd-180823065123
Intensity Levels Intensity level ratings are a unique feature of SEEF’s methods. The intensity levels are represented by a table of levels ranging from 1–12, with Level 1 being the least risky and Level 12 the highest possible risk. The table can be used for planning and scoping social engineering engagements, on a personal level or as company policy. Attack vectors are also developed and based on predefined intensity levels. Levels 1– 3 (green) represent low risk and small potential for legal implications. The green levels mainly contain Open Source Intelligence (OSINT), limited scope (local/ national) and preservation of a person’s or company’s integrity. Levels 4–6 (orange) are medium risk with potential for legal ramifications and include invasive, intrusive or ethically questionable, international or VIP engagements. Levels 7–-9 (red) involve coercion, felonies, high-profile political or medially present organizations or individuals, and risk of collateral damages. Levels 10-12 (black) are highly illegal, including treason, breach of international law, possible death sentences, cyber warfare, industrial espionage, and loss of lives. Donot engage! ]]>

Intensity Levels Intensity level ratings are a unique feature of SEEF’s methods. The intensity levels are represented by a table of levels ranging from 1–12, with Level 1 being the least risky and Level 12 the highest possible risk. The table can be used for planning and scoping social engineering engagements, on a personal level or as company policy. Attack vectors are also developed and based on predefined intensity levels. Levels 1– 3 (green) represent low risk and small potential for legal implications. The green levels mainly contain Open Source Intelligence (OSINT), limited scope (local/ national) and preservation of a person’s or company’s integrity. Levels 4–6 (orange) are medium risk with potential for legal ramifications and include invasive, intrusive or ethically questionable, international or VIP engagements. Levels 7–-9 (red) involve coercion, felonies, high-profile political or medially present organizations or individuals, and risk of collateral damages. Levels 10-12 (black) are highly illegal, including treason, breach of international law, possible death sentences, cyber warfare, industrial espionage, and loss of lives. Donot engage! ]]>
Thu, 23 Aug 2018 06:51:23 GMT /slideshare807am/intensity-levels-social-engineering-engagement-framework-seef-first-cut-dc-brack-a-bahram slideshare807am@slideshare.net(slideshare807am) Intensity levels social engineering engagement framework (seef) first cut d.c. brack a. bahram slideshare807am Intensity Levels Intensity level ratings are a unique feature of SEEF’s methods. The intensity levels are represented by a table of levels ranging from 1–12, with Level 1 being the least risky and Level 12 the highest possible risk. The table can be used for planning and scoping social engineering engagements, on a personal level or as company policy. Attack vectors are also developed and based on predefined intensity levels. Levels 1– 3 (green) represent low risk and small potential for legal implications. The green levels mainly contain Open Source Intelligence (OSINT), limited scope (local/ national) and preservation of a person’s or company’s integrity. Levels 4–6 (orange) are medium risk with potential for legal ramifications and include invasive, intrusive or ethically questionable, international or VIP engagements. Levels 7–-9 (red) involve coercion, felonies, high-profile political or medially present organizations or individuals, and risk of collateral damages. Levels 10-12 (black) are highly illegal, including treason, breach of international law, possible death sentences, cyber warfare, industrial espionage, and loss of lives. Donot engage! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intensitylevelssocialengineeringengagementframeworkseef-firstcutd-180823065123-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Intensity Levels Intensity level ratings are a unique feature of SEEF’s methods. The intensity levels are represented by a table of levels ranging from 1–12, with Level 1 being the least risky and Level 12 the highest possible risk. The table can be used for planning and scoping social engineering engagements, on a personal level or as company policy. Attack vectors are also developed and based on predefined intensity levels. Levels 1– 3 (green) represent low risk and small potential for legal implications. The green levels mainly contain Open Source Intelligence (OSINT), limited scope (local/ national) and preservation of a person’s or company’s integrity. Levels 4–6 (orange) are medium risk with potential for legal ramifications and include invasive, intrusive or ethically questionable, international or VIP engagements. Levels 7–-9 (red) involve coercion, felonies, high-profile political or medially present organizations or individuals, and risk of collateral damages. Levels 10-12 (black) are highly illegal, including treason, breach of international law, possible death sentences, cyber warfare, industrial espionage, and loss of lives. Donot engage!
Intensity levels social engineering engagement framework (seef) first cut d.c. brack a. bahram from Reputelligence
]]>
66 5 https://cdn.slidesharecdn.com/ss_thumbnails/intensitylevelssocialengineeringengagementframeworkseef-firstcutd-180823065123-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Artikel About Drones and Swisscom Innovation Startup Process /slideshow/artikel-about-drones-and-swisscom-innovation-startup-process/107304814 tcbe-180724150126
Artikel About Drones and Swisscom Innovation Startup Process. Authors Dominique Brack and Klaus Gribi. ]]>

Artikel About Drones and Swisscom Innovation Startup Process. Authors Dominique Brack and Klaus Gribi. ]]>
Tue, 24 Jul 2018 15:01:26 GMT /slideshow/artikel-about-drones-and-swisscom-innovation-startup-process/107304814 slideshare807am@slideshare.net(slideshare807am) Artikel About Drones and Swisscom Innovation Startup Process slideshare807am Artikel About Drones and Swisscom Innovation Startup Process. Authors Dominique Brack and Klaus Gribi. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tcbe-180724150126-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Artikel About Drones and Swisscom Innovation Startup Process. Authors Dominique Brack and Klaus Gribi.
Artikel About Drones and Swisscom Innovation Startup Process from Reputelligence
]]>
226 2 https://cdn.slidesharecdn.com/ss_thumbnails/tcbe-180724150126-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS /slideshow/drones-the-new-weapon-of-choice-also-for-hackers/104527082 droneguardhack-in-parispresentation2018v1-180706112038
My talk will be about drone threats in general and how you can assess drone based threats. I will show the comprehensive threat assessment methodology and the countermeasures you can take against the drone threat. The threat assessment is based on a catalog of about 140 items. Particularly interesting will be looking at the drone threats in relation to: Planting payload at specific locations (i.e. hacking equipment transported to target location for instance) Tampering communication equipment with the help of drones Insider threat communicate with an insider with the help of a drone Hacking the communication of a drone Privacy violations etc.]]>

My talk will be about drone threats in general and how you can assess drone based threats. I will show the comprehensive threat assessment methodology and the countermeasures you can take against the drone threat. The threat assessment is based on a catalog of about 140 items. Particularly interesting will be looking at the drone threats in relation to: Planting payload at specific locations (i.e. hacking equipment transported to target location for instance) Tampering communication equipment with the help of drones Insider threat communicate with an insider with the help of a drone Hacking the communication of a drone Privacy violations etc.]]>
Fri, 06 Jul 2018 11:20:38 GMT /slideshow/drones-the-new-weapon-of-choice-also-for-hackers/104527082 slideshare807am@slideshare.net(slideshare807am) DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS slideshare807am My talk will be about drone threats in general and how you can assess drone based threats. I will show the comprehensive threat assessment methodology and the countermeasures you can take against the drone threat. The threat assessment is based on a catalog of about 140 items. Particularly interesting will be looking at the drone threats in relation to: Planting payload at specific locations (i.e. hacking equipment transported to target location for instance) Tampering communication equipment with the help of drones Insider threat communicate with an insider with the help of a drone Hacking the communication of a drone Privacy violations etc. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/droneguardhack-in-parispresentation2018v1-180706112038-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My talk will be about drone threats in general and how you can assess drone based threats. I will show the comprehensive threat assessment methodology and the countermeasures you can take against the drone threat. The threat assessment is based on a catalog of about 140 items. Particularly interesting will be looking at the drone threats in relation to: Planting payload at specific locations (i.e. hacking equipment transported to target location for instance) Tampering communication equipment with the help of drones Insider threat communicate with an insider with the help of a drone Hacking the communication of a drone Privacy violations etc.
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS from Reputelligence
]]>
496 6 https://cdn.slidesharecdn.com/ss_thumbnails/droneguardhack-in-parispresentation2018v1-180706112038-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The real- wolfpack story 2 /slideshow/the-real-wolfpack-story-2/78015708 the-real-wolfpackstory2-170718210001
The picture]]>

The picture]]>
Tue, 18 Jul 2017 21:00:01 GMT /slideshow/the-real-wolfpack-story-2/78015708 slideshare807am@slideshare.net(slideshare807am) The real- wolfpack story 2 slideshare807am The picture <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/the-real-wolfpackstory2-170718210001-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The picture
The real- wolfpack story 2 from Reputelligence
]]>
42 2 https://cdn.slidesharecdn.com/ss_thumbnails/the-real-wolfpackstory2-170718210001-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Quantum Computing Shor algorithm crypto grafic IoT risk management /slideshow/quantum-computing-shor-algorithm-crypto-grafic-iot-risk-management/75878308 shor-algorithmcryptograficiotriskmanagement-170511072804
Das Internet of Things (IoT) verbreitet sich immer mehr, wegen seiner rasanten Entwicklung gerät die Informationssicherheit ins Hintertreffen. Neue Technologien wie Quantum Computing ver schärfen die Situation zusätzlich. Bewährte Sicherheitsmechanismen wie Verschlüsselung bieten künftig nicht mehr genügend Sicherheit, sobald der erste Quantum Computer verfügbar sein wird.]]>

Das Internet of Things (IoT) verbreitet sich immer mehr, wegen seiner rasanten Entwicklung gerät die Informationssicherheit ins Hintertreffen. Neue Technologien wie Quantum Computing ver schärfen die Situation zusätzlich. Bewährte Sicherheitsmechanismen wie Verschlüsselung bieten künftig nicht mehr genügend Sicherheit, sobald der erste Quantum Computer verfügbar sein wird.]]>
Thu, 11 May 2017 07:28:03 GMT /slideshow/quantum-computing-shor-algorithm-crypto-grafic-iot-risk-management/75878308 slideshare807am@slideshare.net(slideshare807am) Quantum Computing Shor algorithm crypto grafic IoT risk management slideshare807am Das Internet of Things (IoT) verbreitet sich immer mehr, wegen seiner rasanten Entwicklung gerät die Informationssicherheit ins Hintertreffen. Neue Technologien wie Quantum Computing ver schärfen die Situation zusätzlich. Bewährte Sicherheitsmechanismen wie Verschlüsselung bieten künftig nicht mehr genügend Sicherheit, sobald der erste Quantum Computer verfügbar sein wird. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/shor-algorithmcryptograficiotriskmanagement-170511072804-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Das Internet of Things (IoT) verbreitet sich immer mehr, wegen seiner rasanten Entwicklung gerät die Informationssicherheit ins Hintertreffen. Neue Technologien wie Quantum Computing ver schärfen die Situation zusätzlich. Bewährte Sicherheitsmechanismen wie Verschlüsselung bieten künftig nicht mehr genügend Sicherheit, sobald der erste Quantum Computer verfügbar sein wird.
Quantum Computing Shor algorithm crypto grafic IoT risk management from Reputelligence
]]>
112 3 https://cdn.slidesharecdn.com/ss_thumbnails/shor-algorithmcryptograficiotriskmanagement-170511072804-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Press release 01_september_2016_social_engineering_engagement_framework_seef__human social engineering interface_finished_clean /slideshow/press-release-01september2016socialengineeringengagementframeworkseefhuman-social-engineering-interfacefinishedclean/68394395 pressrelease01september2016socialengineeringengagementframeworkseefhumansocialengineeringinterfacefi-161108101410
Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known human-to-social-engineering interface, today. The SEEF human-to-social-engineering interface is a powerful visual tool, allowing users to set social engineering parameter of an individual person, without having to think. Until today, social engineering had no human-to-social-engineering interface to plant social engineering attack vectors in a detailed and appealing way.]]>

Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known human-to-social-engineering interface, today. The SEEF human-to-social-engineering interface is a powerful visual tool, allowing users to set social engineering parameter of an individual person, without having to think. Until today, social engineering had no human-to-social-engineering interface to plant social engineering attack vectors in a detailed and appealing way.]]>
Tue, 08 Nov 2016 10:14:10 GMT /slideshow/press-release-01september2016socialengineeringengagementframeworkseefhuman-social-engineering-interfacefinishedclean/68394395 slideshare807am@slideshare.net(slideshare807am) Press release 01_september_2016_social_engineering_engagement_framework_seef__human social engineering interface_finished_clean slideshare807am Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known human-to-social-engineering interface, today. The SEEF human-to-social-engineering interface is a powerful visual tool, allowing users to set social engineering parameter of an individual person, without having to think. Until today, social engineering had no human-to-social-engineering interface to plant social engineering attack vectors in a detailed and appealing way. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pressrelease01september2016socialengineeringengagementframeworkseefhumansocialengineeringinterfacefi-161108101410-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known human-to-social-engineering interface, today. The SEEF human-to-social-engineering interface is a powerful visual tool, allowing users to set social engineering parameter of an individual person, without having to think. Until today, social engineering had no human-to-social-engineering interface to plant social engineering attack vectors in a detailed and appealing way.
Press release 01_september_2016_social_engineering_engagement_framework_seef__human social engineering interface_finished_clean from Reputelligence
]]>
83 1 https://cdn.slidesharecdn.com/ss_thumbnails/pressrelease01september2016socialengineeringengagementframeworkseefhumansocialengineeringinterfacefi-161108101410-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Business shoes looking inconspicuous but still enough power to climb a wall or kick in a door /slideshare807am/business-shoes-looking-inconspicuous-but-still-enough-power-to-climb-a-wall-or-kick-in-a-door igotwhatialwayswanted4mybirthdaybusinessshoeslookinginconspicuousbutstillenoughpowertoclimbawallorki-161025174948
Everyone knows business shoes and everyone knows climbing shoes or the soles used by most of them. I never understood why business shoes have this stupid slippery useless soles on them. It was always my dream to create a combination of a great business shoe with a great sole. My local shoemaker created this wonder for me after my wife encourage me to ask him if he could such a thing. Took some convincing though – since no one does this and it could go wrong. It got them for my birthday. You can do this with any business shoe. The hard part is finding a capable shoemaker for mounting your Vibram soles onto a pair of business shoes. As shoe I used a local known Swiss brand Fretzmen. If you want the contact details of my capable shoemaker let me know.]]>

Everyone knows business shoes and everyone knows climbing shoes or the soles used by most of them. I never understood why business shoes have this stupid slippery useless soles on them. It was always my dream to create a combination of a great business shoe with a great sole. My local shoemaker created this wonder for me after my wife encourage me to ask him if he could such a thing. Took some convincing though – since no one does this and it could go wrong. It got them for my birthday. You can do this with any business shoe. The hard part is finding a capable shoemaker for mounting your Vibram soles onto a pair of business shoes. As shoe I used a local known Swiss brand Fretzmen. If you want the contact details of my capable shoemaker let me know.]]>
Tue, 25 Oct 2016 17:49:48 GMT /slideshare807am/business-shoes-looking-inconspicuous-but-still-enough-power-to-climb-a-wall-or-kick-in-a-door slideshare807am@slideshare.net(slideshare807am) Business shoes looking inconspicuous but still enough power to climb a wall or kick in a door slideshare807am Everyone knows business shoes and everyone knows climbing shoes or the soles used by most of them. I never understood why business shoes have this stupid slippery useless soles on them. It was always my dream to create a combination of a great business shoe with a great sole. My local shoemaker created this wonder for me after my wife encourage me to ask him if he could such a thing. Took some convincing though – since no one does this and it could go wrong. It got them for my birthday. You can do this with any business shoe. The hard part is finding a capable shoemaker for mounting your Vibram soles onto a pair of business shoes. As shoe I used a local known Swiss brand Fretzmen. If you want the contact details of my capable shoemaker let me know. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/igotwhatialwayswanted4mybirthdaybusinessshoeslookinginconspicuousbutstillenoughpowertoclimbawallorki-161025174948-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Everyone knows business shoes and everyone knows climbing shoes or the soles used by most of them. I never understood why business shoes have this stupid slippery useless soles on them. It was always my dream to create a combination of a great business shoe with a great sole. My local shoemaker created this wonder for me after my wife encourage me to ask him if he could such a thing. Took some convincing though – since no one does this and it could go wrong. It got them for my birthday. You can do this with any business shoe. The hard part is finding a capable shoemaker for mounting your Vibram soles onto a pair of business shoes. As shoe I used a local known Swiss brand Fretzmen. If you want the contact details of my capable shoemaker let me know.
Business shoes looking inconspicuous but still enough power to climb a wall or kick in a door from Reputelligence
]]>
142 4 https://cdn.slidesharecdn.com/ss_thumbnails/igotwhatialwayswanted4mybirthdaybusinessshoeslookinginconspicuousbutstillenoughpowertoclimbawallorki-161025174948-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Press release social engineering engagement framework seef social engineering icons https://es.slideshare.net/slideshare807am/press-release-social-engineering-engagement-framework-seef-social-engineering-icons-65564859 sppressrelease01september2016socialengineeringengagementframeworkseefsocialengineeringicons-160831195235
BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today. The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it. Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons.]]>

BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today. The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it. Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons.]]>
Wed, 31 Aug 2016 19:52:35 GMT https://es.slideshare.net/slideshare807am/press-release-social-engineering-engagement-framework-seef-social-engineering-icons-65564859 slideshare807am@slideshare.net(slideshare807am) Press release social engineering engagement framework seef social engineering icons slideshare807am BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today. The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it. Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sppressrelease01september2016socialengineeringengagementframeworkseefsocialengineeringicons-160831195235-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today. The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it. Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons.
from Reputelligence
]]>
73 3 https://cdn.slidesharecdn.com/ss_thumbnails/sppressrelease01september2016socialengineeringengagementframeworkseefsocialengineeringicons-160831195235-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Press release social engineering engagement framework seef social engineering icons /slideshow/press-release-social-engineering-engagement-framework-seef-social-engineering-icons/65564743 pressrelease01september2016socialengineeringengagementframeworkseefsocialengineeringiconsfinishedcle-160831194833
BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today. The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it. Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons.]]>

BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today. The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it. Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons.]]>
Wed, 31 Aug 2016 19:48:33 GMT /slideshow/press-release-social-engineering-engagement-framework-seef-social-engineering-icons/65564743 slideshare807am@slideshare.net(slideshare807am) Press release social engineering engagement framework seef social engineering icons slideshare807am BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today. The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it. Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pressrelease01september2016socialengineeringengagementframeworkseefsocialengineeringiconsfinishedcle-160831194833-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today. The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it. Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons.
Press release social engineering engagement framework seef social engineering icons from Reputelligence
]]>
109 2 https://cdn.slidesharecdn.com/ss_thumbnails/pressrelease01september2016socialengineeringengagementframeworkseefsocialengineeringiconsfinishedcle-160831194833-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Video integrated teaser awareness campaign seef /slideshow/video-integrated-teaser-awareness-campaign-seef-63565185/63565185 videointegratedteaserawarenesscampaignseefhackinparispresentation1-july-2016v0-160629114615
Are you still old school social engineering? Get an update]]>

Are you still old school social engineering? Get an update]]>
Wed, 29 Jun 2016 11:46:15 GMT /slideshow/video-integrated-teaser-awareness-campaign-seef-63565185/63565185 slideshare807am@slideshare.net(slideshare807am) Video integrated teaser awareness campaign seef slideshare807am Are you still old school social engineering? Get an update <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/videointegratedteaserawarenesscampaignseefhackinparispresentation1-july-2016v0-160629114615-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Are you still old school social engineering? Get an update
Video integrated teaser awareness campaign seef from Reputelligence
]]>
69 4 https://cdn.slidesharecdn.com/ss_thumbnails/videointegratedteaserawarenesscampaignseefhackinparispresentation1-july-2016v0-160629114615-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Teaser SEEF hack in Paris presentation /slideshare807am/teaser-seef-hack-in-paris-presentation teaserseefhackinparispresentation1-july-2016v0-160628141650
“Intrusion attempts are more and more frequent and sophisticated, regardless of their target (state or corporation). In this context, international hacking events are multiplying. Hack In Paris attendees will discover the realities of hacking, and its consequences for companies. “The program includes state of the art IT security, industrial espionage, penetration testing, physical security, forensics, malware analysis techniques and countermeasures. The one-week event consists of three days of training and two days of conferences – all in English – bringing together security officers (CISOs, CIOs) and hacking technical experts. Hack in Paris is being held from the 27th June – July 1st 2016 at la Maison De la Chimie, Paris.]]>

“Intrusion attempts are more and more frequent and sophisticated, regardless of their target (state or corporation). In this context, international hacking events are multiplying. Hack In Paris attendees will discover the realities of hacking, and its consequences for companies. “The program includes state of the art IT security, industrial espionage, penetration testing, physical security, forensics, malware analysis techniques and countermeasures. The one-week event consists of three days of training and two days of conferences – all in English – bringing together security officers (CISOs, CIOs) and hacking technical experts. Hack in Paris is being held from the 27th June – July 1st 2016 at la Maison De la Chimie, Paris.]]>
Tue, 28 Jun 2016 14:16:50 GMT /slideshare807am/teaser-seef-hack-in-paris-presentation slideshare807am@slideshare.net(slideshare807am) Teaser SEEF hack in Paris presentation slideshare807am “Intrusion attempts are more and more frequent and sophisticated, regardless of their target (state or corporation). In this context, international hacking events are multiplying. Hack In Paris attendees will discover the realities of hacking, and its consequences for companies. “The program includes state of the art IT security, industrial espionage, penetration testing, physical security, forensics, malware analysis techniques and countermeasures. The one-week event consists of three days of training and two days of conferences – all in English – bringing together security officers (CISOs, CIOs) and hacking technical experts. Hack in Paris is being held from the 27th June – July 1st 2016 at la Maison De la Chimie, Paris. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/teaserseefhackinparispresentation1-july-2016v0-160628141650-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> “Intrusion attempts are more and more frequent and sophisticated, regardless of their target (state or corporation). In this context, international hacking events are multiplying. Hack In Paris attendees will discover the realities of hacking, and its consequences for companies. “The program includes state of the art IT security, industrial espionage, penetration testing, physical security, forensics, malware analysis techniques and countermeasures. The one-week event consists of three days of training and two days of conferences – all in English – bringing together security officers (CISOs, CIOs) and hacking technical experts. Hack in Paris is being held from the 27th June – July 1st 2016 at la Maison De la Chimie, Paris.
Teaser SEEF hack in Paris presentation from Reputelligence
]]>
122 4 https://cdn.slidesharecdn.com/ss_thumbnails/teaserseefhackinparispresentation1-july-2016v0-160628141650-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Sneak peek preview area 41 conference ZĂĽrich 10. - 11- June 2016 /slideshow/sneak-peek-preview-area-41-conference-zrich-10-11-june-2016/62743300 sneakpeekpreviewarea41seef-160605165420
Meet me at the http://area41.io/ conference #area41 #a41con. Join my session on June 11th afternoon. I will reveal some exclusive social engineering content. Here a sneak peak preview. Cheers Dom The premier technical security conference in Switzerland organized by DEFCON Switzerland. The next Area41 conference will be held June 10.-11.2016 in Zurich]]>

Meet me at the http://area41.io/ conference #area41 #a41con. Join my session on June 11th afternoon. I will reveal some exclusive social engineering content. Here a sneak peak preview. Cheers Dom The premier technical security conference in Switzerland organized by DEFCON Switzerland. The next Area41 conference will be held June 10.-11.2016 in Zurich]]>
Sun, 05 Jun 2016 16:54:20 GMT /slideshow/sneak-peek-preview-area-41-conference-zrich-10-11-june-2016/62743300 slideshare807am@slideshare.net(slideshare807am) Sneak peek preview area 41 conference ZĂĽrich 10. - 11- June 2016 slideshare807am Meet me at the http://area41.io/ conference #area41 #a41con. Join my session on June 11th afternoon. I will reveal some exclusive social engineering content. Here a sneak peak preview. Cheers Dom The premier technical security conference in Switzerland organized by DEFCON Switzerland. The next Area41 conference will be held June 10.-11.2016 in Zurich <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sneakpeekpreviewarea41seef-160605165420-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Meet me at the http://area41.io/ conference #area41 #a41con. Join my session on June 11th afternoon. I will reveal some exclusive social engineering content. Here a sneak peak preview. Cheers Dom The premier technical security conference in Switzerland organized by DEFCON Switzerland. The next Area41 conference will be held June 10.-11.2016 in Zurich
Sneak peek preview area 41 conference Z端rich 10. - 11- June 2016 from Reputelligence
]]>
224 4 https://cdn.slidesharecdn.com/ss_thumbnails/sneakpeekpreviewarea41seef-160605165420-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Seef ebook promotion 18 dez-2015 dcb /slideshare807am/seef-ebook-promotion-18-dez2015-dcb seefebookpromotion18-dez-2015dcb-151218201057
If you are observing the social engineering landscape in terms of social engineers, documentation, and frameworks out there, you will realize the topic has, as we call it, a low maturity. Low maturity means there are no well-defined processes or defined frameworks in which professionals can apply and benchmark themselves. Today’s landscape is little like the Wild West. There is lot of fear, uncertainty, and doubt (FUD). With SEEF we want to oppose this situation. As you maybe have seen, our motto is visible on the book covers badge: Docendo – Discimus. It is a Latin proverb and means: “By teaching, we learn.” This is what we want. We want to teach anyone interested in social engineering the skills to do it properly, professionally, and ethically. This is Social Engineering Engagement Management (SEEF) — FIRST CUT. It is literally the first cut of the framework that we have pioneered and want to share.]]>

If you are observing the social engineering landscape in terms of social engineers, documentation, and frameworks out there, you will realize the topic has, as we call it, a low maturity. Low maturity means there are no well-defined processes or defined frameworks in which professionals can apply and benchmark themselves. Today’s landscape is little like the Wild West. There is lot of fear, uncertainty, and doubt (FUD). With SEEF we want to oppose this situation. As you maybe have seen, our motto is visible on the book covers badge: Docendo – Discimus. It is a Latin proverb and means: “By teaching, we learn.” This is what we want. We want to teach anyone interested in social engineering the skills to do it properly, professionally, and ethically. This is Social Engineering Engagement Management (SEEF) — FIRST CUT. It is literally the first cut of the framework that we have pioneered and want to share.]]>
Fri, 18 Dec 2015 20:10:56 GMT /slideshare807am/seef-ebook-promotion-18-dez2015-dcb slideshare807am@slideshare.net(slideshare807am) Seef ebook promotion 18 dez-2015 dcb slideshare807am If you are observing the social engineering landscape in terms of social engineers, documentation, and frameworks out there, you will realize the topic has, as we call it, a low maturity. Low maturity means there are no well-defined processes or defined frameworks in which professionals can apply and benchmark themselves. Today’s landscape is little like the Wild West. There is lot of fear, uncertainty, and doubt (FUD). With SEEF we want to oppose this situation. As you maybe have seen, our motto is visible on the book covers badge: Docendo – Discimus. It is a Latin proverb and means: “By teaching, we learn.” This is what we want. We want to teach anyone interested in social engineering the skills to do it properly, professionally, and ethically. This is Social Engineering Engagement Management (SEEF) — FIRST CUT. It is literally the first cut of the framework that we have pioneered and want to share. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seefebookpromotion18-dez-2015dcb-151218201057-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> If you are observing the social engineering landscape in terms of social engineers, documentation, and frameworks out there, you will realize the topic has, as we call it, a low maturity. Low maturity means there are no well-defined processes or defined frameworks in which professionals can apply and benchmark themselves. Today’s landscape is little like the Wild West. There is lot of fear, uncertainty, and doubt (FUD). With SEEF we want to oppose this situation. As you maybe have seen, our motto is visible on the book covers badge: Docendo – Discimus. It is a Latin proverb and means: “By teaching, we learn.” This is what we want. We want to teach anyone interested in social engineering the skills to do it properly, professionally, and ethically. This is Social Engineering Engagement Management (SEEF) — FIRST CUT. It is literally the first cut of the framework that we have pioneered and want to share.
Seef ebook promotion 18 dez-2015 dcb from Reputelligence
]]>
217 6 https://cdn.slidesharecdn.com/ss_thumbnails/seefebookpromotion18-dez-2015dcb-151218201057-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reputelligence lifecycle v3 Volkswagen "defeat device" /slideshow/reputelligence-lifecycle-v3-volkswagen-defeat-device/53454703 reputelligencepowerpointtemplatelifecyclev3volkswagenexample2-october-2015-151002085954-lva1-app6892
May 2014 There was a line up to the problem. It was not sudden. There was time to fix the problem without shortcuts (1 year). Before the problem got out of hand (involvement of authorities). Big mistake N#1 (unintentionally or intentionally): Volkswagen tells regulators that the differences amount to technical issues and "unexpected" test conditions. First try to cover up or the start of workarounds? Protective statement. Recall in December 2014. Because the problem couldn't be fixed? The intention to “doctor” could also have been started here. May 2015 next governmental involvement. Second chance to make things right i.e. coming forward or disclose voluntarily. July 2015 point of no return. Third chance for a coming out or getting a handle on the problem. September 2015 problem total out of control on all levels; politically, technically, environmentally, reputation wise.]]>

May 2014 There was a line up to the problem. It was not sudden. There was time to fix the problem without shortcuts (1 year). Before the problem got out of hand (involvement of authorities). Big mistake N#1 (unintentionally or intentionally): Volkswagen tells regulators that the differences amount to technical issues and "unexpected" test conditions. First try to cover up or the start of workarounds? Protective statement. Recall in December 2014. Because the problem couldn't be fixed? The intention to “doctor” could also have been started here. May 2015 next governmental involvement. Second chance to make things right i.e. coming forward or disclose voluntarily. July 2015 point of no return. Third chance for a coming out or getting a handle on the problem. September 2015 problem total out of control on all levels; politically, technically, environmentally, reputation wise.]]>
Fri, 02 Oct 2015 08:59:54 GMT /slideshow/reputelligence-lifecycle-v3-volkswagen-defeat-device/53454703 slideshare807am@slideshare.net(slideshare807am) Reputelligence lifecycle v3 Volkswagen "defeat device" slideshare807am May 2014 There was a line up to the problem. It was not sudden. There was time to fix the problem without shortcuts (1 year). Before the problem got out of hand (involvement of authorities). Big mistake N#1 (unintentionally or intentionally): Volkswagen tells regulators that the differences amount to technical issues and "unexpected" test conditions. First try to cover up or the start of workarounds? Protective statement. Recall in December 2014. Because the problem couldn't be fixed? The intention to “doctor” could also have been started here. May 2015 next governmental involvement. Second chance to make things right i.e. coming forward or disclose voluntarily. July 2015 point of no return. Third chance for a coming out or getting a handle on the problem. September 2015 problem total out of control on all levels; politically, technically, environmentally, reputation wise. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/reputelligencepowerpointtemplatelifecyclev3volkswagenexample2-october-2015-151002085954-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> May 2014 There was a line up to the problem. It was not sudden. There was time to fix the problem without shortcuts (1 year). Before the problem got out of hand (involvement of authorities). Big mistake N#1 (unintentionally or intentionally): Volkswagen tells regulators that the differences amount to technical issues and &quot;unexpected&quot; test conditions. First try to cover up or the start of workarounds? Protective statement. Recall in December 2014. Because the problem couldn&#39;t be fixed? The intention to “doctor” could also have been started here. May 2015 next governmental involvement. Second chance to make things right i.e. coming forward or disclose voluntarily. July 2015 point of no return. Third chance for a coming out or getting a handle on the problem. September 2015 problem total out of control on all levels; politically, technically, environmentally, reputation wise.
Reputelligence lifecycle v3 Volkswagen "defeat device" from Reputelligence
]]>
311 7 https://cdn.slidesharecdn.com/ss_thumbnails/reputelligencepowerpointtemplatelifecyclev3volkswagenexample2-october-2015-151002085954-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reputelligence Lifecycle v3 Volkswagen example /slideshow/reputelligence-lifecycle-v3-volkswagen-example/53454390 reputelligencepowerpointtemplatelifecyclev3volkswagenexampleslide6-151002084909-lva1-app6891
This is lifecycle applied to the Volkswagen "defeat device" problem. It show the lead up to the eruption of the problem on September 18th. Many things followed after that but they will be analysed in another problem lifecycle zooming in on those dates.]]>

This is lifecycle applied to the Volkswagen "defeat device" problem. It show the lead up to the eruption of the problem on September 18th. Many things followed after that but they will be analysed in another problem lifecycle zooming in on those dates.]]>
Fri, 02 Oct 2015 08:49:09 GMT /slideshow/reputelligence-lifecycle-v3-volkswagen-example/53454390 slideshare807am@slideshare.net(slideshare807am) Reputelligence Lifecycle v3 Volkswagen example slideshare807am This is lifecycle applied to the Volkswagen "defeat device" problem. It show the lead up to the eruption of the problem on September 18th. Many things followed after that but they will be analysed in another problem lifecycle zooming in on those dates. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/reputelligencepowerpointtemplatelifecyclev3volkswagenexampleslide6-151002084909-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is lifecycle applied to the Volkswagen &quot;defeat device&quot; problem. It show the lead up to the eruption of the problem on September 18th. Many things followed after that but they will be analysed in another problem lifecycle zooming in on those dates.
Reputelligence Lifecycle v3 Volkswagen example from Reputelligence
]]>
155 7 https://cdn.slidesharecdn.com/ss_thumbnails/reputelligencepowerpointtemplatelifecyclev3volkswagenexampleslide6-151002084909-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä? /slideshow/se-klaud-brojkt-briks-daun-wot-is-se-frst-sing-yu-du-h/53406204 dcdays16-sep-2015dominiquec-151001063416-lva1-app6891
Cloud readiness can be reduced to one simple statement. You don't need a maturity assessment or expensive consultants :-). Have you a working information classification policy? f yes: congratulations you can go now you will be fine. «Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä? U blame se Se Ei O. No no no, you dreamer you hä dream on. Ei tell dir okey. Se sewen sinking steps. 1. Finding the right (or left) broblem to solve 2. Sefining the broblem 3. Analysing the broblem 4. Developing bossibilities 5. Selecting se best solution 6. Implementing 7. Evaluating and lörning]]>

Cloud readiness can be reduced to one simple statement. You don't need a maturity assessment or expensive consultants :-). Have you a working information classification policy? f yes: congratulations you can go now you will be fine. «Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä? U blame se Se Ei O. No no no, you dreamer you hä dream on. Ei tell dir okey. Se sewen sinking steps. 1. Finding the right (or left) broblem to solve 2. Sefining the broblem 3. Analysing the broblem 4. Developing bossibilities 5. Selecting se best solution 6. Implementing 7. Evaluating and lörning]]>
Thu, 01 Oct 2015 06:34:15 GMT /slideshow/se-klaud-brojkt-briks-daun-wot-is-se-frst-sing-yu-du-h/53406204 slideshare807am@slideshare.net(slideshare807am) «Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä? slideshare807am Cloud readiness can be reduced to one simple statement. You don't need a maturity assessment or expensive consultants :-). Have you a working information classification policy? f yes: congratulations you can go now you will be fine. «Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä? U blame se Se Ei O. No no no, you dreamer you hä dream on. Ei tell dir okey. Se sewen sinking steps. 1. Finding the right (or left) broblem to solve 2. Sefining the broblem 3. Analysing the broblem 4. Developing bossibilities 5. Selecting se best solution 6. Implementing 7. Evaluating and lörning <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dcdays16-sep-2015dominiquec-151001063416-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cloud readiness can be reduced to one simple statement. You don&#39;t need a maturity assessment or expensive consultants :-). Have you a working information classification policy? f yes: congratulations you can go now you will be fine. «Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä? U blame se Se Ei O. No no no, you dreamer you hä dream on. Ei tell dir okey. Se sewen sinking steps. 1. Finding the right (or left) broblem to solve 2. Sefining the broblem 3. Analysing the broblem 4. Developing bossibilities 5. Selecting se best solution 6. Implementing 7. Evaluating and lörning
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä? from Reputelligence
]]>
368 75 https://cdn.slidesharecdn.com/ss_thumbnails/dcdays16-sep-2015dominiquec-151001063416-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reputelligence power point template lifecycle v3 /slideshow/reputelligence-power-point-template-lifecycle-v3/52585868 reputelligencepowerpointtemplatelifecyclev3-150909135637-lva1-app6892
Today, good news -- or bad news -- breaks in real time. And anything can go viral in short order. This is great for cute babies laughing in videos, or heart-warming tales of good deeds. It's not great, however, for the unexpected, inevitable crisis that any organization will face in its existence at some point. Luckily, nothing in the social media world is too much different than in the "real world." What is the problem you might ask? Problems (real- and digital world) usually follow a very specific pattern and dynamic. Understanding the patterns and dynamic behind will significantly improve resiliency. When does an incident become a crisis? Managing a massive crisis is very difficult because of the information asymmetry. Defining where you stand in a crisis is even more difficult. Complex problem or crisis management requires specific techniques and tools. Numerous examples of bad crisis management are known to everyone. If you are managing a crisis from the inside you need actual up to date information on the current situation (where are we) and next steps (what are we going to do next). So far this was a very hard task. Either you have been at the will of a hopefully decent crisis manager or PR firm. The lack of transparency always bugged me. I was to set out to look for ways of making the problem mangement or crisis management process more transparent for everyone involved. I always take a highly strategic view of things and aim for practical application and simplification. Out of this came the Reputelligence™ Problem LifeCycle. At first it looks overwhelming but i will guide you through the construction. This will help you understand the principles behind the life-cycle so you can apply it in your context.]]>

Today, good news -- or bad news -- breaks in real time. And anything can go viral in short order. This is great for cute babies laughing in videos, or heart-warming tales of good deeds. It's not great, however, for the unexpected, inevitable crisis that any organization will face in its existence at some point. Luckily, nothing in the social media world is too much different than in the "real world." What is the problem you might ask? Problems (real- and digital world) usually follow a very specific pattern and dynamic. Understanding the patterns and dynamic behind will significantly improve resiliency. When does an incident become a crisis? Managing a massive crisis is very difficult because of the information asymmetry. Defining where you stand in a crisis is even more difficult. Complex problem or crisis management requires specific techniques and tools. Numerous examples of bad crisis management are known to everyone. If you are managing a crisis from the inside you need actual up to date information on the current situation (where are we) and next steps (what are we going to do next). So far this was a very hard task. Either you have been at the will of a hopefully decent crisis manager or PR firm. The lack of transparency always bugged me. I was to set out to look for ways of making the problem mangement or crisis management process more transparent for everyone involved. I always take a highly strategic view of things and aim for practical application and simplification. Out of this came the Reputelligence™ Problem LifeCycle. At first it looks overwhelming but i will guide you through the construction. This will help you understand the principles behind the life-cycle so you can apply it in your context.]]>
Wed, 09 Sep 2015 13:56:37 GMT /slideshow/reputelligence-power-point-template-lifecycle-v3/52585868 slideshare807am@slideshare.net(slideshare807am) Reputelligence power point template lifecycle v3 slideshare807am Today, good news -- or bad news -- breaks in real time. And anything can go viral in short order. This is great for cute babies laughing in videos, or heart-warming tales of good deeds. It's not great, however, for the unexpected, inevitable crisis that any organization will face in its existence at some point. Luckily, nothing in the social media world is too much different than in the "real world." What is the problem you might ask? Problems (real- and digital world) usually follow a very specific pattern and dynamic. Understanding the patterns and dynamic behind will significantly improve resiliency. When does an incident become a crisis? Managing a massive crisis is very difficult because of the information asymmetry. Defining where you stand in a crisis is even more difficult. Complex problem or crisis management requires specific techniques and tools. Numerous examples of bad crisis management are known to everyone. If you are managing a crisis from the inside you need actual up to date information on the current situation (where are we) and next steps (what are we going to do next). So far this was a very hard task. Either you have been at the will of a hopefully decent crisis manager or PR firm. The lack of transparency always bugged me. I was to set out to look for ways of making the problem mangement or crisis management process more transparent for everyone involved. I always take a highly strategic view of things and aim for practical application and simplification. Out of this came the Reputelligence™ Problem LifeCycle. At first it looks overwhelming but i will guide you through the construction. This will help you understand the principles behind the life-cycle so you can apply it in your context. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/reputelligencepowerpointtemplatelifecyclev3-150909135637-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Today, good news -- or bad news -- breaks in real time. And anything can go viral in short order. This is great for cute babies laughing in videos, or heart-warming tales of good deeds. It&#39;s not great, however, for the unexpected, inevitable crisis that any organization will face in its existence at some point. Luckily, nothing in the social media world is too much different than in the &quot;real world.&quot; What is the problem you might ask? Problems (real- and digital world) usually follow a very specific pattern and dynamic. Understanding the patterns and dynamic behind will significantly improve resiliency. When does an incident become a crisis? Managing a massive crisis is very difficult because of the information asymmetry. Defining where you stand in a crisis is even more difficult. Complex problem or crisis management requires specific techniques and tools. Numerous examples of bad crisis management are known to everyone. If you are managing a crisis from the inside you need actual up to date information on the current situation (where are we) and next steps (what are we going to do next). So far this was a very hard task. Either you have been at the will of a hopefully decent crisis manager or PR firm. The lack of transparency always bugged me. I was to set out to look for ways of making the problem mangement or crisis management process more transparent for everyone involved. I always take a highly strategic view of things and aim for practical application and simplification. Out of this came the Reputelligence™ Problem LifeCycle. At first it looks overwhelming but i will guide you through the construction. This will help you understand the principles behind the life-cycle so you can apply it in your context.
Reputelligence power point template lifecycle v3 from Reputelligence
]]>
322 8 https://cdn.slidesharecdn.com/ss_thumbnails/reputelligencepowerpointtemplatelifecyclev3-150909135637-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SEEF Framework Intensity Levels (English) /slideshow/seef-framework-intensity-levels-english/51197602 seef-150802221037-lva1-app6891
English version of the SEEF Intensity Levels]]>

English version of the SEEF Intensity Levels]]>
Sun, 02 Aug 2015 22:10:37 GMT /slideshow/seef-framework-intensity-levels-english/51197602 slideshare807am@slideshare.net(slideshare807am) SEEF Framework Intensity Levels (English) slideshare807am English version of the SEEF Intensity Levels <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seef-150802221037-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> English version of the SEEF Intensity Levels
SEEF Framework Intensity Levels (English) from Reputelligence
]]>
381 4 https://cdn.slidesharecdn.com/ss_thumbnails/seef-150802221037-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security agility- dynamic policy creation and rollout /slideshow/security-agility-artikel-24-72015/50886460 securityagilityartikel24-7-2015-150724120352-lva1-app6891
The following example of a recent story is the perfect analogy for dynamic policy creation. The Swiss MediaMarket (Electronics Chain) reacted amicably when we were presented with a heat wave. All over the news people where warned about the topic of leaving your children or your pets in the car. Unfortunately there where fatalities due to the practice of leaving small children in the car. There was a lot of talk but MediaMarkt spun into action. This story has all the ingredients for future security (advanced persistent threats) APT's and how you will have to deal with them. The same process' will have to be applied to your policy framework.]]>

The following example of a recent story is the perfect analogy for dynamic policy creation. The Swiss MediaMarket (Electronics Chain) reacted amicably when we were presented with a heat wave. All over the news people where warned about the topic of leaving your children or your pets in the car. Unfortunately there where fatalities due to the practice of leaving small children in the car. There was a lot of talk but MediaMarkt spun into action. This story has all the ingredients for future security (advanced persistent threats) APT's and how you will have to deal with them. The same process' will have to be applied to your policy framework.]]>
Fri, 24 Jul 2015 12:03:52 GMT /slideshow/security-agility-artikel-24-72015/50886460 slideshare807am@slideshare.net(slideshare807am) Security agility- dynamic policy creation and rollout slideshare807am The following example of a recent story is the perfect analogy for dynamic policy creation. The Swiss MediaMarket (Electronics Chain) reacted amicably when we were presented with a heat wave. All over the news people where warned about the topic of leaving your children or your pets in the car. Unfortunately there where fatalities due to the practice of leaving small children in the car. There was a lot of talk but MediaMarkt spun into action. This story has all the ingredients for future security (advanced persistent threats) APT's and how you will have to deal with them. The same process' will have to be applied to your policy framework. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityagilityartikel24-7-2015-150724120352-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The following example of a recent story is the perfect analogy for dynamic policy creation. The Swiss MediaMarket (Electronics Chain) reacted amicably when we were presented with a heat wave. All over the news people where warned about the topic of leaving your children or your pets in the car. Unfortunately there where fatalities due to the practice of leaving small children in the car. There was a lot of talk but MediaMarkt spun into action. This story has all the ingredients for future security (advanced persistent threats) APT&#39;s and how you will have to deal with them. The same process&#39; will have to be applied to your policy framework.
Security agility- dynamic policy creation and rollout from Reputelligence
]]>
220 4 https://cdn.slidesharecdn.com/ss_thumbnails/securityagilityartikel24-7-2015-150724120352-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-slideshare807am-48x48.jpg?cb=1545605397 www.reputelligence.com https://cdn.slidesharecdn.com/ss_thumbnails/sicherheitwelchegefahrendurchdrohnendrohen-golem-181225135454-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/sicherheit-welche-gefahren-durch-drohnen-drohen-golemde/126689444 Sicherheit welche gef... https://cdn.slidesharecdn.com/ss_thumbnails/intensitylevelssocialengineeringengagementframeworkseef-firstcutd-180823065123-thumbnail.jpg?width=320&height=320&fit=bounds slideshare807am/intensity-levels-social-engineering-engagement-framework-seef-first-cut-dc-brack-a-bahram Intensity levels socia... https://cdn.slidesharecdn.com/ss_thumbnails/tcbe-180724150126-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/artikel-about-drones-and-swisscom-innovation-startup-process/107304814 Artikel About Drones a...