SlideShare una empresa de Scribd logo
1 de 89
Descargar para leer sin conexión
Social media
is okay —
jeopardizing
security isn’t
I am Jordan Wollman
Executive Creative Director & Partner @ Aria
I’m 28
years old
(although my wife
may beg to differ)
I’m married to
     a fantastic
photographer:
        Briana
I have a
one-month
old daughter:
Remy
I generally talk about
  design, marketing,
    social media,
  music and movies
I have 357 followers on
   Twitter, 401 friends on
    Facebook, and 241
connections on LinkedIn
I love Star Wars
Some people call me Jedi Master
I am a Husband,
        Father,
      Advertiser,
  Avid snowboarder,
   Wine enthusiast,
Social media navigator.
You can find me on   Twitter, Facebook,
                     LinkedIn, Google+,
                     Behance, About.me,
                     Wordpress, projeqt, Virb,
                     Spotify, Vimeo, YouTube,
                     Last.fm, Pandora,
                     Delicious, Tumblr, Flickr,
                     Gowalla, Foursquare,
                     Klout, Ping.fm
                     ...
All that information,
and a lot more, you can find on

Facebook
A digital agency —
   we design the
experience of brands.
We design the
     experience of brands...
In one of many ways, online and
     through social media
Ihere?
        am
 o, why
S
    Let’s talk
    Social Media
Why should
 you care
about Social
  Media?
In 2011

  110 billion
minutes were
spent on social
  networks &
    blogs       [Source: Nielsen]
In 2011

          has 500
 million users.
That’s 1 in every
 13 people on
      earth.
In 2011

55 million
tweets are
 published
 each day
In 2011

300,000
users join
each day
In 2011




exceeds
2 billion
 views
each day
In 2011
  On the professional side,

        has
 over 100
million users
world wide
In 2011
  On the professional side,

 And a new
  user joins
every second
  of the day
Those are
your clients...
And they’re
  talking
about you.
It’s about the
disproportionate
    power of 1

    says my true reach is 270
     klout.com/#/jordanwollman
Yeah. Yeah. Yeah.
But is it safe?
In a lot of ways, yes.


In others...?
It’s the
 wild, wild west.
The rules are being
written in real-time.
Two sides to the safety coin:
1) Your personal safety
2) Your client’s safety
then
Okay

 Let’s look at a
 few case studies
@PrincessTweep
asks to be robbed,
and gets... robbed
“Well, I was ‘checking in’ on Foursquare all over
town today. I know it’s risky — but I lost one of
my mayorships last week and I’m not going to
      let that happen again.” said Tweep.
“A new website called PleaseRobMe.com
does nothing more than aggregate publicly
shared check-ins, but its name and purpose
attempt to shed more light on the dangerous
      side effects of location-sharing.”


                    via
“Many of us location-sharers get so caught
 up in the novelty and bonuses associated
    with our behavior that we forget the
         implications of our actions.”



                    via
“Some law enforcement agencies are referring
   to check-ins as recent empty homes”




                     via
✓   Foursquare
                ✓
Tools you       ✓
                    Gowalla
                    Loopt
willingly       ✓
                ✓
                    Google Buzz
                    Google+
check in with   ✓   Facebook
                ✓   Twitter
✓ Transit swipe-cards
              ✓
Things that   ✓
                Swipe cards for doors
                Electronic tolling (TollTag)
track your    ✓
              ✓
                Cellphones
                Location searches on
location        your PDA
              ✓ Free Wi-Fi
passively     ✓ Parking meters you call to
                add money



                                 [Source: eff.org]
Creepy: cree.py
is an application that allows you
to gather geolocation related
information about users from
social networking platforms
and image hosting services.
Hackers hacking
 July, 2011: AntiSec claimed credit for the
Booz Allen hack. It published a list of 90,000
military e-mail addresses, apparently stolen
          from Booz Allen's systems.



                      via
London fights back at RIM

 August, 2011: In the wake of ongoing riots in
   London, Blackberry maker Research in
  Motion’s website was hacked on Tuesday.




                      via
London fights back at RIM

“No Blackberry you will NOT assist the police,”
 wrote one hacker on a Research in Motion blog”
Social networking sites leak
   personal information
     ...a new study has found, raising the
   possibility that users of such sites can be
      tracked everywhere they go online




                       via
Social networking sites leak
   personal information
The study looked at twelve social networking sites:
 Bebo, Digg, Facebook, Friendster, Hi5, Imeem,
 LinkedIn, LiveJournal, MySpace, Orkut, Twitter,
                   and Xanga



                        via
Social networking sites leak
   personal information
   "Not only do they know where I'm visiting,
     they know who I am," said Wills. "And
              that's disconcerting."




                       via
Social networking sites leak
   personal information
    The report found that between 55%
    and 90% of users keep the default
            privacy settings




                   via
Can it be dangerous? Yes.




But the time is now!
Keeping
yourself safe
Privacy
Settings
Get to know who can and
can’t see your information
it
             e t!,
            e i
           s e
          n ar
     y  a h
     Privacy
       c s
    e n
  th Settings
If y ca
 theGet to know who can and
    can’t see your information
Photo by Jennifer Daniel




                           Only friend
                           friends
                           It’s not a popularity contest
                           Facebook will cap you at 5,001 anyway
Checking-in
 is okay...
  But do it as you leave,
    not as you arrive
Don’t check-in
  at home
    And don’t let your
    friends do it either
Frank
                                  Annie




 Photo-tagging
        Is generally associated
           with Geo-Tagging
Keeping your
 clients safe
Have a plan
     Know the dangers & pitfalls
     before you start out
State your terms
of use clearly
And report violators
to Facebook, Twitter,
YouTube, etc.
Don’t feed
 the trolls
 The only want to incite riot
— just report, then ignore them
Choose
a partner
   Maximize opportunity
   & avoid pitfalls
If not, choose
  a good tool
Verify
 age
 Well... do what you can.
Asking for check-
   ins is risky

     Make sure your clients
    are aware of the dangers
ASL
Don’t ask for, or require
 Age, Sex, Location
Moderate the
conversation
It’s okay to delete other’s comments,
or use profanity filtering
It may be risky,
   but go forth
 and conquer!
Because
✓ Over 50% of the       ✓ If Facebook were a
  world is under 30       country it would be
                          the world’s 3rd
✓ In 10 years over        largest and 2x the
  40% of the Fortune      size of the U.S.
  500 won’t be here
                        ✓ 2009 study revealed
✓ Facebook tops           that online students
  Google for weekly       out performed those
  traffic in the U.S.     receiving face-to-
                          face instruction
Where your
audience is
  hiding
There’s plenty of
info out there on
  the big boys
The new kid on the block
A total mystery to marketers:
they aren’t playing by the rules!
Google+ is about individuals
     — not businesses,
 organizations, corporations
Individuals
    are
 authentic
Individuals
    are
  flawed
Individuals
    are
interesting
Individuals
    are
identifiable
Who’s
done it
right?
Until...
That’s Fabio!
That’s Fabio!


No... really!
Individuals
    are
 willing to
advocate a
good cause
Conclusion
✓ Brave it... the       ✓ Be authentic.
  time is now!            That’s what the
                          ever-growing 50%,
✓ It may be               under 30
  dangerous, but          population wants
  with a little           from brands
  common sense,
  it’s worth the
  investment and risk
And remember.
What happens in
Vegas...

...stays on Facebook,
YouTube, and Flickr
Q&A
w ariaagency.com
t @jordanwollman
f /jordanwollman

Más contenido relacionado

La actualidad más candente

Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentationsahrdebeck52
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Michelle Ferrier
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet SafetyJessica Punke
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
 
Fys social media explosion1
Fys social media explosion1Fys social media explosion1
Fys social media explosion1kayleebreeann
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comeducatedcommuni79
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonJohn Florentino E Echon
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Jim Adler
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineHolly Solomon
 
Paul muller flip book 2jun17
Paul muller flip book 2jun17Paul muller flip book 2jun17
Paul muller flip book 2jun17Paul Muller
 
Presentation
PresentationPresentation
PresentationLHSICT
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital FootprintsEric Cole
 
Digital footprints final
Digital footprints finalDigital footprints final
Digital footprints finalseanclimbs
 

La actualidad más candente (20)

Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
Davy Lunch & Learn
Davy Lunch & LearnDavy Lunch & Learn
Davy Lunch & Learn
 
Web pp
Web ppWeb pp
Web pp
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentation
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet Safety
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 
Fys social media explosion1
Fys social media explosion1Fys social media explosion1
Fys social media explosion1
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.com
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane Abdon
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Facebook- Women- Smoking
Facebook- Women- SmokingFacebook- Women- Smoking
Facebook- Women- Smoking
 
Paul muller flip book 2jun17
Paul muller flip book 2jun17Paul muller flip book 2jun17
Paul muller flip book 2jun17
 
Unit 35
Unit 35Unit 35
Unit 35
 
Presentation
PresentationPresentation
Presentation
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital Footprints
 
Digital footprints final
Digital footprints finalDigital footprints final
Digital footprints final
 

Destacado (7)

R.Smith Art
R.Smith ArtR.Smith Art
R.Smith Art
 
Building Muscle
Building MuscleBuilding Muscle
Building Muscle
 
The Big Four
The Big FourThe Big Four
The Big Four
 
DNA
DNADNA
DNA
 
R.Smith Art
R.Smith ArtR.Smith Art
R.Smith Art
 
Fungus
FungusFungus
Fungus
 
Molecular Genetics
Molecular GeneticsMolecular Genetics
Molecular Genetics
 

Similar a Social Media is Okay - Jeopardizing Security Isn't

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceFive Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceDave LaFontaine
 
Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social mediaDave LaFontaine
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& dataminingPaige Jaeger
 
Do not put too much information pdf
Do not put too much information pdfDo not put too much information pdf
Do not put too much information pdfShangli Jiang
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPSmicaja
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Dave Briggs
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Bex Lewis
 
A Social Media Evolution Whats Next?
A Social Media Evolution   Whats Next?A Social Media Evolution   Whats Next?
A Social Media Evolution Whats Next?Jeffrey Stewart
 

Similar a Social Media is Okay - Jeopardizing Security Isn't (20)

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
03 dllo davidlafontaine
03 dllo davidlafontaine03 dllo davidlafontaine
03 dllo davidlafontaine
 
Rent Wiki Social Prez
Rent Wiki Social PrezRent Wiki Social Prez
Rent Wiki Social Prez
 
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceFive Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
 
Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social media
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Social web for grannies
Social web for granniesSocial web for grannies
Social web for grannies
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
Facebook
FacebookFacebook
Facebook
 
Do not put too much information pdf
Do not put too much information pdfDo not put too much information pdf
Do not put too much information pdf
 
Digital footprints fetc13
Digital footprints fetc13Digital footprints fetc13
Digital footprints fetc13
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPS
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
 
A Social Media Evolution Whats Next?
A Social Media Evolution   Whats Next?A Social Media Evolution   Whats Next?
A Social Media Evolution Whats Next?
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Social Media is Okay - Jeopardizing Security Isn't