Certificate_Secure_Through_The_Day_02

Patrick Thorpe
Patrick ThorpeHead of Route Development - Europe at Rhenus Logistics
Certificate
SECURE: throughout the day - Part 2
The Corporate Security Office and
the Chief Information Security Officer attest that
Patrick Thorpe
(Z0037VKJ)
has successfully completed the web-based Security Training
"SECURE: throughout the day - Part 2".
Training Content
In the web-based training (WBT), the participant accompanies a Siemens employee through his/her day and
through different day-to-day situations. The employee, together with the protagonist of the WBT, actively
participates in solving security challenges and sees how he/she can directly improve the security level at
Siemens and support our business.
The WBT focuses specifically on the following topics:
- Importance of Information and Corporate Security
- Improving the overall awareness for Information and Corporate Security
- Protection classes for documents and information
- Handling requirements related to the protection classes
- Protection of corporate information when dealing with external business partners
Munich, 2.4.2013
This is an automatically generated document and therefore valid without signature.
Siegfried Russwurm
Member of the Managing Board
Responsible for CIT and CSO
intranet.siemens.com/csts

Recomendados

Certificate por
CertificateCertificate
CertificateShailendra Rawat
175 vistas1 diapositiva
SECURE- Throughout the day - Part 2.pdf por
SECURE- Throughout the day - Part 2.pdfSECURE- Throughout the day - Part 2.pdf
SECURE- Throughout the day - Part 2.pdfKresimir Popovic
7 vistas1 diapositiva
SECURE- Throughout the day - Part 1.pdf por
SECURE- Throughout the day - Part 1.pdfSECURE- Throughout the day - Part 1.pdf
SECURE- Throughout the day - Part 1.pdfKresimir Popovic
11 vistas1 diapositiva
SECURE- Throughout the day - Part 3.pdf por
SECURE- Throughout the day - Part 3.pdfSECURE- Throughout the day - Part 3.pdf
SECURE- Throughout the day - Part 3.pdfKresimir Popovic
8 vistas1 diapositiva
IT Security - Guidelines por
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
2.1K vistas49 diapositivas
The Charter of Trust por
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
558 vistas24 diapositivas

Más contenido relacionado

Similar a Certificate_Secure_Through_The_Day_02

Developing A Quality Product Within Budget And On Time por
Developing A Quality Product Within Budget And On TimeDeveloping A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On TimeAshley Davis
3 vistas81 diapositivas
2 Security And Internet Security por
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
1.3K vistas26 diapositivas
Game based learning for safety and security education por
Game based learning for safety and security educationGame based learning for safety and security education
Game based learning for safety and security educationJournal of Education and Learning (EduLearn)
41 vistas9 diapositivas
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza... por
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
129 vistas28 diapositivas
Module 1 / Unit 5 Digital Cybersecurity por
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity SMKCreations
57 vistas40 diapositivas
Cybersecurity education catalog sae september 2021 por
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021TrustwaveHoldings
1.3K vistas15 diapositivas

Similar a Certificate_Secure_Through_The_Day_02(20)

Developing A Quality Product Within Budget And On Time por Ashley Davis
Developing A Quality Product Within Budget And On TimeDeveloping A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On Time
Ashley Davis3 vistas
2 Security And Internet Security por Ana Meskovska
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska1.3K vistas
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza... por Global Knowledge Training
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Module 1 / Unit 5 Digital Cybersecurity por SMKCreations
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
SMKCreations57 vistas
Cybersecurity education catalog sae september 2021 por TrustwaveHoldings
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
TrustwaveHoldings1.3K vistas
Data Security and Know-How Protection from PROSTEP por Joseph Lopez, M.ISM
Data Security and Know-How Protection from PROSTEPData Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEP
Joseph Lopez, M.ISM296 vistas
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga... por IRJET Journal
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
IRJET Journal4 vistas
An Empirical Study on Information Security por ijtsrd
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd80 vistas
Whitepaper Pro-active Security Management 2006.pdf por serve&solve
Whitepaper Pro-active Security Management 2006.pdfWhitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdf
serve&solve10 vistas
Chapter 6 Security of Information and Cyber Security(FASS) por Md Shaifullar Rabbi
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
Rothke rsa 2013 - the five habits of highly secure organizations por Ben Rothke
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke593 vistas
End User Security Awareness Presentation por Cristian Mihai
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai40.3K vistas
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE por 360 BSI
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
360 BSI482 vistas
Certificate - Protection against Social Engineering.pdf por Kresimir Popovic
Certificate - Protection against Social Engineering.pdfCertificate - Protection against Social Engineering.pdf
Certificate - Protection against Social Engineering.pdf
Kresimir Popovic4 vistas
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE por 360 BSI
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
360 BSI283 vistas

Certificate_Secure_Through_The_Day_02

  • 1. Certificate SECURE: throughout the day - Part 2 The Corporate Security Office and the Chief Information Security Officer attest that Patrick Thorpe (Z0037VKJ) has successfully completed the web-based Security Training "SECURE: throughout the day - Part 2". Training Content In the web-based training (WBT), the participant accompanies a Siemens employee through his/her day and through different day-to-day situations. The employee, together with the protagonist of the WBT, actively participates in solving security challenges and sees how he/she can directly improve the security level at Siemens and support our business. The WBT focuses specifically on the following topics: - Importance of Information and Corporate Security - Improving the overall awareness for Information and Corporate Security - Protection classes for documents and information - Handling requirements related to the protection classes - Protection of corporate information when dealing with external business partners Munich, 2.4.2013 This is an automatically generated document and therefore valid without signature. Siegfried Russwurm Member of the Managing Board Responsible for CIT and CSO intranet.siemens.com/csts