La mantilla es un accesorio tradicional español que se usa en ocasiones especiales. Se coloca sobre la cabeza y los hombros dejando caer los extremos a los lados de la cara. La mantilla aporta elegancia y distinción a cualquier atuendo formal.
2 anteproyecto de gestion_documental_2010[1]feremu
Este documento presenta el proyecto de investigación "Análisis del nivel de conocimiento del talento humano de Proempresas en archivos de gestión documental", el cual analizará el estado de conocimientos teóricos y prácticos del talento humano de Proempresas sobre las dimensiones de la gestión documental. El proyecto se llevará a cabo en las instalaciones de Proempresas en Cúcuta y busca diagnosticar el nivel de conocimiento sobre gestión documental de los trabajadores para mejorarlo continuo.
This talk looks at the challenges we face as a defender today by examining several recent, prominent breaches and one of their common causes.
The first 2/3 of this talk are the same as "Is That Normal?" (http://www.slideshare.net/marknca/is-that-normal-behaviour-modelling-on-the-cheap) but in the last 3rd, instead of diving in the the mechanics of behavioural analysis, this talk looks at what we should be doing with the results.
Originally presented at the Gartner Security & Risk Management Summit in London, 08-Sep-2014
Una mujer confundió la entrada de un metro con un estacionamiento y aparcó su auto allí. Dos horas después, la policía tuvo que despejar la entrada del metro, que había sido bloqueada por el auto. Varias publicaciones en las redes sociales compartieron la historia de la mujer y su error, algunas agregando emojis o expresiones de asombro.
Power Struggle: Balancing Relationships & Responsibility in the CloudMark Nunnikhoven
The document discusses the shared responsibility model for security between cloud service providers and their clients. It outlines the different levels of responsibility for various cloud service types from IaaS to SaaS. For IaaS, the client is responsible for security of the guest operating system, applications, and data while the provider is responsible for the cloud infrastructure security. For PaaS and SaaS, more of the responsibility shifts to the provider as clients have less control over the stack. The document emphasizes that while providers manage certain security controls, clients still need to understand security risks and have appropriate defenses for their use of cloud services.
A providers view of security in the cloud. This talk shows how the main cloud providers (AWS & Azure) build security into their cloud services and how they contribute to the shared responsibility model for security in the cloud.
When it hits the fan, one of the first questions that you get asked is "Who did this?".
And like any good mystery, trying to find the attacker takes many twists and turns. There's a trail of evidence, a red herring or two, and the inevitable plot twist before the final reveal.
Unfortunately, despite what you see on TV, in the movies, or even in the press, attack attribution is hard. In face, it's one of the hardest problems in information security today.
In this talk, we use real world examples to work through what it takes to properly make the connection between attack and attacker.
Looking at real world techniques used to gather and validate evidence, we'll examine what it takes for that evidence to hold up to cross examination. We'll look at the role each of your security controls play in the attribution process and the steps you can take to immediately make attribution easier.
Come learn what it takes to actually prove who the attacker is and where attribution fits into your daily security practice.
This document discusses the traditional responsibility model versus the shared responsibility model used with AWS. With AWS, customers are responsible for the guest operating system (OS), applications, and data while AWS is responsible for security of the cloud infrastructure like hardware, software, and facilities. The document also covers pillars of incident response like monitoring and forensics. It provides examples of how incident response processes have changed with AWS instances compared to traditional servers.
Federal and state laws govern employment discrimination and protect various groups. In 2011, over 99,000 discrimination charges were filed with the EEOC, primarily for race, sex, disability and age discrimination. The costs of settling class action discrimination lawsuits has increased dramatically, with the top 10 settlements in 2010 totaling over $346 million. Both the ADA Amendments Act and the Genetic Information Non-Discrimination Act were passed to broaden protections, with the latter prohibiting the use of genetic information in employment decisions. Individual states also have their own discrimination laws that may provide additional protected classes or differ in procedures and interpretations compared to federal law.
2 anteproyecto de gestion_documental_2010[1]feremu
Este documento presenta el proyecto de investigación "Análisis del nivel de conocimiento del talento humano de Proempresas en archivos de gestión documental", el cual analizará el estado de conocimientos teóricos y prácticos del talento humano de Proempresas sobre las dimensiones de la gestión documental. El proyecto se llevará a cabo en las instalaciones de Proempresas en Cúcuta y busca diagnosticar el nivel de conocimiento sobre gestión documental de los trabajadores para mejorarlo continuo.
This talk looks at the challenges we face as a defender today by examining several recent, prominent breaches and one of their common causes.
The first 2/3 of this talk are the same as "Is That Normal?" (http://www.slideshare.net/marknca/is-that-normal-behaviour-modelling-on-the-cheap) but in the last 3rd, instead of diving in the the mechanics of behavioural analysis, this talk looks at what we should be doing with the results.
Originally presented at the Gartner Security & Risk Management Summit in London, 08-Sep-2014
Una mujer confundió la entrada de un metro con un estacionamiento y aparcó su auto allí. Dos horas después, la policía tuvo que despejar la entrada del metro, que había sido bloqueada por el auto. Varias publicaciones en las redes sociales compartieron la historia de la mujer y su error, algunas agregando emojis o expresiones de asombro.
Power Struggle: Balancing Relationships & Responsibility in the CloudMark Nunnikhoven
The document discusses the shared responsibility model for security between cloud service providers and their clients. It outlines the different levels of responsibility for various cloud service types from IaaS to SaaS. For IaaS, the client is responsible for security of the guest operating system, applications, and data while the provider is responsible for the cloud infrastructure security. For PaaS and SaaS, more of the responsibility shifts to the provider as clients have less control over the stack. The document emphasizes that while providers manage certain security controls, clients still need to understand security risks and have appropriate defenses for their use of cloud services.
A providers view of security in the cloud. This talk shows how the main cloud providers (AWS & Azure) build security into their cloud services and how they contribute to the shared responsibility model for security in the cloud.
When it hits the fan, one of the first questions that you get asked is "Who did this?".
And like any good mystery, trying to find the attacker takes many twists and turns. There's a trail of evidence, a red herring or two, and the inevitable plot twist before the final reveal.
Unfortunately, despite what you see on TV, in the movies, or even in the press, attack attribution is hard. In face, it's one of the hardest problems in information security today.
In this talk, we use real world examples to work through what it takes to properly make the connection between attack and attacker.
Looking at real world techniques used to gather and validate evidence, we'll examine what it takes for that evidence to hold up to cross examination. We'll look at the role each of your security controls play in the attribution process and the steps you can take to immediately make attribution easier.
Come learn what it takes to actually prove who the attacker is and where attribution fits into your daily security practice.
This document discusses the traditional responsibility model versus the shared responsibility model used with AWS. With AWS, customers are responsible for the guest operating system (OS), applications, and data while AWS is responsible for security of the cloud infrastructure like hardware, software, and facilities. The document also covers pillars of incident response like monitoring and forensics. It provides examples of how incident response processes have changed with AWS instances compared to traditional servers.
Federal and state laws govern employment discrimination and protect various groups. In 2011, over 99,000 discrimination charges were filed with the EEOC, primarily for race, sex, disability and age discrimination. The costs of settling class action discrimination lawsuits has increased dramatically, with the top 10 settlements in 2010 totaling over $346 million. Both the ADA Amendments Act and the Genetic Information Non-Discrimination Act were passed to broaden protections, with the latter prohibiting the use of genetic information in employment decisions. Individual states also have their own discrimination laws that may provide additional protected classes or differ in procedures and interpretations compared to federal law.
Software-defined networking is the latest technology in a move to abstract a variety of data center resources. As more and more of the data center is defined in code, some unique security challenges come to the fore.
In this session, we'll explore both sides of the security challenge. What types of controls and implementations are required to define security as part of your infrastructure code? What challenges does maintaining an infrastructure codebase present?
You'll learn not only how to integrate security into your infrastructure code but also how to properly and securely manage that codebase.
An examination of how the shared responsibility model for cloud security works in the real world.
Using practical examples, you'll see how security responsibilities are balanced between the consumer (you the user) and the provider.
The document discusses the shared responsibility model between users and AWS for security. It provides examples of how responsibility is shared for different AWS services like SQS, RDS, and EC2. The document also covers security updates needed for vulnerabilities like Shellshock and POODLE and recommends actions users can take to protect their AWS resources and workloads.
The document summarizes a student's summer internship project on import/export procedures and logistics requirements in different industries. The project involved detailed studies of import/export documentation, terms, and logistics needs for various industries. Key findings included packing/transport requirements for textile companies and common issues faced like infrastructure, vessel availability, and customs processing. The internship provided valuable lessons about working in logistics, documentation, communication gaps, and problem-solving.
Defending your workloads with aws waf and deep securityMark Nunnikhoven
What is a WAF (web application firewall) and how can it help defend your AWS workloads? In this webinar, you’ll learn how to get started with the new AWS WAF service and where it fits in your security strategy. You’ll see how AWS WAF works with Trend Micro’s Deep Security to provide a strong, layered defense for your web applications
Industry perception & underdtanding logistic industryXcellon Institute
The internship summary focused on logistics procedures for imports and exports. The objectives were to study the logistics industry and procedures for transportation, documentation, and customs. Key activities included introducing logistics and the sponsoring company, detailing import/export procedures, commercial terms, achievements like facility visits, learnings around documentation precision, and a suggestion to advance customs clearance through online systems.
Is That Normal? Behaviour Modelling On The CheapMark Nunnikhoven
Originally presented at BSides Ottawa on 06-Sep-2014, this talk lays out the challenges faced by todays defender (for context), the gap in our current defensive strategies (what we'll address), and explains how to start a basic behavioural analysis practice with minimal investment.
Remember this is a BSides presentation so there may be some language which causes a double-take ;-)
Open with caution.
El documento habla sobre la importancia de la administración de recursos y el servicio al cliente en las empresas. También menciona que es necesario realizar encuestas periódicas con los clientes para identificar qué servicios demandan y así mejorar la atención al cliente y estrategias de la empresa. Además, introduce el tema de la comunicación entre personas como un elemento clave en las relaciones interpersonales.
El documento habla sobre la importancia de la administración de recursos y el servicio al cliente en las empresas. También menciona que es necesario realizar encuestas periódicas con los clientes para identificar qué servicios demandan y así determinar las mejores estrategias y técnicas para satisfacer sus necesidades. Además, define la comunicación como todo lo que ocurre en la relación entre dos o más personas, incluyendo tanto lo que se dice verbalmente como lo que no se expresa con palabras.
Este documento discute los indicadores de gestión, sus beneficios y qué son la planeación y gerencia estratégicas. Explica que los indicadores de gestión miden la efectividad, eficiencia y productividad de una organización. También define la planeación estratégica como un proceso sistemático para decidir los esfuerzos de planificación y la gerencia estratégica como un proceso para planificar objetivos claros y usar estrategias para crear el futuro de una empresa.
Este documento presenta la ficha de indicadores de un proceso y procedimiento de archivo general. Incluye 3 actividades principales del puesto de auxiliar de archivo: 1) clasificar documentación según normas, 2) recibir, despachar y controlar documentos de forma eficiente, y 3) elaborar informes para el jefe inmediato.
Este documento describe las funciones y responsabilidades de un auxiliar de archivo. Sus principales tareas incluyen recibir, archivar y almacenar documentos e información de acuerdo con las normas establecidas, así como proporcionar dicha información a quien la solicite y elaborar informes periódicos sobre sus actividades.
Este documento presenta un resumen de tres circulares y una ley relacionadas con la organización y gestión de archivos en Colombia. La Circular No. 004 de 2003 establece lineamientos para la organización de las Historias Laborales. La Circular No. 012 de 2004 brinda orientaciones para el cumplimiento de la anterior. Finalmente, la Ley 594 de 2000 dicta la Ley General de Archivos en Colombia.
Software-defined networking is the latest technology in a move to abstract a variety of data center resources. As more and more of the data center is defined in code, some unique security challenges come to the fore.
In this session, we'll explore both sides of the security challenge. What types of controls and implementations are required to define security as part of your infrastructure code? What challenges does maintaining an infrastructure codebase present?
You'll learn not only how to integrate security into your infrastructure code but also how to properly and securely manage that codebase.
An examination of how the shared responsibility model for cloud security works in the real world.
Using practical examples, you'll see how security responsibilities are balanced between the consumer (you the user) and the provider.
The document discusses the shared responsibility model between users and AWS for security. It provides examples of how responsibility is shared for different AWS services like SQS, RDS, and EC2. The document also covers security updates needed for vulnerabilities like Shellshock and POODLE and recommends actions users can take to protect their AWS resources and workloads.
The document summarizes a student's summer internship project on import/export procedures and logistics requirements in different industries. The project involved detailed studies of import/export documentation, terms, and logistics needs for various industries. Key findings included packing/transport requirements for textile companies and common issues faced like infrastructure, vessel availability, and customs processing. The internship provided valuable lessons about working in logistics, documentation, communication gaps, and problem-solving.
Defending your workloads with aws waf and deep securityMark Nunnikhoven
What is a WAF (web application firewall) and how can it help defend your AWS workloads? In this webinar, you’ll learn how to get started with the new AWS WAF service and where it fits in your security strategy. You’ll see how AWS WAF works with Trend Micro’s Deep Security to provide a strong, layered defense for your web applications
Industry perception & underdtanding logistic industryXcellon Institute
The internship summary focused on logistics procedures for imports and exports. The objectives were to study the logistics industry and procedures for transportation, documentation, and customs. Key activities included introducing logistics and the sponsoring company, detailing import/export procedures, commercial terms, achievements like facility visits, learnings around documentation precision, and a suggestion to advance customs clearance through online systems.
Is That Normal? Behaviour Modelling On The CheapMark Nunnikhoven
Originally presented at BSides Ottawa on 06-Sep-2014, this talk lays out the challenges faced by todays defender (for context), the gap in our current defensive strategies (what we'll address), and explains how to start a basic behavioural analysis practice with minimal investment.
Remember this is a BSides presentation so there may be some language which causes a double-take ;-)
Open with caution.
El documento habla sobre la importancia de la administración de recursos y el servicio al cliente en las empresas. También menciona que es necesario realizar encuestas periódicas con los clientes para identificar qué servicios demandan y así mejorar la atención al cliente y estrategias de la empresa. Además, introduce el tema de la comunicación entre personas como un elemento clave en las relaciones interpersonales.
El documento habla sobre la importancia de la administración de recursos y el servicio al cliente en las empresas. También menciona que es necesario realizar encuestas periódicas con los clientes para identificar qué servicios demandan y así determinar las mejores estrategias y técnicas para satisfacer sus necesidades. Además, define la comunicación como todo lo que ocurre en la relación entre dos o más personas, incluyendo tanto lo que se dice verbalmente como lo que no se expresa con palabras.
Este documento discute los indicadores de gestión, sus beneficios y qué son la planeación y gerencia estratégicas. Explica que los indicadores de gestión miden la efectividad, eficiencia y productividad de una organización. También define la planeación estratégica como un proceso sistemático para decidir los esfuerzos de planificación y la gerencia estratégica como un proceso para planificar objetivos claros y usar estrategias para crear el futuro de una empresa.
Este documento presenta la ficha de indicadores de un proceso y procedimiento de archivo general. Incluye 3 actividades principales del puesto de auxiliar de archivo: 1) clasificar documentación según normas, 2) recibir, despachar y controlar documentos de forma eficiente, y 3) elaborar informes para el jefe inmediato.
Este documento describe las funciones y responsabilidades de un auxiliar de archivo. Sus principales tareas incluyen recibir, archivar y almacenar documentos e información de acuerdo con las normas establecidas, así como proporcionar dicha información a quien la solicite y elaborar informes periódicos sobre sus actividades.
Este documento presenta un resumen de tres circulares y una ley relacionadas con la organización y gestión de archivos en Colombia. La Circular No. 004 de 2003 establece lineamientos para la organización de las Historias Laborales. La Circular No. 012 de 2004 brinda orientaciones para el cumplimiento de la anterior. Finalmente, la Ley 594 de 2000 dicta la Ley General de Archivos en Colombia.