Transcript
Page 1: Information Security: F rom the Outside  In

Information Security:From the Outside In

Marc [email protected]

Page 2: Information Security: F rom the Outside  In
Page 3: Information Security: F rom the Outside  In

T H E C L O U D . . .

Page 4: Information Security: F rom the Outside  In

Many people choose passwords

that are based on informationeasily found on social

networkingsites, like birthdays and

anniversaries

*Ironic to choose a password this way for Facebook?

Page 5: Information Security: F rom the Outside  In
Page 6: Information Security: F rom the Outside  In

How Would You Prefer to Spend Your Time?

Tax Audit

Root Canal

Page 7: Information Security: F rom the Outside  In
Page 8: Information Security: F rom the Outside  In
Page 9: Information Security: F rom the Outside  In
Page 10: Information Security: F rom the Outside  In

Thank you

Information from the training:http://itso.blogs.rice.edu

Contact Information:[email protected]


Top Related