SlideShare a Scribd company logo
Certificate
SECURE: throughout the day - Episode III
Siemens Information Technology and
the Chief Information Security Officer attest that
Kresimir Popovic
(Z001NVMP)
has successfully completed the Security Online Training
"SECURE: throughout the day Episode III" on Jun 2, 2014.
Training Content
This training program focuses on an on-going and dangerous form of cyber-attack, called Advanced Persistent
Threats (APT). The web-based training shows how these attacks work and which patterns they follow.
Furthermore, handling rules are given to help minimize the risk of a successful APT within our company. A
second key point of the training is the secure usage of Social Media and how to protect against Social
Engineering - both commonly used by potential attackers in order to gain information on their potential target.
Additionally there is a concise characterization of the protection classes and the related handling requirements.
Munich, Jun 2, 2014
This is an automatically generated document and therefore valid without signature.
Siegfried Russwurm
Member of the Managing Board
Responsible for IT
intranet.siemens.com/csts

More Related Content

Similar to SECURE- Throughout the day - Part 3.pdf (20)

PPTX
Security Awareness Training from KnowBe4
Carol Montgomery Adams
 
PDF
Top Cyber News Magazine Daniel Ehrenreich
TopCyberNewsMAGAZINE
 
PDF
2021. Top Cyber News MAGAZINE Daniel Ehrenreich October 2021
Dr. Ludmila Morozova-Buss
 
PPTX
CYBERSECURITY TRACK.pptx
levimax2
 
PDF
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
IJCSEIT Journal
 
PDF
Credential Harvesting Using Man in the Middle Attack via Social Engineering
ijtsrd
 
PDF
How to avoid cyber security attacks in 2024 - CyberHive.pdf
online Marketing
 
PDF
The latest trends in cybersecurity and how to protect yourself.pdf
Cyberwing
 
PPTX
The Charter of Trust
DefCamp
 
PDF
Leveraging Machine Learning for Proactive Threat Analysis in Cybersecurity
Editor IJCATR
 
PDF
Certificate
Shailendra Rawat
 
PPT
End User Security Awareness Presentation
Cristian Mihai
 
PDF
Concept Of Cyber Security.pdf
FahadZaman38
 
PPTX
slidesgo-navigating-the-cyber-landscape-understanding-threats-and-strategies-...
NasratullahMirzai2
 
PPTX
CyberSecurity3_For_better_Understanding_ofCyberSecurity.pptx
opgirl306
 
PPTX
Cyber Security.pptx report or a seminar internship
arunanjalianju21
 
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
PDF
Comparative Analysis of Phishing Tools
ijtsrd
 
PPTX
ICAO SMS M 02 – Basic safety.pptx
Civil Aviation Safety and Engineering Academy
 
Security Awareness Training from KnowBe4
Carol Montgomery Adams
 
Top Cyber News Magazine Daniel Ehrenreich
TopCyberNewsMAGAZINE
 
2021. Top Cyber News MAGAZINE Daniel Ehrenreich October 2021
Dr. Ludmila Morozova-Buss
 
CYBERSECURITY TRACK.pptx
levimax2
 
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
IJCSEIT Journal
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
ijtsrd
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
online Marketing
 
The latest trends in cybersecurity and how to protect yourself.pdf
Cyberwing
 
The Charter of Trust
DefCamp
 
Leveraging Machine Learning for Proactive Threat Analysis in Cybersecurity
Editor IJCATR
 
Certificate
Shailendra Rawat
 
End User Security Awareness Presentation
Cristian Mihai
 
Concept Of Cyber Security.pdf
FahadZaman38
 
slidesgo-navigating-the-cyber-landscape-understanding-threats-and-strategies-...
NasratullahMirzai2
 
CyberSecurity3_For_better_Understanding_ofCyberSecurity.pptx
opgirl306
 
Cyber Security.pptx report or a seminar internship
arunanjalianju21
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
Comparative Analysis of Phishing Tools
ijtsrd
 
ICAO SMS M 02 – Basic safety.pptx
Civil Aviation Safety and Engineering Academy
 

More from Kresimir Popovic (20)

PDF
Amazon_AWS_IAM_2023_Cert.pdf
Kresimir Popovic
 
PDF
Zero_Harm_Culture_@_IC_for_Employees.pdf
Kresimir Popovic
 
PDF
Functional Programming Principles - 03.06.2013.pdf
Kresimir Popovic
 
PDF
Open_Source_Software_Basics.pdf
Kresimir Popovic
 
PDF
Open_Source_Software_Overview.pdf
Kresimir Popovic
 
PDF
Global Bribery and Corruption Certificate.pdf
Kresimir Popovic
 
PDF
Siemens Compliance (SIECO).pdf
Kresimir Popovic
 
PDF
Global Competition Certificate.pdf
Kresimir Popovic
 
PDF
Business Conduct Guidelines (BCG) Certificate.pdf
Kresimir Popovic
 
PDF
udemy - oauth2 and openid crash course.pdf
Kresimir Popovic
 
PDF
Udemy-Starting with Quarkus - March 2022.pdf
Kresimir Popovic
 
PDF
Kubernetes_DeepDive_02-2022.pdf
Kresimir Popovic
 
PDF
NGINX Server Deep Dive March 2002.pdf
Kresimir Popovic
 
PDF
dockerquickstartlegacy-190215093445.pdf
Kresimir Popovic
 
PDF
Remote Communication across cultures - Session.pdf
Kresimir Popovic
 
PDF
Atos Financial Management Training.pdf
Kresimir Popovic
 
PDF
Stepping out of your comfort zone - Videocast Faculty.pdf
Kresimir Popovic
 
PDF
Conquering the Challenges of Public Speaking.pdf
Kresimir Popovic
 
PDF
Capturing and keeping your audience’s attention - Session.pdf
Kresimir Popovic
 
PDF
Security and Safety awareness.pdf
Kresimir Popovic
 
Amazon_AWS_IAM_2023_Cert.pdf
Kresimir Popovic
 
Zero_Harm_Culture_@_IC_for_Employees.pdf
Kresimir Popovic
 
Functional Programming Principles - 03.06.2013.pdf
Kresimir Popovic
 
Open_Source_Software_Basics.pdf
Kresimir Popovic
 
Open_Source_Software_Overview.pdf
Kresimir Popovic
 
Global Bribery and Corruption Certificate.pdf
Kresimir Popovic
 
Siemens Compliance (SIECO).pdf
Kresimir Popovic
 
Global Competition Certificate.pdf
Kresimir Popovic
 
Business Conduct Guidelines (BCG) Certificate.pdf
Kresimir Popovic
 
udemy - oauth2 and openid crash course.pdf
Kresimir Popovic
 
Udemy-Starting with Quarkus - March 2022.pdf
Kresimir Popovic
 
Kubernetes_DeepDive_02-2022.pdf
Kresimir Popovic
 
NGINX Server Deep Dive March 2002.pdf
Kresimir Popovic
 
dockerquickstartlegacy-190215093445.pdf
Kresimir Popovic
 
Remote Communication across cultures - Session.pdf
Kresimir Popovic
 
Atos Financial Management Training.pdf
Kresimir Popovic
 
Stepping out of your comfort zone - Videocast Faculty.pdf
Kresimir Popovic
 
Conquering the Challenges of Public Speaking.pdf
Kresimir Popovic
 
Capturing and keeping your audience’s attention - Session.pdf
Kresimir Popovic
 
Security and Safety awareness.pdf
Kresimir Popovic
 
Ad

Recently uploaded (20)

PDF
Enhancing Security in VAST: Towards Static Vulnerability Scanning
ESUG
 
PDF
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
PDF
Salesforce Pricing Update 2025: Impact, Strategy & Smart Cost Optimization wi...
GetOnCRM Solutions
 
PDF
What companies do with Pharo (ESUG 2025)
ESUG
 
PDF
Step-by-Step Guide to Install SAP HANA Studio | Complete Installation Tutoria...
SAP Vista, an A L T Z E N Company
 
PDF
Troubleshooting Virtual Threads in Java!
Tier1 app
 
PDF
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
PDF
SAP GUI Installation Guide for Windows | Step-by-Step Setup for SAP Access
SAP Vista, an A L T Z E N Company
 
PDF
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
PPT
Activate_Methodology_Summary presentatio
annapureddyn
 
PPTX
Presentation about Database and Database Administrator
abhishekchauhan86963
 
PPTX
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
PDF
Virtual Threads in Java: A New Dimension of Scalability and Performance
Tier1 app
 
PPT
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
PDF
Protecting the Digital World Cyber Securit
dnthakkar16
 
PDF
SAP GUI Installation Guide for macOS (iOS) | Connect to SAP Systems on Mac
SAP Vista, an A L T Z E N Company
 
PPTX
Employee salary prediction using Machine learning Project template.ppt
bhanuk27082004
 
PDF
Supabase Meetup: Build in a weekend, scale to millions
Carlo Gilmar Padilla Santana
 
PDF
AWS_Agentic_AI_in_Indian_BFSI_A_Strategic_Blueprint_for_Customer.pdf
siddharthnetsavvies
 
PDF
How Agentic AI Networks are Revolutionizing Collaborative AI Ecosystems in 2025
ronakdubey419
 
Enhancing Security in VAST: Towards Static Vulnerability Scanning
ESUG
 
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
Salesforce Pricing Update 2025: Impact, Strategy & Smart Cost Optimization wi...
GetOnCRM Solutions
 
What companies do with Pharo (ESUG 2025)
ESUG
 
Step-by-Step Guide to Install SAP HANA Studio | Complete Installation Tutoria...
SAP Vista, an A L T Z E N Company
 
Troubleshooting Virtual Threads in Java!
Tier1 app
 
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
SAP GUI Installation Guide for Windows | Step-by-Step Setup for SAP Access
SAP Vista, an A L T Z E N Company
 
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
Activate_Methodology_Summary presentatio
annapureddyn
 
Presentation about Database and Database Administrator
abhishekchauhan86963
 
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
Virtual Threads in Java: A New Dimension of Scalability and Performance
Tier1 app
 
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
Protecting the Digital World Cyber Securit
dnthakkar16
 
SAP GUI Installation Guide for macOS (iOS) | Connect to SAP Systems on Mac
SAP Vista, an A L T Z E N Company
 
Employee salary prediction using Machine learning Project template.ppt
bhanuk27082004
 
Supabase Meetup: Build in a weekend, scale to millions
Carlo Gilmar Padilla Santana
 
AWS_Agentic_AI_in_Indian_BFSI_A_Strategic_Blueprint_for_Customer.pdf
siddharthnetsavvies
 
How Agentic AI Networks are Revolutionizing Collaborative AI Ecosystems in 2025
ronakdubey419
 
Ad

SECURE- Throughout the day - Part 3.pdf

  • 1. Certificate SECURE: throughout the day - Episode III Siemens Information Technology and the Chief Information Security Officer attest that Kresimir Popovic (Z001NVMP) has successfully completed the Security Online Training "SECURE: throughout the day Episode III" on Jun 2, 2014. Training Content This training program focuses on an on-going and dangerous form of cyber-attack, called Advanced Persistent Threats (APT). The web-based training shows how these attacks work and which patterns they follow. Furthermore, handling rules are given to help minimize the risk of a successful APT within our company. A second key point of the training is the secure usage of Social Media and how to protect against Social Engineering - both commonly used by potential attackers in order to gain information on their potential target. Additionally there is a concise characterization of the protection classes and the related handling requirements. Munich, Jun 2, 2014 This is an automatically generated document and therefore valid without signature. Siegfried Russwurm Member of the Managing Board Responsible for IT intranet.siemens.com/csts