SlideShare une entreprise Scribd logo
1  sur  23
Privacy and Protection of Online Identity in
the New Internet Age.
Where there will be more devices connected than people.
Victor Ndonnang
Internet Governance Specialist
Secretary General
Internet Society Cameroon Chapter CTO Cybersecurity Forum 2013
25 – 26 April 2013 Yaounde, Cameroon
About The Internet Society
•The Internet Society is an international cause-
related organization that works for the open
development and evolution of the Internet for all
people.
The Internet is for everyone…
and the Internet Society is for everyone who
cares about the Internet!
•Vision: “The Internet is for Everyone.”
•Founded in 1992 by Internet Pioneers, as an international non-
profit organization
•100+ organization members
•tens of thousands of individual members
•90+ chapters worldwide
•Regional Bureaus: Africa, Europe, Latin America &
Caribbean, North America, South & South East Asia
Who are we?
The Internet Society’s principles
•We see a future in which people everywhere can
use the Internet to improve quality of life:
…when standards, technologies, business practices,
and government policies sustain an open and
universally accessible platform for innovation,
creativity, and economic opportunity.
What makes the Internet Society unique?
•Sole focus is the Internet
•Development, Standards, Policy
•Enable regional capacity and technical
community building throughout the world
•Key player in Internet policy
•Particularly in the Internet Governance Forum
(IGF) and other intergovernmental forums
•Organisational home of the Internet Engineering
Task Force (IETF), Internet Architecture Board
(IAB), and related bodies
A focus on action – some key priorities
•Global outreach
•a worldwide community of experience and
expertise
•Advancing the health of the Internet
•IPv6 deployment, Open internetworking,
DNSSEC
•Next generation of Internet leaders
•advancing tomorrow’s leaders
•Network confidence
•supporting development of user trust
About Internet Society Cameroon Chapter (1)
•incorporated under the laws of Cameroon as an
independent nonprofit organization;
•works for the development, use and open access to
the Internet in Cameroon;
•promote, in a global context, the open
development, evolution and use of the Internet for
the benefit of everyone in Cameroon;
•provides a multistakeholder forum for the exchange
of views and experiences on Internet open
development and use in Cameroon;
•Promotes development of local Internet content;
•promotes best practices on the Internet, security,
protection of privacy, protection of Human Rights,
the fight against cybercrime.
•More on www.internetsociety.cm
About Internet Society Cameroon Chapter (2)
•Voluntary groups of ISOC members, working together
on local issues, with the backing of a global
community
•Successful Chapters create an open, inclusive
environment and bring together people from all
backgrounds:
•technical
•civil society
•law and policy
•education
•business
•Developing solutions to local challenges
What the new Internet Age?
•More Top Level Domain Names with the
NewgTLDs Program
Before 2000, there were only:
•4% of the world connected to the Internet with
2% in the USA
•3 millions web sites;
•7 Generic Top Level Domain (gTLDs like .com,
.net, .org, .edu, .mil…)
Today:
•35% of the world is connected to the Internet;
•635 millions of web sites;
•1905 new gTLDs applications.
What the new Internet Age?
•Everything connected with IPv6
•Some there will be more devices connected than
people in the planet (your car, your medical
device, your home, appliances, …)
We feel lost and unsafe on this new environment
and there is a need to secure.
There is an interesting video on this issue available
on ICANN web site:
https://www.myicann.org/join-strategy-
conversation?language=en
Our privacy in the new Internet Age
Does the Internet makes our lives more private or less?
The Internet and the WWW since the inception were to build
a global community of information sharing. Any party can
share information with another party.
Most of those shared information is about us, the users.
Some of those information can be misused.
If an information is really private, don’t put online; if you put it
online, encrypt it and send decryption only to the authorized
person.
How about your privacy when It comes
to Internet resources?
Some information about us are collected during the
registration of a domain name.
•Registration Data
•WHOIS
Those information can be misused.
Understanding and protecting your
online Identity
•Your online identity is about what you have being
doing online.
•Your identity has value, as do each of your online
partial identities. When your partial identity is with
your bank or a brokerage house, for example, it
may have clear monetary value. When it is with a
social networking site, such as Facebook, twitter,
badoo, or MySpace, the value may be less tangible
but equally important to you.
•Simply by being an active Internet user, you may
find that you accumulate tens or even hundreds of
online partial identifies.
Understanding and protecting your
online Identity
•Identity theft, which results in a loss of control over
one or more of your partial identities, is a natural
concern;
•as the value of your partial identities grows, the
information becomes more attractive to thieves. At
the same time, because each of your online partial
identities contains some information that may be
very private, generally protecting yourself from a
loss of privacy is often equally important.
How can identity theft occur?
Identity theft can happen in several ways. The three
types described here are common and happen
every day:
•You are deceived into disclosing important
personal information to the wrong person;
•Someone (or some entity) is able to guess one or
more of your passwords, or reset a password by
exploiting password-recovery procedures, thereby
unlocking your online identity
•Someone (or some entity) is able to eavesdrop on
you electronically or take control of your computer
without your knowing.
How can I learn to avoid giving the
wrong person my identity?
•A little education and some common sense are the
most important tools you have to avoid divulging
sensitive personal information to individuals or entities
that plan to exploit it. The U.S. Federal Trade
Commissionis a good place to start, even if you don’t
live in the United States. The website at
http://www.ftc.gov/idtheft contains useful information
in English and Spanish aimed at educating
consumers about avoiding identity theft.
•There are also some technologies that can help. For
example, newer versions of most Web browsers have
the ability to check websites and alert you to ones that
are known to be malicious. The Online Trust Alliance
(https://otalliance.org/) has a resource list to help you
learn more about the technologies that can help
protect your identity on the Internet.
How can I keep someone from stealing my
password?
•Use long password. If a password is easy to guess,
then it is easy to steal;
•avoid using the same password for multiple
websites, so if one website is compromised, your
stolen credentials can’t be used at other sites;
How can I keep someone from resetting my
password?
•Password resets are meant to help you when
you’ve lost a password (or have been locked out);
•Every website has a slightly different technique for
resetting a password, but the general idea is that
you ask for your password to be reset, often by
answering some personal “security” questions you
have previously answered;
•avoid using simple questions and answers. The
way, even someone who knows a lot about you will
have trouble answering the questions.
More on: http://www.internetsociety.org/what-we-
do/internet-technology-matters/privacy-identity
Internet is an extraordinary force for
good
•ISOC believes that the Internet is fundamentally
about opportunity, empowerment, knowledge and
freedom.
•The success of the Internet as a global medium for
communication and innovation is derived from the
openness and transparency of the Internet's
technical and policy development.
•Training and awareness are key to make the
Internet safe for users.
The challenge for an emerging Internet community
•The Internet itself is still in its infancy
•There are issues that can’t be ignored, such as
security, safety, privacy, crime…
•But the benefits of the Internet vastly outweigh the
risks and are only possible by embracing the open
nature of the Internet; preserving the users’ ability
to:
•connect
•communicate
•innovate
•share
•choose
Securing the DNS: Internet Society Deploy360 Programme
•The Challenge:
•The IETF creates protocols based on open standards, but
some are not widely known or deployed
•People seeking to implement these protocols are
confused by a lack of clear, concise deployment
information
The Deploy360 Solution:
•Provide hands-on information on IPv6 and DNSSEC to
advance real-world deployment
•Work with first adopters to collect and create technical
resources and distribute these resources to fast following
networks
Deploy360 Components
Web Portal
(Online Knowledge
Repository)
• Technical documents
• Audience-specific
information
• Blogs & social media
Social Media
(Constant Audience
Engagement)
• Twitter
• Facebook
• Google+
• YouTube
• RSS Feeds
Speaking
Engagements
(Come Meet Us or Invite Us to
Speak)
• Consumer Electronics
Show
• IPv6 Summits
• Interop
ION Conferences
(Hands-on Educational
Events)
• Slovenia
• India
• USA
• Canada
• Argentina
Thank you!
Questions?
More Info:
www.InternetSociety.org
http://www.internetsociety.org/what-we-do/internet-technology-
matters/privacy-identity
http://www.internetsociety.org/deploy360/
www.InternetSociety.cm
ndonnang@internetsociety.cm

Contenu connexe

Tendances

What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about securityAIPMM Administration
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyCTIC Technology Centre
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
New literacies, new challenges
New literacies, new challengesNew literacies, new challenges
New literacies, new challengesmadaboutelt
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent Mwando
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
Keynote presentation for Conference: Vounteering in a Digital Age
Keynote presentation for Conference: Vounteering in a Digital Age Keynote presentation for Conference: Vounteering in a Digital Age
Keynote presentation for Conference: Vounteering in a Digital Age Sangeet Bhullar
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationStephen Cobb
 

Tendances (20)

What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about security
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
ISACA UW Handbook 2016
ISACA UW Handbook 2016ISACA UW Handbook 2016
ISACA UW Handbook 2016
 
Elet5e ch09
Elet5e ch09Elet5e ch09
Elet5e ch09
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
New literacies, new challenges
New literacies, new challengesNew literacies, new challenges
New literacies, new challenges
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - Encryption
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
 
Social media risk
Social media riskSocial media risk
Social media risk
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
Keynote presentation for Conference: Vounteering in a Digital Age
Keynote presentation for Conference: Vounteering in a Digital Age Keynote presentation for Conference: Vounteering in a Digital Age
Keynote presentation for Conference: Vounteering in a Digital Age
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 

En vedette

John Sannizzaro & John Kelly GCC 2016
John Sannizzaro & John Kelly GCC 2016John Sannizzaro & John Kelly GCC 2016
John Sannizzaro & John Kelly GCC 2016GWT
 
Збірник диктантів
Збірник диктантів Збірник диктантів
Збірник диктантів Marina Efremova
 
Sharing Your Treasure By: Josie Walker
Sharing Your Treasure By: Josie Walker Sharing Your Treasure By: Josie Walker
Sharing Your Treasure By: Josie Walker josiewalker33
 
Calles deEncinasola (2)
Calles deEncinasola (2)Calles deEncinasola (2)
Calles deEncinasola (2)JOSE DOMINGUEZ
 
тиждень психолог. знань
тиждень психолог. знаньтиждень психолог. знань
тиждень психолог. знаньPolinaMokrushina
 
Customer Sharing: 17 Media - Scale to 12,000,000 Users with AWS
Customer Sharing: 17 Media - Scale to 12,000,000 Users with AWSCustomer Sharing: 17 Media - Scale to 12,000,000 Users with AWS
Customer Sharing: 17 Media - Scale to 12,000,000 Users with AWSAmazon Web Services
 
Cervantes, juventud y las tic’s
Cervantes, juventud y las tic’sCervantes, juventud y las tic’s
Cervantes, juventud y las tic’smaravillas1
 
Presentación power point.
Presentación power point.Presentación power point.
Presentación power point.melendezoralia7
 
Ppt PERAN PENTING SURFAKTAN FIRMAN AHYUDA
Ppt PERAN PENTING SURFAKTAN  FIRMAN AHYUDAPpt PERAN PENTING SURFAKTAN  FIRMAN AHYUDA
Ppt PERAN PENTING SURFAKTAN FIRMAN AHYUDAfirmanahyuda
 
Toan 1 bai 3 giới hạn hàm số bookbooming
Toan 1 bai 3 giới hạn hàm số   bookboomingToan 1 bai 3 giới hạn hàm số   bookbooming
Toan 1 bai 3 giới hạn hàm số bookboomingbookbooming
 
Loan Modification – Workout Plans and Modification
Loan Modification – Workout Plans and ModificationLoan Modification – Workout Plans and Modification
Loan Modification – Workout Plans and ModificationKaufman & Canoles
 
Amante liberal. presentación
Amante liberal. presentaciónAmante liberal. presentación
Amante liberal. presentaciónmaravillas1
 
PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...
PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...
PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...firmanahyuda
 
2016 Yahoo Taiwan Mobile Developer Conference
2016 Yahoo Taiwan Mobile Developer Conference 2016 Yahoo Taiwan Mobile Developer Conference
2016 Yahoo Taiwan Mobile Developer Conference Flurry, Inc.
 
Rinconete y cortadillo cuento 419
Rinconete y cortadillo cuento 419Rinconete y cortadillo cuento 419
Rinconete y cortadillo cuento 419maravillas1
 
Mobile applications
Mobile applicationsMobile applications
Mobile applicationsShweta Jain
 

En vedette (20)

John Sannizzaro & John Kelly GCC 2016
John Sannizzaro & John Kelly GCC 2016John Sannizzaro & John Kelly GCC 2016
John Sannizzaro & John Kelly GCC 2016
 
Збірник диктантів
Збірник диктантів Збірник диктантів
Збірник диктантів
 
Sharing Your Treasure By: Josie Walker
Sharing Your Treasure By: Josie Walker Sharing Your Treasure By: Josie Walker
Sharing Your Treasure By: Josie Walker
 
Calles deEncinasola (2)
Calles deEncinasola (2)Calles deEncinasola (2)
Calles deEncinasola (2)
 
тиждень психолог. знань
тиждень психолог. знаньтиждень психолог. знань
тиждень психолог. знань
 
Eugene Lebele HR4 ICT
Eugene Lebele HR4 ICTEugene Lebele HR4 ICT
Eugene Lebele HR4 ICT
 
Customer Sharing: 17 Media - Scale to 12,000,000 Users with AWS
Customer Sharing: 17 Media - Scale to 12,000,000 Users with AWSCustomer Sharing: 17 Media - Scale to 12,000,000 Users with AWS
Customer Sharing: 17 Media - Scale to 12,000,000 Users with AWS
 
data baru
data barudata baru
data baru
 
National Cyber Security Policy 2013
National Cyber Security Policy 2013National Cyber Security Policy 2013
National Cyber Security Policy 2013
 
Cervantes, juventud y las tic’s
Cervantes, juventud y las tic’sCervantes, juventud y las tic’s
Cervantes, juventud y las tic’s
 
Presentación power point.
Presentación power point.Presentación power point.
Presentación power point.
 
Ppt PERAN PENTING SURFAKTAN FIRMAN AHYUDA
Ppt PERAN PENTING SURFAKTAN  FIRMAN AHYUDAPpt PERAN PENTING SURFAKTAN  FIRMAN AHYUDA
Ppt PERAN PENTING SURFAKTAN FIRMAN AHYUDA
 
Toan 1 bai 3 giới hạn hàm số bookbooming
Toan 1 bai 3 giới hạn hàm số   bookboomingToan 1 bai 3 giới hạn hàm số   bookbooming
Toan 1 bai 3 giới hạn hàm số bookbooming
 
Loan Modification – Workout Plans and Modification
Loan Modification – Workout Plans and ModificationLoan Modification – Workout Plans and Modification
Loan Modification – Workout Plans and Modification
 
Presentacion
PresentacionPresentacion
Presentacion
 
Amante liberal. presentación
Amante liberal. presentaciónAmante liberal. presentación
Amante liberal. presentación
 
PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...
PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...
PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...
 
2016 Yahoo Taiwan Mobile Developer Conference
2016 Yahoo Taiwan Mobile Developer Conference 2016 Yahoo Taiwan Mobile Developer Conference
2016 Yahoo Taiwan Mobile Developer Conference
 
Rinconete y cortadillo cuento 419
Rinconete y cortadillo cuento 419Rinconete y cortadillo cuento 419
Rinconete y cortadillo cuento 419
 
Mobile applications
Mobile applicationsMobile applications
Mobile applications
 

Similaire à Privacy and Protection of Online Identity in the New Internet Age CTO Cybersecurity Forum 2013 Victor-Ndonnang_CTO Cybersecurity Forum 2013

Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Kayode Yussuf
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxTriveni Prabaakar
 
Digital literacy
Digital literacyDigital literacy
Digital literacyLuísa Lima
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxJoshuaCasas7
 

Similaire à Privacy and Protection of Online Identity in the New Internet Age CTO Cybersecurity Forum 2013 Victor-Ndonnang_CTO Cybersecurity Forum 2013 (20)

Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
E commerce
E commerce E commerce
E commerce
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptx
 

Plus de Commonwealth Telecommunications Organisation

Plus de Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Privacy and Protection of Online Identity in the New Internet Age CTO Cybersecurity Forum 2013 Victor-Ndonnang_CTO Cybersecurity Forum 2013

  • 1. Privacy and Protection of Online Identity in the New Internet Age. Where there will be more devices connected than people. Victor Ndonnang Internet Governance Specialist Secretary General Internet Society Cameroon Chapter CTO Cybersecurity Forum 2013 25 – 26 April 2013 Yaounde, Cameroon
  • 2. About The Internet Society •The Internet Society is an international cause- related organization that works for the open development and evolution of the Internet for all people. The Internet is for everyone… and the Internet Society is for everyone who cares about the Internet! •Vision: “The Internet is for Everyone.”
  • 3. •Founded in 1992 by Internet Pioneers, as an international non- profit organization •100+ organization members •tens of thousands of individual members •90+ chapters worldwide •Regional Bureaus: Africa, Europe, Latin America & Caribbean, North America, South & South East Asia Who are we?
  • 4. The Internet Society’s principles •We see a future in which people everywhere can use the Internet to improve quality of life: …when standards, technologies, business practices, and government policies sustain an open and universally accessible platform for innovation, creativity, and economic opportunity.
  • 5. What makes the Internet Society unique? •Sole focus is the Internet •Development, Standards, Policy •Enable regional capacity and technical community building throughout the world •Key player in Internet policy •Particularly in the Internet Governance Forum (IGF) and other intergovernmental forums •Organisational home of the Internet Engineering Task Force (IETF), Internet Architecture Board (IAB), and related bodies
  • 6. A focus on action – some key priorities •Global outreach •a worldwide community of experience and expertise •Advancing the health of the Internet •IPv6 deployment, Open internetworking, DNSSEC •Next generation of Internet leaders •advancing tomorrow’s leaders •Network confidence •supporting development of user trust
  • 7. About Internet Society Cameroon Chapter (1) •incorporated under the laws of Cameroon as an independent nonprofit organization; •works for the development, use and open access to the Internet in Cameroon; •promote, in a global context, the open development, evolution and use of the Internet for the benefit of everyone in Cameroon; •provides a multistakeholder forum for the exchange of views and experiences on Internet open development and use in Cameroon; •Promotes development of local Internet content; •promotes best practices on the Internet, security, protection of privacy, protection of Human Rights, the fight against cybercrime. •More on www.internetsociety.cm
  • 8. About Internet Society Cameroon Chapter (2) •Voluntary groups of ISOC members, working together on local issues, with the backing of a global community •Successful Chapters create an open, inclusive environment and bring together people from all backgrounds: •technical •civil society •law and policy •education •business •Developing solutions to local challenges
  • 9. What the new Internet Age? •More Top Level Domain Names with the NewgTLDs Program Before 2000, there were only: •4% of the world connected to the Internet with 2% in the USA •3 millions web sites; •7 Generic Top Level Domain (gTLDs like .com, .net, .org, .edu, .mil…) Today: •35% of the world is connected to the Internet; •635 millions of web sites; •1905 new gTLDs applications.
  • 10. What the new Internet Age? •Everything connected with IPv6 •Some there will be more devices connected than people in the planet (your car, your medical device, your home, appliances, …) We feel lost and unsafe on this new environment and there is a need to secure. There is an interesting video on this issue available on ICANN web site: https://www.myicann.org/join-strategy- conversation?language=en
  • 11. Our privacy in the new Internet Age Does the Internet makes our lives more private or less? The Internet and the WWW since the inception were to build a global community of information sharing. Any party can share information with another party. Most of those shared information is about us, the users. Some of those information can be misused. If an information is really private, don’t put online; if you put it online, encrypt it and send decryption only to the authorized person.
  • 12. How about your privacy when It comes to Internet resources? Some information about us are collected during the registration of a domain name. •Registration Data •WHOIS Those information can be misused.
  • 13. Understanding and protecting your online Identity •Your online identity is about what you have being doing online. •Your identity has value, as do each of your online partial identities. When your partial identity is with your bank or a brokerage house, for example, it may have clear monetary value. When it is with a social networking site, such as Facebook, twitter, badoo, or MySpace, the value may be less tangible but equally important to you. •Simply by being an active Internet user, you may find that you accumulate tens or even hundreds of online partial identifies.
  • 14. Understanding and protecting your online Identity •Identity theft, which results in a loss of control over one or more of your partial identities, is a natural concern; •as the value of your partial identities grows, the information becomes more attractive to thieves. At the same time, because each of your online partial identities contains some information that may be very private, generally protecting yourself from a loss of privacy is often equally important.
  • 15. How can identity theft occur? Identity theft can happen in several ways. The three types described here are common and happen every day: •You are deceived into disclosing important personal information to the wrong person; •Someone (or some entity) is able to guess one or more of your passwords, or reset a password by exploiting password-recovery procedures, thereby unlocking your online identity •Someone (or some entity) is able to eavesdrop on you electronically or take control of your computer without your knowing.
  • 16. How can I learn to avoid giving the wrong person my identity? •A little education and some common sense are the most important tools you have to avoid divulging sensitive personal information to individuals or entities that plan to exploit it. The U.S. Federal Trade Commissionis a good place to start, even if you don’t live in the United States. The website at http://www.ftc.gov/idtheft contains useful information in English and Spanish aimed at educating consumers about avoiding identity theft. •There are also some technologies that can help. For example, newer versions of most Web browsers have the ability to check websites and alert you to ones that are known to be malicious. The Online Trust Alliance (https://otalliance.org/) has a resource list to help you learn more about the technologies that can help protect your identity on the Internet.
  • 17. How can I keep someone from stealing my password? •Use long password. If a password is easy to guess, then it is easy to steal; •avoid using the same password for multiple websites, so if one website is compromised, your stolen credentials can’t be used at other sites;
  • 18. How can I keep someone from resetting my password? •Password resets are meant to help you when you’ve lost a password (or have been locked out); •Every website has a slightly different technique for resetting a password, but the general idea is that you ask for your password to be reset, often by answering some personal “security” questions you have previously answered; •avoid using simple questions and answers. The way, even someone who knows a lot about you will have trouble answering the questions. More on: http://www.internetsociety.org/what-we- do/internet-technology-matters/privacy-identity
  • 19. Internet is an extraordinary force for good •ISOC believes that the Internet is fundamentally about opportunity, empowerment, knowledge and freedom. •The success of the Internet as a global medium for communication and innovation is derived from the openness and transparency of the Internet's technical and policy development. •Training and awareness are key to make the Internet safe for users.
  • 20. The challenge for an emerging Internet community •The Internet itself is still in its infancy •There are issues that can’t be ignored, such as security, safety, privacy, crime… •But the benefits of the Internet vastly outweigh the risks and are only possible by embracing the open nature of the Internet; preserving the users’ ability to: •connect •communicate •innovate •share •choose
  • 21. Securing the DNS: Internet Society Deploy360 Programme •The Challenge: •The IETF creates protocols based on open standards, but some are not widely known or deployed •People seeking to implement these protocols are confused by a lack of clear, concise deployment information The Deploy360 Solution: •Provide hands-on information on IPv6 and DNSSEC to advance real-world deployment •Work with first adopters to collect and create technical resources and distribute these resources to fast following networks
  • 22. Deploy360 Components Web Portal (Online Knowledge Repository) • Technical documents • Audience-specific information • Blogs & social media Social Media (Constant Audience Engagement) • Twitter • Facebook • Google+ • YouTube • RSS Feeds Speaking Engagements (Come Meet Us or Invite Us to Speak) • Consumer Electronics Show • IPv6 Summits • Interop ION Conferences (Hands-on Educational Events) • Slovenia • India • USA • Canada • Argentina