SECURE- Throughout the day - Part 1.pdf

Kresimir Popovic
Kresimir PopovicSenior Software Engineer à ENEA

SECURE- Throughout the day - Part 1

Certificate
SECURE: throughout the day
Siemens Information Technology and
the Chief Information Security Officer attest that
Kresimir Popovic
(Z001NVMP)
has successfully completed the Security Online Training
"SECURE: throughout the day" on Jun 2, 2014.
Training Content
The web-based training (WBT) accompanies a Siemens employee through his/her day and in different
day-to-day situations. These could be within the Siemens workplace or outside. The importance of Information
and Corporate Security is shown, as is the importance of actively practicing good security habits and being
responsible in these situations. The employee, together with the protagonist of the WBT, actively participates in
solving the security challenges and sees how he/she can directly improve the security level at Siemens and
support our business.
Munich, Jun 2, 2014
This is an automatically generated document and therefore valid without signature.
Siegfried Russwurm
Member of the Managing Board
Responsible for IT
intranet.siemens.com/csts

Recommandé

SECURE- Throughout the day - Part 2.pdf par
SECURE- Throughout the day - Part 2.pdfSECURE- Throughout the day - Part 2.pdf
SECURE- Throughout the day - Part 2.pdfKresimir Popovic
7 vues1 diapositive
Certificate_Secure_Through_The_Day_02 par
Certificate_Secure_Through_The_Day_02Certificate_Secure_Through_The_Day_02
Certificate_Secure_Through_The_Day_02Patrick Thorpe
12 vues1 diapositive
Certificate par
CertificateCertificate
CertificateShailendra Rawat
175 vues1 diapositive
SECURE- Throughout the day - Part 3.pdf par
SECURE- Throughout the day - Part 3.pdfSECURE- Throughout the day - Part 3.pdf
SECURE- Throughout the day - Part 3.pdfKresimir Popovic
8 vues1 diapositive
Certificate - Protection against Social Engineering.pdf par
Certificate - Protection against Social Engineering.pdfCertificate - Protection against Social Engineering.pdf
Certificate - Protection against Social Engineering.pdfKresimir Popovic
4 vues1 diapositive
Certificate PASE par
Certificate PASECertificate PASE
Certificate PASEDavid Leonel Santa Cruz Alfaro
30 vues1 diapositive

Contenu connexe

Similaire à SECURE- Throughout the day - Part 1.pdf

Siemens Compliance (SIECO).pdf par
Siemens Compliance (SIECO).pdfSiemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdfKresimir Popovic
20 vues1 diapositive
End User Security Awareness Presentation par
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
40.3K vues25 diapositives
IT Security - Guidelines par
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
2.1K vues49 diapositives
cyber-security-brochure par
cyber-security-brochurecyber-security-brochure
cyber-security-brochureNick Serafimov
344 vues17 diapositives
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni... par
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Avantika University
312 vues11 diapositives
The Importance of Consolidating Your Infrastructure Security – by United Secu... par
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...United Security Providers AG
389 vues16 diapositives

Similaire à SECURE- Throughout the day - Part 1.pdf(20)

End User Security Awareness Presentation par Cristian Mihai
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai40.3K vues
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni... par Avantika University
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Module 1 / Unit 5 Digital Cybersecurity par SMKCreations
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
SMKCreations57 vues
CYBERSECURITY TRACK.pptx par levimax2
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
levimax24 vues
Information Security Governance at Board and Executive Level par Koen Maris
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
Koen Maris1.1K vues
Developing A Quality Product Within Budget And On Time par Ashley Davis
Developing A Quality Product Within Budget And On TimeDeveloping A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On Time
Ashley Davis3 vues
Get Employees Invested In CyberSecurity par Scott Maurice
Get Employees Invested In CyberSecurity Get Employees Invested In CyberSecurity
Get Employees Invested In CyberSecurity
Scott Maurice 33 vues
EB - Five Forces That Drive a Successful Managed Security Services Offering -... par ssuser2d55aa
EB - Five Forces That Drive a Successful Managed Security Services Offering -...EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
ssuser2d55aa6 vues
Csmp overview may 14 par Jock ANDRE
Csmp overview may 14Csmp overview may 14
Csmp overview may 14
Jock ANDRE678 vues
Managed Security: How Secure Are You During COVID? par The TNS Group
Managed Security: How Secure Are You During COVID? Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID?
The TNS Group93 vues
A Two (2) Day Security powerpoint par nwokoji henry
A  Two (2) Day Security powerpointA  Two (2) Day Security powerpoint
A Two (2) Day Security powerpoint
nwokoji henry83 vues

Plus de Kresimir Popovic

Amazon_AWS_IAM_2023_Cert.pdf par
Amazon_AWS_IAM_2023_Cert.pdfAmazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdfKresimir Popovic
6 vues1 diapositive
Functional Programming Principles - 03.06.2013.pdf par
Functional Programming Principles - 03.06.2013.pdfFunctional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdfKresimir Popovic
15 vues1 diapositive
Open_Source_Software_Basics.pdf par
Open_Source_Software_Basics.pdfOpen_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdfKresimir Popovic
3 vues1 diapositive
Open_Source_Software_Overview.pdf par
Open_Source_Software_Overview.pdfOpen_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdfKresimir Popovic
3 vues1 diapositive
Global Bribery and Corruption Certificate.pdf par
Global Bribery and Corruption Certificate.pdfGlobal Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdfKresimir Popovic
3 vues1 diapositive
Global Competition Certificate.pdf par
Global Competition Certificate.pdfGlobal Competition Certificate.pdf
Global Competition Certificate.pdfKresimir Popovic
4 vues1 diapositive

Plus de Kresimir Popovic(20)

Functional Programming Principles - 03.06.2013.pdf par Kresimir Popovic
Functional Programming Principles - 03.06.2013.pdfFunctional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdf
Udemy-Starting with Quarkus - March 2022.pdf par Kresimir Popovic
Udemy-Starting with Quarkus - March 2022.pdfUdemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdf
Remote Communication across cultures - Session.pdf par Kresimir Popovic
Remote Communication across cultures - Session.pdfRemote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdf
Stepping out of your comfort zone - Videocast Faculty.pdf par Kresimir Popovic
Stepping out of your comfort zone - Videocast Faculty.pdfStepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdf
Conquering the Challenges of Public Speaking.pdf par Kresimir Popovic
Conquering the Challenges of Public Speaking.pdfConquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdf
Capturing and keeping your audience’s attention - Session.pdf par Kresimir Popovic
Capturing and keeping your audience’s attention - Session.pdfCapturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdf

Dernier

Keep par
KeepKeep
KeepGeniusee
78 vues10 diapositives
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P... par
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...NimaTorabi2
15 vues17 diapositives
Myths and Facts About Hospice Care: Busting Common Misconceptions par
Myths and Facts About Hospice Care: Busting Common MisconceptionsMyths and Facts About Hospice Care: Busting Common Misconceptions
Myths and Facts About Hospice Care: Busting Common MisconceptionsCare Coordinations
7 vues1 diapositive
Fleet Management Software in India par
Fleet Management Software in India Fleet Management Software in India
Fleet Management Software in India Fleetable
12 vues1 diapositive
Understanding HTML terminology par
Understanding HTML terminologyUnderstanding HTML terminology
Understanding HTML terminologyartembondar5
6 vues8 diapositives
How Workforce Management Software Empowers SMEs | TraQSuite par
How Workforce Management Software Empowers SMEs | TraQSuiteHow Workforce Management Software Empowers SMEs | TraQSuite
How Workforce Management Software Empowers SMEs | TraQSuiteTraQSuite
5 vues3 diapositives

Dernier(20)

Unlocking the Power of AI in Product Management - A Comprehensive Guide for P... par NimaTorabi2
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...
NimaTorabi215 vues
Myths and Facts About Hospice Care: Busting Common Misconceptions par Care Coordinations
Myths and Facts About Hospice Care: Busting Common MisconceptionsMyths and Facts About Hospice Care: Busting Common Misconceptions
Myths and Facts About Hospice Care: Busting Common Misconceptions
Fleet Management Software in India par Fleetable
Fleet Management Software in India Fleet Management Software in India
Fleet Management Software in India
Fleetable12 vues
How Workforce Management Software Empowers SMEs | TraQSuite par TraQSuite
How Workforce Management Software Empowers SMEs | TraQSuiteHow Workforce Management Software Empowers SMEs | TraQSuite
How Workforce Management Software Empowers SMEs | TraQSuite
TraQSuite5 vues
Generic or specific? Making sensible software design decisions par Bert Jan Schrijver
Generic or specific? Making sensible software design decisionsGeneric or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisions
FIMA 2023 Neo4j & FS - Entity Resolution.pptx par Neo4j
FIMA 2023 Neo4j & FS - Entity Resolution.pptxFIMA 2023 Neo4j & FS - Entity Resolution.pptx
FIMA 2023 Neo4j & FS - Entity Resolution.pptx
Neo4j17 vues
360 graden fabriek par info33492
360 graden fabriek360 graden fabriek
360 graden fabriek
info33492143 vues
JioEngage_Presentation.pptx par admin125455
JioEngage_Presentation.pptxJioEngage_Presentation.pptx
JioEngage_Presentation.pptx
admin1254556 vues
predicting-m3-devopsconMunich-2023-v2.pptx par Tier1 app
predicting-m3-devopsconMunich-2023-v2.pptxpredicting-m3-devopsconMunich-2023-v2.pptx
predicting-m3-devopsconMunich-2023-v2.pptx
Tier1 app9 vues

SECURE- Throughout the day - Part 1.pdf

  • 1. Certificate SECURE: throughout the day Siemens Information Technology and the Chief Information Security Officer attest that Kresimir Popovic (Z001NVMP) has successfully completed the Security Online Training "SECURE: throughout the day" on Jun 2, 2014. Training Content The web-based training (WBT) accompanies a Siemens employee through his/her day and in different day-to-day situations. These could be within the Siemens workplace or outside. The importance of Information and Corporate Security is shown, as is the importance of actively practicing good security habits and being responsible in these situations. The employee, together with the protagonist of the WBT, actively participates in solving the security challenges and sees how he/she can directly improve the security level at Siemens and support our business. Munich, Jun 2, 2014 This is an automatically generated document and therefore valid without signature. Siegfried Russwurm Member of the Managing Board Responsible for IT intranet.siemens.com/csts