SECURE- Throughout the day - Part 2.pdf

Kresimir Popovic
Kresimir PopovicSenior Software Engineer à ENEA

SECURE- Throughout the day - Part 2

Certificate
SECURE: throughout the day - Part 2
Siemens Information Technology and
the Chief Information Security Officer attest that
Kresimir Popovic
(Z001NVMP)
has successfully completed the web-based Security Training
"SECURE: throughout the day - Part 2" on Jun 2, 2014.
Training Content
In the web-based training (WBT), the participant accompanies a Siemens employee through his/her day and
through different day-to-day situations. The employee, together with the protagonist of the WBT, actively
participates in solving security challenges and sees how he/she can directly improve the security level at
Siemens and support our business.
The WBT focuses specifically on the following topics:
- Importance of Information and Corporate Security
- Improving the overall awareness for Information and Corporate Security
- Protection classes for documents and information
- Handling requirements related to the protection classes
- Protection of corporate information when dealing with external business partners
Munich, Jun 2, 2014
This is an automatically generated document and therefore valid without signature.
Siegfried Russwurm
Member of the Managing Board
Responsible for IT
intranet.siemens.com/csts

Recommandé

SECURE- Throughout the day - Part 1.pdf par
SECURE- Throughout the day - Part 1.pdfSECURE- Throughout the day - Part 1.pdf
SECURE- Throughout the day - Part 1.pdfKresimir Popovic
11 vues1 diapositive
Certificate_Secure_Through_The_Day_02 par
Certificate_Secure_Through_The_Day_02Certificate_Secure_Through_The_Day_02
Certificate_Secure_Through_The_Day_02Patrick Thorpe
12 vues1 diapositive
Certificate par
CertificateCertificate
CertificateShailendra Rawat
175 vues1 diapositive
SECURE- Throughout the day - Part 3.pdf par
SECURE- Throughout the day - Part 3.pdfSECURE- Throughout the day - Part 3.pdf
SECURE- Throughout the day - Part 3.pdfKresimir Popovic
8 vues1 diapositive
Certificate PASE par
Certificate PASECertificate PASE
Certificate PASEDavid Leonel Santa Cruz Alfaro
30 vues1 diapositive
Certificate - Protection against Social Engineering.pdf par
Certificate - Protection against Social Engineering.pdfCertificate - Protection against Social Engineering.pdf
Certificate - Protection against Social Engineering.pdfKresimir Popovic
4 vues1 diapositive

Contenu connexe

Similaire à SECURE- Throughout the day - Part 2.pdf

End User Security Awareness Presentation par
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
40.3K vues25 diapositives
Cybersecurity education catalog sae september 2021 par
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021TrustwaveHoldings
1.3K vues15 diapositives
2 Security And Internet Security par
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
1.3K vues26 diapositives
Game based learning for safety and security education par
Game based learning for safety and security educationGame based learning for safety and security education
Game based learning for safety and security educationJournal of Education and Learning (EduLearn)
41 vues9 diapositives
Information Security Governance at Board and Executive Level par
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelKoen Maris
1.1K vues55 diapositives
Brochure network security-en par
Brochure network security-enBrochure network security-en
Brochure network security-ensandeep1721
356 vues32 diapositives

Similaire à SECURE- Throughout the day - Part 2.pdf(20)

End User Security Awareness Presentation par Cristian Mihai
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai40.3K vues
Cybersecurity education catalog sae september 2021 par TrustwaveHoldings
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
TrustwaveHoldings1.3K vues
2 Security And Internet Security par Ana Meskovska
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska1.3K vues
Information Security Governance at Board and Executive Level par Koen Maris
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
Koen Maris1.1K vues
Brochure network security-en par sandeep1721
Brochure network security-enBrochure network security-en
Brochure network security-en
sandeep1721356 vues
Developing A Quality Product Within Budget And On Time par Ashley Davis
Developing A Quality Product Within Budget And On TimeDeveloping A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On Time
Ashley Davis3 vues
CYBERSECURITY TRACK.pptx par levimax2
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
levimax24 vues
Module 1 / Unit 5 Digital Cybersecurity par SMKCreations
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
SMKCreations57 vues
Symantec Government Technology Summit par Carahsoft
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
Carahsoft501 vues
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL par IJCSEIT Journal
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
IJCSEIT Journal34 vues
Symantec government technology summit abstract par Carahsoft
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
Carahsoft379 vues
An Empirical Study on Information Security par ijtsrd
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd80 vues
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga... par IRJET Journal
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
IRJET Journal4 vues
Chapter 6 Security of Information and Cyber Security(FASS) par Md Shaifullar Rabbi
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)

Plus de Kresimir Popovic

Amazon_AWS_IAM_2023_Cert.pdf par
Amazon_AWS_IAM_2023_Cert.pdfAmazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdfKresimir Popovic
6 vues1 diapositive
Functional Programming Principles - 03.06.2013.pdf par
Functional Programming Principles - 03.06.2013.pdfFunctional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdfKresimir Popovic
15 vues1 diapositive
Open_Source_Software_Basics.pdf par
Open_Source_Software_Basics.pdfOpen_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdfKresimir Popovic
3 vues1 diapositive
Open_Source_Software_Overview.pdf par
Open_Source_Software_Overview.pdfOpen_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdfKresimir Popovic
3 vues1 diapositive
Global Bribery and Corruption Certificate.pdf par
Global Bribery and Corruption Certificate.pdfGlobal Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdfKresimir Popovic
3 vues1 diapositive
Siemens Compliance (SIECO).pdf par
Siemens Compliance (SIECO).pdfSiemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdfKresimir Popovic
20 vues1 diapositive

Plus de Kresimir Popovic(20)

Functional Programming Principles - 03.06.2013.pdf par Kresimir Popovic
Functional Programming Principles - 03.06.2013.pdfFunctional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdf
Udemy-Starting with Quarkus - March 2022.pdf par Kresimir Popovic
Udemy-Starting with Quarkus - March 2022.pdfUdemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdf
Remote Communication across cultures - Session.pdf par Kresimir Popovic
Remote Communication across cultures - Session.pdfRemote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdf
Stepping out of your comfort zone - Videocast Faculty.pdf par Kresimir Popovic
Stepping out of your comfort zone - Videocast Faculty.pdfStepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdf
Conquering the Challenges of Public Speaking.pdf par Kresimir Popovic
Conquering the Challenges of Public Speaking.pdfConquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdf
Capturing and keeping your audience’s attention - Session.pdf par Kresimir Popovic
Capturing and keeping your audience’s attention - Session.pdfCapturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdf

Dernier

Ports-and-Adapters Architecture for Embedded HMI par
Ports-and-Adapters Architecture for Embedded HMIPorts-and-Adapters Architecture for Embedded HMI
Ports-and-Adapters Architecture for Embedded HMIBurkhard Stubert
26 vues19 diapositives
Flask-Python.pptx par
Flask-Python.pptxFlask-Python.pptx
Flask-Python.pptxTriloki Gupta
7 vues12 diapositives
What is API par
What is APIWhat is API
What is APIartembondar5
10 vues15 diapositives
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation par
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook AutomationDRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook AutomationHCLSoftware
6 vues8 diapositives
Sprint 226 par
Sprint 226Sprint 226
Sprint 226ManageIQ
10 vues18 diapositives
Copilot Prompting Toolkit_All Resources.pdf par
Copilot Prompting Toolkit_All Resources.pdfCopilot Prompting Toolkit_All Resources.pdf
Copilot Prompting Toolkit_All Resources.pdfRiccardo Zamana
16 vues4 diapositives

Dernier(20)

Ports-and-Adapters Architecture for Embedded HMI par Burkhard Stubert
Ports-and-Adapters Architecture for Embedded HMIPorts-and-Adapters Architecture for Embedded HMI
Ports-and-Adapters Architecture for Embedded HMI
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation par HCLSoftware
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook AutomationDRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation
HCLSoftware6 vues
Copilot Prompting Toolkit_All Resources.pdf par Riccardo Zamana
Copilot Prompting Toolkit_All Resources.pdfCopilot Prompting Toolkit_All Resources.pdf
Copilot Prompting Toolkit_All Resources.pdf
Riccardo Zamana16 vues
How Workforce Management Software Empowers SMEs | TraQSuite par TraQSuite
How Workforce Management Software Empowers SMEs | TraQSuiteHow Workforce Management Software Empowers SMEs | TraQSuite
How Workforce Management Software Empowers SMEs | TraQSuite
TraQSuite5 vues
AI and Ml presentation .pptx par FayazAli87
AI and Ml presentation .pptxAI and Ml presentation .pptx
AI and Ml presentation .pptx
FayazAli8713 vues
FIMA 2023 Neo4j & FS - Entity Resolution.pptx par Neo4j
FIMA 2023 Neo4j & FS - Entity Resolution.pptxFIMA 2023 Neo4j & FS - Entity Resolution.pptx
FIMA 2023 Neo4j & FS - Entity Resolution.pptx
Neo4j17 vues
Generic or specific? Making sensible software design decisions par Bert Jan Schrijver
Generic or specific? Making sensible software design decisionsGeneric or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisions
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports par Ra'Fat Al-Msie'deen
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug ReportsBushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports
Gen Apps on Google Cloud PaLM2 and Codey APIs in Action par Márton Kodok
Gen Apps on Google Cloud PaLM2 and Codey APIs in ActionGen Apps on Google Cloud PaLM2 and Codey APIs in Action
Gen Apps on Google Cloud PaLM2 and Codey APIs in Action
Márton Kodok15 vues
predicting-m3-devopsconMunich-2023.pptx par Tier1 app
predicting-m3-devopsconMunich-2023.pptxpredicting-m3-devopsconMunich-2023.pptx
predicting-m3-devopsconMunich-2023.pptx
Tier1 app7 vues
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx par animuscrm
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
animuscrm15 vues
Dapr Unleashed: Accelerating Microservice Development par Miroslav Janeski
Dapr Unleashed: Accelerating Microservice DevelopmentDapr Unleashed: Accelerating Microservice Development
Dapr Unleashed: Accelerating Microservice Development

SECURE- Throughout the day - Part 2.pdf

  • 1. Certificate SECURE: throughout the day - Part 2 Siemens Information Technology and the Chief Information Security Officer attest that Kresimir Popovic (Z001NVMP) has successfully completed the web-based Security Training "SECURE: throughout the day - Part 2" on Jun 2, 2014. Training Content In the web-based training (WBT), the participant accompanies a Siemens employee through his/her day and through different day-to-day situations. The employee, together with the protagonist of the WBT, actively participates in solving security challenges and sees how he/she can directly improve the security level at Siemens and support our business. The WBT focuses specifically on the following topics: - Importance of Information and Corporate Security - Improving the overall awareness for Information and Corporate Security - Protection classes for documents and information - Handling requirements related to the protection classes - Protection of corporate information when dealing with external business partners Munich, Jun 2, 2014 This is an automatically generated document and therefore valid without signature. Siegfried Russwurm Member of the Managing Board Responsible for IT intranet.siemens.com/csts