SlideShare a Scribd company logo
1 of 15
SafeVisitor

Mike McCarty
CEO
317-745-6946
mike.mccarty@safehiringsolutions.com
www.safehiringsolutions.com
Background









Founder/CEO Safe Hiring Solutions
Co Founder/ CEO eReferenceCheck
Violent Crime Detective Metro Nashville PD
2,800+ clients nationwide
230 Indiana school districts
Provide violence prevention training/ consulting:









U.S. Dept of Justice
U.S. Dept of Defense
U.S. Homeland Security
Federal Law Enforcement Training Center
National Sheriff’s Assoc
Indiana Law Enforcement Training Academy
Numerous State Attorney General Offices
School Safety Grant




Indiana Homeland Security School Safety
Grant
Could be used to pay for hardware and/or first
year setup
SafeVisitor Management System


3 Phases:










SafeVisitor
SafeVendor
SafeVolunteer

Partnering with Rose Hulman University
Ventures
Currently in development
Should have a working system for Fort Wayne
Schools in 2 weeks
SafeVisitor


Scan Gov’t Issued ID
















Personal data
Who visiting

Runs background check:
Against internal exclusion
database (you create)
National Sex & Violent
Offender Database

If a “hit”:


Attendant; or
Kiosk that sends data to
attendant for double check

Logs:






Panic button- sends text to
selected group- i.e. problematic
visitor not a hit
Clear





Auto text/email to selected group
(security, admin)
Alert if visited more than X times

Attendant takes photo (optional)
Prints an expiring name badge

Visitor scans out of building
when done
SafeVendor/SafeVolunteer
SafeVendor







Vendor submits to SHS
comprehensive
background check
Issue ID badge w/ Exp
Vendor scans in and out
of buildings
Attendants can confirm
background check etc

SafeVolunteer


Same process as SafeVendor
Scan Visitor
Info Scanned from Gov’t ID
Results from Background Check
Scan Visitor ID to Logout
Manage Users/ Levels of Access
Manage Bldgs/Locations
Roadmap after Second Phase Complete






Student check in/out
Early dismissal i.e parent sign out for DR appt
Discuss integration with PowerSchool/
Harmony- would be driven by schools using
SafeVisitor
Employee tracking- scan in and out of bldgs
Costs



Web-based so works on current PC’s
Hardware Recommended (plug and play):







Web camera $50-$75 per location/bldg
Scanner $300 per location/bldg
Printer

$500-$900 per month depending on setup
Contact me for custom quote/ demo
Questions?
Mike McCarty
888-215-8296
mike.mccarty@safehiringsolutions.com

More Related Content

What's hot

Threat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsThreat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsBlack Duck by Synopsys
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesBlack Duck by Synopsys
 
The Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data BreachesThe Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data BreachesLightCyber-Inc
 
Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security
Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber SecurityInternal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security
Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber SecurityKen Tulegenov
 
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 VulnerabilityOpen Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 VulnerabilityBlack Duck by Synopsys
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Kevin Duffey
 
Biggest data breaches of 2015
Biggest data breaches of 2015Biggest data breaches of 2015
Biggest data breaches of 2015Invisibits
 
HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighFRSecure
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessEric Schiowitz
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)Asif Iqbal
 
Targeted Defense for Malware & Targeted Attacks
Targeted Defense for Malware & Targeted AttacksTargeted Defense for Malware & Targeted Attacks
Targeted Defense for Malware & Targeted AttacksImperva
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Kevin Duffey
 

What's hot (20)

Threat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsThreat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates News
 
1530 track1 ulinski
1530 track1 ulinski1530 track1 ulinski
1530 track1 ulinski
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Teaching Cyber Safety
Teaching Cyber SafetyTeaching Cyber Safety
Teaching Cyber Safety
 
The Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data BreachesThe Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data Breaches
 
Mom phd
Mom phdMom phd
Mom phd
 
Cyber Security - All Over World
Cyber Security - All Over WorldCyber Security - All Over World
Cyber Security - All Over World
 
Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security
Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber SecurityInternal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security
Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security
 
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 VulnerabilityOpen Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...
 
Biggest data breaches of 2015
Biggest data breaches of 2015Biggest data breaches of 2015
Biggest data breaches of 2015
 
Hackers
HackersHackers
Hackers
 
HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad Nigh
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Targeted Defense for Malware & Targeted Attacks
Targeted Defense for Malware & Targeted AttacksTargeted Defense for Malware & Targeted Attacks
Targeted Defense for Malware & Targeted Attacks
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 

Viewers also liked

Social media background checks policy development
Social media background checks policy developmentSocial media background checks policy development
Social media background checks policy developmentMike McCarty
 
Where is our Mobile Lifestyle Taking us?
Where is our Mobile Lifestyle Taking us?Where is our Mobile Lifestyle Taking us?
Where is our Mobile Lifestyle Taking us?Angelina Fomina
 
Child Sex Offenders: How They Select, Seduce, Maintain & Dump Victims
Child Sex Offenders:  How They Select, Seduce, Maintain & Dump VictimsChild Sex Offenders:  How They Select, Seduce, Maintain & Dump Victims
Child Sex Offenders: How They Select, Seduce, Maintain & Dump VictimsMike McCarty
 
Understanding New Pennsylvania Volunteer Background Check Law
Understanding New Pennsylvania Volunteer Background Check LawUnderstanding New Pennsylvania Volunteer Background Check Law
Understanding New Pennsylvania Volunteer Background Check LawMike McCarty
 
How to conduct comprehensive volunteer background checks
How to conduct comprehensive volunteer background checksHow to conduct comprehensive volunteer background checks
How to conduct comprehensive volunteer background checksMike McCarty
 
IRHA & Safe Hiring Solutions Partnership
IRHA & Safe Hiring Solutions PartnershipIRHA & Safe Hiring Solutions Partnership
IRHA & Safe Hiring Solutions PartnershipMike McCarty
 
Calon siswa baru
Calon siswa baruCalon siswa baru
Calon siswa baruHERI_HASAN
 
New CFPB Forms & FCRA Overview Webinar
New CFPB Forms & FCRA Overview WebinarNew CFPB Forms & FCRA Overview Webinar
New CFPB Forms & FCRA Overview WebinarMike McCarty
 
Modul kimia 2 finish
Modul  kimia 2 finishModul  kimia 2 finish
Modul kimia 2 finishHERI_HASAN
 
Should I Be Conducting Federal Criminal Searches?
Should I Be Conducting Federal Criminal Searches?Should I Be Conducting Federal Criminal Searches?
Should I Be Conducting Federal Criminal Searches?Mike McCarty
 
10 Things to Know Before Hiring a Background Screening Firm
10 Things to Know Before Hiring a Background Screening Firm10 Things to Know Before Hiring a Background Screening Firm
10 Things to Know Before Hiring a Background Screening FirmMike McCarty
 
Modul kimia finish
Modul kimia finishModul kimia finish
Modul kimia finishHERI_HASAN
 
Formation "Développer son activité commerciale sur le marché du tourisme d'a...
 Formation "Développer son activité commerciale sur le marché du tourisme d'a... Formation "Développer son activité commerciale sur le marché du tourisme d'a...
Formation "Développer son activité commerciale sur le marché du tourisme d'a...MONA
 
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAM
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAMFR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAM
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAMSabine FAURE SA Mlle
 
Gestion des emails en Aquitaine
Gestion des emails en AquitaineGestion des emails en Aquitaine
Gestion des emails en AquitaineMONA
 
Le numérique patrimoine culture et tourisme - Philippe Fabry mopa Journée tec...
Le numérique patrimoine culture et tourisme - Philippe Fabry mopa Journée tec...Le numérique patrimoine culture et tourisme - Philippe Fabry mopa Journée tec...
Le numérique patrimoine culture et tourisme - Philippe Fabry mopa Journée tec...MONA
 

Viewers also liked (20)

Social media background checks policy development
Social media background checks policy developmentSocial media background checks policy development
Social media background checks policy development
 
Where is our Mobile Lifestyle Taking us?
Where is our Mobile Lifestyle Taking us?Where is our Mobile Lifestyle Taking us?
Where is our Mobile Lifestyle Taking us?
 
Child Sex Offenders: How They Select, Seduce, Maintain & Dump Victims
Child Sex Offenders:  How They Select, Seduce, Maintain & Dump VictimsChild Sex Offenders:  How They Select, Seduce, Maintain & Dump Victims
Child Sex Offenders: How They Select, Seduce, Maintain & Dump Victims
 
Understanding New Pennsylvania Volunteer Background Check Law
Understanding New Pennsylvania Volunteer Background Check LawUnderstanding New Pennsylvania Volunteer Background Check Law
Understanding New Pennsylvania Volunteer Background Check Law
 
How to conduct comprehensive volunteer background checks
How to conduct comprehensive volunteer background checksHow to conduct comprehensive volunteer background checks
How to conduct comprehensive volunteer background checks
 
IRHA & Safe Hiring Solutions Partnership
IRHA & Safe Hiring Solutions PartnershipIRHA & Safe Hiring Solutions Partnership
IRHA & Safe Hiring Solutions Partnership
 
Calon siswa baru
Calon siswa baruCalon siswa baru
Calon siswa baru
 
New CFPB Forms & FCRA Overview Webinar
New CFPB Forms & FCRA Overview WebinarNew CFPB Forms & FCRA Overview Webinar
New CFPB Forms & FCRA Overview Webinar
 
Modul kimia 2 finish
Modul  kimia 2 finishModul  kimia 2 finish
Modul kimia 2 finish
 
Should I Be Conducting Federal Criminal Searches?
Should I Be Conducting Federal Criminal Searches?Should I Be Conducting Federal Criminal Searches?
Should I Be Conducting Federal Criminal Searches?
 
ProDruk №1(1)
ProDruk №1(1)ProDruk №1(1)
ProDruk №1(1)
 
10 Things to Know Before Hiring a Background Screening Firm
10 Things to Know Before Hiring a Background Screening Firm10 Things to Know Before Hiring a Background Screening Firm
10 Things to Know Before Hiring a Background Screening Firm
 
Modul kimia finish
Modul kimia finishModul kimia finish
Modul kimia finish
 
A12 reporters de territoires - #et9
A12 reporters de territoires - #et9A12 reporters de territoires - #et9
A12 reporters de territoires - #et9
 
Formation "Développer son activité commerciale sur le marché du tourisme d'a...
 Formation "Développer son activité commerciale sur le marché du tourisme d'a... Formation "Développer son activité commerciale sur le marché du tourisme d'a...
Formation "Développer son activité commerciale sur le marché du tourisme d'a...
 
MemoireYS
MemoireYSMemoireYS
MemoireYS
 
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAM
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAMFR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAM
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAM
 
Gestion des emails en Aquitaine
Gestion des emails en AquitaineGestion des emails en Aquitaine
Gestion des emails en Aquitaine
 
Le numérique patrimoine culture et tourisme - Philippe Fabry mopa Journée tec...
Le numérique patrimoine culture et tourisme - Philippe Fabry mopa Journée tec...Le numérique patrimoine culture et tourisme - Philippe Fabry mopa Journée tec...
Le numérique patrimoine culture et tourisme - Philippe Fabry mopa Journée tec...
 
Article 02 (1)
Article 02 (1)Article 02 (1)
Article 02 (1)
 

Similar to SafeVisitor Presentation

Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security cschumley
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...North Texas Chapter of the ISSA
 
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Shawn Tuma
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data BreachShawn Tuma
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextBrian Pichman
 
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)Shawn Tuma
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALJoseph White MPA CPM
 
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Sonatype
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Shawn Tuma
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfChinatu Uzuegbu
 

Similar to SafeVisitor Presentation (20)

Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...
 
How to Secure Your Small Business from Cyber Threats
How to Secure Your Small Business from Cyber ThreatsHow to Secure Your Small Business from Cyber Threats
How to Secure Your Small Business from Cyber Threats
 
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
 
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 

Recently uploaded

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Recently uploaded (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

SafeVisitor Presentation