safe surfer seminar Martin Hellweg, Author



Similar documents
Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

SMALL BUSINESS PRESENTATION

Cybersecurity Protecting Yourself, Your Business, Your Clients

Cybersecurity Best Practices

SMALL BUSINESS PRESENTATION

Network Security and the Small Business

Deter, Detect, Defend

BE SAFE ONLINE: Lesson Plan

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013

PCI Data Security Standard 3.0

National Cyber Security Month 2015: Daily Security Awareness Tips

Mobile Application Security Report 2015

The Human Component of Cyber Security

The Attacker s Target: The Small Business

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

ANDRA ZAHARIA MARCOM MANAGER

Pretexting Prevention: Minimizing Inbound and Outbound Risks

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Enterprise Computing Solutions

Host/Platform Security. Module 11

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

October Is National Cyber Security Awareness Month!

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Cyber Risks and Insurance Solutions Malaysia, November 2013

Managed Security Monitoring: Network Security for the 21st Century

G-Cloud Definition of Services Security Penetration Testing

BSHSI Security Awareness Training

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

White Paper. Information Security -- Network Assessment

Small businesses: What you need to know about cyber security

Data Security. So many businesses leave their data exposed, That doesn t mean you have to Computerbilities, Inc.

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Cybersecurity. Considerations for the audit committee

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

THE RISK OF SOCIAL ENGINEERING ON INFORMATION SECURITY:

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Common security headaches. Common security headaches and how to avoid them. PineApp.com

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

Malware & Botnets. Botnets

10 Smart Ideas for. Keeping Data Safe. From Hackers

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

PCI Compliance for Healthcare

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

RETHINKING CYBER SECURITY Changing the Business Conversation

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

In-House Vs. Hosted Security. 10 Reasons Why Your is More Secure in a Hosted Environment

Penetration Testing Service. By Comsec Information Security Consulting

SecurityMetrics. PCI Starter Kit

Fraud Prevention Checklist for Small Businesses

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

CHARLES BERNARD ENABLE SALES SUCCESS. I have witnessed Charles give seminars that have had CEOs spellbound at his insights and knowledge.

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

I ve been breached! Now what?

Cyber/ Network Security. FINEX Global

A NEW APPROACH TO CYBER SECURITY

NZI LIABILITY CYBER. Are you protected?

Cyber Security Management

Cyber-Crime Protection

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

How To Implement Data Loss Prevention

How To Protect Yourself From Cyber Threats

Transcription:

safe surfer seminar PRIVACY PROTECTION & REPUTATION MANAGEMENT IN THE DIGITAL AGE We race at speeds of 300 thousand kilometers per second on data highways, but still know far too little about how to adequately protect ourselves against digital accidents. Martin Hellweg, Author Virtual Bodyguard An initiative of the Ally Management Group Ltd Churerstrasse 104, 8808 Pfäffikon, Switzerland +41 44 508 52 76, contact@vbodyguard.com www.vbodyguard.com

safe surfer seminar // the virtual bodyguard 1 / 4 Use your legal name sparingly. // why you need a Virtual Bodyguard // Vulnerability in the Digital Age // Careless driving on the Information Highway Digital communication is a blessing for our society. It gives people worldwide access to important information, useful products, services and also the ability to make one s voice heard through democratic initiatives. At the same time the digital age has its downsides. Countless recent examples show how massive damage to the reputation of individuals and companies, can be caused in no time at all. In today's digital world, it is imperative to develop a new mode of communication, one that takes the various new digital risks into account. Untruths, insults, and slander are spreading faster than ever before on the internet and stay there permanently. Hackers make it increasingly a hobby to attack private individuals, not just top managers, entrepreneurs, politicians, celebrities, but also people from all sectors of society. Not even in our own private social media network are we safe from observation, surveillance, gossiping and possible defamation. The consequences of these attacks for an individual s private and professional life are frightening and manifold. The spread of these toxic attacks to an individual s employer or any organization this individual represents can be very serious. More firewall and anti-virus programs are not the solution. Awareness of personal risk and the importance of disciplined behavior while using the internet is key. // become a safe surfer Learn to use the digital world safely and confidently, while utilizing tools for effective privacy protection. Develop habits that will avoid risks to your personal reputation and to the companies or organizations you represent. Many users are not fully aware of the risks and dangers they may encounter while web surfing, communicating digitally and using social media. Public figures are particularly exposed to these risks, but not only those in the public eye can become victims. Today private individuals can come to unwanted internet fame in the blink of an eye. Any individual who uses the Internet without knowledge of the risks, who proceeds blind to the possible pitfalls, will sooner or later experience a breach of their privacy in some form. A damaged personal reputation can have a lasting effect, rippling out to negatively influence the reputation of any organization an individual is associated with. Sam V. Furrer, Virtual Bodyguard the book Safe Surfer by Martin Hellweg (Infinity Publishing 2015) is one of the foundations of the seminar and will be issued to participants. The Virtual Bodyguard helps individuals and companies to protect their privacy in the digital world.

safe surfer seminar // the virtual bodyguard 2 / 4 If in doubt: Best not to do it. // safe surfer seminars // What will you take away from a Safe Surfer seminar? Become fully aware of the main threats and risks of the digital world with regard to privacy violations, reputation risks and cybercrime Understand how to develop patterns of behavior which will establish firm boundaries and limit access to your identity and private life Learn practical measures and behavioral guidelines to protect your privacy and to mitigate the risks of your privacy being breached Gain the skills to quickly eliminate negative representations of your personality on the internet Acquire the knowledge to carefully design and manage your personal digital profile on social media and beyond // Further key takeaways Tips and advice that can be implemented immediately 1:1 coaching during the seminar Hands-on guidance to build your personal, authentic, and credible online profile // Who can benefit from a Safe Surfer seminar? Anyone who regularly uses the internet and values his or her privacy. Individuals who value their reputation, and who find it important to protect the organizations and institutions they represent. The seminar is of particular use to individuals who depend on their personal credibility and value the trust they've earned from their employees, customers, members or voters. Thus, we regularly welcome corporate executives, presidents of associations, politicians and other publicly exposed persons in our seminars. On request, we will be happy to configure a seminar specifically customized for your participants needs.

safe surfer seminar // the virtual bodyguard 3 / 4 Look the door behind you. // MODULAR SETUP OF THE SEMINAR Our seminars are custom-tailored using a number of modules. This allows us to address the specific needs and priorities of our customers. // Module Basic Understanding of the Digital World The architecture of the Internet industry The mechanics of Big Data: government and private players, their intents and interests, their methods and tools, the consequences for the users, and the related trends for the future The systematic collection of data, the compilation of personal profiles, and the trading of personal data by Data Brokers as a business model Typical online threats (cybercrime, malware, discrimination and manipulation based on personal data, etc.) // Module Hands-on Tools for Digital Privacy Protection // Module Digital reputation management How to keep private information private How to protect yourself, your family and your company effectively How to fight hackers How to find and memorize reliable and effective passwords Easy to use encryption Simple and effective day-to-day rules to protect you when using the internet, communicating with digital media or participating in social media Secure settings for your electronic devices and app How to get an overview on your personal data currently available in the internet. Assessment of personal data relevance and risk-potential How to establish the borders of your privacy according to your personal preferences and needs Individual risk assessment regarding your privacy and reputation If needed: elimination of unwanted personal information in the Internet Design of the personal online profile you want to build in the near future // Modul innovations Related to Privacy Protection Measures to protect yourself and your customers from the continuous erosion of privacy Business opportunities arising from an increasing number of customers who care about their privacy and ways to differentiate your company from your competitors Development of innovative services and products for such customers

safe surfer seminar // the virtual bodyguard 4 / 4 A photo travels around the world. // IF YOU UNDERSTAND THE DIGITAL WORLD YOU CAN USE IT WITHOUT FEAR // Highlights from the Seminar // About the Virtual Bodyguard Organization Overview on the possibilities to protect and defend your privacy and reputation with legal means Eye-opening field reports from the Virtual Bodyguard, explaining the lessons learned from many real-life crisis situations like mobbing, data theft, stalking, viral incidents, slander, identity theft, etc. Business models, investment and research strategies of the most important Big Data players Interactive exercises and case examples Since 2007, the Virtual Bodyguard has helped individuals and companies protect their privacy and reputation in the digital age. The Virtual Bodyguard s approach is based on inter-disciplinary and personal assistance to clients with the aim to train safe behavioral practices and to build a secure digital infrastructure tailored to the specific needs of the client. In the acute case of a digital attack the Virtual Bodyguard also carries out emergency assistance. This includes short-term personal care and damage control as well as the subsequent legal, technical, communication and, if necessary, psychological support provided by our partners. The result of these activities will limit the damage done and reinstall data security, privacy and reputation. // The Speakers Martin Hellweg sam v. furrer Has personally assisted clients who have become victims of digital attack Has been CEO or Member of the Boards of Directors of several publicly traded and privately owned companies Has written the book Safe Surfer Protecting Your Privacy In The Digital Age Has been a key note speaker at manyfold occasions Manages projects at the Virtual Bodyguard, particularly in the areas of communication and psychology Has held several executive management positions, incl. Head of HR and Head of External Communication Routinely runs seminars and individual coaching sessions in reputation management and privacy protection Management trainer and coach www.vbodyguard.com