Author Archives: Ben

  • 0

Updated Shock-proofing your Use of Social Media Presentation

Category:Facebook,Higher Education,Information Security,Infosec Communicator,Internet Safety,Lessons Learned,password,Presentations,Privacy,Risk,Social Networking,STC,STC Rochester,Summit Tags : 

I’ve updated my Shock-proofing your Use of Social Media presentation for the Fall 2014 New Student Orientation program at the Rochester Institute of Technology. I’ve changed the passphrase example, added a new cartoon, and generally worked to make the presentation more culturally relevant to 18 to 20 year olds.

Let me know what you think of it!


  • 0

A Techcomm Bestiary, Summit14 edition

Category:Infosec Communicator,Presentations,STC,Summit,techcomm Tags : 

I’ve changed out one slide from the Spectrum14 presentation. Looking forward to presenting this to a crowd at the STC Summit in Phoenix.


  • 0

A Techcomm Bestiary, Spectrum 2014

Category:Infosec Communicator,Presentations,STC,STC Rochester

I thought this came together pretty well and I had a great time presenting my first revision of A Techcomm Bestiary at STC Rochester’s Spectrum 2014. I may make a couple of slide changes before the STC Summit, but this is the meat of the presentation.

Putting this talk together was quite the experience, as I wandered through online pix from medieval bestiaries, reviewed techcomm roles, and read a little about animal symbolism.


  • 0

The Secure Communicator–upcoming webinar

Category:Bulletproofing,Information Security,Infosec Communicator,Internet Safety,Lessons Learned,mobile device,password,Privacy,Risk,STC Tags : 

Has the Heartbleed bug made you more aware of the challenges you face trying to protect confidential or private information online? I’ll address the impacts of Heartbleed and other threats to your security in “The Secure Communicator,” an STC Education webinar on Thursday, June 5, at 5 pm EDT (GMT-4). I’ll provide registration details as soon as they’re available.

Here’s a general description of the seminar:

  • Most technical communicators know the importance of securing their work and online presence, but are often concerned only about confidentiality. However, good security is about three areas: Confidentiality, Integrity, and Availability. The presenter will explain the importance of these areas to your work as technical communicators and provide tips for ensuring that both your work and online presence are secure.

Won’t you join me?


  • 0

Cyber Self Defense Reading List

Category:EDUCAUSE,Higher Education,Information Security,Infosec Communicator,Risk Tags : 

Cyber Self Defense Reading List

I’ve created a reading list of books about Cyber Security suitable for both general readers and readers with a technical background. If there’s something you think I should add, either comment here or on the list in Goodreads.

Enhanced by Zemanta

Site Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,112 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner