Category Archives: Infosec Communicator

  • 1

A Lightning Fast Introduction to Digital Self Defense

Category:Higher Education,Information Security,Infosec Communicator,Uncategorized Tags : 

Each year at the Rochester Institute of Technology we introduce the concepts of Digital Self Defense to incoming students. We’ve tried a variety of presentation types and venues, ranging from several sets of co-presenters talking with “smaller” groups of students to one presenter in front of the 2000+ students at our Gordon Field House.

We kicked off our activities this year at New Student Move-in Day with our table of resource materials and a guest appearance by Phishy. Phishy provides a visual reminder for students to watch out for phishing attempts. Quite a few students posed with Phishy for photos.

Our New Student Orientation activities will conclude on Saturday, Sept 1, as we deliver a series of Lightning Talks on the subject of Digital Self Defense. We’ll cover online reputation management, safer social networking, avoiding online identity theft, security requirements at RIT, and illegal file sharing.

Because we’ll have captionists and ASL (American Sign Language)  interpreters, we’ve added 3 seconds to each slide. As in other Lightning Talks, the slides will advance automatically, every 18 seconds. I’m the only one of the presenters who’s done a Lightning Talk, and I’m looking forward to seeing how each presenter deals with the challenge of a very large (~2500) audience and a slide deck they don’t control.

Five presenters. Five different styles. Huge audience. Should be interesting.

Watch for my followup post!

Enhanced by Zemanta

  • 0

Save the date! Bulletproofing Your Career Online live webinar 8/2, 4-5 pm EDT

Category:Cyberstalking,Facebook,Information Security,Infosec Communicator,Internet Safety,Presentations,Privacy,Risk,Social Networking,STC,Summit,techcomm Tags : 

Hannah Morgan and I will be presenting Bulletproofing Your Career Online as an STC webinar on Thursday, 2 August | 4:00–5:00 PM EDT (GMT-4)

What are the 10 key steps to building and securing your online reputation? A security professional and a career sherpa provide their perspectives on how to create an online presence that enhances and promotes your career safely and effectively.

Register at https://www.stc.org/education/online-education/live-seminars/item/bulletproofing-your-career-online?category_id=53

Is it worth attending? Of course!

Here’s the feedback we received from our in-person presentation delivered at the STC Summit in May:

Ratings

Note: The evaluation scale ranged from 1 (poor) to 5 (excellent).
Overall Evaluations Received: 15
Content:  4.07
Delivery: 4.07
Value: 4.27
Overall rating: 4.14

Selected comments:

  • Ben was a good speaker with great knowledge about his topic. He and Hannah played well off each other, tackling related topics and bouncing off one another’s words.
  • Even if you think you’ve heard it all before, this presentation gave more insight and more information that was very beneficial
  • We could do have more of this type of thing. I think it’ll be a valuable (and increasingly so) job skill.
  • It was superb.
  • The delivery and content were a nice mixture of internet security and managing your online profile. The format worked well with the presenters taking turns. It made the session more lively.

  • 0

Engage! Creating a Meaningful Security Awareness Program (Updated)

Category:EDUCAUSE,Higher Education,Information Security,Infosec Communicator,Presentations,Social Networking Tags : 
7/12/12 Updated with seminar slides!
View more PowerPoint from Ben Woelk

This may start quite the discussion, but it’s a viable argument that good Information Security practices are primarily about people, not technology.

Do you need help creating a security awareness program? Would you like to use social media to engage your audience?Would you like to integrate video or podcasts? Do you know how to best participate in National Cyber Security Awareness Month or Data Privacy Day?

Cherry Delaney (Purdue University) and Ben Woelk (Rochester Institute of Technology) presented a 3½ hour seminar at the EDUCAUSE Security Professionals/IT Enterprise Leadership Conference in Indianapolis on Thursday afternoon, May 17th.

The seminar is designed for security managers, CIOs, CISOs, ISO, and IT Communications professionals. (There is an additional fee.)

Session Comments

SESSION CONTENT QUESTIONS
  • Overall evaluation of presentation
    • Excellent 100%
    • Good 0%
    • Fair 0%
    • Poor 0%
  • Presented as described in the abstract
    • Excellent 100%
    • Good 0%
    • Fair 0%
    • Poor 0%
  • Organized in logical, coherent way
  • Excellent 50%
  • Good 50%
  • Fair 0%
  • Poor 0%
  • Key points supported with breadth and depth
    • Excellent 50%
    • Good 50%
    • Fair 0%
    • Poor 0%
  • Clearly stated significance of project/area of work that points to future use
    • Excellent 100%
    • Good 0%
    • Fair 0%
    • Poor 0%
  • Appropriate selection of resources/handouts
    • Excellent 50%
    • Good 0%
    • Fair 50%
    • Poor 0%
  • Allowed sufficient time for Q&A
    • Excellent 100%
    • Good 0%
    • Fair 0%
    • Poor 0%
SESSION DELIVERY/SPEAKER QUESTIONS
  • Knowledge of topic
    • Excellent 100%
    • Good 0%
    • Fair 0%
    • Poor 0%
  • Engaged the audience
    • Excellent 100%
    • Good 0%
    • Fair 0%
    • Poor 0 %
  • Clearly introduced and reinforced key points
    • Excellent 100%
    • Good 0%
    • Fair 0%
    • Poor 0%
  • Effectively used slides/visuals to organize and display content
    • Excellent 100%
    • Good 0%
    • Fair 0%
    • Poor 0%

2 evaluation forms were returned for this session.

COMMENTS:

  • I don’t know how this presentation could be better. The content and presentation was very helpful for me. Maybe in another year or two I might have some hind-sight. It was nice to have them provide the structure and the abstract. it was also very beneficial to hear about measuring the effectiveness of this process is hit-or-miss so I know what to expect.
  • The formal training part was more helpful than I anticipated. Sometimes I think i know more than I do!

  • 1

A review of Petrilli, The Introvert’s Guide to Success in Business and Leadership

Category:Infosec Communicator,Introverted Leadership,introverts,Leadchange,Leadership,STC,STC Rochester,techcomm Tags : 

Reading this book as an introverted leader, I’m encouraged to see that Lisa recommends and extends many of the same techniques I’ve found essential. I found that meeting individually with members of my admin council was a key enabler in a successful year. I also appreciated knowing that an introvert can rise to C level leadership.

Lisa refers to not faking it. However, I viewed my leadership  responsibility as a role that had duties and expectations to fulfil. I observed successful leaders and tried to emulate their ability to reach out to others to welcome them and affirm them.

I think the book is best suited for introverts who have been newly thrust into leadership. The section for extraverted leaders on how to lead introverts was also useful.


  • 1

Congratulations! Congratulations!! Congratulations!!! You are a Winner in the Microsoft Promotion!!

Category:Information Security,Infosec Communicator,Internet Safety,Risk,Uncategorized Tags : 

Screenshot of email Winner notification

                                                          

I received the email above today. Should I provide the information requested so I can start the process to claim my £500,000.00 GBR prize? Did anyone else receive this? Maybe I’m one of the lucky ten!


Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner