In the last years we are reading more and more news about massive (millions) breach of passwords in web services as communities, emails services, cloud services and others. Hackers simply are obtaining money stealing passwords and selling or misusing them. This presentation is focus on how to protect our accounts and with this also keep sure our digital identity, our image and also our money safe from hackers businesses. You can see my presentation here: https://www.slideshare.net/RamiroCid/passwords-for-sale    Read More →

During 2017 we will suffer ‘old’ threats like ransomware, cyber espionage and ‘hacktivist’ exposing privacy issues but in addition to known them, our threats list will upgrade so much adding new concepts like machine learning accelerates social engineering attacks or cloud computing providers infection. The list is a very long, so a big effort (time, money, people) is needed to mitigate all these risks. After reading more than 10 different reports about Cyber Security Threats 2017 published in Internet I did my own version. I hope you like it. You can see my presentation here: Cyber security threats for 2017 from Ramiro Cid  Read More →

Every year, the challenge of protecting our IT assets from growing threats and cyber attacks is growing. Once some malicious application is in our network and later can quickly move with traffic and produce a big impact in our the network. These attacks can be devastating. I created a presentation where I explain in details this topic, you can see my presentation here (in Spanish): ¿Cuáles son los peligros a los que se enfrenta su sistema informático? from Ramiro CidRead More →

In times when Cloud Computing, Internet of Things, mobile devices (including environments BYOD) are an increasingly widespread reality (and unstoppable future), thereby opening backdoors to our corporate network (and their respective threats), which place touches the IT security officer to manage an increasingly large number of hits and risks? Where is our corporate perimeter? Block accesses can talk or we have only to settle for being resilient to attacks due to a lack of control visibility and access control? Many doubts are raised, the market has responded and there are technological and non-technological solutions that seek to remedy the growing risk are suffering the organizations withRead More →

Lean Six Sigma is a process improvement methodology that relies on a collaborative team effort to improve performance by systematically removing waste, combining Lean and Six Sigma to eliminate the eight kinds of waste Lean Six Sigma projects comprise aspects of Lean’s waste elimination and the Six Sigma focus on reducing defects. Lean Six Sigma utilizes the DMAIC (Define, Measure, Analyze, Improve and Control) phases similar to that of Six Sigma. Lean Six Sigma projects comprise aspects of Lean’s waste elimination and the Six Sigma focus on reducing defects, based on critical to quality (CTQ) characteristics. Six Sigma use statistics tools for characterization and studyRead More →

IT Governance or Corporate governance of information technology is a subset discipline of corporate governance, focused on information and technology (IT) and its performance and risk management. The interest in IT governance is due to the ongoing need within organizations to focus value creation efforts on an organization’s strategic objectives and to better manage the performance of those responsible for creating this value in the best interest of all stakeholders. I created a presentation where I explain in details this topic, you can see my presentation here: IT Governance & ISO 38500 from Ramiro Cid  Read More →