Cyber Risky - Cartoons by Gautam Dev Sketch #2 June 2016 - CISO Annual Cyber Security Meet @devzter

CyBeR RiSkY! by Gautam Dev |Sketch #2 – CISO Annual Cyber Security Meet.


Connect with Gautam:

Cyber Risky - Cartoons by Gautam Dev Sketch #2 (Cover) June 2016 - CISO Annual Cyber Security Meet @devzter 700px

Cyber Risky - Cartoons by Gautam Dev Sketch #2 (Cover) June 2016 - CISO Annual Cyber Security Meet @devzter 700px

Cyber Risky by Gautam Dev - Introduces 2 cartoon characters Cyber Dude (San Money) & Cyber Duh (King MyDoom). You will recognize the names from some well-known viruses which have wrecked much cyber havoc.

San Money = Blaster, aka LovSan, aka MSBlast, 2003 + FBI Moneypak virus.

Cyber Dude (San Money) - Cartoon by Gautam Dev

King MyDoom = Sun King adware virus (Sun King.exe, Sun King-bg.exe, Sun King-bho64.dll, Sun King-nova.exe) + Mydoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and Shimgapi.

Cyber Duh (King MyDoom) - Cartoon by Gautam Dev

Through these 2 fictitious actors, Cyber Dude and Cyber Duh, I attempt to put forward cyber risky predicaments by punning on current affairs and user ignorance.

Here's the Second installment of the series. I would love to hear from you.

If you have any funny, risky situational, anecdote that you'd like to be included, please do share and I will do so in one of the upcoming sketches, with a mention of credit to you for the same.

CyBeR RiSkY! - #2 CISO Annual Cyber Security Meet.

Trouble Reading – Click Below to See high resolution Images with larger fonts:

Part 1 –CyBeR RiSkY characters (San Money & King MyDoom).

Part2 – The DUH & Risky Quarters

Part 3 – The DUDE & Loony Posture


Part 1 –CyBeR RiSkY characters (San Money & King MyDoom).

Cyber Risky - Cartoons by Gautam Dev Sketch #2 (Part 1) June 2016 - CISO Annual Cyber Security Meet @devzter

Cyber Risky - Cartoons by Gautam Dev Sketch #2 (Part 1) June 2016 - CISO Annual Cyber Security Meet @devzter

Part2 – The DUH & Risky Quarters

Cyber Risky - Cartoons by Gautam Dev Sketch #2 (Part 2) June 2016 - CISO Annual Cyber Security Meet @devzter

Cyber Risky - Cartoons by Gautam Dev Sketch #2 (Part 2) June 2016 - CISO Annual Cyber Security Meet @devzter

Part 3 – The DUDE & Loony Posture

Cyber Risky - Cartoons by Gautam Dev Sketch #2 (Part 3) June 2016 - CISO Annual Cyber Security Meet @devzter

Hope that brought you some cheers.

For more Cyber Risky Laughs Also see:

Cyber Risky – Cartoons by Gautam Dev | Sketch #1 | Bad Actors.

If you would like, do read my post on Cyber Risk Transformation - Issue of 4 Runaway Trains.- Part 1.  This is Part 1 of a 3 Part Essay. I am currently working on putting Part 1 together and will post soon.

Until next time, Have a Safe, Risk-free and a Wonderful Day.

 

Gautam Dev

Gautam Dev

Gautam Dev.

Cyber Security Leader, Information Security Veteran, Cyber Risk Governance Advisor, Speaker and Evangelist

@devZter

 

Friday, June 10, 2016

Connect with Gautam:


About Gautam Dev

21+ years of global experience, establishing information risk and security policy frameworks and technologies. Providing Enterprise Information Security leadership, innovating next generation of Cyber Risk Protection, Governance and Cyber Security frameworks and platforms. Over 17 years experience with global delivery models, successfully overseeing, managing and delivering geographically dispersed Information security programs and teams. Acted as a Venture leader, Strategic head, Practice head, Principal Security Services Architect, Information Security Officer, Engagement Manager and Lead Engineer (along with other roles). Expertise in several industry verticals, including retail, transport, technology, banking, education, government, health care and life sciences, energy and utilities, insurance, media, hospitality and telecommunications. Invited to speak at multiple distinguished summits and council panels by government agencies (US Defense Intelligence Agency - US Department of Defense Intelligence Information Systems), technology vendor conferences and analyst forums. C-Level Management and Advisory Cyber Risk Governance and Privacy Program Development and Leadership Cyber Security Standards and Compliance Custom Cyber Risk and Data Privacy Framework and Platform Data structure Modeling for Entity Authenticity and Certifying Authority.

Leave a comment

Your email address will not be published. Required fields are marked *