Menu
unlimphotos

Find Similar Images

Stock photos and images of username:LeoWolfert

C-level corporate executive touching CSO. Business concept for the top role of Chief Security Officer. Data sets with icons relate to operational risk management and safeguarding of company assets. Corporate executive pushing CHIEF SECURITY OFFICER onscreen. Technology concept for a senior management team role in information security, business continuity planning, auditing and risk management. Corporate manager touching SECURITY SPECIALIST on a touch screen interface. Technology metaphor and business concept for a mid-level employee in an enterprise information security career. Copy space. Male manager is pressing INCIDENT RESPONDER on a touch screen. Information security technology concept for a cyber firefighter troubleshooting for the root causes of security gaps and system flaws. Manager is pushing SECURITY INTELLIGENCE on a touch screen. Security technology concept for an information security role responsible for the protection of computers, software and networks. Security director touching MALWARE ANALYST onscreen. Security technology concept for a corporate analytical role in cybersecurity responsible for identifying and analyzing malicious program threats. Security manager pressing CSIRT on a screen. Technology concept and business metaphor for Computer Security Incident Response Team. Several icons do refer to tasks of handling IT security incidents. Security director is pushing CSIRT MANAGER on a touch screen. Cybersecurity technology concept and business metaphor for the role of a Computer Security Incident Response Team Manager. Copy space. IT director is touching COMPUTER SECURITY INCIDENT RESPONSE TEAM onscreen. Security technology and business concept for a team of professional cyber firefighters skilled to counter cybercrime.. Black hat hacker is pressing MALICIOUS SOFTWARE. Cybersecurity and technology concept for malware programs. Three red unlocked virtual locks represent an attack via worms, trojans or executable code. Administrator is pushing INCIDENT MANAGEMENT on a touch screen interface. Technology metaphor and business concept. Magnifier icons relating to incident detection, investigation and analysis. Law enforcement officer is touching COMPUTER FORENSICS EXPERT onscreen. Security technology concept for a specialist capable of investigating data breach and security incidents. Copy space. Cyber investigator is touching DIGITAL EVIDENCE onscreen. Technology concept and business metaphor. Thee unlocked padlock icons do represent authorized data access by a digital forensic practitioner. Manager is pushing IT SERVICE MANAGEMENT on a touch screen. Technology concept and business metaphor for information technology service management. Copy space over office interior background. IT administrator is pressing SIGN ON on a touch screen interface. A stream of unlocked padlock icons relates to authenticated access in a computing session. Technology concept and business metaphor. Investigator pushing DIGITAL FORENSICS on a touch screen. Cyber security technology and science concept for the electronic discovery process and investigation of an unauthorized network intrusion.. Business customer pressing ITSM onscreen. Concept for information technology service management. Unlocked lock icons refer to network incidents, magnifier symbols signify specialized software tools. Security specialist touching INFOSECURITY onscreen. Technology and business concept for information security, computer security, information technology security and protection of critical data. Corporate user is touching IT HELP DESK on a touch screen interface. Business concept for the information technology support industry troubleshooting problems and providing assistance to customers. Forensic investigator is pressing InfoSec on a touch screen. Technology and business concept for infosecurity or information security. Locked and unlocked data sets represent authorized access. Business user is pushing IT SERVICE DESK on a touch screen interface. Technology concept for information technology service management. Several icons refer to different tools, tasks and resources. IT manager is pushing DATA INTEGRITY onscreen. Technology and business concept. Self-repeating datasets represented by locked hexagon icons refer to the assurance of accuracy and consistency of data. Programmer touching AUTHENTICATED ENCRYPTION onscreen. Business and security technology concept. Locked padlock icons in hexagons signify assurance of confidentiality, integrity and authenticity. Business manager is pressing CUSTOMER SERVICE on a touch screen interface. Technology metaphor and business concept for professional assistance, technical support and customer-focused approach. Database manager is pushing DATA STORAGE on a touch screen interface. Technology and business concept. Many locked padlock icons embedded in a hexagonal structure do represent reliable data storage. Businessman touching CUSTOMER SUPPORT. Business and technology concept for the services industry. Male and female white collar icons embedded in a hexagonal matrix represent the customer base. Forensic investigator is pushing CYBERSTALKING on a touch screen interface. Technology concept for the continuous process cyberbullying, monitoring, identity theft, threat and online vandalism. Forensics expert pressing ELECTRONIC EVIDENCE on a touch screen. Technology concept and business metaphor. A single unlocked padlock icon is lighting up under a virtual magnifier signifying evidence. Forensic examiner is pressing ELECTRONIC DISCOVERY on a touch screen. Technology concept and business metaphor. Magnifier icons relate to the digital forensic process of identification of evidence. Forensic investigator is touching DIGITAL EVIDENCE ANALYSIS onscreen. Law enforcement technology and service concept. Magnifier icons represent forensic tools and lock symbols reference evidence. Forensic investigator is pushing COMPUTER CRIME onscreen. Law enforcement technology concept and cyber security metaphor. Three unlocked lock icons do represent compromised data or a security breach. Forensic expert is pressing TASK FORCE on a touch screen interface. Business metaphor and law enforcement technology concept. Icons onscreen refer to peer experts, investigative tools and coding.. Law enforcement agent touching CRIMINAL PROFILING onscreen. Business metaphor and technology concept. A female white collar icon is highlighted and linked to two open locks signifying case linkage. Examiner is pushing DIGITAL FORENSIC PRACTITIONER onscreen. Law enforcement metaphor and technology concept. Unlocked padlock icons refer to digital evidence and magnifiers to analytical tools. Crime investigator pushing CYBERCRIME onscreen. Business metaphor and technology concept. Three red unlocked padlock icons do represent a security breach, hacking attempt or compromised information. Manager is pointing at DATA RECOVERY on a touch screen. Business metaphor and technology concept. Magnifier glass icons do reference analyzing tools and locked padlocks represent encrypted files. Digital forensic investigator is pointing at DATA EVIDENCE on a touch screen. Business metaphor and technology concept. Magnifier icons relate to analytical tools and virtual locks to encrypted data. Examiner is touching COMPUTER FORENSIC ANALYSIS onscreen. Business metaphor and technology concept. locked and unlocked padlock icons reference retrieved documents and encrypted electronic evidence. Forensics expert is pushing DATA EXTRACTION onscreen. Business metaphor and security technology concept. Three unlocked padlock icons do light up in red signifying recovery of evidentiary data. Examiner pressing DIGITAL FORENSIC INVESTIGATION on a touch screen interface. Business metaphor and technology concept. Magnifying glass icons represent analytical tools for investigative techniques. Governance officer is touching REGULATORY COMPLIANCE onscreen. Business metaphor and technology concept for practices of compliance control, operational transparency and IT governance. Forensic expert is pressing COMPUTER FORENSICS onscreen. A virtual magnifying glass icon is hovering over locked hexagonal data packets. Technology concept for an investigation into computer crime. Software developer pushing CODE INJECTION VULNERABILITY onscreen. Three open locks among otherwise closed lock icons within a hexagonal matrix do represent the security threat of command injection. Forensic examiner is pushing COUNTER FORENSICS. Fading locked padlock icons embedded in hexagons do signify data hiding and artifact wiping, while a virtual loupe represents the attempted analysis. Cyber attacker is touching COMMAND INJECTION ATTACK onscreen. Red cracked lock icons in a hexagonal code matrix represent results-based command injections. Security technology concept. Copy space. Male cryptanalyst is touching CRYPTANALYSIS onscreen. Many closed padlock icons embedded in hexagonal matrix structures do represent encrypted data sets within a cryptographic security system. Corporate client pressing SECURE LOGIN onscreen. A stream of open virtual lock icons embedded in a hexagonal structure do represent a secure log-in process. Security technology concept. Copy space.. Corporate user is pushing LOGIN on a touch screen interface. He is identifying himself via fingerprint with his index finger. Security technology concept for authorized computer and network access.. Male adversary is pressing DATA HIDING onscreen. Translucent hexagon shapes secured by closed lock icons are fading into the dark background to signify data obfuscation, concealment and encryption. Management consultant touching OUTSOURCING onscreen. Female and male white collar worker icons embedded in a hexagonal planning matrix do represent a pool of outside or offshore professional talent.