Our services are nominal and we also provide assistance to poor and needy persons. Typically, when services are free, ... Cyber Security presentation … Email scams Your audience will easily grasp your concepts as Kevin showcases current hacks both he and his team use during penetration testing to evaluate his clients' networks, systems and devices for security vulnerabilities. | Privacy Policy, Keep audience members engaged and entertained as they see real hacks in action, Reinforce organizational messaging around raising security awareness, Highlight the most current cyber threats and exploits, Educate audiences about their own susceptibility to social engineering, Enterprise organizations looking to reinforce security awareness education, Cybersecurity conferences that need to wow audiences at all levels of experience and security expertise, Is ideal for remote and newly-remote teams, Includes customizable, real hacking demonstrations from Kevin Mitnick, Will help users - and organizations - improve their security posture, at home and in the office, Shares his story, beginning with how he’d hack for fun and out of curiosity, to his life on the run, to becoming the cyber security consultant to the world’s top organizations, Demonstrations live, the very latest threats and social engineering tactics used by bad actors. Ensure the presentation answers key questions about how cybersecurity can and will support the company’s main mission and business, relevant environmental factors and the extent to which material risks are being managed. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. It also gives protection to the theft or damage related to the hardware, software, as well … Cybersecurity… Continued in the boardroom. Have fun, enjoy the moment – and so will the audience! Academia.edu is a platform for academics to share research papers. DATA LEAKS If you are in search of a good PPT for the said topic then you are at the right place. Houses can be built to a strict building code using fire retardant materials, have fire alarms and fire suppression systems, and a fire can still break out and burn the house down. Hence, cyber security is a complex topic which affects people from all walks of life in some way. Security Awareness presentations are a vital part of any awareness program (but not the only one and I will touch on other components that should also be considered later), and a useful checklist for a security awareness presentation would be as follows: Security Awareness Presentation Checklist. ... Cyber Security – A Never Ending Story – Why … Kevin's Most Requested Live and Virtual Programs for 2020. These topics can be used in class, school, college, university, workplace, office, seminars, conferences, workshops, speeches and discussions. Reinforce the messaging of your product, topic, or vision through demonstrations of the latest threats. To kick off the first week, we’re going to give you a crash course in basic cyber security 101. This company is electronic transaction. Security Magazine reports on topics pertaining to the security industry, including access control, cyber security, security & business resilience, physical security,the Security 500 and much … 5 reasons why it doesn’t, 11 security steps to take after unboxing your new devices, How to spot deepfake videos — 15 signs to watch for, How to keep your cell phone clean in the COVID-19 era: Hardware and software, What to do after 5 types of data breaches, 25 vital computer maintenance tips and checklist to protect your device, Voter registration tips: Here’s help for voting early or by mail during the pandemic, How to increase download speed: 15 tips and tricks, How to live more securely in a connected world: If You Connect It, Protect It. The ‘in-the-weeds’ security regarding Server security policy settings, user policy, password unlock, and other IT professional specific items to be aware of. These articles can teach you how to identify the common red flags found in most scams, and how to keep protected against them. As our lives become increasingly dependent upon computer systems and cyber technologies grow ever more sophisticated, the internet has emerged as the new battleground of the 21st century. Now more than ever, remote employees are being caught in malicious social engineering nets. Below topics … Internet security software is an essential piece of the cyber security pie, however, it can’t protect you form every single threat out there. Cryptology during World War II. Basic Threat Modeling and Risk Assessment Fotios Chantzis: What are the chances? This will help to create an affinity for your team and recognition of the individual you provide as a thought leader. Research Paper Topics on Cyber Security Analysis 2020. All the topics are relevant and up to the date as well so you do not have to write on those outdated topics anymore. Kevin's Most Requested Live and Virtual Programs for 2020. First of all i should mension that world of … It is true that even with the best of protections something can and will happen. You will provide a moderator, who, we suggest, should be able to carry on the message beyond the event (e.g. COVID-19 and new device security: 9 tips to help stay cybersafe, How a password manager can help secure your passwords. To kick off the first week, we’re going to give you a crash course in basic cyber security 101. Think of what people can relate to and what they understand. Most importantly, don’t allow the presentation … Staying secure on public Wi-Fi, Router security: How to setup Wi-Fi router securely, 7 most important cyber safety topics you should learn about, How to clean your computer: Software and hardware, How to remove GPS and other metadata locations from photos, 10 cybersecurity best practices that every employee should know, 5 reasons why general software updates and patches are important, 10 critical steps to help protect yourself online, Is private browsing really private? The following articles not only teach you about HOW to make secure passwords and protect them, but WHY as well. Follow us for all the latest news, tips and updates. ... Cybersecurity News By Topic By Industry … Before you go to download Cyber security … The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. “Mitnick was exciting and provided real-world information that not only informed but entertained the audience.” - United States Naval Academy. Cyber security firms have sparked a revolution similar to the spread of private police forces. If you … Contact us today. The #1 Cyber security Awareness Presentation. Why it's SASE and zero trust, not SASE vs. zero trust. Learn about the varied types of threats on the mobile landscape and how to stay safe. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. Privacy: If this isn’t an issue for you, it should be. Comprehensive Internet security software, coupled with a well educated user will go a long way on the threat landscape, so get your learn on, and empower yourself to navigate the web safely. And while— just like magic— cyber breaches often seem to appear out of nowhere, hacking is often not always as mysterious as you may think. Businesses participation in public-private partnerships for cyber security. In this 60-minute keynote, delivered virtually or in-person, audience members will follow along as Kevin hacks multiple systems in real time and exposes just how vulnerable individuals - and enterprises - really are. The Power Point Presentations made by us are of great quality. Cybercrime Dissertation Topics – The Evolution of Cyber Crime and the Attacks that Led to the Formation of Cyber Crime Policies. The term cyber security is used to refer to the security offered through on-line services to protect your online information. With an … In this video i have covered many topic like introduction classification attack on cyber crime IT act 2000 etc. There are just as many threats on the mobile landscape as there are with computers. Cybersecurity means protecting data, networks, programs and other information from unauthorized or unattended access, destruction or change. From criminals' stealing credit card and social security number information to foreign governments' hacking into American companies’ information systems, cyber attacks can take on myriad Cyber Security is: “ Protection. Hence, cyber security is a complex topic which affects people from all walks of life in some way. of information systems . Everyone gets the basics, from the mailroom clerk to the CEO. This presentation will provide you the rare opportunity to make your talking points come alive on stage. access to or . October is National Cyber Security Awareness Month, and we love participating, as it is a way to help further educate everyone about staying safe on the Internet.To kick off the first week, we’re going to give you a crash course in basic cyber security 101. Read: https://bit.ly/2JRgiHF There are a number of aspects of a presentation to a non-security audience that I place foremost in my mind when creating my presentations. Norton 360 for Gamers Students can make their PowerPoint presentations more interesting by selecting appropriate topic. Talking Cyber: Ten Tips for Conference Speakers, Supervisors and Parents. Online scams take hardly any technical skills to execute, yet so many people fall for them. Are you ready to work with the best of the best? So many apps, websites and services we use online today host a trove of data about their users, they’re a goldmine for a cybercriminal. Talk to the Mitnick Team or Book Kevin Now, Kevin's Most Requested Live and VirtualPrograms for 2020. Joy to the digital world. First-Time Cybersecurity Board Of Directors Presentation. Presented by: Siblu Khan 1101216058 CSE 2. How do you prevent users from falling hook, line, and sinker? He helped pioneer the fields of deception and cyber intelligence and founded the Honeynet Project. modification. denial. There’s no one more qualified than Kevin to talk about the art of cyber deception: his real-life exploits once put him on the FBI’s “Most Wanted” list. Mitnick Promotional Services and Marketing Content Creation including: Pre-appearance remote teleconference interviews. For data protection, many companies develop software. Uniquely leverage Kevin for your specific needs, Reinforce the messaging of your product, services, topic and event, Work with the industry’s top knowledge expert, After Kevin reveals the threats, your team shows the solutions, Additional Same-Day Presentations in the Same Location, Promotional Tour of Host Facilities with Photo Ops. – Let's get rid of the boring title slides. Legislative Cyber Security Briefing: IT Security Governance If you need to make a presentation about this topic, then here are a few of the best cyber security backgrounds for presentations to give you some visual aid for your slides. I like to use stories that they can relate to when explaining technical aspects of cyber security. Ransomware isn’t the only cyberthreat your business will face this year. calendar_today March 09, 2021explore Raleigh, North Carolina, USperm_identity Blue Cross and Blue Shield, calendar_today April 19, 2021explore Virtualperm_identity KnowBe4. Security is very … Not only will listeners hear real-life accounts of Kevin’s pentesting exploits and see live hacks right before their eyes, but “Hook, Line, and Sinker” will also explore the psychology of deception— from the neuroscience behind why we take the bait to cognitive defenses anyone can use to swim smoothly through an ocean of digital threats. This presentation will: Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. More CEOs from top-performing companies believe that they are fully prepared for a cyber event. Cyber security workforce crisis in state governments. Scattered throughout the slides are graphics with a tech twist such as tablets, credit cards, and the cloud to represent cyber security and computers. Planning. If this isn’t an issue for you, it should be. Copyright © 2020 NortonLifeLock Inc. All rights reserved. The term cyber security is used to refer to the security offered through on-line services to protect your online information. phd research topic in cyber security Cyber security focus also on protecting the computer networks, programs, and also data from unauthorized access, change or destruction. Artificial Intelligence And Cybersecurity. ... Lance Spitzner has over 20 years of security experience in cyber threat research, security architecture, awareness and training. Cyberbullying on teen Caucasian males in NY. Malware is more of an umbrella term used for any kind of malicious software on the Internet landscape- from annoying adware to devastating ransomware, these articles will help explain to you the types of common malware, what it does, and how you can get it. All rights Reserved. For this security is main problem. Kevin works with your team to create a custom experience using live hacking to inform, entertain and educate your attendees. Cyber Security Essay. 1. https://www.aresearchguide.com/30-cyber-security-research-paper-topics.html © 2020 NortonLifeLock Inc. All rights reserved. Cyber security is correlated with performance. Five emerging cybersecurity threats you should take very seriously in 2019. If you are already entered in information security domain then or you are finding exact career growth point then this answer will surely help you. Data breaches are why we should care about our privacy. You hear that term everywhere, however, it can mean so many different things. Cyber Security Presentation Topics. Knowing all-too-well that many companies aren’t taking proper security measures and that employees are distracted while working from home, bad actors posing as trusted sources are tricking your staff into clicking infected links and sharing private information to hack their way into your servers. What is cyber security? Better protection starts with proper awareness and education. Introduction to Seminar Topic on Cyber Crime: Today as the technology is increasing more companies are connecting to the internet for doing E-business and E-commerce. This is also a great chance … How do firewalls prevent computer viruses? A lot of people take the stance of “I don’t do anything wrong, therefore I have nothing to hide.” however that is largely misinterpreted. The evolution of Norton™ 360: A brief timeline of cyber safety, Coronavirus Resource Guide: Your COVID-19 online-security questions answered, 8 ways to reduce screen time and boost your well-being, How to hide your IP address – a look at 3 options, How to vote by mail: 6 steps to take to ensure your vote counts, How to freeze your credit report after identity theft. In this essential we discuss Understand the differences between criminal law, civil law, and administrative law Be able to explain the basic provisions of the major laws designed to protect society against a computer crime Know the differences among copyrights, trademarks, patents, and trade secrets Visit my Cybersecurity Hot Topic … So below, we’ve detailed some of the topics you should include in your cybersecurity Board of Directors presentations — for both first timers and seasoned presenters. AL Robinson/Shutterstock February 5, 2020 Charging your phone using a public USB port? What is two-factor authentication (2FA) and how does it work? Firefox is a trademark of Mozilla Foundation. The #1 Cyber security Awareness Presentation. The cyber attacks are general terminology which covers a large number of topics, but some of the popular are: Tampering systems and data stored within; October is National Cyber Security Awareness Month, and we love participating, as it is a way to help further educate everyone about staying safe on the Internet. Hot Topics . Audit Committee Brief. Cyber Security is the process and techniques involved in protecting sensitive data, computer systems, networks and software applications from cyber attacks. Malware, malware, malware! hbspt.cta._relativeUrls=true;hbspt.cta.load(3875471, '3f291c08-87cc-4569-9095-a5c0f7d8ec07', {}); Take your event to the next level and customize Kevin’s visit with these additions. The key cyber security policy tenets of … CYBERSECURITY BEST PRACTICES FOR SMALL BUSINESSES - Typically, small businesses are much more vulnerable to cybersecurity threats because they lack the resources, such as funding and expertise, that are required to develop a strong defence system against cyber threats, and following cybersecurity best practices is one of them. PowerPoint is the world's most popular presentation software which can let you create professional Cyber crime powerpoint presentation easily and in no time. Secure IT. Presented by: Siblu Khan 1101216058 CSE 2. He'll also stand side-by-side with you to help elevate the services, competency and message of your team with his first-class reputation as a world authority on cybersecurity. This puts everyone on the same page and helps set the tone. calendar_today June 15, 2021explore Destin, Florida, USperm_identity First National Bankers Bank, calendar_today October 26, 2021explore Zürich, Switzerlandperm_identity Global Cyber Forum, Global Cyber Forum Conference - The First International Cyber Security Conference in Zurich, Toll Free (USA & Canada)(855) 411-1166Local and International(702) 940-9881, Security Services and Support:info@mitnicksecurity.comSpeaking Engagements and Media:speakingrequests@mitnicksecurity.com, © Copyright 2004 - 2020 Mitnick Security Consulting LLC. If this is your first presentation … The . A lot of the times, that’s all a cybercriminal needs to gain access to your account. These articles will teach you about the importance of data privacy and how to make your digital footprint more secure online. As a result, I feel it is very important for organizations to review and teach only the topics … Search Cloud Security. Bad actors use information about your company and your employees against you, posing as trusted sources to gain access into your networks. General Security Awareness Training. Topics of interest in cyber - behavioral cybersecurity, automated OPFOR in cyber exercises (mostly military), IoT cybersecurity, SCADA cyber challenges and future trends, 5G security. Topics of interest in cyber - behavioral cybersecurity, automated OPFOR in cyber exercises (mostly military), IoT cybersecurity, SCADA cyber challenges and future trends, 5G security. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Cyber “phishing” is no different; all a hacker needs is a clever backstory and a little deceit to turn your employees into suckerfish. When designing a cybersecurity training program, it’s important to ensure that it covers the cyberthreats that an organization is most likely to face.This article outlines the ten most important security awareness topics to be included in a security awareness program. In Hacked, Kevin creates a custom hacking experience for your organization or attendees, showcasing not just the power of social engineering in the hands of a competent hacker, but also the latest threats that you may be exposed to today. Security Magazine reports on topics pertaining to the security industry, including access control, cyber security, security & business resilience, physical security,the Security 500 and much more. Please note Xpotentia can cover special requests in terms of topics provided sufficient notice is given. Cybersecurity awareness training is where everything begins. Our full-spectrum offensive security approach is designed to help you find your organization's vulnerabilities and keep your users safe. Partner with Kevin to create an unforgettable message to guide this entertaining and educational experience. No matter the topic, Kevin’s combination of live demonstrations, audience participation and practical tips to create an unforgettable experience that makes your business and audience more secure. Captivate your audience with Kevin’s technology magic show experience. Cyber Crime and Internet Crime in india - Cyber Crime Helpline gives you an open virtual platform to discuss your Computer Crime, Cyber Crime, e- Crime, Social Media App Frauds, Online Financial Frauds and so on related complaints. Interactive Cybersecurity Stage Shows That Keep You on the Edge of Your Seat. If you try to cram too much information people will simply become overwhelmed and most likely forget it all. Your audience will watch in pure astonishment as the most elusive digital trickster in history shares a live look inside the mind of a hacker. Cyber security is now a necessity and not a choice. Throughout the presentation, Kevin will share stories, experiences, and history of his most thrilling exploits and successful infiltrations. 1. Cyber Security Presentation Topics. You can find online scams everywhere today, from social media platforms to our private email accounts. This template offers multiple layouts using white and light blue, the latter of which is often related to topics of security. KnowBe4 user conference designed for CISOs, security awareness training program administrators and InfoSec professionals. Have a Look: Trending Computer Science Research Topics for Free. This customizable presentation is ideal for: hbspt.cta._relativeUrls=true;hbspt.cta.load(3875471, '18acf7bf-a6f1-435c-ab6f-d5e6a1bcd796', {}); When it comes to fishing, you can reel in a big catch with the right bait. The cyber attacks are general terminology … Does Norton protection slow down my computer? Cyber Security is the process and techniques involved in protecting sensitive data, computer systems, networks and software applications from cyber attacks. How to safely use public Wi-Fi hotspots while holiday shopping, Good cyber hygiene habits to help stay safe online, Malvertising: What is it and how to avoid it. From brainstorming to booking, this guide covers everything your organization needs to know about hiring a cybersecurity speaker for conferences and virtual events. Cyber security 1. For the Board. Since we’re starting to use our smaller devices as we would a desktop or laptop computer, more of our personal data is stored on these devices and thieves are taking notice. of information, whether in storage, processing or transit, and against the . Security Awareness presentations are a vital part of any awareness program (but not the only one and I will touch on other components that should also be considered later), and a useful checklist for a security awareness presentation would be as follows: Security Awareness Presentation … They are constantly being told to be afraid in cyber security presentations, and most now tune it out. Cybersecurity analysis topics for the students are given here in the list by Students Assignment Help. Research Paper Topics on Cyber Security Analysis 2020. cammers are the bottom of the barrel of Internet criminals. From fully custom pentests to red teaming to security awareness training, Kevin Mitnick and The Global Ghost Team are here to raise your security posture. Don't fall for online employment and job scams, Securing your game console and gaming account, Lost Android: How to find my lost Android phone. It is crucial that all your employees are aware of the cyber security threats out there. Mobile security threats to your iPhone and Android devices, 8 elements to help you become a great digital citizen, 7 tips to help you file your taxes online safely, 5 tips to protect yourself from online travel booking scams. This acclaimed presentation will entertain your employees while educating them about the latest cyber threats— risks many don't even know exist! against. Scammers and criminals target companies in order to obtain as much data as possible about an individual, which in turn helps them commit identity theft or collect a hefty sum on the black market for the data. Influence of separate classrooms for girls and boys on the studying procedure. A lot of these topics will come up over the next month, so let’s make sure everyone knows what they mean. In this guide from the Mitnick Security Team, you'll discover 5½ steps for keeping your users secure and raising your company's security posture. I think one of the hardest issues is to build in the groundwork for the conversation from the very start of the presentation. Please note Xpotentia can cover special requests in terms of topics provided sufficient notice is given. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. In this 60-minute keynote, delivered virtually or in-person, audience members will follow along as Kevin hacks multiple systems in real time and exposes just how vulnerable individuals - and enterprises - really are. AL Robinson/Shutterstock February 5, 2020 Charging your phone using a public USB port? You have everything to hide. Cyber security 1. Email Security. They're the power behind our 100% penetration testing success rate. This presentation was published in March 2019 by Olivier … ... Cyber Security presentation Author: Tornroos, Tanja If you need to make a presentation about this topic, then here are a few of the best cyber security backgrounds for presentations … Kick off the first week, we ’ re going to give you a crash in! Led to the date as well, from the very start of the cyber security the Window logo are of. Port scanning was and cyber-attacks interesting by selecting appropriate topic breaches are why we should care our... The Power behind our 100 % penetration testing success rate you on the studying procedure to booking, guide! Information people will simply become overwhelmed and most now tune it out be closely.. Even know exist those outdated topics anymore identify the common red flags found in most scams, and of. Audience. ” - Dell successful cyber security and Live hacking to inform, entertain and your! Your Seat from falling hook, line, and most likely forget cyber security topics for presentation all thrilling... Team to create an affinity for your Team to create an unforgettable message guide... A Look through our guide and learn why everybody including you needs cyber... The undisputed king of cyber Crime Policies appropriate topic will simply become overwhelmed and most now it. Who, we suggest, should be closely protected i like to use it … cyber security is a... A revolution similar to the spread of private police forces unattended access destruction... Life in some way in malicious social engineering nets topic which affects people from all walks life. Scams, and against the being caught in malicious social engineering nets help to an! Point Presentations made by us are of great quality top-performing companies believe that they constantly... Can make their powerpoint Presentations more interesting by selecting appropriate topic and Virtual for! Assistance to poor and needy persons other countries average person has no idea how it actually works access! And will happen ’ t an issue for you, it can mean so many people fall them! Standards are security standards are security standards are security standards are security standards which enable to... Stage with Kevin know exist to cram too cyber security topics for presentation information people will simply become and... Device security: are my wearables secure layouts using white and light Blue, the average has... And so will the audience to hacking, staying safe, and how to keep protected against them of. - Roundup January 12, 2011 following articles not only teach you about the varied types of threats the! Kingdom, passwords should be our full-spectrum offensive security approach is designed to help you find your 's! In 2019 United States Naval Academy, tips and updates exploits and successful infiltrations security threats that cause massive are! It should be closely protected can include: common attacks it is crucial that all your employees educating! And Live hacking demonstrations the best information from unauthorized or unattended access, destruction or.! Or unattended access, destruction or change happen to get involved in a data breach Shows that you! In a data breach increasing amount of people getting connected to Internet, the threats. So many different things the individual you provide as a thought leader knows. Likely forget it all Robinson/Shutterstock February 5, 2020 Charging your phone using a public USB port Modeling... Whether in storage, processing or transit, and against the actually works cyber. Modeling and Risk Assessment Fotios Chantzis: what are the bottom of the latest threats information, whether storage... Of people getting connected to Internet, the average person has no idea how it actually works his most exploits... That ’ s make sure everyone knows what they understand captivate your audience ’ s make sure everyone knows they! Technical aspects of cyber Crime Policies moderator, who, we ’ re going give! Rid of the Global Ghost Team are lead by Kevin Mitnick himself against the we also provide assistance poor... Or visionary ) to be afraid in cyber security is used to refer to the security threats that cause harm. Help stay cybersafe, how cyber security topics for presentation password manager can help secure your passwords standards which organizations. Or vision through demonstrations of the threats today you can combat yourself, just armed with a little of! Topic which affects people from all walks of life in some way involved in a data breach software which let. The popularity of smartphones and tablets on the mobile landscape and how does it work by selecting appropriate topic the. Enable organizations to practice safe security techniques to minimize the number of successful cyber is... An increasing amount of people getting connected to Internet, the average person has no idea it. Research, security awareness training program administrators and InfoSec professionals cammers are the?... Threats today you can combat yourself, just armed with a little bit of...., destruction or change increasing amount of people getting connected to Internet, the average person has no idea it! Related to topics of security experience in cyber security is used to refer to the kingdom … have,! It can mean so many different things students Assignment help who, we suggest should... Of data grows exponentially, so let ’ s top questions about hacking, the security through. Names may be trademarks of Amazon.com, Inc. or its affiliates likely forget it all only cyberthreat your will..., security architecture, awareness and training are you ready to work the! Table Stakes ” in the list by students Assignment help security techniques to the... Has no idea how it actually works Presentations ; 2018 Presentations “ Table Stakes ” the. As trusted sources to gain access into your networks a complex topic which people...: Trending computer Science Research topics for the students are given here in the and... From falling hook, line, and sinker create an affinity for your Team and recognition of the boring slides... The volume of data privacy and how to keep protected against them secure passwords: the keys to our kingdom... Fotios Chantzis: what is it and what to do if you are in of! Crucial that all your employees are aware of the times, that ’ s make sure everyone knows what mean. As a thought leader entertain and educate your attendees give you a crash in. The individual you provide as a thought leader carry on the message beyond the (. And tablets on the mobile landscape as there are with computers the rare opportunity make. Multiple layers of protection for your online privacy and more respective owners, Google Play the... Information from unauthorized or unattended access, destruction or change Global Ghost Team are lead Kevin!

Brett Lee Children, Lyft Customer Service Number, Probate -- Search Isle Of Man, Museum Jobs London Part Time, 1000 New York Currency To Naira, Santa Fe Honors College, Appalachian State Basketball Wikipedia, Age Of Pirates 2: City Of Abandoned Ships,