Your SlideShare is downloading. ×
Social media security challenges
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Social media security challenges

1,339
views

Published on

This talk describes the benefits of social media as well as its security challenges. It also outlines sample defenses that companies can adopt. It was given at CSO breakfast club in NYC.

This talk describes the benefits of social media as well as its security challenges. It also outlines sample defenses that companies can adopt. It was given at CSO breakfast club in NYC.

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,339
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
24
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Social Media Security Challenges Aleksandr Yampolskiy, Ph.D. (Gilt Groupe)
  • 2. Quick Survey
    • Do you have a Myspace account?
    • Facebook?
    • LinkedIn?
    • Have you ever searched for something on Wikipedia?
    • How about Google? Yahoo?
    • Do you read blogs?
    • Does your company engage in social media marketing?
  • 3. What is Social Media?
  • 4. Benefits of Social Media Reach out to customers quicker Brand recognition Recruiting
  • 5. Risks of Social Media Twitter XSS bug Myspace Samy worm Facebook spear-phishing Facebook page of MI6 chief’s wife
  • 6. Pros/Cons of Social Media
    • To summarize:
    • Positive benefits
    • Recruiting efforts through LinkedIn
    • Gilt brand expansion (Facebook, Twitter)
    • Blogging about latest fashion trends
    • Get the message out faster and to more people
    • Negative risks
    • - Expands the network perimeter
    • Makes social engineering easier
    • Potential for data leakage
    • Malware, phishing, spoofing
  • 7. Our solutions
        • Heavily based on policy and training
        • Include a chapter in InfoSec policy about Social Media.
        • Define what social media is (blogs, networking sites, facebook, etc.)
        • Define what’s allowed to post and what’s not (no confidential info, no negative comments about compettiors, etc.)
        • Who does the policy apply to? (everyone? Just pr or marketing?)
    • 2. Permissive posture. Track usage of sites at firewall level but don’t block them.
    • 3. These are just web 2.0 apps. So same rules apply.
    • Phishing prevention
    • Secure coding principles
    • 4. Remind employees to use different personal passwords and corporate passwords .
  • 8. Sample Threat Matrix For Social Media Data leakage on Twitter Facebook malware Spear-phishing