SlideShare a Scribd company logo
Copyright © AIIM | All rights reserved.
#AIIM
The Global Community of Information Professionals
Social Media Security Threats
Jesse Wilkins, CIP, IGP, CRM
Director, Professional Development
AIIM
March 17, 2016
Copyright © AIIM | All rights reserved.2
Jesse Wilkins, CIP, IGP, CRM
 Director, Research & Development, AIIM
 Twenty years experience as a vendor, consultant, end
user, trainer
 Lead architect for Certified Information Professional
(CIP) certification
 Frequent author and speaker on
IM-related topics
 Developer, AIIM Social Media
Governance Training Course
Copyright © AIIM | All rights reserved.3
Agenda
 Introduction to Social Media & Security
 Social Media & Identity Theft
 Social Media & Hacking
 Social Media & Privacy
Copyright © AIIM | All rights reserved.4
Agenda
Introduction to Social Media & Security
Social Media & Identity Theft
Social Media & Hacking
Social Media & Privacy
Copyright © AIIM | All rights reserved.5
Social Is Everywhere
 1,350+ years worth of time spent every day on
Facebook.
 1.7B Facebook users.
 65% log in on any day - and post 4.5B likes/day.
 300M photos uploaded per day.
 And…
 Twitter and LinkedIn and Pinterest and Google+
and Tumblr and Flickr and Instagram and
Myspace(!) and Livejournal and Orkut and
Yammer and WhatsApp and blogs and millions
Copyright © AIIM | All rights reserved.6
Social Media Is Social
 Making connections
 Reestablishing lost connections
 Making new ones
 Sharing information
 Sharing thoughts & moments
 Searching for interesting stuff
 All of which can be scary from a security
perspective!
Copyright © AIIM | All rights reserved.7
Who Owns The Content?
Copyright © AIIM | All rights reserved.8
What Laws & Jurisdictions Apply?
Copyright © AIIM | All rights reserved.9
Who Owns The Accounts?
Copyright © AIIM | All rights reserved.10
Social Media Security Threats
 Identity theft
 Impersonation
 Hacking
 Privacy disclosures
 Disclosure of other sensitive information
 Reputational damage
Copyright © AIIM | All rights reserved.11
Neither is denial.
Prohibition is not realistic.
Copyright © AIIM | All rights reserved.12
Agenda
Social Media & Identity Theft
Introduction to Social Media & Security
Social Media & Hacking
Social Media & Privacy
Copyright © AIIM | All rights reserved.13
Impersonation
 Fake account pretending to be a celebrity,
politician, etc.
 You connect, they have access to your stuff
 Their links could be to malware or spoof sites
Copyright © AIIM | All rights reserved.14
Impersonation
 Fake account pretending to be YOU
 Your friends (re)connect to “you”, bad guys have
access to their stuff
 “You” send out bad links
 “You” send out requests for money etc.
 Big issue on social networks you DON’T use
Copyright © AIIM | All rights reserved.15
Social Media Identity Theft
 How much have you shared?
 Significant dates
 High school, college
 Kids’ names
 Parents’ names
 Pets’ names
 Favorite books & hobbies
 On the internet nobody knows you’re a dog…
 Or an imposter!
Copyright © AIIM | All rights reserved.16
Agenda
Social Media & Hacking
Social Media & Identity Theft
Introduction to Social Media & Security
Social Media & Privacy
Copyright © AIIM | All rights reserved.17
Hacking Via Social Engineering
 Bad links:
 https://www.facebook.com/login/identify
 http://bit.ly/50m47h1ng84d
 Spoofed emails with bad links
 Spoofed site – you enter your credentials
 Site may be able to install malware
 Adware
 Keystroke loggers
 Other stuff
Copyright © AIIM | All rights reserved.18
Hacking Via Social Engineering
 Special addons
 “Who viewed my FB posts?”
 “Change your FB profile & colors!”
 Could simply lead to bad link
 Could have you install a bad app
 Game apps a big vector here – “cheat apps”
Copyright © AIIM | All rights reserved.19
Hacking Via Bad App example
Source:
https://www.symantec.com/content/en/us/enterprise/media
/security_response/whitepapers/the_risks_of_social_networ
king.pdf
Copyright © AIIM | All rights reserved.20
Another Bad App Example - Walkthrough
http://www.fightidentitytheft.com/blog/facebook-quizzes-sharing-your-private-data
Copyright © AIIM | All rights reserved.21
Another Bad App Example - Walkthrough
http://www.fightidentitytheft.com/blog/facebook-quizzes-sharing-your-private-data
Copyright © AIIM | All rights reserved.22
Another Bad App Example - Walkthrough
http://www.fightidentitytheft.com/blog/facebook-quizzes-sharing-your-private-data
Copyright © AIIM | All rights reserved.23
Hacking Via Social Engineering
 How much did you share?
 Those questions are often:
 Basis for passwords
 Security questions
 All those QUIZZES!
Copyright © AIIM | All rights reserved.24
Hacking Via Shared Passwords
 Across your accounts
 With others – even significant others
Copyright © AIIM | All rights reserved.25
Agenda
Social Media & Privacy
Social Media & Identity Theft
Introduction to Social Media & Security
Social Media & Hacking
Copyright © AIIM | All rights reserved.26
What Are You Posting?
 Your favorite stuff
 Where you are
 And where you aren’t
 http://www.pleaserobme.com
 What you’re doing
 Home sick…posting pics from the big game?
 Gaming?
Copyright © AIIM | All rights reserved.27
What Are You Posting?
 “I hate my boss, I hate my customers, I
hate my job!”
-- Lots of people
Copyright © AIIM | All rights reserved.28
What Are You Posting?
 “Just figured out how to get around IT’s
stupid limits on email!
-- Lots of politicians
(and lots of employees)
Copyright © AIIM | All rights reserved.29
What Are You Posting?
 “That feeling when you drank so much
the night before but you have no
hangover because you’re still drunk!”
-- Hopefully NOT your boss, your pilot, your
surgeon…
Copyright © AIIM | All rights reserved.30
What Are You Posting?
 And the usual suspects:
 Personal/personnel information
 Proprietary information
 Sensitive or confidential
information
 Customer information
 Internal strategies &
deliberations
 Negotiations
 Pictures including faces
Copyright © AIIM | All rights reserved.31
What Are Other People Posting?
 Other people can:
 Upload pictures of you and tag you
 (Facebook will try to auto-tag you using facial
recognition)
 Check in with you at a location
 Check you into a location
 Share stuff to your timeline
Copyright © AIIM | All rights reserved.32
Other Peoples’ Posts
Copyright © AIIM | All rights reserved.33
Other Peoples’ Posts
Copyright © AIIM | All rights reserved.34
Other Peoples’ Posts
Copyright © AIIM | All rights reserved.35
Conclusion
 It’s a scary social media world out there!
 But you can protect yourself…
Copyright © AIIM | All rights reserved.36
Questions?
Copyright © AIIM | All rights reserved.37
Additional Resources
 Social Media Policy Database
 http://socialmediagovernance.com/policies/
 SHRM Social Media Policy Template
 http://www.shrm.org/templatestools/samples/policies/pages/social
mediapolicy.aspx
 NARA Best Practices for Capture of Social Media Records
 http://www.archives.gov/records-
mgmt/resources/socialmediacapture.pdf
 AIIM Social Business Assessment
 http://info.aiim.org/how-to-conduct-a-social-business-assessment
 AIIM Social Business Roadmap
 http://www.aiim.org/Social-Business-Roadmap
Copyright © AIIM | All rights reserved.38
For More Information
Jesse Wilkins, CIP, CRM, IGP
Director, Professional Development
AIIM International
+1 (720) 232-9638 direct
jwilkins@aiim.org
http://www.twitter.com/jessewilkins
http://www.linkedin.com/in/jessewilkins

More Related Content

What's hot

Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
atifkhanniazi
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
blogzilla
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
HB Litigation Conferences
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
Shawn Tuma
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessRobin Rafique
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
Anna Adel
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
IWMW
 
Cyber Liability Insurance
Cyber Liability InsuranceCyber Liability Insurance
Cyber Liability Insurance
Graeme Newman
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
Nicole Black
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaNicole Black
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
AM Oh
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
Hubbamar
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
Internet Law Center
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
Dinesh O Bareja
 

What's hot (20)

Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Cyber Liability Insurance
Cyber Liability InsuranceCyber Liability Insurance
Cyber Liability Insurance
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social media
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 

Viewers also liked

Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
SpareBank 1 Gruppen AS
 
Security and social media
Security and social mediaSecurity and social media
Security and social media
JP Rains, MBA
 
WeChat operation
WeChat operationWeChat operation
WeChat operation
YING LUI ALAN SIU
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
Parakum Pathirana
 
3º A 2015
3º A 20153º A 2015
3º A 2015
Val Quental
 
Excel dad6 8
Excel dad6 8Excel dad6 8
Excel dad6 8daalt209
 
効果的なXPの導入を目的とした プラクティス間の相互作用の分析
効果的なXPの導入を目的とした プラクティス間の相互作用の分析効果的なXPの導入を目的とした プラクティス間の相互作用の分析
効果的なXPの導入を目的とした プラクティス間の相互作用の分析
Makoto SAKAI
 
Profile Optimisation
Profile OptimisationProfile Optimisation
Profile Optimisation
LinkedIn
 
Mapas conceptuales de proyectos .....
Mapas conceptuales de proyectos .....Mapas conceptuales de proyectos .....
Mapas conceptuales de proyectos .....Silvia Alba Gonzalez
 
PEDIDO DE PROVIDÊNCIA 814
PEDIDO DE PROVIDÊNCIA 814PEDIDO DE PROVIDÊNCIA 814
PEDIDO DE PROVIDÊNCIA 814vereadoreduardo
 
8i standby
8i standby8i standby
8i standby
Anil Pandey
 
Day 4 Reflection at #SXSW 2013 -- #SXSWOgilvy
Day 4 Reflection at #SXSW 2013 -- #SXSWOgilvyDay 4 Reflection at #SXSW 2013 -- #SXSWOgilvy
Day 4 Reflection at #SXSW 2013 -- #SXSWOgilvy
Ogilvy Consulting
 
Information wants to be free
Information wants to be freeInformation wants to be free
Information wants to be freeEric Tachibana
 
8ink 기획서V1 0 김수현,유지은
8ink 기획서V1 0 김수현,유지은8ink 기획서V1 0 김수현,유지은
8ink 기획서V1 0 김수현,유지은jin_yoo
 
The sps code of conduct 2011
The sps code of conduct 2011The sps code of conduct 2011
The sps code of conduct 2011bambangsaja
 
XVII Jornadas de Estudios de Lingüística: lenguaje y deporte
XVII Jornadas de Estudios de Lingüística: lenguaje y deporteXVII Jornadas de Estudios de Lingüística: lenguaje y deporte
XVII Jornadas de Estudios de Lingüística: lenguaje y deporte
María del Carmen Méndez Santos
 

Viewers also liked (17)

Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
 
Security and social media
Security and social mediaSecurity and social media
Security and social media
 
WeChat operation
WeChat operationWeChat operation
WeChat operation
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
3º A 2015
3º A 20153º A 2015
3º A 2015
 
Excel dad6 8
Excel dad6 8Excel dad6 8
Excel dad6 8
 
効果的なXPの導入を目的とした プラクティス間の相互作用の分析
効果的なXPの導入を目的とした プラクティス間の相互作用の分析効果的なXPの導入を目的とした プラクティス間の相互作用の分析
効果的なXPの導入を目的とした プラクティス間の相互作用の分析
 
Ms word1
Ms word1Ms word1
Ms word1
 
Profile Optimisation
Profile OptimisationProfile Optimisation
Profile Optimisation
 
Mapas conceptuales de proyectos .....
Mapas conceptuales de proyectos .....Mapas conceptuales de proyectos .....
Mapas conceptuales de proyectos .....
 
PEDIDO DE PROVIDÊNCIA 814
PEDIDO DE PROVIDÊNCIA 814PEDIDO DE PROVIDÊNCIA 814
PEDIDO DE PROVIDÊNCIA 814
 
8i standby
8i standby8i standby
8i standby
 
Day 4 Reflection at #SXSW 2013 -- #SXSWOgilvy
Day 4 Reflection at #SXSW 2013 -- #SXSWOgilvyDay 4 Reflection at #SXSW 2013 -- #SXSWOgilvy
Day 4 Reflection at #SXSW 2013 -- #SXSWOgilvy
 
Information wants to be free
Information wants to be freeInformation wants to be free
Information wants to be free
 
8ink 기획서V1 0 김수현,유지은
8ink 기획서V1 0 김수현,유지은8ink 기획서V1 0 김수현,유지은
8ink 기획서V1 0 김수현,유지은
 
The sps code of conduct 2011
The sps code of conduct 2011The sps code of conduct 2011
The sps code of conduct 2011
 
XVII Jornadas de Estudios de Lingüística: lenguaje y deporte
XVII Jornadas de Estudios de Lingüística: lenguaje y deporteXVII Jornadas de Estudios de Lingüística: lenguaje y deporte
XVII Jornadas de Estudios de Lingüística: lenguaje y deporte
 

Similar to 20160317 ARMA Wyoming Social Media Security Threats

20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
Jesse Wilkins
 
20150916 ARMA Pittsburgh Do's and Don'ts of Managing Social Media
20150916 ARMA Pittsburgh Do's and Don'ts of Managing Social Media20150916 ARMA Pittsburgh Do's and Don'ts of Managing Social Media
20150916 ARMA Pittsburgh Do's and Don'ts of Managing Social Media
Jesse Wilkins
 
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
Jesse Wilkins
 
20140423 ARMA Houston How to Conduct a Social Business Assessment.pptx
20140423 ARMA Houston How to Conduct a Social Business Assessment.pptx20140423 ARMA Houston How to Conduct a Social Business Assessment.pptx
20140423 ARMA Houston How to Conduct a Social Business Assessment.pptx
Jesse Wilkins
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
SurajGurushetti
 
Hacking3e ppt ch13
Hacking3e ppt ch13Hacking3e ppt ch13
Hacking3e ppt ch13
Skillspire LLC
 
20160317 ARMA Wyoming Governance for Social Media
20160317 ARMA Wyoming Governance for Social Media20160317 ARMA Wyoming Governance for Social Media
20160317 ARMA Wyoming Governance for Social Media
Jesse Wilkins
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Darkside
DarksideDarkside
Darkside
Kenie Moses
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
REVULN
 
The Danger and Risk of AI
The Danger and Risk of AIThe Danger and Risk of AI
The Danger and Risk of AI
Apac Business Headlines
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
seadeloitte
 
5 Cybersecurity Threats Your Business Can't Afford to Ignore
5 Cybersecurity Threats Your Business Can't Afford to Ignore5 Cybersecurity Threats Your Business Can't Afford to Ignore
5 Cybersecurity Threats Your Business Can't Afford to Ignore
WSI WebAnalys
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
EC-Council
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
scstatelibrary
 
Mom phd
Mom phdMom phd
Mom phd
Anne ndolo
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
Excellence Foundation for South Sudan
 

Similar to 20160317 ARMA Wyoming Social Media Security Threats (20)

20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
 
20150916 ARMA Pittsburgh Do's and Don'ts of Managing Social Media
20150916 ARMA Pittsburgh Do's and Don'ts of Managing Social Media20150916 ARMA Pittsburgh Do's and Don'ts of Managing Social Media
20150916 ARMA Pittsburgh Do's and Don'ts of Managing Social Media
 
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
20140424 AIIM Western Canada Webinar on IM and Social Media.pptx
 
20140423 ARMA Houston How to Conduct a Social Business Assessment.pptx
20140423 ARMA Houston How to Conduct a Social Business Assessment.pptx20140423 ARMA Houston How to Conduct a Social Business Assessment.pptx
20140423 ARMA Houston How to Conduct a Social Business Assessment.pptx
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
Hacking3e ppt ch13
Hacking3e ppt ch13Hacking3e ppt ch13
Hacking3e ppt ch13
 
20160317 ARMA Wyoming Governance for Social Media
20160317 ARMA Wyoming Governance for Social Media20160317 ARMA Wyoming Governance for Social Media
20160317 ARMA Wyoming Governance for Social Media
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Darkside
DarksideDarkside
Darkside
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
 
The Danger and Risk of AI
The Danger and Risk of AIThe Danger and Risk of AI
The Danger and Risk of AI
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
5 Cybersecurity Threats Your Business Can't Afford to Ignore
5 Cybersecurity Threats Your Business Can't Afford to Ignore5 Cybersecurity Threats Your Business Can't Afford to Ignore
5 Cybersecurity Threats Your Business Can't Afford to Ignore
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Mom phd
Mom phdMom phd
Mom phd
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 

More from Jesse Wilkins

20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
Jesse Wilkins
 
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
Jesse Wilkins
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
Jesse Wilkins
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
Jesse Wilkins
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
Jesse Wilkins
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
Jesse Wilkins
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
Jesse Wilkins
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
Jesse Wilkins
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
Jesse Wilkins
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
Jesse Wilkins
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
Jesse Wilkins
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
Jesse Wilkins
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
Jesse Wilkins
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
Jesse Wilkins
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
Jesse Wilkins
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
Jesse Wilkins
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
Jesse Wilkins
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
Jesse Wilkins
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
Jesse Wilkins
 
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
Jesse Wilkins
 

More from Jesse Wilkins (20)

20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
 
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
 
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
 

Recently uploaded

EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
ClarissaAlanoCredito
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
SocioCosmos
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
AJHSSR Journal
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
zeqirielmedina8
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
AJHSSR Journal
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 

Recently uploaded (17)

EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 

20160317 ARMA Wyoming Social Media Security Threats

  • 1. Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals Social Media Security Threats Jesse Wilkins, CIP, IGP, CRM Director, Professional Development AIIM March 17, 2016
  • 2. Copyright © AIIM | All rights reserved.2 Jesse Wilkins, CIP, IGP, CRM  Director, Research & Development, AIIM  Twenty years experience as a vendor, consultant, end user, trainer  Lead architect for Certified Information Professional (CIP) certification  Frequent author and speaker on IM-related topics  Developer, AIIM Social Media Governance Training Course
  • 3. Copyright © AIIM | All rights reserved.3 Agenda  Introduction to Social Media & Security  Social Media & Identity Theft  Social Media & Hacking  Social Media & Privacy
  • 4. Copyright © AIIM | All rights reserved.4 Agenda Introduction to Social Media & Security Social Media & Identity Theft Social Media & Hacking Social Media & Privacy
  • 5. Copyright © AIIM | All rights reserved.5 Social Is Everywhere  1,350+ years worth of time spent every day on Facebook.  1.7B Facebook users.  65% log in on any day - and post 4.5B likes/day.  300M photos uploaded per day.  And…  Twitter and LinkedIn and Pinterest and Google+ and Tumblr and Flickr and Instagram and Myspace(!) and Livejournal and Orkut and Yammer and WhatsApp and blogs and millions
  • 6. Copyright © AIIM | All rights reserved.6 Social Media Is Social  Making connections  Reestablishing lost connections  Making new ones  Sharing information  Sharing thoughts & moments  Searching for interesting stuff  All of which can be scary from a security perspective!
  • 7. Copyright © AIIM | All rights reserved.7 Who Owns The Content?
  • 8. Copyright © AIIM | All rights reserved.8 What Laws & Jurisdictions Apply?
  • 9. Copyright © AIIM | All rights reserved.9 Who Owns The Accounts?
  • 10. Copyright © AIIM | All rights reserved.10 Social Media Security Threats  Identity theft  Impersonation  Hacking  Privacy disclosures  Disclosure of other sensitive information  Reputational damage
  • 11. Copyright © AIIM | All rights reserved.11 Neither is denial. Prohibition is not realistic.
  • 12. Copyright © AIIM | All rights reserved.12 Agenda Social Media & Identity Theft Introduction to Social Media & Security Social Media & Hacking Social Media & Privacy
  • 13. Copyright © AIIM | All rights reserved.13 Impersonation  Fake account pretending to be a celebrity, politician, etc.  You connect, they have access to your stuff  Their links could be to malware or spoof sites
  • 14. Copyright © AIIM | All rights reserved.14 Impersonation  Fake account pretending to be YOU  Your friends (re)connect to “you”, bad guys have access to their stuff  “You” send out bad links  “You” send out requests for money etc.  Big issue on social networks you DON’T use
  • 15. Copyright © AIIM | All rights reserved.15 Social Media Identity Theft  How much have you shared?  Significant dates  High school, college  Kids’ names  Parents’ names  Pets’ names  Favorite books & hobbies  On the internet nobody knows you’re a dog…  Or an imposter!
  • 16. Copyright © AIIM | All rights reserved.16 Agenda Social Media & Hacking Social Media & Identity Theft Introduction to Social Media & Security Social Media & Privacy
  • 17. Copyright © AIIM | All rights reserved.17 Hacking Via Social Engineering  Bad links:  https://www.facebook.com/login/identify  http://bit.ly/50m47h1ng84d  Spoofed emails with bad links  Spoofed site – you enter your credentials  Site may be able to install malware  Adware  Keystroke loggers  Other stuff
  • 18. Copyright © AIIM | All rights reserved.18 Hacking Via Social Engineering  Special addons  “Who viewed my FB posts?”  “Change your FB profile & colors!”  Could simply lead to bad link  Could have you install a bad app  Game apps a big vector here – “cheat apps”
  • 19. Copyright © AIIM | All rights reserved.19 Hacking Via Bad App example Source: https://www.symantec.com/content/en/us/enterprise/media /security_response/whitepapers/the_risks_of_social_networ king.pdf
  • 20. Copyright © AIIM | All rights reserved.20 Another Bad App Example - Walkthrough http://www.fightidentitytheft.com/blog/facebook-quizzes-sharing-your-private-data
  • 21. Copyright © AIIM | All rights reserved.21 Another Bad App Example - Walkthrough http://www.fightidentitytheft.com/blog/facebook-quizzes-sharing-your-private-data
  • 22. Copyright © AIIM | All rights reserved.22 Another Bad App Example - Walkthrough http://www.fightidentitytheft.com/blog/facebook-quizzes-sharing-your-private-data
  • 23. Copyright © AIIM | All rights reserved.23 Hacking Via Social Engineering  How much did you share?  Those questions are often:  Basis for passwords  Security questions  All those QUIZZES!
  • 24. Copyright © AIIM | All rights reserved.24 Hacking Via Shared Passwords  Across your accounts  With others – even significant others
  • 25. Copyright © AIIM | All rights reserved.25 Agenda Social Media & Privacy Social Media & Identity Theft Introduction to Social Media & Security Social Media & Hacking
  • 26. Copyright © AIIM | All rights reserved.26 What Are You Posting?  Your favorite stuff  Where you are  And where you aren’t  http://www.pleaserobme.com  What you’re doing  Home sick…posting pics from the big game?  Gaming?
  • 27. Copyright © AIIM | All rights reserved.27 What Are You Posting?  “I hate my boss, I hate my customers, I hate my job!” -- Lots of people
  • 28. Copyright © AIIM | All rights reserved.28 What Are You Posting?  “Just figured out how to get around IT’s stupid limits on email! -- Lots of politicians (and lots of employees)
  • 29. Copyright © AIIM | All rights reserved.29 What Are You Posting?  “That feeling when you drank so much the night before but you have no hangover because you’re still drunk!” -- Hopefully NOT your boss, your pilot, your surgeon…
  • 30. Copyright © AIIM | All rights reserved.30 What Are You Posting?  And the usual suspects:  Personal/personnel information  Proprietary information  Sensitive or confidential information  Customer information  Internal strategies & deliberations  Negotiations  Pictures including faces
  • 31. Copyright © AIIM | All rights reserved.31 What Are Other People Posting?  Other people can:  Upload pictures of you and tag you  (Facebook will try to auto-tag you using facial recognition)  Check in with you at a location  Check you into a location  Share stuff to your timeline
  • 32. Copyright © AIIM | All rights reserved.32 Other Peoples’ Posts
  • 33. Copyright © AIIM | All rights reserved.33 Other Peoples’ Posts
  • 34. Copyright © AIIM | All rights reserved.34 Other Peoples’ Posts
  • 35. Copyright © AIIM | All rights reserved.35 Conclusion  It’s a scary social media world out there!  But you can protect yourself…
  • 36. Copyright © AIIM | All rights reserved.36 Questions?
  • 37. Copyright © AIIM | All rights reserved.37 Additional Resources  Social Media Policy Database  http://socialmediagovernance.com/policies/  SHRM Social Media Policy Template  http://www.shrm.org/templatestools/samples/policies/pages/social mediapolicy.aspx  NARA Best Practices for Capture of Social Media Records  http://www.archives.gov/records- mgmt/resources/socialmediacapture.pdf  AIIM Social Business Assessment  http://info.aiim.org/how-to-conduct-a-social-business-assessment  AIIM Social Business Roadmap  http://www.aiim.org/Social-Business-Roadmap
  • 38. Copyright © AIIM | All rights reserved.38 For More Information Jesse Wilkins, CIP, CRM, IGP Director, Professional Development AIIM International +1 (720) 232-9638 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins

Editor's Notes

  1. AIIM has been an advocate and supporter of information professionals for nearly 70 years. The association mission is to ensure that information professionals understand the current and future challenges of managing information assets in an era of social, mobile, cloud and big data. Founded in 1943, AIIM builds on a strong heritage of research and member service. Today, AIIM (Association for Information and Image Management) is a global, non-profit organization that provides independent research, education and certification programs to over 65,000 information professionals. AIIM represents the entire information management community, with programs and content for practitioners, technology suppliers, integrators and consultants.
  2. At this point I’d be pleased to entertain your questions.