20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
This session from the ARMA Wyoming 2016 Spring Seminar outlined the different security threats social media provides to individuals as well as organizations.
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
This session from the ARMA Wyoming 2016 Spring Seminar outlined the different security threats social media provides to individuals as well as organizations.
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
Cyber security for women using mobile devicesJ A Bhavsar
While the presentation was made for women most of the points are applicable to any Internet user. This presentation attempts to inform people about staying safe from cyber crime.
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
WikiLeaks stands as a warning for all of us responsible for protecting the digital assets and intellectual property (IP) of our organizations.
It is tempting to think that WikiLeaks, and the explosion of similar whistleblower and vigilante sites, as only interested in information from government, military, or political organizations. But a recent Forbes interview with WikiLeaks founder Julian Assange has a warning for us all.
Slides for a talk on "Online Privacy" given by Dave Raggett at UKOLN’s IWMW 2011 event held at the University of Reading on 25-26 July 2011.
See http://iwmw.ukoln.ac.uk/iwmw2011/talks/raggett/
Many security breaches we saw in the past few years and how it affect the number of businesses it include large and small businesses. We will study what is breach and how it will effect on our business and what are the main causes of it. Why social media account is harm for us and how the largest organizations got breached and how would we stop to get breach our data. Our main target Is related to business it could be small or large business. We will discuss that how companies got lost their reputation because of data breach and how much companies got loss of money it include the organization that we all are known about it like Facebook.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
Cyber security for women using mobile devicesJ A Bhavsar
While the presentation was made for women most of the points are applicable to any Internet user. This presentation attempts to inform people about staying safe from cyber crime.
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
WikiLeaks stands as a warning for all of us responsible for protecting the digital assets and intellectual property (IP) of our organizations.
It is tempting to think that WikiLeaks, and the explosion of similar whistleblower and vigilante sites, as only interested in information from government, military, or political organizations. But a recent Forbes interview with WikiLeaks founder Julian Assange has a warning for us all.
Slides for a talk on "Online Privacy" given by Dave Raggett at UKOLN’s IWMW 2011 event held at the University of Reading on 25-26 July 2011.
See http://iwmw.ukoln.ac.uk/iwmw2011/talks/raggett/
Many security breaches we saw in the past few years and how it affect the number of businesses it include large and small businesses. We will study what is breach and how it will effect on our business and what are the main causes of it. Why social media account is harm for us and how the largest organizations got breached and how would we stop to get breach our data. Our main target Is related to business it could be small or large business. We will discuss that how companies got lost their reputation because of data breach and how much companies got loss of money it include the organization that we all are known about it like Facebook.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
When it comes to social media, most of us expect that we are in control of what we share about ourselves, and who we share with. In this hands-on workshop, we will dispel common myths and misconception about social media privacy as well as discuss step-by-step instructions for securing out social media selves.
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
All request please fwd to wah17@yahoo.com.My linkedin is wah17@yahoo.com.A copy of the full research is here:
http://www.scribd.com/share/upload/4814477/2dx6gqho7w9gwvvrwbhq
Cybersecurity is difficult. It is a serious endeavor which over time strives to find a balance in managing the security of computing capabilities to protect the technology which connects and enriches the lives of everyone. Characteristics of cyber risk continue to mature and expand on the successes of technology innovation, integration, and adoption. It is no longer a game of tactics, but rather a professional discipline, continuous in nature, where to be effective strategic leadership must establish effective and efficient structures for evolving controls to sustain an optimal level of security.
This presentation will discuss the emerging challenges as it analyzes the cause-and-effect relationships of factors driving the future of cybersecurity.
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...SurfWatch Labs
Credit Unions have to deal with the same cybercrime-related issues as large banks, but they often have less resources to address those risks. Cyber risk intelligence can help to make sure they use those limited resources wisely.
Breaking down the cyber security framework closing critical it security gapsIBM Security
Cyber crime is pervasive and here to stay. Whether you work in the Public Sector, Private Sector, are the CEO for a Fortune 500 Company or trying to sustain a SMB everyone is under attack. This February, President Obama, issued an executive order aimed at protecting critical business and government infrastructure due to the scale and sophistication of IT security threats that have grown at an explosive rate. Organizations and Government agencies have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more focused adversary with the resources and capabilities to target highly sensitive information, often through long-term attack campaigns. Many security executives are struggling to answer questions about the most effective approach.
The 1% Who Can Take Down your OrganizationCloudLock
The Cloud Cybersecurity Lessons We Learned from 10M Users. Learn about the top cloud cybersecurity trends that fly under your radar, what the distribution of cloud cybersecurity risk means for your ability to act on it, along with 3 key security skills you should master for an immediately safer cloud environment.
3 guiding priciples to improve data securityKeith Braswell
The information explosion, the proliferation of endpoint devices, growing user volumes, and new computing models like cloud, social business, and big data have created new security vulnerabilities. To secure sensitive data and address compliance requirements, organizations need to adopt a more proactive and systematic approach. Read this white paper to learn three simple guiding principles to help your organization achieve better security and compliance without impacting production systems or straining already-tight budgets.
While traditional cybersecurity defenses focus on prevention, there are many vulnerabilities and potential attacks against weapon systems. While weapon systems are more software dependent and networked than ever before, cybersecurity has not always been prioritized with regards to weapon systems acquisition.
Threat actors have advanced in their sophistication as they are well-resourced and highly skilled, oftentimes gathering detailed knowledge of the systems they want to attack. Ensuring stronger detection methods is imperative, but because these types of threats are very targeted and advanced, agencies need the capability to proactively hunt.
Symantec 2011 Social Media Protection Flash Poll Global ResultsSymantec
Symantec’s 2011 Social Media Protection Flash Poll examines how organizations protect themselves from negative consequences of using social networking sites such as Facebook, Twitter and other online forums. The poll revealed that social media is pervasive within the enterprise, and IT departments have good reason to be worried. The typical enterprise experienced nine social media incidents such employees posting confidential information publicly over the past year, with 94 percent suffering negative consequences including damage to their reputations, loss of customer trust, data loss and lost revenue.
This presentation discusses the massive increases in cyber threats and the best ways to keep your data safe. Through this presentation, you will learn the best practices for implementing and testing a data security program.
Best Practices for Secure Enterprise Social Media DeploymentsSprinklr
Deploying Social Media at Enterprise Scale requires a different set of priorities for compliance, governance, and risk. If you are looking for best practices as it relates to how global companies are deploying social at scale, this checklist should help.
Sprinklr has helped global brands with implementations in over 50 countries. We’ve assembled some best practices in an easy checklist for those concerned with issues around compliance, governance, and risk.
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
My slide deck used in People Management Association of the Philippines' (PMAP) Data Privacy Act Forum held last 18 SEP 2017 at Ace Hotel & Suites, Pasig City.
1. Social Media Security:
How Social Media May Leave You Vulnerable
Timothy Youngblood
Dell, Compliance and Information Security Officer
2. Social media platforms have entered
the enterprise
24hrs of Video per
300 Million Users 75 Million Accts
Min
3% Growth Per 6 Million Unique
3 Million Auto
Week Visitors
Connects
30 Billion Page 65 Million Tweets
2 Billion Views Per
Views Per Day Per Day
Day
Public Sector / Private Sector
Business Partners/Customers/End Users
2
12. Social Media in the headlines
Twitter virus among
shortest on record ….
Mark Zuckerberg's
Facebook Page Hacked ….
YouTube Hack Hits
Bieber Fans….
12
21. Federal Guidelines
Guidelines for Secure Use of
Social Media by Federal
Departments and Agencies
Training
Network Controls
Host Controls
Policy Controls
www.cio.gov/library/
21
32. Policies Protect the Organization
Over Sharing
Information
(Intellectual Property)
Mixing Business with
Personal info
(Tweet/Facebook/MyS
pace/ect..) Rage
Connection indulgence
Click Happiness
Password Sloth
32
34. Guidelines
• Protect information
• Be transparent and disclose
• associations
• Follow the law, follow the Code
• Be responsible
• Be nice, have fun and connect
34
35. Controls ensure policies are followed
• Change Implementation
• Information Security
• Program Development
• Disaster Recovery
• Contracting
• Facilities
• IT Governance
• IT Operations
35
38. ISACA – Social Media Presence
Strategy and • Has a risk assessment been conducted to map risks to
the enterprise present by use of social media?
Governance
• Has effective training been conducted for all users, and
People do users receive regular awareness communications
regarding policies and risks?
• Have business processes that utilize social media been
Process reviewed to ensure that they are aligned with policies
and standards of the enterprise?
• Does IT have a strategy and the supporting capabilities
Technology to manage technical risks presented by social media?
38
42. Social Media Security Strategy
Risk
Technology
Social Media
Platforms Defined? Policy
How do current
How are the solutions address Are employees
platforms utilized? the threats? trained on how to
Who is currently Are there supporting use Social Media?
utilizing them? technologies to Are there supporting
address risk? controls and
policies?
42