SlideShare a Scribd company logo
#SecurityWithSysomos
#SecurityWithSysomos
Agenda
• Introduction
• Why Threat Detection?
• Types of Threats: Cyber, Physical
• Means of Protection: Digital Property, Fraud, Copy Cat
• How to Start
• Q&A
#SecurityWithSysomos
Why Monitor Threat
Detection?
Why Monitor Threat Detection?
• Social Media is great for broadcasting information…for positive actions as well as
malicious ones
• Remember: there are no limits to what people will post on social media
• Marketers leverage Social Media as their “haystack” for brand, competitive, and
influencer purposes
• We can utilize these same ideas and tools for security and threat detection
• We will expect a relatively small number of mentions, but when they occur, they
are extremely actionable and relevant. All it takes is one.
How susceptible is your
business to security threats?
What If You Don’t Monitor for Security and Threats?
PROACTIVE is always better than REACTIVE
when it comes to security threats.
#SecurityWithSysomos
What Is the Cost of Not
Looking Out for Threats?
#SecurityWithSysomos
Use Case: Cyber Security
• One of the largest news sources and
news distributors in the world
• Owns many digital news properties that
are relied on heavily by their advertisers
• Same digital properties are very
attractive targets for hackers
• DDoS (Distributed Denial of Service
Attack): Overloads company
website/network by sending numerous
packets of information – making users
unable to access
Use Case: Cyber Threats
• Can Social Predict DDoS attacks and
other Cyber threats? Indirectly, yes.
• Utilizing email alerts
• Setting post frequency threshold
limits for a ‘true attack’
• Creating the threshold: from historical
attacks in the past year, 1000
mentions signified an attack and an
unusual number of mentions
• Cost to a company between
$5,000 to $100,000 /hr
• 49% of DDoS attacks last
between 6 – 24 hrs
Use Case: Cyber Threats
• Finding the bad apples and repeat
offenders
With a social media research platform
you can actively find and make lists of
social users and accounts who have:
• Targeted you in the past
• Act as early warning systems for
attacks
• Use language that indicates attacks
• Are part of communities often
involved in attacks
#SecurityWithSysomos
Use Case: Physical Threats
• Same large news source and distributor
• Has many publically known and
recognizable on-air talents,
personalities and executives working
for them
• Regularly receive physical threats
against these people
• Solution was to use long complex
trigger tags with keywords for every
possible scenario of a physical threat
Use Case: Physical Threats
• Example of a trigger tag:
"John Doe Harm"~3 OR "John Doe Hurt"~3 OR "John
Doe Vandalize"~3 OR "John Doe Vandalizes"~3 OR
"John Doe Vandalizing"~3 OR "John Doe Strike"~3 OR
"John Doe Attack"~3 OR "John Doe Loss of Life"~3 OR
"John Doe Kill"~3 OR "John Doe Killed"~3 OR "John
Doe Killing"~3 OR "John Doe Find"~3 OR "John Doe
Hackers"~3 OR "John Doe Hacking"~3 OR "John Doe
Cyber Attack"~3 OR "John Doe CyberAttack"~3 OR
"John Doe CyberAttacker"~3 OR "John Doe Cyber
Army"~3 OR "John Doe CyberArmy"~3 OR "John Doe
Al-Qaeda"~3 OR "John Doe AlQaeda"~3 OR "John Doe
Al Qaeda"~3 OR "John Doe Hacker"~3 OR "John Doe
Threat"~3 OR "John Doe Threatening"~3 OR "John
Doe Threatened"~3 OR "John Doe Plane Crash"~3 OR
"John Doe Suicide Attack"~3 OR "John Doe Suicide
Bomber"~3
• A tag like this can trigger an email alert,
be routed into a custom dashboard, or
be integrated through an API feed into a
command center with additional data
points outside of social
• Many different trigger tags can be made
for every possible security or threat
scenario
• Once these are made they can be
replicated for locations, peoples names,
various business assets and more
#SecurityWithSysomos
Use Case: Copy Cat
• Every time a Twitter handle pops up with
the brand name – any derivation thereof –
an alert is triggered
• Allows risk and security staff to identify
and take action on unauthorized user
accounts
• Ensures the reputation of the brand is not
compromised by a malicious attack
(from:a*_widget OR from:b*_widget OR
from:c*_widget OR from:d*_widget OR
from:e*_widget OR from:f*_widget OR
from:g*_widget OR from:h*_widget OR
from:i*_widget OR from:j*_widget OR
from:k*_widget OR from:l*_widget OR
from:m*_widget OR from:n*_widget OR
from:o*_widget OR from:p*_widget OR
from:q*_widget OR from:r*_widget OR
from:s*_widget OR from:t*_widget OR
from:u*_widget OR from:v*_widget OR
from:w*_widget OR from:x*_widget OR
from:y*_widget OR from:z*_widget OR
from:widget_a* OR from:widget_b* OR
from:widget_c* OR from:widget_d* OR
from:widget_e* OR from:widget_f* OR
from:widget_g* OR from:widget_h* OR
from:widget_i* OR from:widget_j* OR
from:widget_k*
#SecurityWithSysomos
#SecurityWithSysomos
Use Case: Piracy Protection
• Multinational Media Brand, and a
Multinational Sports Entertainment Group
• Heavily rely on revenues generated from
pay per view content, as well as protected
content, such as TV shows, and movies
• Major issue with leaked content before
release dates as well as illegal streaming
of content during events
Use Case: Piracy Protection
• Finding the source of illegal streaming, and also those helping to broadcast it
• Look for the most retweeted content, and the largest retweet spreads
• Find the original post promoting an illegal streaming source
• Create lists to track, monitor, and be alerted to these sources
((stream OR streaming OR
torrent OR livestream OR
online OR free OR “free
download” OR “streaming
online” OR “watch the”)
AND ("the martian" OR
martian OR themartian)
AND NOT (trailer))
#SecurityWithSysomos
Use Case: Fraud Detection
• Using visual cues – or ‘listening’ – as a
means to capture and track image-driven
content
• Illegal tickets
• Unauthorized apparel
• Phishing Scams
#SecurityWithSysomos
#SecurityWithSysomos
Three Things to Know
1. Survey the landscape and out what
existing conversations regarding threats are
happening on social
To surface conversations, think and search
social channels on:
• Related industries
• Known threats and security events from
the past
• Various market segments you are
involved in
#SecurityWithSysomos
Three Things to Know
2. Monitor for threats against your brand,
your executives, your office locations, etc.
Things to Consider:
• Have we scoped out a process and
workflow for any threats that may
occur?
– What resources need to
leveraged internally when a
threat takes place?
• Can we identify malicious actors that
need to monitored on an ongoing
basis?
#SecurityWithSysomos
Three Things to Know
3. Look beyond the text
Not all conversations about security will
happen via copy – think about how people
are sharing information:
• Instagram
• Facebook
• Tumblr
• Reddit
#SecurityWithSysomos
After the Presentation
• Feel free to contact us for follow up questions @Sysomos
• Please visit sysomos.com/webinars to sign up for great Sysomos webinars
Thank You!
@Sysomos

More Related Content

What's hot

PR in the Era of Fake News
PR in the Era of Fake NewsPR in the Era of Fake News
PR in the Era of Fake News
Sandra Fathi
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Chuck Brooks
 
Gates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringGates Toorcon X New School Information Gathering
Gates Toorcon X New School Information Gathering
Chris Gates
 
How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...
Kellyton Brito
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Chuck Brooks
 
Cyber criminals
Cyber criminalsCyber criminals
Cyber criminalsAin Mazlan
 
Big Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro SistiBig Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro Sisti
Data Driven Innovation
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
William Gregorian
 
Cyber propaganda
Cyber propagandaCyber propaganda
Cyber propaganda
Hadi Fadlallah
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
Case IQ
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
AnnaliseKnudson
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
AnnaliseKnudson
 
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Chuck Brooks
 
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Ahmed Musaad
 
Why is cybersecurity important for the entertainment industry
Why is cybersecurity important for the entertainment industry Why is cybersecurity important for the entertainment industry
Why is cybersecurity important for the entertainment industry
Lisa Stockley
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
cfeutlinske
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
axnv
 

What's hot (20)

PR in the Era of Fake News
PR in the Era of Fake NewsPR in the Era of Fake News
PR in the Era of Fake News
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Gates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringGates Toorcon X New School Information Gathering
Gates Toorcon X New School Information Gathering
 
How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
 
Cyber criminals
Cyber criminalsCyber criminals
Cyber criminals
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Big Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro SistiBig Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro Sisti
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber propaganda
Cyber propagandaCyber propaganda
Cyber propaganda
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
 
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
 
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Why is cybersecurity important for the entertainment industry
Why is cybersecurity important for the entertainment industry Why is cybersecurity important for the entertainment industry
Why is cybersecurity important for the entertainment industry
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 

Viewers also liked

Facebook Topic Data With Sysomos Scout
Facebook Topic Data With Sysomos ScoutFacebook Topic Data With Sysomos Scout
Facebook Topic Data With Sysomos Scout
Sysomos
 
How To Use Social Data Analytics To Win At Everything
How To Use Social Data Analytics To Win At EverythingHow To Use Social Data Analytics To Win At Everything
How To Use Social Data Analytics To Win At Everything
Sysomos
 
Introducing Sysomos Map 2.0
Introducing Sysomos Map 2.0Introducing Sysomos Map 2.0
Introducing Sysomos Map 2.0
Sysomos
 
Cloud Security Monitoring and Spark Analytics
Cloud Security Monitoring and Spark AnalyticsCloud Security Monitoring and Spark Analytics
Cloud Security Monitoring and Spark Analytics
amesar0
 
Sysomos Beyond the Numbers - Social Media Crisis Management
Sysomos Beyond the Numbers - Social Media Crisis ManagementSysomos Beyond the Numbers - Social Media Crisis Management
Sysomos Beyond the Numbers - Social Media Crisis Management
Sysomos
 
Sysomos Beyond the Numbers - Boolean Query Lesson 2016
Sysomos Beyond the Numbers - Boolean Query Lesson 2016Sysomos Beyond the Numbers - Boolean Query Lesson 2016
Sysomos Beyond the Numbers - Boolean Query Lesson 2016
Sysomos
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014
Dan Michaluk
 
AEJM Conference - Event Report
AEJM Conference - Event ReportAEJM Conference - Event Report
AEJM Conference - Event Report
Sysomos
 
Facebook Topic Data Meets the Power of Insightpool
Facebook Topic Data Meets the Power of InsightpoolFacebook Topic Data Meets the Power of Insightpool
Facebook Topic Data Meets the Power of Insightpool
Insightpool, the Influencer Marketing Platform
 
Fraud Analytics Techniques Moving Into Security
Fraud Analytics Techniques Moving Into SecurityFraud Analytics Techniques Moving Into Security
Fraud Analytics Techniques Moving Into Security
Bruno Motta Rego
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
Deep Social Insight
Deep Social InsightDeep Social Insight
Deep Social Insight
Sysomos
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
Alejandro Correa Bahnsen, PhD
 
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk
 
Proofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social MediaProofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social Media
DataStax Academy
 
Online Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarOnline Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics Webinar
Datameer
 
Customer Generated Content: Things Marketers Should Know
Customer Generated Content: Things Marketers Should KnowCustomer Generated Content: Things Marketers Should Know
Customer Generated Content: Things Marketers Should Know
Sysomos
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment Transactions
Christian Gügi
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
Gwen (Chen) Shapira
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
Hernan Huwyler
 

Viewers also liked (20)

Facebook Topic Data With Sysomos Scout
Facebook Topic Data With Sysomos ScoutFacebook Topic Data With Sysomos Scout
Facebook Topic Data With Sysomos Scout
 
How To Use Social Data Analytics To Win At Everything
How To Use Social Data Analytics To Win At EverythingHow To Use Social Data Analytics To Win At Everything
How To Use Social Data Analytics To Win At Everything
 
Introducing Sysomos Map 2.0
Introducing Sysomos Map 2.0Introducing Sysomos Map 2.0
Introducing Sysomos Map 2.0
 
Cloud Security Monitoring and Spark Analytics
Cloud Security Monitoring and Spark AnalyticsCloud Security Monitoring and Spark Analytics
Cloud Security Monitoring and Spark Analytics
 
Sysomos Beyond the Numbers - Social Media Crisis Management
Sysomos Beyond the Numbers - Social Media Crisis ManagementSysomos Beyond the Numbers - Social Media Crisis Management
Sysomos Beyond the Numbers - Social Media Crisis Management
 
Sysomos Beyond the Numbers - Boolean Query Lesson 2016
Sysomos Beyond the Numbers - Boolean Query Lesson 2016Sysomos Beyond the Numbers - Boolean Query Lesson 2016
Sysomos Beyond the Numbers - Boolean Query Lesson 2016
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014
 
AEJM Conference - Event Report
AEJM Conference - Event ReportAEJM Conference - Event Report
AEJM Conference - Event Report
 
Facebook Topic Data Meets the Power of Insightpool
Facebook Topic Data Meets the Power of InsightpoolFacebook Topic Data Meets the Power of Insightpool
Facebook Topic Data Meets the Power of Insightpool
 
Fraud Analytics Techniques Moving Into Security
Fraud Analytics Techniques Moving Into SecurityFraud Analytics Techniques Moving Into Security
Fraud Analytics Techniques Moving Into Security
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
Deep Social Insight
Deep Social InsightDeep Social Insight
Deep Social Insight
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment
 
Proofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social MediaProofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social Media
 
Online Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarOnline Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics Webinar
 
Customer Generated Content: Things Marketers Should Know
Customer Generated Content: Things Marketers Should KnowCustomer Generated Content: Things Marketers Should Know
Customer Generated Content: Things Marketers Should Know
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment Transactions
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 

Similar to Using Social Media for Security Monitoring

Social engineering
Social engineeringSocial engineering
Social engineering
Robert Hood
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
MuhammadShahidulIsla8
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
Chinatu Uzuegbu
 
Insider threats
Insider threatsInsider threats
Insider threats
izoologic
 
powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
deveraralph2
 
Phish training final
Phish training finalPhish training final
Phish training final
Jen Ruhman
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
LIFARS
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
Jack Kessler
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
Shahzad Younas
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
RedZone Technologies
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
Quick Heal Technologies Ltd.
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)eNetSPI
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
Xavier Mertens
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
MohammadYahyaMansuri
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
kiran yadav
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
srikmhh
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
Sean Whalen
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
Claus Cramon Houmann
 

Similar to Using Social Media for Security Monitoring (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Insider threats
Insider threatsInsider threats
Insider threats
 
powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
 
Phish training final
Phish training finalPhish training final
Phish training final
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)e
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 

More from Sysomos

The Sysomos Platform - Webcast Presentation
The Sysomos Platform - Webcast PresentationThe Sysomos Platform - Webcast Presentation
The Sysomos Platform - Webcast Presentation
Sysomos
 
Real Time Paid Social Advertising Analysis
Real Time Paid Social Advertising AnalysisReal Time Paid Social Advertising Analysis
Real Time Paid Social Advertising Analysis
Sysomos
 
Unlocking Insights With Facebook Topic Data
Unlocking Insights With Facebook Topic DataUnlocking Insights With Facebook Topic Data
Unlocking Insights With Facebook Topic Data
Sysomos
 
Managing a Growing Social Media Strategy - APAC
Managing a Growing Social Media Strategy - APACManaging a Growing Social Media Strategy - APAC
Managing a Growing Social Media Strategy - APAC
Sysomos
 
Social Customer Service Strategy
Social Customer Service StrategySocial Customer Service Strategy
Social Customer Service Strategy
Sysomos
 
Managing a Growing Social Media Strategy
Managing a Growing Social Media StrategyManaging a Growing Social Media Strategy
Managing a Growing Social Media Strategy
Sysomos
 
Sysomos Reports - The 2016 Oscars 2016
Sysomos Reports - The 2016 Oscars 2016Sysomos Reports - The 2016 Oscars 2016
Sysomos Reports - The 2016 Oscars 2016
Sysomos
 
Sysomos Reports: Super Bowl 50
Sysomos Reports: Super Bowl 50Sysomos Reports: Super Bowl 50
Sysomos Reports: Super Bowl 50
Sysomos
 
Coming From Sysomos In 2016
Coming From Sysomos In 2016Coming From Sysomos In 2016
Coming From Sysomos In 2016
Sysomos
 
New Improvements to Heartbeat 2.0
New Improvements to Heartbeat 2.0New Improvements to Heartbeat 2.0
New Improvements to Heartbeat 2.0
Sysomos
 
Unleash The Power Of Visual Social Media For Your Brand
Unleash The Power Of Visual Social Media For Your BrandUnleash The Power Of Visual Social Media For Your Brand
Unleash The Power Of Visual Social Media For Your Brand
Sysomos
 
The Future of Social Data: Social Intelligence - A presentation from #SMWChicago
The Future of Social Data: Social Intelligence - A presentation from #SMWChicagoThe Future of Social Data: Social Intelligence - A presentation from #SMWChicago
The Future of Social Data: Social Intelligence - A presentation from #SMWChicago
Sysomos
 
Sysomos Monthly Webinar September - Sysomos and Expion Come Together
Sysomos Monthly Webinar September - Sysomos and Expion Come TogetherSysomos Monthly Webinar September - Sysomos and Expion Come Together
Sysomos Monthly Webinar September - Sysomos and Expion Come Together
Sysomos
 
Using Social Intelligence for Business Decision Making - A Masterclass Presen...
Using Social Intelligence for Business Decision Making - A Masterclass Presen...Using Social Intelligence for Business Decision Making - A Masterclass Presen...
Using Social Intelligence for Business Decision Making - A Masterclass Presen...
Sysomos
 
Smart Brand Social Storytelling
Smart Brand Social StorytellingSmart Brand Social Storytelling
Smart Brand Social Storytelling
Sysomos
 
Sysomos Monthly Webinar July - Social Listening 101
Sysomos Monthly Webinar July - Social Listening 101Sysomos Monthly Webinar July - Social Listening 101
Sysomos Monthly Webinar July - Social Listening 101
Sysomos
 
Putting Social Intelligence To Work (from #SMWLA)
Putting Social Intelligence To Work (from #SMWLA)Putting Social Intelligence To Work (from #SMWLA)
Putting Social Intelligence To Work (from #SMWLA)
Sysomos
 
2015 Oscars - A Sysomos Twitter Report
2015 Oscars - A Sysomos Twitter Report2015 Oscars - A Sysomos Twitter Report
2015 Oscars - A Sysomos Twitter Report
Sysomos
 
Grammys 2015 - Sysomos Twitter Report
Grammys 2015 - Sysomos Twitter ReportGrammys 2015 - Sysomos Twitter Report
Grammys 2015 - Sysomos Twitter Report
Sysomos
 
Sysomos Reports: Super Bowl XLIX
Sysomos Reports: Super Bowl XLIXSysomos Reports: Super Bowl XLIX
Sysomos Reports: Super Bowl XLIX
Sysomos
 

More from Sysomos (20)

The Sysomos Platform - Webcast Presentation
The Sysomos Platform - Webcast PresentationThe Sysomos Platform - Webcast Presentation
The Sysomos Platform - Webcast Presentation
 
Real Time Paid Social Advertising Analysis
Real Time Paid Social Advertising AnalysisReal Time Paid Social Advertising Analysis
Real Time Paid Social Advertising Analysis
 
Unlocking Insights With Facebook Topic Data
Unlocking Insights With Facebook Topic DataUnlocking Insights With Facebook Topic Data
Unlocking Insights With Facebook Topic Data
 
Managing a Growing Social Media Strategy - APAC
Managing a Growing Social Media Strategy - APACManaging a Growing Social Media Strategy - APAC
Managing a Growing Social Media Strategy - APAC
 
Social Customer Service Strategy
Social Customer Service StrategySocial Customer Service Strategy
Social Customer Service Strategy
 
Managing a Growing Social Media Strategy
Managing a Growing Social Media StrategyManaging a Growing Social Media Strategy
Managing a Growing Social Media Strategy
 
Sysomos Reports - The 2016 Oscars 2016
Sysomos Reports - The 2016 Oscars 2016Sysomos Reports - The 2016 Oscars 2016
Sysomos Reports - The 2016 Oscars 2016
 
Sysomos Reports: Super Bowl 50
Sysomos Reports: Super Bowl 50Sysomos Reports: Super Bowl 50
Sysomos Reports: Super Bowl 50
 
Coming From Sysomos In 2016
Coming From Sysomos In 2016Coming From Sysomos In 2016
Coming From Sysomos In 2016
 
New Improvements to Heartbeat 2.0
New Improvements to Heartbeat 2.0New Improvements to Heartbeat 2.0
New Improvements to Heartbeat 2.0
 
Unleash The Power Of Visual Social Media For Your Brand
Unleash The Power Of Visual Social Media For Your BrandUnleash The Power Of Visual Social Media For Your Brand
Unleash The Power Of Visual Social Media For Your Brand
 
The Future of Social Data: Social Intelligence - A presentation from #SMWChicago
The Future of Social Data: Social Intelligence - A presentation from #SMWChicagoThe Future of Social Data: Social Intelligence - A presentation from #SMWChicago
The Future of Social Data: Social Intelligence - A presentation from #SMWChicago
 
Sysomos Monthly Webinar September - Sysomos and Expion Come Together
Sysomos Monthly Webinar September - Sysomos and Expion Come TogetherSysomos Monthly Webinar September - Sysomos and Expion Come Together
Sysomos Monthly Webinar September - Sysomos and Expion Come Together
 
Using Social Intelligence for Business Decision Making - A Masterclass Presen...
Using Social Intelligence for Business Decision Making - A Masterclass Presen...Using Social Intelligence for Business Decision Making - A Masterclass Presen...
Using Social Intelligence for Business Decision Making - A Masterclass Presen...
 
Smart Brand Social Storytelling
Smart Brand Social StorytellingSmart Brand Social Storytelling
Smart Brand Social Storytelling
 
Sysomos Monthly Webinar July - Social Listening 101
Sysomos Monthly Webinar July - Social Listening 101Sysomos Monthly Webinar July - Social Listening 101
Sysomos Monthly Webinar July - Social Listening 101
 
Putting Social Intelligence To Work (from #SMWLA)
Putting Social Intelligence To Work (from #SMWLA)Putting Social Intelligence To Work (from #SMWLA)
Putting Social Intelligence To Work (from #SMWLA)
 
2015 Oscars - A Sysomos Twitter Report
2015 Oscars - A Sysomos Twitter Report2015 Oscars - A Sysomos Twitter Report
2015 Oscars - A Sysomos Twitter Report
 
Grammys 2015 - Sysomos Twitter Report
Grammys 2015 - Sysomos Twitter ReportGrammys 2015 - Sysomos Twitter Report
Grammys 2015 - Sysomos Twitter Report
 
Sysomos Reports: Super Bowl XLIX
Sysomos Reports: Super Bowl XLIXSysomos Reports: Super Bowl XLIX
Sysomos Reports: Super Bowl XLIX
 

Recently uploaded

Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
SocioCosmos
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
AJHSSR Journal
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
madisonsmith478075
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
Digital Marketing Lab
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
AJHSSR Journal
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 

Recently uploaded (13)

Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 

Using Social Media for Security Monitoring

  • 2. #SecurityWithSysomos Agenda • Introduction • Why Threat Detection? • Types of Threats: Cyber, Physical • Means of Protection: Digital Property, Fraud, Copy Cat • How to Start • Q&A
  • 4. Why Monitor Threat Detection? • Social Media is great for broadcasting information…for positive actions as well as malicious ones • Remember: there are no limits to what people will post on social media • Marketers leverage Social Media as their “haystack” for brand, competitive, and influencer purposes • We can utilize these same ideas and tools for security and threat detection • We will expect a relatively small number of mentions, but when they occur, they are extremely actionable and relevant. All it takes is one.
  • 5. How susceptible is your business to security threats?
  • 6. What If You Don’t Monitor for Security and Threats? PROACTIVE is always better than REACTIVE when it comes to security threats.
  • 7. #SecurityWithSysomos What Is the Cost of Not Looking Out for Threats?
  • 8. #SecurityWithSysomos Use Case: Cyber Security • One of the largest news sources and news distributors in the world • Owns many digital news properties that are relied on heavily by their advertisers • Same digital properties are very attractive targets for hackers • DDoS (Distributed Denial of Service Attack): Overloads company website/network by sending numerous packets of information – making users unable to access
  • 9. Use Case: Cyber Threats • Can Social Predict DDoS attacks and other Cyber threats? Indirectly, yes. • Utilizing email alerts • Setting post frequency threshold limits for a ‘true attack’ • Creating the threshold: from historical attacks in the past year, 1000 mentions signified an attack and an unusual number of mentions • Cost to a company between $5,000 to $100,000 /hr • 49% of DDoS attacks last between 6 – 24 hrs
  • 10. Use Case: Cyber Threats • Finding the bad apples and repeat offenders With a social media research platform you can actively find and make lists of social users and accounts who have: • Targeted you in the past • Act as early warning systems for attacks • Use language that indicates attacks • Are part of communities often involved in attacks
  • 11. #SecurityWithSysomos Use Case: Physical Threats • Same large news source and distributor • Has many publically known and recognizable on-air talents, personalities and executives working for them • Regularly receive physical threats against these people • Solution was to use long complex trigger tags with keywords for every possible scenario of a physical threat
  • 12. Use Case: Physical Threats • Example of a trigger tag: "John Doe Harm"~3 OR "John Doe Hurt"~3 OR "John Doe Vandalize"~3 OR "John Doe Vandalizes"~3 OR "John Doe Vandalizing"~3 OR "John Doe Strike"~3 OR "John Doe Attack"~3 OR "John Doe Loss of Life"~3 OR "John Doe Kill"~3 OR "John Doe Killed"~3 OR "John Doe Killing"~3 OR "John Doe Find"~3 OR "John Doe Hackers"~3 OR "John Doe Hacking"~3 OR "John Doe Cyber Attack"~3 OR "John Doe CyberAttack"~3 OR "John Doe CyberAttacker"~3 OR "John Doe Cyber Army"~3 OR "John Doe CyberArmy"~3 OR "John Doe Al-Qaeda"~3 OR "John Doe AlQaeda"~3 OR "John Doe Al Qaeda"~3 OR "John Doe Hacker"~3 OR "John Doe Threat"~3 OR "John Doe Threatening"~3 OR "John Doe Threatened"~3 OR "John Doe Plane Crash"~3 OR "John Doe Suicide Attack"~3 OR "John Doe Suicide Bomber"~3 • A tag like this can trigger an email alert, be routed into a custom dashboard, or be integrated through an API feed into a command center with additional data points outside of social • Many different trigger tags can be made for every possible security or threat scenario • Once these are made they can be replicated for locations, peoples names, various business assets and more #SecurityWithSysomos
  • 13. Use Case: Copy Cat • Every time a Twitter handle pops up with the brand name – any derivation thereof – an alert is triggered • Allows risk and security staff to identify and take action on unauthorized user accounts • Ensures the reputation of the brand is not compromised by a malicious attack (from:a*_widget OR from:b*_widget OR from:c*_widget OR from:d*_widget OR from:e*_widget OR from:f*_widget OR from:g*_widget OR from:h*_widget OR from:i*_widget OR from:j*_widget OR from:k*_widget OR from:l*_widget OR from:m*_widget OR from:n*_widget OR from:o*_widget OR from:p*_widget OR from:q*_widget OR from:r*_widget OR from:s*_widget OR from:t*_widget OR from:u*_widget OR from:v*_widget OR from:w*_widget OR from:x*_widget OR from:y*_widget OR from:z*_widget OR from:widget_a* OR from:widget_b* OR from:widget_c* OR from:widget_d* OR from:widget_e* OR from:widget_f* OR from:widget_g* OR from:widget_h* OR from:widget_i* OR from:widget_j* OR from:widget_k* #SecurityWithSysomos
  • 14. #SecurityWithSysomos Use Case: Piracy Protection • Multinational Media Brand, and a Multinational Sports Entertainment Group • Heavily rely on revenues generated from pay per view content, as well as protected content, such as TV shows, and movies • Major issue with leaked content before release dates as well as illegal streaming of content during events
  • 15. Use Case: Piracy Protection • Finding the source of illegal streaming, and also those helping to broadcast it • Look for the most retweeted content, and the largest retweet spreads • Find the original post promoting an illegal streaming source • Create lists to track, monitor, and be alerted to these sources ((stream OR streaming OR torrent OR livestream OR online OR free OR “free download” OR “streaming online” OR “watch the”) AND ("the martian" OR martian OR themartian) AND NOT (trailer)) #SecurityWithSysomos
  • 16. Use Case: Fraud Detection • Using visual cues – or ‘listening’ – as a means to capture and track image-driven content • Illegal tickets • Unauthorized apparel • Phishing Scams #SecurityWithSysomos
  • 17. #SecurityWithSysomos Three Things to Know 1. Survey the landscape and out what existing conversations regarding threats are happening on social To surface conversations, think and search social channels on: • Related industries • Known threats and security events from the past • Various market segments you are involved in
  • 18. #SecurityWithSysomos Three Things to Know 2. Monitor for threats against your brand, your executives, your office locations, etc. Things to Consider: • Have we scoped out a process and workflow for any threats that may occur? – What resources need to leveraged internally when a threat takes place? • Can we identify malicious actors that need to monitored on an ongoing basis?
  • 19. #SecurityWithSysomos Three Things to Know 3. Look beyond the text Not all conversations about security will happen via copy – think about how people are sharing information: • Instagram • Facebook • Tumblr • Reddit
  • 20. #SecurityWithSysomos After the Presentation • Feel free to contact us for follow up questions @Sysomos • Please visit sysomos.com/webinars to sign up for great Sysomos webinars