Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Cyber attacks that use social media sites
Tuesday - 8/9/2011, 8:03pm EDT
Just when you think you have your system locked down with firewalls and endpoint security, you realize that your staff may be vulnerable to attacks using social media.
Today's interview is with two security experts from Cyveillance.
Dr. Terry Gudaitis has a PhD. in Behavioral Psychology and has spent a decade working with a federal security organization.
As Director of Cyber Security for Cyveillance, she shares many of her experiences with social networking attacks.
During the interview, she recounts how many federal employees put their security clearances on Facebook.
Many listeners may not realize that a determined attacker can profile a high level federal executive by combining social networking sites like LinkedIN, Facebook, Twitter, and FourSquare.
Dr. Guiditas details how spear phishing attacks use this personal information.
Manoj Srivastava, is the CTO at Cyveillance. In addition to his technical prowess, he contributes to a popular blog and has authored a white paper on security that is available on the Cyveillance web site.
Srivastava gives specific best practices that federal IT professionals can use to reduce the risk of colleagues becoming targets to spear phishing attacks.