Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
Cyber attacks that use social media sites
Tuesday - 8/9/2011, 8:03pm EDT
Just when you think you have your system locked down with firewalls and endpoint security, you realize that your staff may be vulnerable to attacks using social media.
Today's interview is with two security experts from Cyveillance.
Dr. Terry Gudaitis has a PhD. in Behavioral Psychology and has spent a decade working with a federal security organization.
As Director of Cyber Security for Cyveillance, she shares many of her experiences with social networking attacks.
During the interview, she recounts how many federal employees put their security clearances on Facebook.
Many listeners may not realize that a determined attacker can profile a high level federal executive by combining social networking sites like LinkedIN, Facebook, Twitter, and FourSquare.
Dr. Guiditas details how spear phishing attacks use this personal information.
Manoj Srivastava, is the CTO at Cyveillance. In addition to his technical prowess, he contributes to a popular blog and has authored a white paper on security that is available on the Cyveillance web site.
Srivastava gives specific best practices that federal IT professionals can use to reduce the risk of colleagues becoming targets to spear phishing attacks.