Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Cyber attacks that use social media sites
Tuesday - 8/9/2011, 8:03pm EDT
Just when you think you have your system locked down with firewalls and endpoint security, you realize that your staff may be vulnerable to attacks using social media.
Today's interview is with two security experts from Cyveillance.
Dr. Terry Gudaitis has a PhD. in Behavioral Psychology and has spent a decade working with a federal security organization.
As Director of Cyber Security for Cyveillance, she shares many of her experiences with social networking attacks.
During the interview, she recounts how many federal employees put their security clearances on Facebook.
Many listeners may not realize that a determined attacker can profile a high level federal executive by combining social networking sites like LinkedIN, Facebook, Twitter, and FourSquare.
Dr. Guiditas details how spear phishing attacks use this personal information.
Manoj Srivastava, is the CTO at Cyveillance. In addition to his technical prowess, he contributes to a popular blog and has authored a white paper on security that is available on the Cyveillance web site.
Srivastava gives specific best practices that federal IT professionals can use to reduce the risk of colleagues becoming targets to spear phishing attacks.