Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Cyber attacks that use social media sites
Tuesday - 8/9/2011, 8:03pm EDT
August 9, 2011 -- Making certain your agency is secure is like a never-ending game of Wack-A-Mole.
Just when you think you have your system locked down with firewalls and endpoint security, you realize that your staff may be vulnerable to attacks using social media.
Today's interview is with two security experts from Cyveillance.
Dr. Terry Gudaitis has a PhD. in Behavioral Psychology and has spent a decade working with a federal security organization.
As Director of Cyber Security for Cyveillance, she shares many of her experiences with social networking attacks.
During the interview, she recounts how many federal employees put their security clearances on Facebook.
Many listeners may not realize that a determined attacker can profile a high level federal executive by combining social networking sites like LinkedIN, Facebook, Twitter, and FourSquare.
Dr. Guiditas details how spear phishing attacks use this personal information.
Manoj Srivastava, is the CTO at Cyveillance. In addition to his technical prowess, he contributes to a popular blog and has authored a white paper on security that is available on the Cyveillance web site.
Srivastava gives specific best practices that federal IT professionals can use to reduce the risk of colleagues becoming targets to spear phishing attacks.