Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The human aspect of security
Tuesday - 9/10/2013, 10:35pm EDT
September 10, 2013 -- Many federal information technology professionals rely on best practices from the "usual" suspects -- FISMA, FedRAMP, among others.
This week's "Federal Tech Talk" takes a look at security from an "up-close-and-personal" perspective.
How does social media impact your security?
How can you connect social media with physical security?
Today's guest is Dr. Terry Gudaitis.
She has a PhD. in psychology and worked for ten years for a three letter organization as a profiler.
After she left this organization in suburban Virginia, she worked for Cyveillance.
Today, Gudaitis has her own company -- Mindstar Security.
She tells many stories that illustrate some security precautions.
For example, if you join FourSquare and let people know you are on vacation -- this gives attackers knowledge that you are not at home.
Spear phishing is a technique where bad actors take a look at your social profile and send a person a "spoofed" mail revealing personal details.
The object of the attack may let down a guard and click on a link with malicious code.
Malware is now appearing in social media sites like Twitter.
Gudaitis reminds listeners to be wary of any direct messages - Twitter accounts can be spoofed easily and you can accidentally link to sites that are dangerous.