Security in the Age of Social Media

Presented by

Jeff Lenton, Solutions Architect, RiskIQ

About this talk

Social Media has come of age. Collectively, social platforms have attracted two-thirds of the world’s internet users with more joining every day. This ubiquity has led many organisations to make social an integral part of their digital channels strategy, along with their web presence and mobile apps. For organisations engaging in social media, the importance of having an advanced social media strategy is more critical than ever. During the session you will learn: * The attack methods hackers use to exploit social media platforms and profiles. * Which weaknesses cyber criminals look for so you can protect your company’s social media reputation. * How to strengthen your security approach to combat social media threats. * The defense techniques an organization must employ to prevent social phishing attacks, brand impersonation, recruiting scams, customer service impersonations, malware attempts, RDC, and more.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (1127)
Subscribers (13297)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more