Hi [[ session.user.profile.firstName ]]

Security in the Age of Social Media

Social Media has come of age. Collectively, social platforms have attracted two-thirds of the world’s internet users with more joining every day. This ubiquity has led many organisations to make social an integral part of their digital channels strategy, along with their web presence and mobile apps.

For organisations engaging in social media, the importance of having an advanced social media strategy is more critical than ever.


During the session you will learn:
* The attack methods hackers use to exploit social media platforms and profiles.
* Which weaknesses cyber criminals look for so you can protect your company’s social media reputation.
* How to strengthen your security approach to combat social media threats.
* The defense techniques an organization must employ to prevent social phishing attacks, brand impersonation, recruiting scams, customer service impersonations, malware attempts, RDC, and more.
Recorded Jan 26 2017 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jeff Lenton, Solutions Architect, RiskIQ
Presentation preview: Security in the Age of Social Media

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • EMEA Threat Hunting Workshop, January 13, 2021 Jan 13 2021 10:00 am UTC 120 mins
    Jamil Mirza, Christoffer Sandlund
    RiskIQ is kicking off 2021 with a new EMEA Threat Hunting Workshop series beginning with our first workshop on January 13. Since our move to virtual workshops last April, RiskIQ has trained over 1500 security analysts across EMEA in both basic threat hunting skills and advanced techniques, all using RiskIQ PassiveTotal and its rich Internet datasets.

    If you work in a SOC or Incident Response team, or occasionally get involved in the research of Internet based threats and threat actors, this workshop is for you.

    As much as malicious actors change their tactics, they can’t avoid interacting with core components of the internet. RiskIQ has been capturing these ephemeral signals for over 10 years, curating rich Internet datasets you can leverage in your investigations. As a threat analyst, the more threat data sets you have at your disposal, the fewer places they can hide.

    In this live 2 hour virtual workshop you will learn:


    * Methodologies for threat analysis
    * How RiskIQ’s unique data sets can be used to build-out more thorough investigations
    * How to leverage the PT’s Threat Intel Portal to save time and effort in your investigations

    The workshop also includes a series of hands-on exercises and investigations. All participants will be given a promo code that grants full access to the PassiveTotal platform so you can participate in the exercises and continue your practice after the event.

    Additionally, you will receive an attendance certificate and 2 CPE credits for attending.
  • EMEA Threat Hunting Workshop - Additional Investigations Series, #3 Recorded: Nov 18 2020 32 mins
    Jamil Mirza, Principal Solutions Architect, EMEA
    Designed for security analysts that have recently attended one of our 2 hour virtual Threat Hunting Workshops, these shorter format workshops focus on a small number of new exercises based on current threats and highlight more advanced threat hunting techniques.

    Attend and Learn:

    * How you can use the new Threat Intelligence Portal to speed up your investigations
    * How to leverage PassiveTotal's unique data sets to carry out more thorough investigations
    * How to automate and accelerate investigations using the PassiveTotal API

    Additionally, you will receive 1 CPE credit for attending the workshop.
  • RiskIQ Digital Footprint Demo Recorded: Oct 28 2020 33 mins
    JT Wells, Senior Solutions Architect
    Enterprise security programs are being overwhelmed by rapid digital growth, which has only accelerated in the current pandemic. This expansion of the digital attack surface creates hidden risks and threats, mostly outside the firewall and out-of-sight.
    Unfortunately for infosec practitioners trying to keep up, there isn’t an easy way to identify external risks and threats with confidence. Many security teams and analysts still rely on manual data-stitching, spreadsheets, and legacy systems to manage risks. However, there’s a much better way.
    Watch our on-demand RiskIQ Digital Footprint demo to see how you could gain complete visibility into all the assets connected to you beyond the firewall and manage the vulnerabilities and exposures within your infrastructure.
  • FS-ISAC Situation Briefing - Germany Recorded: Oct 7 2020 51 mins
    John Salomon (FS-ISAC), Terry Bishop (RiskIQ), Evan Kohlmann (Flashpoint)
    FS-ISAC in partnership with Risk IQ and Flashpoint is cordially inviting you to its upcoming “Situation Briefing – Germany” on the 7th of October at 2pm CEST. This new series of Intelligence Briefings focuses on current trends in the Threat Landscape from a physical and cyber risk standpoint. It combines the collective expertise and insights from the largest Information Sharing Analysis Center in the world with leaders in the Threat Intelligence industry.



    Agenda:

    10 min, FS-ISAC, John Salomon: Global Intelligence Office most recent briefing.
    20 min, Risk IQ, Terry Bishop: Threat Landscape Update, Covid related threat vectors based on the Scam Nation report, how actors are monetizing the pandemic through partisan content farms and subscription traps. Following on from previous briefings on Magecart, RiskIQ will also present their latest research on the Inter Skimmer form skimmer which can currently be found on over 1,500 sites.
    20 min, Flashpoint, Rob Cook: The Far Right Movement Churns Across Europe. A look at the heightened physical activity in Europe from the far right, including propaganda and online communications.
  • RiskIQ EMEA Threat Hunting Workshop Recorded: Oct 7 2020 96 mins
    Jamil Mirza, Solutions Architect, EMEA
    RiskIQ is hosting another EMEA Virtual Threat Hunting Workshop on the 7th of October. If you are new to PassiveTotal or haven’t attended one of our workshops recently,
    this at-home live training has been designed for you. The 2 hour session includes practical threat hunting advice as well as hands-on exercises using RiskIQ’s unique advanced data set that enable quicker and more thorough investigations.

    Attend and Learn:


    Methodologies for threat analysis
    How RiskIQ’s unique data sets build-out investigations more thorough investigations
    How to use RiskIQ PassiveTotal
    Leveraging the Threat Intel Portal to save time and effort in your investigations
    Use Cases – A series of hands-on Exercises and Investigations
  • EMEA Threat Hunting Workshop - Additional Investigations Series, #2 Recorded: Sep 16 2020 40 mins
    Jamil Mirza, Principal Solutions Architect
    Designed for security analysts that have recently attended one of our 2 hour virtual Threat Hunting Workshops, these shorter format workshops focus on a small number of exercises based on current threats and highlight more advanced threat hunting techniques.

    Attend and Learn:

    * How you can use the new Threat Intelligence Portal to speed up your investigations
    * How to leverage PassiveTotal's unique data sets to carry out more thorough investigations
    * How to automate and accelerate investigations using the PassiveTotal API

    Additionally, you will receive 1 CPE credit for attending the workshop.
  • Can You Find the Threat? Join our Threat Hunting Workshop to find out. Recorded: Aug 12 2020 107 mins
    Jamil Mirza, Principal Solutions Architect, EMEA
    RiskIQ is hosting another EMEA Virtual Threat Hunting Workshop on the 12th of August. If you are new to PassiveTotal or haven’t attended one of our workshops recently,
    this at-home live training has been designed for you. The 2 hour session includes practical threat hunting advice as well as hands-on exercises using RiskIQ’s unique advanced data set that enable quicker and more thorough investigations.

    Attend and Learn:


    Methodologies for threat analysis
    How RiskIQ’s unique data sets build-out investigations more thorough investigations
    How to use RiskIQ PassiveTotal
    Use Cases – A series of hands-on Exercises and Investigations


    Date: Wednesday 12 August
    Time: 10 am BST, 11 am CEST,

    Additionally, you will receive 2 CPE credits for attending the workshop. Register Today
  • RiskIQ Threat Hunting Workshop - Additional Investigations Series Recorded: Jul 29 2020 32 mins
    Jamil Mirza, Principal Solutions Architect, EMEA
    Building on the success of our physical and virtual Threat Hunting Workshops, we are launching a new workshop series designed for previous workshop attendees to help hone their investigative skills. These shorter 30-45 minute sessions will focus on new investigations of current threats using both the PassiveTotal user interface and API.

    Attend and Learn:

    How to leverage PassiveTotal's unique data sets to carry out more thorough investigations
    How to automate and accelerate investigations using the PassiveTotal API

    Additionally, you will receive 1 CPE credit for attending the workshop.
  • Detect & Protect Against COVID-Themed Social Engineering Recorded: Jun 26 2020 57 mins
    Jaclyn Blumenfeld (RiskIQ), Abigail Showman andAndras Toth-Czifra (Flashpoint)
    In the age of COVID-19, the U.S. Justice department has repeatedly warned businesses of an uptick in fraud schemes capitalizing on the global pandemic. Threat actors are impersonating news sources, charity organizations, financial institutions, government entities, medical suppliers, etc. to profit from the hype and confusion surrounding the Coronavirus. Threat actors have also been observed exploiting loopholes in banking systems to commit CARES Act fraud and targeting recipients to steal their personal data.

    Flashpoint and RiskIQ leverage their combined visibility into online illicit communities used for planning and promoting attack vectors, alongside the open web criminal infrastructure used to carry out Coronavirus-related scams. This webinar showcases real-life examples of these scams and highlight the methods that can be used to detect them combining research by RiskIQ and Flashpoint.
  • Can You Find the Threat? RiskIQ EMEA Virtual Threat Hunting Workshop Recorded: Jun 24 2020 109 mins
    Jamil Mirza, EMEA Solutions Architect, RiskIQ
    Given the current pandemic, we’ve had to cancel our planned series of physical Threat Hunting Workshops across EMEA. However, this same pandemic has expanded attack surfaces quicker and more radically than ever before and an organization’s threat hunters are now its front-line defenders against the associated spike in cyber threats.

    While we can’t see you in person we'll be running a virtual 2 hour version of our workshop to fortify your skills. This at-home live training includes brand new hands-on exercises using RiskIQ’s unique advanced data sets. We’ve designed it to introduce security analysts, incident responders, and SOC personnel to brand new methods and threat data sets that enable quicker and more thorough investigations.

    Attend and Learn:


    Methodologies for threat analysis
    How RiskIQ’s unique data sets build-out investigations more thorough investigations
    How to use RiskIQ PassiveTotal
    Use Cases – A series of hands-on Exercises and Investigations


    Date: Wednesday 24 June
    Time: 10 am BST, 11 am CEST,

    Additionally, you will receive 3 CPE credits for attending the entire workshop.
  • Triple Trouble: All Access is Remote Access Recorded: Jun 15 2020 45 mins
    Steve Ginty, Josh Mayfield
    In the wake of the worldwide response to COVID-19, enterprise digital programs are outpacing their security team’s ability to protect them: customers and carts, employees and websites, partners and portals, users and apps.

    The radical shift to a remote workforce is just one part of the story. Everyone, including employees, supply chains, third parties, are all dependent on secure connections and safe data flow.

    Whether you’re exploring billions of web components or millions of exposed services and targeted ports or identifying risky VPNs—the sheer magnitude of the digital attack surface can be daunting.

    Steve Ginty, RiskIQ’s Director of Threat Intelligence, will share how rapid demand for remote access has reshaped the enterprise attack surface.

    In this webcast, you will learn how to:

    Identify remote services: RDP, VPNs, and attacker accessibility
    Spot risky trends in your digital inventory, including third parties
    Calibrate risk and response with minimal user disruption
    Pinpoint threats and risks via internet reconnaissance
    Join RiskIQ’s Steve Ginty and Josh Mayfield as they explore the latest detection trends and what you can do to safeguard your digital enterprise.
  • JavaScript Threats: A Clear and Present Danger for all Online Merchants Recorded: Jun 5 2020 42 mins
    Terry Bishop, VP Technical Services, EMEA
    JavaScript attacks are a top security concern for any organization that acts as an online merchant.

    In the overwhelming majority of JavaScript attacks, threat actors like Magecart hide credit card skimmers deep inside client-side JavaScript to capture and exfiltrate credit card and other payment data from customers. RiskIQ has detected millions of skimmers on websites across the globe, and we’re continuing to detect new ones every hour. The current pandemic has only served to fuel this growth, with newly discovered skimmers up by 30% since March.

    However, most organizations lack visibility into their web-facing assets and the way their users interact with them. As a result, JavaScript compromises can go undetected for weeks or months, damaging customer relationships, brand reputation, and potentially incurring eye-watering fines.

    The good news is that RiskIQ offers a detection solution for these types of attacks that is quick and easy to implement, requiring no agents or web site changes.

    In this webinar, we’ll cover:

    A review of JavaScript attacks and why they’re different from other types of attack
    A closer look at card skimmers and how they work
    Current tactics threat actors are using to hide their injections to avoid detection
    We’ll also show how RiskIQ can enable your organization to be proactive in protecting your customers while avoiding the consequences of large scale personal data theft.
  • 5 Questions, Answered - Vulnerability Control Beyond the Firewall Recorded: May 22 2020 50 mins
    Josh Mayfield, Vijay Punja
    Security pros are saddled with the responsibility to manage assets, count-up vulnerabilities, stack-rank priorities, and somehow figure out how to remediate exposures that are different in-kind from the typical network CVE.

    But there’s hope. Josh Mayfield and Vijay Punja will share how to extend vulnerability control outside the firewall, reduce scanning costs and delays, and keep pace with the speed of digital growth.

    In this webinar, you will learn:

    How to prioritize external, internet-based risks
    What methods other enterprise security teams use
    Why digital threats, like malicious JavaScripts, are so tenacious
    Core questions to guide world-class vulnerability control
    Join our fireside chat, where we explore the latest trends and tactics for internet exposure and risk control.
  • Attack Surface Evolution - Digital Transformation is in Hyperdrive Recorded: May 6 2020 43 mins
    Fabian Libeau, VP EMEA, RiskIQ
    The digital revolution continues to march on, but with the outbreak of COVID-19, it has suddenly gone into hyperdrive. Almost overnight, workforces and business operations completely decentralised as work from home policies came into force.

    In the past couple weeks, security protocols have completely changed—firewalls, DLP, and network monitoring are no longer as effective as they were. Attackers now have far more access points to probe or exploit, with little-to-no security oversight. Meanwhile, IT is feverishly standing up new systems, new access, and new channels and likely succumbing to human error, such as critical misconfigurations.

    This session will take a close look at this transformation and the steps security teams need to take in these unprecedented times. Attendees will:

    Gain an understanding of the changes in the threat landscape as a result of the current pandemic, both from an attacker and defender perspective.
    Learn how you can pinpoint configuration errors, find & secure cloud assets, and detect malicious rogue assets.
    Understand the offerings RiskIQ is making freely available to the audience: COVID-19 Daily Intelligence Report, Daily Infrastructure Observations, 30 access to RiskIQ PassiveTotal and Digital Footprint Snapshots.
  • What's the difference between PassiveTotal Community and Enterprise? Recorded: Jan 8 2020 6 mins
    Vijay Punja, RiskIQ Technical Account Manager
    A look at the differences between the free to use Community Edition and PassiveTotal Enterprise Edition.
  • RiskIQ JS Threats Overview Recorded: Sep 20 2019 17 mins
    Peter Weller, EMEA Technical Account Manager
    Overview of the JS Threats solution to detect malicious JavaScript injection
  • PassiveTotal Datasets - A Closer Look Recorded: Sep 6 2019 21 mins
    David Belnick, RiskIQ EMEA Technical Account Manager
    This video explains the different datasets within PassiveTotal and how they can be used in an investigation
  • PassiveTotal Example Investigation Recorded: Aug 27 2019 20 mins
    Hiten Sharma, EMEA Technical Account Manager
    A look at PassiveTotal datasets and how they are used in an investigation.
  • Introduction to PassiveTotal Recorded: Jul 18 2019 20 mins
    Peter Weller, RiskIQ Technical Account Manager, EMEA
    This is a short overview PassiveTotal.
  • Managing Risks in your Attack Surface Recorded: Nov 8 2018 45 mins
    Terry Bishop, EMEA Technical Director, RiskIQ
    According to latest Verizon research, 73% of all breaches originate outside the corporate firewall on the Internet and your organisation's presence on the Internet has become the new cyber battlefield.. Forgotten, unmanaged and un-patched web infrastructure have long been targets of choice for cyber criminals but recently we’ve seen new and effective tactics designed to compromise organisations, employees and customers while avoiding detection with traditional security methods and tooling. In this webinar we’ll look at how the cyber battlefield is changing in favour of the adversary and we’ll outline the steps organisations need to take to regain control and reduce their Internet exposure.
Attack Surface Management
Webinar topics cover securing your public facing web, mobile and social assets, combatting impersonation and rogue digital assets and discovering the digital assets owned by your cyber adversaries

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security in the Age of Social Media
  • Live at: Jan 26 2017 2:00 pm
  • Presented by: Jeff Lenton, Solutions Architect, RiskIQ
  • From:
Your email has been sent.
or close