Time
10 hours 28 minutes
Difficulty
Advanced
CEU/CPE
15

Video Description

This lesson examines the role of social media and how it relates to risk management. Social media tools can be used to stay on top on the latest threats and attacks that compromise security. Businesses can thrive using social media but can also compromise information via social engineering (impersonation). Professionals can also attend conferences to learn the latest trends, attacks and learn from others.

Video Transcription

00:04
Okay, so we've talked about some foundational ideas with risk. We've talked about mitigating strategies. The last little piece I want covers. I just want to give you some ideas about performing your due diligence in relation to the world of risks. And the idea is, you know, risks are evolving every day.
00:22
It is all you can do some days just to be knowledgeable with what's currently going on, much less have that eye towards the future that we need in dealing with I t security. So I just mentioned there are a lot of sources out there that you can go to some more reliable than others.
00:38
You know, if you look at social media site and social news, whether it's Facebook or Twitter or any of the other different types of social media,
00:45
um, you know, you couldn't keep abreast of threats and attacks on the site, certainly. But again, the information is only is reliable as its source. Many security professionals have weblogs orb logs that are out there. There are a lot of podcasts.
01:03
Ah, weekly podcast on different security events can get a lot of good information.
01:07
There are also new sights and really This is how I would rate them as faras reliability, with new sites being the most reliable things, like social media sites being the least because there are a lot of hoaxes out there and, you know, they come across Facebook, they come across Twitter again. You've really gotta know the reliability
01:27
off the sites and of their sources so you can see a little chart.
01:32
You know, some of these social media sites not very reliable. The new sites are more reliable, and there's a lot of information out there. Sometimes it's so much that it's very difficult to sift through, and the best we can do again is to use our do due diligence and becomes knowledgable is possible.
01:48
Um, social media integration within the business. So going beyond due diligence. But just talking about some, uh, implementing social media, one of things I like to ask my class. I like to ask them,
02:05
You know, if this word test question, what would the answer be?
02:07
Is it okay for users to browse social media sites while it work?
02:14
Not at lunch, not on break, but on the clock during business hours on business machines. Is it okay to browse Twitter or Facebook or any of the other social media sites,
02:27
and often I get a lot of mixed responses. The answer is, it depends and it depends, is always a good answer. It's one of those answers that that you can usually be safe in saying it's a It's a nice way of saying maybe
02:40
maybe Social Media's okay, It depends on your business. Watch those knee jerk reactions that say
02:47
social media means goofing off on Facebook because it doesn't. Many organizations now have a legitimate business need tohave social media access. Social media is a very common way of communicating with the public. Most people have Facebook accounts today, so if I want
03:05
ah, quick way of letting people know I'm a restaurant, one should be able to access my menu.
03:09
I want you to make comments. I want you to know about specials and sales. Whatever my type of businesses. Social media is a very appropriate way to do that. Twitter Ah, lot of companies handle complaints via Twitter. It's a quick short forum.
03:25
They take complaints, they're able to resolve complaints on again, keep it kind of short and sweet,
03:31
so the bottom line is social media has legitimate is business purposes, and I know you guys know that. But watch for questions that kind of mislead you. You know, that kind of make it appealing to say no, you shouldn't be doing that on the clock. The answer is what his policy say, and I know many organizations that forbid the use of social media.
03:51
But I also know many organizations who
03:53
thrive upon the use in the integration of social media with business. Social media, though, presents again a large potential for loss loss of confidentiality of information. Um, social engineering through impersonation is very easy to do. If you're using social media frequently,
04:13
your employees can disclose information that shouldn't be readily disclosed.
04:17
The military. A lot of times, the military is now allowing their soldiers to use social media to communicate with loved ones back home. The problem with that is when I post a picture of me in a specific location, that's not public information, and there's a national landmark in the background. I just
04:36
just disclosed a lot of information.
04:40
People don't really realize how much information is contained within a picture, and later on this week, we'll talk about metadata. Things like time stamps, GPS positioning information. You have to be very, very careful. What information you make available to the public and social media can be one means of that.
04:58
So if it is gonna be something integrated with business,
05:02
you know, honestly, what I would say is the worst way of business can handle social media is to ignore it, take a stance. We're gonna allow it or we're not.
05:12
If we're not going to allow it, we're not gonna allow it. Here's how we're gonna prevent it and its presence on the network and hear the repercussions of somebody violent violates that policy.
05:21
If we're going to allow it, here's how it's to be used. Here's how we're gonna protect it here, the rules that we follow.
05:29
And here's how we're gonna monitor to make sure it's used accordingly. The last thing you want to do is just to say nothing, because that that really leaves the decision making up to the general public. And that's never a good idea, Remember? So maybe down the line you could see how social media would benefit your company. You're just not there yet. Fine block it. For now,
05:48
policies can evolve,
05:50
but we want to be very proactive. And remember, if it's not something we need to do, our jobs don't allow it. It brings in the potential for harm,
06:00
you know, just like instant messaging. A lot of companies use instant messaging. Well, that's fine. If you need it for personal, you know if you need it for business communications. But if you don't block it, walk in its your firewall, remove the applications, put a policy in place that says, We're not going to do it. You know, it's It's a good way for impersonation
06:18
information transmitted, not encrypted. So
06:23
eavesdropping, You know, they're all sorts of problems. If it's something you decided that your company can benefit from right, use it. Have a policy. If you don't need it, block it and have a policy about what's compliance and what's not.
06:36
Okay. Many companies D'oh! Business logs. Absolutely.
06:43
Now there are many conferences and conventions that air out there. The bottom one that you can't see here is the Secure World Expo. That's okay. We could name a 1,000,000 there, or there is no lack of conference conventions seminars, and
07:00
this is a great field to be in if you like to travel, because every week, there somewhere you can go and somebody's putting on a conference,
07:06
you know, some that are well known. Def Con is very well known Black hat. Black hat has been described as the single most dangerous place on Earth for one week of the year, and I think I would agree with that. You're inviting Attackers in from all over the world with, um uh,
07:26
it's a very, very impressive skill sets to gather in a town.
07:30
Um, and as appealing as it is to attend one of those conferences, be very careful about what you bring in. What you leave with other conferences. They're fine. There's nothing testable here, but certainly the way to stay in the no, no, the threats know what's out there.
07:47
So I Black hat is so, uh, popular know your enemy.
07:50
You know what those tools and techniques are? And you know, even though the name Black Hat suggests a negative malicious activity and black hat hacking is malicious, it's all about harm. You'd be amazed at how much great information is out there
08:07
for the good of the organization not just the harm. So,
08:11
uh, black hat to me. Yeah, there's a huge potential for loss, but you get a lot of very good information to protect your organization. So certainly conferences, conventions are good ways to stay knowledgeable. Other things, you know, Know your vendors. What products do you have on your network
08:28
There Many RCs feeds that you can stay apart off.
08:33
Microsoft Cisco, Adobe It doesn't matter who the vendor is. Every vendor puts out security related information. You can follow them on their feeds. You could go to the website. The feeds could be aggregated onto a security page so that you have all of this information across multiple vendors.
08:52
But the bottom line is
08:54
this field is rapidly changing. Threats are evolving, the good guys and the bad guys. The lines are getting blurred
09:03
as a technician, as an engineer, as an administrator, as a senior official, I must stay knowledgeable. There is no shortage of resource is it's finding the budget, finding the time in order to attend these conferences and order
09:20
to take the time to review the feeds and the logs and so on

Up Next

CompTIA CASP

In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor