article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.

Media 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. How do you pick the right events? My recommendation is to look for events that have a good mix of thought leaders from a variety of organizations and sectors of the economy, since that is an indicator that there will be a good sharing of lessons learned.

Symantec 261
article thumbnail

Spotlight on Cybersecurity Leaders: Bill Bowman

SecureWorld News

In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. Bill Bowman, CISSP, CIPM, is the Chief Information Security Officer & Data Privacy Officer at financial software company Emburse. He has been a first-hired CISO at five different companies.

article thumbnail

Selling the C-suite on preemptive IT investments

CIO Business Intelligence

Others include preparation for zero-day attacks, almost anything having to do with data stewardship, as well as IT training and social engineering audits. Budgeting, Business Continuity, Data and Information Security, Disaster Recovery, IT Leadership, IT Strategy

article thumbnail

4 methods to help CIOs manage cyber stress

CIO Business Intelligence

Seeing that hackers don’t work 9 to 5, IT and information security professionals generally don’t get enough rest, says Itumeleng Makgati, group information security executive at Standard Bank. This can take the form of hosting team events, meet-ups or just enabling staff to take personal time off during down cycles. “I

article thumbnail

5,200 Data Breaches Analyzed in Annual Verizon Report

SecureWorld News

Verizon uses the VERIS framework (Vocabulary for Event Recording and Incident Sharing), which is a set of metrics designed to provide a common language for describing security incidents in a structured and repeatable manner. No surprise, social engineering is mentioned right off the bat.

Report 85