eTrain Anytime Archives Purchasing Request
You are registering
for an audio/visual presentation archived for your convenience.
Please make sure all of your information is complete and accurate. You will receive a confirmation email letting you know that your registration has successfully been submitted. Your archive will be sent to the email address provided within 5 business days from the date it was ordered. Your program's link and handout will be included in your confirmation letter. You will have unlimited viewing access for 60 days after you receive the archive link
Within this presentation, you will learn how to steal an identity, defeat the perimeter controls of a network, and then ultimately gain physical access to a credit union.
As social networking becomes an increasingly important role in business as well our personal lives, it also makes us much more vulnerable. The activity of wall posts, tweets, and videos by and between employees may reveal important company information or even security flaws that allow hackers to defeat our controls.
Security expert Steve Stasiukonis will explain:
- How social networking, media, and Internet blog activity can be used to compromise security
- The tools and techniques that are used to mine the data
- How the data is leveraged against the individuals as well as the credit union
Who should attend?
- Information Technology
- Risk Management
- Internal Audit
Meet the presenter:
With over 15 years in the security industry, Steve Stasiukonis serves as president of Secure Network Technologies, focusing on penetration testing, information security risk assessments, incident response, and digital investigations. Steve carries numerous security certifications by various organizations as well as the National Security Agency. Steve also serves as columnist for Information Week magazine and DarkReading.com, with articles syndicated across the globe to numerous media outlets.
$195 for League Members
|You must be a member of your state league to attend this presentation.