Overview: The convergence is upon us all; this influx of technology intermingled with information infused now in every possible facet of our business and personal lives. We live in the presence of infinite possibilities through technology. Business is being propelled into new trajectories never before possible. Out social spheres and human interpersonal interactions have all been augmented by the ever accelerating technological reality. While our brave new media world is evolving and pushing forward, there is a common denominator that is struggling to keep up. The singular chink in our armor; the weak link in our proverbial chain is much to our collective chagrin is: the human element!
This reality is not slowing down. On the contrary, it's moving exponentially faster. Our challenge as business leaders and individuals; as humans in general, is to intelligently manage this paradigm shift as our technological singularity enters its event horizon.
Why should you attend: It happens so often we almost take it for granted. A company is breached and customer data is stolen soon to appear on some Darknet market for sale to cyber-criminals anywhere. All too often it is the unfortunate result of access credentials being stolen and used to infiltrate the corporate defenses. This reasonably low-tech attack to our corporate bastions is only successful because it depends on human nature.
A simple key click on a phishing message to your average employee could very well allow the Trojan's right into the heart of your business operation and ultimately do immeasurable damage to your brand, your company and your life.
It would be natural for anyone to develop a sense of despair given the seemingly at-will occasion than cyber-attacks and identity thefts are taking. The reality can be something quite the opposite. Through an intelligent application of governance, technological enforcement and vigilance we can indeed dramatically increase our effectiveness in protecting our businesses and our personal privacy.
Areas Covered in the Session:
- Social Media: personal and business transformations.
- Marketing Madness: the perils and pitfalls of new media management.
- Intellectual Property: new concerns about user created content.
- Corporate Governance: creating and updating policies and procedures.
- Code School: secure coding and minimizing risks.
- Legal Landscape: the evolution of global laws and regulations.
- The Security Trifecta: sage advice in the real-world.
Who Will Benefit:
- General Counsel
- Any security, privacy, risk and person interested in improving security and risk avoidance in their company
Contact the event managers listed below for more information about how you can participate at the Live webinar on The New Social Security: When Social Media Meets Social Engineering.
|Conference/Event Dates:||03/13/2014 - 03/13/2014|
|Conference/Event Hours:||Thursday, March 13, 2014 10:00 AM PST | 01:00 PM EST|
|Other Industries:||IT, Network Security, Technology|
Any security, privacy, risk and person interested in improving security and risk avoidance in their company
|Booth Size||Booth Cost||Available Amenities|
|No exhibiting at this event.||Electricity:||n/a|
|Marketing Vehicles Allowed:||n/a|
|Other Booth Sizes Available: n/a|
How do I show up here?
Add a note here, it is only visible by you.