Top Attacks in Social Media

  • Friday, February 28, 2014 | 11:40 AM – 12:00 PM | West | Room: 3005
View all Sessions

How does a company protect itself and protect customer data from social media attack vectors? What processes should be put in place to provide structured methods for dealing with social media, for educating employees and for monitoring and maintaining a positive social media presence? Attacks and defenses in social media are requirements in today's business.

Participants

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions/1194/top-attacks-in-social-media on Thu, 24 Apr 2014 11:17:24 -0400.
© 2014 EMC Corporation. All rights reserved.