Top Attacks in Social Media

  • Friday, February 28, 2014 | 11:40 AM – 12:00 PM | West | Room: 3005

View all Sessions

How does a company protect itself and protect customer data from social media attack vectors? What processes should be put in place to provide structured methods for dealing with social media, for educating employees and for monitoring and maintaining a positive social media presence? Attacks and defenses in social media are requirements in today's business.


This document was retrieved from on Mon, 30 Nov 2015 19:19:19 -0500.
© 2015 EMC Corporation. All rights reserved.