|Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
Social media use for recon and social engineering is just the tip of the iceberg. Cyber-adversaries weaponize social networks and apps in every phase of a cyberattack from exploit delivery to sophisticated command and control, and digital extortion. This session will cover how these threats are evolving, and practical steps security leaders must take to protect their business, brand and personnel.
1: Social media is an alarmingly effective cyber-weapon.
2: Social isn’t a new attack vector, it amplifies potency of existing methods.
3: Security leaders can take immediate action to strengthen social media defenses.