Remove Conference Remove Information Security Remove Social
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. I'm an influencer.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat. I'm an influencer.

Media 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight on Cybersecurity Leaders: Bill Bowman

SecureWorld News

Bill Bowman, CISSP, CIPM, is the Chief Information Security Officer & Data Privacy Officer at financial software company Emburse. He serves on the Advisory Council for SecureWorld Boston and has spoken on our conference agendas. Q : Lastly, what are you most looking forward to at your regional SecureWorld 2023 conference?

article thumbnail

Spotlight on Cybersecurity Leaders: Donna Ross

SecureWorld News

Radian Group has innovative solutions (products and services) and is committed to social responsibility. A : Information Security. Q : What are you most looking forward to at your regional SecureWorld conference this year? See the conference agenda and register here. I prevent good people from doing bad things.

article thumbnail

Spotlight on Cybersecurity Leaders: Diego Maldonado

SecureWorld News

A : Regulatory action restricting the need for an individual to provide so much PII or sensitive information in order to operate within the social media or in some cases business realm. Even though some of the fields are optional, via some other form of social engineering your PII becomes available.

article thumbnail

Why is Cybersecurity at a Crossroads?

SecureWorld News

Russia's International Information Security Director spoke just last week about how he believes the war in cyberspace is in full swing and that it has been called the Third World War for legitimate reasons. Brooks has been named a Top 5 Cybersecurity Executive to Watch and a Top Tech Person to Follow by LinkedIn.

article thumbnail

Why Taylor Swift Fans Should Work in Cybersecurity

SecureWorld News

On June 14, 2019, Taylor Swift posted a seemingly random string of text to her social media accounts: gxgjxkhdkdkydkhdkhfjvjfj!!! into YouTube pulls up another Taylor Swift music video, " The Man ," which came out nearly a year after the initial social post. And you'll leave your first infosec conference with an armful of them.

Network 91