KEYNOTE – THE INTERNET OF HUMANS – PROTECTING THE REAL HIGH VALUE TARGETS

Knowledge Hub

1:00 pm - 1:30 pm

We all leave a digital footprint – it’s almost impossible these days not to. The bigger the footprint, or the greater yourpublicity, the more vulnerable you are to attack. In the fall of 2015, a group
of teenagers “social engineered” their way intothe personal and work accounts of senior US Intelligence Community (USIC) executives, and accounts of their family members, harassing them
and exposing sensitive work and personal information. Targets included the Director of the CIA and his family, the Director of National Intelligence, senior FBI officials, White House staff
members and their families, and the CEO of a major government contractor and his family, followed by disclosure of the identities of over 30,000 federal agents. Here is how it happened, what
the response was, and lessons learned from a member of the investigative team.
• Identifying Human High Value Target (HVT) Risks and Gaps
• Defining Criteria to Segregate Digital Work and Personal Activity
• Recognizing the Importance of Enforcing Rules Consistently

.site-footer{ position: fixed; bottom: 0; left: 0; right: 0; }