• Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles

Call us Anton +62-813-8332-6388 (Phone/WA/Telegram)

antonsim@heilandsolutions.com
Rp 0
No products in the cart
Go to shop
Heiland Consulting & TrainingHeiland Consulting & Training
Heiland Consulting & TrainingHeiland Consulting & Training
  • Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles
ASSESSING SOCIAL MEDIA VULNERABILITIES (Online)

ASSESSING SOCIAL MEDIA VULNERABILITIES (Online)

Rp 2.000.000

While social media platforms provide tremendous benefit for individuals as well as organizations in
both network expansion and the sharing of information, such platforms are also aggressively exploited by criminal organizations and intelligence services for targeting their victims. Users typically are not aware of how information and shared images can provide sensitive and exploitable information facilitating personal identity theft as well as significant data breaches for organizations. However, these vulnerabilities can be significantly reduced and associated risks better mitigated by implementing several critical safeguards.

Category: Others.
4
Share
  • Description
  • Reviews (0)

In cooperation with Counterintelligence Institute, United States

ASSESSING SOCIAL MEDIA VULNERABILITIES (Online)

While social media platforms provide tremendous benefit for individuals as well as organizations in
both network expansion and the sharing of information, such platforms are also aggressively exploited by criminal organizations and intelligence services for targeting their victims. Users typically are not aware of how information and shared images can provide sensitive and exploitable information facilitating personal identity theft as well as significant data breaches for organizations. However, these vulnerabilities can be significantly reduced and associated risks better mitigated by implementing several critical safeguards.
Who Should Attend
• Corporate Security, Human Resource and Marketing Practitioners
• All employees who upload information to social media platforms
• Law Enforcement, Intelligence and Military Personnel
Learning Objectives
• What Information is Collected From Social Media by Threat Actors
• How Threat Actors Utilize Social Media for Social Engineering
• Techniques for Spotting Fake Social Media Accounts
• Social Media Best Practices
Trainer
Peter Warmka has had a distinguished 20+ years career as a Senior Intelligence Officer at the Central
Intelligence Agency. He specialized in the collection of intelligence while living in, and traveling to,
more than 56 countries. He is an accomplished instructor and conference presenter on the topic of
how to breach the security of any organization through the targeting and manipulation of key insider
executives.

Contact:
Anton Sim +62813-8332-6388 (Phone/WA)
antonsim@heilandsolutions.com

Reviews

There are no reviews yet.

Be the first to review “ASSESSING SOCIAL MEDIA VULNERABILITIES (Online)” Cancel reply

Your email address will not be published. Required fields are marked *

Related products

Add to cart View Details

SOCIAL ENGINEERING MITIGATION (Online)

Others
3
Rp 2.000.000
Add to cart View Details

Counter Drone Course

Others
3
Rp 16.000.000
Add to cart View Details

COUNTER ESPIONAGE FOR BUSINESS TRAVELLERS (Online)

Others
3
Rp 2.000.000

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message

heilandsolutions

heilandsolutions

Contact Info

  • Anton Sim
  • +62 813 8332 6388/+62 811 805 434 (Call/WhatsApp/Telegram)
  • antonsim@heilandsolutions.com ask@heilandsolutions.com

© 2025 · www.heilandsolutions.com