Social Engineering Defense Contractors on LinkedIn and Facebook: Who's plugged into your employees? (BONUS Episode)

Top Secret cleared staff and employees have 'protocol' and rules to follow -but what if they don't follow them?

This is a recording of Jordan Harbinger’s 2012 talk at DerbyCon Infosecurity conference, entitled:

Social Engineering Defense Contractors on LinkedIn and Facebook: Who’s plugged into your employees?

Synopsis:

Sure, Top Secret cleared staff and employees have ‘protocol’ and rules to follow regarding internet use and social media -but what if they don’t (or won’t) follow them? What if they’re looking to jump ship and no longer care about policy? I put this question to the test and mined confidential information from dozens of contractors and personnel from law enforcement, the military and high-profile defense contractors by using LinkedIn and other social media, all from home and nearly all of it using only my phone…

 

Download audio file

Here’s a video of the talk itself:
[youtube id=”L5qETnAKe7A” width=”600″ height=”350″]

Here’s some press coverage of the talk:
The Verge
CSO Online

You might (you WILL) also like:
Episode #146: Chris Hadnagy, Social-Engineer.org
Episode #182: Erin, Former CIA Operative

0 thoughts on “Social Engineering Defense Contractors on LinkedIn and Facebook: Who's plugged into your employees? (BONUS Episode)

  1. ytb says:

    truly a unique episode indeed! I love how you incorporated pua stuff into security/hacking and how even the simplest pua jokes “yoga…” “now everyone is writing it down” generated such a response

    • Jordan Harbinger says:

      Haha yeah thanks. The audience really dug this talk and I ended up in a few articles and even an NPR segment because of it.

Leave a Comment

Your email address will not be published. Required fields are marked *