Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

How to Use Social Media for Better #Security

By Claire Meyer
Deltek
March 1, 2013
Deltek

Rich Ronston of Deltek uses social media-sourced intelligence to understand new options and apply them to the business’s risk appetite. Photo courtesy of Lauran Cacciatori/Deltek

Picture this – in 20 minutes, one enterprising hacker at the 2012 Defcon conference in Las Vegas learned one Wal-Mart store’s physical logistics – from the janitorial contractor to where employees go to lunch – key details about the make and version numbers of the Wal-Mart manager’s PC, browser and anti-virus software, and got the manager to upload the address of an external website into his browser – no questions asked. The hacker, Shane MacDougall, had captured every data point in the convention’s annual “Capture the Flag” social engineering contest, and Wal-Mart was the victim. That’s social engineering.

After the event, MacDougall told reporters that “Social Engineering is the biggest threat to the enterprise, without a doubt… I can see all these (Chief Security Officers) that spend all this money on firewalls and stuff, but they spend zero dollars on awareness.”

But security leaders are paying attention now – especially Mark Arnold, Security Engineering Manager at TJX, the parent company of retailers HomeGoods, TJ Maxx and Marshalls. He joined TJX two years ago and wanted social engineering (or “Human Hacking”) training since then, but – after the Defcon debacle – he got the resources he needed.

“It’s becoming a reality that these spaces provide more targets,” Arnold says. “Malicious actors are looking to take advantage of people now, not just networks. They see humans as ‘nodes’ in the system. They look for low-entry employees – easier entry points. They want to compromise as many of these ‘smaller prizes’ as possible.”

Arnold is using social media to obtain a better picture of who would be targeting – looking for predictable data that TJX can use in future security and marketing campaigns.

Rich Ronston, Lead IT Security Architect at Deltek, is using the open-source data found on social media to determine where resources are most needed. Deltek supplies project-based solutions on-premise, as well as in the Cloud, so Ronston has to stay up to date on the changing landscape.

“Twitter has cutting-edge information that could impact our SaaS applications and Deltek’s IT department,” Ronston says. “We like the immediacy of information and ability to find deeper intelligence. You can get what you need to know quickly and take it directly to the CIO. Then, we apply the scenario – such as a new patch or possible vulnerability – to our risk appetite and decide what to do.”

Messages, conversations, links and detailed vendor information form the basis of security research on social media, Ronston says: “It puts you into the center of the conversation.”

Merely searching for basic hashtags or metadata tags on Twitter, such as #Security, can produce a depth of information to help security professionals better perform their functions. For example, a quick search under that term could produce security metrics, risk management data, security news stories, chatter about business continuity trends or even hints at possible security risks.

In Arlington, Texas, the Arlington Police Department is monitoring social media to pick up on specific risks and threats pertaining to the city’s Entertainment District – a close-knit area that contains Cowboy Stadium, Rangers Ballpark and Six Flags Over Texas. These venues are also the site of events – not just sports games, but controversial speakers or meetings – that could be targets of attacks. By searching social media venues, such as Twitter or Reddit, for specific keywords or tags that could be related to a specific event or a certain issue of concern, the intelligence unit can investigate threats further.

“It’s all open source information, but we have to have a criminal nexus to pursue a specific statement,” says Sgt. J.P. Rogers of the Arlington PD Intelligence Unit. “We have to determine that it’s a legitimate public safety issue before looking into an incident or a person, and we have civil rights and civil liberties training to ensure we follow that rule.”

For example, Rogers says, general or conditional statements (“If this team loses, I’m going to drop a bomb on the stadium”) would not be investigation-worthy – the speaker does not demonstrate the intent or the capability to follow through. However, a statement of “There is a bomb in the stadium now” demonstrates an imminent threat that requires action and investigation.

“You have to manage the difference between free speech and a threat,” Rogers says.

Once a threat is declared serious enough for investigation, law enforcement works across state lines to track user information to the statement’s source. In the two most recent cases, Rogers says, the offending Tweeter was out-of-state and entirely incapable of following through on the threat, but it pays off to be sure.

Arnold reacts to social media threats the same way his team would respond to a cyber attack – he informs the legal team and upper management to spur a coordinated incident response.

Uncovering threats is not the only use for social media monitoring, however. Many private industries are using it to foster an active dialog with customers as a value-added marketing tool.

Customers can spur a lot of online buzz about what they like or dislike about a company, and social platforms such as Yelp or Twitter can supply businesses with the opportunity to reach out to specific, vocal customers who provide real-time reviews of your service.

“You can have risk or IT security groups leverage social media channels to broadcast specific information to product subscribers or customers,” Ronston says. “Outside of the IT department, you can use it for marketing or for getting your company message out. It’s as much a marketing engine as a listening tool.”

Professional networking sites such as LinkedIn offer security professionals another set of tools, Arnold says. He uses LinkedIn for cultivating details and profiling, including vetting new individuals and checking connections to current associates.

“Interconnections add to predictability,” Arnold says. By knowing who knows who on social media, he can better understand what kind of target that person is to outside threats.

“We’re trying to use the whole network security model, the life cycle of security, to manage these threats,” he adds. “The whole entity is being targeted now – not just devices, but specific people.” And, by monitoring the footprint that an enterprise’s human element leaves on social media, security can better predict who will attack where, and be prepared for it.

KEYWORDS: risk appetite security investigations security risk management sports security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Claire Meyer is a former Managing Editor for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • networking-security-freepik

    How to build a better corporate social media policy

    See More
  • protests -violence

    How extremist groups are using social media to spread their ideology, recruit and encourage violence

    See More
  • social-enews

    Send the Right Message: How to Streamline Emergency Communications in the Social Media Era

    See More

Events

View AllSubmit An Event
  • October 17, 2024

    How to Assess and Hone Your Security Program

    ON DEMAND: In this webinar, Erik Antons, a security risk management executive with more than 20 years of working in the Federal Government, energy, hospitality, and manufacturing sectors, shares his perspective on the building blocks of a successful manufacturing security program.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!