Guarding against fraud in the age of social sharing

CIOs need to be cognizant of how their executives utilize social media and wearables as bad actors are using the information learned from these channels to create sophisticated fraud schemes.
security 2016 cybercrime
Thinkstock
    Related:
  • Consumer Electronics
  • Internet of Things
  • CIO
  • Security
  • Wearables
  • Cyberattacks

Greg Bell is a principal in the Atlanta office of KPMG’s Advisory Services Practice and serves as KPMG’s Service leader for Information Protection (Security, Privacy and Continuity) practice. With more than 25 years’ experience he is versed in various areas of Information Management and Information Security with particular specialization in the fields of IT risk management and business enablement.

Greg is a trusted business advisor helping leading companies protect their critical business information by helping to align their most important business processes with supporting technologies and foundational risk management elements. He has a strong background in complex business processes, distributed enterprise systems, and information risk management techniques. He has extensive knowledge and experience managing complex projects implementing, administrating and securing complex client-server and heterogeneous network technologies.

The opinions expressed in this blog are those of Greg Bell and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.