Penetration Testing & Prevention Techniques
Facebook Twitter LinkedIn

Penetration Testing & Prevention Techniques

Combined Session
Tuesday, November 13, 2018 11:10—12:10
Location: Carl von Gontard

Evolution of Social Engineering Tactics and Defenses

Social engineering strategies and tactics have changed over the years. When cyber defenses are deployed, sometimes the weakest link is in between the chair and the keyboard.  Fraud vs. erroneous acts, and why bad guys are motivated to social engineer victims: for example, criminals hijack dormant accounts, and trick victims into putting money into them, then it is immediately transferred out; these usually happen near close of business before a weekend. We will look at past and recent examples, the results, and newer defensive techniques that security-conscious organizations are deploying. 

John Tolbert
John Tolbert
Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises...

Social Engineering: Attack Techniques and Prevention

Social engineering attacks are becoming ever-more common and sophisticated, using manipulation through communications to lure victims into revealing sensitive information, click a malicious link or download a malicious file.

Richard De Vere consults with organisations to analyse the risks and help improve defences against common social engineering attacks, he will be sharing some common techniques used by attackers and the best prevention measures to minimise successful attacks and stay a step ahead.

Richard De Vere
Richard De Vere
The AntiSocial Engineer Limited
Richard De Vere (@AntiSocial_Eng) is the Principal Consultant for The AntiSocial Engineer Limited, he has an extensive background in penetration testing and social engineering assessments,...

What is Safe? Baby Don't Hack Me, Don't Hack Me, No More!

Topics include:
- Defining penetration testing
- Demystifying Hackers 
- Social engineering for good and evil 
- Identifying how to incorporate malicious views, marvelously (i.e. for good). 

Zoe Rose
Zoe Rose
Canon EMEA
Zoë Rose is a highly regarded hands-on cyber security specialist, who helps her clients better identify and manage their vulnerabilities and embed effective cyber resilience across their...
Subscribe for updates
Please provide your email address