Social engineering strategies and tactics have changed over the years. When cyber defenses are deployed, sometimes the weakest link is in between the chair and the keyboard. Fraud vs. erroneous acts, and why bad guys are motivated to social engineer victims: for example, criminals hijack dormant accounts, and trick victims into putting money into them, then it is immediately transferred out; these usually happen near close of business before a weekend. We will look at past and recent examples, the results, and newer defensive techniques that security-conscious organizations are deploying.
Social engineering attacks are becoming ever-more common and sophisticated, using manipulation through communications to lure victims into revealing sensitive information, click a malicious link or download a malicious file.
Richard De Vere consults with organisations to analyse the risks and help improve defences against common social engineering attacks, he will be sharing some common techniques used by attackers and the best prevention measures to minimise successful attacks and stay a step ahead.
- Defining penetration testing
- Demystifying Hackers
- Social engineering for good and evil
- Identifying how to incorporate malicious views, marvelously (i.e. for good).