Social Engineering: Threats and Prevention

  •  TYPE: Track    START DATE: Tuesday, November 13, 2018     START TIME: 11:10    LOCATION:  Carl von Gontard
Parent Track


Even though firms invest large sums in their business security, often the weakest link is still the company employee. By manipulating people using, for example, phishing emails and malicious links, attackers can obtain confidential information and use it to steal money or valuable information from a person or an organizaiton. In this session we will discuss the tools and mechanisms companies use to bolster security education within their enterprises to prevent these types of attacks. 


Evolution of Social Engineering Tactics and Defenses

Date: Tuesday, November 13, 2018 Time: 11:10-12:10

Evolution of Social Engineering Tactics and Defenses
John Tolbert, KuppingerCole

Social engineering strategies and tactics have changed over the years. When cyber defenses are deployed, sometimes the weakest link is in between the chair and the keyboard.  Fraud vs. erroneous acts, and why bad guys are motivated to social engineer victims: for example, criminals hijack dormant accounts, and trick victims into putting money into them, then it is immediately transferred out; these usually happen near close of business before a weekend. We will look at past and recent...

Social Engineering: Attack Techniques and Prevention
Richard De Vere, The AntiSocial Engineer Limited

Social engineering attacks are becoming ever-more common and sophisticated, using manipulation through communications to lure victims into revealing sensitive information, click a malicious link or download a malicious file. Richard De Vere consults with organisations to analyse the risks and help improve defences against common social engineering attacks, he will be sharing some common techniques used by attackers and the best prevention measures to minimise successful attacks and...

What is Safe? Baby Don't Hack Me, Don't Hack Me, No More!
Zoe Rose, Canon EMEA

Topics include: - Defining penetration testing - Demystifying Hackers  - Social engineering for good and evil  - Identifying how to incorporate malicious views, marvelously (i.e. for good). 

Panel - Combating Social Engineering

Date: Tuesday, November 13, 2018 Time: 12:10-13:10

Panel - Combating Social Engineering
Markus Gr√ľneberg, Okta • Richard De Vere, The AntiSocial Engineer Limited • Enrico Frumento, Cefriel • Zoe Rose, Canon EMEA

Using Social Engineering attacks cyber-criminals can get obtain confidential information from a private person or an employee of a company.  In this panel discussion speakers will discuss the current social engineering challenges and attack techniques. Panellists will focus on the ways companies can better prepare the employees for these threats and comment about the necessity of specific tools.

The Evolution of Social Engineering 2.0 and Its Role in the Modern Cybercrime. The Experience of the Project DOGANA
Enrico Frumento, Cefriel

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. However, using Social Engineering to attack enterprises is not new – the presentation will show and explain which is the new level of sophistication, why SE is nowadays used in more than 92% of the successful attacks and what is the so called Social Engineering 2.0. This new evolution in cybersecurity can be called...

Berlin, Germany


Cybersecurity Leadership Summit 2018 Europe

Registration fee:
€1200.00 $1500.00 S$1920.00 13200.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • Nov 12 - 14, 2018 Berlin, Germany