Tuesday, June 19 | 10:15-11:30 AM
Recommended Prerequisite: Knowledge of the various threat actors who may seek to breach information security for financial gain and/or competitive advantage
Field of Study: Specialized Knowledge
According to the 2018 Verizon Data Breach Investigations Report, more than 90% of successful security breaches start with some aspect of social engineering. By exploiting publicly available information and predictable human behavior, fraudsters manipulate their targets into taking certain actions that can lead to serious compromise and financial ruin.
This session will break down the methodology of how social engineers collect targeting information, impersonate legitimate requesters and manipulate targets. Within the context of a case study, various social engineering techniques will be discussed and demonstrated.
You Will Learn How To:
Director of Business Intelligence, Strategic Risk Management LLC
Following a distinguished career as a Senior Intelligence Officer within the Central Intelligence Agency (CIA), Peter Warmka joined Strategic Risk Management in 2010 as Director of Business Intelligence. In this capacity, he has led numerous due diligence investigations on behalf of corporate clients pursuing mergers and acquisitions that have uncovered significant fraud within target entities. Warmka’s professional expertise includes the areas of cybersecurity, intelligence collection, competitive intelligence and asset protection management. With his extensive background in social engineering, Warmka joined Webster University in 2015 as an Adjunct Professor, where he lectures on intelligence and counter-intelligence as it relates to cybersecurity.
Thanks for signing up!