Monday, June 18 | 10:15-11:30 AM
Level: Intermediate
Recommended Prerequisite: Knowledge of the various threat actors who may seek to breach information security for financial gain and/or competitive advantage
Field of Study: Specialized Knowledge
According to the 2018 Verizon Data Breach Investigations Report, more than 90% of successful security breaches start with some aspect of social engineering. By exploiting publicly available information and predictable human behavior, fraudsters manipulate their targets into taking certain actions that can lead to serious compromise and financial ruin.
This session will break down the methodology of how social engineers collect targeting information, impersonate legitimate requesters and manipulate targets. Within the context of a case study, various social engineering techniques will be discussed and demonstrated.
You Will Learn How To:
- Compare social engineering techniques that can be deployed against a target
- Identify security best practices to combat these threats, including the design and implementation of a social engineering awareness program
- Evaluate the desire to make personal or company information publicly available against making yourself vulnerable to exploitation