Главная
Study mode:
on
1
Intro
2
Vlads Story
3
Vlads History
4
Learning Social Engineering
5
Protecting against Social Engineering
6
Awareness Training
7
Cybersecurity
8
Business Risk
9
Tools
10
Fear
11
Social Incentives
12
Habits
13
If Then Reward
14
Any Other Ideas
15
Another Example
16
The Trigger
17
Trigger Examples
18
Sources of Awareness
19
Security Awareness Improvement
20
The Retest
21
Conclusion
Description:
Explore a comprehensive conference talk on building an effective anti-social engineering awareness program. Discover how to transform employees from potential security vulnerabilities into powerful assets against cyber threats. Learn about the speaker's journey from skepticism to developing a successful approach backed by social psychology and behavioral science. Gain insights into strategies that draw parallels between surviving real-world dangers and navigating the digital landscape. Uncover the principles behind a program that significantly increases user resilience to modern cyber threats employing social engineering techniques. Delve into practical applications of this approach in high-profile Ukrainian companies facing unique security challenges. Acquire knowledge on implementing fear-based tactics, social incentives, habit formation, and reward systems to enhance cybersecurity awareness. Examine various triggers, sources of awareness, and methods for improving and retesting security consciousness within organizations. Read more

From Weakest Link to Retaliation Weapon - Building Efficient Anti-Social Engineering Awareness Program

BruCON Security Conference
Add to list
0:00 / 0:00