Главная
Study mode:
on
1
Intro
2
The Identity Paradox
3
Risk Management Social Engineering
4
How to Stop Hackers
5
Unfluence
6
Office of No
7
Schneier and Random
8
Access Intent Knowledge
9
Buffer Overflow
10
Human Buffer Overflow
11
Embedding Stories
12
Dale Carnegie
13
Johnny Long
14
Power of Observation
15
Risk
16
Jack Jones
17
Risk Equation
18
Risk Management Steps
19
Risk Framework
20
Loss Event Frequency
21
pretexting
22
how to build rapport
23
what I tell security folks
24
eye contact
25
Twitter
26
Trading Program
Description:
Explore the dark side of influence and social engineering in this 54-minute conference talk from Converge 2015. Delve into topics such as the identity paradox, risk management, and how to stop hackers. Learn about the concept of "unfluence" and the Office of No. Examine ideas from Bruce Schneier on randomness and access intent knowledge. Understand buffer overflow attacks, both technical and human. Discover the power of embedding stories and observation techniques. Study risk assessment methodologies, including Jack Jones' risk equation and risk management steps. Gain insights into pretext creation, rapport building, and effective communication strategies for security professionals. Analyze the impact of social media platforms like Twitter on influence and security. Conclude with a discussion on trading programs and their relevance to information security.

Under the Influence - The Dark Side of Influence

Add to list
0:00 / 0:00