Business Need Trumps Security This is the hardest thing for defense geeks to accept
7
Infosec Needs Champions
8
What Do You Want?
9
What is an Infosec Geek to do?
10
Talk you Introverted Bastards!
11
Put On Your Social Engineering Hat
12
Find out how to blend in
13
Examine the Target
14
Insert The Data
15
Case Study: Prox Card Login (2)
16
Listen to the Users
17
Change Your Plans
18
Communication
19
Non-Technical Management
20
Conclusion
Description:
Explore social engineering techniques to improve organizational security acceptance in this Black Hat USA 2012 conference talk. Discover how to bridge the gap between information security teams and users, enhancing security awareness and policy adherence. Learn to overcome departmental conflicts, communicate effectively with non-technical management, and apply social engineering tactics to blend in and understand user perspectives. Gain insights on adapting security plans based on user feedback, championing information security within the organization, and balancing business needs with security requirements. Examine a case study on proximity card login and develop strategies to transform information security from an obstacle into an integral part of organizational culture.
Hacking the Corporate Mind - Using Social Engineering to Improve Organizational Security Acceptance