Главная
Study mode:
on
1
Introduction
2
Thanks to the organizers
3
What is social engineering
4
Why does it work
5
Threats
6
Fight or Flight
7
Social Engineer Traits
8
Company Website
9
Job Experiences
10
LinkedIn
11
Ex Employee
12
Phishing Attack
13
Facebook
14
Bing Maps
15
Social Engineer Attacker
16
Social Engineer Location
17
Social Engineer Phone
18
Foca
19
Foca Demo
20
The Devil is in the Details
21
Being a Female in this Industry
22
Planning Attacks
23
The Missing Floormat
24
Lady Purse
25
RFID Cards
26
Access Cards
27
Card Printers
28
Corporate Logo
29
Iron On Patches
30
ABM Jacket
31
Another Secret
32
More Mature Clients
33
How to Stop Social Engineering
34
RFID Blocking Card Holders
35
User Password Change
36
Making it Matter to Users
37
Scanning QR Codes
Description:
Explore the world of social engineering through a revealing conference talk that exposes common tactics and provides strategies to defend against them. Delve into the psychology behind social engineering attacks, learn about the traits of successful social engineers, and discover how attackers exploit various information sources like company websites, LinkedIn profiles, and social media. Witness a live demonstration of information gathering tools, and gain insights into the unique challenges faced by women in the cybersecurity industry. Uncover real-world examples of social engineering techniques, including physical security breaches and impersonation tactics. Conclude with practical advice on how to protect yourself and your organization from social engineering threats, emphasizing the importance of user awareness and security best practices.

Confessions of a Social Engineer - My Dirty Tricks and How to Stop Them - Valerie Thomas

Add to list