Security

TH07 Bypass Every Security Technology with Social Hacking: A Beginner's Toolkit

August 10th, 2017

9:30am - 10:45am

Dale Meredith

Owner

My Mentored Learning, Inc.

The weakest link is always the user. Not only your "standard" user, but also IT staff. By better understanding the "art" of social engineering, you'll get a better understanding of the types of attacks and methods attackers are using to gain access to your network or worse yet, hold your data for a ransom. This session will cover the four primary emotions attackers use to gain users trust, which eventually leads to the attacker gaining access to your resources.

You will learn:

  • Why social engineering works
  • About the various methods that attackers are using to social engineer your users
  • How to protect yourself and teach your users to protect themselves from this attack vector