Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Mitigating the Social Engineering Threat

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

The social engineer is a highly-skilled, highly-motivated adversary and for the information security professional who knows that the human factor is the biggest weakness in any multi-layered defense strategy, social engineering represents one of their biggest challenges.

Some of the most significant recent data breaches, from the high-profile attack on Target to the recent JP Morgan breach, are suspected to be the result of social engineering. So how can information security professionals protect their organization from the risk of social engineering – what are the policies, procedures and technologies that need to be in place to address the threat?

During this session, the panel will provide insight into how social engineers manipulate individuals and exploit security weaknesses, and share best practice on how to manage the risk.

  • Analyse how social engineers target specific information and collect, sort and utilise that data
  • Identify the factors that make an organization vulnerable to a social engineering attack
  • Determine how to develop systems, policies and procedures to protect your organization from social engineering
  • Learn  how to test your organization’s susceptibility to social engineering to identify weaknesses
  • Discover how to detect unintended disclosure of information on social networking sites

Access best-practice strategies to educate employees to protect against social engineering


Jessica  Barker

Cyber Security Consultant, Co-Founder, Co-CEO, Cygenta

Colin  Greenlees

Colin Greenlees Director of Information Security, Article 10

    Amar Singh

    CISO and Founder Cyber Management Alliance and Give01Day, Cyber Management Alliance

      Victoria Windsor

      Moderator, Infosecurity Magazine