Mitigating the Social Engineering Threat

The social engineer is a highly-skilled, highly-motivated adversary and for the information security professional who knows that the human factor is the biggest weakness in any multi-layered defense strategy, social engineering represents one of their biggest challenges.?

Some of the most significant recent data breaches, from the high-profile attack on Target to the recent JP Morgan breach, are suspected to be the result of social engineering. So how can information security professionals protect their organization from the risk of social engineering – what are the policies, procedures and technologies that need to be in place to address the threat?

During this session, the panel will provide insight into how social engineers manipulate individuals and exploit security weaknesses, and share best practice on how to manage the risk.

  • Analyse how social engineers target specific information and collect, sort and utilise that data
  • Identify the factors that make an organization vulnerable to a social engineering attack
  • Determine how to develop systems, policies and procedures to protect your organization from social engineering
  • Learn  how to test your organization’s susceptibility to social engineering to identify weaknesses
  • Discover how to detect unintended disclosure of information on social networking sites

Access best-practice strategies to educate employees to protect against social engineering


Photo of Jessica  Barker

Jessica Barker

Cyber Security Consultant, Co-Founder, Co-CEO, Cygenta

Photo of Colin  Greenlees

Colin Greenlees

Director of Information Security, Article 10

Photo of Amar Singh

Amar Singh

CISO and Founder Cyber Management Alliance and Give01Day, Cyber Management Alliance

Photo of Victoria Windsor

Victoria Windsor

Moderator, Infosecurity Magazine

What’s hot on Infosecurity Magazine?