The social engineer is a highly-skilled, highly-motivated adversary and for the information security professional who knows that the human factor is the biggest weakness in any multi-layered defense strategy, social engineering represents one of their biggest challenges.
Some of the most significant recent data breaches, from the high-profile attack on Target to the recent JP Morgan breach, are suspected to be the result of social engineering. So how can information security professionals protect their organization from the risk of social engineering – what are the policies, procedures and technologies that need to be in place to address the threat?
During this session, the panel will provide insight into how social engineers manipulate individuals and exploit security weaknesses, and share best practice on how to manage the risk.
- Analyse how social engineers target specific information and collect, sort and utilise that data
- Identify the factors that make an organization vulnerable to a social engineering attack
- Determine how to develop systems, policies and procedures to protect your organization from social engineering
- Learn how to test your organization’s susceptibility to social engineering to identify weaknesses
- Discover how to detect unintended disclosure of information on social networking sites
Access best-practice strategies to educate employees to protect against social engineering