Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Mitigating the Social Engineering Threat

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

The social engineer is a highly-skilled, highly-motivated adversary and for the information security professional who knows that the human factor is the biggest weakness in any multi-layered defense strategy, social engineering represents one of their biggest challenges.

Some of the most significant recent data breaches, from the high-profile attack on Target to the recent JP Morgan breach, are suspected to be the result of social engineering. So how can information security professionals protect their organization from the risk of social engineering – what are the policies, procedures and technologies that need to be in place to address the threat?

During this session, the panel will provide insight into how social engineers manipulate individuals and exploit security weaknesses, and share best practice on how to manage the risk.

  • Analyse how social engineers target specific information and collect, sort and utilise that data
  • Identify the factors that make an organization vulnerable to a social engineering attack
  • Determine how to develop systems, policies and procedures to protect your organization from social engineering
  • Learn  how to test your organization’s susceptibility to social engineering to identify weaknesses
  • Discover how to detect unintended disclosure of information on social networking sites

Access best-practice strategies to educate employees to protect against social engineering

Speakers

Jessica  Barker

Cyber Security Consultant, Jessica Barker LTD

Colin  Greenlees

Colin Greenlees Director of Information Security, Article 10

    Amar Singh

    CISO and Founder Cyber Management Alliance and Give01Day, Cyber Management Alliance

      Victoria Windsor

      Moderator, Infosecurity Magazine