Watch now this Infosecurity Magazine Autumn Virtual Conference session.
>>Register now for the 2017 Infosecurity Magazine Spring Virtual Conference
The social engineer is often a highly-skilled, highly-motivated adversary. As people and their working environment become more connected, hacking the human rather than the network is often the most effective route for an adversary. As any information security professional knows, the human is the weakest link in any defense strategy and consequently it is essential to understand how social engineers manipulate individuals and exploit security weaknesses. During this session the speakers will share their insight into social engineering attacks and provide practical advice on how to defend your organization.
- Find out how social engineers exploit the human vector
- Learn how you can protect your users and organizations from attack
- Understand the policies, procedures and technologies that need to be in place to address the threat
- Discover how users can be educated to protect themselves against attack.