Protecting Your Organization Against Social Engineering Attacks

Presented at Black Hat Europe 2017, Dec. 6, 2017, 4:15 p.m. (25 minutes)

While IT and security technology continue to evolve, most security experts – and most attackers – agree that people are the weakest link in any information system. How do today’s attackers fool users into giving up their credentials or downloading malicious code? What are the latest methods in this “social engineering,” and what types of attacks are you likely to experience in your organization? And most importantly, what can your enterprise do to prevent these social engineering attacks? In this session, top experts will discuss the latest social engineering exploits, and offer some advice on how you can mitigate them.


Presenters:

  • Joshua Crumbaugh / Naga - Founder, PeopleSec   as Joshua Crumbaugh
    Joshua Crumbaugh is the founder of PeopleSec and experienced penetration tester with an impressive background performing high end security assessments against high profile targets. He is also an expert social engineer who has talked his way into bank vaults, fortune 500 data centers, corporate offices, restricted areas of casinos and more. His experiences highlighted a significant need for a better "human solution" -- This led him to a passion in social engineering and better understanding ways to stop social engineering attacks.
  • Kelly Sheridan - Associate Editor, Dark Reading
    Kelly Sheridan is an associate editor for Dark Reading. She most recently reported on financial tech for Insurance & Technology, before which she was a staff writer for InformationWeek and InformationWeek Education. When she's not catching up on the latest in tech, Kelly enjoys running and blogging for health and lifestyle websites. She earned her BA in English from Villanova University.
  • Glenn Devitt - CEO, Delitor
    Glenn Devitt is a veteran with 11 years experience in the United States Army with a background in Human Intelligence (HUMINT) and Counterintelligence (CI). During his military career he was deployed to both Iraq and Afghanistan and was assigned to multiple Joint Task Forces. He has also had the privilege of being an instructor at the Operator Advance Course (OAC), Source Operations Course, Special Operation Forces Physical Surveillance Course, and the Program Manager for the Cyber Operator Greyhat Course. After his military career he joined the H.E.R.O. (Human Exploitation Rescue Operative) Program. This program is designed to allow special operations veterans the chance to become accredited Homeland Security Investigations Computer Forensic Analysts to help combat child exploitation and human trafficking. Glenn then left to start his own company, Delitor Inc., and has spent the last year supporting governments around the world in targeting human trafficking networks through undercover operations and training agents on how to conduct cyber enabled operations.

Links:

Similar Presentations: