Please note: You can view the recording by simply clicking 'Register to Attend' and completing the registration form.
People are a vital and often overlooked component of a security system, they should be considered as part of the attack surface available to an attacker; without proper awareness and training, they could be the weak link that exposes your data to the world.
In this webinar, we will give details of what social engineering entails, tactics hackers might use to their advantage and provide insight into what your organisation can do to better protect itself from these types of attacks.
In this webinar, you will learn:
- What social engineering is;
- Strategies an attacker might use;
- Common mistakes organisations make;
- Some example case studies
- Tips for defending against these types of attacks
Who should attend?
This webinar will be beneficial for CISOs, Testing managers, IT managers, Security Analysts and Audit & Risk managers looking to improve your organisation's security posture.
Presenter:
Jordan is a Lead Consultant at Context and has been a full-time penetration tester since 2016. Jordan is heavily involved in the Social Engineering service line here at Context and has undertaken a significant number of varied Social Engineering engagements. His other main areas of technical proficiency include Red Teaming, Network Infrastructure Testing, Windows Domain Exploitation and Linux Configuration and Exploitation. Jordan also has experience with the majority of other penetration testing services offered by Context.