Overview
Explore social engineering techniques and protective measures in this 50-minute conference talk from NDC Conferences. Delve into the world of manipulation tactics used by attackers to exploit human vulnerabilities and gain access to critical systems. Learn about pre-texting, elicitation, and body language as tools for deception. Examine real-world examples of phishing and vishing attacks, and understand why social engineering poses such a significant threat to organizations. Discover the methodologies employed by infamous social engineers like Kevin Mitnick, Frank Abagnale, and Charles Ponzi. Gain insights into information gathering, questioning techniques, and various manipulation strategies. Equip yourself with personal and corporate mitigation techniques to safeguard against these psychological attacks and strengthen your organization's human firewall.
Syllabus
Intro
3 Methodologies
Statistics : Phishing
Examples: Phishing
Techniques : Phishing
Statistics : Vishing
Types of Social Engineer
Why Social Engineering?
Common Attacks
Kevin Mitnick
Frank Abagnale
Charles Ponzi
Social Engineering Techniques
Information Gathering
Questioning Techniques
Pretexting vs Elicitation
Manipulation - Fear
Manipulation - Guilt
Manipulation - Foot in the Door
Personal Mitigation Techniques
Corporate Mitigation Techniques
Taught by
NDC Conferences