Overview
Explore social engineering techniques and protective measures in this 41-minute conference talk from NDC Conferences. Delve into the world of manipulation tactics used by attackers to exploit human vulnerabilities and gain access to critical systems. Learn about pre-texting, elicitation, and body language as tools for deception. Discover the methodologies, statistics, and common attacks employed in social engineering, including impersonation. Examine case studies of notorious social engineers like Kevin Mitnick, Frank Abagnale, and Charles Ponzi. Gain insights into information gathering, questioning techniques, and manipulation strategies involving fear, guilt, and the "foot in the door" approach. Equip yourself with personal and corporate mitigation techniques to safeguard against these threats and protect your organization's sensitive information.
Syllabus
Intro
3 Methodologies
Statistics : Impersonation
Types of Social Engineer
Why Social Engineering?
Common Attacks
Kevin Mitnick
Frank Abagnale
Charles Ponzi
Social Engineering Techniques
Information Gathering
Questioning Techniques
Pretexting vs Elicitation
Manipulation - Fear
Manipulation - Guilt
Manipulation - Foot in the Door
Personal Mitigation Techniques
Corporate Mitigation Techniques
Taught by
NDC Conferences