Train Employees to Spot and Stop the Scams Having invested smartly in information and physical security, and you think organization is safe from external attacks? Well, the strongest defenses in the
world are worthless if someone leaves the gate open. That "someone" is any one
of your well-intentioned employees, and the key to the "gate" is that
individual's susceptibility to social engineering. Register for this webinar to
receive expert advice on:
When an intruder targets an organization for attack, be it for theft, fraud,
economic espionage, or any other reason, the first step is reconnaissance. They
need to know their target. The easiest way to conduct this task is by gleaning
information from those that know the company best. Their information gathering
can range from simple phone calls to dumpster diving. It is not beyond an
attacker to use everything at their disposal to gain information. Much like the
telemarketer badgers the elderly couple into investing in fraudulent stock, a
social engineer uses all the tricks in the book to obtain the goal. Being cognizant of these types of attacks, educating your employees about the
methodologies of the attacks, and having a plan in place to mitigate them are
essential to surviving these manipulations. This presentation focuses on the core issues of social engineering's methodologies, effectiveness and prevention - as well as how to test the effectiveness of your training efforts. These core components include:
You will understand social engineering methodologies, why it is the most effective tool in attacking a company and why so many people fall victim. You will also learn how the importance of effective corporate communication and incident response planning can prevent attacks from occurring in the first place. You will discover new ways to test the effectiveness of your awareness efforts. And finally you will learn what to do "next" after the attack has occurred. Can you put the genie back in the bottle? Yes, if you know where the genie is likely to go next. |
ISSC Governance >