How Cyber Attackers Research Your Organization, And What To Do About It

For most online criminals, the first step in a major attack is to do research on the target organization. This “reconnaissance” may involve sending fake emails to employees, stalking executives on social media, making fraudulent phone calls, or other social engineering techniques that might yield credentials or help lay the groundwork for a more sophisticated attack. How do you know when your organization is the target of this type of reconnaissance – and what can you do to disrupt it?

In this eye-opening webinar, you’ll learn how attackers can take advantage of your website, employees’ social media, and other vehicles to learn about your organization – and get the ammunition they need to convince your end users to trust them.

On Demand
1h 00min

Attend this webinare and get:

  • Real examples of how attackers gather intel and use it to launch convincing phishing exploits
  • Best practices for disrupting attackers’ online reconnaissance methods
  • Ways to enhance your staff’s cybersecurity awareness, so they are more aware of reconnaissance, less susceptible to social engineering

Featured Speakers

  • Sara  Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

  • John  Sawyer
    John Sawyer
    Senior Managing Consultant

    John H. Sawyer is a Senior Managing Consultant with InGuardians, where he specializes in red team assessments, social engineering, and intrusion analysis. He is member of the winning team from DEF CON 14’s and 15’s Capture the Flag competition, co-founder of the University of Florida Student Infosec Team, and founder of SwampSec. John is also a respected author and trainer for organizations including Dark Reading and InformationWeek Magazine, Interop, BruCON, OWASP AppSec DC, SANS, and B-Sides Jacksonville.

  • Erich  Kron
    Erich Kron
    Security Awareness Advocate

    Erich Kron, Security Awareness Advocate at KnowBe4, is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. He has managed the technical integration and functional testing of multi-million-dollar enterprise level technology projects within the Department of Defense, as well as large military security programs. Erich has worked with information security professionals around the world to provide the tools, training and educational opportunities to succeed in the InfoSec industry.

Sponsored By