Understanding and Preventing Social Engineering Attacks

While cyber attackers continually develop more sophisticated methods for penetrating enterprise computing systems, most exploits begin with a simple step: fooling users into breaking security policy. These "social engineering" attacks – including phishing, "watering holes", and social network attacks – are  designed to trick your users into giving up passwords, opening malicious email attachments, or installing malware. How can enterprises prevent this sort of attack? Can users be trained to recognize such exploits and avoid them? In this webcast, experts discuss the most effective methods of defending against social engineering attacks.

On Demand
1h 00min

When you attend this webinar, you'll learn:

  • New Tricks social engineers' are using and be briefed on how they are still hurting enterprises hard using the oldest tricks in the book  
  • Techniques, training, and technologies that can bolster your defenses against social engineering attacks
  • How new technologies are changing the nature and methods of social engineering

Register and attend this webinar to learn how social engineering works, and how to recognize it in action, before it's too late!

Featured Speakers

  • Chris Hadnagy
    Chris Hadnagy
    Founder & CEO
    Social-Engineer, Inc.

    Chris Hadnagy has over 16 years' experience as a practitioner and researcher in the security field. His efforts in training, education, and awareness have helped to expose social engineering as the top threat to the security of organizations today. He established the world's first social engineering framework at http://www.social-engineer.org/, providing an invaluable repository of information for security professionals and enthusiasts. That site grew into a dynamic web resource including a podcast and newsletter, which have become staples in the security industry and are referenced by large organizations around the world. Chris also created the first hands-on social engineering training course and certification, Advanced Practical Social Engineering, attended by law enforcement, military, and private sector professionals. A sought-after writer and speaker, he has spoken and trained at events such as RSA and Black Hat. He is also the best-selling author of two books: Social Engineering: The Art of Human Hacking and Unmasking the Social Engineer: The Human Element of Security.

  • Jan Liband
    Jan Liband
    Chief Marketing and Strategy Officer

    Jan is an accomplished Silicon Valley marketing executive with over 20 years experience in high-tech B2B marketing. Jan's industry expertise encompasses advanced networking technologies, cloud, security, application development, and data management. Jan joins SlashNext from Celigo, a venture-backed Integration Platform-as-a-Service provider where he served as Vice President of Marketing and built the marketing team from scratch. Prior to Celigo, Jan was Chief Marketing Officer for DreamFactory, the company behind the DreamFactory open source REST API platform. Jan also held executive marketing positions with other private and publicly-held firms, including CollabNet, Embarcadero Technologies, and Wind River Systems.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By