INTRODUCTION:
During this course, a former CIA intelligence officer who spent over two decades breaching the security of target organizations overseas will share methodologies utilized by today’s threat actors to circumvent the technological controls, policies and procedures put in place to safeguard organizations and their data.
KEY TAKEAWAYS:
- Identify threat actors and what are their specific objectives when targeting firms in your industry.
- Understand what information posted online by companies make them more vulnerable to human hacking attempts.
- Appreciate how social media is utilized to identify, assess, and initiate contact with insider targets.
- Identify advanced social engineering techniques which go well beyond today’s basic phishing
- Empower employees to take back control of their security by incorporating specific risk mitigation techniques.