![]() One of the largest threat vectors we face every day is the insider threat. Understanding as to why social engineering tactics work and how they can be usedįor maximum blast effect to the benefit Micro Strategies’ customers. Has changed my perspective on social engineering, providing a much deeper Understanding the psychology and scientific method of the tactics I’ve been leveraging for years was fascinating. The insider threat course explains the science behind how social engineering works, why it’s so effective and how to leverage the very same tactics against adversaries. As we all know (or should know), hacking people is far more effective than hacking computers hackers and scammers alike use social engineering against human targets to achieve their goals. However, while it may be a challenging prospect, it’s well worth the time and effort.Īs an ethical hacker, I’ve always enjoyed the social engineering aspect of my craft. While the class was fantastic, the only issue I have with courses such as these is the fact that they are condensing a 3+ week course into just a few days (or less). The course was led by multiple instructors with backgrounds in law enforcement, military, and intelligence/counterintelligence. This year I decided to go low-tech and dive into counter social engineering the official class title was “Insider Threat Hunting – Track, Elicit, Interview, and Mitigate. Often designed exclusively for Black Hat, these hands-on attack and defense courses are led by some of the most sought after industry and subject matter experts from all over the world with the goal of defining and defending tomorrow’s information security landscape.īlack Hat Training: Insider Threat Hunting & Social Engineering Black Hat Training offers attendees deeply technical hands-on courses on topics ranging from broader offensive security to the latest in penetration testing, infrastructure hacking, mobile application security, analyzing automotive electrical systems, and everything in between. My primary reason for attending was for technical training. Hackers and security professionals from around the world congregate to learnĪbout new technology vulnerabilities, cyberattacks, and more. ![]() Providing attendees with the very latest in research, development, and trends.ĭEFCON is the security/hacker community conference that occurs right after the ![]() Know, Black Hat USA is the world’s leading information security event, What an overwhelmingĮxperience it was-there was so much to see and do! For those of you that don’t ![]() The first installment can be found here.Īttended Black Hat USA 2019 / DEFCON 27 in Las Vegas. This blog is the second in a three-part series discussing security concepts and tactics I observed and participated in at Black Hat 2019 / DEF CON 27. By Edward Serafin, Chief Security Architect ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |