John, while cyber attackers continually develop more sophisticated methods for penetrating enterprise computing systems, most exploits begin with a simple step: fooling users into breaking security policy. These "social engineering" attacks – including phishing, "watering holes", and social network attacks – are designed to trick your users into giving up passwords, opening malicious email attachments, or installing malware.
How can enterprises prevent "social engineering" attacks? Can users be trained to recognize such exploits and avoid them? Join Dark Reading as we invite top experts to discuss the most effective methods of defending against social engineering attacks. When you attend this webinar, you'll learn: - New Tricks social engineers' are using and be briefed on how they are still hurting enterprises hard using the oldest tricks in the book
- Techniques, training, and technologies that can bolster your defenses against social engineering attacks
- How new technologies are changing the nature and methods of social engineering
Register and attend to learn how social engineering works, and how to recognize it in action, before it's too late!
Webinar Sponsored by: Privacy Policy |