Social Engineering: Hybrid Attacks and Novel Techniques

1 hrs

Are you prepared for the sophisticated new face of social engineering? In this eye-opening webinar, we delve into the tactics threat actors use to exploit technology and manipulate human behavior. We'll trace the roots of social engineering, highlighting historical events that laid the groundwork for today's complex attacks. Discover how advancements in machine learning, particularly in face and voice cloning, are fueling a new era of social engineering.

Gain critical insights to safeguard yourself and your organization from these ever-evolving threats. Join us and unlock the secrets behind the mask of modern social engineering.

 

[Webinar ID# 5346] 

* Required Fields

Social Engineering Webinars FAQs

  • Cybersecurity Professionals
  • IT Managers and Administrators
  • Business Leaders and Executives
  • Software Developers and Engineers
  • General IT Staff

Attending this webinar will give participants valuable insights and practical knowledge to better protect themselves and their organizations from sophisticated social engineering attacks.

Supercharge your careers with Agile and Scrum skills. We recommend following this webinar with the following:

Learn more about our Cybersecurity Training and Talent Solutions

Scott Issac

Scott began his cybersecurity journey as an Electronic Warfare Systems Operator, where he honed his skills and gained valuable experience. During an operational tour of Afghanistan, he provided critical SIGINT support, further deepening his expertise. Scott’s career progressed as he played a key role in the formation of two operational Cyber Units, demonstrating leadership and innovation. He then served as the Head of Cyber Product Development with QA Ltd, where he spearheaded cutting-edge projects and initiatives. His passion for education led him to deliver training at prestigious conferences such as Blackhat US/EU, B-Sides, NullCON, BruCON, and Nano.

Now, as a freelance cybersecurity consultant, Scott continues to leverage his extensive knowledge and experience to help organizations enhance their security posture.

Chat With Us