Загрузка страницы

The Science Behind Human Hacking (Social Engineering) - Christopher Hadnagy

Christopher Hadnagy discusses the science behind human hacking (Social Engineering) in his keynote address at the 2019 Compass Cybersecurity Symposium in North Providence, RI. To learn more about this event, click here:
https://www.compassitc.com/company/press/symposium2019

To learn more about Social Engineering, click here:
https://www.compassitc.com/services/social-engineering

Christopher J. Hadnagy is a professional social engineer, author, and speaker. He is the Founder and CEO of Social‐Engineer, LLC., a company that specializes in fully-managed social engineering services, consulting, and training for some of the globe’s largest organizations. He is also the CEO of Social-Engineer.Org which provides free resources and education about social engineering. In 2009, Chris wrote the world's first Social Engineering Framework and created the first hands-on social engineering training course with accompanying certification, which is attended by law enforcement, military, and private sector professionals. In 2018, Chris wrote the Social Engineering Code of Ethics, now being used by private and government entities worldwide. He is the author of four books, writing some of the very first books in the field of social engineering. Chris is also the Founder, Executive Director, and Board Member of the 501(c)(3) organization, the Innocent Lives Foundation that unmasks anonymous child predators and reveals their true identities using legal hacking techniques and data from open-source intelligence. His efforts in fostering the structure, professionalism, and awareness of social engineering have helped to convey social engineering as one of the top threats in security to individuals and organizations today.

------------------------------­------------------------------­------------------------------­---

Founded in 2010, Compass IT Compliance is a nationwide leader in providing IT Security, Audit, and Compliance services to organizations of all sizes in a number of different industries. Our goal in 2010 and today remains the same: To partner with your organization to help you mitigate your overall Information Security Risk while providing you with the best customer service possible. Period.

Website: https://www.compassitc.com/
LinkedIn: https://www.linkedin.com/company/compass-it-compliance/
Facebook: https://www.facebook.com/CompassITC/
Twitter: https://twitter.com/CompassITC

Видео The Science Behind Human Hacking (Social Engineering) - Christopher Hadnagy канала Compass IT Compliance
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
19 октября 2019 г. 0:46:23
00:37:38
Другие видео канала
Hacking Humans: Five Ways AI Manipulates Us  | Prof. Dan Siciliano | TEDxPaloAltoHacking Humans: Five Ways AI Manipulates Us | Prof. Dan Siciliano | TEDxPaloAltoT100 So you wanna be a Social Engineer Christopher HadnagyT100 So you wanna be a Social Engineer Christopher HadnagyHow phishing scammers manipulate your amygdala and oxytocin | Christopher Hadnagy | TEDxFultonStreetHow phishing scammers manipulate your amygdala and oxytocin | Christopher Hadnagy | TEDxFultonStreetLatest Techniques in Hacking the Human | SANS Security Awareness SummitLatest Techniques in Hacking the Human | SANS Security Awareness SummitNicholas Christakis: The Sociological Science Behind Social Networks and Social InfluenceNicholas Christakis: The Sociological Science Behind Social Networks and Social InfluenceDEF CON 24 SE Village - Chris Hadnagy - 7 Jedi Mind Tricks: Influence Your Target without a WordDEF CON 24 SE Village - Chris Hadnagy - 7 Jedi Mind Tricks: Influence Your Target without a WordHuman Hacking: The Psychology Behind Cybersecurity | Dr. Erik J. Huffman | TEDxColoradoSpringsHuman Hacking: The Psychology Behind Cybersecurity | Dr. Erik J. Huffman | TEDxColoradoSpringsThe art of misdirection | Apollo RobbinsThe art of misdirection | Apollo RobbinsDEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (w speaker)DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (w speaker)DEF CON 23 - Samy Kamkar - Drive it like you Hacked it: New Attacks and Tools to WirelesDEF CON 23 - Samy Kamkar - Drive it like you Hacked it: New Attacks and Tools to WirelesSocial Forensication: A Multidisciplinary Approach to Successful Social Engineering - Joe GraySocial Forensication: A Multidisciplinary Approach to Successful Social Engineering - Joe GrayDEF CON 22 - Chris Hadnagy - What Your Body Tells Me - Body Language for the SEDEF CON 22 - Chris Hadnagy - What Your Body Tells Me - Body Language for the SEThe Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant OllamHacking Humans : Social Engineering Techniques and How to Protect Against Them - Stephen HauntsHacking Humans : Social Engineering Techniques and How to Protect Against Them - Stephen HauntsHow hackers take over your accounts using social engineering (Marketplace)How hackers take over your accounts using social engineering (Marketplace)The science of analyzing conversations, second by second | Elizabeth Stokoe | TEDxBermudaThe science of analyzing conversations, second by second | Elizabeth Stokoe | TEDxBermudaDEF CON 23 - Dennis Maldonado - Are We Really Safe? - Bypassing Access Control SystemsDEF CON 23 - Dennis Maldonado - Are We Really Safe? - Bypassing Access Control SystemsDEF CON 23 - Social Engineering Village - Dave Kennedy - Understanding End-User AttacksDEF CON 23 - Social Engineering Village - Dave Kennedy - Understanding End-User AttacksChris Hadnagy | The Art of Human Hacking (Episode 146)Chris Hadnagy | The Art of Human Hacking (Episode 146)Human Factors: Social EngineeringHuman Factors: Social Engineering
Яндекс.Метрика