Social engineering a non-technical weapon of the digital age

Cybercriminals use social manipulation techniques in attack strategy learn more in this CSB Global seminar.

October International Cyber Security Month

Social engineering a non-technical weapon of the digital age

Have you ever received a suspicious email asking you for personal information? Or have you received a call from someone claiming to be from a well-known company and asking you to disclose confidential information? If so, then you should know that you have fallen victim to a social engineering technique.

Social engineering is a technique used by cybercriminals to trick and persuade people into revealing confidential information. In this seminar, you will learn about the different social engineering techniques used by cybercriminals and how you can protect yourself from them.

During the seminar, we will show you the techniques of social engineering attacks and give you useful tips on how to protect yourself from them. In addition, you will be able to ask questions and clarify doubts.

This seminar is intended for anyone interested in protecting themselves against social engineering attacks, regardless of whether or not you have experience in information security. We look forward to seeing you. Send an email to [email protected] with your full name and the name of the seminar, we will send you back the link to connect to the seminar.

Seminar content:

  • Introduction to social engineering: what is it and what is it used for in cybercrime?
  • History of social engineering
  • Types of social engineering techniques: You will learn about the different types of techniques used by cybercriminals to trick people and obtain confidential information.
  • Social engineering through social networks: You will learn how cybercriminals use social networks to obtain confidential information and what is open source intelligence (OSINT).
  • Pretexting attacks: You will understand how cybercriminals use deception and persuasion to obtain confidential information through pretexting.
  • Mitigation techniques: You will get useful tips to protect yourself from social engineering attacks.

LET'S TALK NOW