
Endnote: How to Hack a Human
Securing a network requires technical security, threat awareness, and regular training to protect users and data. Despite our best efforts, we are often challenged to secure the most tricky of all OSI Layers:
Layer 8. In this presentation, the speaker will:
1. Describe a high level overview of types of two human cyberattack vectors, and two human intelligence models that can be used to identify and exploit them
2. Present an open source intelligence targeting methodology that focuses on four “identifier” categories
3. Walk the audience through a cyber targeting use case focused on humans as threat vectors, based on a project focused on a North American public sector organization