Date

Oct 01 2020
Expired!

Time

2:00 pm - 3:00 pm

Endnote: How to Hack a Human

Securing a network requires technical security, threat awareness, and regular training to protect users and data. Despite our best efforts, we are often challenged to secure the most tricky of all OSI Layers:
Layer 8. In this presentation, the speaker will:
1. Describe a high level overview of types of two human cyberattack vectors, and two human intelligence models that can be used to identify and exploit them
2. Present an open source intelligence targeting methodology that focuses on four “identifier” categories
3. Walk the audience through a cyber targeting use case focused on humans as threat vectors, based on a project focused on a North American public sector organization

Click here to enter the session

The event is finished.

Submit a Comment

Your email address will not be published. Required fields are marked *