Information Security Research Library

Powered by Bitpipe.com

ABSTRACT:

People are generally considered the weak link in the security chain - and attackers know it too. In-fact, today's hackers are using some of the most subtle information to "get inside" your organization; bypassing even the most rigorous security protocols and infiltrating even the likes of Wells Fargo, where a socially engineered attack netted just over $2.1 million dollars.

Join us on February 21st from 9:30 AM - 2:00 PM for our virtual conference, #TreatManagement: Protecting Your Enterprise From Social Engineering Attacks, where we'll examine what hackers are doing with social engineering, phishing and other means of exploiting people to gain access at data and networks.

Attend on Thursday February 21st to:

  • Gain an insiders perspective to the latest social engineering tactics.
  • Learn how to proactively detect phishing and social engineering attacks.
  • Interact directly with our expert speaker, top vendors and your peers.
  • Earn up to 3 CPE credits without cost of travel.

(THIS RESOURCE IS NO LONGER AVAILABLE.)

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.