Social Engineering Applied: Exploit the Target Hack3rcon 3 (Hacking Illustrated Series InfoSec Tutorial Videos)
Social Engineering Applied: Exploit the Target
Hack3rcon 3


While we all love being able to just roll in, pop some boxes and walk away with the hashes then call it a day; This type of mindset doesn't bring return customers. In this presentation we'll be discussing some of the common issues with managing technical assessments to ensure that the customers we hack today will call us back again in the future to hack them again.

Keith Pachulski

Keith Pachulski is a Security Consultant based out of Northeast Pennsylvania with over 16 years of experience in the Information Security and Physical Security industries specializing in Penetration Testing, Vulnerability Assessment, Risk Assessments & Compliance for the private and public sectors. Prior to consulting, he was the CSO for a medium sized company in Pennsylvania as well as creating and managing a Managed Security Services Team servicing the northeast PA area. He recently started the NorthEast PA Information Security Group http://groups.google.com/group/nepa-infosec-group
 

Back to Hack3rcon 3 video list



If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek