| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Before the Internet, con men used social engineering to get what they wanted. The playing field may have changed, but trust - and violating it - are still the tools of the trade for con men, frausters and hackers. This talk focuses on the basics of practical deception in the field. I am a security consultant in the financial industry and run a physical penetration testing program. I train testers and lead teams in the field. I am fascinated by the long history of con artists and tricksters who used the human propensity to trust for their gain. In my professional role I use social engineering to test security controls and help organizations train their employees to resist common social engineering tactics.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast