Getting under the skin: The Social Engineering techniques
Mauro Verderosa - 5 years ago
In a world where the cybersecurity applications are day after day more protected and solid, the most malicious attackers decide to target the weakest ring of system: the human.
Through this presentation we will discover what are the social engineering attacks, how they are defined, how they are performed and how they can be identified before the attacker might be able to gain the access to the most sensitive information.
Jobs with related skills

Cloud Security Architect - STACKIT (m/w/d)
STACKIT
·
5 days ago
Heilbronn, Germany
Hybrid
Newest jobs

Web Developer (m/w/d)
Deichmann SE
·
today

DevOps Engineer (m/w/d)
Deichmann SE
·
today

Senior Developer - Generative AI (x|f|m)
Sartorius
·
yesterday
Municipality of Madrid, Spain
Hybrid
Related Videos