Mauro Verderosa
Getting under the skin: The Social Engineering techniques
#1about 7 minutes
The 1978 heist that pioneered social engineering
Stanley Mark Rifkin exploited procedural manuals and used pretexting to steal millions from a bank without any technical hacking.
#2about 3 minutes
Understanding the five main motivations for cybercrime
Cyber attacks are driven by distinct goals, including financial gain, business competition, political influence, ideology, or simple curiosity.
#3about 5 minutes
What social engineering is and its real-world impact
Social engineering is the psychological manipulation of people to divulge information, as seen in major breaches at companies like RSA and Sony.
#4about 7 minutes
An overview of common social engineering attack techniques
Attackers use various methods like pretexting, phishing, baiting, and tailgating to trick victims into compromising security.
#5about 2 minutes
Psychological triggers that make social engineering effective
Attacks succeed by exploiting human emotions and cognitive biases such as authority, guilt, panic, desire, and greed.
#6about 4 minutes
Deconstructing real-world phishing and vishing attacks
A simple phishing email is analyzed for pressure tactics, followed by a vishing example where an attacker impersonates a spouse to gain account access.
#7about 5 minutes
Understanding the complete social engineering attack lifecycle
A successful attack follows distinct phases, from initial reconnaissance and scanning to lateral movement, data exfiltration, and finally covering tracks.
#8about 6 minutes
A step-by-step case study from Mr. Robot
An elaborate attack demonstrates how gathering small, public details from social media and real-world observation leads to a full account compromise.
#9about 5 minutes
Key takeaways and defenses against social engineering
The most effective defense against social engineering is continuous employee training and fostering a security-aware culture to patch the human vulnerability.
Related jobs
Jobs that call for the skills explored in this talk.
Architekt für Cloud Security - AWS (w|m|d)

zeb consulting
Frankfurt am Main, Germany
Remote
Junior
Intermediate
Senior
Matching moments
15:35 MIN
A social engineering attack using a personal email
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
00:28 MIN
Why developers make basic cybersecurity mistakes
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
12:10 MIN
Understanding common intruder attack vectors
Securing Your Web Application Pipeline From Intruders
08:16 MIN
Common attacks targeting software developers
Vulnerable VS Code extensions are now at your front door
03:15 MIN
The perfection of social engineering with generative AI
WWC24 - Chris Wysopal, Helmut Reisinger and Johannes Steger - Fighting Digital Threats in the Age of AI
24:17 MIN
Shifting security left with collaborative threat modeling
We adopted DevOps and are Cloud-native, Now What?
08:22 MIN
How attackers exploit developers and packages
Vue3 practical development
18:51 MIN
Five common cybersecurity mistakes developers make
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
Featured Partners
Related Videos
The attacker's footprint
Antonio de Mello & Amine Abed
You can’t hack what you can’t see
Reto Kaeser
Cyber Security: Small, and Large!
Martin Schmiedecker
How to Cause (or Prevent) a Massive Data Breach- Secure Coding and IDOR
Anna Bacher
Skynet wants your Passwords! The Role of AI in Automating Social Engineering
Wolfgang Ettlinger & Alexander Hurbean
Cracking the Code: Decoding Anti-Bot Systems!
Fabien Vauchelles
Securing Your Web Application Pipeline From Intruders
Milecia McGregor
Typed Security: Preventing Vulnerabilities By Design
Michael Koppmann
From learning to earning
Jobs that call for the skills explored in this talk.


Introductory Cyber Protection Bootcamp (Waltham Forest)
ITonlinelearning
London, United Kingdom
€58K
Network Security


Cyber Security Fundamentals Online Training (York)
ITonlinelearning
York, United Kingdom
€39K
Network Security


C++ Software Engineer MacOS - Cyber Security
Client Server
Charing Cross, United Kingdom
Remote
€55K
API
C++
Linux
+1




Cyber Security Starter Course (Sheffield)
ITonlinelearning
Sheffield, United Kingdom
€39K
Network Security


Attack Simulation / Penetration Testing
Instaffo GmbH
Obergünzburg, Germany
Azure
Burp Suite
Network Security
Microsoft Active Directory







