Mauro Verderosa
Getting under the skin: The Social Engineering techniques
#1about 7 minutes
The 1978 heist that pioneered social engineering
Stanley Mark Rifkin exploited procedural manuals and used pretexting to steal millions from a bank without any technical hacking.
#2about 3 minutes
Understanding the five main motivations for cybercrime
Cyber attacks are driven by distinct goals, including financial gain, business competition, political influence, ideology, or simple curiosity.
#3about 5 minutes
What social engineering is and its real-world impact
Social engineering is the psychological manipulation of people to divulge information, as seen in major breaches at companies like RSA and Sony.
#4about 7 minutes
An overview of common social engineering attack techniques
Attackers use various methods like pretexting, phishing, baiting, and tailgating to trick victims into compromising security.
#5about 2 minutes
Psychological triggers that make social engineering effective
Attacks succeed by exploiting human emotions and cognitive biases such as authority, guilt, panic, desire, and greed.
#6about 4 minutes
Deconstructing real-world phishing and vishing attacks
A simple phishing email is analyzed for pressure tactics, followed by a vishing example where an attacker impersonates a spouse to gain account access.
#7about 5 minutes
Understanding the complete social engineering attack lifecycle
A successful attack follows distinct phases, from initial reconnaissance and scanning to lateral movement, data exfiltration, and finally covering tracks.
#8about 6 minutes
A step-by-step case study from Mr. Robot
An elaborate attack demonstrates how gathering small, public details from social media and real-world observation leads to a full account compromise.
#9about 5 minutes
Key takeaways and defenses against social engineering
The most effective defense against social engineering is continuous employee training and fostering a security-aware culture to patch the human vulnerability.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
15:35 MIN
A social engineering attack using a personal email
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
00:28 MIN
Why developers make basic cybersecurity mistakes
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
13:23 MIN
Demonstrating deepfake attacks and social engineering
The AI Elections: How Technology Could Shape Public Sentiment
12:10 MIN
Understanding common intruder attack vectors
Securing Your Web Application Pipeline From Intruders
08:16 MIN
Common attacks targeting software developers
Vulnerable VS Code extensions are now at your front door
03:15 MIN
The perfection of social engineering with generative AI
WWC24 - Chris Wysopal, Helmut Reisinger and Johannes Steger - Fighting Digital Threats in the Age of AI
24:17 MIN
Shifting security left with collaborative threat modeling
We adopted DevOps and are Cloud-native, Now What?
08:22 MIN
How attackers exploit developers and packages
Vue3 practical development
Featured Partners
Related Videos
The attacker's footprint
Antonio de Mello & Amine Abed
Skynet wants your Passwords! The Role of AI in Automating Social Engineering
Wolfgang Ettlinger & Alexander Hurbean
Cracking the Code: Decoding Anti-Bot Systems!
Fabien Vauchelles
Typed Security: Preventing Vulnerabilities By Design
Michael Koppmann
Programming secure C#/.NET Applications: Dos & Don'ts
Sebastian Leuer
Unleashing the Power of Developers: Why Cybersecurity is the Missing Piece?!?
Tino Sokic
You can’t hack what you can’t see
Reto Kaeser
Thinking Differently - How to Make Money from Cyber Attacks & Cheats
Tom Tovar
From learning to earning
Jobs that call for the skills explored in this talk.



Karriere in der IT-Sicherheit? IT-Sicherheit: Quereinstieg als Netzwerkadministrator - kein Vorwissen nötig!
CloudCommand GmbH
Network Security
Network administration

Karriere in der IT-Sicherheit? IT-Sicherheit: Quereinstieg als Netzwerkadministrator - kein Vorwissen nötig!
CloudCommand GmbH
Network Security
Network administration

Karriere in der IT-Sicherheit? IT-Sicherheit: Quereinstieg als Netzwerkadministrator - kein Vorwissen nötig!
CloudCommand GmbH
Network Security
Network administration

Karriere in der IT-Sicherheit? IT-Sicherheit: Quereinstieg als Netzwerkadministrator - kein Vorwissen nötig!
CloudCommand GmbH
Network Security
Network administration


IT-Security Engineer Awarness Training and Security Roadmap
Paris Lodron-Universität Salzburg
Powershell
Windows Server
Microsoft Office
Scripting (Bash/Python/Go/Ruby)
