2022 Cybersecurity & IT: Think your users won't fall victim to Social Engineering
Presented by: Keegan Bolstad (OnTech)
End users have become the last line of defense in terms of protecting data. IT teams can spend their budgets and do everything they can to provide the network, but if a user falls victim to social engineering, that investment wasn't as useful as it could have been. This session will be built around covering real world examples of social engineering in regards to IT. Everyone's heard of the Nigerian prince that wants to send them gold and knows that’s fake, but what about more recent emerging trends like Business Email Compromises or Voice phishing. The presentation will feature all sorts of different social engineering examples and provide a platform for administrators to have better educated discussions with their IT teams as well as help ensure their end users understand what impact they can have on the organization’s information security. Takeaways:
Understanding of the different types of social engineering, why they exist, and their primary purpose
Real world examples administrators can take back and share with staff to help improve their cyber knowledge.
Emerging technology and trends to help combat the growing threat of social engineering.