Getting under the skin: The Social Engineering techniques
Mauro Verderosa - 4 years ago
In a world where the cybersecurity applications are day after day more protected and solid, the most malicious attackers decide to target the weakest ring of system: the human.
Through this presentation we will discover what are the social engineering attacks, how they are defined, how they are performed and how they can be identified before the attacker might be able to gain the access to the most sensitive information.
Jobs with related skills

Trusted Advisor Identity and Access Management (m/w/d)
TALLENCE AG
·
1 month ago
Frankfurt am Main, Germany
+2
Hybrid

Infrastructure Specialist (w/m/d) Operational Technology
B. Braun SE
·
1 month ago
Melsungen, Germany
Hybrid

Security Specialist (w/m/d) Operational Technology
B. Braun SE
·
1 month ago
Melsungen, Germany
Hybrid

IT-Leiter (m/w/d) Inhouse-IT
PDV.group
·
today
Erfurt, Germany
Hybrid
Related Videos