Jenny Radcliffe - Threat Hunters in Action - Social Engineering Inside Out
For the Threat Hunters in Action series, this webinar presents a guide to how social engineering forms a large part of insider threats within organisations.
Learn how insider threats are created and manipulated by external parties as well as how organisations help create their own insider threats through cultural and behavioural factors.
The webinar will give advice on how to spot individuals "within the family" who may have malicious intentions towards the business, and gives advice on how to manage the problem within an organisation.
RecordedMar 16 201744 mins
Your place is confirmed, we'll send you email reminders
In these videos we are sharing very basic and straightfoward advice with those who might benefit from knowing some simple tools to help protect against scams, cons and fraud as well as malicious social engineering. This video is about the most simple trick to avoid being scammed through vishing calls. HANG UP!
GREED, aka our desire for reward and the temptation to work to get rewards is discussed in this latest short video on basic security awareness. Please do share these free videos with anyone who might benefit from straightforward and simple advice on how to be more secure from scammers, fraudsters and social engineers. Thank you
2 Factor authentication gives us an added layer of security on our devices and also a cheeky "F" in our A-Z series. Please share these vids with anyone who might find simple, straightfoward advice on security useful.
E is for emotions in our A-Z SERIES OF SECURITY AWARENESS. Emotions play a crucial role in scams, cons and social engineering exploits, knowing how they are used is crucial to protecting ourselves, colleagues and family against these attacks. This video is intended to be freely shared to anyone who might find simple, straightforward security advice useful. Please see the rest of our series for other tips and advice. Thank you.
This basic series of security awareness videos gives practical and simple advice on a range of topics linked to our online security. D is for DONT CLICK and is intended to be shared with anyone who might find these straightforward and short security videos useful. Thank you
C is for Cameras - simple advice for those who might benefit from understanding why managing your camera settings on laptops and phones might be a good thing. The basics series of security awareness is designed to be shared with those who need clear, simple and basic security advice
On the A-Z Basics of #SecurityAwareness Series we have reached B for BLACKMAIL. From #ransonware to #cyberbullying this short video gives advice on what to do when faced with this tactic from malicious #socialengineers #cons #fraudsters & #scammers please share with those who might find simple advice useful and subscribe to our #HumanFactor TV channel over on #Youtube to never miss our frequently uploaded content. Thank you.
In this basics of security awareness series, we look at how the principle of authority discussed by Robert Cialdini in his book Influence as well as elsewhere, can be used by malicious social engineers to gain compliance. How can we counter this tactic, and what do we look for to recognise it when it happens.
Introduction to our basics of Security Awareness Series detailing tips, hints and advice for those family, friends and colleagues not in the security industry who would appreciate simple advice on how to be more secure, especially from fraudsters, con artists, scammers and malicious social engineers.
Answering the question "Are there any red flags in social engineering?" this video explains the basics of what to look for in a potential approach from a fraudster, con artist or malicious social engineer. Intended for those who are unfamiliar with the term, these videos explain the basics of social engineering in a simple and straightforward manner.
This video answers a fundamental question which is, what even is "social engineering?" This short video describes and explains the term which has become ubiquitous in the security community and is also a type of con or scam commited by those looking to defraud or con victims with minimal use of technology.
On this episode, I’m delighted to chat with Craig Clark.
Craig Clark is the Information Security & Compliance Manager at University of East London. Not only that but Craig is an Independent EU-GDPR Certified Consultant.
An ISO17024 accredited expert on the current Data Protection Act and the upcoming European General Data Protection Regulations, Craig has significant expertise in embedding data protection and security frameworks such as BS10012:2016 and ISO27001 in order to meet stringent data privacy obligations.
For this episode, I’m delighted to chat with Quentyn Taylor.
Quentyn is Director of Information Security for Canon Europe. He has a wealth of experience in both the IT and information security arenas and, in recent years, has focused his attention on building business relationships across the world.
Quentyn has driven Canon’s strategy to highlight the importance of document security and help business customers to minimise their security risk. Quentyn strongly believes in educating users about the importance of a comprehensive, overall security framework that will allow Canon’s business customers to improve security in a cost-effective way.
During his career, Quentyn has worked in a variety of industries for a number of organisations including outsourced service providers, Internet service providers as well as Dotcom businesses, before moving to Canon in 2000.
In this episode, I’m delighted to talk to Mark Smith.
Mark is a freelance journalist, who has written for major publications in both print and online, including The Guardian, BBC, Mirror Online, Daily Express Online as well as specialist publications such as Global Trade Review and Global Politics.
In this episode, I’m delighted to be joined by Richard DeVere.
Richard is the Principal Consultant for The AntiSocial Engineer Ltd, he has an extensive background in penetration testing and social engineering assessments, including ‘red team’ exercises and information gathering assessments for financial institutions and some of the UK’s largest companies.
In this episode, I’m delighted to be joined by Robert Schifreen.
In 1985, Robert and the late Steve Gold were arrested by the newly-formed Scotland Yard Computer Crime Unit. This led to the world’s first jury trial in connection with computer hacking. Their ultimate acquittal led to the introduction of the Computer Misuse Act 1990.
Robert worked as a writer and editor on a number of well-known computer magazines for 25 years and then spent 14 years involved in IT projects at the University of Brighton. In 2014 he founded SecuritySmart, which provides IT security awareness training to UK companies.