Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/29QmcbX.
Christina Camilleri talks about how social engineering can be used in conjunction with technical attacks to create sophisticated and destructive attack chains, shares some real world war stories and highlights what can be done to protect against these threats. Filmed at qconnewyork.com.
Christina Camilleri is a Security Analyst at Bishop Fox, a security consulting firm. Her primary areas of expertise are web application penetration testing, open source intelligence and social engineering. She has attended and presented at local and international conferences on social engineering and has won highest scoring OSINT report for two years in a row in the DEFCON Social Engineering CTF.
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
The Nihilist’s Guide to Wrecking Humans & Systems
1.
2. InfoQ.com: News & Community Site
• 750,000 unique visitors/month
• Published in 4 languages (English, Chinese, Japanese and Brazilian
Portuguese)
• Post content from our QCon conferences
• News 15-20 / week
• Articles 3-4 / week
• Presentations (videos) 12-15 / week
• Interviews 2-3 / week
• Books 1 / month
Watch the video with slide
synchronization on InfoQ.com!
https://www.infoq.com/presentations/
social-engineering-attack
3. Presented at QCon New York
www.qconnewyork.com
Purpose of QCon
- to empower software development by facilitating the spread of
knowledge and innovation
Strategy
- practitioner-driven conference designed for YOU: influencers of
change and innovation in your teams
- speakers and topics driving the evolution and innovation
- connecting and catalyzing the influencers and innovators
Highlights
- attended by more than 12,000 delegates since 2007
- held in 9 cities worldwide
15. I have feelings
and emotions
and I can talk
to people and
I can relate to
people and I
have wants and
needs that
require
interactions
and I like
STUFF and
Things and I
like to feel
like I have
control over
computers