This phish goes to 11, w/ Guest: SNOW [DEF CON 22 Social Engineering CtF - Black Badge Winner]

  • Webcast Aired Wednesday, 11 May 2016 11:00AM EDT (11 May 2016 15:00 UTC)
  • Speaker: Stephanie Carruthers

Testing your users and systems with generic phishing pretexts use to be enough, but now attackers are using open-source intelligence to customize their phishing campaigns.

Step up your game! Let Stephanie show you how OSINT methods can be used to create a tailored pretext augmented by a 2nd stage vishing strategy. The 2015 Verizon DBIR reveals that for two years \more than two-thirds of incidents that comprise the Cyber-Espionage pattern have featured phishing." Hot on the heels of this and other data we are seeing the industry move to complement the yearly pentest with phishing-based assessments.

Attend this webinar and learn:
  • How attackers use OSINT to build targeted phishing campaigns
  • How adding vishing can make an ineffective phish still work
  • How a tailored phishing assessment and meaningful training better prepare your organization's employees