A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Social Engineering Applied: Exploit the Target Hack3rcon 3 (Hacking Illustrated Series InfoSec Tutorial Videos)

Social Engineering Applied: Exploit the Target
Hack3rcon 3


While we all love being able to just roll in, pop some boxes and walk away with the hashes then call it a day; This type of mindset doesn't bring return customers. In this presentation we'll be discussing some of the common issues with managing technical assessments to ensure that the customers we hack today will call us back again in the future to hack them again.

Keith Pachulski

Keith Pachulski is a Security Consultant based out of Northeast Pennsylvania with over 16 years of experience in the Information Security and Physical Security industries specializing in Penetration Testing, Vulnerability Assessment, Risk Assessments & Compliance for the private and public sectors. Prior to consulting, he was the CSO for a medium sized company in Pennsylvania as well as creating and managing a Managed Security Services Team servicing the northeast PA area. He recently started the NorthEast PA Information Security Group http://groups.google.com/group/nepa-infosec-group
 

Back to Hack3rcon 3 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast