| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
You won't find these attack signatures in any IDS. Firewall rules are useless against me. Social engineers use persuasion, deception, and influence to bypass technical controls by exploiting the human behind them. As a security consultant I've utilized social engineering in penetration tests for years. Join me and learn how I'm owning your networks and obtaining your sensitive data. Bio: Valerie Thomas (@hacktress09) is a Principal Information Security Consultant for Securicon LLC that specializes in social engineering and physical penetration testing. After obtaining her bachelor?s degree in Electronic Engineering, Valerie led information security assessments for the Defense Information Systems Agency (DISA) before joining private industry. Valerie is the coauthor of ?Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats? with Bill Gardner. Throughout her career, Valerie has conducted penetration tests, vulnerability assessments, compliance audits, and technical security training for executives, developers, and other security professionals.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast