How social engineering can be used to extract data -TEISS® : Cracking Cyber Security


How social engineering can be used to extract data

Jamie Woodruff explains how businesses use social engineering to obtain client or customer information

Social engineering has proven to be a key tool to collect data and redefines the boundaries of data sharing within the business relationship.

At The European Information Security Summit in London, expert speakers addressed 400 information security industry leaders as part of discussions on how to build an agile cyber security culture.

Review the post-event report from this conference. We also run a series of workshops and VIP Breakfast Briefings throughout the year that may interest you.

Would you like to build a robust incident response plan? Join our R3: Resilience, Response & Recovery conference, on September 26 in London.

R³: Resilience, Response & Recovery 2017 is the #1 conference focusing on post breach response plans, including forensic and legal requirements, communication strategies and top tips for a fast recovery.