Skip to main content
Close
0 Results Found
              Back To Results

                Combining Social Engineering Attacks in a Cyber Kill Chain

                How adversaries use social engineering and top ways your company can ward off attacks

                Combining Social Engineering Attacks in a Cyber Kill Chain


                Episode 3: Combining Social Engineering Attacks in a Cyber Kill Chain
                Date: June 10, 2022
                Guest: Dr. Eric Cole and Ben Jacob
                Total Playtime: 25:48


                What We'll Cover

                • Social engineering techniques and lifecycles—and how your company can mitigate these risks
                • How phishing, vishing, and spear-phishing impact industries from a social engineering standpoint
                • Value of XDR in detecting suspicious user behaviour

                When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique because they rely on human error instead of software or operating system vulnerabilities. This is because as technological defenses become more robust, cybercriminals are increasingly targeting the weakest link in the chain: people. And as cybercriminals use a variety of online and offline tactics, unsuspecting users may be conned into compromising their security, releasing sensitive information, or even transferring money.

                In the third episode of this three-part podcast with EM360, Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, and Ben Jacob, Technical Lead within the Secureworks Adversary Group, walk through various social engineering scenarios used during attack simulations.

                Related Content

                Close Modal
                Close Modal