The Science Behind Human Hacking (Social Engineering) - Christopher Hadnagy

Sdílet
Vložit
  • čas přidán 17. 10. 2019
  • Christopher Hadnagy discusses the science behind human hacking (Social Engineering) in his keynote address at the 2019 Compass Cybersecurity Symposium in North Providence, RI. To learn more about this event, click here:
    www.compassitc.com/company/pr...
    To learn more about Social Engineering, click here:
    www.compassitc.com/services/s...
    Christopher J. Hadnagy is a professional social engineer, author, and speaker. He is the Founder and CEO of Social‐Engineer, LLC., a company that specializes in fully-managed social engineering services, consulting, and training for some of the globe’s largest organizations. He is also the CEO of Social-Engineer.Org which provides free resources and education about social engineering. In 2009, Chris wrote the world's first Social Engineering Framework and created the first hands-on social engineering training course with accompanying certification, which is attended by law enforcement, military, and private sector professionals. In 2018, Chris wrote the Social Engineering Code of Ethics, now being used by private and government entities worldwide. He is the author of four books, writing some of the very first books in the field of social engineering. Chris is also the Founder, Executive Director, and Board Member of the 501(c)(3) organization, the Innocent Lives Foundation that unmasks anonymous child predators and reveals their true identities using legal hacking techniques and data from open-source intelligence. His efforts in fostering the structure, professionalism, and awareness of social engineering have helped to convey social engineering as one of the top threats in security to individuals and organizations today.
    -----------------------------­------------------------------­------------------------------­--
    Founded in 2010, Compass IT Compliance is a nationwide leader in providing IT Security, Audit, and Compliance services to organizations of all sizes in a number of different industries. Our goal in 2010 and today remains the same: To partner with your organization to help you mitigate your overall Information Security Risk while providing you with the best customer service possible. Period.
    Website: www.compassitc.com/
    LinkedIn: / compass-it-compliance
    Facebook: / compassitc
    Twitter: / compassitc
  • Věda a technologie

Komentáře • 36

  • @Radical9535
    @Radical9535 Před rokem +10

    read all his books hope he keeps writting and doing research great job!

  • @samtsai8369
    @samtsai8369 Před 3 lety +18

    This speech is actually really good. thanks!

  • @aicnednetni
    @aicnednetni Před rokem +9

    Social Engineering: the act of influencing someone to take action that may or may not be in their best interest

  • @christophercreswick9311
    @christophercreswick9311 Před 2 lety +10

    I love the ambiguity around a solid definition of ‘social engineering’. It leaves a lot of room for research and discovery based on a particular area of interest. Data gathering via social engineering is my primary area of study.

    • @Chemike21
      @Chemike21 Před 2 lety

      I would like to thank you for contributing to the next form of world authoritarian domination via human hacking.

  • @ryanziller220
    @ryanziller220 Před 2 lety +1

    Preventing social engineering requires that you force the attacker to prove their biases whereas events are called upon by dates and time per inquiry about the process of identification they adhere to before gatherings of intelligence they seek.

  • @code-to-design
    @code-to-design Před 3 lety +2

    u changed my life man! thank u

  • @samstryker4862
    @samstryker4862 Před 2 lety +4

    This is a really good talk! I enjoyed it a lot.

  • @jensonphan
    @jensonphan Před 2 lety +5

    This is a definite watch, no matter the age.

  • @NB-op3gt
    @NB-op3gt Před 2 lety +1

    great info, would have liked to hear the q&a

  • @NurseMinder
    @NurseMinder Před 3 lety +1

    Love This!

  • @yiyi-zr2to
    @yiyi-zr2to Před 3 lety +1

    Great speech!

  • @oluwatobitobias
    @oluwatobitobias Před rokem +2

    Great i met this

  • @ContactBrand
    @ContactBrand Před 3 lety +5

    “We’ve got your daughter. If you want her back we need some ITUNES gift cards. He-hello?”

  • @Losochill
    @Losochill Před rokem

    Struggling between business management or cybersecurity. Idk which to choose.

  • @moemaster1966
    @moemaster1966 Před 3 lety +1

    I think we all are blinded by this one Wow!

  • @vlndfee6481
    @vlndfee6481 Před 2 lety +1

    This scary reactio. safe relation...
    Is how maipulators work.

  • @florencetown4024
    @florencetown4024 Před 8 měsíci

    27:00

  • @S.Dadudida
    @S.Dadudida Před 2 měsíci

    Nur los aber ich habe es sehr wohl verstanden

  • @AyyWatUp
    @AyyWatUp Před 2 lety +2

    It’s my own fault but Yea I got manipulated

  • @endgamefond
    @endgamefond Před 6 měsíci

    Is window 11 OS prone to virus?

  • @tonynittoli4792
    @tonynittoli4792 Před 11 měsíci +1

    Tavistock institute

  • @endgamefond
    @endgamefond Před 6 měsíci

    High stress dulls our logic.

  • @brianleabo6295
    @brianleabo6295 Před 2 lety

    I never understood how people falling for vishing

    • @sandjvj911
      @sandjvj911 Před rokem

      he literally explained the how part in the video