Preemptive visualization and neutralization of social engineering pathways

SANS Blue Team Summit ’22 Webinar with Manit Sahib, Picnic Director of Global Threat Intelligence

More than 90% of all cyberattacks start with social engineering campaigns which are specifically crafted from users’ OSINT. Security teams have historically not had adequate visibility of the OSINT footprint of their organization and its people, nor have they had any effective technological means to address paths of compromise that this data may reveal to an attacker. This has left a critical blind spot when it comes to defending against social engineering attacks, while Advanced Persistent Threat (APT) actors continue to abuse the human element using social engineering techniques to infiltrate critical national infrastructure.

During this SANS session, we will explore how APT actors are successfully using social engineering and how they are developing their TTPs over time.

Scroll to Top