SANS Blue Team Summit ’22
Preemptive Visualization and Neutralization of Social Engineering Pathways
More than 90% of all cyberattacks start with social engineering campaigns which are specifically crafted from users’ OSINT. Security teams have historically not had adequate visibility of the OSINT footprint of their organization and its people, nor have they had any effective technological means to address paths of compromise that this data may reveal to an attacker. This has left a critical blind spot when it comes to defending against social engineering attacks, while Advanced Persistent Threat (APT) actors continue to abuse the human element using social engineering techniques to infiltrate critical national infrastructure.
During this SANS session, we will explore how APT actors are successfully using social engineering and how they are developing their TTPs over time.
Director of Global Intelligence | Picnic