Posted on
in Presentations
"Attack where your opponent is weakest. Be in the place your opponent cannot see. Do what your opponent does not expect." These principles led to the development of a devastating new social engineering attack that has been used to breach countless, high-security environments over the last year. This session will walk through the development and execution of the attack and how to defend against it.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community