Star 0

Abstract

A simulated compromise of a Fortune 500 company as part of a social engineering competition will lead to discussion about how data was collected using open source intelligence (OSINT) beyond that of social media and tools. It will identify places to find data, providing insight for more valuable data sources. This will include a demo of OSINT techniques, phishing and a pretexting discussion.Learning Objectives:1: Learn how to defend against social engineering.2: Understand the relative ease in collecting open source intelligence (OSINT).3: Learn more about the tools and techniques used in social engineering.