December 19 | 12:00 pm – 1:30 pm EST
Social Engineering and Computer Hacking
Organizations commonly use security devices like firewalls to keep systems safe, but it also takes well trained staff, or "human firewalls," to make an organization's security posture stronger. The MS-ISAC will discuss common tactics used by hackers and criminals to compromise your organization through both technical means and social engineering, which leverages your staff to provide sensitive information.
- An understanding of common cyber tactics and social engineering techniques work
- How to identify and be proactive against social engineering attempts
- Threat mitigation recommendations
Spear is responsible for developing innovative new ways to identify and present current cyber threat trends to state, local, tribal, and territorial (SLTT) constituents and serves as a resource on industrial control system (ICS) security. With his past experience developing law enforcement training for New York State and educational background in history, political science, and public administration, Spear provides a unique perspective to understanding the who, how, and why of malicious cyber activity. Spear has spoken on a range of cybersecurity issues to a diverse set of both technical and non-technical audiences.
Kipniss works on the Stakeholder Engagement team with state, local, territorial, and tribal (SLTT) governments in order to provide them with access to the many MS-ISAC services and information products which support organizational security posture and awareness. Kipniss focuses on managing the accounts of hundreds of MS-ISAC member governments and organizations across the Northeastern and Midwestern U.S.