Black Hat 2012: Phishing and social engineering penetration testing

Black Hat 2012: Phishing and social engineering penetration testing

Black Hat 2012: Phishing and social engineering penetration testing

Date: Jul 26, 2012


Robert Westervelt, News Director

LAS VEGAS -- Some of the most high-profile data breaches started with a standard spear phishing attack, leaving some experts to advocate for more hardened technical defenses, but Rohyt Belani, CEO and co-founder of PhishMe Inc., believes user awareness training should be part of nearly every enterprise information security program.

"Spear phishing is going to be the attack vector of choice for a long time," Belani said. "The email protocol is broken. Human beings are as susceptible as they were 15 years ago."

More from Black Hat 2012

Get all the news, analysis, commentary and video interviews from Las Vegas on SearchSecurity.com's Black Hat 2012 special coverage page.

In an interview with SearchSecurity.com conducted at the 2012 Black Hat Briefings, Belani, who is also a founder of boutique security firms Intrepidus Group Inc. and Mandiant Corp., said sustained anti-social engineering training can help heighten the security awareness of end users and ultimately stop most end users from blindly clicking on links and opening email attachments. Belani’s new firm, PhishMe, provides Web-based security awareness training tailored to specific roles within an organization.

"Awareness should lead to behavior modification," Belani said. "We have statistics to prove that over time the end-user susceptibility to phishing attacks trends downward."

Belani discusses why he thinks training that features social engineering penetration testing can be effective, and explains why he isn't afraid to debate the naysayers. He also describes how organizations can properly introduce anti-social engineering training without creating a rift between the IT security team and other employees.

More on Security Awareness Training and Internal Threats-Information

  • canderson

    Insider threat prevention may demand more spending

    VIDEO - Video: Randy Trzeciak of Carnegie Mellon University suggests preventing insider threats may require more spending because they pose a greater risk than most external threats.
  • canderson

    Non-malicious insiders: The biggest insider threat of all?

    VIDEO - Video: Insider threats expert Randy Trzeciak explains why non-malicious insiders, particularly developers, pose as much risk to an enterprise as intentionally malicious insiders.
  • canderson

    Insider threat prevention controls to thwart data breach incidents

    VIDEO - deo: Randy Trzeciak reviews recent data breach incidents and details the insider threat prevention controls that may have thwarted those attacks.
  • Password reuse and password sharing prevalent in enterprises

    News - The high percentage of password reuse and sharing by employees leaves enterprises vulnerable to breaches, according to a recent survey from SailPoint Technologies.

    ( Feb 18, 2015 )

  • social engineering attack surface

    Definition - Social engineering attacks usually take advantage of human psychology: the desire for something free, the susceptibility to distraction, or the desire to be liked or to be helpful. The social engineering attack surface is the totality of an individual or a staff’s vulnerability to trickery.
  • Android vulnerability highlights Google's controversial patch policy

    News - WebView vulnerabilities in older versions of Android are putting the majority of Android devices at risk. Google will not provide patches, forcing enterprises to determine the risk posed by unpatched Android devices.

    ( Jan 19, 2015 )

  • Cybersecurity awareness can reduce infection risk up to 70%

    News - A new study from Wombat Security and Aberdeen Group shows that boosting cybersecurity awareness and education among employees can reduce enterprise security risks and cost.

    ( Jan 14, 2015 )

  • social engineering

    Definition - Social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: