Skip links

The need for security, from a white hat hacker.

Tune in for a virtual session with
Rachel Tobac

PRESENTED BY:

SPONSORED BY:

March 31, 2022 | 11:30am – 1pm EST

Register Now

HERE’S WHAT WE KNOW

With security breaches on the rise after the COVID-19 outbreak, cyber, physical, and information security have become a trending topic across industries.

  • Social engineering is at the core of 98% of cyber attacks. 
  • The global average cost of a data breach is $3.86 million.
  • On average, only 5% of a company’s folders are protected.
  • Roughly 28% of data breach victims are small businesses.
  • An average of 4,800 websites a month are compromised with form-jacking code.

The full consequences of failing to detect social engineering tactics can result in financial losses, loss of productivity, danged reputation, legal liability, business continuity concerns

What is social engineering?

Social engineering is the act of manipulating and tricking people into giving up sensitive information (that would otherwise be protected). You may remember a few high publicity social engineering cases like the 2013 Target Third-Party Breach, 2014 Sony Pictures Phishing Scam, or the 2016 US Presidential Election Email Leak to name a few. The truth is, social engineering goes beyond just cyber security. In fact, it can impact both physical and information security (both personally and professionally  within a business).

Are you safe against social engineering attacks? Build a strong defense and learn from guest speaker, Rachel Tobac.

Rachel is a hacker and the CEO of SocialProof Security where she helps people and companies keep their data safe by training them on social engineering risks. Rachel has been featured in various media outlets including NPR, CNN, USA Today, Huff Post, The New York Times, The Economist, and more.

“Without having my password, and without hacking into my email account, she was able to get my home address, my phone number and steal my hard-earned hotel points. In perhaps the cruelest act of all, she was even able to change my seat on my five-hour flight out of Vegas, moving me from a spacious exit aisle to a middle seat at the back by the restrooms. She did all this by using some information she found about me online.” 

– Donie O’Sullivan, CNN.

Register for “Social Engineering: How to Detect and Stop an Attack” to learn

Why social engineering is so successful.

How quickly a hacker can crack your system with this tactic.

What the true impact of a security breach looks like throughout an organization.

Actionable steps to detect, respond, and recover from a social engineering attack.

6401ed897d850934cc58aacb26a5a767-2

“At any organization, no matter how big or small, the people are its first line of defense. Sadly, nowadays, humans are a lot easier to hack than computers. The rise in social engineering has brought a new concern to the forefront – how do we protect ourselves from ourselves? I’m excited to learn from Rachel Tobac and talk about best practices for identifying these attacks at the source and setting up protective measures to keep companies safe and employees protected.”

Daniel R. Young
Founder & Chief Innovation Officer at Circadian Risk

Register Now



Get to know the CSO Risk Council

The CSO Risk Council is an elite group of security professionals, providing an outlet for industry leaders to discuss security concerns and innovative solutions. Our mission is to create a better process to improve the safety and security risk industry as a whole. Grow your network and become a member.

Discover Circadian Risk

Circadian Risk is a security software solution that is data-driven, objective, and actionable, providing customers the ability to discover, visualize, communicate, and mitigate risk at the click of a button. From assessing, to analyzing, to monitoring physical security risks, Circadian Risk is an all-in-one solution.