Cracking the Art of Human Hacking, Social Engineering & Anti-Fraud Training
Interactive Social Engineering Training, Human Manipulation Defense and Anti-Fraud Awareness
Interactive Social Engineering Training, Human Manipulation Defense and Anti-Fraud Awareness
Anti Fraud training and social engineering training only work when your people experience it in person. Human beings can be the weakest link or the strongest competitive advantage in the security and profitability of your information assets. But people are the most commonly underutilized, least expensive weapon in your fight against cybercrime. Social Engineering Training too often fails because of Death by PowerPoint. Fraud training needs to be engaging – has to be interactive – to be effective. To put it simply, this session makes security fun, so that it sticks. Additionally, your audience must experience manipulation, deception and fraud first hand before their behaviors are ripe for change.
In this continually-interactive social engineering defense session, John goes deep into social engineering tools and tricks used to separate you from your critical data. By building System-1, Reflex-Based Awareness around how tools like social media, trust shortcuts, ego stroking, greed appeals, and cortisol flushing enable social engineers, John will dramatically reduce the human element of your threat footprint. Safe data is profitable data, whether it’s a client’s credit card number, a patient’s medical file, an employees benefit plan or sensitive intellectual capital. By the time John finishes his entertaining closing story, your audience will be fully empowered to detect and deter social engineering, fraud and deception.
Leverage Your Investment With a Deep-Dive-Interactive-Breakout
Interactive breakout and workshop sessions pick up where keynote and general sessions leave off—they make learning stick. By helping your audience get their “hands dirty” and by tapping the group’s internal expertise and industry experience, John will customize your breakout to fit the needs of the very people in the room.
Continuing Education via Video Tips
Keynote presentations are sparks meant to ignite the flame; it’s the follow-up work that kindles strong ideas into a full-blown fire. Following up John’s keynote with short, entertaining and actionable video tips that consistently reinforce key learnings keeps your investment working for you long after the stage lights have dimmed. Watch an episode of Sileo On Security to see why so many of our clients choose to keep the education going.
Reward Your VIPs With a Customized Roundtable
Successful organizations and conferences frequently reward their highest-value participants with a deeper level of service. Because cyber security, identity and privacy are sensitive issues, many executives and VIPs appreciate discussing particulars with a select group of peers behind closed doors. The conversations that happen around John’s roundtable are confidential, innovative and faced paced.
Provide Meaningful Takeaways to Reinforce Next Steps
Many event professionals like to encourage work beyond the conference by providing further resources to their attendees. Adding one of John’s books (e.g., Privacy Means Profit) to your event will leave attendees with a clear roadmap of next steps and a tangible reminder of the meeting’s exceptional value.
Improve Idea Absorption with Extended Q&A
If you really want your attendees to connect with the topics at hand, give them time to apply it to their own lives and jobs. In the hours after a keynote, the audience has a one-time opportunity to apply the general lessons of the presentation to the specific needs of their organization. Extended Q&A is the perfect vehicle for clarification, for customized application, and for sending the message that you care about them as individual. Extended Q&A often incorporates leaders from your organization who lend a supportive voice to the cultural changes you are seeking.