- 24 June 2019
- Duration: 30 min
Social engineering, in the context of information security, is the psychological manipulation of people into performing actions or divulging confidential information. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests."
Request our webinar recording to learn:
- The anatomy and typical scenarios of social engineering attacks
- Latest social engineering techniques
- Tips how to bolster your defences against advanced attackers
- Group-IB cases of imitating social engineering attacks: statistics, methods, common mistakes
Social engineering, in the context of information security, is the psychological manipulation of people into performing actions or divulging confidential information. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests."
Request our webinar recording to learn:
- The anatomy and typical scenarios of social engineering attacks
- Latest social engineering techniques
- Tips how to bolster your defences against advanced attackers
- Group-IB cases of imitating social engineering attacks: statistics, methods, common mistakes
Questions?
Contact
Questions?
Contact
Presenters

Nicholas Palmer
VP of International Business
Group-IB is one of the leading providers of solutions aimed at detection and prevention of cyberattacks, online fraud, and IP protection. Group-IB Threat Intelligence & Attribution system was named one of the best in class by Gartner, Forrester, and IDC.
Group-IB’s technological leadership is built on the company’s 18 years of experience in cybercrime investigations worldwide and 70,000 hours of incident response accumulated in our leading forensic laboratory and 24/7 CERT-GIB.
Group-IB actively collaborates with international partners such as INTERPOL and Europol in the fight against cybercrime, and is an industry-leading cybersecurity solutions provider.
Learn moreGet new report
Ransomware Uncovered 2021/2022
The well-known complete guide to the latest tactics, techniques, and procedures of ransomware operators based on MITRE ATT&CK®