Event details

Date
Time
Duration
2021-09-14 10:00:00
2021-09-14 11:00:00
Europe/London

Sponsored by:

Sponsor Logo

About this webinar:

No matter how much security technology we purchase, we still face a fundamental security problem: people. Often referred to as the security weak link, this webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding. Join Computing’s Tom Allen and Javvad Malik, Security Awareness Advocate for KnowBe4, as they discuss the psychology behind social engineering. We’ll look at several engaging examples of mental manipulation in everyday life, and details of sophisticated social engineering and online scams.

Key Takeaways:

  • The perception vs. reality dilemma
  • Understanding the OODA (Observe, Orient, Decide, Act) Loop
  • How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
  • How we can defend ourselves and our organisations

Panel

generic

Tom Allen

Special Projects Editor, Computing

View bio

Tom Allen is the Special Projects Editor for Computing, V3 and The Inquirer. He joined Incisive Media in 2017 from the display industry; trading LCDs and quantum dots for big data and the IoT. As well as writing, Tom regularly interviews C-level IT leaders, helps to organise events across the three titles and complains about improper use of the Oxford comma.


Javvad Malik

Security Awareness Advocate, KnowBe4

View bio

Javvad Malik is a Security Awareness Advocate at KnowBe4, a blogger event speaker and industry commentator who is possibly best known as one of the industry’s most prolific video bloggers with his signature fresh and light-hearted perspective on security that speak to both technical and non-technical audiences alike. Prior to joining KnowBe4, Javvad was security advocate at AlienVault. Before then, he was a Senior Analyst at 451’s Enterprise Security Practice (ESP), providing in-depth, timely perspective on the state of enterprise security and emerging trends in addition to competitive research, new product and go-to-market positioning, investment due diligence and M&A strategy to technology vendors, private equity firms, venture capitalists and end users.

Share

Register

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.