10 - 12 October 2017 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Zoom product LOGO_Social Engineering Tests

Social Engineering Tests

LOGO_Social Engineering Tests

Social Engineering Tests

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Send
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.

Sometimes, the easiest way for attackers to obtain confidential information or gain access to critical infrastructure is by constructing a scenario that tricks employees into helping them. Our social engineers have extensive experience in designing and executing scenarios, ranging from phishing e-mails and gaining physical access to assessing how vulnerable your company is to these attacks.

Social engineering is often the easiest way for an attacker to get what he wants. For companies, it is one of the hardest areas to secure. Company networks get comprised because employees accidentally click on links in Phishing emails or connect malicious USB sticks to their computer. Sometimes, an attacker is able to just get in through the front door, pretending to be someone else, and walks away with new product plans or a prototype.

With our Social Engineering Test, HACKNER Security Intelligence explores how vulnerable your company is to these attacks and how well your security protocols function in practice. The test is meant as a learning process for both management and employees and should ideally be followed up on with a security awareness training. Among the social engineering techniques that are used are: Malicious USB dropping, (Spear) Phishing, Piggybacking, Dumpster Diving, and Phone Elicitation.

Tiger Team Assessments

LOGO_Tiger Team Assessments

VULCOM Vulnerability Management

LOGO_VULCOM Vulnerability Management

IT-Penetration Tests

LOGO_IT-Penetration Tests

Social Engineering Tests is assigned to following product groups:

There are no entries in your notes.

Show notes



top

The selected entry has been placed in your notes!

If you register you can save your notes permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your notes permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your notes mobile too! Simply log in and access them at anytime.