Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

of

Securing Code Through Social Engineering Slide 1 Securing Code Through Social Engineering Slide 2 Securing Code Through Social Engineering Slide 3 Securing Code Through Social Engineering Slide 4 Securing Code Through Social Engineering Slide 5 Securing Code Through Social Engineering Slide 6 Securing Code Through Social Engineering Slide 7 Securing Code Through Social Engineering Slide 8 Securing Code Through Social Engineering Slide 9 Securing Code Through Social Engineering Slide 10 Securing Code Through Social Engineering Slide 11 Securing Code Through Social Engineering Slide 12 Securing Code Through Social Engineering Slide 13 Securing Code Through Social Engineering Slide 14 Securing Code Through Social Engineering Slide 15 Securing Code Through Social Engineering Slide 16 Securing Code Through Social Engineering Slide 17 Securing Code Through Social Engineering Slide 18 Securing Code Through Social Engineering Slide 19 Securing Code Through Social Engineering Slide 20 Securing Code Through Social Engineering Slide 21 Securing Code Through Social Engineering Slide 22 Securing Code Through Social Engineering Slide 23 Securing Code Through Social Engineering Slide 24 Securing Code Through Social Engineering Slide 25 Securing Code Through Social Engineering Slide 26 Securing Code Through Social Engineering Slide 27 Securing Code Through Social Engineering Slide 28 Securing Code Through Social Engineering Slide 29 Securing Code Through Social Engineering Slide 30 Securing Code Through Social Engineering Slide 31 Securing Code Through Social Engineering Slide 32 Securing Code Through Social Engineering Slide 33 Securing Code Through Social Engineering Slide 34 Securing Code Through Social Engineering Slide 35 Securing Code Through Social Engineering Slide 36 Securing Code Through Social Engineering Slide 37 Securing Code Through Social Engineering Slide 38 Securing Code Through Social Engineering Slide 39 Securing Code Through Social Engineering Slide 40 Securing Code Through Social Engineering Slide 41 Securing Code Through Social Engineering Slide 42 Securing Code Through Social Engineering Slide 43 Securing Code Through Social Engineering Slide 44 Securing Code Through Social Engineering Slide 45 Securing Code Through Social Engineering Slide 46 Securing Code Through Social Engineering Slide 47 Securing Code Through Social Engineering Slide 48 Securing Code Through Social Engineering Slide 49 Securing Code Through Social Engineering Slide 50 Securing Code Through Social Engineering Slide 51 Securing Code Through Social Engineering Slide 52 Securing Code Through Social Engineering Slide 53 Securing Code Through Social Engineering Slide 54 Securing Code Through Social Engineering Slide 55 Securing Code Through Social Engineering Slide 56 Securing Code Through Social Engineering Slide 57 Securing Code Through Social Engineering Slide 58 Securing Code Through Social Engineering Slide 59 Securing Code Through Social Engineering Slide 60 Securing Code Through Social Engineering Slide 61 Securing Code Through Social Engineering Slide 62 Securing Code Through Social Engineering Slide 63 Securing Code Through Social Engineering Slide 64 Securing Code Through Social Engineering Slide 65 Securing Code Through Social Engineering Slide 66 Securing Code Through Social Engineering Slide 67 Securing Code Through Social Engineering Slide 68
Upcoming SlideShare
Encore Session - Motivate and Empower Globally-Competitive Teams of Content Professionals
Next

1,520 Likes

Share

Securing Code Through Social Engineering

Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/1knk8dg.

Christina Camilleri explores what software developers are overlooking and the processes and technical controls that can be used to achieve a strong social engineering defense. Camilleri turns the tables and shows how social engineering can change the way security is woven into testing, operations, and development workflows to better secure code against human threats. Filmed at qconsf.com.

Christina Camilleri is a Security Analyst at Bishop Fox. Christina’s primary areas of expertise are web application penetration testing, open-source intelligence (OSINT), and social engineering -- not only the psychological and physical involvement of social engineering, but also the manipulation and social influencing techniques that are able to exploit the behavior of others.

Related Books

Free with a 30 day trial from Scribd

See all

Securing Code Through Social Engineering

  1. 1. InfoQ.com: News & Community Site • 750,000 unique visitors/month • Published in 4 languages (English, Chinese, Japanese and Brazilian Portuguese) • Post content from our QCon conferences • News 15-20 / week • Articles 3-4 / week • Presentations (videos) 12-15 / week • Interviews 2-3 / week • Books 1 / month Watch the video with slide synchronization on InfoQ.com! http://www.infoq.com/presentations /security-social-engineering
  2. 2. Purpose of QCon - to empower software development by facilitating the spread of knowledge and innovation Strategy - practitioner-driven conference designed for YOU: influencers of change and innovation in your teams - speakers and topics driving the evolution and innovation - connecting and catalyzing the influencers and innovators Highlights - attended by more than 12,000 delegates since 2007 - held in 9 cities worldwide Presented at QCon San Francisco www.qconsf.com
  3. 3. !=
  4. 4. AUTHORITY
  5. 5. AUTHORITY LIKING
  6. 6. AUTHORITY LIKING SOCIALPROOF
  7. 7. AUTHORITY LIKING SOCIALPROOF COMMITMENTANDCONSISTENCY
  8. 8. AUTHORITY LIKING SOCIALPROOFRECIPROCITY COMMITMENTANDCONSISTENCY
  9. 9. AUTHORITY LIKING SOCIALPROOFRECIPROCITY COMMITMENTANDCONSISTENCY SCARCITY
  10. 10. $Password1
  11. 11. Watch the video with slide synchronization on InfoQ.com! http://www.infoq.com/presentations/security- social-engineering
  • LexiVelasquez1

    Nov. 23, 2021
  • MaheshkumarGaniger1

    Oct. 20, 2021
  • LouisLu32

    Oct. 11, 2021
  • jb23trinidad

    Sep. 26, 2021
  • KenKen198

    Sep. 12, 2021
  • RodeladamBacares

    Sep. 4, 2021
  • AfonsoPereira23

    Aug. 14, 2021
  • ssuser0d56b9

    Jul. 31, 2021
  • AnnaBelle64

    Jun. 30, 2021
  • AngieLopez149

    Jun. 23, 2021
  • FireWitch1

    Jun. 20, 2021
  • BandaTharun

    Jun. 12, 2021
  • ssuser5494c3

    Jun. 9, 2021
  • SaiGanesh225

    May. 29, 2021
  • UdeshAbeyweera

    May. 23, 2021
  • RaudinCamacaro

    May. 16, 2021
  • IfteeKharUlIslam

    May. 15, 2021
  • ShivaGuruEshwarB

    May. 14, 2021
  • BillAmol

    Apr. 30, 2021
  • DilshadHaji2

    Apr. 24, 2021

Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/1knk8dg. Christina Camilleri explores what software developers are overlooking and the processes and technical controls that can be used to achieve a strong social engineering defense. Camilleri turns the tables and shows how social engineering can change the way security is woven into testing, operations, and development workflows to better secure code against human threats. Filmed at qconsf.com. Christina Camilleri is a Security Analyst at Bishop Fox. Christina’s primary areas of expertise are web application penetration testing, open-source intelligence (OSINT), and social engineering -- not only the psychological and physical involvement of social engineering, but also the manipulation and social influencing techniques that are able to exploit the behavior of others.

Views

Total views

62,511

On Slideshare

0

From embeds

0

Number of embeds

6,310

Actions

Downloads

0

Shares

0

Comments

0

Likes

1,520

×