Social Engineering (The Dark Side Of Tech)

As a now-retired CRIMINAL PROFILER, I WILL ENGAGE THE AUDIENCE:

By outlining the psychological aspects of Data Breaching and the prevention of Data loss.

BY CONVERTING YOUR EVERYDAY SOCIAL AND OBSERVATIONAL SKILLS into simple criminal/psychological profiling techniques.

Retired Criminal Profiler & Hostage Negotiator, Crux Conception, has taken his years of training, education, and experience to develop a method. Crux's approach will allow individuals within THE TECH COMMUNITY to utilize his/her, social, people, and observation skills, to detect potential THEFT and acts of COMPANY ESPIONAGE.

•We always talks about protecting data.

•We always talks about outside forces seeking to obtain our data by unconventional means.

•But we rarely talk about PROTECTING or DATA that is stolen from trusted individuals within.

MY PRESENTATION WILL ENGAGE THE AUDIENCE: We will focus on their psychological motivations, to identify the emotional precursors. We will combined open-discussions, media, and PowerPoints, to illustrate, cultural adaptation, borderline personality disorder, psychological autopsy, precursors to ESPIONAGE, SPYING, and THEFT of DATA.

The presentation will give participants innovative insights to conduct psychological field profile/assessments and verify potential risk factors. This presentation will outline the mental aspects of Data Breaching and possible prevention of Data Loss.

In today’s world of CYBER-RISK and CYBER-SECURITY, we sometimes forget about the individuals or dare I say SUSPECTS behind the BREACH, ATTACK, or THEFT. We neglect these individuals until it is too late, and the damage has been done.

Individuals such as:

EDWARD J. SNOWDEN The media hails him as a “whistleblower,” but MR. SNOWDEN stole DATA belonging to the NSA and disseminated said data to individuals with unauthorized access.

•William Binney (NSA) •Jose Ignacio Lopez (GM) Chief of productions accused of corporate espionage. •Steven Louis Davis (Gillette) Pled guilty to theft of trade secrets.

•Patricia Dunn (Hewlett-Packard) Involved in a spying scandal.

•Ross Klein and Amar Lalvani (Starwood Hotels) downloaded confidential Starwood information to use later at Hilton.

TARGET AUDIENCE:

•Security Systems Integrators
•IT and Cybersecurity Leaders
•Integration Engineers
•Product Developers and Manufacturers
•Senior Technology Business Executives
•Security Specifiers and Engineers
•Security Consultants
•CSOs/CISOs/Security Leadership
•Anyone responsible for the cybersecurity of integrated security systems!

TAKEAWAYS:

•Performing assessments on a psychological and cybersecurity platform

•Enhanced abilities to evaluate security efficiency within his/her organizational structure

•We will use authentic mock scenarios regarding attack vectors and how to respond or set up a novel response system. This method pertains to the aftermath and the preparation to make a quick recovery and training for the aftershock.

20 Point Talk outline:

1. Evaluate an individual whose psychological profile dictates that they retain the potential to perform CORPORATE ESPIONAGE.

2.How to profile random social media accounts of individuals, based on photographs, social media postings, likes, friends, and so forth (risk factors).

3.History of CORPORATE ESPIONAGE and incidents involving same.

4.The psychological concepts behind DATA BREACHES (within) and CORPORATE sector.

5.Criminal/Psychological profile to aid in determining potential corporate spies/thieves.

6. We will discuss how the board of directors and its administration treat the protection of data, and the ability to warrant the risk of a breach of data.

7.Why we neglect these individuals until it is too late, and the damage has been done. Individuals such as:

•Edward J. Snowden
•William Binney (NSA)
•Jose Ignacio Lopez (GM)
•Steven Louis Davis (Gillette)
•Patricia Dunn (Hewlett-Packard)
•Ross Klein and Amar Lalvani (Starwood Hotels)

8.Hands-on role-playing scenarios

9. How to detect psychological manipulation of people into performing actions or divulging confidential information.

10. We will use open-discussions, media, and PowerPoints, to illustrate, cultural adaptation, borderline personality disorder, psychological autopsy, precursors to ESPIONAGE, and SPYING

11. This presentation/workshop will demonstrate that with the proper preparation, one can evaluate an individual whose psychological profile dictates that they retain the potential to perform CORPORATE ESPIONAGE.

12. Inform Executives/Administrators vital signs to help reduce/prevent DATA loss using corporate espionage and theft.

13. The psychological concepts behind DATA BREACHES (within) and CORPORATE ESPIONAGE will be discussed thoroughly.

14. I will use role-playing scenarios to PROVE how “everyday people skills,” can be used to conduct a Criminal/Psychological profile to aid in determining potential corporate spies/thieves.

15. We will focus on people reading skills and identifying FACIAL micro-expressions.

16. I will ask PARTICIPANTS to apply what they have learned by identifying potential RISKS. To randomly profile social media accounts of individuals, based on photographs, social media postings, likes, friends, and so forth.

17. Not only have past participants found this method fun, but they have also found it to be reliable and proven reliable. I utilize this method throughout my profiles of gang members, narcotics traffickers, white-collar criminals, terrorists, fake social media accounts, and more.

18. Will show how the protection of a company's data is not just an issue for the IT department. Data security is a crucial element of a corporation's security mainframe, necessitating executive surveillance. The breach of data has immediate licit consequences, which executives must comprehend.

19. The topic of data security must be addressed in every board meeting and should be equipped with the tools to obtain proficiency. These tools will allow board members to encounter with matters surrounding data security.

20. My goal is to offer attendees an additional preventive measure by exposing the abilities they have within. The purpose of this segment is to make individuals aware of the influences that they have, using one's observational skills to detect the behavior of potential attackers.
Introductory and overview Security

Jak se Vám líbila přednáška?

Respektujeme Vaše soukromí. Zpětná vazba je anonymní a slouží pouze ke zlepšování konferencí, které pořádáme.

Ostatní přednášky přednášejících

Přednášející nemá žádnou další přednášku.