Program Description

Please Copy and Paste Your Program Description in Paragraph Format Here

This program is perfect for:
Senior and midlevel management
Chief security officers
Chief information security officers
Human resource managers
Public relations managers

Advanced PreparationNone
Hours of CPE Credit For This Course2
Select the program knowledge levelBasic
Learning objectives for Basic or Overview knowledge level:

Most successful data breaches are initiated by human hacking. Threat actors carefully select, assess, and manipulate key employees within a target organization who in turn become the “insider threat.” Advanced social engineering techniques are employed to effectively circumvent the policies, procedures and technological controls put in place to safeguard proprietary information, client data and sensitive personnel records.
For over 20 years of his career with the Central Intelligence Agency, Peter developed expertise in the identification, assessment, and manipulation of insiders to breach the security of target organizations in pursuit of high value foreign intelligence. He now shares his insight to help protect organizations and employees against external threats.

This website uses cookies to ensure you get the best experience