Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Securing Code Through Social Engineering

42.608 visualizaciones

Publicado el

Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/1knk8dg.

Christina Camilleri explores what software developers are overlooking and the processes and technical controls that can be used to achieve a strong social engineering defense. Camilleri turns the tables and shows how social engineering can change the way security is woven into testing, operations, and development workflows to better secure code against human threats. Filmed at qconsf.com.

Christina Camilleri is a Security Analyst at Bishop Fox. Christina’s primary areas of expertise are web application penetration testing, open-source intelligence (OSINT), and social engineering -- not only the psychological and physical involvement of social engineering, but also the manipulation and social influencing techniques that are able to exploit the behavior of others.

Publicado en: Ingeniería, Tecnología
  • I pasted a website that might be helpful to you: ⇒ www.HelpWriting.net ⇐ Good luck!
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • our best friend's mother gets 77 every hour on the internet. she's been without work for 2 months, last month her paycheck was 13054 working at home two hours every day... check this site ........ Www.Work75.Com
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • Hi guys! Rate my nudes here --- ONAL.ML (Find them in my profile oksi69) I'm looking for a horny guy to chat and meet
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • My roomate's mother makes $77 an hour on the internet. She has been without a job for seven months but last month her paycheck was $16913 just working on the internet for a few hours. you could try here..................... www.Work83.com
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí

Securing Code Through Social Engineering

  1. 1. InfoQ.com: News & Community Site • 750,000 unique visitors/month • Published in 4 languages (English, Chinese, Japanese and Brazilian Portuguese) • Post content from our QCon conferences • News 15-20 / week • Articles 3-4 / week • Presentations (videos) 12-15 / week • Interviews 2-3 / week • Books 1 / month Watch the video with slide synchronization on InfoQ.com! http://www.infoq.com/presentations /security-social-engineering
  2. 2. Purpose of QCon - to empower software development by facilitating the spread of knowledge and innovation Strategy - practitioner-driven conference designed for YOU: influencers of change and innovation in your teams - speakers and topics driving the evolution and innovation - connecting and catalyzing the influencers and innovators Highlights - attended by more than 12,000 delegates since 2007 - held in 9 cities worldwide Presented at QCon San Francisco www.qconsf.com
  3. 3. !=
  4. 4. AUTHORITY
  5. 5. AUTHORITY LIKING
  6. 6. AUTHORITY LIKING SOCIALPROOF
  7. 7. AUTHORITY LIKING SOCIALPROOF COMMITMENTANDCONSISTENCY
  8. 8. AUTHORITY LIKING SOCIALPROOFRECIPROCITY COMMITMENTANDCONSISTENCY
  9. 9. AUTHORITY LIKING SOCIALPROOFRECIPROCITY COMMITMENTANDCONSISTENCY SCARCITY
  10. 10. $Password1
  11. 11. Watch the video with slide synchronization on InfoQ.com! http://www.infoq.com/presentations/security- social-engineering

×