Drexel University - Comprehensive, integrated academics enhanced by co-operative education, technology, and research opportunities. | Drexel University
Drexel University
Search events. View events.

All Categories

Click for help in using calendar displays. Print the contents of the current screen.
Display Format: 
Event Details
Notify me if this event changes.Add this event to my personal calendar.
Go Back
Protiviti
Start Date: 4/17/2017Start Time: 4:30 PM
End Date: 4/17/2017End Time: 6:00 PM

Event Description
Interested in Cyber Security? Ever thought about Consulting?

It’s no secret that a majority of the breaches and attacks we see today have a root in email phishing. According to Wombat Security’s 2016 State of the Phish report, two-thirds of the organizations they reviewed reported experiencing advanced, targeted phishing attacks. Whether the attacker’s goal is installation of ransomware, stealing private personal information or wiring money, the initial attack vector is often the same. Together we’ll walk through this common attack vector from a new perspective.

Through a live demo you will see an email phishing attack from an attacker’s perspective. This will include:
- Demonstrating OSINT techniques used to develop a targeted campaign against an organization;
- Creating of a spear-phishing email showing common and advanced attack vectors for delivering a malicious payload;
- Simulating the initial compromise of a workstation and establishment of a persistent foothold within an organization;
- Demonstrating techniques for enumerating an internal environment while staying under the radar; and
- Demonstrating techniques for moving laterally and elevating privileges within an internal environment.
As each step of the attack is presented, baseline controls will be highlighted to counteract the most common risks presented to an organization, many of which are often overlooked.

This talk aims to deliver a deeper understanding of one of the most common threats to organizations today. By witnessing the technical steps involved in targeting, attacking, and compromising an organization first hand, as well as keying in on proven strategies and techniques to deter these attacks, security professional will be better equipped to protect an organization from the ever present threat of email phishing attacks!

Target Majors:
COMPUTING & INFORMATICS, INFORMATION SCIENCE AND TECHNOLOGY/INFORMATION TECHNOLOGY
Contact Information:
Name: Steinbright Career Development Center
Phone: 215-895-2185
Email: scdc@drexel.edu
Location:
CCI, University Crossings, Room 153
(15 N. 32nd Street Philadelphia, PA 19104)
Audience:
  • Undergraduate Students
  • Graduate Students
  • Senior Class

  • Display Month:

    Advanced Search (New Search)
    Date Range:
    Time Range:
    Category(s):
    Audience: 

    Special Features: 

    Keyword(s):
    Submit
    Select item(s) to Search
    Select item(s) to Search
    Select item(s) to Search
    Select item(s) to Search