22-25 April 2026
Video unavailable
SQLBits 2022

An Insider Threat: What is Social Engineering?

As a now-retired criminal/behavioral profiler, I will engage the audience: By outlining the psychological aspects of Social Engineering, Data Breaching, and the prevention of Data loss. By converting your everyday social and observational skills.
Retired Criminal Profiler & Hostage Negotiator, Crux Conception, has taken his years of training, education, and experience to develop a method, which will allow individuals within The Tech Community to utilize: social, people, and observation skills, to detect potential theft and acts of company espionage. By converting your ordinary social and observational skills into simple criminal/psychological profiling techniques. When we hear the word "Ransomware," it is so hard to believe that before a cyberattack is initiated and hackers/cyberthieves penetrate through your online security system…that someone on the inside offered valuable information to the hackers, giving them the ability to hold your company for RANSOME? Are we that naive to think that an individual or organization, worlds away, actually-know how much a company is willing to pay? Are we that unaware to think that someone on the inside supported the hackers/cyberthieves with valuable information regarding your company's security system and protocols? Why is it so hard to imagine that someone inside has specific information about how much a company is willing to pay and how much its product is considered a valuable resource to its vast customer base? For example, what if AT&T had a disgruntled employee (with pertinent knowledge regarding AT&T's security system and protocol). To a SOCIAL ENGERNER, this is the perfect candidate to recruit, gather valuable data, and then relay that information to a team of hackers/cyberthieves. WHAT IS SOCIAL ENGINEERING: Social engineering may appear like innovative, technical experimentation, but its fundamental is very straightforward to comprehend. Social engineering is the ability and talent to emotionally influence individuals to take a specific method or divulge data. Social engineering can occur offline or online; however, online social engineering has been ubiquitous over the previous years. Contingent on the engineer's expertise and what they pursue to achieve, the Social engineering con can motivate the potential target to take swift, imprudent actions or earn the victim's faith as the first move. This can either; be a swift and straightforward one-time occurrence or transpire in complex phases over a prolonged interval. Social engineering is a highly evolving method of a confidence scheme. New: This lecture will display individual methods to infiltrate social media accounts using fake accounts and collect data from unknowing account holders. (using altered photos, which will appear original and pass a "google photo search," disseminating false or misleading information, and more). The presentation will engage the audience: We will focus on their psychological motivations to identify the emotional precursors. We will combine open discussions, media, and PowerPoints, to illustrate cultural adaptation, borderline personality disorder, psychological autopsy, precursors to Espionage, Spying, and Theft of Data. The presentation will give participants innovative insights to conduct psychological field profiles/assessments and verify potential risk factors. This presentation will outline the mental aspects of Data Breaching and possible prevention of Data Loss. In today's cyber-risk and cyber-security world, we sometimes forget about the individuals or suspects behind the breach, attack, or theft. We neglect these individuals until it is too late and the damage has been done. Individuals such as: Edward J. Snowden, the media hails him as a "whistleblower," but Snowden stole data belonging to the NSA and disseminated said data to unauthorized individuals. •William Binney (NSA) •Jose Ignacio Lopez (GM) Chief of productions accused of corporate espionage. •Steven Louis Davis (Gillette) Pleaded guilty to theft of trade secrets. •Patricia Dunn (Hewlett-Packard) Involved in a spying scandal. •Ross Klein and Amar Lalvani (Starwood Hotels) downloaded confidential Starwood information to use later at Hilton.