Confessions of a Spy

Breaching Security Through the Artful Manipulation of Insiders

Online or at client site, this program is delivered by an intelligence officer who breached security for a living.

Topics covered include the following:

  • Identification of threat actors - their objectives and motivations

  • Target entity selection and initial information collection

  • Criteria for selection of insiders - collection of targeting information

  • Elicitation Techniques

  • Leveraging trust, motivations, vulnerabilities and influence factors for effective manipulation

  • Social engineering attack vectors: phishing, smishing, vishing and face-to-face interaction

  • How entities can mitigate the risk of an attack

  • Application of lessons learned in the employee's personal life

How can this course benefit organizations?

  • Empowering employees and contractors to actively identify and help shut down security breach attempts before they become successful

  • Mitigating the risk of lost revenue

  • Mitigating the risk of stolen client data which frequently results in damage to the brand as well as legal liability

  • Meeting compliance requires

  • Reduction in insurance costs

Depositphotos_149709838_l-2015.jpg

Feature Course

4700 Millenia Blvd., Suite 175

Orlando, FL 32839

© Copyright 2020 – Counterintelligence Institute – All Rights Reserved