Most successful data breaches are initiated by human hacking. Threat actors carefully select, assess, and manipulate key employees within a target organization who in turn become the “insider threat.” Advanced social engineering techniques are employed to effectively circumvent the policies, procedures, and technological controls put in place to safeguard proprietary information, client data, and sensitive personnel records.
WHY SHOULD YOU ATTEND?
For over 20 years of his career with the Central Intelligence Agency, Peter developed expertise in the identification, assessment, and manipulation of insiders to breach the security of target organizations in pursuit of high-value foreign intelligence. He now shares his insight to help protect organizations and employees against external threats.
AREA COVERED
- Why humans are so susceptible to human hacking
- An understanding of threat actors and their objectives
- How threat actors use social media platforms to identify and assess employees as potential insider candidates
- How insider motivations and vulnerabilities are leveraged into the design and execution of advanced social engineering techniques including Spear Phishing, Smishing, Vishing, and Face-to-Face approaches
- The Evolution and Impact of Deep Fake Technology in human hacking schemes
- Three key actionable tips to prevent falling victim to human hacking
WHO WILL BENEFIT?
- Senior and midlevel management
- Chief security officers
- Chief information security officers
- Human resource managers
- Public relations managers
For over 20 years of his career with the Central Intelligence Agency, Peter developed expertise in the identification, assessment, and manipulation of insiders to breach the security of target organizations in pursuit of high-value foreign intelligence. He now shares his insight to help protect organizations and employees against external threats.
- Why humans are so susceptible to human hacking
- An understanding of threat actors and their objectives
- How threat actors use social media platforms to identify and assess employees as potential insider candidates
- How insider motivations and vulnerabilities are leveraged into the design and execution of advanced social engineering techniques including Spear Phishing, Smishing, Vishing, and Face-to-Face approaches
- The Evolution and Impact of Deep Fake Technology in human hacking schemes
- Three key actionable tips to prevent falling victim to human hacking
- Senior and midlevel management
- Chief security officers
- Chief information security officers
- Human resource managers
- Public relations managers
Speaker Profile

Peter Warmka is a former Senior Intelligence Officer with the CIA having over 20 years of experience in breaching the security of target organizations overseas. He is the Founder of Orlando, Florida-based firm Counterintelligence Institute, LLC, and author of the non-fiction book "Confessions of a CIA Spy - The Art of Human Hacking." In addition to conducting his signature training programs, Mr. Warmka is a frequent conference speaker, guest podcaster, and author of numerous publications on social engineering and the manipulation of insiders.He received a bachelor’s degree in Liberal Arts from the University of Wisconsin-Milwaukee and a master’s degree in International …
Upcoming Webinars

Imposter Syndrome: How to Define, Understand & Shift Your E…

Contractor vs Employee: How to Tell the Difference and What…

FDA current recommendations related to timely initiation of…


Complying with the NEW I-9 and E-Verify Regulations - The I…

Implicit Bias: Becoming Aware of Your Inner Storyteller

Impact Assessments For Supplier Change Notices

The Federal Anti-Kickback Statute & Stark Law: What Physici…

Building an Effective Injury Management Process

Fatal Errors Employers Make When Updating Employee Handbook…

Understanding the Changes Coming to NCCI's Experience Mod i…

From Awareness to Action: Going Beyond the Law in Preventin…


Onboarding is NOT Orientation - How to Improve the New Empl…


From Awareness to Action: Going Beyond the Law in Preventin…

5 Proven Ways To Engage & Retain Your Team Even During The …


FDA Compliance and Clinical Trial Computer System Validation


Form 1099 Update 2023: Latest Forms, Rules and Reporting Re…

Strategic Interviewing & Selection: Getting the Right Talen…

Navigating New Paths: Unveiling Your Unique Abilities for a…


Customer Relationship Management: Strategic Methods to Mana…


Amazing (!) AI Tools For Building Your Business

Project Management for Non-Project Managers - How to Effect…


Excel - Unleashing the Full Potential of New Functions (Exc…

Implementing a Robust Change Control Program - Key Elements…

How to Conduct Annual Product Reviews to Achieve GMP Compli…



Harassment, Bullying, Gossip, Confrontational and Disruptiv…

What Business Leaders Need to Know About Cybersecurity Prep…