Organizations are beefing up its Information Security Program by setting up organizational structure e.g., committees, getting certified on different information security standards, building perimeter defenses, implementing network segmentation, developing secure business application systems, procuring sophisticated security devices like network and web application firewalls, intrusion prevention/detection systems (IPS/IDS) and subjected the same systems and infrastructure to vulnerability assessment and penetration testing.
But in the information security ecosystem, humans are the weakest and the strongest link. This link is often neglected if not forgotten. According to Verizon, 95% of the data breaches have a social engineering component to them.
This course is intended for governance, risk management, information security and audit professionals who would like to improve the human factor of their information security program.