How to Fight Long-Game Social Engineering Attacks

Date: Thursday, June 27th at 11am PT / 2pm ET

Sophisticated cybercriminals are playing the long game. Unlike the typical hit-and-run cyber attacks, they build trust before laying their traps. They create a story so believable and intertwined with trust that even the most careful individuals can get caught in a trap set over time. Are your users prepared to confront such calculated attacks?

Join us for this webinar where Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, walks you through the ins and outs of long-game social engineering advanced techniques. During the webinar, you’ll:

  • Dive deep into the shadowy strategies of long-game social engineering, such as non-threatening conversations used to build trust over time
  • Explore chilling, true stories where bad actors spun elaborate webs of trust
  • Learn how to recognize the sneaky clues of long-game engineering scams, such as excessive flattery, feigned common interests and efforts to quickly transition conversations away from email
  • Discover tools to enhance your security awareness training program and defend against long-game phishing and other malicious attacks Don’t get caught in the trap of long-game social engineering! Learn how to spot these attacks before they happen

Register now!

About the presenter:

Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Security Analyst for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019.


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.