Welcome!

Microservices Expo Authors: Elizabeth White, Liz McMillan, Pat Romanski, Yeshim Deniz, Zakia Bouachraoui

News Feed Item

Wombat Security Technologies Is the Platinum Sponsor of the DEF CON 21 Social Engineering "Capture the Flag" Contest

Unique Event Helps All Employees Understand How Easy It Is for Cybercriminals to Get the Information They Need to Effectively Attack Organizations

PITTSBURGH, PA--(Marketwired - July 17, 2013) -  Wombat Security Technologies (Wombat), a leading provider of cyber security awareness and training solutions, today announced the company will be sponsoring the DEF CON 21 Social Engineering "Capture the Flag" Contest, a unique event designed to challenge and test veteran and amateur social engineers and their ability to gather the information they need to attack companies. Even the most innocent piece of information, such as which third-party companies provide catering or cleaning services to an organization, can provide professional social engineers with the keys to hack a company. The information garnered during the contest proves just how important security awareness and education is and that there is no technology solution that can prevent social engineering attacks. The only defense against these attacks is knowledgeable employees.

"Wombat is excited to be sponsoring DEF CON 21's annual Social Engineering "Capture the Flag" contest which gives contestants 25 minutes to call a target company and attempt to extract as much information as possible to attack the business and win the title of "the Deadliest Social Engineer," said Joe Ferrara, President and CEO of Wombat Security Technologies. "What's great about this contest is that it improves the awareness of the tactics cybercriminals use, the information they are after, and how easily the general population provides it."

Teaching people how to protect sensitive information is fundamental to keeping themselves and their employer safe. Wombat has developed a library of software training solutions, including Social Engineering Assessments and Interactive Software Training modules that leverage learning science to teach employees how to avoid cyber-attacks. Wombat's modules cover the most current cyber security topics like Social Engineering, Smartphone Security, Safe Social Networks, Personally Identifiable Information (PII), working safely outside the office, and Password Security.

DEF CON is one of the world's largest annual hacker conventions, held every year in Las Vegas, Nevada. Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers with a general interest in software, computer architecture, phone phreaking, hardware modification, and anything else that can be "hacked." The event consists of several tracks of speakers about computer and hacking-related subjects, as well as social events and contests. Social Engineer Capture the Flag (SECTF) is part of the first ever Social-Engineer Village which will also have presentations and demonstrations. SECTF is a competition where amateur and veteran social engineers use publicly available information and make phone calls to gather intelligence about target organizations. One of the main purposes of this contest is to demonstrate how easy it is to acquire sensitive information and how much of a threat social engineering is to the business world.

To learn more about SECTF, please visit http://www.social-engineer.org/social-engineer-ctf-who-is-the-deadliest-social-engineer/.

About Wombat Security Technologies

Wombat Security Technologies helps organizations combat cyber security threats with uniquely effective software-based training solutions for employees. Wombat offers fully automated, highly scalable software-based training solutions, built on learning science principles. They offer mock attacks with brief embedded training, as well as a full complement of 10-minute software training modules. Wombat's training solutions have been shown to reduce employee susceptibility to attack over 80%. Wombat is helping Fortune 1000 customers, large government agencies and small to medium businesses in segments such as finance, banking, higher education, retail, technology, energy, insurance, and consumer packaged goods strengthen their cyber security defenses. For more information visit www.wombatsecurity.com or contact Lorraine Kauffman-Hall at 704-882-0443 or [email protected].

Contact: 
Lorraine Kauffman-Hall
[email protected]
704-882-0443
or
Amy Baker
[email protected]
412-621-1484 x 115

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Microservices Articles
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addresse...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.