Mitigo Webinar: Cyber Uncovered – Inside a Social Engineering Attack: How Supply Chain Breaches Really Happen
This is a practical walkthrough of how attackers use social engineering to exploit trusted relationships within your supply chain, and how this leads to real-world breaches.
In this session, Mitigo’s Head of Technical Development, Karl McAree, will walk through a real-world attack scenario, showing how attackers gather intelligence, impersonate trusted contacts and manipulate processes to gain access to organisations.
Key takeaways
How attackers gather publicly available information to build a picture of your organisation and its suppliers
How impersonation is used to exploit trust and manipulate into sharing sensitive information
Why your supply chain creates multiple entry points for attackers
How a real-world social engineering attack unfolds - from first contact through to business impact
Why these attacks are so effective, even in well-run organisations
Practical steps to reduce risk and close the cyber gaps attackers exploit
Why attend?
Get clarity on where your organisation is most vulnerable to supply chain attacks, and what needs to be in place to strengthen oversight and reduce risk.
Who is Mitigo?
Mitigo is a specialist cyber risk management firm, helping organisations understand, manage and reduce cyber risk. We provide independent assurance and clear visibility of where you are exposed - identifying gaps, helping to close them, and reducing overall risk.
Our approach goes beyond technology, addressing cyber risk across people, processes and governance to ensure systems, data and operations remain resilient.