During a Security Assessment or Adversary Simulation, first we perform the Open-Source Intelligence gathering, commonly referred to as OSINT. Then, we determine which people in the company might be most susceptible to a social engineering attack or vulnerable to influence techniques.
Learn more about the importance of a Social Engineering Risk Assessment. Enter Your Email to Download