Social Engineering and Technical Exploitation [ASIS Webinar]

When:  Oct 27, 2020 from 3:00 PM to 4:00 PM (ET)

Technical exploitation comes down to four basics: patching, permissions, people, and physical. In a world rife with hackers and exploiters, malware and malice, understanding the influx of bad actors is important in establishing a secure operating environment. Learn the basics of technical exploitation and how hackers target and ultimately exploit vulnerable people and places. A technical background is helpful for grasping the details.  

This webinar is sponsored by the ASIS Information Technology Security Community.  Registration is free for ITSC Members.

Learning Objectives

Upon completion, participants will be able to:

  • Attendees will learn to identity when being solicited for nefarious purposes.
  • Attendees will learn how systems are compromised through common techniques.
  • Attendees will be learn defensive techniques for identifying and countering social engineering.

Credit Information

Completion of this webinar is eligible for 1 CPE credit.  CPE credits will be updated in your user profile within 48 hours of completion.  Self-reporting of CPE credits is not required. 

Expand Your Learning!

ASIS joins the U.S. Department of Homeland Security and the E.U. Agency for Network and Information Security (ENISA) in recognizing October as Cybersecurity Awareness Month.  In that vein, the Information Technology Security Community hosts several webinars addressing various cybersecurity topics to help you, your organization, and your communities stay safe online.  For more cybersecurity resources, visit


Matt James
Apple, Inc.

Matt James is a seasoned security professional, having served in associated roles for more than 15 years. A combat-wounded veteran, Mr. James started his career in cybersecurity following his medical retirement from the U.S. Army. His experience spans the US Department of State to the US Army Special Operations Command, to civilian roles for ManTech, Frontier Communications,, and now Apple. He resides in the Austin, Texas area with his wife, where he continues supporting veteran and infosec initiatives.

 *Note:  Speakers and content are subject to change without notice.


Event Image
Download to Your Calendar Outlook Google