The Evolution of a Social Engineering Program walks through the process of starting a Social Engineering program, the journey of incorporating it with other Cyber Security programs and turning it into a seamless ‘customer experience’. Detailing the importance that employees are the key to our security and understanding their behaviors when faced with various social engineering techniques, allows us to get ahead of our awareness, training, and identifying security needs.
- Vigilant employees are our number 1 defense against security breaches.
- Understanding our employees allows us to get ahead of potential social engineering threats.
- A successful Social Engineering Program integrates with other Cyber Defense Programs and shares knowledge to complete one another.
About Jodi Schaubschlager
Director of Information Security, Training and Awareness at Optum/UnitedHealth Group. Over 20 years of IT and Security experience, working for both private and public companies. Specializing in process improvement and customizing Social Engineering experiences of large companies.