SC305-WS: Manipulation in Everyday Digital Life: Recognizing and Defending Against Social Engineering NEW

Web-Seminar: Security - Governance, Risk & Compliance

Teaches employees in companies of any size how social engineering attacks against people and AI applications work, how to recognize typical manipulation techniques (e.g., deceptively authentic emails, calls made in the name of business partners, prompt injections), and which technical, organizational, and human measures provide effective protection. Practical examples deliver immediately actionable recommendations for the safe use of AI in everyday work.

Online event Online event

Start: 2026-03-26 | 03:00 pm

End: 2026-03-26 | 04:00 pm

Location: Online

Price: 0,00 € plus VAT.

Request prefered appointment period:

* All fields marked with an asterisk are mandatory fields.

Agenda:

  • Why Social Engineering Is So Effective
    • Psychological fundamentals: persuasion vs. deception—and why our brains fall for it (and why AI does not “understand” these patterns, but reproduces them)

  • Typical Social Engineering Attacks from the Field
    • Phishing, vishing, pretexting, CEO fraud & more, based on real-world examples including attacks via AI tools and manipulated prompts

  • Recognizing and Correctly Classifying Manipulation Techniques
    • Pressure, authority, trust, helpfulness—the classic triggers in people and as attack vectors against AI systems

  • Protective Measures for Employees and Organizations
    • Technical, organizational, and human levers, as well as guardrails for the safe use of AI

  • Best Practices & Immediate Measures for Everyday Business
    • What really works—and what doesn’t (also in the interplay between people and AI)

Objectives:

  • A clear understanding of why social engineering is the number one entry point for cyberattacks today—against people as well as AI-supported systems, regardless of company size or industry
  • A “mental checklist” that helps employees recognize suspicious situations in everyday work more quickly and respond correctly—and that also helps them critically question risky AI inputs and outputs
  • Proven best practices from the field, e.g.:
    • Verification rules for emails, phone calls, payment requests, and AI-generated content
    • Clear no-go signals in situations involving time pressure, appeals to authority, and “exceptions”—even if these appear “neutral” when coming via AI
    • Simple reporting paths for suspicious incidents, including conspicuous AI responses or unexpected system behavior
  • Specific immediate measures that can be implemented without major investment (awareness, processes, clear rules for people and AI usage)
  • Impulses for a sustainable security culture in which employees and AI systems act not as a weakness, but as a protective factor

Target audience:

The web seminar SC305-WS Manipulation in Everyday Digital Life: Recognizing and Defending Against Social Engineering is aimed at:
  • Managing Directors & Owners
  • IT Managers & IT Officers
  • ISMS, Data Protection & Compliance Officers
  • HR & Organizational Officers
  • Specialists and Managers without an IT background
  • Individuals responsible for the use of AI in the organization

Prerequisites:

To be able to follow the content of the web seminar SC305-WS Manipulation in Everyday Digital Life: Recognizing and Defending Against Social Engineering effectively, basic knowledge of information security and/or cybersecurity is helpful.

Description:

Cyberattacks today rarely start with classic IT technology—rather, they begin with a targeted attack on people or on AI systems used within the organization. Whether deceptively authentic emails, calls made in the name of business partners, seemingly harmless requests in day-to-day work, or targeted manipulation of AI inputs (e.g., prompt injections): social engineering is one of the greatest threats to companies of any size.

In this web seminar SC305-WS Manipulation in Everyday Digital Life: Recognizing and Defending Against Social Engineering, you will learn how social engineering attacks work—both against employees and against AI applications—how to recognize typical manipulation techniques, and which specific technical, organizational, and human measures effectively protect employees and organizations.

Using practical examples, you will receive immediately actionable recommendations for everyday business—also for the safe use of AI in a work context.
Check Icon

Guaranteed implementation:

from 2 Attendees

Booking information:

Duration:

1 Day

Price:

0,00 € plus VAT.

(including lunch & drinks for in-person participation on-site)

Authorized training partner

NetApp Partner Authorized Learning
Commvault Training Partner
CQI | IRCA Approved Training Partner
Veeam Authorized Education Center
Acronis Authorized Training Center
AWS Partner Select Tier Training
ISACA Accredited Partner
iSAQB
CompTIA Authorized Partner
EC-Council Accredited Training Center

Memberships

Allianz für Cyber-Sicherheit
TeleTrust Pioneers in IT security
Bundesverband der IT-Sachverständigen und Gutachter e.V.
Bundesverband mittelständische Wirtschaft (BVMW)
Allianz für Sicherheit in der Wirtschaft
NIK - Netzwerk der Digitalwirtschaft
BVSW
Bayern Innovativ
KH-iT
CAST
IHK Nürnberg für Mittelfranken
eato e.V.
Sicherheitsnetzwerk München e.V.