You are leaving our Website
Using an external Link:
You are now leaving our website. The following page is operated by a third party. We accept no responsibility for the content, data protection, or security of the linked page..
URL:
SC305-WS: Manipulation in Everyday Digital Life: Recognizing and Defending Against Social Engineering NEW
Web-Seminar: Security - Governance, Risk & Compliance
Teaches employees in companies of any size how social engineering attacks against people and AI applications work, how to recognize typical manipulation techniques (e.g., deceptively authentic emails, calls made in the name of business partners, prompt injections), and which technical, organizational, and human measures provide effective protection. Practical examples deliver immediately actionable recommendations for the safe use of AI in everyday work.
Start: 2026-03-26 | 03:00 pm
End: 2026-03-26 | 04:00 pm
Location: Online
Price: 0,00 € plus VAT.
Agenda:
- Why Social Engineering Is So Effective
- Psychological fundamentals: persuasion vs. deception—and why our brains fall for it (and why AI does not “understand” these patterns, but reproduces them)
- Psychological fundamentals: persuasion vs. deception—and why our brains fall for it (and why AI does not “understand” these patterns, but reproduces them)
- Typical Social Engineering Attacks from the Field
- Phishing, vishing, pretexting, CEO fraud & more, based on real-world examples including attacks via AI tools and manipulated prompts
- Phishing, vishing, pretexting, CEO fraud & more, based on real-world examples including attacks via AI tools and manipulated prompts
- Recognizing and Correctly Classifying Manipulation Techniques
- Pressure, authority, trust, helpfulness—the classic triggers in people and as attack vectors against AI systems
- Pressure, authority, trust, helpfulness—the classic triggers in people and as attack vectors against AI systems
- Protective Measures for Employees and Organizations
- Technical, organizational, and human levers, as well as guardrails for the safe use of AI
- Technical, organizational, and human levers, as well as guardrails for the safe use of AI
- Best Practices & Immediate Measures for Everyday Business
- What really works—and what doesn’t (also in the interplay between people and AI)
Objectives:
- A clear understanding of why social engineering is the number one entry point for cyberattacks today—against people as well as AI-supported systems, regardless of company size or industry
- A “mental checklist” that helps employees recognize suspicious situations in everyday work more quickly and respond correctly—and that also helps them critically question risky AI inputs and outputs
- Proven best practices from the field, e.g.:
- Verification rules for emails, phone calls, payment requests, and AI-generated content
- Clear no-go signals in situations involving time pressure, appeals to authority, and “exceptions”—even if these appear “neutral” when coming via AI
- Simple reporting paths for suspicious incidents, including conspicuous AI responses or unexpected system behavior
- Specific immediate measures that can be implemented without major investment (awareness, processes, clear rules for people and AI usage)
- Impulses for a sustainable security culture in which employees and AI systems act not as a weakness, but as a protective factor
Target audience:
The web seminar SC305-WS Manipulation in Everyday Digital Life: Recognizing and Defending Against Social Engineering is aimed at:- Managing Directors & Owners
- IT Managers & IT Officers
- ISMS, Data Protection & Compliance Officers
- HR & Organizational Officers
- Specialists and Managers without an IT background
- Individuals responsible for the use of AI in the organization
Prerequisites:
To be able to follow the content of the web seminar SC305-WS Manipulation in Everyday Digital Life: Recognizing and Defending Against Social Engineering effectively, basic knowledge of information security and/or cybersecurity is helpful.Description:
Cyberattacks today rarely start with classic IT technology—rather, they begin with a targeted attack on people or on AI systems used within the organization. Whether deceptively authentic emails, calls made in the name of business partners, seemingly harmless requests in day-to-day work, or targeted manipulation of AI inputs (e.g., prompt injections): social engineering is one of the greatest threats to companies of any size.In this web seminar SC305-WS Manipulation in Everyday Digital Life: Recognizing and Defending Against Social Engineering, you will learn how social engineering attacks work—both against employees and against AI applications—how to recognize typical manipulation techniques, and which specific technical, organizational, and human measures effectively protect employees and organizations.
Using practical examples, you will receive immediately actionable recommendations for everyday business—also for the safe use of AI in a work context.
Guaranteed implementation:
from 2 Attendees
Booking information:
Duration:
1 Day
Price:
0,00 € plus VAT.
(including lunch & drinks for in-person participation on-site)
Appointment selection:
Authorized training partner
Memberships
Shopping cart
SC305-WS: Manipulation in Everyday Digital Life: Recognizing and Defending Against Social Engineering
was added to the shopping cart.