Have you completed this webinar? Please tell us what you think.
Criminals view "Call Centers" as the weakest link in the security armor of financial institutions! It is easy for the social engineer to scam you remotely because they don't have to physically enter your institution - they can e-mail, chat, or call you on the phone. No one will have their picture, so the worst that can happen to them is you hang up. If your institution prides itself on customer service, not knowing the techniques that organized crime employs, you will take losses. Some of the same techniques can also be used in person.
In this session, you'll get information to help you understand:
- How a social engineer learns your policies and procedures
- How social engineers can obtain information on account holders that can answer to challenge questions
- What "low and slow" means when implementing a social engineering attack
- What you need to teach staff about deceptive answers
- How to design the proper challenge questions to blunt social engineering attacks
- How criminals actually attack your call center using information you provide
This fast-moving program on preventing losses will focus on the information identity thieves have before they call your institution when trying to obtain information or financial rewards. This webinar will discuss actual attacks used against financial institutions.
Who Should Attend:
Auditors, Call Center management and staff, Frontline staff, Branch Mangers, Retail Operations, Security Officers, Security Assistants, Security/risk management staff and Tr
Deception for Dollars: Social engineering your staff and call centers
Questions and Answers