Pindrop Webinar - Anatomy of Fraud: How Social Engineering is Fed by Social Media & Data Breaches


Anatomy of Fraud: How Social Engineering is Fed by Social Media & Data Breaches

What is social engineering? How is it fed by social media and data breaches? With all that private information leaked online, is inquiring about a customer’s mother’s maiden name still secure for authentication? All great questions we'll address in this webinar!

Watch the Webinar

Hear from “burglar for hire,” Jenny Radcliffe

The struggle many companies go through to balance a great customer experience with necessary digital transformation at times simply adds friction to an already complicated process. Unfortunately, fraudsters keep up with advancements in technology a lot better than companies.  

Watch today to discover more on:

  • Fraudsters’ tactics
  • Social engineering as a fraud tool
  • How the dark web supports fraudsters
  • The dark web as a marketplace

Jenny Radcliffe

Social Engineer & 'People Hacker'

Jenny Radcliffe—aka “The People Hacker”—is a force to be reckoned with. Jenny is a world-renowned Social Engineer, hired to bypass security systems through a no-tech mixture of psychology, con-artistry, cunning and guile. She can diffuse a crisis situation, talk her way into a secure building, and spot a psychopath at a hundred paces.

She has been called a mind reader and a “human lie detector,” and likened to a Jedi Knight. In reality, she is an expert in social engineering (the human element of security), negotiation, persuasion and influence, and non-verbal communication and deception—using her skills to help clients ranging from global corporations and law enforcement organizations to poker players, politicians and the security industry. 

Radcliffe speaks, consults and trains people in the skills of “people hacking,” and explains how “social engineering” using psychological methods can be a huge threat to organisations of all sizes. She reveals how that same knowledge is a valuable tool not only for business executives but also for security professionals of all types working to prevent attacks, scams, and cons of all kinds. Jenny shares how she, without technology, uses the “machine between our ears” to “psychologically pen-test” companies and find the weaknesses in their security measures with the goal of helping them bolster their human defenses against future attacks.