Stranger danger: Your digital footprint, using you against you

Wednesday
 
27
 
November
1:30 pm
 - 
2:10 pm

Speakers

Benji Zorella

Benji Zorella

eLearning Instructional Designer
Phriendly Phishing / CyberCx
Rebecca Caldwell

Rebecca Caldwell

Content Specialist
Phriendly Phishing

Synopsis

The threat from online scammers has never been more significant. With the advent of Generative AI technology, scammers have become more sophisticated, leveraging AI to create highly targeted and convincing attacks, as well as scouring your digital footprint for clues on how to catch you. This session, "Bring Back Stranger Danger: Using You Against You" will provide essential strategies for protecting your digital footprint, how to avoid cognitive biases, and navigating social proof traps while maintaining online security.

Social proof is a psychological phenomenon where people look to the actions of others before conforming or forming an opinion – assuming that those actions are the ‘correct’ behaviour. Cyber criminals exploit these common proofs using mis and disinformation to increase the credibility of their scams. By recognising the influence and understanding our own biases we can better protect ourselves against these tactics.

Session Description:

This presentation will cover:

  1. Understanding AI-Assisted Scams: An overview of how AI is being used by cyber criminals to enhance the effectiveness of phishing, social engineering, and other scam tactics, a look at how you can be deepfaked.
  2. Identifying Red Flags: Practical tips for recognising the signs of AI-assisted scams and understanding the common tactics used by scammers.
  3. Protecting Personal Information: Strategies for safeguarding personal data, including the use of strong passwords and other best practices such as making sure your footprint is locked down.
  4. Q &A : Engaging the audience with demonstrations and interactive scenarios to illustrate the importance of vigilance and proactive measures in online safety.

Target Audience:

This session is designed for a broad audience, including individuals, small business owners, IT professionals, and anyone interested in enhancing their cyber security knowledge.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country