Skip to Main Content

Dialing Into Deception: A Social Engineer's Playbook for Voice-Based Attacks

Join Targeted Operations Practice Lead Jason Lang and Senior Security Consultant David Boyd as they walk through different aspects of social engineering and ways you can bolster the human element of your defense.

By Jason Lang and David Boyd
June 25, 2025
Social Engineering

For better or worse, humans are often an organization’s last line of defense. Even if alerting and logging procedures are running like a well-oiled machine, they can all be evaded with one carefully crafted phone call.

Voice-based social engineering takes advantage of human vulnerabilities that are often not fully considered in an organization’s security plan. What are the best steps to train your staff against social engineering attacks carried out by groups like Scattered Spider? Will your team feel comfortable telling someone “no” over the phone or even hanging up when necessary?

During our next webinar, we will discuss:

  • Tools and techniques used in voice-based social engineering
  • Target selection
  • Pretexts
  • Best and worst defenses
  • Defense strategies for every level employee

Join Targeted Operations Practice Lead Jason Lang and Senior Security Consultant David Boyd as they walk through different aspects of social engineering and ways you can bolster the human element of your defense. You’ll learn how social engineering affects everyone from Help Desk to C-Suite employees and hear stories of success (and failure) from real-world engagements. Register now to learn how you can help prepare your employees for this type of attack.