Computing That Serves

Social Engineering: Precursor to Advanced Persistent Threat


Friday, March 4, 2011 - 2:00pm


David Whipple
Information Security Officer (ISO)
Vangent, Inc.


Kent Seamons

The goal for any hacker, whether organized crime or politically motivated, is money.  Either receiving money by blackmail or from not having to spend it on research and development, the result is the same.  This presentation has the thesis of “Is the result of Advanced Persistent Threat more effective when Social Engineering is used?”  There is a systematic process by attackers to send embedded code inside an innocuous looking attachment using an email to entice the target person to open the attachment.  Once on the network, it is almost impossible to detect or eradicate.  The attacker extricates the required information or intellectual property, which reduces research and development considerably.


David Whipple is the Director of the Information Security Group at Vangent. He has a broad background in the areas of strategic operational security, Information Assurance (IA), Federal Certification and Accreditation (C&A), security policy development and gap analysis for client environments. Possessing an extensive background in advanced technologies aimed at protecting and enhancing critical infrastructure, Dave brings a wide spectrum of knowledge to deploying advanced Information Technology Systems to large scale developments.  An expert in information security, Dave has been the project architect for the physical and technical controls for numerous multi-constituent facilities and locations.