When Social Engineering Bypasses Our Cyber Tools

When Social Engineering Bypasses Our Cyber Tools

0 Calificaciones
0
Episodio
144 of 333
Duración
28min
Idioma
Inglés
Formato
Categoría
No ficción

All links and images for this episode can be found on CISO Series Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Our sponsored guest is Josh Yavor (@schwascore), CISO, Tessian. Thanks to our podcast sponsor, Tessian 95% of breaches are caused by human error. But you can prevent them. Learn how Tessian can stop "OH SH*T!" moments before they happen, why Tessian has been recognized by analysts like Gartner and Forrester, and which world-renowned companies trust the platform to protect their data. In this episode: • What do you do for the attacks your rule sets can't catch? • Would it help if we eliminated email systems as the standard b2b toolset for communications? • Are there any better ways to handle spearphishing? • Are you ready to add BCC - Business communications compromise to your threat list?


Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 1 millón de títulos
  • Títulos exclusivos + Storytel Originals
  • Precio regular: CLP 7,990 al mes
  • Cancela cuando quieras
Suscríbete ahora
Copy of Device Banner Block 894x1036 3
Cover for When Social Engineering Bypasses Our Cyber Tools

Otros podcasts que te pueden gustar...