We are subjected to phishing scams almost every day, and even the most seasoned professional must examine an email to ensure the links included are safe.
Brown University and Federal Reserve Bank of Cleveland's Allen Dziwa says people are the weakest link and that customized messaging using regional language for targeted attacks is becoming more prevalent. Allen breaks down the many types of attacks (phishing, spear phishing, smishing, vishing, whaling) with ISACA's Kevin Keh. Tune in now to learn how to be vigilant when facing potential attacks from scammers.
To read Allen’s full article, please visit: www.isaca.org/how-social-engineering-bypasses-technical-controls
To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts
Finding the Human Factor in Work From Home
Breaking Down Blockchain
The Road to Achieving Privacy by Design
Cybersecurity Degrees or Certificates?
Creating Value by Taking Risks and Overcoming Fear of Failure
Framework Overload
Protecting the Privacy of Our Digital Selves
Privacy Expectations and Regulatory Complexities
Information Systems in the Time of Pandemic
Cybersecurity Considerations for Remote Work
Understanding and Addressing CISO Burnout
Fear Is OK, But Complacency Will Kill You
Lessons Learned From the First-Ever Hack
Using Red Teaming to Improve Your Security
Rise of the Digital Natives
Dynamic Information Security in a Static Organizational Culture
Overcoming Complexity to Secure Critical Infrastructure
Cyberleadership in an Ecosystem Context
Cyberattacks on Industrial Technology and SCADA Systems
Seeing Beyond Taboos to Understand the Dark Web
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast