We are subjected to phishing scams almost every day, and even the most seasoned professional must examine an email to ensure the links included are safe.
Brown University and Federal Reserve Bank of Cleveland's Allen Dziwa says people are the weakest link and that customized messaging using regional language for targeted attacks is becoming more prevalent. Allen breaks down the many types of attacks (phishing, spear phishing, smishing, vishing, whaling) with ISACA's Kevin Keh. Tune in now to learn how to be vigilant when facing potential attacks from scammers.
To read Allen’s full article, please visit: www.isaca.org/how-social-engineering-bypasses-technical-controls
To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts
Auditee Buy-In—A Key Component of Effective Audits
Breaking Down the ESET T2 2022 Threat Report
Enabling Digital Trust through Canada’s Digital Charter
It’s About (Down) Time
What Makes Risk Assessments So Unpleasant and How to Change That
ISACA CyberPros – Naomi Buckwalter
Quantifying the Qualitative Risk Assessment
Gaining More Actionable Intelligence Using a Smarter Security Data Lake
ISACA Industry Spotlight | Ali Pabrai
Managing Cybersecurity Risk as Enterprise Risk
Implementing Artificial Intelligence: Capabilities and Risk
Audit in Practice: Auditing Culture
Incident Report & Continuous Control Monitoring
Industry Spotlight - Lisa Young
Defending Data Smartly
Foco de la industria - Arnulfo Espinosa Dominguez Parte II
Ethical AI Shifting the Conversation Left
Foco de la industria - Arnulfo Espinosa Dominguez Parte I
Why (And How to) Dispose of Digital Data
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast