We are subjected to phishing scams almost every day, and even the most seasoned professional must examine an email to ensure the links included are safe.
Brown University and Federal Reserve Bank of Cleveland's Allen Dziwa says people are the weakest link and that customized messaging using regional language for targeted attacks is becoming more prevalent. Allen breaks down the many types of attacks (phishing, spear phishing, smishing, vishing, whaling) with ISACA's Kevin Keh. Tune in now to learn how to be vigilant when facing potential attacks from scammers.
To read Allen’s full article, please visit: www.isaca.org/how-social-engineering-bypasses-technical-controls
To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts
Real-World Data Resilience Demands an Integrated Approach to Artificial Intelligence, Data Governance, and Cloud
Where Privacy Meets Security
How To Build A Following Around Your Ideas
Industry Spotlight: Jan Anisimowicz
Climate Resiliency and Regulation
Gaining Digital Trust by Eliminating Privacy Dark Patterns
Industry Spotlight: Mark Thomas
Cybersecurity In A Covid-19 World: Insights On How Decisions Are Made
Industry Spotlight: Caitlin McGaw
Industry Spotlight: Ed McCabe
Cyber (Business) Recovery
Industry Spotlight - Niki Gomes
ISACA Live: Risk Scenarios
Managing Data Privacy Risks and Compliance with a Distributed Workforce
CMMC and CUI: Rocket Fuel
CyberPros: Evolution of Interconnectivity of Cyber and Warfare with Fred Carr
A Security Awareness Program for PCI-DSS Compliance
Industry Spotlight - Jo Stewart-Rattray
The Transformative Power of Mobility
Industry Spotlight with Raven David
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast