Remote access tools can be an IT blessing, allowing tech support to quickly and remotely troubleshoot computer problems while reducing the need for lengthy conversations with confused employees. But just as remote access can be used for good, malicious cyberactors can leverage it to cause financial or even biological harm. In this episode of the ISACA® Podcast, security experts Dustin Brewer and Frank Downs explore different ways remote access tools can be exploited and how it can be avoided.
Rethinking Identity Governance
2023: The Year of Risk
Improving Cyber Resilience in an Age of Continuous Attacks
Advancing Digital Trust Through Audit and Assurance
ISACA Live_Critical Infrastructure Security
ISACA Live | Risk Scenarios
ISACA Live | How to Mature Your Privacy Compliance Program
Career Coach Advice: How to Launch Your IT Audit Career
ISACA Live | Advancing Digital Trust Through Data Privacy
ISACA Live | The Dark Future of Privacy
Information Privacy Contradiction: Interest-Based Posture of Compliance and Violation
ISACA Live | Advancing Digital Trust Through IT
Should Cybersecurity Be Subject to a SOX-Type Regulation?
Beware the Traps of Data Governance and Data Management Practice
Convergence: Where Next?
Do Data Go To Waste
Protecting Your Enterprise and Deterring Fraud in a New Risk Era
The Circle of Failure: Why the Cyber Security Industry Doesn’t Work
Meeting Attackers Where They Are
Taking Security Strategy to the Next Level: The Cyber Kill Chain vs. MITRE ATT&CK
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast