
Sign up to save your podcasts
Or
So let’s pretend for a moment that you’ve switched sides.
You are now a hacker that is trying to break into your company’s network because you understand the importance of information technology, want to get money from your company, or do something else that you really should not be doing. How are you going to go about making this happen? In the old days, you’d create a malicious piece of software and then try to smuggle it into the company so that it could do your dirty work for you. However, hackers have since moved on. These days they use a more sophisticated attack: social engineering.
As the CIO are you going to be ready to defend against this?
So let’s pretend for a moment that you’ve switched sides.
You are now a hacker that is trying to break into your company’s network because you understand the importance of information technology, want to get money from your company, or do something else that you really should not be doing. How are you going to go about making this happen? In the old days, you’d create a malicious piece of software and then try to smuggle it into the company so that it could do your dirty work for you. However, hackers have since moved on. These days they use a more sophisticated attack: social engineering.
As the CIO are you going to be ready to defend against this?