ISACA Podcast

How Social Engineering Bypasses Technical Controls


Listen Later

We are subjected to phishing scams almost every day, and even the most seasoned professional must examine an email to ensure the links included are safe.

Brown University and Federal Reserve Bank of Cleveland's Allen Dziwa says people are the weakest link and that customized messaging using regional language for targeted attacks is becoming more prevalent. Allen breaks down the many types of attacks (phishing, spear phishing, smishing, vishing, whaling) with ISACA's Kevin Keh. Tune in now to learn how to be vigilant when facing potential attacks from scammers.

To read Allen’s full article, please visit: www.isaca.org/how-social-engineering-bypasses-technical-controls

To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts

...more
View all episodesView all episodes
Download on the App Store

ISACA PodcastBy ISACA Podcast

  • 4.4
  • 4.4
  • 4.4
  • 4.4
  • 4.4

4.4

33 ratings


More shows like ISACA Podcast

View all
WSJ Tech News Briefing by The Wall Street Journal

WSJ Tech News Briefing

1,632 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

1,962 Listeners

Risky Business by Patrick Gray

Risky Business

363 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

633 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,006 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

313 Listeners

WSJ Minute Briefing by The Wall Street Journal

WSJ Minute Briefing

654 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

141 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

187 Listeners

Hacking Humans by N2K Networks

Hacking Humans

313 Listeners

Schwab Market Update Audio by Charles Schwab

Schwab Market Update Audio

316 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

72 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

120 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

33 Listeners

HBR On Leadership by Harvard Business Review

HBR On Leadership

140 Listeners