
Sign up to save your podcasts
Or
In this episode, Timothy De Block and Jonathan Singer dive into the challenges of modern enterprise security. The conversation covers how organizations—using McDonald's as an example—face threats from both digital and physical vectors. They explore how hackers might exploit everything from public Wi-Fi to social engineering tactics and touch on the evolving role of security leaders in dealing with both controllable and uncontrollable risks.
Key Topics:Digital & Physical Attack Vectors: Discussion on hacking tactics such as public Wi-Fi, kiosk vulnerabilities, API exploitation, and social engineering.
Security Beyond the Firewall: Why enterprise security involves more than just digital defense—physical security, insider threats, and brand manipulation also pose risks.
The Growing Complexity of Security: How new technologies, like IoT devices and AI, are adding layers of complexity to enterprise security.
Insider Threats & Social Engineering: The impact of internal threats, from disgruntled employees to social engineering attacks, on large organizations.
Rapid-Fire Hacking Vectors:
Public Wi-Fi
Self-service kiosks
Badge cloning
Typo-squatting for domains
Supply chain dependencies
Insider threats
Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Social Media Links:[RSS Feed] [iTunes] [LinkedIn]
Sign up with your email address to receive news and updates.
We respect your privacy.
4.7
4343 ratings
In this episode, Timothy De Block and Jonathan Singer dive into the challenges of modern enterprise security. The conversation covers how organizations—using McDonald's as an example—face threats from both digital and physical vectors. They explore how hackers might exploit everything from public Wi-Fi to social engineering tactics and touch on the evolving role of security leaders in dealing with both controllable and uncontrollable risks.
Key Topics:Digital & Physical Attack Vectors: Discussion on hacking tactics such as public Wi-Fi, kiosk vulnerabilities, API exploitation, and social engineering.
Security Beyond the Firewall: Why enterprise security involves more than just digital defense—physical security, insider threats, and brand manipulation also pose risks.
The Growing Complexity of Security: How new technologies, like IoT devices and AI, are adding layers of complexity to enterprise security.
Insider Threats & Social Engineering: The impact of internal threats, from disgruntled employees to social engineering attacks, on large organizations.
Rapid-Fire Hacking Vectors:
Public Wi-Fi
Self-service kiosks
Badge cloning
Typo-squatting for domains
Supply chain dependencies
Insider threats
Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Social Media Links:[RSS Feed] [iTunes] [LinkedIn]
Sign up with your email address to receive news and updates.
We respect your privacy.
1,971 Listeners
360 Listeners
627 Listeners
14,115 Listeners
96 Listeners
367 Listeners
1,006 Listeners
7,864 Listeners
9,553 Listeners
168 Listeners
187 Listeners
314 Listeners
74 Listeners
479 Listeners
127 Listeners