
Sign up to save your podcasts
Or


All links and images for this episode can be found on CISO Series.
We expect our users to be perfect security responders even when the adversaries are doing everything in their power to trick them. These scams are designed to make humans respond to them. Why aren't we building our security programs to account for this exact behavior that is simply not going to go away?
Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Our guest is Ken Athanasiou, CISO, VF Corporation.
Thanks to our podcast sponsor, Code42
In this episode:
By David Spark, Steve Zalewski, Geoff Belknap4.8
7373 ratings
All links and images for this episode can be found on CISO Series.
We expect our users to be perfect security responders even when the adversaries are doing everything in their power to trick them. These scams are designed to make humans respond to them. Why aren't we building our security programs to account for this exact behavior that is simply not going to go away?
Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Our guest is Ken Athanasiou, CISO, VF Corporation.
Thanks to our podcast sponsor, Code42
In this episode:

186 Listeners

2,007 Listeners

372 Listeners

371 Listeners

651 Listeners

1,020 Listeners

319 Listeners

416 Listeners

8,064 Listeners

179 Listeners

315 Listeners

189 Listeners

139 Listeners

44 Listeners

168 Listeners