1. EachPod
EachPod

When Social Engineering Bypasses Our Cyber Tools

Author
David Spark
Published
Thu 16 Dec 2021
Episode Link
https://sites.libsyn.com/156524/when-social-engineering-bypasses-our-cyber-tools

All links and images for this episode can be found on CISO Series

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Our sponsored guest is Josh Yavor (@schwascore), CISO, Tessian.

Thanks to our podcast sponsor, Tessian

95% of breaches are caused by human error. But you can prevent them. Learn how Tessian can stop “OH SH*T!” moments before they happen, why Tessian has been recognized by analysts like Gartner and Forrester, and which world-renowned companies trust the platform to protect their data.

In this episode:

  • What do you do for the attacks your rule sets can't catch?
  • Would it help if we eliminated email systems as the standard b2b toolset for communications?
  • Are there any better ways to handle spearphishing?
  • Are you ready to add BCC - Business communications compromise to your threat list?

Share to: