PLAY PODCASTS
When Social Engineering Bypasses Our Cyber Tools

When Social Engineering Bypasses Our Cyber Tools

Defense in Depth · David Spark

December 16, 202128m 51s

Audio is streamed directly from the publisher (traffic.libsyn.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

All links and images for this episode can be found on CISO Series

Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Our sponsored guest is Josh Yavor (@schwascore), CISO, Tessian.

Thanks to our podcast sponsor, Tessian

95% of breaches are caused by human error. But you can prevent them. Learn how Tessian can stop "OH SH*T!" moments before they happen, why Tessian has been recognized by analysts like Gartner and Forrester, and which world-renowned companies trust the platform to protect their data.

In this episode:

  • What do you do for the attacks your rule sets can't catch?
  • Would it help if we eliminated email systems as the standard b2b toolset for communications?
  • Are there any better ways to handle spearphishing?
  • Are you ready to add BCC - Business communications compromise to your threat list?