ISACA Digital Videos
Experience ISACA through our lens. Explore our educational content, ISACA news and events, in-depth interviews with experts in cybersecurity, IT audit, governance and so much more, plus a link to ISACA’s audio podcast—all right here. Press play and you are on your way.
How Social Engineering Bypasses Technical Controls
481 Views • 1 year ago
We are subjected to phishing scams almost every day, and even the most seasoned professional must examine an email to ensure the links included are safe. Brown University and Federal Reserve Bank of Cleveland's Allen Dziwa says people are the weakest link and that customized messaging using regional language for targeted attacks are becoming more prevalent. Allen breaks down the many types of attacks (phishing, spear phishing, smishing, vishing, whaling) with ISACA's Kevin Keh. Tune into this ISACA Podcast to learn how to be vigilant when facing potential attacks from scammers. To read Allen’s full article, please visit: www.isaca.org/how-social-engineering-bypasses-technical-controls To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts
View MoreFilters
Video Type
Domain
Credentials
Subjects
Language
16 of 602 Results