22 min listen
Revisiting Social Engineering: The Human Threat to Cybersecurity
Revisiting Social Engineering: The Human Threat to Cybersecurity
ratings:
Length:
30 minutes
Released:
Jun 15, 2020
Format:
Podcast episode
Description
This week, we revisit our episode where Ann Johnson, Corporate Vice President for Cybersecurity Solutions at Microsoft, talks with infosec expert, white-hat hacker, and CEO of SocialProof Security Rachel Tobac about social engineering, the non-technical strategies cyberattackers use to manipulate targets through human interaction. Ann and Rachel delve into the neuroscience behind social engineering, the entry points social media offers, how fear and urgency factor in, and the similarities between improv and vishing. Listen to learn how savvy attackers exploit everyday human actions and reactions to gain access to funds, data or information – and how “real-world two-factor” and being “politely paranoid” can protect your organization, employees, and customers.
Resources:
Ann Johnson’s RSA 2020 keynote (“Why people are still your best cyber defense”)
SocialProof Security
Rachel Tobac hacks a voting machine
View Rachel Tobac on LinkedIn
View Ann Johnson on LinkedIn
Related:
Listen to: Security Unlocked
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of The CyberWire Network.
Resources:
Ann Johnson’s RSA 2020 keynote (“Why people are still your best cyber defense”)
SocialProof Security
Rachel Tobac hacks a voting machine
View Rachel Tobac on LinkedIn
View Ann Johnson on LinkedIn
Related:
Listen to: Security Unlocked
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of The CyberWire Network.
Released:
Jun 15, 2020
Format:
Podcast episode
Titles in the series (95)
Peak, Plateau or Plummet? Cyber Trends That Are Here To Stay… and Fading Away: Kevin Beaumont, Thought Leader in the Cybersecurity Industry on Incident Detection and Response by Afternoon Cyber Tea with Ann Johnson