When Social Engineering Bypasses Our Cyber Tools

Published: Dec. 16, 2021, 11 a.m.

All links and images for this episode can be found on CISO Series

Check out\xa0this post\xa0for the discussion that is the basis of our conversation on this week\u2019s episode co-hosted by me,\xa0David Spark\xa0(@dspark), the producer of\xa0CISO Series, and\xa0Geoff Belknap\xa0(@geoffbelknap), CISO,\xa0LinkedIn.\xa0Our sponsored guest is\xa0Josh Yavor\xa0(@schwascore), CISO,\xa0Tessian.

Thanks to our podcast sponsor, Tessian

95% of breaches are caused by human error.
But you can prevent them.\xa0Learn how Tessian\xa0can stop \u201cOH SH*T!\u201d moments before they happen, why Tessian has been recognized by analysts like Gartner and Forrester, and which world-renowned companies trust the platform to protect their data.

In this episode:

  • What do you do for the attacks your rule sets can't catch?
  • Would it help if we eliminated email systems as the standard b2b toolset for communications?
  • Are there any better ways to handle spearphishing?
  • Are you ready to add BCC - Business communications compromise to your threat list?