Artwork

Content provided by PwC Luxembourg. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by PwC Luxembourg or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The One on Social Engineering

41:21
 
Share
 

Manage episode 322315190 series 3324905
Content provided by PwC Luxembourg. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by PwC Luxembourg or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Have you ever got a phone call from someone posing as a representative from a legitimate entity asking you for your personal information, or worse, telling you that your bank account has been compromised and they need your credentials? This is just one example of Social Engineering tactics, but there is more.

In this episode of TechTalk, we speak with Christina Lekati, Social Engineering Trainer & Consultant at Cyber Risk, who tells us all about Social Engineering, including what are the most commonly used tactics and how we can spot them before it's too late.

  continue reading

117 episodes

Artwork
iconShare
 
Manage episode 322315190 series 3324905
Content provided by PwC Luxembourg. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by PwC Luxembourg or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Have you ever got a phone call from someone posing as a representative from a legitimate entity asking you for your personal information, or worse, telling you that your bank account has been compromised and they need your credentials? This is just one example of Social Engineering tactics, but there is more.

In this episode of TechTalk, we speak with Christina Lekati, Social Engineering Trainer & Consultant at Cyber Risk, who tells us all about Social Engineering, including what are the most commonly used tactics and how we can spot them before it's too late.

  continue reading

117 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide