Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Introduction
00:00 • 4min
The Westlake Police Department Scam Calls
03:53 • 5min
How to Spoof a Facebook Credential Arvesting Campaign?
08:40 • 4min
How Many Rederecs Is Too Many?
12:45 • 2min
What's the Best Way to Avoid This?
14:57 • 4min
Pay Pal Scam
19:22 • 2min
I Didn't Order This Number, I Don't Want This Number!
21:23 • 4min
The Data Exposure Report - Three Key Trends
25:02 • 3min
The Importance of Insider Risk
28:28 • 2min
The Great Resignation
30:32 • 2min
Security Training - How to Shape Culture
32:48 • 3min
Cloud Data Security - What Are Your Recommendations for Organizations?
35:46 • 2min
Three Major Recommendations for Security Training
37:30 • 3min
Is Your Security Strategy Getting Involved?
40:43 • 2min
Is Your Intellectual Property Coming Along With the Employee?
42:24 • 5min
Security Is a Balanced Act Between Productivity and Security
47:18 • 3min