Logo
    Search

    Phishing Attacks and Marketing Minds: How Hackers Use Unexpected Skills to Break Their Targets

    en-usSeptember 26, 2022

    About this Episode

    In this episode, Chris tries to convince Ashley that marketers naturally make excellent hackers, based on modern phishing attacks and techniques… And Ashley confirms his guess by revealing the lengths to which marketers will go to “spoof” natural conversation and drive their target audience to take action.

    Referenced materials:

    The DarkNet Diaries Podcast, Episode 69: Human Hacker - https://darknetdiaries.com/transcript/69/

    Ashley’s “Social Engineering” booklist - https://www.amazon.com/hz/wishlist/ls/1INOW5WGDDUO5?ref_=wl_share

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

    Recent Episodes from Security Insights - Cybersecurity for Real-World Workplaces

    Chief Scapegoat Officer: How to Keep "Fighting the Good Fight" for Ethical Security Standards

    Chief Scapegoat Officer: How to Keep "Fighting the Good Fight" for Ethical Security Standards

    What does CSO stand for at your organization?

    Is it short for Chief Security Officer... or Chief Scapegoat Officer?

    In this episode, Ivanti CSO Daniel Spicer talks about how he never thought he'd be a CSO, and the unique pressures that security executives face from their own internal leadership teams and external regulations or (worse) insurance companies.

    Listen in as Daniel and Ashley dig into:

    • What counts as a "breach" -- legally and ethically -- and the conflicting pressures to either report or not.
    • How hackers try to bluff their way into a breach...
    • ... and how "breach coach" insurance lawyers may or may not try to pressure teams out of reporting incidents they should.
    • Where to find the best internal allies to help you stand up to undue pressures and maintain your ethical high grounds.
    • The #1 thing security leaders should do during their interview process to make sure they're signing on with the right organization
    • How -- if you do get fired due to a breach -- it's not the end of your career as a security professional.

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

    Security and Employee Investigations: Breaking Down the Big Brother Security Myth

    Security and Employee Investigations: Breaking Down the Big Brother Security Myth

    Daniel Spicer is back! Following up on last episode's discussion on the security risks of overemployment, Ivanti's Chief Security Officer returns to clear up the age-old myth of security tools being abused for employee investigations. Join Daniel, Chris and Ashley as they discuss:

    • What is (and most definitely is not) allowed in an employee investigation -- especially if the Security Team is requested to assist
    • User and management's misconceptions about security data, and how it's less "Big Brother," and more "Death by Data" 
    • The invaluable technique of using HR and Legal both to cover your asks and avoid abuse of security tools during investigations
    • How you're more likely to investigate an employee due to a media outlet's DMCA request than overemployment
    • What a manager's "tipping point" is to request a more robust employee investigation, and what would trigger Security to get involved

    Join us for another episode in which empathetic management and a sympathetic legal department might be the best security tools you'll ever deploy when it comes to cracking down on bad employee behavior -- well, that, and a solid VPN / MDM combo.

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

    Overemployment Security Concerns: A Risk Versus Remediation Case Study

    Overemployment Security Concerns: A Risk Versus Remediation Case Study

    Chris and Ashley use the current overemployment media trend as an example case study on evaluating security risks versus potential organizational impact. 

    They cover: 

    • How overemployment existed before remote work
    • Weighing the various security implications of overemployment — including shadow IT and insider threats
    • How far an organization should go to remediate security risks due to unknown overemployed employees... and the cultural trade offs organizations may be required to make.

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

    Vulnerability Patch Prioritization Problems: Cybersecurity Research Results (Part Two)

    Vulnerability Patch Prioritization Problems: Cybersecurity Research Results (Part Two)

    Chris (finally!) adds his insights to the 2023 Press Reset cybersecurity research report, especially how its findings impact vulnerability and patch prioritization processes — do you shoot for mission critical systems, active exploits, or something else first? — and why asset visibility lies at the core of every security framework on the planet.

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

    Generative AI for Security Teams and Products with JR Robinson from Writer

    Generative AI for Security Teams and Products with JR Robinson from Writer

    JR Robinson, Head of Platform at generative AI startup Writer, joins VP of Endpoint Security Product Management Chris Goettl and Ashley Stryker to discuss current generative AI use cases for security teams that go beyond just chat bots.

    (Please. For everyone’s sanity… go beyond chat bots.)

    They’ll also preview a deeper webinar discussion with Chief Security Officer Daniel Spicer on the risks and rewards generative AI offers security teams at every organization, airing on April 26save your spot and bring your questions to "Generative AI for Infosec and Hackers: What Security Teams Need to Know!"

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

    Death, Taxes and Phishing: Cybersecurity Research Results (Part One)

    Death, Taxes and Phishing: Cybersecurity Research Results (Part One)

    Daniel and Ashley review the latest research report from Ivanti -- Press Reset: A 2023 Cybersecurity Status Report -- including prioritizing phishing and DDoS attacks, security ROI challenges, and why organizations should never increase their cybersecurity budget by sacrificing their IT allocations.

    Download the full report at Ivanti.com/CybersecurityReport  

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

    Vendor Cyber Risk Management 101: Balancing Supply-Chain Risk with Remote Work DEX and IoT Litter Boxes

    Vendor Cyber Risk Management 101: Balancing Supply-Chain Risk with Remote Work DEX and IoT Litter Boxes

    It's vendor risk versus reward!

    Chris and Amanda educate Ashley on the core considerations, processes and requirements for robust vendor risk management programs... including when to be afraid of your IoT devices, especially those pesky Roomba vacuums and oh-so-convenient self-cleaning litter boxes.

    Remember to address these three components, no matter if your vendor is a major IT software provider or just your friendly neighborhood paper salesman:

    1. What data are you granting your vendor?
    2. What can they access?
    3. Due diligence and 200+ item questionnaires are everything.

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

    IT vs Security: When Hackers Patch for Profit

    IT vs Security: When Hackers Patch for Profit

    IT Director Tony Miller goes toe-to-toe with Chief Security Officer Daniel Spicer to justify – or condemn! – IT and cybersecurity posts found on Reddit, featuring a legendary story about hackers that patched endpoints faster than the company itself. #PatchHacks

    Plus, Ashley frets about the impact of a new security policy on her personal devices, creating an impromptu case study on the importance of explaining (or just reading) new security policies.

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

    Prisoner Priorities: Why Disclosure Policies Can’t Please Everyone

    Prisoner Priorities: Why Disclosure Policies Can’t Please Everyone

    Daniel, Chris, Amanda and Ashley revisit the coordinated disclosure conversation from Episode 25 and apply the prisoner’s dilemma thought experiment to create a (more?) perfect vendor disclosure policy.

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)

    Women in Cybersecurity: Personal Experiences and Progress

    Women in Cybersecurity: Personal Experiences and Progress

    Amanda and Ashley talk about their experiences as women in the cybersecurity and technology industries. (Spoiler alert: it’s on the up-and-up!)

    • Next episode going live June 29, 2023!
      • New episodes publish around the second and fourth Thursdays each month.
    • For all show notes, resources and references, head to Ivanti.com/SecurityInsights
    • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)