{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/612f26ffeb5bf70014a48447/61e9b0c65d42500013f36d1f?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Social Engineering","thumbnail_width":200,"thumbnail_height":200,"thumbnail_url":"https://open-images.acast.com/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg?height=200","description":"<p><strong>We talk with Christina Lekati on psychological elements and behavioural science involved to perform cyber attacks by social engineering.</strong></p><p><br></p><p><a href=\"https://www.linkedin.com/in/christina-lekati-social-engineering/\" rel=\"noopener noreferrer\" target=\"_blank\">Christina Lekati</a> is a psychologist and a social engineer. She specializes in the mechanisms of behavior, motivation, decision making, manipulation and deceit. She is an expert in human dynamics and passionate about social engineering.</p><p><br></p><p>Hosts of this Show: <a href=\"https://www.linkedin.com/in/tylercohen78/\" rel=\"noopener noreferrer\" target=\"_blank\">Tyler Cohen Wood</a> &amp; <a href=\"https://www.linkedin.com/in/mirko-ross/\" rel=\"noopener noreferrer\" target=\"_blank\">Mirko Ross</a></p><p><br></p><p><strong>Shownotes:</strong></p><p>Christina on: <a href=\"https://www.linkedin.com/in/christina-lekati-social-engineering/\" rel=\"noopener noreferrer\" target=\"_blank\">LinkedIn</a> and <a href=\"https://twitter.com/ChristinaLekati\" rel=\"noopener noreferrer\" target=\"_blank\">Twitter</a></p><p>Professional profile and CV of Christina at CyberRisk: <a href=\"https://www.social-engineering-training.ch/\" rel=\"noopener noreferrer\" target=\"_blank\">https://www.social-engineering-training.ch/</a></p><p>Interview in TAZ Newspaper (Germany): <a href=\"https://taz.de/Sicherheitsexpertin-ueber-Social-Engineering/!5711020/\" rel=\"noopener noreferrer\" target=\"_blank\">https://taz.de/Sicherheitsexpertin-ueber-Social-Engineering/!5711020/</a></p><p>Presentation at ElBsides Hamburg: \"When Your Biggest Threat is on Your Payroll – Drivers and Enablers of Insider Threat Activities\": <a href=\"https://www.youtube.com/watch?v=5ovY0YlLZNU&amp;t=2208s\" rel=\"noopener noreferrer\" target=\"_blank\">https://www.youtube.com/watch?v=5ovY0YlLZNU&amp;t=2208s</a></p><p>Presentation at Hacktivity: \"Social Engineering Through Social Media\": <a href=\"https://www.youtube.com/watch?v=D8Z69AsSFn0&amp;t=577s\" rel=\"noopener noreferrer\" target=\"_blank\">https://www.youtube.com/watch?v=D8Z69AsSFn0&amp;t=577s</a></p>","author_name":"Mirko Ross"}