How to Hack an Enterprise

How to Hack an Enterprise

Update: 2024-09-171
Share

Description

Summary:

In this episode, Timothy De Block and Jonathan Singer dive into the challenges of modern enterprise security. The conversation covers how organizations—using McDonald's as an example—face threats from both digital and physical vectors. They explore how hackers might exploit everything from public Wi-Fi to social engineering tactics and touch on the evolving role of security leaders in dealing with both controllable and uncontrollable risks.

Key Topics:

  • Digital & Physical Attack Vectors: Discussion on hacking tactics such as public Wi-Fi, kiosk vulnerabilities, API exploitation, and social engineering.

  • Security Beyond the Firewall: Why enterprise security involves more than just digital defense—physical security, insider threats, and brand manipulation also pose risks.

  • The Growing Complexity of Security: How new technologies, like IoT devices and AI, are adding layers of complexity to enterprise security.

  • Insider Threats & Social Engineering: The impact of internal threats, from disgruntled employees to social engineering attacks, on large organizations.

Rapid-Fire Hacking Vectors:

  1. Public Wi-Fi

  2. Self-service kiosks

  3. Badge cloning

  4. Typo-squatting for domains

  5. Supply chain dependencies

  6. Insider threats

Contact Information:

Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.

Check out our services page and reach out if you see any services that fit your needs.

Social Media Links:

[RSS Feed] [iTunes] [LinkedIn]






























































<form method="POST" novalidate data-form-id="66d89aafc488cb069ac8d675" autocomplete="on" onsubmit="return (function (form) {
Y.use('squarespace-form-submit', 'node', function usingFormSubmit(Y) {
(new Y.Squarespace.FormSubmit(form)).submit({
formId: '66d89aafc488cb069ac8d675',
collectionId: '55c01592e4b0b281efaaeac9',
objectName: 'item-66d89aafc488cb069ac8d677'
});
});
return false;
})(this);" class="newsletter-form">

Subscribe


Sign up with your email address to receive news and updates.









<label for="email-yui_3_17_2_1_1704234756218_68248-field" class="newsletter-form-field-label title">Email Address</label>
<input autocomplete="email" spellcheck="false" name="email" id="email-yui_3_17_2_1_1704234756218_68248-field" placeholder="Email Address" type="email" class="newsletter-form-field-element field-element" x-autocompletetype="email" />







<button
class="
newsletter-form-button
sqs-system-button
sqs-editable-button-layout
sqs-editable-button-style
sqs-editable-button-shape
sqs-button-element--primary
"
type="submit"
value="Sign Up"
>

Sign Up

</button>







We respect your privacy.


Thank you!

</form>





Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

How to Hack an Enterprise

How to Hack an Enterprise

With Jon Singer