I'm a seasoned Software Engineer in Test with a passion for exploring the realms of software development. Currently, I'm holding the position of Lead Software Test Automation Engineer at EPAM Switzerland.
With over a decade of diverse experience under my belt, I've journeyed from the aviation industry to the “thrilling” world of finance 😉 My expertise spans various domains, including Performance, DevOps, and Security, keeping me on my toes and continuously learning.
Do you know what sets me apart? I'm the guy who fearlessly asks seemingly stupid questions because I believe curiosity breeds innovation. Learning is my lifeline, and I'm always on the lookout for discoveries.
You'll probably find me brainstorming improvements or whipping up some mouthwatering dishes in my kitchen when I'm not refining my tests. And hey, let's not forget my adventurous side! I'm a sports enthusiast, embracing skiing, running, cycling, hiking, and climbing to keep that adrenaline pumping - enjoying what Switzerland has to offer.
We put so much effort into securing our systems. We enforce multi-factor authentication. We deploy WAFs. We mandate software updates. We constantly scan our code. We encrypt our communication and sensitive data. Researchers ensure that ciphers remain strong. Yet, we’re still getting hit. Facebook lost $99 million, Ubiquiti $39.1 million, Google $23 million, Toyota $37 million, the Government of Puerto Rico $2.6 million, and Belgian Bank Crelan $75.8 million.
What is the common denominator in all these attacks? Social engineering. It is one of the most subtle yet potent set of techniques, often used by individuals or groups to exploit human weaknesses and gain access to systems and sensitive data. No organization or group is immune to this form of attack.
Working in an IT company places us in the crossfire. On one hand, we have access to not only business data but also information that could be exploited to attack our organization. On the other hand, IT professionals themselves are well-positioned, making themselves potential targets of attacks.
While it’s almost impossible to be fully protected against social engineering, it is vital to understand the possible vectors of attack. Various methods and psychological tricks can be used to compromise our security or that of our organization.
So, let’s buckle up and take a small step toward becoming more secure.
Searching for speaker images...