PinnedHoratiu Petrescu, CISSP | GSECMike visits the Internet Doctor — A Security Awareness StoryContinuing Mike and Joe’s Security Awareness sagaMar 6, 20221Mar 6, 20221
PinnedHoratiu Petrescu, CISSP | GSECIt’s a process problemThroughout my years spent in the SOC and dealing with different customers (in terms of size and industry), and now working as a consultant…Mar 18, 2022Mar 18, 2022
PinnedHoratiu Petrescu, CISSP | GSECThe Art of Persuasion: How Behavioural Science is Revolutionising CybersecurityThe future of managing human Cyber Security risk is here, and it’s all about influencing behaviour. Learn how to use the science behind…Jan 16, 2023Jan 16, 2023
PinnedHoratiu Petrescu, CISSP | GSECThe AI Revolution: Avoiding the Risks and Embracing the BenefitsAI has the power to transform our world in ways we can’t yet imagine. As we stand on the brink of a new age of Artificial Intelligence…Jan 26, 2023Jan 26, 2023
PinnedHoratiu Petrescu, CISSP | GSECThe Future of Cybersecurity: Human-Centred DesignWhat if instead of trying to change human behaviour, we designed technology to work securely for human interaction?Mar 24, 2023Mar 24, 2023
Horatiu Petrescu, CISSP | GSECUnderstanding Happens When Knowledge Is Combined With ExperienceGiving up the expert status is the counterintuitive path to true mastery and expertise.Feb 26Feb 26
Horatiu Petrescu, CISSP | GSECAI Might Be Intelligent, But Is It Wise?Even if AI reaches the pinnacle of general intelligence, it might never grasp the essence of human wisdom. Jan 27Jan 27
Horatiu Petrescu, CISSP | GSECPerfecting your Phish Simulations — The 85% Sweet Spot for Optimal LearningTargeting low Phishing simulation click rates could actually work against optimal learning objectivesOct 1, 2023Oct 1, 2023
Horatiu Petrescu, CISSP | GSECCut Through the Clutter: The Power of Effective CommunicationIn the era of information overload, effective communication can slice through the noise.Jul 3, 2023Jul 3, 2023
Horatiu Petrescu, CISSP | GSECHow Does Usable Security (Not) End Up in Software Products?A lot of breaches occur not because of human errors, but due to poor software design which doesn’t take into account user context and human…Mar 2, 2023Mar 2, 2023