PinnedHoratiu Petrescu, CISSP | GSECMike visits the Internet Doctor — A Security Awareness StoryContinuing Mike and Joe’s Security Awareness saga7 min read·Mar 6, 2022--1--1
PinnedHoratiu Petrescu, CISSP | GSECIt’s a process problemThroughout my years spent in the SOC and dealing with different customers (in terms of size and industry), and now working as a consultant…4 min read·Mar 18, 2022----
PinnedHoratiu Petrescu, CISSP | GSECThe Art of Persuasion: How Behavioural Science is Revolutionising CybersecurityThe future of managing human Cyber Security risk is here, and it’s all about influencing behaviour. Learn how to use the science behind…26 min read·Jan 16, 2023----
PinnedHoratiu Petrescu, CISSP | GSECThe AI Revolution: Avoiding the Risks and Embracing the BenefitsAI has the power to transform our world in ways we can’t yet imagine. As we stand on the brink of a new age of Artificial Intelligence…13 min read·Jan 26, 2023----
PinnedHoratiu Petrescu, CISSP | GSECThe Future of Cybersecurity: Human-Centred DesignWhat if instead of trying to change human behaviour, we designed technology to work securely for human interaction?31 min read·Mar 24, 2023----
Horatiu Petrescu, CISSP | GSECUnderstanding Happens When Knowledge Is Combined With ExperienceGiving up the expert status is the counterintuitive path to true mastery and expertise.3 min read·Feb 26, 2024----
Horatiu Petrescu, CISSP | GSECAI Might Be Intelligent, But Is It Wise?Even if AI reaches the pinnacle of general intelligence, it might never grasp the essence of human wisdom. 2 min read·Jan 27, 2024----
Horatiu Petrescu, CISSP | GSECPerfecting your Phish Simulations — The 85% Sweet Spot for Optimal LearningTargeting low Phishing simulation click rates could actually work against optimal learning objectives11 min read·Oct 1, 2023----
Horatiu Petrescu, CISSP | GSECCut Through the Clutter: The Power of Effective CommunicationIn the era of information overload, effective communication can slice through the noise.4 min read·Jul 3, 2023----
Horatiu Petrescu, CISSP | GSECHow Does Usable Security (Not) End Up in Software Products?A lot of breaches occur not because of human errors, but due to poor software design which doesn’t take into account user context and human…8 min read·Mar 2, 2023----