back to top
Thursday, February 12, 2026
YOU ARE AT:IT Factor 52: Hacking The Human

IT Factor 52: Hacking The Human

[bc_video video_id=”6302450337001″ account_id=”6090301008001″ player_id=”oHD7hwUmF” embed=”in-page” padding_top=”56%” autoplay=”” min_width=”0px” playsinline=”” picture_in_picture=”” max_width=”640px” mute=”” width=”100%” height=”100%” aspect_ratio=”16:9″ sizing=”responsive” ]

Hoodies, Masks, Laptops

The rumblings of a return have proved to be true. The IT Factor is back, and Frank Padikkala is here to look at the intersection between IT and AV.

In the world of AV and IT, cybersecurity is a constant challenge. IT managers need to be vigilant and constantly wary of potential threats to their networks, be it for their clients’ information or services to continue running. But part of the conversation shouldn’t be on the technical side, but rather the human element. Is the image of a hacker the reclusive shadowed figure, hiding under lines of code or is it something a bit more pedestrian? We talk to Associate Professor of Criminal Justice at Temple University Aunshul Rege about the link between cybersecurity and social engineering, and the tactics that real life hackers use to break systems.

Guests:
 
Notes:
  • AVNation studios production equipment provided by Shure and Vaddio.  
[SubscribeITAVShow]

AVNATION IS SUPPORTED BY

POPULAR

ISE 2026 – The Ohm’s Law of Change in AV

0
ISE 2026 highlights the shift toward self-configuring AV systems, MDEP-powered devices, and IP-based infrastructure—reshaping collaboration technology for IT teams.

AVNATION IS ALSO SUPPORTED BY