Transcript
A (0:00)
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them@meter.com CST.
B (0:23)
I have.
A (0:24)
A special show today. I want to look at what we can learn from the world of espionage and intelligence in terms of social engine. Now, if you watched last week's show or listened to it, you have to see that we did a whole background on how espionage and cyber security are linked and how nation states act. So it was a great show. And if you missed it, I urge you to go back and dial it up because it was really pretty good, if I do say so myself. But the I want. And second of all, I've got to tell you, I've got to say I've read a lot of studies and papers and I think that, that they all come to the same conclusion, that 90% of statistics given in tech shows are made up. No, it's not that bad. But it's not entirely true. But the reality is exact numbers, I think people would agree, are hard to come by. But there's been a growing realization that, and you could find people who say it's 40%, it's 90%, but that a major part of cyber attacks are either led by what we call social engineering or it forms a significant part of the attack. We like to think in terms of technology, that there's some real buzz kid and we see them on TV and they're type, type, type, type, type, and they get through all your defenses. In reality, that's a minor part of it. Most of it is done by how people who are very smart fool people who are also very smart. And that can be anything from phishing or vishing or if with the big attacks we've heard about, where clever people trick experienced help desk people or users into giving them their passwords, even when they're administrators of a system. It might seem incredible, but it is. And the idea came up and we were talking about after our last show, hey, let's talk about this in terms of intelligence, because there's a parallel there in terms of I won't do the whole show in my introduction, but there's a parallel in terms of how intelligence works and how social engineering works. And I can't think of two better guys than Neil Bisson, who spent a lot of his career in intelligence and he was with csis, the Canadian security intelligence services. Recently retired but can't stop working. So he's got his own podcast now. Welcome, Neil.
C (2:38)
Thank you. Yeah, you're right. Can't stop doing the stuff I do when it comes to intelligence. It's just in my blood now.
A (2:43)
There you go. And David Shipley. Now, David might be best known in Canada and the U.S. as the Monday morning newscaster and panelist, but he actually has a real day job and that's leading boaster on security. And in that role he's really, I think, developed, become one of the, I think one of North America's experts in fishing and social engineering and has done some of the best data collection in this area and has access all anonymized. It's not, we want to make sure we always say there's legit data, but been able to assemble probably one of the biggest data sets in terms of this area and understanding that. Welcome back, David.
