Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:14)
Hello, everyone and welcome to a very special edition of N2K, CyberWire's Hacking Humans podcast, where each week we look behind the social engineering scams, phishing schemes and criminal exploits that are making headlines and taking a heavy toll on organizations around the world. Dave I'm Dave Buettner and joining me is Maria Vermazes.
A (0:32)
Maria hi Dave. Good to see you in person.
B (0:34)
This week we are coming to you from Zero Trust World in Orlando, Florida, where we are joining security leaders and practitioners from across the industry. Our coverage here is made possible by our sponsors at ThreatLocker, who've brought the community together to talk all things Zero Trust resilience and the future of cybersecurity. We are grateful to threatlocker for helping make it all possible. Joe Kerrigan was unable to join us this week here in sunny Florida, but we have a very special guest today, host of the Bowtie Security Guy After Dark podcast.
C (1:05)
There you go. You got it.
B (1:08)
Rob is one of the featured speakers this week here at Zero Trust World and he's going to be sharing highlights from his presentation on phishing. We've got some good stories to share this week. I tell you what, let's just jump in here. We don't have any follow up this week, so we're. Rob, welcome. Before we dig into you sharing some of your insights on fishing, can you just tell us a little bit about yourself? What's your story of where you started and what brought you to where you are today?
C (1:35)
I started as a poor kid who just pulled computers out of trash and figured out how to work on them and kind of repair them. I was an early hacker when there weren't any laws, right? And then Mitnick got arrested and I got real scared because I was like, oh, you can do real jail time for this now, right? It became much more serious from there. I've always been just a lifelong tinkerer, playing and building stuff. I build replica movie props in my free time. I worked for Disney for 20 years. I helped build out a lot of their programs, their social engineering program as well as their security awareness stuff. I worked with and then a lot of securing the technology like the MagicBand. I worked with those guys. Oh, wow. We got to do a lot of cool stuff for my time there. Now I'm just a boring executive at a Fortune 500.
B (2:28)
Well, it's not that boring.
![Defending against unlimited penalty shots. [Hacking Humans Live!] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fpod.wave.co%2Flogo.png&w=1920&q=75)