Live from BSides Twin Cities 2024
Phillip Wylie ShowAugust 29, 2024x
36
00:35:2932.5 MB

Live from BSides Twin Cities 2024

Summary


In this live episode of The Phillip Wylie Show, cybersecurity experts Ira Winkler and Ryan Cloutier discuss their hacker origin stories and the evolution of hacking over the years. They emphasize the importance of basic cyber hygiene and the need to systematize the fundamentals of cybersecurity. They also discuss the risks and benefits of AI, highlighting the potential for manipulation and the need for safe adoption. The conversation touches on the role of policies and procedures, the alignment of cybersecurity with business objectives, and the impact of technology on human experiences.


Takeaways


  • Basic cyber hygiene is essential in preventing hacking and improving cybersecurity.
  • AI is ready for prime time, but organizations need to ensure safe adoption and consider the potential risks and impacts.
  • Systematizing the fundamentals of cybersecurity and aligning it with business objectives is crucial for effective cybersecurity programs.
  • Technology should be designed with people in mind, considering their experiences and needs.
  • Understanding the risks and benefits of new technologies, such as AI, is important for making informed decisions and designing resilient systems.


Quotes


  • "All I did my whole career is primarily take advantage of bad awareness, bad administration, bad configurations."
  • "We're gonna have an overabundance of tooling and an underabundance of looking at the business processes themselves."
  • "Your users are a company resource that are gonna be fallible, just like any other resource you have."


Resources

https://www.linkedin.com/in/irawinkler/

https://www.linkedin.com/in/ryan-cloutier/

https://cruisecon.com/


Chapters

00:00 Introduction and Hacker Origin Stories

05:39 The Evolution of Hacking and Basic Cyber Hygiene

08:03 Threat Landscape and Shifting Attack Profiles

10:18 The Impact of Social Media and Bring Your Own Device

18:05 Systematizing the Basics and Enforcing Policies

23:35 Aligning Cybersecurity with the Business and Employee Experience

26:01 AI: Readiness and Safe Adoption

32:13 Understanding AI as Math and the Potential Risks

34:48 Personal Intimate Information and the Weaponization of AI