In this live episode of The Phillip Wylie Show, cybersecurity experts Ira Winkler and Ryan Cloutier discuss their hacker origin stories and the evolution of hacking over the years. They emphasize the importance of basic cyber hygiene and the need to systematize the fundamentals of cybersecurity. They also discuss the risks and benefits of AI, highlighting the potential for manipulation and the need for safe adoption. The conversation touches on the role of policies and procedures, the alignment of cybersecurity with business objectives, and the impact of technology on human experiences.
Takeaways
Basic cyber hygiene is essential in preventing hacking and improving cybersecurity.AI is ready for prime time, but organizations need to ensure safe adoption and consider the potential risks and impacts.Systematizing the fundamentals of cybersecurity and aligning it with business objectives is crucial for effective cybersecurity programs.Technology should be designed with people in mind, considering their experiences and needs.Understanding the risks and benefits of new technologies, such as AI, is important for making informed decisions and designing resilient systems.
Quotes
"All I did my whole career is primarily take advantage of bad awareness, bad administration, bad configurations.""We're gonna have an overabundance of tooling and an underabundance of looking at the business processes themselves.""Your users are a company resource that are gonna be fallible, just like any other resource you have."
Resources
https://www.linkedin.com/in/irawinkler/
https://www.linkedin.com/in/ryan-cloutier/
https://cruisecon.com/
Chapters
00:00 Introduction and Hacker Origin Stories
05:39 The Evolution of Hacking and Basic Cyber Hygiene
08:03 Threat Landscape and Shifting Attack Profiles
10:18 The Impact of Social Media and Bring Your Own Device
18:05 Systematizing the Basics and Enforcing Policies
23:35 Aligning Cybersecurity with the Business and Employee Experience
26:01 AI: Readiness and Safe Adoption
32:13 Understanding AI as Math and the Potential Risks
34:48 Personal Intimate Information and the Weaponization of AI