Why Most Cyber Security Training Fails and What We Can Do About it

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024
  • To date, the only pro-active, user-focused solution against spear phishing has been cyber security awareness training. However, multiple lines of evidence-from continuing news stories of bigger and bolder breaches to objective academic assessments of training effects-point to its limited effectiveness.
    By Arun Vishwanath
    Read More: www.blackhat.c...

Комментарии • 34

  • @dianechapman5125
    @dianechapman5125 6 лет назад +2

    He's making a lot of sense with regard to the end user clicking on everything.

  • @freesoftwaretalk
    @freesoftwaretalk 6 лет назад +6

    Can anyone point me to the full study - the one where the 40 current questions and the parameters are described? I'm really interested in looking into the content a bit deeper...

  • @SlayaOneTwelve
    @SlayaOneTwelve 6 лет назад +6

    He keeps referring to falling for the phishing attack being clicking on a link. What am I missing? Shouldn't the actually attack occurr AFTER clicking a link by submitting information, after falsely assessing the linked resource is safe?
    Seems like they should be measuring the delivery of a payload instead of clicking a link.

    • @DeepPastry
      @DeepPastry 6 лет назад +2

      You can set up malicious websites, so just opening the page (clicking the link) causes harmful code to run. What should happen, if you have passable real time virus/malware protection, is a page open but not loading and an on-screen warning that website is malicious and you shouldn't load it.

  • @recklessroges
    @recklessroges 6 лет назад +4

    Quick google and I still can't find his 40 questions, (on his person site or that of either university that he mentioned.)

  • @dianechapman5125
    @dianechapman5125 6 лет назад +2

    Very good questions from the audience.

  • @nayerelson1018
    @nayerelson1018 6 лет назад +4

    Starting my own security firm shortly.

    • @duksis7
      @duksis7 2 года назад

      How is that going, hmm?

  • @disk0__
    @disk0__ 6 лет назад +3

    Is the 22:13 Like/Dislike ratio that low because people have a problem w/ something in the talk fundamentally or some random thing he said (or somewhere in between)

    • @SamTheEnglishTeacher
      @SamTheEnglishTeacher 6 лет назад +10

      Because he isn't getting the facts right

    • @DeepPastry
      @DeepPastry 6 лет назад

      Yea it's dumb. His expertise is on the HR part of these issues. Having a layman's level of understanding (ie misunderstands) of the technical aspects means he gets things wrong... A few too many idiots than decide not to bother, even though he starts by pointing out he studies the human reactions and not the technical mumbo-jumbo.

  • @greywolf271
    @greywolf271 6 лет назад +1

    I'd say he worked for Cambridge Analytica

    • @ther6989
      @ther6989 6 лет назад

      Why do you say that?

  • @cleofaspintolimalima1627
    @cleofaspintolimalima1627 Год назад

    Hey there

  • @renzocoppola4664
    @renzocoppola4664 6 лет назад +10

    First, and 5 minutes in. Did really North Korea hack Sony? I think we don't have a definitive answer.

    • @Dave__AC
      @Dave__AC 6 лет назад +2

      We also definitively know the DNC wasn't hacked. Seems like this guy is a bit gullible but the talk itself was pretty good.

    • @disk0__
      @disk0__ 6 лет назад

      +deetr I came here to make the same comment lol, playing devils advocate tho I figured he was referring to some of the other more concrete cases of the DNC getting comprised before the big one that I'm assuming you're referring to (of which people rightly question the timeline among other things )

    • @maverickstclare3756
      @maverickstclare3756 4 года назад

      No-one credible in the security world thinks NK did it. Most say "Inside Job". Just the the DNC emails. Defcon / Cloudflare guy Marc Rogers. The locale was Korean, which is illegal to speak on NK ! Obama wanted it to be NK, so NK it was.

    • @maverickstclare3756
      @maverickstclare3756 4 года назад

      @@Dave__AC Podesta did though. And he even asked his IT team "Is this a phishing email" and they said "it looks legitimate" but said later they meant to type "illegitimate".
      Colin Powell got Spearphished too. another guy illegally storing govt. email in private.

  • @zerge69
    @zerge69 6 лет назад +2

    Fire people who fail 3 phishing tests. See what happens.

    • @Imtotallydiggingthis
      @Imtotallydiggingthis 6 лет назад +2

      Phishing attempts against the HR person handling the lay-offs for epic payback?

  • @ciscomalo5731
    @ciscomalo5731 6 лет назад +2

    could someone please help me with the latest CEH exam dumps?

  • @Nesetalis
    @Nesetalis 6 лет назад +1

    Very good talk, thank you!

  • @OnlySubhumansWorkAtYouTube
    @OnlySubhumansWorkAtYouTube 5 лет назад

    Why? Because they are stupid...
    Thanks!

  • @geedipro1
    @geedipro1 6 лет назад +1

    I want to be ahcker
    Insha allah

  • @4cricket24
    @4cricket24 4 года назад +1

    I thought its Trevor Noah giving training :)