Player FM 앱으로 오프라인으로 전환하세요!
#181 - Inside the 2024 Verizon Data Breach Investigations Report
Manage episode 418000152 series 2849492
In this episode of CISO Tradecraft, host G Mark Hardy discusses the findings of the 2024 Verizon Data Breach Investigations Report (DBIR), covering over 10,000 breaches. Beginning with a brief history of the DBIR's inception in 2008, Hardy highlights the evolution of cyber threats, such as the significance of patching vulnerabilities and the predominance of hacking and malware. The report identifies the top methods bad actors use for exploiting companies, including attacking VPNs, desktop sharing software, web applications, conducting phishing, and stealing credentials, emphasizing the growing sophistication of attacks facilitated by technology like ChatGPT for phishing and deepfake tech for social engineering. The episode touches on various cybersecurity measures, the omnipresence of multi-factor authentication (MFA) as a necessity rather than a best practice, and the surge in denial-of-service (DDoS) attacks. Hardy also discusses generative AI's role in enhancing social engineering attacks and the potential impact of deepfake content on elections and corporate reputations. Listeners are encouraged to download the DBIR for a deeper dive into its findings.
Transcripts: https://docs.google.com/document/d/1HYHukTHr6uL6khGncR_YUJVOhikedjSE
Chapters
- 00:00 Welcome to CISO Tradecraft
- 00:35 Celebrating Milestones and Offering Services
- 01:39 Diving into the Verizon Data Breach Investigations Report
- 04:22 Top Attack Methods: VPNs and Desktop Sharing Software Vulnerabilities
- 09:24 The Rise of Phishing and Credential Theft
- 19:43 Advanced Threats: Deepfakes and Generative AI
- 23:23 Closing Thoughts and Recommendations
183 에피소드
Manage episode 418000152 series 2849492
In this episode of CISO Tradecraft, host G Mark Hardy discusses the findings of the 2024 Verizon Data Breach Investigations Report (DBIR), covering over 10,000 breaches. Beginning with a brief history of the DBIR's inception in 2008, Hardy highlights the evolution of cyber threats, such as the significance of patching vulnerabilities and the predominance of hacking and malware. The report identifies the top methods bad actors use for exploiting companies, including attacking VPNs, desktop sharing software, web applications, conducting phishing, and stealing credentials, emphasizing the growing sophistication of attacks facilitated by technology like ChatGPT for phishing and deepfake tech for social engineering. The episode touches on various cybersecurity measures, the omnipresence of multi-factor authentication (MFA) as a necessity rather than a best practice, and the surge in denial-of-service (DDoS) attacks. Hardy also discusses generative AI's role in enhancing social engineering attacks and the potential impact of deepfake content on elections and corporate reputations. Listeners are encouraged to download the DBIR for a deeper dive into its findings.
Transcripts: https://docs.google.com/document/d/1HYHukTHr6uL6khGncR_YUJVOhikedjSE
Chapters
- 00:00 Welcome to CISO Tradecraft
- 00:35 Celebrating Milestones and Offering Services
- 01:39 Diving into the Verizon Data Breach Investigations Report
- 04:22 Top Attack Methods: VPNs and Desktop Sharing Software Vulnerabilities
- 09:24 The Rise of Phishing and Credential Theft
- 19:43 Advanced Threats: Deepfakes and Generative AI
- 23:23 Closing Thoughts and Recommendations
183 에피소드
모든 에피소드
×플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.