MGM Grand breach: How attackers got in and what it means for security | Guest Aaron Painter

  Рет қаралды 918

Infosec

Infosec

Күн бұрын

Today on Cyber Work, we’re talking about last September’s breach of the MGM Grand Casino chain, an attack that led to a week of tech failure, downtime and over a hundred million dollars in lost revenue. The attackers were able to get in via a point that my guest, Aaron Painter of Nametag Inc, said is a common point of failure: the request for a password and credential reset from the helpdesk, and the ever-frustrating “security questions” approach to making sure you are who you are. Nametag is built to create an alternative to security questions and go beyond MFA to create a method of verification that is even resistant to AI Deepfake attempts!
This conversation goes into lots of interesting spaces, including career mapping, the importance of diverse design teams and the benefits of security awareness training, plus you get to learn about an amazing piece of emergent tech!
0:00 - A new method of online verification
3:15 - First getting into cybersecurity and computers
7:03 - Aaron Painter's work experiences
10:37 - Learning cybersecurity around the world
11:32 - Starting Nametag
16:25 - Average work week as Nametag CEO
19:10 - Cybersecurity learning methods
21:15 - The MGM cyberattack explained
26:07 - MGM fail safes bad actors surpassed
29:26 - Security awareness training
31:35 - Are data breaches the new normal
34:05 - How Nametag safeguards online data
37:59 - AI deepfakes
40:19 - Using Nametag
42:20 - How to learn AI deep fake defense
44:14 - Design choices in digital identity
45:54 - Different backgrounds in cybersecurity
46:59 - Aaron Painter's favorite part of his work
48:01 - Best cybersecurity career advice
49:00 - Learn more about Nametag
50:06 - Outro
- Get your FREE cybersecurity training resources: www.infosecinstitute.com/free
- View Cyber Work Podcast transcripts and additional episodes: www.infosecinstitute.com/podcast
About Infosec
Infosec’s mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ’s security awareness training. Learn more at infosecinstitute.com.

Пікірлер: 5
@carsonjamesiv2512
@carsonjamesiv2512 Ай бұрын
This video has given me two more subjects the investigate.😃👍
@MrsCyImsofly
@MrsCyImsofly Ай бұрын
Thanks
@christ.4977
@christ.4977 Ай бұрын
I've always despised security questions. The questions are recycled and how many of these answers have been breached and leaked?
@ChrisSienko
@ChrisSienko Ай бұрын
Not to mention the number of people that give their own security answers away every time a friend posts a Facebook engagement quiz! "Your first dog's name + the street you grew up on = your Jedi name" etc. etc.
@7ner.
@7ner. Ай бұрын
Social Engineering, the only technique feared even by the elite cyber security professionals🤞🏾
Bill Gates Reveals Superhuman AI Prediction
57:18
Next Big Idea Club
Рет қаралды 27 М.
Cyber Attack Trends: Global Identity Crisis
15:02
IBM Technology
Рет қаралды 37 М.
Дибала против вратаря Легенды
00:33
Mr. Oleynik
Рет қаралды 3,9 МЛН
БОЛЬШОЙ ПЕТУШОК #shorts
00:21
Паша Осадчий
Рет қаралды 4,8 МЛН
Khó thế mà cũng làm được || How did the police do that? #shorts
01:00
My little bro is funny😁  @artur-boy
00:18
Andrey Grechka
Рет қаралды 9 МЛН
The Flaws that Allow Hackers to Remotely Access Cars | Cyberwar
22:18
Why You Should Learn AI In Cybersecurity
36:34
PurpleSec
Рет қаралды 3,1 М.
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 1,2 МЛН
Breaking down CEH exam questions with an Infosec expert
15:10
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
The AI Cybersecurity future is here
26:42
David Bombal
Рет қаралды 150 М.
Social Engineering - How Bad Guys Hack Users
14:58
IBM Technology
Рет қаралды 44 М.
Reality of working in Cyber Security | Pros and Cons
10:16
UnixGuy | Cyber Security
Рет қаралды 438 М.
Why Hacking is the Future of War
31:45
Johnny Harris
Рет қаралды 2,3 МЛН
💅🏻Айфон vs Андроид🤮
0:20
Бутылочка
Рет қаралды 740 М.
Asus  VivoBook Винда за 8 часов!
1:00
Sergey Delaisy
Рет қаралды 1,1 МЛН
YOTAPHONE 2 - СПУСТЯ 10 ЛЕТ
15:13
ЗЕ МАККЕРС
Рет қаралды 117 М.
Best mobile of all time💥🗿 [Troll Face]
0:24
Special SHNTY 2.0
Рет қаралды 856 М.