Artwork for podcast Technophile ReelTalk
Security Pros React to The 1983 Hacker Film War Games
Episode 227th April 2023 • Technophile ReelTalk • Brilliant Beam Media
00:00:00 00:41:14

Share Episode

Shownotes

Thanks for tuning in to Check Point ReelTalk, a podcast for security folks who want less FUD and more F-U-N. Each episode, we’ll join forces with other security pros, and react to how the industry is portrayed in film and TV.

Today, we’ll be reacting to the 1983 mystery-thriller “War Games” – with Matthew Broderick starring as a high school student who accidentally hacks into a military supercomputer while playing video games, and now needs to stop the nuclear war he initiated in a simulation. Host, Syya Yasortornrat, will be joined by Check Point Cloud Security Architect, Alfred Trevino, and Mr. Cooper Information Security leaders, Mike Madero, and Lionel Bailey, who bring their knowledge of the cybersecurity industry to react to this classic film. Find out: What was accurate? What wasn’t? And what can you apply to real world cyber events?

*****

Special Thanks!

Video clips and sound tracks are provided by YouTube and Envato creators.

Listen/Watch Here: 

Hacking into WOPR

https://www.youtube.com/watch?v=q14OTYVKMWc

Hacking Into Phone

https://www.youtube.com/watch?v=zkMX4s6ZstQ

Dialing Clip

https://www.youtube.com/watch?v=zb1r_uKOew4

Hacking Into School

https://www.youtube.com/watch?v=U2_h-EFlztY

Lesson Scene (it’s learning)

https://www.youtube.com/watch?v=NHWjlCaIrQo


Connect With Us:

Syya Yasotornrat: https://www.linkedin.com/in/syyayasotornrat/

Alfred Trevino: https://www.linkedin.com/in/trevino200/

Mike Madero: https://www.linkedin.com/in/michaelmadero/

Lionel Bailey: https://www.linkedin.com/in/lionelbaileyjr/

Website: https://checkpoint.com/

Facebook: https://www.facebook.com/checkpointsoftware

Linkedin: https://www.linkedin.com/company/check-point-software-technologies/

Twitter: https://twitter.com/checkpointsw

YouTube: https://www.youtube.com/user/CPGlobal

*****

* The information and commentary provided in this video is not intended as a substitute for professional security advice, assessment, or training. 

**  If you want to learn more or have any questions, please let us know in the comments. We also welcome any suggestions for future episodes.


Links

Chapters

Video

More from YouTube