Artwork for podcast Technophile ReelTalk
The Oceans Movies - Heists, Technology and Teamwork!
Episode 1026th March 2024 • Technophile ReelTalk • Brilliant Beam Media
00:00:00 00:35:19

Share Episode

Shownotes

“Ya gotta be NUTS, too. And you're gonna need a crew as nuts as you are! Who do ya got in mind?” - Reuben Tishkoff

The Check Point ReelTalk crew is going all in for The Oceans Movies! This week, Mark Ostrowski, Head of Engineering at Check Point Softward and Eric Anderson, Cybersecurity Evangelist at Atlantic Data Security joins Syya Yasotornrat for their take on this classic movie franchise!

Join Check Point ReelTalk Bi-Weekly on Wednesdays at 10:00am EST! Can't join us live? You can ALWAYS LIKE and SUBSCRIBE on YouTube! Links are in Comments!

Connect With Us:

Syya Yasotornrat: https://www.linkedin.com/in/syyayasotornrat/

Brilliant Beam Media: https://brilliantbeammedia.com/

Website: https://checkpoint.com/

Facebook: https://www.facebook.com/checkpointsoftware

Linkedin: https://www.linkedin.com/company/check-point-software-technologies/

Twitter: https://twitter.com/checkpointsw

YouTube: https://www.youtube.com/user/CPGlobal

*Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. No copyright infringement intended. ALL RIGHTS BELONG TO THEIR RESPECTIVE OWNER

Produced by Brilliant Beam Media in collaboration with Check Point Software.

#livestream #technology #cybersecurity

Transcripts

0:00

checkpoint real talk a podcast for security folks who want less fud and

0:06

more Fu n in each episode we'll have light-hearted conversations about

0:11

security people processes and Technology as we react to how they're portrayed in

0:18

film and TV we'll bring in experts from inside and outside checkpoint to break it down what was accurate what wasn't

0:26

and what can you apply to real world cyber events on today's episode host CIA

0:32

yotat checkpoint head of engineering East US Mark asosi and Atlantic data

0:39

security cyber security evangelist Eric Anderson react to the movies oceans 8

0:45

and 13 good morning good afternoon good evening welcome back to checkpoint Real

0:51

Talk where we check out some movies TV shows and we decide hey is it real not real is it possible probable and this

0:59

week week we are super excited because we are doing something slightly different we're looking at two different

1:05

scenes from the movie oceans 8 and Oceans 13 so if you're a big fan of the

1:11

oceans franchise I think you'll know why we picked these certain scenes there was a ton to choose from so I know because

1:19

we did our little prep call together we could do this forever but I had to limit down to two because they do talk a lot

1:25

so those people I'm referencing Mark and Eric welcome to checkpoint Real

1:31

Talk hey how's it going all right now is not the time to be shy you two cuz have a lot to talk

1:38

about we do so okay full disclosure yet again isn't this the funniest thing I

1:44

say this every episode and I'm starting to I used to think I was like a pop culture reference person but I have not

1:51

seen an oceans movie yeah well I was saying just just we I opened when we

1:56

talked earlier I I love the oceans movies I mean I'm a junkie there's only a few genre of movies that I like I've

2:03

probably seen these movies every holiday weekend because they play

2:08

them over and over and over again so I've seen them hundreds of times probably wait I just like movies in

2:15

general so when there's a franchise that's all decent um I'll I'll jump onto it I won't watch franchise over and over

2:21

but certain movies I definitely do and uh and these I've seen a couple times now so this is a familyfriendly holiday

2:28

movie for all I think I think so I think so yeah

2:34

well like look I I I know the:

2:42

was an excuse for the rap pack to film in Vegas right was that basically the gist of it like for them to party out there it seems like it yeah yeah two

2:49

month two months of filming probably oh yeah I mean I I wonder how it was

2:54

financed to some degree by those in Vegas too to be like hey come on out to the desert well they used real

3:01

casinos they didn't protect the names of the innocent there were five actual casinos four of which I think still exist oh wow well those they were owned

3:09

by the mob back then were I think they were blatant about it too weren't they like this is a mob owned joint like you don't mess around I think so I think

3:16

they were kind of instilling in viewers that don't try to do this don't do this at home we're professionals leave it to

3:24

well I was I was watching some scenes from the 60s which didn't make the cut guys so highly recommend everyone want

3:29

to watch it you should check it out but there was like the heist scene clip that I saw and I thought it was really

3:35

interesting because for that one they they actually cut the power so they actually affected the grid but they did

3:41

it old school style which is they literally knocked down a power like explosive right um okay so let's fast

3:48

forward um help me understand real quick so there's oceans 8 and Oceans 13 I saw Oceans Eight clip first um which I

3:56

thought was fascinating because I think it's the later movie right it's the women now it's a women's Heist most the

4:02

most recent yeah and that's that's what's kind of crazy when when you look at the franchise I mean Oceans 13 was

4:08

2007 I mean that's like not like yesterday right so like 11 and 12 are

4:15

you know obviously even older but you know eight obviously being the most recent so probably the most I don't know

4:20

Eric would you agree probably the most if you're thinking about it and hacking and Technology it's probably the most up

4:27

Tod date because:

4:33

ago well I think if you look at the whole Five movie franchise they've gotten progressively more Tech obviously

4:40

I mean I mean the the one that most of us know with where Clooney took over for Frank Sinatra um in the Danny ocean role

4:47

in:

4:53

technology involvement just a little bit they refer to some things here but they're not using computers to break into the casinos that's not how you

5:00

would have done it 20 years slly off topic but even Oceans 11 that scene where they tap the ethernet cable with

5:07

to intercept like the video they they they they pick up a handheld TV with an antenna I mean it's like because get

5:14

thinking and and it's a little device about this big that just you know um vampires onto a cat 5K crazy I

5:23

mean that's Instant Video feeds well that would be like the the the physical

5:28

form of man in the middle though wouldn't it like literally be like literally like literally would be that

5:33

and I think it's funny how I mean again if you think about the timing on that that was a long time ago right so like

5:40

it's just it's interesting to see how the technology evolved but and how we ended up at Oceans 13 was interesting as

5:47

well because it's starting to push that envelope of like they talked about AI right in the first scene right almost

5:53

the first couple scenes so it's interesting but in 13 as we'll see there there's actually a very good example of

5:59

a very realistic breach yeah with with one or two little things that aren't so

6:05

yeah yeah real but uh but but in general it's much more true to form because people are smarter people even average

6:12

consumer that isn't in this industry knows more and knows when Hollywood is being Hollywood yeah super interesting

6:20

yeah no I I like the way uh I've always felt like Hollywood and Technology they

6:25

do go hand inand in a lot of ways like right like you think of Hollywood as being entertaining but they offer a lot

6:31

of vision a lot of visionary stuff that probably already exists I mean to a large degree is already discussed I I

6:39

would like to think there are some futurists out there that have already discussed it but fact that Hollywood puts like pen to paper and puts it on

6:46

camera you know does it on camera even like exist anymore because isn't everything on digital camera I mean not

6:53

film I don't know is anything film don't film anymore yeah it's a good a I mean yeah it

7:00

probably probably probably becomes like a niche thing right like we're going to film on film right oh you get Christopher Nolan

7:07

and and his big Productions without special effects that he likes you know the big film and it still does things

7:12

that digital can't kind of kind of kind of unrelated to um what we're going to talk about but even like when you go to

7:18

technology we talked about blowing up something like in the original movie and then in the course of the oceans

7:24

franchise you've got like magnetrons you've got emps like so they you're right Hollywood kind of throws these

7:31

things that actually exist but does it really work like that in real life you know can you back up a van with an em

7:37

and knockout Vegas maybe I don't know but so it's in it's it's uh it's it's

7:43

fun to actually see how they how they portray on TV you take a little artistic license

7:48

but but to your point earlier even prior to Hollywood it was in science fiction novels you know would drive technology

7:56

and invent things that didn't exist and then eventually you look back and say wow Bradberry predicted

8:03

this yeah to geek out for a second I mean AI think about think about the

8:08

reality of generative AI we're only like 11 months into it not and and this movie

8:15

was:

8:22

people's you know eyes and their emotions and their temperatures and

8:27

using that and big data to create this like oh this is a real response that I

8:32

forward thinking that was in:

8:38

in:

8:44

a lot of creative you know things moving so it's well I'm I'm I'm not

8:50

coincidentally wearing a shirt that that's like a a spoof on the uh blue screen of death but it's actually Hal's

8:58

tirade when when AI has become sentient and says I'm sorry Dave I'm afraid I can't do that I love that I do love that

9:04

line and I do I think I say that line probably weekly to

9:11

clients some get the reference some do not fewer and fewer get the reference

9:17

every year that goes on stop it anyway okay guys well hey are you

9:23

guys ready for the first one

9:32

I am so sorry sir I tried to stop him not your fault sweethart you can't stop a man jum 36 Greyhounds in end it's all

9:40

right Lu oh is that like evil evil guy Mr

9:46

Bank do you know what Chuck Barry said every night before counting 1 2 3

9:52

4 what did he say pay me my money well I'm sure my people will be in

9:58

cash cash you've already been wired the money

10:04

Mr Bank this is this is th this is offender Road's moment you in yet why do

10:11

I feel like yeah this is the best part so these are the hacker

10:17

guys oh okay Mr Mr listen all du respect all do

10:25

respect sir you got a job tomorrow running this place you go to work every

10:30

day oh you're on you're on I make one phone call I get Sean White Travis Pastrana five of their buddies here

10:36

before midnight doing uh heel clickers and lazy boys off the back of the building yes yes if your audience wants

10:43

to see a bunch of long hairs riding rice Rockets but I'm talking about heavy bikes sir this is heavy bike F the road

10:51

is a I'm a goddamn American [Music]

10:57

Icon oh change it that much keep it keep the structure I'm trying to make you taller should be taller in 34 states an

11:06

animal in the other 34 24 22 this is a night people will

11:13

talk about as long as there's a lost Vegas and when they're talking about it they'll either be talking about you or

11:20

they won't now that's your

11:25

choice Mr Bank can I just say one more thing [Music]

11:34

okay are you going to jump okay guys I think okay there's so much in this scene

11:40

right here that um I have to talk about number one um what was he downloading

11:49

something or they just got into him machine like some RDP style was was was the alucino

11:55

character um Bank Mr Bank uh was actually tapped into illegally tapped

12:01

into the FBI's database oh for his own security purposes so he was already

12:06

breaking the law to just to to set it up um and they knew this so they knew he

12:12

would go verifying the identities of these potential perpetrators and they needed to help

12:17

make sure that he couldn't identify them so cheel went in with a great distraction while they uh yeah in great

12:24

great Hollywood fashion pan to the keyboard right and then you know they're in there starting to like change

12:31

the you know the uh the visuals live you know in on the FBI database remotely

12:38

from a you know that's that's the part like you know it goes back to what we just talked about like that generative

12:43

inly I mean Eric I don't know:

12:50

lked about and here we are in:

12:57

session on a hacked FBI communication I mean that's the part that with with the

13:03

keybard he wasn't using the mouse to like drag the the hair to change the size was all keyboard to to quickly look

13:10

ny cuz I was just thinking in:

13:16

what's that one Tomb Raider was still very much like that wonky almost like Minecraft level like it starting to get

13:23

a little bit better but it was not nowhere near of these morphing faces that you guys are talking about yeah

13:29

yeah yeah I mean gosh I mean the CGI even like was still kind of really

13:34

cy level wasn't it still like:

13:39

you know even when you were generating movies with CGI it was taking you know hours to to generate a couple seconds of

13:45

a scene yeah and that that's the part that you know again when you when you go backwards 15 whatever number of years

13:52

here we are in a in a time in:

13:59

change faces and features but to do that live and to do that with a keyboard and

14:06

remotely I mean going back to:

14:12

Hollywood I mean that this is it's becoming more and more reality as we kind of go through the years but it's uh

14:19

it's a great scene it's a great scene okay so yeah I think they key on things that they know might be possible are

14:25

possible to some small degree and they just exaggerate and expand it well they make it pretty

14:32

yep you have to and it furthers a narrative I'm catching with you're pitching guys but again I need to

14:39

understand from a reality perspective because it's been like I've been out of the the cyber security game for many

14:46

decades if you will but but not Tech just to clarify don't enough to be dangerous but the idea that you're rping

14:54

into this remote you know this this laptop and you're doing a session I guess you could see what they're doing

15:00

because it's on your desktop that they're keying into right but is it really an RDP or isn't it or is it they

15:07

hacked in they hacked into his laptop that's hacking into the FBI they didn't go into FBI directly correct so it's

15:13

like tunnel within a tunnel within another tunnel I mean I mean that's just Fantastical like how could you

15:20

possibly is is is it showing that that fundamental weakness where that's the weakest link and that's it is that still

15:26

a problem in cyber security today or is that not possible definitely definitely and

15:32

and yet it wasn't that bank had legitimate access bank bank had illegal access but they knew that so they

15:38

piggybacked over his access he was the weakest link because and you know in truth if he was able to somehow get

15:44

access they could have probably done the same thing but it was more interesting to to show them hacking Bank instead of

15:50

hacking the FBI and think about think about all the layers that we know Eric in you know in cyber security think

15:57

about the the just the the casino itself what they have in place right firewalls and threat

16:03

prevention and then the on the end points and then think of all the infrastructure that literally Hollywood

16:10

bypassed for a scene in like 10 seconds right like because we you know right

16:16

prior to that scene you know they're not doing this this hack or this this uh remote RDP session they're doing

16:21

something else and all of a sudden the laptop comes up and they're already in so think so you think about all those

16:27

layer of cyber security or bypass authentication intrusion prevention and endpoint and the Gateway itself are they

16:34

coming in remotely because they actually were coming in from a tunnel right underground which is another thing you don't even think about so they had to

16:40

come in from underground get a connection get through the security of the casino get to his desktop and then

16:47

start doing all of the CGI type stuff so like you think about it in real life it's way more complicated than just here

16:55

it is and yet there's a really cool Point here that's made very subtly that even

17:01

with all of that exaggerated digital you know electronic hacking there's still

17:06

was an essential social element which was Don che's character distracting him so he couldn't see this while they were

17:12

making the changes and without that social piece the whole thing wouldn't work okay yeah again yes and it's funny

17:20

because he's like that's okay so that laptop's behind him facing outward if I'm hacking into the FBI you think my

17:26

monitor is going to be facing outward for the rest of the world to Frack it's going to be right in front of me and my

17:31

office door is going to be unlocked so this Entertainer you know evil coneval guy can come walking in it seems to me

17:37

like quite a few people have the opportunity to barge into Mr bank's office because like his like executive assistant doesn't seem to do a very good

17:44

job because I think I've seen other scenes where she's like I'm sorry and it's like girl what trip them or

17:50

something like like how are you getting past and like it's such an elaborate setup too but anyway I digress well and

17:56

yet later in the movie their physical security doesn't even let them get out of their data center when they need to

18:01

when they're under attack it's a whole different scene where they're they're physically locked in somewhere so locks are very Hollywood uh convenient okay so

18:10

the other question U it wasn't shown in this clip I have to ask before you move on but uh the hackers that were in there

18:16

they had to go into the tunnels uh did they actually hardwire in or was this over Wi-Fi because it doesn't actually

18:22

show I'm just curious cuz then at what speed of like this Wi-Fi connection with all metal in the tunnel like that's your

18:31

own natural at faay cage or something like I was curious did they show that

18:36

I'm pretty sure I'm pretty sure they were underground right Eric in that scene right they were underground with

18:42

with that drill but they yep but there's racks too there there's racks of equipment and you know lots of wires

18:48

around so I'm going to give them the benefit that they actually hard yeah yeah yeah as they were boring a hole to

18:56

uh create an an earthquake simulated for the bank Hotel totally

19:03

realistic well never mind there's other scenes where they rig um uh slot machines easily somehow they very easily

19:10

put rig slot machines to to hit a progressive and yet that's not the easiest way to steal the casino's money

19:16

it's it's drilling underground and emps and other other fun things magnetron you

19:21

can you can't hack into a slot machine though right as long as anything's got an IP address I'm assuming everything's

19:27

vulnerable and up for uh potential hacking no yeah I mean I think

19:33

all if if it was that easy everyone would do it well I think it goes back to what we talked about before like in

19:38

reality you know you know I'm sure you treat casino slot machines like critical

19:43

infrastructure it's not going to be something that's going to be accessible by everybody so you take that Hollywood

19:49

license yeah I mean it it becomes more possible in Hollywood because mysteriously they're already connected

19:55

in there but in reality it's there's a lot of measures put in place and a lot of things that would have to be bypassed

20:01

in order to to get into a slot machine but um well even with the slot machines there was a very analog defense there

20:08

which was analysis of the winner because once the the woman hit cuz the the the 13 the Oceans 13 didn't win they set it

20:15

up so the next player would win the progressive as a distraction and when she wins they immediately cut to video

20:21

footage of her and and they're presumably a ceso type character played

20:27

by the late great Julian sanss starts analyzing this video saying nope her her pulse is normal she's not sweating and

20:33

and he judged her very quickly to be a legitimate winner and notam general I think I think they use the term like

20:39

genuine emotion or something like that it was like it wasn't somebody who expected to win but that you know again

20:45

it's like that's you know I keep on saying it but this is a long time ago but you think about AI today it's the

20:51

same stuff right it's like it's a lot of how many how many pieces of data can you bring in then use the algorithm to be

20:57

able to determine whether it's genuine or not and then you have to have the human element that interfaces with that

21:04

to make the reaction so Hollywood's way ahead of its time um what cracks me up though I'm totally unrelated to the to

21:10

the scene we just talked about but when they show AI in Hollywood they always show like LED lights like like almost

21:16

like kitten and Night Rider right the the this this the sequencing of uh LED lights that's AI you know it's like it

21:23

cracks me up like that's what we we need to be able to see to to say that it's like artificial intelligence so it's uh

21:30

yeah just you know I forget about Kit as one of the early AI yeah true very true

21:35

and night Industries:

21:41

aware of itself too Michael oh yeah it was automated driving before Tesla was

21:47

even Clos we're totally dating ourselves by the way talking about Night Rider I do that all the

21:53

time if you don't know Bradberry go check it out night rider was a lot of fun fun and you'll get to see David

22:00

Hassel Hoff at his Peak the Hof it actually it almost looks like a Tesla like that modified Firebird I mean you

22:06

think about it it's kind of got that same you know yeah sort of I don't know

22:14

anyways the Hoff with his shirt on I just love that even today like they went

22:21

with a I think a British actor to do the voiceover like even back then they like oh yeah the British AC's more uh you

22:29

you know palatable versus like I don't know a New York Bronx accent or something smarter that way yeah it's

22:35

smarter that way all right guys oh my go we can keep going but I definitely want us to hit up

22:41

this next one because I think it's so cool um and it's Rihanna come on peoples it's I think this was her acting debut I

22:48

guess and she gets to be a hacker of All Things soan Great are you guys ready great this is um o this is Oceans 8 and

22:56

uh I mean yeah check it out out so uh are you guys ready to go

23:02

[Music] ready she's in a coffee is she in a bar

23:09

she's in a bar

23:14

yeah oh yes I love realism of this

23:20

they're actually showing the true anatomy of a Brees let's find a Target find someone who might have access we

23:25

need y um then stalk him social I mean these are things we talk about all the time like this is what we warn people

23:31

not to do is to give too much information on public Pages cuz it just turns into a bad situation when you're

23:39

targeted yeah oh my gosh and I love the stickers on the

23:45

laptop I love that I love hackers always have stickers on the

23:50

laptop yes you want to go Incognito and not be identified as a hacker just go with a

23:56

clean laptop

24:03

interesting so sticky notes no idea oh STI oh sticky note with passwords on

24:10

there it is see there they are there's the sticky note oh but they don't even Target his password in this this is uh

24:16

t guys he has a webcam yep in:

24:23

to see it in a second now Rihanna has his webcam excuse me nineball

24:32

character and instantaneously after he clicked the link in in her uh and the realism of this scene is that this is

24:39

exactly this this is totally doable this is what how this is actually how it works you know the targeting the spare

24:46

fishing you know using social media to find out characteristics of people this

24:51

this is how it works and yeah and and she now owns his computer but then waits

24:57

till he leaves goes home for the night and immediately as soon as he turns off the lights rather than waiting maybe

25:03

until 2: in the morning she immediately uh those poking around his

25:10

machine there's a little bit of Hollywood in a second but uh cuz she doesn't have his password she just has his machine she's got a a remote access

25:17

to his device but now she needs a password and she doesn't have it and this is where little fun by the way

25:24

she's home now yes yeah well cuz cuz she had wait

25:29

for him to go home too so it was a few hours later but she used this little device remotely to somehow brute for his

25:35

password I know I love that I I want to know how I want to know where that came [Music]

25:41

from and the whole reason is to be able to Monitor and potentially reposition security uh cameras at the

25:48

mat so okay so let's talk about this because that to me uh I think has been

25:56

done and will be done I I actually watch short videos on YouTube of this like

26:01

hack I don't know if it's Facebook or YouTube or Tik Tok I don't know what it is I don't do Tik Tok but it's like a

26:07

group that goes after scammers and they video them and they capture them like

26:12

atnot yeah so this is back in:

26:18

years:

26:26

but you're right:

26:31

[Laughter] that but yeah no I mean I think I think

26:38

to your point I this this is you know this this is almost like every day this

26:43

is what we this is what people in cyber security were warning people about and have been warning people about you don't

26:49

have a webcam that you know is in your office that has and then have the

26:54

picture of all of your security camera locations on the wall wall a sticky note on the on the you know with a password

27:01

probably on that on their on their uh their screen you know social media sites

27:08

that have information that you use for a spare fishing attack you know all those things you know these are all the

27:14

warnings that we that that we we we tell people not to have around not to mention they again they don't show all

27:21

the the the uh the infrastructure that was bypassed to get to this person's of

27:27

course like it just go straight to the scene I'm taking over but even then presumably he had he had outbound

27:32

internet which is how how he got that notification and click the link and that's that's the realism of this is if

27:38

you're not protecting your outbound traffic as well then that's how this connection was actually initiated from

27:43

him outbound to corporate you know being on a corporate Network and having access to

27:49

Facebook and using non-corporate accounts like these are things too that you know a lot of organizations don't

27:55

allow um this this particular case case it's you know super super wide open and and this is on a machine that has access

28:02

to the security cameras you know I mean yeah and yet the simplest fix for this

28:08

would have been MFA because you see that the password she needed was just a single password that she was able to

28:13

brute force in seconds with some mystery device over the over over the air over

28:19

the real ear that's the part that cracks me up put this device next next to the uh next to the screen all of a sudden

28:24

like over the air it brute forces their password even just all the attempts at all those

28:30

thousands and hundreds of thousands of passwords would take time to transmit oh my gosh you never mind lock them out

28:35

eventually but but to Mark's point I think that this is very realistic even it was Kevin mitnik did similar things

28:42

in the 90s the original social engineer from a cyber perspective from a data perspective where I think his one of his

28:48

was uh trying to get source code for something so he could figure out how they were going to track him down and he

28:53

ends up figuring out who the director of the department is and ends up trying to find a number and get connected to that

29:00

person and and I won't go down the whole story as far as I know it but ends up targeting a specific person that had the

29:06

data he wanted and got someone else to give him access into their stuff and it

29:12

it's maybe a little too soon but this similar thing happened very recently in

29:17

a couple of very well-known Casino yeah companies I mean social engineering

29:22

there's something we said there was a couple scenes in there that I wanted us to go over I was like not enough time

29:28

I mean it wasn't oceans 8 that I just saw and I think it was Sandra Bullock's character just I mean it wasn't

29:34

technology oriented it was just simply security practices and uh it was just

29:40

glorious scene so that guys check it out but she basically talked her way through

29:46

all these different things and bypassed protocol processes I mean even just from

29:51

a basic security perspective like it it was insane to watch and pretty impressive but it also was a reminder

29:59

you have to have education due diligence for your end users right like you got to know how to help articulate some

30:06

Concepts to people like my mom and look look just because I was in the industry doesn't mean I'm not your end user from

30:12

hell I will click on anything my friends send me I know better I get it but

30:18

sometimes you just get relaxed you just be like oh I trust you and that's it that and that but that that's what

30:24

technology and like cyber security you know products and solutions and architectures

30:30

and platforms you know like that we have at checkpoint that's that's the safety net right the safety that is we're going

30:36

to have that moment where we click on something there you know you're going to have that moment where social like

30:42

engineering works so you want to have that safety net and that safety net is strong cyber security with good cut

30:48

prevention efficacy and all that kind of stuff so when you look at the scene Eric's def is right on number one if you

30:54

had MFA turned on even if we have this magical hack hacking

30:59

password device that can do these mysterious things uh you know like that

31:05

would have stopped this whole attack from even happening so right you know I think I think that's that's the beauty

31:10

of of of of strong and the best security is this it prevents those oops moments

31:16

that even that even today in:

31:21

security in place Eric you don't have the uh the cameras you know on a network

31:26

that's attached to the guy's computer that that's on his desktop like that bypasses that you have segmentation and

31:32

zero trust like these are things that this is what we do what we do so we can stop these things from happening uh even

31:38

with the best Hollywood you know creativity going at it yeah and yet life

31:43

imitates art and and again we look recently five years after that movie this has happened in the last few months

31:50

and it showed the casinos you don't need to get on site and use magnetrons and emps and drill holes under a casino to

31:57

hack it it can be done from another country it's probably it's probably happening right now that's the that's

32:03

the Stark reality is that the spear fishing attack and an execution probably around holiday scamming and you know

32:10

some type of like shopping deal is probably happening right exactly right now probably using the same methods of

32:15

of of of this scene from oceans 8 yeah know that makes well and and the the targeted individuals in the in the

32:22

actual successful recent Casino breaches were help desk yeah and educating the end users one thing but it was the help

32:28

desk that ended up resetting MFA credentials for these attackers to be

32:33

able to then gain access and so let me just clarify for those that are not technically oriented multiactor

32:40

authentication just you probably heard of single sign on multiactor is just an additional way to check and authenticate

32:47

yeah so anyone that doesn't know just throw that out there so guys you guys I knew this would be a lot of fun and if

32:53

you guys want to come back please I'd love to have you guys come back because clearly we just it wasn't even tip of

32:59

the iceberg it was like a needle point I mean ocean uh franchise I can see why you guys got into it so if I may um

33:07

because we have to go on a scale of one to 10 guys based on the two clips of the

33:13

two different movies that we saw how realistic do you think the oceans franchise is uh to

33:20

technology um you know I I think because of the I I'll I'll I'll give you the

33:28

because of the fact that they're older movies and now we're sitting here you know in

33:33

2023 I'll give them like a strong like eight seven and a half just because of I

33:39

think you know what they were trying to to portray you know many many years ago

33:45

e been in two th in the early:

33:52

of eight out 10 of course seven and a half you technical people yeah

33:57

I think I I could I I I hear you and I mostly agree but I think there's so much

34:04

license taken with unrealistic stuff that it brings it down a little bit more for me you know there there's a couple of pieces that are very realistic but uh

34:11

I'll only go seven ah I I think yeah I thought you're GNA give me six and three

34:16

qus 6.75 you guys I'll go with an irrational

34:22

number instead you guys are seriously so much fun I honestly I've had so much fun

34:30

going over this with you and by all means if you guys want to come back just hit me up and let me know because this

34:36

you guys were a lot of fun to to chat with so yeah likewise anytime anytime so on that note guys I want to give time

34:43

back for folks to get back to real work and reality here so thanks again for

34:49

joining us everyone and we'll see you next time for checkpoint real talk that's a wrap on today's episode of

34:57

checkpoint real talk if you like this video hit that subscribe button and some of those other buttons to show us your

35:04

appreciation and if you want to learn more or have any questions please let us know in the comments we'll see you next

35:10

time for another episode of checkpoint real [Music]

35:18

talk

Links

Chapters

Video

More from YouTube