Also in this playlist...
This transcript is automatically generated
Counterattacked the hacked my next guest company specializes in protecting businesses from computer attacks -- her murder of radler joins us down Karl.
The next war has begun but you say we don't have to just sit back it's time to attack the -- first you've done this for clients.
Yeah that's right Dennis thanks for having me on.
-- getting nasty out there and companies are getting tired.
We all know that a great -- way to -- -- winning game went what -- battle is to have offense right not just defense and integrate offense into operations.
There are many reasons for this -- -- -- is that offensive operations is new tactic.
I'm a very effective tactic if I wanna go on the attack -- a corporate client here's what can you really do forming what kind of attack.
Yes so that the whole idea around counterattack of some people call an act of self -- -- people can't hack back.
He's too may can the person who's attacking you.
Abandon their attack essentially get them exhausted.
So there's different techniques that are used mostly very technical to be able to identify the fact that you've got somebody out there before they start even attacking you sometimes.
That you can actually begin the process of neutralizing.
And there's some nice techniques and a lot of good promising technology in this space right but -- defense but -- something Karl how is -- that -- Could end up selling us so much -- that is so vulnerable should have fix this ten or twenty years ago.
Yes sir like the health care industry where the drug manufacturers aren't exactly making us -- together -- here right all the time.
So the answer is is that -- -- it's a gigantic chess match insecurity we move they move technology moves it's very dynamic.
It's a very complicated sets but criteria.
And eight -- they're innovative so as need threats evolve.
The tools and -- then the tools and techniques have to evolve to -- -- what one last major point.
You worry that.
We think that -- we've isolated hacker attacks like the new report saying that China was responsible for thousands of attacks on over a hundred US companies.
We have to -- we've solved the problem hacking comes from anywhere and everywhere.
And also tell us your doubts about the validity of the reports saying that the Chinese army is behind all that's what what's what's bothering you office.
Well it's not so much that says that that the Chinese army -- for that matter there isn't nation states.
Cyber warfare going on clearly that's obviously the case it's just.
And our opinion not retained to just one nation states in nor is -- just retained to a nation state so there's transnational threats that the fancy word to say.
Organizations that don't affiliate with a nation like boat like and al-Qaeda like activists.
Sort of these -- -- out this -- attacks on the US commercial banking sector.
So what we believe is that there is they need to be strategies similar to maybe what -- what went on during the M.
The that there is that the US with the engineering efforts during the Soviet -- for -- space exploration.
He needs to be government's strategy on how we go about.
Neutralizing these cyber attacks in the US stock yes a big -- call me crazy but I think that he's a private vendor and corporate customer strategy.
Don't leave it to yeah -- right thank you for brief us on -- how.
Back accent I'm feeling suddenly empowered -- -- -- thanks for being with us today how -- thank you very much stansted thank you very much okay.
Filter by section