Your Host
Sharon D. Nelson

Sharon D. Nelson is president of the digital forensics, information technology, and information security firm Sensei Enterprises. In addition...

John W. Simek

John W. Simek is vice president of the digital forensics and security firm Sensei Enterprises. He is a nationally...

In November of 2014, hackers infiltrated Sony’s computer network lifting terabytes of corporate data, human resources information, internal intel, films, corporate emails, and other valuable information. This led the corporate world to question how protected we really are from cyber attacks. In the 1990’s, the only computer issue was viruses, but the attack vectors have since changed. Companies and individuals are now subject to spear phishing, spyware attacks, malware, drive-by downloads, and browsers. What steps are now necessary to keep hackers from accessing your valuable data? And on a separate but equally interesting subject for lawyers, who really was behind the Sony attack?

In this episode of Digital Detectives, hosts Sharon Nelson and John Simek analyze the progression of data security over time, look into data loss prevention steps, and consider each potential suspect of the Sony hack. Nelson describes the internet security suites that have been developed to include protection from all different types of attacks. However, she explains, these security systems are unlikely to keep out a sophisticated and determined hacker who is specifically targeting a corporation, law firm, or individual. The newer systems simply try to detect the infiltration and respond to it, observing what data is compromised and trying to identify the hacker. Simek explains several systems that are being used for security including data loss prevention, intrusion detection, and Security Information and Event Management (SIEM) products which correlate data to figure out what’s normal.

Nelson and Simek then go on to analyze why Sony was attacked and who may have done it. The hosts explain security blogger Bruce Schneier’s theories on the suspects ranging from an official North Korean military operation to a disgruntled ex-employee. Listen to the podcast to hear the hosts’ strong case for who they think the hacker was. Nelson also reviews Sony’s reaction to the security attack. Stay tuned until the end for the NSA’s rumored ability to create a cyber defense system and the international implications of an automated cyber attack response.


Full Transcript

 View Transcript

Brought to You by
Episode Details
Published: January 16, 2015
Podcast: Digital Detectives
Category: Information Security , Legal News
This Podcast
Digital Detectives
Digital Detectives

Sharon D. Nelson and John W. Simek invite experts to discuss computer forensics as well as information security issues.

  iTunes   Google Play
More Episodes
09/19/17
How Lawyers Should Use Spreadsheets

Ben Kusmin talks about the proper handling and format of spreadsheets.

08/17/17
Crisis Management After a Data Breach

In this legal technology podcast, Brian Wommack talks about the correct way to handle a data breach.

07/17/17
Cybersecurity 2.0: Creating Order from the Regulatory Landscape to Build a Strategic Advantage

Denver Edwards discusses cybersecurity, including the National Institute of Standards and Technology’s (NIST) cybersecurity framework.

06/19/17
Ethical Issues with Confidential Data

In this legal podcast, Jim McCauley talks about ethical issues lawyers face and how the Virginia Bar is helping to educate lawyers on how...

05/19/17
Cybersecurity for Macs

The CEO of GlobalMac IT discusses how cybercrime has evolved and what Mac using lawyers can do to protect their information.

04/18/17
Practical Approaches to Preserving New (and Not-So-New) Media

Sharon and John talk to Craig Ball about the intricacies of preserving digital evidence.