Your Host
Sharon D. Nelson

Sharon D. Nelson is president of the digital forensics, information technology, and information security firm Sensei Enterprises. In addition...

John W. Simek

John W. Simek is vice president of the digital forensics and security firm Sensei Enterprises. He is a nationally...

In November of 2014, hackers infiltrated Sony’s computer network lifting terabytes of corporate data, human resources information, internal intel, films, corporate emails, and other valuable information. This led the corporate world to question how protected we really are from cyber attacks. In the 1990’s, the only computer issue was viruses, but the attack vectors have since changed. Companies and individuals are now subject to spear phishing, spyware attacks, malware, drive-by downloads, and browsers. What steps are now necessary to keep hackers from accessing your valuable data? And on a separate but equally interesting subject for lawyers, who really was behind the Sony attack?

In this episode of Digital Detectives, hosts Sharon Nelson and John Simek analyze the progression of data security over time, look into data loss prevention steps, and consider each potential suspect of the Sony hack. Nelson describes the internet security suites that have been developed to include protection from all different types of attacks. However, she explains, these security systems are unlikely to keep out a sophisticated and determined hacker who is specifically targeting a corporation, law firm, or individual. The newer systems simply try to detect the infiltration and respond to it, observing what data is compromised and trying to identify the hacker. Simek explains several systems that are being used for security including data loss prevention, intrusion detection, and Security Information and Event Management (SIEM) products which correlate data to figure out what’s normal.

Nelson and Simek then go on to analyze why Sony was attacked and who may have done it. The hosts explain security blogger Bruce Schneier’s theories on the suspects ranging from an official North Korean military operation to a disgruntled ex-employee. Listen to the podcast to hear the hosts’ strong case for who they think the hacker was. Nelson also reviews Sony’s reaction to the security attack. Stay tuned until the end for the NSA’s rumored ability to create a cyber defense system and the international implications of an automated cyber attack response.


Full Transcript

 View Transcript

Brought to You by
Episode Details
Published: January 16, 2015
Podcast: Digital Detectives
Category: Information Security , Legal News
This Podcast
Digital Detectives
Digital Detectives

Sharon D. Nelson and John W. Simek invite experts to discuss computer forensics as well as information security issues.

  iTunes   Google Play
More Episodes
07/17/17
Cybersecurity 2.0: Creating Order from the Regulatory Landscape to Build a Strategic Advantage

Denver Edwards discusses cybersecurity, including the National Institute of Standards and Technology’s (NIST) cybersecurity framework.

06/19/17
Ethical Issues with Confidential Data

In this legal podcast, Jim McCauley talks about ethical issues lawyers face and how the Virginia Bar is helping to educate lawyers on how...

05/19/17
Cybersecurity for Macs

The CEO of GlobalMac IT discusses how cybercrime has evolved and what Mac using lawyers can do to protect their information.

04/18/17
Practical Approaches to Preserving New (and Not-So-New) Media

Sharon and John talk to Craig Ball about the intricacies of preserving digital evidence.

03/14/17
Electronic Security Sweeps for Law Firms and their Clients

Guest Charles Patterson talks about TSCM and how this extra level of security can ensure a lawyer's private information stays private.

02/14/17
Smishing, a Growing Cyber Security Threat

In this episode of Digital Detectives, Sprint's Joe Hamblin joins hosts Sharon Nelson and John Simek to discuss Smishing and other cyber security threats.