Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Psychology of Modern Cyber Attacks & Social Engineering

Veeam
03/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Modern cyber attacks exploit human psychology more than technical vulnerabilities, with threat actors deliberately triggering System 1 (fast, instinctive) thinking through urgency, timing, and emotional manipulation to bypass critical analysis.
  • AI-powered deepfakes have evolved dramatically since 2020, enabling attackers to convincingly impersonate voices and faces with just seconds of audio, while groups like Scattered Spider leverage native English speakers and thorough reconnaissance to appear legitimate.
  • Organizations should abandon shame-based security cultures that punish failed phishing simulations, instead fostering environments where employees feel safe reporting mistakes immediately—often before damage occurs.
  • Practical defenses include email aliases for high-risk roles, virtual phone numbers to prevent SIM swaps, and building organizational norms that allow five-minute pauses before responding to urgent requests.
  • The industry's $215 billion cybersecurity spend remains heavily technology-focused, with insufficient investment in human-centered approaches like mindfulness training, cross-functional collaboration (IT, HR, finance, legal), and psychological resilience.

The Evolution of Cyber Threats and Human Psychology

Ray Heffer, Veeam's Field CISO, traces the transformation of cybersecurity from perimeter-based defenses to today's AI-powered social engineering landscape. Drawing on 25 years of experience, he explains how the advent of cryptocurrency around 2010-2011 fundamentally changed ransomware economics, while recent advances in AI and deepfake technology have created what he calls "the new force multiplier of ransomware." The discussion centers on Daniel Kahneman's dual-system thinking framework—System 1 (fast, instinctive) versus System 2 (slow, analytical)—and how threat actors deliberately exploit System 1 to bypass critical thinking through urgency, timing, and emotional manipulation.

Real-World Social Engineering Tactics and Case Studies

The conversation examines several compelling incidents that illustrate modern attack sophistication. In 2020, attorney Gary Shildorn—an expert in fraud cases—lost nearly $9,000 to a deepfake phone call impersonating his son in a fabricated car accident scenario. More recently, NPM package maintainer Josh Dunan, despite his security expertise, fell victim to a phishing email that exploited urgency (account lockout in two days) and poor timing (Monday morning). Heffer emphasizes that groups like Scattered Spider—composed of UK, US, Australian, and Canadian teenagers—succeed because they speak in native dialects, conduct thorough reconnaissance using LinkedIn and sales intelligence tools, and weaponize the psychology of persuasion including social proof, liking, and authority.

Rethinking Security Culture and Human-Centered Defense

Heffer challenges the industry's "humans are the weakest link" narrative, arguing that shame and punishment-based approaches to failed phishing simulations create cultures of silence rather than learning. He advocates for organizational practices that encourage immediate reporting of mistakes, drawing on a formative lesson from a former boss: "Don't ever worry about making a mistake, just tell us. Because if you make a mistake, we allowed it to happen." Practical recommendations include implementing email aliases for high-risk employees (finance, HR, executives), using virtual phone numbers to prevent SIM swap attacks, and introducing mindfulness practices—even suggesting meditation app subscriptions—to help employees engage System 2 thinking before responding to urgent requests.

The Cyber Kill Spectrum and Strategic Defense Posture

Moving beyond Lockheed Martin's traditional cyber kill chain, Heffer proposes reconceptualizing it as a "cyber kill spectrum" that acknowledges social engineering doesn't fit neatly into discrete phases like reconnaissance, weaponization, or delivery—it spans all of them. He introduces the Japanese concept of "ma" (the space between things) as a metaphor for the critical pause needed to shift from reactive to analytical thinking. Organizations should slow down decision-making processes where five minutes for coffee won't materially impact operations but could prevent a six-figure wire fraud. The discussion emphasizes that while the $215 billion global cybersecurity spend (per Gartner) focuses heavily on technology, insufficient investment addresses the human element beyond checkbox compliance training.

Chapters

0:00 - Introduction and Background
1:12 - Evolution of Cybersecurity Threats
3:46 - Social Engineering and Human Psychology
5:00 - Deepfake Case Study: Gary Shildorn
7:39 - NPM Package Maintainer Phishing Incident
10:45 - Shame, Mistakes, and Security Culture
13:13 - Psychology of Persuasion Tactics
16:43 - Rethinking Security Awareness Training
19:39 - Email Aliases and Identity Compartmentalization
22:15 - The Reality of Modern Threat Actors
23:01 - The Concept of Ma: Space Between
25:34 - Human vs. Machine in Cybersecurity
27:46 - Beyond 'Humans Are the Weakest Link'
29:07 - Personal Security Practices
30:47 - Organizational Advice for Leaders
32:11 - Final Lessons and Closing Thoughts

Key Quotes

2:53 "My favorite subject. Okay, so you may be familiar with the cyber kill chain, Lockheed Martin. The problem with that in cybersecurity that I see is we're focusing so much on investment in tech and trying to check off each of those boxes that we're not just taking a step back."
3:37 "If I could rename it, I would change it from the cyber kill chain to the cyber kill spectrum. Because it's not just discrete buckets of things. It really is not. And social engineering is a great example of that."
6:58 "This is a group, a collective of individuals. And they are UK, US, Australian, Canadian citizens. So they will speak in the native dialect, the accent, if they were targeting a retail chain in the UK, which happened just a while ago. They will sound very plausible."
9:43 "I call this the new force multiplier of ransomware. This ability to use AI and deepfakes, not just for social engineering, but throughout the whole process."
11:11 "I had a boss, his name was Phil. He said to me, he said, Ray, don't ever worry about making a mistake, just tell us. Because if you make a mistake, we allowed it to happen."
16:51 "I think going back to the cyber kill chain, and this technology and focus that we've been so obsessed with, in fact, Gartner, there's a $215 billion global spend, according to Gartner, on cybersecurity. But I would be really curious how much of that spend is on the human element."
Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Threat Intelligence
  • Security Operations
  • Best Practices
  • Executive Briefing
  • Identity & Access
  • Social Engineering
  • AI and Deepfakes
  • Ransomware Psychology
  • Security Awareness Training
  • Human Factors in Cybersecurity
  • Phishing Defense
  • Threat Actor Tactics
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Psychology of Modern Cyber Attacks & Social Engineering

              Upcoming Webinar Calendar

              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et au-delà
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                11:00 AM
                03/19/2026
                Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR as an Integral Component of Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202601:00 PM ET
                • Mar
                  26

                  HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations

                  03/26/202601:00 PM ET
                  • Mar
                    26

                    Making GPUs Available On Demand (Without Breaking the Budget)

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      ITDR as an Integral Component of Critical Security Architecture

                      03/26/202605:00 AM ET
                      • Mar
                        26

                        Reclaim Network Clarity and Accountability with Netskope DEM

                        03/26/202601:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version