Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Psychology of Modern Cyber Attacks & Social Engineering

Veeam
03/12/2026
44
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Modern cyber attacks exploit human psychology more than technical vulnerabilities, with threat actors deliberately triggering System 1 (fast, instinctive) thinking through urgency, timing, and emotional manipulation to bypass critical analysis.
  • AI-powered deepfakes have evolved dramatically since 2020, enabling attackers to convincingly impersonate voices and faces with just seconds of audio, while groups like Scattered Spider leverage native English speakers and thorough reconnaissance to appear legitimate.
  • Organizations should abandon shame-based security cultures that punish failed phishing simulations, instead fostering environments where employees feel safe reporting mistakes immediately—often before damage occurs.
  • Practical defenses include email aliases for high-risk roles, virtual phone numbers to prevent SIM swaps, and building organizational norms that allow five-minute pauses before responding to urgent requests.
  • The industry's $215 billion cybersecurity spend remains heavily technology-focused, with insufficient investment in human-centered approaches like mindfulness training, cross-functional collaboration (IT, HR, finance, legal), and psychological resilience.

The Evolution of Cyber Threats and Human Psychology

Ray Heffer, Veeam's Field CISO, traces the transformation of cybersecurity from perimeter-based defenses to today's AI-powered social engineering landscape. Drawing on 25 years of experience, he explains how the advent of cryptocurrency around 2010-2011 fundamentally changed ransomware economics, while recent advances in AI and deepfake technology have created what he calls "the new force multiplier of ransomware." The discussion centers on Daniel Kahneman's dual-system thinking framework—System 1 (fast, instinctive) versus System 2 (slow, analytical)—and how threat actors deliberately exploit System 1 to bypass critical thinking through urgency, timing, and emotional manipulation.

Real-World Social Engineering Tactics and Case Studies

The conversation examines several compelling incidents that illustrate modern attack sophistication. In 2020, attorney Gary Shildorn—an expert in fraud cases—lost nearly $9,000 to a deepfake phone call impersonating his son in a fabricated car accident scenario. More recently, NPM package maintainer Josh Dunan, despite his security expertise, fell victim to a phishing email that exploited urgency (account lockout in two days) and poor timing (Monday morning). Heffer emphasizes that groups like Scattered Spider—composed of UK, US, Australian, and Canadian teenagers—succeed because they speak in native dialects, conduct thorough reconnaissance using LinkedIn and sales intelligence tools, and weaponize the psychology of persuasion including social proof, liking, and authority.

Rethinking Security Culture and Human-Centered Defense

Heffer challenges the industry's "humans are the weakest link" narrative, arguing that shame and punishment-based approaches to failed phishing simulations create cultures of silence rather than learning. He advocates for organizational practices that encourage immediate reporting of mistakes, drawing on a formative lesson from a former boss: "Don't ever worry about making a mistake, just tell us. Because if you make a mistake, we allowed it to happen." Practical recommendations include implementing email aliases for high-risk employees (finance, HR, executives), using virtual phone numbers to prevent SIM swap attacks, and introducing mindfulness practices—even suggesting meditation app subscriptions—to help employees engage System 2 thinking before responding to urgent requests.

The Cyber Kill Spectrum and Strategic Defense Posture

Moving beyond Lockheed Martin's traditional cyber kill chain, Heffer proposes reconceptualizing it as a "cyber kill spectrum" that acknowledges social engineering doesn't fit neatly into discrete phases like reconnaissance, weaponization, or delivery—it spans all of them. He introduces the Japanese concept of "ma" (the space between things) as a metaphor for the critical pause needed to shift from reactive to analytical thinking. Organizations should slow down decision-making processes where five minutes for coffee won't materially impact operations but could prevent a six-figure wire fraud. The discussion emphasizes that while the $215 billion global cybersecurity spend (per Gartner) focuses heavily on technology, insufficient investment addresses the human element beyond checkbox compliance training.

Chapters

0:00 - Introduction and Background
1:12 - Evolution of Cybersecurity Threats
3:46 - Social Engineering and Human Psychology
5:00 - Deepfake Case Study: Gary Shildorn
7:39 - NPM Package Maintainer Phishing Incident
10:45 - Shame, Mistakes, and Security Culture
13:13 - Psychology of Persuasion Tactics
16:43 - Rethinking Security Awareness Training
19:39 - Email Aliases and Identity Compartmentalization
22:15 - The Reality of Modern Threat Actors
23:01 - The Concept of Ma: Space Between
25:34 - Human vs. Machine in Cybersecurity
27:46 - Beyond 'Humans Are the Weakest Link'
29:07 - Personal Security Practices
30:47 - Organizational Advice for Leaders
32:11 - Final Lessons and Closing Thoughts

Key Quotes

2:53 "My favorite subject. Okay, so you may be familiar with the cyber kill chain, Lockheed Martin. The problem with that in cybersecurity that I see is we're focusing so much on investment in tech and trying to check off each of those boxes that we're not just taking a step back."
3:37 "If I could rename it, I would change it from the cyber kill chain to the cyber kill spectrum. Because it's not just discrete buckets of things. It really is not. And social engineering is a great example of that."
6:58 "This is a group, a collective of individuals. And they are UK, US, Australian, Canadian citizens. So they will speak in the native dialect, the accent, if they were targeting a retail chain in the UK, which happened just a while ago. They will sound very plausible."
9:43 "I call this the new force multiplier of ransomware. This ability to use AI and deepfakes, not just for social engineering, but throughout the whole process."
11:11 "I had a boss, his name was Phil. He said to me, he said, Ray, don't ever worry about making a mistake, just tell us. Because if you make a mistake, we allowed it to happen."
16:51 "I think going back to the cyber kill chain, and this technology and focus that we've been so obsessed with, in fact, Gartner, there's a $215 billion global spend, according to Gartner, on cybersecurity. But I would be really curious how much of that spend is on the human element."
Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
  • » Cybersecurity » Compliance & GRC
Channels:
News:
Events:
Tags:
  • Threat Intelligence
  • Security Operations
  • Best Practices
  • Executive Briefing
  • Identity & Access
  • Social Engineering
  • AI and Deepfakes
  • Ransomware Psychology
  • Security Awareness Training
  • Human Factors in Cybersecurity
  • Phishing Defense
  • Threat Actor Tactics
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Psychology of Modern Cyber Attacks & Social Engineering

              Upcoming Webinar Calendar

              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/

              Upcoming Events

              • Apr
                29

                Strategies for Safeguarding AI in Applications, Agents, and APIs

                04/29/202612:00 PM ET
                • Apr
                  30

                  Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                  04/30/202610:00 AM ET
                  • Apr
                    30

                    The New Economics of a VMware Exit

                    04/30/202601:00 PM ET
                    • May
                      06

                      Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                      05/06/202602:00 AM ET
                      • May
                        06

                        World Password Day: Strategies for Managing Your Passwords Effectively

                        05/06/202610:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version