CyberWire Daily - Hacker Movies Then vs Now [Threat Vector]

Episode Date: November 27, 2025

We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say a...bout culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42  talks with Ben Hasskamp, Global Content Leader at Palo Alto Networks, who has been writing deeply on this intersection of media, tech, and risk. Together, we’ll examine how cinematic depictions of hacking have shaped public perception, influenced policy, and sometimes eerily foreshadowed modern cyber threats. Expect a blend of film critique, security insight, and cultural reflection. Join the conversation on our social media channels: Website:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠ Threat Research:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠⁠ Twitter:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the CyberWire Network, powered by N2K. Welcome to Threat Factor, the Palo Alto Network's podcast, where we discuss pressing cybersecurity threats and resilience and uncover insights in the latest industry trends. I'm your host, David Moulton, Senior Director of Thought Leadership for Unit 42. It's like finding out like the one thing protecting, you know, Fort Knox is like an unlocked screen door. Like, you know, to get into, like, the Whopper system is a little ludicrous. So, like, that was a little bit implausible. Today I'm speaking.
Starting point is 00:01:00 Ben Hascam, global content leader for Palo Alto Networks, and the author of the Control Alt delusion series, which revisits hacker films. Ben has spent years examining the stories that we tell about technology and how they reflect, distort, or anticipate real risk. Today we're going to talk about how classic hacker movies stack up to modern reality, their technical accuracy, their lasting cultural impact, and what we can learn today from their triumphs and delusions. Ben, welcome to ThreatVector. I've been looking forward to having this conversation. It's a little different, a little lighter, and a lot more fun than some of the real serious topics that we jump into on Threat Vector.
Starting point is 00:01:49 Yeah, no, I'm excited to be here. I know we talked about this a long time, so I'm happy to be here with you. So start us off. Tell me how this whole idea began. control out delusion series and then why did you choose old hacker films as something that you wanted to examine through today's lens yeah i mean i think you know when i started here i had an idea to launch a thought leadership hub for executives and um we did that under perspectives and one of the mandates that i was given was you know hey we should do like a letters from the editor uh type of thing
Starting point is 00:02:28 And I, you know, embarrassingly enough said, like, well, I'm not really an expert in cybersecurity. There are people that are way smarter than me, like posting things. But then I thought I was like, well, I do have a film background. And I had just watched the net and thought like, is there, oh, yeah, I'd say no notes, but we'll get into that later. And I just thought, like, well, could we revisit these movies with a bit of like a cybersecurity lens on them? them to say, do these movies hold up in any sort of way? So I pitched the idea to some executives here and they essentially were like, yeah, if you want to put your name on that, go for it. And I got my yes and I ran out of the room. Yeah, don't sell past the clothes, as I say. No, I love it on
Starting point is 00:03:17 on YouTube. Sometimes you'll see like a fighter pilot grading fighter pilot scenes and what's real and what's not. And it's always fascinating to get that lens. And I think you've brought a little bit of that spirit to, you know, what we're going to talk today or talk about today with the, you know, how hacker films have maybe shaped or warped or sometimes foretold some cybersecurity realities and impacted our culture. You know, from my lens coming into this about a decade ago, this industry, to today I see how powerful movies. and television shows are at moving the public's perception of, you know, what we think of as as hackers or cybersecurity. And I'm really interested to get into where you see these films really hitting or missing for us. Yeah, and I think that's like a great point of the public
Starting point is 00:04:13 perception, you know, that it is probably the most digestible medium for, you know, the broader audience to sort of glean like what is cybersecurity like and how is a hack performed and we'll get into the delusion part a little bit more later. But I think that's like a great point that it is like that's the medium that people digest this stuff. Yeah. So you've written several of your of your essays on films like war games, the net hackers. When you first propose a series, you know, in the back of your mind, was there a movie? that you felt absolutely had to be included because you thought that one was going to be particularly prophetic
Starting point is 00:04:58 or maybe you thought it was especially delusional? I think, you know, when the series launched, the net came to mind, you know, just because that was the impetus for this. The one that I really wanted to do, the one I think that maybe affected me the most when I was especially younger was war games. That was one that I thought, if this series works and people enjoy it, the next one I have to do is war games.
Starting point is 00:05:29 I was very impressionable when I saw this, and I thought, you know, how, frankly, how easy it was for David Lightman and war games to hack. So, you know, and then to sort of working for cybersecurity company now to sort of like go back and, you know, well, it's not really like that. but I still love it. So I think the net and war games were the first two that I thought, man, we have to do these. Yeah, sometimes when I watch a television show and especially like a police show and they have the footage and they say enhance, enhance, enhance.
Starting point is 00:06:06 And it keeps getting more and more clear. And somebody's worked with images a bunch in my life, you know, my background in design. I'm going, that's not how that works. There are no more pixels. Like you can only sharpen so much. And then the same thing, I think, what you're talking like, you know, click, click, click on the keyboard. I'm in.
Starting point is 00:06:23 And it's a little ridiculous. But, you know, it works for the scene but not for reality. Ben, what was it that drew you specifically to war games? You know, you mentioned that was one that was close for you. You know, that had to have been the first, you know, call what you will, the cybersecurity movie I saw as a kid. I think, you know, this statute of limitations has run out on this. So I'm happy to share this is that when I was in high school, I hacked, if you will, into my school system and changed my grade.
Starting point is 00:07:02 Doing the, yeah, this is a real story. Doing the essentially what he did of uncovering the password, not through hacking. So I do hacking in quotes. not through hacking per se but sort of I was maybe more of a social engineer and I took
Starting point is 00:07:22 what I was doing at a time in high school directly from war games that I was like wow is this you know something that you know could actually be done turns out it could be done this is however many years ago now 20 plus years ago
Starting point is 00:07:35 so I think I'm okay you know I did get caught and had to do a you know some time if you will brief suspension, but no, it's all right. But I think like that was to me this very, this kid who kind of was on the outside looking in and he saw the, you know, the early stages of the internet sort of as his playground and was doing it to do really kind of like powerful things.
Starting point is 00:08:07 Nothing nefarious and nothing kind of what we, you know, have come to see what. hacking is nowadays because if you look at war games like what he is doing is pretty harmless now the consequences were pretty dire but i think for me like that directly impacted my life in terms of serving you know like a one-week suspension or whatever it was that gave me that i was like wow this is like such like an impactful movie in my in my life so again that's i i had to i had to throw it in there and be irresponsible if i didn't absolutely so you went back you watch war games, are there any elements that, that surprised you, you know, positively, in terms of their technical plausibility?
Starting point is 00:08:53 Yeah, I mean, I think, you know, the concept of, you know, war dialing when he's, you know, trying to get into the, I think it's the games computer system, you know, the concept is kind of is still relevant today with like robocalling and things like that. like that still works uh like i said this that the backdoor password idea and concept um you know that it works in this uh scenario i think it moves into the implausibility like a little bit like the the hack itself um he finds the game administrator and finds out his son's name is Joshua and is like you know he literally the line in the movie is like it can't be that simple and he types in Joshua and is like he's into the system um so i think like you know it's it's like
Starting point is 00:09:52 finding out like the one thing protecting fort knocks is like an unlocked screen door like it you know to get into like the whopper system is a little ludicrous um so like that was a little bit implausible. I'm still unsure why the game system was connected to, you know, the defense system at all. And I've seen this movie probably 20 times. And I think, you know, the other element of it is like, this was sort of early stages of, you know, artificial intelligence and machine learning. And I think like where the climax of the movie, when he's, you know, they're playing tic-tac-toe and it's learning. you know, how to play the game
Starting point is 00:10:39 and realizing that there's a stalemate and then they play thousands of tick-decktoes and seconds, and then the machine finally comes to the conclusion, like, well, this is pointless. Like, the only winning move is not to play the game. Like, I'm not sure an AI system would do that, just suddenly give up and say,
Starting point is 00:10:57 wow, you know what, this is kind of futile. So that was, that, you know, I think at the time was very compelling in terms of watching a movie of, like, a computer's like, wow, like we can't win let's just stop and like let's get along um i'm not sure that would ring true today but again really really great in the moment talk to me about how the portrayal of joshua and its logic compared to some of the more modern adversarial a i or autonomous systems that we see today yeah i think we you know at its core joshua's logic was to win the game uh it
Starting point is 00:11:36 It's very simple. You know, the thing with AI is it's not evil. There's no malice. It, you know, this computer was like, I am trying to win the game. That's all I'm trying to do. And so if you think about it like this, like if you tell advanced AI, like your job is to eliminate all of my spam emails. Well, you know, it might logically conclude I will just get rid of all of your emails and, you know, or shut down your entire system or close off the internet to you. And it's like, there I did it. You're welcome. And it's like, well, no, that's not really what I meant, but to the AI, it's like, well, I won the game. You wanted me to stop this. I stopped it. You know, you're welcome. I think.
Starting point is 00:12:33 You know, Joshua was playing chess by the rules, was playing the game by the rules. Now, faster than anyone could play chess, was doing it better than anyone could play chess, where I think today AI is changing the rules of the game constantly. You know, it's not like they're, you know, they're not playing by the rules. Like, hey, would you like to play chess AI? and the adversarial AI that we're playing against, it's constantly changing. And, you know, it's like Joshua's logic was so simple
Starting point is 00:13:10 to win the game where now the logic behind AI is, you know, I don't want to say nefarious, but it's not confined to the rules of the chessboard, if you will. Right. So when we were talking about putting this together, I think you had just written about the net and, you know, how in there, there's this idea of your identity is erased and you're just gone. And, you know, I kind of laughed at like, yeah, just because you're removed from the internet doesn't mean that you're removed from reality and people still remember you. And that kind of buzzed around my head of like, you know, how do you go about pulling off the,
Starting point is 00:13:59 the trope in this movie but this is a really important cultural movie where people were sensing what it was
Starting point is 00:14:12 to be fully online how important was the net in shaping our early perceptions of the internet and you know
Starting point is 00:14:22 was it was it a little dark was it a little melodramatic you know in a way that was perhaps Perhaps more Hollywood than reality?
Starting point is 00:14:34 Yeah, it was. You know, I remember, I saw this movie in the theater with my dad. So it was 1995. Summer of 95. We just got in our first computer in the winner of 94. By the way, what was your first computer? Let's go back. It was, you know, it was the new, it was the Macintosh.
Starting point is 00:14:58 I don't remember that, you know, Apple Macintosh type. Okay, yeah. It was, but it was the big desktop, right? It was enormous. And it was, I mean, it probably took us two, three hours to set it up. You know, the 28-8 modem. Sure.
Starting point is 00:15:17 We didn't, we had AOL, and then we used Gofer. Do you remember Gofer? I don't. It's like this, it's this like hierarchical internet. So you search in like folders almost. So your guide, it's almost like a guided internet. You know, you're just sort of going from folder to folder. Oh, and it took forever to load like a page.
Starting point is 00:15:40 So it was very much you were controlled by what you could see. It was very limited in what you could see. And so I think when I saw the net in the theater to go from this hierarchical folder clicking to like she's ordering pizza was crazy to me. You know, I do want to touch on your point, too, of, like, you can't, like, deleting somebody, you know, entirely. Like, this is my dad, we walked out of the movie theater, and he was like, it is ridiculous that Sandra Bullock lives next door to you and you don't know who she is. Like, how is that possible? How would, nobody would, you know, nobody would know you. I actually just rewatched the movie last night.
Starting point is 00:16:23 And there's a scene because her mom doesn't know who she is. because she has dementia. And so she calls her mom because she's at a care facility. And she's like, mom, can you explain to them who I am? I'm your daughter. I'm Angela Bennett, you know,
Starting point is 00:16:37 and the mom can't do it. And I'm yelling at the TV. Like, ask anyone else who works there. Like, you've checked in several times to see your mom. Pay the bills. People know who you. Yeah, exactly.
Starting point is 00:16:49 Like, you, like, what are you doing? So just these things in terms of, like, logic are, fundamentally flawed, but also it was like this cultural, like, alarm bell, if you will. Like, I think people saw, oh my God, like the internet can, I can not only order a pizza, but somebody can, you know, delete my identity. Now, we've come to know that as it's not profitable to really delete somebody's identity. And I think, you know, identity theft now has moved into, you know, whatever. the, you know, the financial incentive is to do that. So I think at the time it was ludicrous.
Starting point is 00:17:34 I mean, it was like, how could this even happen? But also people saw the power of, of the internet. And I think today we sort of see it's very, because she says at one point, you know, it's so easy for them to do this because our whole lives are online. And now this is 95. Like this is before social media. This is before we've actually, like, she ordered the pizza but didn't have to pay for it, right? This is like, so her credit card information's not in there. It's, but she's talking to people online. She's giving out information online.
Starting point is 00:18:09 And the movie was aware enough of that because when they were making it, I think they, they, I read some story that this was one element of it that, like, In order to get back at her, they were going to wipe out her identity for some. She was like an advertising executive. There's like a whole oral history on it. You should read it. It's pretty good. And they went back to the director and said, the writers were like, listen, like this, an advertising executive who's manipulated online by these guys. Like, this doesn't really work.
Starting point is 00:18:43 But what if we just focused in on the identity part of it and like them manipulating her to do all these things? and one of the writers tells a story that he was like, yeah, we pitch it to the director and he just tore his rotator cuff playing tennis and he was on all these pills and he wasn't really with it and he just looked at us
Starting point is 00:19:01 and was like, yeah, that sounds good, do it. And so they ran with it. Oh, man. Sometimes you get lucky that somebody's a little loopy. Sometimes you get lucky. But I think, you know, it's, the digital identity is, it did show us then and it's true now.
Starting point is 00:19:18 Like the digital identity is fragile. And the systems we trust, a lot of the times, can, you know, turn on us in the wrong hands. Yeah. And I think that you're right at the model of deleting somebody and exploiting them individually is no, there's no profit there in comparison to, you know, stealing that identity and turning it into a synthetic and selling it or using it to, you know, grab other credit cards or other open loans, those sorts of things. things certainly seem like it's more likely that you'd want to be quiet if you stole the identity that you had done that. And in this case, it kind of went the other direction. But it did make for some interesting cinema, some entertaining cinema.
Starting point is 00:20:05 You know, it's been, what, 30 years? What do you think the next most single enduring cinematic legacy is? I mean, it has to be digital paranoia. You know, it's still resonant with, you know, everyone knows somebody who is like, I'm not on social media. I don't buy anything online with credit cards. You know, my father-in-law, he still pays his bills by check and is like, I'm not paying any bill online. So it is, no matter how secure, you know, we can say a system is, there's people still have that digital paranoia out there of, like, what this was and what it could be.
Starting point is 00:20:53 You know, I think in 1995, people's experience being online was, like, really primitive. And it's, you know, think about war games even. It's like black screen, green text. Right. But, like, the net was this mainstream movie with a major movie star at the time.
Starting point is 00:21:11 You know, she's coming off speed. It's huge. This is her next big thing. And it really made this. You know, we talked about this at the top, that it's like Hollywood made this like mainstream the internet as a powerful tool, but also like as sort of a dangerous tool that people, you know, are even to this day, are still afraid of 30 years on.
Starting point is 00:21:49 Well, let's, let's talk about hackers for a minute. Yes, let's do it. Cult, cyber movie. You know, this is, this is, this is, this film has, has cult status amongst tech audience. I'm sure there's a good size Venn diagram with Threat Vector listeners who are also fans of or at least aware of hackers.
Starting point is 00:22:31 Maybe it's been a minute because that one was what? Was that 95 as well? 95. So that was, yeah, the net was July 95, I believe. And then Hackers was September 95. So kind of that like Armageddon Deep Impact like Hollywood was doing. Yeah, yeah, exactly. You know, Ben, from your writing, which scenes deserve the need to be re-evaluated?
Starting point is 00:22:57 Okay. I think as we get through talking about hackers, I want to say the top of this, like, I love hackers. It was, when I first wrote about it and posted about it, I think it got the most engagement. People were excited about it. People had their own stories about it. So I want to get that. out of the way. Having said that, it's the most delusional movie we've done so far in terms of like, in terms of like substance and style. Like it's, it's ridiculous at times. I'm not saying
Starting point is 00:23:34 it's not entertaining, but, you know, to say like which scenes deserve to be re-evaluated, we need a full another podcast episode to do it. But I think when they hack the Gibson, which is the film's supercomputer, for those of you who haven't seen it, they're not looking at lines of code. They're literally flying through like a psychedelic 3D cityscape. And like towers are pulsating
Starting point is 00:24:02 and there are these data streams that are shimmering. And, you know, it's, it's, I don't understand like how they thought that made sense. But it, you know, again, we talk about war games and it's a black screen and green text and the net where she's typing a lot and flashes of code and things like that. And hackers, it's like, well, we're going to do something completely different.
Starting point is 00:24:25 And so I think, like, that scene was just this Hollywood hacking trope of, you know, it's a Jurassic Park did that a little bit when she, the girl was trying to get the park back online. And she's, like, clicking through different, you know, buildings and folders and things like that. And I'm really like, wow, that's like really cool that you can do that. And that doesn't really make sense. Hackers just blew that out of the water and said, like, we're going to be flying. And it's like we're in this like city that's like a rave and things like that. Like that is not how it works for those of you wondering, even to this day, still doesn't work that way. Maybe one day, maybe Hackers was 50 years ahead of its time.
Starting point is 00:25:11 But the whole scene where they're hacking the Gibson is, I mean, that's as delusional as it gets. Yeah. Earlier, I think you said the word ludicrous. And that's what comes to mind is it was just like, it was just entertainment, right? But I think because of the topic, it ended up being one of those things that sits in people's minds is like, that's what's going on. You know, there's this mystery. We don't know what's going on in that dark room with those hackers. And then you get these pictures.
Starting point is 00:25:39 and that sticks in your memory, right? Like, it's a little easy to remember some of the wild things that come out of a movie like hackers than, you know, a flick of a screen or some binary flowing across, you know, in green and black. What did what did the movie get right, though, in terms of maybe, you know, hacker culture or the mindset? Yeah, it's, I think it's the ethos of the hacker. You know, they directly talk about the hacker manifesto, you know, it's the world of the electron and the switch. What the hackers were doing, I think, at the time, like, they had a mission statement, right? It captured the spirit of the subculture. And, you know, hackers saw the Internet not just, like, as a tool, but it was like this, like, new front.
Starting point is 00:26:36 tier and it was it was kind of the great equalizer to authority you know it was very anti-authoritarianism right you know it's it's it's about hackers having intellectual curiosity um and kind of the belief that information should be free and democratic and and those are all like especially like the early hacker ethos was very much centered around those those concepts that mission statement you know it's it's devolved you know certainly to some extent and and we sort of you know like in in all things we've two roads diverged in a yellow wood type of thing of like okay well i'm going down this path where it's the great equalizer from a financial incentive for me and and you're um and you're an attacker or you know
Starting point is 00:27:33 the great defenders of still being like well this is a great equalizer for for me to defend against you. So the ethos is still there. It's just sort of branched off in ways that, you know, are a bit more nefarious today. But, you know, certainly that mission statement at the time was like, it was real. I mean, the hacker manifest was real.
Starting point is 00:27:54 And they wrote it directly into this movie. And honestly, kudos to them for doing that. So back in September, I ended up talking to Kyle Wilhoit about hacker culture. on threat vector and one of the things that he talked about was there was a point when it wasn't so professional to be a defender or a cybersecurity professional it was a place of curiosity and you'd ask to quote him what if and anything was possible and I think that there's then a moment where things change and that even even in the the beginning you were talking about how you know you were you're looking at this inspiration to
Starting point is 00:28:40 get into the school and uh change a grade right like the intent was like can i do this not um can i shut down the school right and sure maybe you went a little far and changed a uh an a to a b or whatever it was that you did there been but uh like i think that that's one of the things that has also changed it is you know the infusion of of money on both sides the uh the need for risk reduction because of the exposure and um you know maybe hackers in 1995 is just a fun thing to go back to and uh look at how how out of its mind how delusional the movie was uh you know for uh for a forward looking piece do you think a movie like hackers two hackers three Hackers 4 could ever exist, you know, giving in today's world, or would it be a very, very
Starting point is 00:29:39 different type of film? Yeah, I mean, well, you, to go back, I think you hit the nail on the head of just seeing what we could do, seeing what was possible, you know, like it wasn't about changing the grade. It was about, you know, can we do this? And it was almost like, it was about exploration, you know. And I think what hackers did so great was like capturing that rebellious, almost utopian spirit. Where if you do, I mean, if you're making hackers two, three, and four, you know, you, and we'll get into it, I think, some of the later movies and TV shows that, you know, have come out recently and how they kind of capture the hacker ethos and portrayal of them. You know, I think hackers, two, three, and four,
Starting point is 00:30:32 it definitely looks like a bit more nefarious. We might be following the bad guys a little bit more. There might be some sort of gray area where I think when these movies came out, you know, it was black and white. It was, you know, the plague was attacking. I think it was shipping containers. And, and they were fighting back. Where have I heard the shipping container is under attack?
Starting point is 00:31:00 story before right exactly but it was i mean it was it was very black and white and i think you know we're making it today there's some sort of you know gray area and and some sort of you know uh what they call those guys anti heroes and yeah uh it's it's a little bit grayer um but uh you know there might be more of a light on the the defenders if you will i think what hackers did what was great was like everyone saw them as as these bad guys, you know, the hackers as bad guys, they're the FBI's tracking them the whole way and they're fighting against them
Starting point is 00:31:37 or fighting this corporate hacker and he's trying to pin it on them. Like it was, from a storytelling standpoint, really compelling. But, you know, again, the style and the substance of it kind of got in its own way at times. Again, I love hackers.
Starting point is 00:31:51 Everyone, don't put me on blast. I do love it. Don't at you. How have these movies shaped public perception of hackers, over the years, especially as more cyber attacks have occurred. I mean, I think, you know, I don't know if it's a hot take, but I think almost exclusively, you know, these movies, you know, for good or bad,
Starting point is 00:32:18 it is shaping, you know, public perception. It's shaping policy. It's, you know, think about what War Games did and influencing actual policy. you know, with, you know, Reagan and NSDD, I believe, that it's like, this is, he watched the movie and turned to his national security advisor and said, could that happen? And he's like, I don't know, probably. And he's like, okay, we need to do something about this. And, you know, like hackers, I'm not saying the Hacker manifesto wasn't, you know, popular, but it was probably less well known. and then what hackers did was popularize it, right? Then people, you know, this.
Starting point is 00:33:05 So it is like these movies, I don't want to say have a responsibility for shaping the public perception. But like it certainly they have shaped it. And I think they continue to shape it even with movies that are coming out today. Do you see security professionals today who maybe lean into some of these types of narratives, when they're communicating with non-technical audiences, you know, maybe for better or for worse? You know, all of us, all of us have relationships with these movies. I think that's what is so great about it.
Starting point is 00:33:41 It, you know, brings us together, whether you're, you know, an engineer or, you know, a CEO or a CFO, like you, you have seen these movies. You know, you've experienced, you know, what they are. and I think to give Hollywood credit about anything, they really did a good job of, like, simplifying really complex things about cybersecurity. And I think, like, it provides this common ground for technical and non-technical audiences.
Starting point is 00:34:16 I probably am more of a non-technical audience member. So, like, if I'm on a board and somebody was talking to me about, well, this is why I'm non-technical, but like, let's say, you know, like mainframe vulnerabilities, okay? And, you know, identity, security, you know, I'm more inclined to say to them, like, well, explain this to me like I'm five, you know, and, you know, maybe that, you know, the CISO would say to me, well, imagine a scenario like the net where our customer database is held hostage or it's erased, you know, before our quarterly earnings call.
Starting point is 00:34:56 then I'm more like, oh my God, like what do we do to protect this now? So I think like, you know, the movies did a good job of creating that urgency and creating that common ground for us to understand, like, the dangers around it, even if it is through a mellow dramatic lens, I'm okay with that. A number of our guests this year have talked about using storytelling and talking to boards in a way that it gives them a narrative where they can see the first act, the second act, the third act, or they can see the consequences, they understand the stakes that they're up against, as opposed to giving you the, here's the dashboard readout, here's the technical analysis of our firewalls, whatever it might be that. the CISO, a very technical role, might speak to the rest of the security team in. And I think that it's important to say, like, maybe the lasting legacy of some of these films is a common experience and some language and then even be aware that this is a space that you need to be considering, whether it's a, you know, a young kid who's going to go into film school and write about it in the future, right? it made an impression or somebody who's going to sit on a board and accept the risk or fund the control that the company needs or the organization needs to put some sort of risk mitigation in place. I think that those narratives are the kind of things that can be really powerful.
Starting point is 00:36:41 But as you pointed out a couple times, some of them are just crazy and it ends up leaning into this idea of stoking fear and getting into misinformation even. These are older films. I want to jump into some of the content or the TVs and movies and shows that are a little newer. Do you see any that are doing a better job of balancing great storytelling but hitting on a level of realism that maybe these early films, didn't hold themselves to
Starting point is 00:37:18 because they're cinematic you know eat your popcorn, watch a movie walk out going wow in my gut reaction is to say not really the one
Starting point is 00:37:32 the one thing I will call out though is Mr. Robot you know I think Mr. Robot really did a nice job of showing you know audiences
Starting point is 00:37:44 what it was like and how it is now. You know, the act of cybersecurity is still, to this day, and I don't want to get into, you know, an agentic AI conversation on this particular pod, but, you know, it is still largely a person staring at a screen. I'm not positive that's inherently cinematic. So, you know, writers falling back on those tropes of frantic typing and these, like, magical progress bars and the visual metaphors, that still exists today.
Starting point is 00:38:24 I think, you know, maybe one other example would be leave the world behind. It's not about hacking. It's not really about cybersecurity. It was about, you know, I guess it was about cybersecurity because it was a hack, but, you know, they didn't show it, per se. They showed the consequences of it. They showed the aftermath of it. you know and that social trust can erode um but i think you know if if if there is one that i'd say yeah pretty good job it it'd be mr robot ben we're coming to the end here but i want to get
Starting point is 00:39:01 i want to get ben's recommendation on your favorite most ridiculous but entertaining scenes uh that you think maybe provoke a great conversation uh or reaction from the audience independent of whether they are possible or ever had been possible. Yeah, I think that, I mean, there's a lot. You know, it's where do we begin type of thing to maybe give people some spoilers, some the movies that we have coming out for future control, all delusion.
Starting point is 00:39:38 We got sneakers coming up. We have disclosure. We have leave the world behind. We're going to do zero day. the one that sticks out for me the most is swordfish Halliberry Hugh Jackman, John Travolta
Starting point is 00:39:57 it might be the most delusional one I've seen yet you know we've got we went from guessing a password with Matthew Broderick to Hugh Jackman writing this like complex worm and like I don't want to get into like, you know, he's got a gun to his head and other things are going on and and he's like, you got 60 seconds to write this worm or I'm going to kill you. And, you know,
Starting point is 00:40:26 he does it. He does, he does this thing. And pretty much everyone who's, you know, who's seen this movie and as an expert in this is like, not only would this take longer than 60 seconds, it would take weeks, if not months. And this is like with a team of people. Right. So I think like, swordfish was to me like the moment that they said we're going to make this sexy and we don't care about like any sort of of logic or realism at all like we're just going to go for it and i know people saw that movie for a bunch of different reasons uh but i think like that one scene if you want if you want to if you want to look it up on youtube it's it's spectacular um or wait until December when we're releasing the swordfish control out delusion.
Starting point is 00:41:13 Yeah, I wasn't working in security at the time. And even an uninformed Dave Moulton at that moment of seeing that movie in that scene, I was just like, no, that's ridiculous. No, I mean, yeah, it is, it is like, and I think people knew that. And people were like, you know, the net did like, is this possible? You know, war games, is that possible? And everyone is like, this is not. This is crazy. Well, Ben, I know you've got the series out there.
Starting point is 00:41:42 I want to ask where listeners can find you out on your socials and, you know, tell them where they can go read Control Alt delusion, and then I'll make sure that we've got that in our show notes. Yeah, Control Altillusion is up on Palo Alto Networks.com slash Perspectives. You can find all the articles there. We got three right now. Like I said, we're going to do the next one coming out is Sneakers, memory of Robert Redford.
Starting point is 00:42:09 You can find me on LinkedIn at Ben Hascamp. Hit me up there. Let me know if there's a movie that I'm missing or that you should recommend to me. But yeah, you can find me there and check it all out. Ben, maybe after you take down the Hollywood grates, it's off to Bollywood and to see what great international films touch on this topic.
Starting point is 00:42:35 we'll have to because this well will run dry at some point so yeah we'll have to tap into other things you know the matrix is still on our radar but we'll definitely have to start taking some some liberties at some point to keep the series going well thanks for an awesome conversation and a little bit of a divergence from our usual our usual topics today a little lighter a little bit different level of fun, talking about how hacker movies have distorted and sometimes foreshadowed cybersecurity. Now, this is a pleasure,
Starting point is 00:43:10 man. Thanks for having me. Appreciate it. That's it for today. If you like what you heard, please subscribe wherever you listen. And leave us a review out on Apple Podcast or Spotify. Those reviews and your feedback really do help me understand
Starting point is 00:43:36 what you want to hear about. You can contact me directly about the show. Just shoot me an email at ThreatFector at Palo Alto Networks.com. I want to thank our executive producer, Mike Heller, our content and production teams, which include Kenny Miller,
Starting point is 00:43:51 Joe Benacord, and Virginia Tran. Original music and mixed by Elliot Peltzman. We'll be back next week. Until then, stay secure, stay vigilant. Goodbye. for now. Thank you.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.