← All talks

5 Cybersecurity Lessons Hollywood Left Us in 1984

BSides Charlotte · 202531:1642 viewsPublished 2025-05Watch on YouTube ↗
Speakers
Tags
StyleTalk
About this talk
In "5 Movies from 1984 That Predicted the Digital Threats of 2025", we explore how iconic films from 1984, such as Terminator, Ghostbusters, and Indiana Jones and the Temple of Doom, unintentionally foreshadowed modern cybersecurity challenges. From AI-driven cyberattacks to social engineering and insider threats, these films illustrate timeless security lessons that are more relevant than ever in today’s digital landscape. Join us for a fascinating journey through Hollywood’s vision of technology and discover how these cinematic classics can help us stay ahead of cyber threats in 2025 and beyond ----- Juan Carlos Paris is a highly respected cybersecurity expert based in Panama City, Panama, with over 25 years of experience in the financial and banking sectors. Known for his innovative approach to cybersecurity, leadership, and digital resilience, he continues to empower organizations to defend against evolving threats. He is a passionate advocate for empowering users through continuous training, resilience, and awareness — equipping them to be the first line of defense against cybercrime. Juan Carlos serves as an Ambassador for the Comunidad Dojo de Ciberseguridad in Panama and is a key member of the BSides Panama team. He is dedicated to building bridges within the global cybersecurity community and hopes to welcome speakers from Charlotte to the next BSides Panama in 2026.
Show transcript [en]

Hello beside Charlotte. So happy to be here. It's an honor to share my presentation with all you guys today. Well, for those who don't know me, my name is Juan Carlos Paris. I am from Panama. I am a cyber security expert in technology innovation for more than 25 years. I currently live in Panama and work as a director in IT and banking, a stock markets and financial institutions. Now I work as a director of technology and data protection officer for a regional bank. In addition, I am independent advisor and cyber security consultant for several organizations. I also ambassador of the dojo cyber security community here in Panama. And we you can see my t-shirt is

a besides Panama part of Bides here in Panama. So you're more than welcome to come here to Panama to share your presentation in 2026. You you can find there a QR of my LinkedIn profile where I share valuable content updates and news about technology innovation and cyber security every week. So with that done let's go to our presentation. First of all um I have a liability a disclaimer the all the present all this presentation and session is forformational and educational purpose only and any knowledge gain and should be used only for legitimate and authorized purpose. The opinions expressed during this talk are those of each speaker and do not necessarily reflects the view of their

employees or any ailitate organization. Of course, this presentation include referenced images and short clips for the following films that you can read there and these materials are property of their respective studios and creators. Their use here falls fair use for educational and no propose uh non-commercial purpose only. All right remains with the original copyright holders and full credit credit is given to the directors writers and productions company of each films. I have to say that this session is intended to promote cyber security awareness through cultural analysis and storytelling. So let's jump in 1984. I was thrilled to hear that this year 1984 is the core of Bside Charlotte. But no, I'm not talking about Owen's dystopian

masterpiece. That was that one that book deserves an entire BAI conference of it owns. Probably will be a good idea for Charlotte Bite 2026. 1984 was a book written by George Orwell in 1984. Yep. 27 years ago. And it yet it reads like a prophecy envisioning a world of mass surveillance manipulated through through control and authoritarian control over information. Do that sound familiar? In many ways he anticipate everything from social medium profile to deep fake disinformation and invasive states rebellions. He was not just a novelist he was a cyber security prophet before the term even exists. But today we are not diving into Orwin's nightmare. We are jumping into the pop culture explosion that happened in the actual year

1984. 1984 was not just about dystopian blockbuster films. The same year during the Super Bowl 18, Apple air one of the most iconic commercials in detach history. And it begins with this incredible line. On January 24, Apple computer will introduce Macintosh and you will see why 1984 will be like 1984. It was a direct reference of Owen's vision and a bold statement that personal computer will empower individuals rather than confront them. Let's see a fragment of this legendary commercial. [Music]

We shall prevail. [Music] On January 24, Apple Computer introduced Macintosh and you'll see why 1984 won't be like 1984. Well guys, that is part of technology history in 1984. And that idea of disruption, awareness, and control over our digital world is what bring us here today. Because whether is a killer do a robot, a horror gremling, or a fishing email in your inbox, the message is the same. Cyber security is not just technical. It's cultural. It's human. And we have been seeing it coming since 1984. Let's make a moment. Let's take a moment to see how our workspace and our life has evolved from 1984. [Music] [Music] [Laughter] [Music]

Heat. Heat. [Music] [Music] Wow, what incredible video. Okay, let's see how closely you were paying attention to this video. Can you find one item that stay the same over the time? Of course, beside the desk. Don't tell me the easy desk. Well, yes. If you saw the Ryan glasses, the Raven aviator glasses original designed in 1937, you were paying attention. Some things will never change. Let's talk about the power of the cinema. Before we dive into cyber security lessons hiden with these movies, let's take a moment to appreciate what cinema truly is. Cinema is not just art. Is a collaborative masterpiece. Unlike most art forms, filmmaker bring together hundred even thousands of artists and experts from different fields. You have

writers, musicians, makeup artists, engineers, visual effects creator, custom designers, sound technicians. The list goes on and on. They all come together to keep archive one goal to create movie that entertains and inspires and sometimes of course educate. This is a black and white photo show Stanley Kubri direct directing a scene from his Alle film 2001 Space Odyssey. We're talking about 1968. Kubri is seen holding a cup of coffee while giving precise instructions to the camera crew and actors. 2001 Spay Odyssey is often celebrated as one of the greatest and most influential films in the history of cinema. Particularly noted for his groundbreaking special effects, philosophical ambitionary portrait of artificial intelligent through the character of the famous

computer 9000. Through history, cinema has been powerful source of entertainment. But more than that, it has been served as a mirror to society, a tool of education and even a warning of what the future might hold. From social commentary to techn technological prediction, movies have a way of teaching us lessons through history, visual, and emotion. And often those lessons about every thing we face today, security, privacy, control, and a struggle between freedom and authority. With that in mind, let's break down to the five and most iconic film from 1984. Can still teach us valuable lessons about cyber security. 1984 was a very special year because that year Hollywood accidental gave you five of the most unforgettable films and

hiding with them are powerful cyber security lesson than the steels matter today. First of all we want to talk about Terminator directed by Jess Cameron. Yes same Jess Cameron that directed Avatar Titanic and other beautiful films. We will talk about Ghostbusters, Indiana Jones and the Temple of Doom directed by Stephen Spielberg. The character kit and the Gremlins directed by Joe Dante. All part of 80 culture. Okay, so let's jump on. Let's start talking about first the Terminator, the danger of uncontrolled artificial intelligence with this quote from the movie I'll be back. Deter determinate the machines did not wait for the judgment day. They are already learned. The first lesson is autonomous threats powered by AI.

Determinator present a world where artificial intelligent Skynet gains selfawareness and initiate a nuclear war to eliminate humanity. With a cyber security parallel modern AI system are increasing evolving in a automatic decision making without proper control monitoring and the most important thing ethical consideration AI driving system can produce unattendant and dangerous outcome. What is the lesson here? Well, implement a strong governance, ethical oversight and continuous monitoring of AI system. Avoid the set it and forget it approach. Deep fake. Another lesson of this beautiful movie. Deep fake and automated cyber attack. The T800 Terminator is the perfect impostor able to mimic and blend with humans. What is the cyber security parallel here? Today we face threats from deep

fake technology capable of creating realistic video videos and audios to deceive, manipulate and blackmail individuals. What what are the lessons we are learning from this? Enhance detection techniques. Employ always multiffactor authentication and educate users about the potential dangers of manipulated media. Lesson number three from determinator ethics and control over AI system. A skynate ro naturalizes ethical question about the control of AI system in cyber security. As AI becomes more integrated into critical infrastructure, the ethical consideration of autonomy and control must be addressed. The lesson for sure is ensure ethical guidance are built into AI system from inception with clear boundaries and human oversight. Let's see what the Terminator have to say. We don't want to see EI coming back to

us like a disaster. like in this fragment of the

[Music] movie. Okay, remember the machines did not wait for the judgment day. They are already learning and so are today's cyber threats. learning from our behaviors, adapting to our defense, and striking faster than ever. Okay, movie number two, the G busters lesson. Invisible threats can cause mass message damage. And in the movie quote say, we came, we saw, and we kick it as saying by Peter Bank, one of the ghostbuster. What is the key quote here? We cannot fight what we cannot see. Of course, unless you know where to look. The first lesson here is social engineer and fishing as a modern ghost. The ghostbusters are often called upon to investigate invisible threats that general public cannot see and

understand. With the cyber security parallel, social engineers attack operate in the same way. exploiting human trust vulnerability rather than technology itself. What is the lesson we can learn from this? Awareness training is so important and be and be vigilant are essential to detect fishing attempts and manipulation tactics, behavior monitoring and threat visibility. The composter used like the proton pack and the PTA mirror. I don't know if you remember the movie, they have this special unit that detects and neutralize threats that otherwise were invisible. In cyber security, modern cyber security relies on detection such as IDS, SAMS, XDR and behavior analytic to what? To spot anomalies before they become breaches. What is the lesson here? Continuous monitoring and visibility are

the foundation to effective cyber security defense. Number three, suck as the modern Ghostbusters. Yes, just as the Ghostbusters respond to paranormal emergency, a security operation center acts as the frontline defense against digital threats. In the cyber security we have pro we have to provide 247 monitoring detection and response capabilities dealing with the incidents that are often invisible to the untrained eye. The most important lesson we can find here is invest in building a strong sock infra infrastructure capable of detecting and responding to threats in real time. You cannot fight what you cannot see unless you know where to look. Visibility is the foundation of defense. Remember that visibility is the foundation of defense. In today networks, the onse is

often the most dangerous. So we came, we saw, we kicked it. If you are in a team and detect an attack and neutralize it, this is probably the best line for a blue team. Okay. Well, let's move on. Let's talk about Indiana Jones and the Temple of Doom. What is the most important lesson here? Information, guys, is the real treasure. And the movie quote said, "Fortune and glory, kid. fortune and glory said by the the Indiana Jones himself. What is the key quote here? The true artifacts in 2025 are your credential and your data. First of all, protecting critical data access that includes the active directory as the crown jewel. Indiana Jones venture into dangerous territory

to recover valuable artifacts in cyber security. Today the data is the new gold and the active directory is the crown jewel that control access to the treasure. It is high value target for attackers because compromising the active directory means gains the keys of the kingdom complete control over our network and then is game over. What is the lesson here? implement extra data measure especially around active directory. This include hardering, configuration segmentation audit auditing, multiffactor authentification. Of course, I've been repeating this all the presentation and constant monitoring to prevent privilege escalation and unauthorized access. Lesson number two from Indiana Jones. Indeed, what's showing what's showing us here is defending against and bans persistent threats or a course cyber espionage in the face is

of coordinate trust betrayals and danger adversaries in cyber security and advanced resist threat are sophisticated multi-layer threats designing to infiltrate our network over extended periods of time. They are persistent and very dangerous. What is the lesson here? Continue monitoring, detect and response to AP by enhancing the visibility threats, intelligence, and proactive defense strategies. Number three, from Indiana Jones, insider threats and trust management. Indiana Jones is often betrayed by those he thought were alike. In cyber security, we have insider threats. Whether is a malicious or accidental are a constant risk to sensitive data and system. What are the lessons? Implement zero trust principles. Monitor user behavior and apply a strict access control to mitigate insider risk.

Remember the true artifacts in 2025 are your credential and data. Digital treasure demand digital guardianship. Losing control means mean means losing value. Fortune and glory kid. Fortune and glory. Fortune and glory is what cyber crim criminals are looking for. But that fortune and glory belong to the good guys that protects our data active directory from these bad actors. Let's move on. Now we are going to talk about parit now very popular with the Netflix coverai series and this is very important because the key lesson here is preparation is the best defense and Mr. Miji have a very nice quote that I bring up to you here that said a man can catch a fly with a chop

this can accomplish anything on patch off discipline makes the defense and what about magi what I want he wants to show you what that cyber awareness and user training in the current kit Mr. Miyagi teach Daniel that repetition, practice, and discipline are essential to mastering defensive skills in cyber security. Just as Daniel practice basic move, remember repeatedly employees must continuously train to recognize fishing attack, social engineer attempts and other threats. What is the lesson? Regular awareness training, vision simulation, and practical exercise are essential to maintain a strong and defensive posture. Mr. Miyagi always shows attack simulation and gaming learning. Mr. Mijiagi on conventional training method of simulate real scenario teaching Daniel to react instinctively in cyber security.

Conducting attack simulation such as fishing drill penetration testing and gamifying learning experience can help preparate us for the real world threats. The lesson is gamification and simulation based on learning to make training engaging and realistic and effective. And finally from character kit empower user as defender. Daniel ultimate becomes as a competent fighter not just through training but by believing in his own ability to defend himself. In cyber security we can say empowering user to be this first line of defense is critical with proper training and motivated employees can actively contribute to the organizational security. You have to promote culture of proactive defense where every user understand the role in the protecting the organization. And the end remember wax

on patch off discipline make defense cyber security is an avid not a checkbox. Train like you fight every click matters.

fly easier. I catch fly with chopstick. Accomplish anything. You catch one. Sooner or later, discipline and perseverance will over will win over everything. But don't trust in the beginner luck. And finally, we are going to talk about our last movie, The Gremblings with the famous quote, Bright Right, by the famous Gizmo. One small oversight and your system turned into a grammling nightmare. Let's see real fast here. What are the lessons from the gremlins? We can find shadow IT insider threads poor configuration small things that can make big impact in our organization. If you remember in the gram in the grelings the gizmos appears harmless and beautiful until mistakes are made. Filling after night or exposure to water can result in

a catastrophic and destructed craters in cyber security. Shadow IT insider threats and poor configuration often seems minor at first but can rapidly escalate into serious cyber security breach. Escalating of minor issue into minor incidents. The multiply rapidly do it to a small mistake and negligent. Cyber security parallet can probably uh we can speak about a small vulnerabilities or overlook security flaw can quickly work as a snowball into major incident if it's not addresses properly. Conduct regular vulnerability assessment, patch management and prevent a small issues in becoming into a fullc bridge. Access control and network segmentation. As the gremlin spread, they infiltrate every part of the town causing cows everywhere. In cyber security, lack of segmentation and poor

access control can allow a threat to move laterally across the entire network, amplific amplifying the damage. What is the lesson here? Implement a strict access control and network segmentation and continuous monitoring and contain threats before they spread. One small oversight and your system turned into a gremlin nightmare. Negleit. The basic is like feeding gremlins after dark. Disaster is only one click away.

Open that door.

[Music] mistake will always happen. The important things is to be prepared for them. Well, we are at the final S right now. Okay. 1984 was more than just a year. It was a turning point into popular popular culture and technology. And we have a look back at five iconic movies of this year. The Terminator show us the risk of unchecked AI and automate threats. The Ghostbuster highlight important of visibility and rapid response against invisible threats. Indiana Jones and Dep demonstrates how the true treasures of our time is information and its protection including the active directory itself. Karate Kid remind us that discipline, training and awareness are the foundation of a strong defense. And finally, the gram the

gremlins warned us how a small things can multiply and cause a disaster if it's not contained. These movies were not made to teach us cyber security, but if we pay attention, we can extract valuable lessons from every story. Use the wonderful tool to learn and most important thing is to use movies to teach other complex context concepts in a fun way because here's the truth the re the real in enemy is there the real danger is sinking and we are not prepared to have it. The battle with cyber crime is a battle that we cannot win. In the best case scenario, we can hope for honorable draw. Cyber security is a story we are all writing together. Every alert, every

detection, every response is a chapter in our going battle for security. Now it's your turn. Take this lesson and apply them. Train like a champion. Test your skills constantly under attack and collaborate, innovate and build a culture of vigilance. Because at the end, every sock is a team of Ghostbusters. Every network defender is a warrior. And every security leader is an explorer hunting for the highland threats that could bring us down. Because 1984 is now. So what will you do with what you have learned today? How will you turn these lessons into action? And the most important, are you ready to defend your kingdom against the threats that already learning how to bridge it? Thank you. Beside Charlotte

2025 having an honor to talk to you today. Bye-bye.