Cybernomics: The Economics of Cyber Security
Every week, Josh Bruyning peeks behind the curtains of businesses small and large to learn how they use technology to drive economic growth. He delivers straight-to-the-point insights for investors who aren’t tech experts but need to make big calls about tech, or businesses executives looking for fresh new ideas.
We break down the hidden costs, incentives, and opportunities behind today’s most important tech decisions. No jargon. Just clear conversations.
Whether you’re budgeting for compliance, evaluating vendors, or planning your next investment, Cybernomics helps you make confident, high-impact choices without needing a computer science degree.
New episodes drop every Wednesday.
Follow us on LinkedIn and YouTube for bonus content and real-time updates.
Cybernomics: The Economics of Cyber Security
Security Appreciation, The Human Firewall, and The Future of AI
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Most scams don’t start with “bad technology” they start with a perfectly normal human impulse to trust. Josh Brunning sits down with security speaker Robert Siciliano to get honest about why cybersecurity still doesn’t stick for everyday people, even when the stakes are obvious to CISOs and security teams. We dig into the uncomfortable truth: denial feels good, and compliance training often turns security into a chore instead of a skill that protects real lives.
Robert explains his idea of the “human blind spot” the biological default to trust what seems familiar, even when the message arrives by email, text, phone call, or a convincing deepfake. From there, we get practical about the basics that still move the needle: unique passwords, password managers, and two-factor authentication for critical accounts, especially email. If attackers “own the email,” they can reset passwords, take over financial apps, and cause damage that looks a lot like you doing it.
We also reframe security as something healthy, not paranoid. Think seatbelts, home locks, and proactive protection rather than fear. Robert lays out the shift from security awareness (knowing) to security appreciation (caring), plus the “strategic human firewall” mindset that turns people into an active layer of detection at work and at the kitchen table at home.
Then we look ahead: AI fraud, voice cloning, deepfakes, and pig butchering scams are scaling fast, and the old red flags are disappearing. If you want to follow Robert, find him across social media and at protectnowlc.com. Subscribe to Cybernomics, share this with someone who still says “why would they target me,” and leave a review so more people learn how to verify before they trust.
Why Cybersecurity Matters To Everyone
SPEAKER_00Welcome to another episode of Cybernomics. I'm Josh Brunning and I'm here today with Robert Cisliano, speaker, pontificator, general, pool of knowledge. And we had a little bit of a chance to to to talk shot before we hit record. And man, I had to stop it and just go, okay, Robert, let's just get on the podcast and save it all for that because you were dropping some real insights that I think people would appreciate. Specifically around, you know, why why do this cybersecurity thing? I know this is a message that we normally preach to companies, and we have the CISO sort of be responsible for uh the safety of the business and cybersecurity and awareness training, and you know, well within your wheelhouse here. But it seems that folks, at least, you know, normal folks, which I'm gonna say muggles, right? Non-security people, maybe even non-business people, non-technical people, often don't do cybersecurity because they don't see the value in cybersecurity. And I know that's kind of your message and your mantra, trying to get people to see what this cybersecurity thing really is all about, and why should we adopt cybersecurity at all? So, Robert, for the lay people out there, the pros as well, but specifically the people who are not working in cybersecurity, why do it at all? Why is it important?
SPEAKER_01Well, you know, there are bad actors out there, as we know, who treat fraud as a business, right? I mean, snake oil salesmen have been around for, you know, hundreds of years, and they've just changed their, you know, their, their, their tactics, their methodology is still the same. It's uh convincing us that they are worthy of our trust. And today, you know, whether in person, over the phone, via text, or uh email, um, they have many vectors, mediums in order to get in touch with us. And they're really good at what they do. People say to me all the time, you know, if criminal hackers could use what they know, they could cure cancer. And I'm like, yeah, no, they don't care about, they don't care about curing cancer. These are sociopaths and psychopaths. These are hardcore narcissists, predators in human form that would just be as happy seeing your father homeless on the street broke because they stole all of his money. They could care less about curing cancer. And that's what we're up against. And most of the general public, they don't see themselves as ever being targeted because they don't want to think they would ever be targeted. And they basically do nothing in regards to managing risk because they function in a state of denial all the time. It can't happen to me. And they do nothing. And so we shove, you know, compliance training down their throat and say, okay, do this, don't do that, or else, and expect them to recognize risk effectively when the phone rings, when they get an email, when they get a text message. And I'm here to say that the compliance trap doesn't work, never has, never will, but there's a better way to do it.
SPEAKER_00Well, I think that that is not gonna make everyone super happy because the CISOs are working really hard, right? They're trying to get these folks on board with security. And from the top down, we always hear that security is a human problem, it's a people problem. In your view, Robert, why is it so hard to get this message to stick and to get security to acceptable levels when it comes to people?
The Human Blind Spot In Action
SPEAKER_01Well, first of all, let me just say, you know, in our culture, in our society, we talk about firefighters and law enforcement teachers, nurses, first responders as being our heroes, right? And I and I agree with that. But you know who the unsung heroes are? The unsung heroes are the C-suite tech execs. They're the CISOs of the world. People say to me all the time, like, who's winning? The good guys or the bad guys? And I say, well, of course the good guys are winning. I mean, the bad guys want us to be living in the dirt like it's the 1800s. They want us to have no banking system, no clean, you know, running water. They want us to have no refrigeration, no gasoline in order to, you know, deliver food and refrigerate goods. Like they want us to be living in the dark, okay? The reason why you and I have the quality of life that we do today is because of those CISOs and so on. So the good guys are in fact winning. But the reality of it is, with AI now in deep fakes and voice cloning and everything else, we're at a point now where I'm beginning to significantly worry because the general public does not know real or fake at all. And I don't know if they ever will. But it's our job, I think, to change their mindset to get them to understand and recognize what risk actually is. The main problem is just it's it's truly human biology. And that might just sound quite silly, but I've over the past, you know, 30 plus years of doing what I do, I've come to the conclusion that we all suffer from what I call the human blind spot. Okay. So the human blind spot basically is biology. It's the psychological instinct to trust what's familiar to us, right? It's that cognitive gap where biological trust overrides digital suspicion, leaving the door wide open for all kinds of deception, AI, deep fakes, fraud, whatever, you know? It's that biological default to trust, essentially psychological shortcuts, these heuristics the criminals used to bypass human logic. It's been going on forever, right? Now they've just perfected it. Think of it as like biological impulse versus intellectual understanding, right? The internal conflict between our evolved survival instincts and our modern knowledge or lack of knowledge of digital risks, keeping in mind that we are what is considered an interdependent species, which means that we are dependent upon each other for our survival. Always been like that, always will be like that. We require each other to procreate. Okay. And the basis of that is that we have to trust each other. So all day, every day, the people that we come in contact with, in person, over the phone, via email, via text, we want to and need to trust that they have our best interests in mind. No one ever wants to think or believe that somebody is out there that wants to hurt them, run away from pain and towards pleasure. And pleasure is it can't or won't happen to me. Therefore, we function in denial. And essentially what that boils down to is we do nothing about it. When I get in front of a live audience, I ask, you know, 100 people, how many of you are using, can honestly say you're using a different passcode across all your critical accounts? If I get 15% of the room to raise their hand, that's a lot, which means 85% are using the same passcode across multiple accounts. Then the same question, how many of you are using two-factor authentication across all your critical accounts, including email? If I get 20% of the room, because usually it's a little more because it's required more often, that's a lot. So 80% aren't using two-factor authentication. These are basic, basic one-on-one things. And one of the most common questions I get even today is you know, how do I know what links are okay to click when I do a Google search? Which is a very basic one-on-one question, but that gives you an understanding of where people are in regards to basic digital literacy. How do you know which link not to click when you do a Google search? Well, so basically, Google knows enough to serve up results. They're gonna be generally safe, right? And the first page of search, even second page of search, generally you're gonna get decent results. Usually it's when you are searching for like nefarious stuff, child porn, naked pictures of a celebrity, whatever. Like all, you know, rules go out the window when you when you're engaged in nefarious searches, generally. But as long as you have basic one-on-one device security, you know, updated hardware, updated software, updated AV, updated browser, right? Generally, regardless of the search results that you get, generally you're gonna be fine whatever you click. I mean, I click bad links on search all the time in my browser due to the fact that the stuff that I'm searching on purpose to find, you know, nefarious sites and see what the bad guys are up to and go into the dark web and whatever. Like I'm always my antivirus is always popping up saying we block this, we block that. So we're generally good, you know? But the that basic question is that people just don't have a clue to begin with.
SPEAKER_00And I'm hearing dozens of my friends, and I'm sure you've had this experience before, and others out there have had this experience where your friends look at you and they go, Well, yeah, security is all great, but like why would they want to steal my stuff? Why me? We don't want the onus to be on us to explain why them. We think that people should research and kind of educate themselves, but the reality is people do feel like there's nothing of value that they have. Why would the bad guys want to get their stuff? So just giving them the benefit of the doubt, I'm gonna ask you that question and let's kind of tackle this dragon together. Why would the bad guys worry about my data?
Security Without Fear Or Paranoia
SPEAKER_01So our social security numbers, our credit card information, our usernames and our passcodes all provide access to sensitive sites, sensitive data. From that, they can turn those numerics into cash. You know, they say own the email, you own the person, right? And from there, you can go and reset the passcode for all of their critical accounts. You can access their mobile phone account, swap out their SIM, and truly wreak havoc. You know, once you're inside their email, you find out what accounts they have crypto with, what's their banking account, their Venmo, their PayPal, and so forth. Like, you know, once you, once you are inside, they can do as much damage as, you know, we could with our own information, right? Like once you're in your own accounts, you could do whatever you want, and so can they. All that said, the general public, their first response was, well, why would they target me? Why would they go after me? Because functioning in denial is comfortable. It's soothing, it's better than recognizing risk. Nobody ever wants to think they're in the presence of evil. And so they go the complete opposite direction. When you're watching the six o'clock news and something bad happens in a neighborhood somewhere, something tragic, and then local news station comes in and they bring a reporter in and a camera guy, and they they knock on the neighbor's door. The neighbor comes outside and they ask the neighbor, so what do you think about happened? What'd you think about what happened? What does that neighbor always say? Didn't think it would happen to me. Didn't think it was going to happen in this neighborhood, such a quiet neighborhood. They always say the exact same thing. Because no one ever wants to ever believe that these things can happen around here. And and I bring that up because it just shows how simple we are, how simplistic we are when it comes to this stuff, how we look at security as truly a bad thing. Like I ask my audiences and I tell them all the time, which is actually a true thing. Like I've got, you know, 20 plus security cameras. And if I got if I've got 20 plus security cameras, I say, like, what does that say about me, about my disposition, about my worldview? Like 20 plus security cameras means what? I must be what? Paranoid. Paranoid, right? So what that truly means, when people say that, they look at security as a bad thing. Paranoia is a mental health disease. And people that have that disease, they truly do suffer. I have a first cousin. I think right now she's living in her car. I mean, the poor kid, like, her meds just aren't working for her. And she truly does think that people are out to get her. Like she does think the government is tapping her phone, like that she has bugs in her house, that her her neighbors have cameras like in her bedroom. Like she truly believes that. It's an awful disease. And if we associate security and paranoia in the same breath, why would you ever want security in your life?
SPEAKER_00Yeah, yeah, yeah. So maybe, maybe that's why people are so resistant to, you know, it's like saying, I've got ADHD. I know growing up in my household, you couldn't even say that, right? No, you don't, you're not depressed. Like you don't, it's almost like if you speak it, it almost there's this superstition that you're speaking it into existence. So I feel like if people start armoring up and putting out cameras and, you know, keeping tabs on all of their passwords, they feel like, oh yeah, the universe is definitely gonna get me.
Human Conversations Beat Compliance
SPEAKER_01I I love that you brought that up because there is some truth to how we we how we think in that regard, which is unfortunate. You know, sometimes we we are our our greatest enemy. You know, when I when I ask my audiences like, how many of you actually have a home security system? If I get 15% of the room to raise their hand, that's a lot, which means like 85% don't have a home security system. And then I ask basic questions like, okay, so why don't you have the home security system? Like there must be a reason. The most common answer that I get is, well, we don't have a home security system because I don't want to live like that. And I say, well, explain, what does that actually mean? Well, I don't want to have to worry. I don't want to live in fear, as if the installation of a home security system is gonna be a constant reminder of risk that it's gonna make you worry. It's gonna make you paranoid. Like people aren't well thought out in this regard, you know. I mean, you don't put your seatbelt on because you worry, you put it on because it's a smart thing to do. You don't install a home security system because your house got burglarized. You install one because you do it proactively to reduce risk because at three o'clock in the morning you are vulnerable. It's like it's a smart decision. It's a it's a it's a it's an investment. It's no different than getting a good night's sleep, you're taking care of your body, getting uh, you know, eating properly, consuming fluids, making sure that you're you're healthy physically and mentally. It's just basic one-on-one stuff. Security is like fundamental to living. We we we couldn't function without it. But people take it for granted, as if like these things don't happen around here. And it's like, that's just cultural, you know, and that's how it's been all of my life, you know. Like growing up, for me, the advice that they would give to young women when it came to sexual assault was just let it happen so it doesn't get any worse. Which is so stupid. And it was stupid then and it's stupid now. And I've heard people recently say that, or politicians say that. But the reality of it is like we don't look upon security as a good thing, like like what you said, we as if it is going to materialize if you think about it. No, like it's that's not what it is at all. But it's up to people like us to dispel that, to challenge people's belief systems. And once you do that, they're like, that's what security is. Like when I'm hired by a company, I get on the platform because the CISO says, we just want our people to care about security. Just please make them care. So I get on the platform and I walk into a room and I'm looking at an audience of 100 people looking at me with scowls on their face, with their arms folded, literally, their arms are folded. And they're looking at me going, okay, security guy, tell me something that I don't already know. And then I start asking them about, you know, passwords and two-factor authentication. I explained to them that 15 billion passwords are exposed in the dark web and show them tools that expose like all their email addresses and how they've all been exposed and how their passwords are out there in the dark web. And they go, oh, and I and they go, so how do you how do you deal with that? Like, how do you manage passwords? I go, how about a password manager? And they go, well, what if the password manager gets hacked? Like, you know, like a fatalistic attitude towards a password manager. And I'm like, listen, I've been using a password manager for 22 years. I'm good. You know, I I haven't used the same passcode across two accounts in 20 years, and I haven't been hacked. Like it's a pretty easy process. And it creates the password for you. They're like, oh, and what happens is the arms begin to go down by their side and they physically like lean into the conversation, the scowl goes away, their eyes wide open up a little bit. And as their as their arms go down, their hands begin to go up because now they're asking questions. Like now they want to know, you know, like now they're like interested in this topic. Like, oh, I I've never known any of this because no one's ever actually had a conversation with them. Like the fact that like that that CISOs are the some of the most brilliant people on the planet, literally, and that like they haven't actually sat down at a hands-on and talked about their mom and how their mom can't stop clicking links, and how their dad keeps getting sucked into all these pop-ups, and how like their sister, who might be a widow, keeps getting like hooked on romance scams, and so on and so forth. Like all the problems that we all have haven't been humanized by all the tech execs that understand this stuff and haven't humanized it for their employees. They've just fallen into the security compliance trap and they're stuck in that. But there's a better way to do it.
SPEAKER_00One of the advantages of having someone like you talk about security and awareness training is that it's not coming from another vendor that's trying to sell you something. Do you think that some of the resistance to security by organizations is due to the fact that there's so many vendors trying to sell you something? And of course, you know, we're gonna school you about vulnerability management and password um security, and then obviously the only way that you can fix that problem is to buy our tool for$9.95 per month.
SPEAKER_01It is awful. It is awful. Do you know that I don't ever speak at security conferences? Ever. Do you know why? Because they want to charge me to get in the platform to speak. They want me to they want to charge me money to speak on security awareness and how to better yourself. Because every single person on the platform paid to be there. So of course, if they're paying to be there, they're gonna shove their message down the audience's throat. Of course they are. I mean, that's how these conferences are designed. It's like a it's like a sad monopoly. And it's unfortunate. And so they're really just getting one-sided information. There isn't a dialogue at all. It's here's our solution. You can choose us or the other guys, here's our features, here's our benefits, this is the nature of the problems that we solve. And they're selling you something, yeah. But when it comes to what I do, I'm not paying to get in a platform to really talk about human nature and what I call the human blind spot and security appreciation and the strategic human firewall, which are things that, like, if you adopted these basic methodologies, you actually would begin to change hearts in order to change minds.
SPEAKER_00Yeah. What I like about you is that you are the product in a way. You're not trying to deliver this message in order to sell something. The message is the value, you know, like just listening to you talk and kind of getting an idea of, you know, looking at cybersecurity as a necessity, not just for businesses, but normal people. And I really like your your approach. Not fear-mongering, not catering to the worst sides of us, you know, that kind of feed into the anxiety and the paranoia that may accompany security, but really leaning into coming the nerves and saying security is a good thing. It's not something that's there to signal panic. I like your approach to that.
Building A Strategic Human Firewall
SPEAKER_01Look at Abraham Maslow's hierarchy of human needs. At the base of that triangle are our physiological needs, consuming food and fluids and getting a good night's rest. And right above that is safety, security, stability, structure, protection. And above that is like love and belongingness, you know, self-actualization, all that fun stuff that makes us, you know, interesting human beings. But the but the base stuff, like we need, you know, and so that is not expressed in security awareness training at all today. So I come from a background where I started teaching personal protection to real estate agents, actually, even before that, to young women and young women in my life, back when I was a teen, and to real estate agents in my early 20s because realtors are murdered. And teaching personal protection back in the day, we're talking, you know, 80s and 90s, meant physical violence prevention, you know, and theft prevention. And so my small business back then, I had a '95, I had an IBM PS1 consultant, which is the make and model of uh my PC that had a Windows 3.0 OS and 150 megabyte hard drive. And I had to get an install a card in order to connect to AOL for dial-up internet. And my PC had the ability to function as a point of sale because I had software to do so to process credit cards for products and services that I sold. And I got hacked. I lost thousands of dollars in uh credit card fraud in the 95. And so now I'm speaking about personal protection as it relates to violence and theft prevention. And I've just been essentially robbed over AOL on my computer. Thousands of dollars. I did not know that that was a thing. And so when I reached out to my credit card company, like, what happened? You know, the merchant, my merchant status, they explained to me. And I'm figuring, like, this is like a new form of theft that I was unaware of. But if that can happen to me, that can happen to anybody. So I started to speak to that in the early 90s or mid-90s. And obviously, like it's just gotten massive. And then around that same time, municipalities started in the late 90s started to post social security numbers on the web because they didn't know any better. And identity theft started to become a problem, pure identity theft, opening up new lines of credit under people's names. So I started to speak about that too. And I've been doing that now for 30 years. But people still don't freeze their credit. They're still using the same passcode across multiple accounts. And this all boils down to because we as humans don't engage in risk effectively, because we look at security as a bad thing. And so if we go from right now putting the cart before the horse, which is fishing simulation training, which is that, you know, that that that unfortunate security fatigue is caused by the compliance trap bombarding employees with complex and personal rules that trigger security aversion. It just does. That false sense of security felt by meeting regulatory requirements while the actual behavior remains unchanged. How long are we going to do that for? As long as we're compliant? Or we engage in like recognizing risk at the human level, talking to the person where they are in their lives. Like my entire philosophy of It revolves around the fact that like all security truly is personal. And what that really means is the core belief that people protect what they love. You know, by teaching somebody to like secure their child's digital footprint, their own identity, their bank accounts, their passwords, protecting their parents from all these pop-ups and scammy links from pig butchering, right? By teaching someone to protect themselves, you create more secure employees at work. Right. And I call this the strategic human firewall. And like we all know what a firewall is, right? But like the strategic human firewall is someone who understands how to block deception. It's a proactive governance, a mindset that turns employees or consumers, citizens from passive targets into an active detection layer. It's a shift from I trust what I see to I verify everything. And this turns into what I call security appreciation. Okay. So we all know what security awareness is. Security appreciation is the shift from awareness, which is knowing, to appreciation, which is caring. Okay.
SPEAKER_00You know, I never I never thought of that, Robert. That's a really good. Maybe the problem is we keep calling it security awareness, not security practice. Appreciation. Yeah, or appreciation. It's just that I'm aware of it. Okay, cool. Mission accomplished.
SPEAKER_01What do you want from me? Exactly. So, like just in the brief conversation you and I you and I have had, you are already the strategic human firewall. Because you don't respond to a phone call or an email or a text message or a knock at the door for that matter, without like looking for the risk in this inbound communication. You're looking to decipher what's happening right here. Not because you worry, not because you're paranoid, because you understand what risk actually is. You have a proper perspective on risk is something that you manage. It's not something that you worry about. It's not something that you fear. It's not something that you function in denial about. It's just like one of those facts of life that, like, if you eat like good, clean vegetables and proteins and drink fluids versus eating, you know, fast foods and sugar all day long. Like the difference between the two is one is healthy, one is not. Like you understand the basics of that stuff, which most people understand that with food, but they still eat messy, right? But the reality of it is when it comes to security, people don't even give it a second thought. It can't happen to me, and they're stuck with that. We fix the security appreciation gap, which essentially is that chasm between an employee's intellectual understanding of risk, which is again awareness, and the emotional commitment to act on that knowledge, which is appreciation. And I call this the kitchen table effect, which is that multiplier effect where successful training ends with the employee teaching the concepts to their family at home, cementing those lessons for life. Like that's what it should be.
SPEAKER_00Okay. Okay.
SPEAKER_01But you don't get that with compliance training. You don't get that with fishing simulation training.
SPEAKER_00Yeah ever. So you turn employees into champions, essentially, and they sell security to others. And so it it sounds like that might have a compound effect on society. I hadn't I haven't heard anybody articulate it in that way or at all, really. And that's an interesting concept.
SPEAKER_01Think of it like this leaders are are missing the wetware vulnerability. Wetware is like your brain versus, you know, software, right? Technology blocks malicious code, but it cannot patch the human biological default to trust. Okay. We have a cognitive gap where social engineering bypasses logic through manufactured urgency. It's a fact, right? The strategic human firewall, we recognize that when emotions spike, technical awareness vanishes. Leaders must close this gap by training the brain to recognize these psychological hooks, transforming employees from a liability into a proactive human sensor network, which is kind of what you alluded to, you know? But we don't we can't begin that process until we break down what security is, which is about gaining control, versus what it isn't. Paranoia, worry, fear, it can't happen to me, denial, like all these myths and misnomers and misconceptions. We've got to get everybody on the same page first. Then we can say, okay, here are the risks now. This is what you be aware of. Now you get everybody to drink the Kool-Aid. Mm-hmm.
SPEAKER_00Yeah. Awesome. I know you got to run, Robert. Do you have time for one question? Yeah, man, go for it. Okay. Where do you think AI is going to be a year from now? Where do you think, in from 1% to 100% adoption, where are we right now? And where do you think we're going to be at the end of the year? That is a massive question.
AI Fraud Deepfakes And Voice Clones
SPEAKER_01I'm going to speak from the perspective of how it's being used for fraud. How's that sound? Yeah, great. Because that's my whale house. So I've been saying for you know the 30-something years that I've been presenting, at the end of every single presentation that I do, I've been saying, listen, don't worry about any of this stuff. Just do something about it. The worst thing you could do is nothing. However, now I am officially worried. Why am I worried? Because AI has stripped away the clumsy red flags of traditional fraud. In the past, of course, criminals relied on blunder force phishing, mass blasting emails riddled with scammer grammar. Today, you know, AI allows for high precision impersonation at scale. Criminals use neural puppetry to create perfect lies. By scraping just seconds of audio from social media, they use voice cloning to impersonate a trusted source, like a spouse, CEO, coworker, attorney, with at this point, I would say 100% accuracy. That's debatable, but I that's what I'm seeing. And of course, this weaponizes our biological default to trust, making the deception feel 100% real and human. And AI is now automating, it's automating the grooming process. All those wrong numbered text messages we get is all being done facilitated by humans using AI, right? Normalizing the dialogue and all of this inbound communication, making that lonely human feel warm and welcome by the human on the other end. 25% of all of humanity right now, as we speak, is lonely. It's always been like that. One out of four of us experience loneliness on a regular basis. They call it the pain and the ache of loneliness. It's no different than the pain of hunger pains. Hunger pains make us go towards food. Loneliness makes us go towards humans to procreate. That's normal, right? And so AI removes the manual labor of social engineering, allowing a single predator to pilot thousands of digital puppets simultaneously, bypassing technical firewalls by hacking the human wetware. So in a year, I see the organized criminals in Southeast Asia and elsewhere in the world using the technologies that are getting so much better every single day, right? I see them using this at scale in a way where like there isn't going to be a day where you're not going to get a phone call or an email by somebody that you're associated with that looks like it's them talking to you via a voice call or a FaceTime. Like it's coming. It's already here. But when a year and a half, two years ago, when$25 million was siphoned out of a company, when an employee, a CFO, got on a Zoom call with what he thought were a half a dozen of his coworkers, all using AI face overlay, like that was the template for what to do. 25 million lost in one Zoom call. And what we're seeing with pig butchering, pig butchering is like we're talking hundreds of billions of dollars being lost on a regular basis. I am coming in contact with the victims, like the people that are losing the six figures, the seven figures, your moms and dads. I'm the one they call when that happens, you know? And like I am worried. So the my answer is in a year, it's gonna get awful. It's gonna be awesome what they do. Awesome, not in a good way. Awesome. What they do is awesome. It's awful, but it's awesome, and it's gonna get even better.
Where To Find Robert
SPEAKER_00Yeah, it's it's awesome in its greatness, but not great as in great. Great as in like great. Awful. Like awful. Yeah, I see what you're saying. Like, I get it. If you know, you know. Great as in great. Yeah, yeah, yeah, yeah, yeah, yeah. Well, Robert, this has been a really good conversation. I'm glad that we got a chance to kind of hone in on this. And uh yeah, when you're asking why me, listen to this podcast. Robert, where can people find you if they want to find you and how can they book you if they need to do so?
SPEAKER_01Man, you're so generous. I appreciate you. So listen, if you can spell Siciliano, S-I-C-I-L-I-A-N-O, I'm all over the socials. Of course, LinkedIn. I regularly post to my blog that's followed by, I don't know, like 12,000 or whatever. And uh I'm and then my website, protectnowlc.com, protectnowlc.com.
SPEAKER_00All right, Rob, do you go by Rob?
SPEAKER_01My name being Robert is Robert, Rob, Bob, or Bobby. So whoever you are in my life, you call me whatever.
SPEAKER_00I have this this just this need to call you Rob. I don't know what it is. I don't know if it's because you're from Boston. I'm from Brooklyn, I know a whole bunch of Robs.
SPEAKER_01My dad calls me Rob, so Rob's fine.
SPEAKER_00All right, well, Rob, it was good to talk to you. And um, thanks for listening to this episode of Cybernomics. Check us out on LinkedIn, check out the Cybernomics newsletter, sign up for that on LinkedIn, check me out on LinkedIn, and thanks for listening to this episode of Cybernomics. All right, good. I think we'll get you out here on time.