<?xml version="1.0" encoding="utf-8"?>
<oembed>
  <version>1</version>
  <type>rich</type>
  <provider_name>Libsyn</provider_name>
  <provider_url>https://www.libsyn.com</provider_url>
  <height>300</height>
  <width>600</width>
  <title>Deepfakes &amp;amp; Laptop Farms: How Nation-States Infiltrate the Defense Supply Chain with Luke McNamara</title>
  <description> Cyber threats against the Defense Industrial Base (DIB) don’t stop at the battlefield—they extend into suppliers, perimeter devices, and even hiring pipelines. Luke McNamara of Google’s Threat Intelligence Group joins Frank Cilluffo to unpack Mandiant’s report Beyond the Battlefield: Threats to the Defense Intelligence Base and the patterns it flags across today’s threat landscape. They discuss how the war in Ukraine is shaping targeting priorities, why China’s cyber espionage increasingly begins at the network edge, and how “fast follower” exploit cycles compress patch timelines. McNamara also explains the North Korean IT worker problem, where remote hiring fraud can create both revenue and potential access pathways. The takeaway for mid-sized defense suppliers is practical: harden identity, reduce perimeter exposure, and assume meaningful risk often starts outside traditional corporate visibility.  Main Topics Covered   Why manufacturing remains a top target and a warning sign for broader supply-chain risk  How the war in Ukraine is influencing cyber targeting tied to drones and UAS ecosystems  China’s focus on edge-device compromise (VPNs, routers, email gateways) and why it matters  The “fast follower” dynamic that turns one vulnerability into many intrusions  North Korean IT worker operations, remote hiring fraud, and AI-enabled deception  The highest-leverage defensive priorities for DIB organizations, especially identity and MFA  Key Quotes “Manufacturing is always the most targeted sector going back to 2020. And I think that’s a larger canary in the coal mine.” ­­— Luke McNamara “It’s not just some of these top-tier Chinese APT actors and their ability to leverage these as a zero-day, but the ability for secondary groups, once some of the details leak around a particular vulnerability, to start weaponizing it themselves.” — Luke McNamara “If I had to narrow it down to one category to put more resources to, I would say identity…hardening around the identity piece is certainly key.” — Luke McNamara &amp;quot;Organizations that are more aware of [the North Korean IT worker infiltration], where the security teams have met with their HR folks, their recruiters, helped inform them about the nature of these threats, I think they're a little bit better secured.&amp;quot; — Luke McNamara &amp;quot;It sounds more like a movie than reality, but it's happening.&amp;quot; — Frank Cilluffo Relevant Links and Resources Mandiant report —&amp;amp;nbsp;Beyond the Battlefield: Threats to the Defense Intelligence Base  Mandiant podcast —&amp;amp;nbsp;Defenders Advantage  Guest Bio Luke McNamara is a Deputy Chief Analyst at Google Cloud’s Mandiant Intelligence and part of Google’s Threat Intelligence Group, focused on cyber threat trends and emerging risks. </description>
  <author_name>Cyber Focus: Cybersecurity, National Security, and Critical Infrastructure</author_name>
  <author_url>https://mccraryinstitute.com/podcast/</author_url>
  <html>&lt;iframe title="Libsyn Player" style="border: none" src="//html5-player.libsyn.com/embed/episode/id/40215155/height/300/theme/custom/thumbnail/yes/direction/forward/render-playlist/no/custom-color/88AA3C/" height="300" width="600" scrolling="no"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen&gt;&lt;/iframe&gt;</html>
  <thumbnail_url>https://assets.libsyn.com/secure/content/198921860</thumbnail_url>
</oembed>
