May 31, 2019 By Sue Poremba 4 min read

I will never watch “The Little Mermaid” again without thinking about ransomware and cyberattacks.

Although Ariel agrees to the arrangement with Ursula, the sea witch hijacks the mermaid’s voice, but with a catch. Ariel has to kiss the prince by a predetermined deadline. If she does, her voice is returned. If she doesn’t, Ursula keeps the voice, which you know she plans to use for her own nefarious behavior. Ariel’s voice is like valuable company data, stolen and held for ransom.

During her keynote speech at CPX360 in Las Vegas earlier this year, Maya Horowitz, director of threat intelligence and research at Check Point, used Disney villains to illustrate cyberattacks and add a more relatable touch to security awareness training.

Cybersecurity is like these famous cartoon villains, Horowitz told the audience. Maybe we aren’t being given a poisoned apple by an evil queen disguised as a friendly old woman, but we are getting phishing emails disguised as familiar companies or celebrities offering free iPhones.

In the business world — and in personal life — it can be difficult to tell when those bearing gifts are disguised wrongdoers tricking us into making mistakes so that they can do us harm. Similarly, we may not realize when deceptive cyberattacks are occurring or recognize vulnerabilities within our systems until it’s too late. But perhaps we can improve security awareness training by using pop culture references and gamification techniques to make the critical concepts more relatable.

Cartoons Stick in Our Memory

“The human memory works in a way that new data needs to be ‘glued’ to existing data in order to be processed,” Omer Taran, co-founder and CTO at CybeReady, explained in an email comment.

Using a cartoon or a familiar icon can leverage the power of familiar images, allowing new data to be better absorbed. “The more the existing cartoon has relevant properties that interact with the required new data, the stronger is the impact,” Taran added.

Want your employees to understand how a distributed denial-of-service (DDoS) attack works? Watch the stampede scene from “The Lion King” — and fight to hold back the tears, of course. Wildebeests may not be the perfect analog for botnets, but when you send millions of botnets streaming toward a network, they too can easily strike down a target for as long as they like.

Sleeping Beauty provides a good example of what can happen if your organization isn’t diligent about patching known vulnerabilities. The king and queen were warned that if their infant daughter pricked her finger on a spinning wheel before she turned a certain age, the entire kingdom would fall into a deep sleep. While the royals thought they had found every spinning wheel, one was forgotten and discovered by the princess, and the rest is (fictional) history.

In a similar fashion, one unpatched machine could lead to the takedown of a whole network. It could also be used for advanced persistent threat (APT) attacks. Like the sleeping spell, these attacks are designed to trigger at a later date, and the threat actor disappears long before the damage is done.

Of course, you can move the cartoon analogies away from Disney movies and find cyberattack lessons in virtually any cartoon you enjoy. A day in the life of Bart Simpson, for instance, is like the man-in-the-middle attack; he eavesdrops on his victims and then wreaks havoc.

Security decision-makers may even relate to the story of Wile E. Coyote and Road Runner. Road Runner is always one step ahead of Coyote — the bird sometimes even mocks him after another attempt at containment fails. Cybersecurity sometimes feels like this. Even if all of the elaborate tools and strategies are deployed to catch threat actors before they attack, they sometimes elide our efforts regardless and stick out their tongues when they’re finished. Still, we must carry on and do our best next time.

The Hero Saves the Day

Using Disney villains (or any cartoon or pop reference) as a way to engage and teach people about cyberattacks is part of a greater movement looking to use fun methods to improve training retention and attention. Gamification is growing increasingly popular in security awareness training. People who play video games love competition and earning rewards, so gamifying security education can bring that sense of healthy competition into the workplace for the better.

But as fun as the gaming and competition can be, it’s not for everyone. All employees retain information through different methods. For some, it takes hands-on action and competition for rewards. For others, it takes a visual connection or drawing comparisons between favorite movie scenes and specific real-life scenarios. It may take a combination of these methods to address cyberthreat mitigation across the board.

For example, Vectra, an AI-driven threat detection platform, created its own cartoon characters (to avoid any copyright issues) and uses them as a security teaching tool. It employs villains to personify the phases of the attack life cycle — command and control, internal recon, lateral movement, data exfiltration and botnet monetization. Of course, the superhero, Cognito, comes in to save the day.

This point is perhaps the most important takeaway regarding the ongoing fight for cybersecurity: While the villains are driving the bad action and causing the cyberattacks, in the end, the hero must always come through to save the day. The more your employees know about cyberthreats, the more heroes your organization will have.

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today