Legendary filmmaker Werner Herzog takes on the internet

Master filmmaker Werner Herzog (Grizzly Man, Cave of Forgotten Dreams) examines the past, present and constantly evolving future of the Internet in Lo and Behold: Reveries of the Connected World. Working with NETSCOUT, a world leader in-real time service assurance and cybersecurity, which came aboard as a producer and led him into a new world, Herzog conducted original interviews with cyberspace pioneers and prophets such as PayPal and Tesla co-founder Elon Musk, Internet protocol inventor Bob Kahn, and famed hacker Kevin Mitnick.

These provocative conversations reveal the ways in which the online world has transformed how virtually everything in the real world works, from business to education, space travel to healthcare, and the very heart of how we conduct our personal relationships. The film finds Herzog bringing his distinctive documentarian gifts to bear on a timely topic with typically thought-provoking result. As Herzog himself says regarding his film’s topic: “It is one of the biggest revolutions we as humans are experiencing.” (Werner Herzog, 2016, 98 min, DCP)

“[Herzog’s] commentary is the center, however provisional, of a world that has become a directionless network. His voice is the sound, still present, of human contact.” The Nation

“The shape of things to come is a subject very dear to the hearts of the high-tech evangelists Herzog talks to, and it accounts for the pulse of freakish comedy that beats through ‘Lo and Behold.’ New Yorker

“It’s fascinating, scary (so scary), interesting stuff.” Detroit News

Source: Arttheater

Topics: Social Engineering, Speaking Engagements, Elon Musk, Grizzly Man, penetration testing, Tesla, Werner Herzog, cyber security, internet, PayPal, security awareness training, security consultant, Lo and Behold, malware, simulated phishing, Spam, Cave of Forgotten Dreams, cybercrime, Kevin Mitnick, NETSCOUT

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

AI Voice Cloning: What It Is, and How to Detect Threats

Artificial Intelligence (AI) has reshaped our lives, speeding up learning, content creation, and communication. But with innovation comes a new risk: ..

Read more ›

3 Types of Hacking Seen In 2024 and Predictions For 2025

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at t..

Read more ›

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›
tech-texture-bg