Gaya M's Posts (81)

Sort by

Continuous%20Security%20Validation%20Reducing%20Your%20Organizations%20Attack%20Surface.png?profile=RESIZE_710x

In this segment, we explore key areas critical to enhancing cybersecurity, focusing on multi-factor authentication and security training. By addressing vulnerabilities and promoting awareness, organizations can significantly strengthen their security posture and mitigate potential risks effectively.

 

 

Here is the verbatim discussion:

Identify the areas that are the most critical to you and I'll I'll pick an example here um multiactor authentication so um anyone that you on the front page of the newspaper you'll see uh organizations that or you'll see that criminals are are having these data breaches and they're stealing uh all these records these records end up being username and password and um and what's end up happening is uh with access of service is criminals are able to just you know their main entry point is credential stuffing and they can use automated tools that just go after an organization and then they just keep trying different combinations uh until they find an access to someone and then they get in they move laterally and get to an administrator so an organization can reduce their attack surface significantly just by having multiactor authentication um and it adds that extra layer of uh security in their environment and then there's other areas that are there but um you know that's the the biggest area um the other area is uh security training overall just making people aware it's a mindset it's a it's a culture and and identifying if I see a fishing email I need to report it and having a process around that and then and then building it over time um so maybe uh doing a simulated fishing exercise that turns into a uh ransing.

 

 Highlights:

 

Multi-Factor Authentication (MFA): Experts highlight the importance of implementing multi-factor authentication as a crucial defense measure against credential stuffing attacks. By requiring additional verification beyond usernames and passwords, organizations can reduce their attack surface and enhance security against unauthorized access.

Security Training and Awareness: The discussion emphasizes the significance of security training in cultivating a security-conscious culture within organizations. Educating employees about phishing threats and promoting a mindset of vigilance can significantly reduce the likelihood of successful cyber attacks. Implementing processes for reporting suspicious emails and conducting simulated phishing exercises can further reinforce security awareness and readiness.

 

Prioritizing multi-factor authentication and security training are essential steps in bolstering cybersecurity defenses. By implementing MFA to strengthen access controls and fostering a culture of security awareness, organizations can mitigate the risk of data breaches and unauthorized access. This segment underscores the importance of proactive measures in safeguarding digital assets and maintaining a resilient security posture in today's evolving threat landscape.

 
 

Speakers:

Brad LaPorte a former army officer with extensive experience in cybersecurity, provides invaluable insights into the evolving landscape of digital threats. With a background in military operations, LaPorte witnessed firsthand the early stages of nation-state cyber attacks, laying the groundwork for his deep understanding of cybersecurity challenges. Through his journey, he has observed the transformation of defense tactics from traditional, labor-intensive methods to modern, cloud-based solutions. LaPorte's expertise offers a unique perspective on the intersection of technology, security, and the underground economy of cybercrime. In this discussion, he shares his experiences and analysis, shedding light on the complexities of cybersecurity in the digital age.

 
 
 
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 
 
 
 

 

 

 

Read more…

Continuous%20Security%20Validation%20Strengthening%20Network%20Security%3B%20Prioritization%20and%20Validation.png?profile=RESIZE_710x

 

In this segment, we explore essential strategies for strengthening cybersecurity defenses, focusing on the importance of patching, device visibility, and continuous testing. By addressing vulnerabilities and maintaining up-to-date systems, organizations can enhance their security posture and mitigate potential risks effectively.

 

 

Here is the verbatim discussion:

And identifying making making sure that you keep up with the patching and and um maintaining the latest and greatest updates on all of your devices and also knowing where those devices are so um you know a lot of times what ends up happening um when I covered ransomware specifically uh as well as endpoint security and and um to ler extent on kind of the internet of things or iot side a lot of organizations just it was over 50% % of organizations didn't know the devices that they had in their environment and if you don't know that it's there and you don't know that there's a door or you know a device that's on your Network that has access to your um to effectively to your crown jewels and the the critical assets that you're trying to protect then you're completely in the blind you're in the dark um so that you know that's that's like the the best easy way to identify the areas where you need to improve and then around that you can actually take action so you can actually Implement uh and and Patch those systems and you can identify and and prioritize that effectively and actually build that into your your risk program now on this is more about ASM right the ASM providing of your infrastructure and and now Gartner is also calling it esm external attex surface management which gives you the full view of your complete digital Jesus not close enough is the answer so um really what it comes down to is um organizations like current state of the the market right now is organizations are really broken up into um kind of five different levels of maturity so it's it's really from zero all the way up to five um and and with that organizations that typically are in the continuous um security testing space and actually doing it on a continuous basis are the upper level five uh Arena and they typically have the budgets to support it ends up being Financial in healthare and to um you basically.

 

Highlights:

Identifying Weak Points and Prioritizing Patching: Experts emphasize the criticality of identifying weak points in network security and prioritizing patching efforts accordingly. By ensuring all devices are updated with the latest patches, organizations can reduce their attack surface and mitigate potential vulnerabilities.

Device Visibility: The discussion highlights the significance of knowing all devices on the network to effectively manage security risks. Many organizations struggle with device visibility, leaving them vulnerable to blind spots and potential security breaches. By maintaining a comprehensive inventory of devices, organizations can better protect their critical assets.

Continuous Security Testing: Experts delve into the importance of continuous security testing in enhancing cybersecurity resilience. Organizations at the highest maturity levels engage in continuous testing to validate their security measures effectively. By adopting a proactive approach to security validation, organizations can stay ahead of emerging threats and strengthen their defense capabilities.

 

Addressing vulnerabilities through patching, maintaining device visibility, and engaging in continuous security testing are crucial steps in bolstering cybersecurity defenses. By implementing these strategies, organizations can mitigate risks effectively and enhance their resilience against evolving cyber threats. This segment underscores the importance of proactive measures in safeguarding digital assets and maintaining a robust security posture in today's dynamic threat landscape.

 

Speakers:

Brad LaPorte a former army officer with extensive experience in cybersecurity, provides invaluable insights into the evolving landscape of digital threats. With a background in military operations, LaPorte witnessed firsthand the early stages of nation-state cyber attacks, laying the groundwork for his deep understanding of cybersecurity challenges. Through his journey, he has observed the transformation of defense tactics from traditional, labor-intensive methods to modern, cloud-based solutions. LaPorte's expertise offers a unique perspective on the intersection of technology, security, and the underground economy of cybercrime. In this discussion, he shares his experiences and analysis, shedding light on the complexities of cybersecurity in the digital age.

 
 
 
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

Read more…

Continuous%20Security%20Validation%20Advancing%20Cybersecurity%3B%20A%20Proactive%20Approach.png?profile=RESIZE_710x

 

In this segment, we explore a strategic approach to enhancing cyber resilience within organizations, emphasizing the "crawl, walk, run" methodology. By starting small and gradually advancing security measures, organizations can effectively improve their security posture.

 

 

Here is the verbatim discussion:

And what I've recommended over the years is uh taking the approach of crawl walk run so start small and and identify what your current state is figure out in Baseline you where you are from a security posture perspective and there's tons of organizations out there that can do these assessments there's tons of templates and and things out there that you know at given your organization you should be you you're currently at a level one or level two and your goal should be to get to the next level whether it's two or three and um identifying all those areas and how you can make that you can step from one area to the next and then from there you know ultimately kind of the the the key areas that organizations end up um fall you not prioritizing effectively and and can really um increase their of it wasn't anywhere near where it is today um and over the the past you know really 10 years a lot of things have have really moved to the cloud and there's been a lot of automation a lot of things like machine learning and artificial intelligence and a lot of these great tools that have U been brought to the market that allow us to to provide better defense uh against these types of attacks the the downside to that is those same tool same tools are actually available to criminals as well and although organizations have gone through their digital transformation you over the past 10 years um so is the the the hacking community and the criminals at large and and basically what's ended up happening is there's um a a giant ecosystem it's a it's a whole underground economy where you have uh.

 

Highlights:

Crawl, Walk, Run Methodology: Experts advocate for a phased approach to cybersecurity improvement, beginning with assessing the organization's current security posture. By identifying baseline security levels and prioritizing areas for enhancement, organizations can strategically progress from one security level to the next.

Utilizing Assessment Tools and Templates: Various organizations offer assessment tools and templates to help organizations evaluate their security posture effectively. By leveraging these resources, organizations can identify areas for improvement and develop a roadmap to advance their security maturity.

The Evolution of Cyber Threats: The discussion highlights the evolution of cyber threats over the past decade, with attacks increasing exponentially. The emergence of an underground economy, where nation states collaborate with criminal groups, has heightened the sophistication of cyber attacks, posing significant challenges for organizations.

Harnessing Technology for Defense: While advancements in technology, such as cloud computing, automation, machine learning, and artificial intelligence, have provided organizations with better defense capabilities, they have also empowered cybercriminals. The availability of these tools to both defenders and attackers underscores the importance of proactive security measures.

 

 Adopting a strategic approach to cybersecurity, starting with assessing the current state and gradually advancing security measures, is essential for building cyber resilience. By prioritizing effective security measures and leveraging available resources and technologies, organizations can mitigate risks and strengthen their defense against evolving cyber threats. This segment emphasizes the importance of proactive and adaptive cybersecurity strategies in safeguarding digital assets and maintaining resilience in the face of emerging threats.

 

Speakers:

Brad LaPorte a former army officer with extensive experience in cybersecurity, provides invaluable insights into the evolving landscape of digital threats. With a background in military operations, LaPorte witnessed firsthand the early stages of nation-state cyber attacks, laying the groundwork for his deep understanding of cybersecurity challenges. Through his journey, he has observed the transformation of defense tactics from traditional, labor-intensive methods to modern, cloud-based solutions. LaPorte's expertise offers a unique perspective on the intersection of technology, security, and the underground economy of cybercrime. In this discussion, he shares his experiences and analysis, shedding light on the complexities of cybersecurity in the digital age.

 
 
 
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

Read more…

Continuous%20Security%20Validation%20Navigating%20the%20Dynamic%20Cybersecurity%20Landscape.png?profile=RESIZE_710x

 

In this segment, we delve into the evolving cybersecurity landscape, where nation-state actors and ransomware groups continuously exploit small windows of opportunity to compromise systems. We explore the changing attacker landscape and the significance of continuous security validation in addressing emerging cybersecurity challenges.

 

 

Here is the verbatim discussion:

and then scan the entire University Network because internet during those days was not so much there outside and then try to compromise systems so interestingly what has happened is the same thing today is being done by the nation state actors they're just looking for that window of small opportunity and whenever that opportunity is there they would like to grab it right the same is true for ransomware guys so the adversary is doing this continuously in terms of looking for that one single opportunity for a few minutes or few hours as well as the number of changes that's happening is also at that same frequency right the release frequency people do release every day so obviously there is something which is changing in the attacker landscape in the overall industry landscape um so so I would love to ask you this question around that what what are some of these interesting um evolutionary aspect that you have noticed in the industry and with that we'll segue into this topic of why should we move into something like continuous security validation why continuous security validation is important and and of course what is continuous security validation so it'll be great to know a little bit of your perspective on the evolution but give the intro, highlights of keypoints with side headings and conclusion for the above content with the good blog
 
 
Highlights:

 

Evolutionary Aspects in the Industry: We examine the intriguing evolutionary aspects observed in the cybersecurity industry. From the shifting tactic of attackers to the increasing frequency of changes, there are notable transformations reshaping the cybersecurity landscape. This section provides insights into key developments driving these changes.

The Importance of Continuous Security Validation: Transitioning to the topic of continuous security validation, we explore why it has become crucial in today's cybersecurity environment. We discuss the significance of continuously assessing and validating security measures to adapt to evolving threats effectively. This section highlights the importance of proactive measures in mitigating risks and enhancing cybersecurity resilience.

Understanding Continuous Security Validation: We delve deeper into the concept of continuous security validation, providing clarity on its definition and purpose. By continuously monitoring and validating security controls, organizations can identify vulnerabilities and weaknesses promptly, enabling proactive remediation and threat mitigation.

 

We emphasize the necessity for organizations to adapt to the evolving cybersecurity landscape by embracing continuous security validation. By staying ahead of emerging threats and vulnerabilities, organizations can enhance their security posture and effectively mitigate cybersecurity risks. This segment underscores the importance of proactive approaches in safeguarding digital assets and maintaining resilience in an ever-changing threat environment.

 
 
 

Speakers:

Brad LaPorte a former army officer with extensive experience in cybersecurity, provides invaluable insights into the evolving landscape of digital threats. With a background in military operations, LaPorte witnessed firsthand the early stages of nation-state cyber attacks, laying the groundwork for his deep understanding of cybersecurity challenges. Through his journey, he has observed the transformation of defense tactics from traditional, labor-intensive methods to modern, cloud-based solutions. LaPorte's expertise offers a unique perspective on the intersection of technology, security, and the underground economy of cybercrime. In this discussion, he shares his experiences and analysis, shedding light on the complexities of cybersecurity in the digital age.

 
 
 
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 
 
Read more…

Continuous%20Security%20Validation%20Strengthening%20Cybersecurity%20Defenses%3B%20Insights%20and%20Strategies.png?profile=RESIZE_710x

 

In this deeper dive into cybersecurity, Brad LaPorte explores the current state of industries in terms of their maturity and the available testing capabilities. He acknowledges the escalating sophistication of hackers and attackers, prompting a closer examination of where organizations stand today and the arsenal of tools at their disposal for defense.

 

 

 

Here is the verbatim discussion:

And what you mentioned um is something really really pertinent so so let's dive deeper uh into the topic of like where do you see the industries today so we know the hackers and attackers has become very sophisticated so where where is the industry today that's say part one and uh part two let's also look into what's the state of industry in terms of the types of testing available Etc so both the maturity and also what's in the kit of the Defenders cor yeah and basically um I'll kind of weave in where organizations are today with your Bas and red timming can give you the um depth but a narrow one narrow Focus depth but that's more point in time but cart is making it more automated right so um so that's how if we kind of create a 2 by two metrics I mean then you can place all these various things uh into that so that's very interesting uh Brad so so let's uh get into the next part which is um around like if an organization has to or wants to build a capability around continuous security validation uh uh what what how should they build a program what should be the kind of high level program structure what are the critical capabilities what I call the human element so they'll get in through fishing or social engineering you know they'll convince you knock on the door and and you know try to figure out a way to get into your your organization and it's really just a it's typically an outside in view you know it's like if I was an attacker how would I break into this house how would they break how would I break into your infrastructure it helps identify those weak points so you can address it and sometimes it ends up being um areas where you know it might be on uh email security because of fishing or social engineering it might be just uh security awareness training and leveling up your people in terms of being aware of these types of scenarios and then it might be.
 
 
Highlights :
 

Industry Maturity: LaPorte assesses the maturity levels of industries in combating cyber threats, highlighting the increasing sophistication of attackers. He identifies a need for organizations to align their defenses with emerging threats, emphasizing the importance of proactive measures in the face of evolving attack vectors.

Available Testing Capabilities: Delving into the toolkit of defenders, LaPorte discusses the types of testing available to organizations, ranging from traditional red teaming to the more automated approach of continuous attack response testing (CART). He emphasizes the importance of addressing vulnerabilities through comprehensive testing methodologies and proactive security measures.

High-Level Program Structure: Brad LaPorte outlines the high-level program structure for building a continuous security validation program, stressing the need for a structured approach and critical capabilities. He highlights the human element in security testing, emphasizing the importance of addressing vulnerabilities from an outside-in perspective and investing in security awareness training.

 

In conclusion, LaPorte's insights underscore the need for organizations to adapt and strengthen their cybersecurity defenses in response to the evolving threat landscape. By embracing proactive measures, leveraging available testing capabilities, and implementing structured security validation programs, organizations can enhance their resilience against sophisticated cyber threats and safeguard their digital assets effectively.

 

Speakers:

Brad LaPorte a former army officer with extensive experience in cybersecurity, provides invaluable insights into the evolving landscape of digital threats. With a background in military operations, LaPorte witnessed firsthand the early stages of nation-state cyber attacks, laying the groundwork for his deep understanding of cybersecurity challenges. Through his journey, he has observed the transformation of defense tactics from traditional, labor-intensive methods to modern, cloud-based solutions. LaPorte's expertise offers a unique perspective on the intersection of technology, security, and the underground economy of cybercrime. In this discussion, he shares his experiences and analysis, shedding light on the complexities of cybersecurity in the digital age.

 
 
 
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

Read more…

Continuous%20Security%20Validation%20Advancing%20Cybersecurity%20Practices%20in%20the%20Modern%20Era.png?profile=RESIZE_710x

 

Brad LaPorte provides valuable insights into the current state of cybersecurity practices, emphasizing the need for organizations to embrace continuous security testing and proactive approaches to breach mitigation. He identifies five levels of maturity within organizations and highlights the growing adoption of continuous security testing, particularly among upper-level enterprise.

 

 

Here is the verbatim discussion:

Jesus uh not close enough is the answer so um really what it comes down to is um organizations like current state of the the market right now is organizations are really broken up into um kind of five different levels of maturity so it's it's really from zero all the way up to five um and and with that organizations that typically are in the continuous um security testing space and actually doing it on a continuous basis are the upper level five uh Arena and they typically have the budgets to support it ends up being financial and health care and to um you basically the global 500 that are in that aspect it's starting to go Downstream though which is great because I'm starting to see uh that you know in the lower levels uh uh areas there organizations are starting to get involved and then there's um a lot of manage detection response and and manage security um service providers that are integrating these types of security testings as part of their their larger stack so and they're automating a large portion of it which you ultimately makes it ideal for it to be 247 365 and implementing things like red you know automated red uh continuous automated red team or cart uh attack surface management and identifying you know where the actual attack surface today and that's a very important mindset like accepting that there will be those breaches h i see it more now than I have I ever have in the past two decades but it's not anywhere near where uh it needs to be and unfortunately um the root cause of a lot of what exists today is um it's nimi it's not in my backyard so it's not going to happen to me it's going to happen to somebody else and it's not until it's someone that's close to them so if they're in the industry say they're in retail and um they're the biggest competitor.

 

Highlights:

Continuous Security Testing: LaPorte discusses how organizations at the highest maturity level (level five) are actively engaged in continuous security testing, supported by robust budgets, particularly in financial and healthcare sectors and among global 500 companies. He notes a positive trend of adoption among organizations at lower maturity levels, facilitated by managed security service providers who integrate automated testing into their offerings.

Automated Testing and 24/7 Vigilance: The integration of continuous security testing into larger security stacks by managed service providers enables organizations to achieve 24/7 coverage. LaPorte highlights the importance of automated red team testing and attack surface management in identifying and mitigating potential vulnerabilities proactively.

Acceptance of Breach Inevitability: Despite growing awareness, LaPorte notes that acceptance of breach inevitability remains inadequate, with many organizations still adopting a "not in my backyard" mentality. He emphasizes the need for a cultural shift towards proactive cybersecurity practices, citing the prevalence of this mindset as a root cause of existing vulnerabilities.

 

LaPorte's insights underscore the critical importance of continuous security testing and proactive breach mitigation strategies in today's cybersecurity landscape. By embracing these practices, organizations can enhance their cyber resilience and better protect their assets against evolving threats. However, there remains a significant cultural barrier to overcome, with many organizations still failing to acknowledge the inevitability of breaches. Addressing this mindset is essential to fostering a proactive cybersecurity culture and effectively mitigating risks in an increasingly complex threat environment

 

Speakers:

Brad LaPorte a former army officer with extensive experience in cybersecurity, provides invaluable insights into the evolving landscape of digital threats. With a background in military operations, LaPorte witnessed firsthand the early stages of nation-state cyber attacks, laying the groundwork for his deep understanding of cybersecurity challenges. Through his journey, he has observed the transformation of defense tactics from traditional, labor-intensive methods to modern, cloud-based solutions. LaPorte's expertise offers a unique perspective on the intersection of technology, security, and the underground economy of cybercrime. In this discussion, he shares his experiences and analysis, shedding light on the complexities of cybersecurity in the digital age.

 
 
 
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

Read more…

Continuous%20Security%20Validation%20Navigating%20the%20Complexities%20of%20Modern%20Cybersecurity.png?profile=RESIZE_710x

 

 

In this enlightening conversation with Brad LaPorte, a seasoned cybersecurity analyst, we explore the ever-evolving landscape of cyber threats. LaPorte draws from his extensive experience working with both SMBs and large enterprises to provide invaluable insights into the mindset shifts necessary to combat modern cyber adversaries effectively.

 

 

Here is the verbatim discussion:

Days was not so much there outside and then try to compromise systems so interestingly what has happened is the same thing today is being done by the nation state actors they're just looking for that window of small opportunity and whenever that opportunity is there they would like to grab it right the same is true for ransomware guys so the adversary is doing this continuously in terms of looking for that one single opportunity for a few minutes or few hours as well as the number of changes that's happening is also at that same frequency right the release frequency people do release every day what I call the human element so they'll get in through fishing or social engineering you know they'll convince you knock on the door and and you know try to figure out a way to get into your your organization and it's really just a it's typically an outside in view you know it's like if I was an attacker how would I break into this house how would they how would I break into your infrastructure it helps identify those weak points so you can address it and sometimes it ends up being um areas where you know it might be on email security because of fishing or social engineering it might be just uh security awareness training and leveling up your people in terms of being aware of these types of scenarios and then it might be um actionable advice as I go along and um the number one piece of advice that I have to organization s is uh to uh fully Embrace horizontally and vertically throughout your organization and and it goes above and beyond just your own four walls to have the right mindset that you will eventually be breached so do you see that mindset I mean do you see and you have worked with both the smbs and the large Enterprises do you see that mindset today and that's a very important mindset like accepting that there will those breaches huh I see it more now than I have I ever have in the past two decades but it's not anywhere near where uh it needs to be and unfortunately um the root cause of a lot of what exists today is um it's nimi it's not in my backyard so it's not going to happen to me it's going to happen to somebody else and it's not until it's someone that's close to them so if they're in the industry let say they're in retail and um they're the biggest competitor.

 

Highlights:

Evolving Cyber Threats: LaPorte highlights the persistent tactics employed by both nation-state actors and ransomware groups, who continuously seek small windows of opportunity to compromise systems. He emphasizes the rapid pace of technological change, mirroring the release frequency of security updates, and the necessity for organizations to remain vigilant against emerging threats.

Tactics Employed by Attackers: Discussing the human element of cyber attacks, LaPorte delves into the various methods utilized by attackers, including phishing, social engineering, and exploiting infrastructure weaknesses. He underscores the importance of adopting an "outside-in" perspective to identify and address vulnerabilities proactively, ranging from email security measures to comprehensive security awareness training.

Embracing a Cybersecurity Mindset: LaPorte advocates for organizations to fully embrace the mindset that breaches are inevitable, extending security measures beyond their own perimeters. While acknowledging a growing acceptance of this mindset, he highlights the prevalent "not in my backyard" mentality that persists within many organizations, emphasizing the need for a cultural shift towards proactive cybersecurity practices.

 

As the cyber threat landscape continues to evolve, organizations must remain adaptive and proactive in their approach to cybersecurity. LaPorte's insights underscore the critical importance of vigilance, comprehensive security measures, and a shift towards a mindset that acknowledges the inevitability of breaches. By embracing these principles, organizations can better prepare themselves to mitigate risks and safeguard their digital assets effectively in an increasingly complex threat environment.

 
 
 

Speakers:

Brad LaPorte a former army officer with extensive experience in cybersecurity, provides invaluable insights into the evolving landscape of digital threats. With a background in military operations, LaPorte witnessed firsthand the early stages of nation-state cyber attacks, laying the groundwork for his deep understanding of cybersecurity challenges. Through his journey, he has observed the transformation of defense tactics from traditional, labor-intensive methods to modern, cloud-based solutions. LaPorte's expertise offers a unique perspective on the intersection of technology, security, and the underground economy of cybercrime. In this discussion, he shares his experiences and analysis, shedding light on the complexities of cybersecurity in the digital age.

 
 
 
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

Read more…

Continuous%20Security%20Validation%20The%20Evolution%20of%20Cyber%20Attacks%20Over%20Two%20Decades.png?profile=RESIZE_710x

 

The speaker, a former army officer, reflects on their experience encountering nation-state cyber attacks early in their career. They describe the evolution of cybersecurity tactics, from traditional forensic methods to modern cloud-based and automated solutions.

 

 

 

Here is the verbatim discussion:

 

So you know starting off um i was a an army officer in the military and you know we got to see some of the nasty nation-state attacks very early on during that time period and um that really just evolved over time and uh you know the traditional ways that we would go about things you're really it was kind of like men in black where we would you know get on a plane and we would bring the suitcases and we'd get out the empty the forensics tools and we'd rip out the hard drives and we try to dig through logs and figure out what happened um and it was a really heavyweight approach but you know ultimately the frequency of it uh and the overall impact and sophistication of it wasn't anywhere near where it is today um and over the the past you know really 10 years a lot of thingshave really moved to the cloud and there's been a lot of automation a lot of things like machine learning and artificial intelligence and a lot of these great tools that have been brought to the market that allow us to provide better defense against these types of attacks the the downside to that is those same two same tools are actually available to criminals as well and although organizations have gone through their digital transformation yeah over the past 10 years so is the the the hacking community and the criminals at large and and basically what's under up happening is there's a giant ecosystem it's a it's a whole underground economy where you have uh nation state governments working with criminal organizations and vice versa and it's effectively the criminal organization it's become a workforce and you can actually get in there and you can uh you know basically at any given time you can outsource a criminal activity and you can do ransomware as a service or you can go after a supply chain or access as a service all these things are at a click of a button for a few fractions of a bitcoin or some kind of exchange of uh finances so you know with that uh the the number of attacks that have occurred over the over the years has definitely increased exponentially and it's almost every year is like the worst year on record for the number of breaches and really overall the regulations across the world haven't been able to keep up and with that there's been a lot of defense.
 

 

Evolution of Cybersecurity Tactics: In the past, cybersecurity investigations resembled scenes from "Men in Black," with teams traveling to physically extract data and analyze it manually. However, with the shift to cloud computing and the advent of tools like machine learning and AI, defense strategies have become more sophisticated.

The Rise of Automation and AI: The proliferation of cloud technology has facilitated automation and the integration of AI and machine learning into cybersecurity defenses. While these advancements enhance security measures, they also empower cybercriminals, who have access to the same tools and technologies.

The Underground Economy of Cybercrime: The speaker highlights the emergence of an underground economy where nation-states collaborate with criminal organizations. This ecosystem enables criminal activities to be outsourced, with services like ransomware-as-a-service and supply chain attacks readily available for a fee.

Escalating Cyber Threats: As organizations undergo digital transformations, cyber threats continue to escalate. The frequency and sophistication of attacks have increased exponentially, making each year seemingly worse than the last in terms of breaches and security incidents.

Regulatory Challenges: Despite the growing threat landscape, global regulations have struggled to keep pace. The speaker notes the inadequacy of current regulatory frameworks in addressing cybersecurity challenges effectively.

 

The speaker's firsthand experience underscores the dynamic nature of cybersecurity threats. While technological advancements offer improved defense capabilities, they also empower malicious actors. As cybercrime continues to evolve, organizations and regulators must collaborate to develop robust strategies that effectively mitigate risks and protect digital assets.

 

Speakers:

Brad LaPorte a former army officer with extensive experience in cybersecurity, provides invaluable insights into the evolving landscape of digital threats. With a background in military operations, LaPorte witnessed firsthand the early stages of nation-state cyber attacks, laying the groundwork for his deep understanding of cybersecurity challenges. Through his journey, he has observed the transformation of defense tactics from traditional, labor-intensive methods to modern, cloud-based solutions. LaPorte's expertise offers a unique perspective on the intersection of technology, security, and the underground economy of cybercrime. In this discussion, he shares his experiences and analysis, shedding light on the complexities of cybersecurity in the digital age.

 
 
 
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

 
 
 
 

 

Read more…

Communicating%20Risk%20To%20Board%20Members%20%20Visual%20Risk%20Communication.png?profile=RESIZE_710x

In the realm of risk communication, simplicity and clarity are paramount when conveying complex information to management or board members. While traditional models like the 5x5 matrix are widely used, some organizations opt for a more intuitive approach, such as using heat maps, to present risk data. This discussion explores the effectiveness of heat maps as a tool for risk communication and their potential advantages over numerical-based models.

 

 

 

Here is the verbatim discussion:

 

Some people do that and the boards respond to it quite well some stick with the standard ordinal and and math and that seems to work well some people don't even put the numbers and simply do a heat map i had one company i worked for where reporting upstairs um was literally just the red yellow green heat map but in a very nice gradient manner without the numbers words there but not numbers there of likelihood and impact and um arrows with the dot and the line and the triangle at the end to show we started here and we got to there and you can show where we reduced likelihood dramatically but impact stayed the same or we managed to both or whatever.
 
 
 

Highlights:

Simplified Visual Representation: Heat maps offer a simplified visual representation of risk, replacing numerical values with color gradients (e.g., red, yellow, green) to denote varying degrees of risk severity. This intuitive approach eliminates the need for complex numerical interpretations and facilitates quick comprehension by stakeholders.

Board Response: Despite the absence of numerical data, boards often respond positively to heat maps due to their clarity and ease of understanding. The visual impact of color gradients effectively conveys risk trends and allows stakeholders to identify areas of concern at a glance.

Demonstrating Risk Trends: Heat maps can effectively demonstrate risk trends over time by highlighting changes in risk likelihood and impact. Arrows and symbols within the heat map can illustrate the progression of risk management efforts and showcase areas where likelihood has been reduced, impact mitigated, or both.

 

Incorporating heat maps into risk communication strategies offers organizations a simplified yet powerful tool for conveying risk data to management or board members. By leveraging visual cues and color gradients, heat maps enhance clarity and facilitate quick decision-making, making them a valuable addition to the risk management toolkit.

 
 
 
Speakers:
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

Allan Alford was in the CISO/CTO at TrustMAPP, a cybersecurity performance management company. With 20+ years in information security, he has served as CISO four other times in three industries. Alford parlayed an IT career into a product security career and then ultimately fused the two disciplines.

He has led security efforts in companies from five employees to 50,000 and executes a risk-based approach to security, as well as compliance with many, many frameworks. Alford gives back to the security community via The Cyber Ranch Podcast and by authoring articles and speaking at conferences. Alford holds a Master of Information Systems & Security, a Bachelor of Liberal Arts (with a focus on leadership) and a now-expired CISM certification.

 

 https://twitter.com/AllanAlfordinTX

https://www.linkedin.com/in/allanalford/

 

 

 
 

 

Read more…

Communicating%20Risk%20To%20Board%20Members%20Risk%20Communication%20Made%20Easy.png?profile=RESIZE_710x

 

Effective communication of risks to management or board members is crucial for informed decision-making within organizations. One commonly used model for this purpose is the 5x5 matrix, which assesses risk based on likelihood and impact. While this model is popular and resonates well with many boards, it also faces criticism within the industry.

 

 

 

Here is the verbatim discussion: 

How would you uh communicate that risk to themanagement or board members right so the traditional model of the 5x5 matrix likelihood and impact and you know high medium low etc it's the most popular model it's a model that many boards respond to well and and it's a model that will resonate with those boards there are plenty of detractors in our industry who will point out that that likelihood impact is is a messed up mess um some people will talk about how the scales are ordinal and yet some people use it as a multiplicative in other words  five and five is twenty-five not ten uh you multiply the numbers instead of adding them which with an ordinal scale makes no sense but helps to demonstrate the drama of this is really bad this is really good you know 1 to 25 is a much more pronounced scale. 

 

Highlights :

Traditional Model: The 5x5 matrix, with its categorization of risk into high, medium, and low based on likelihood and impact, is widely adopted and understood by boards.

Model Criticisms: Despite its popularity, some industry critics argue that the likelihood-impact scale within the 5x5 matrix is flawed. One critique is the treatment of scales as ordinal rather than multiplicative, leading to potential misinterpretation.

Multiplicative Approach: Despite criticisms, some organizations opt for a multiplicative interpretation of the 5x5 matrix, where the numerical values represent a more pronounced scale of risk severity. This approach aims to emphasize the magnitude of risks and their potential impact.

 

While the 5x5 matrix remains a prevalent tool for risk communication, it's essential to acknowledge its limitations and potential for misinterpretation. Organizations should consider the nuances of risk communication and tailor their approach to effectively convey the severity of risks to management or board members.

 

Speakers:
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

Allan Alford was in the CISO/CTO at TrustMAPP, a cybersecurity performance management company. With 20+ years in information security, he has served as CISO four other times in three industries. Alford parlayed an IT career into a product security career and then ultimately fused the two disciplines.

He has led security efforts in companies from five employees to 50,000 and executes a risk-based approach to security, as well as compliance with many, many frameworks. Alford gives back to the security community via The Cyber Ranch Podcast and by authoring articles and speaking at conferences. Alford holds a Master of Information Systems & Security, a Bachelor of Liberal Arts (with a focus on leadership) and a now-expired CISM certification.

 

 https://twitter.com/AllanAlfordinTX

https://www.linkedin.com/in/allanalford/

 

 

Read more…

Effective risk communication to management or board members is essential for informed decision-making. This clip explores various models and approaches for communicating risk, ranging from traditional methods to more visually-oriented techniques.

 

 

Here is the verbatim discussion:

How would you uh communicate that risk to the management or board members right so the traditional model of the 5x5 matrix likelihood and impact and you know high medium low etc it's the most popular model it's a model that many boards respond to well and and it's a model that will resonate with those boards there are plenty of detractors in our industry who will point out that that likelihood impact is is a messed up mess um some people will talk about how the scales are ordinal and yet some people use it as a multiplicative in other words  five and five is twenty-five not ten uh you multiply the numbers instead of adding them which with an ordinal scale makes no sense but helps to demonstrate the drama of this is really bad this is really good yo know 1 to 25 is a much more pronounced scale some people do that and the boards respond to it quite well some stick with the standard ordinal and math and that seems to work well some people don't even put the numbers and simply do a heat map i had one company i worked for where reporting upstairs um was literally just the red yellow green hea map but in a very nice gradient manner without the numbers words there but not numbers there of likelihood and impact and um arrows with the dot and the line and the triangle at the end to show we started here and we got to there and you can show where we reduced likelihood dramatically but impact stayed the same or we managed to partially reduce likelihood and impact both or whatever.
 
 
 

Highlights :

Traditional 5x5 Matrix: Likelihood and Impact

  • Widely used model for risk communication.
  • Some critics highlight issues with ordinal scales and multiplication.
  • Boards often respond well to this model due to its familiarity.

Alternative Approaches:

  • Some use multiplication of likelihood and impact for dramatic effect.
  • Others opt for a simple red, yellow, green heat map without numerical values.
  • Visual aids like arrows and symbols can enhance understanding of risk trends and mitigation efforts.

 

Risk communication requires tailoring to the audience's preferences and understanding. Whether utilizing traditional 5x5 matrices or visual heat maps, the goal is to convey risk effectively to facilitate informed decision-making by management or board members.

 
 
Speakers:
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

Allan Alford was in the CISO/CTO at TrustMAPP, a cybersecurity performance management company. With 20+ years in information security, he has served as CISO four other times in three industries. Alford parlayed an IT career into a product security career and then ultimately fused the two disciplines.

He has led security efforts in companies from five employees to 50,000 and executes a risk-based approach to security, as well as compliance with many, many frameworks. Alford gives back to the security community via The Cyber Ranch Podcast and by authoring articles and speaking at conferences. Alford holds a Master of Information Systems & Security, a Bachelor of Liberal Arts (with a focus on leadership) and a now-expired CISM certification.

 

 https://twitter.com/AllanAlfordinTX

https://www.linkedin.com/in/allanalford/

 

 

Read more…

Unveiling%20Iranian%20Cyber%20Aggression%20Black%20Shadows%20Ransomware%20Tactics.png?profile=RESIZE_710x

 
 

This video delves into the cyber attack orchestrated by the group Black Shadow on an Israeli insurance company, Sherbet. Despite using common hacking techniques like web shells and credential harvesting, the attack garnered attention due to the group's strategic use of media exploitation.

 

 

 

 

Here is the verbatim discussion:

 

The mainblow and the leakage of an act to a very interesting company, an insurance company in israel called Sherbet and they were attacked by a so-called group with the acronym of black shadow the main difference in this attack again nothing really fancy not any fancy tools nothing was unique it wasn't any what we used to see as an apt type of style with really sophisticated tools but very common things like web shells credentials harvesting some very normal payloads they use very simple wipers i'm not mistaken written in dotnet they use some custom trojans which we're also going to see later on they use ssh tunnels etc reverse proxy to leap to to hack the organization really a normal organization with a really you know basic security should have been able to stop them but for some reason they were not able to but the main difference here and this is why we also call it an info op but what the group here and by this time it was actually pretty obvious it was iranian a group called fox kittens uh by clear sky for example  they used telegram to lick and cause quite a panic in israel they heavily exploited the israeli media to amplify the attack and they did it in let's say in chunks so to get more atmosphere and show it was a really big hack and quite from there it was quite obvious that it's not an extortion attempt it's mainly someone trying to look at the stuff we even thought she'll be really bad but after that because some of the languages and the way they operated and the adversarial tools it was quite clear that this is an iranian campaign trying to make israel look bad and of course ransomware was not ransom was not paid etc

 

 

Highlights :

Attack Details:

  • The attack on Sherbet involved basic hacking methods like web shells and credential harvesting, indicating a lack of sophisticated tools.
  • The attackers utilized simple wipers and custom trojans, along with SSH tunnels and reverse proxies to infiltrate the organization.

Media Exploitation:

  • Black Shadow leveraged Telegram to leak information, causing widespread panic within Israel.
  • The group heavily utilized Israeli media platforms to amplify the impact of the attack, strategically releasing information in stages to create a sense of urgency and scale.

Attribution:

  • The attack was attributed to the Iranian cyber group, Fox Kittens, by cybersecurity experts like Clear Sky.
  • The exploitation of media and the nature of the attack indicated a deliberate attempt by Iran to tarnish Israel's reputation rather than a typical extortion scheme.

 

 

The Black Shadow attack on Sherbet serves as a stark example of how cyber warfare extends beyond technical infiltration. By exploiting media channels, the attackers aimed to magnify the perceived impact of the attack, underscoring the strategic nature of cyber operations in modern geopolitics.

 
 

Speaker:

 

Omri Segev Moyal is a renowned cybersecurity expert known for his expertise in ethical hacking and vulnerability research. With a background in computer science and extensive experience in the cybersecurity industry, Moyal has made significant contributions to enhancing digital security and raising awareness about cyber threats. His work spans across various domains, including penetration testing, malware analysis, and security research, making him a respected figure in the cybersecurity community.

 

https://www.linkedin.com/in/omrimoyal/

https://twitter.com/GelosSnake

 
 
 

 

 

Read more…

Unraveling%20Cyber%20Warfare%20Insights%20from%20a%20Two-Year%20Campaign%20and%20a%20Cybersecurity%20Entrepreneur.png?profile=RESIZE_710x

The CISO Platform Summit welcomes attendees to a decade-long journey of collaboration and knowledge-sharing among senior security executives, fostering a safer online world. Omri Sejkov, CEO of Profero, presents a captivating session on Iranian cyber threats in the Israeli cyberspace, titled "Same Kitten, Different Name." Despite pandemic restrictions, the virtual platform enables engaging presentations, with hopes of in-person interactions in the future.

 

 

Here is the verbatim discussion:

 

Hello everyone on behalf of the ciso platform i welcome you to our summit and to this session it's been 10 years since we started cso platform community with the vision of collaboration and learning among senior security executives we thank all our members for promoting knowledge and making the online world safer together the community today has grown over forty thousand plus subscribers globally our primary goal has been to create tangible community goods and as a community we have created more than 1000 checklists frameworks and security training material that are available absolutely free for all. World um my name is omri sejkov and i'll be presenting today a presentation about iranian threats in the israeli cyberspace same kitten different name it's a pleasure being here uh despite with all the covered restrictions um ability to do such uh presentation remote is really inspiring so hopefully you will enjoy it and hopefully next year i'll be able to reach you everyone in person so a little bit about myself and the company i'm the ceo of profeso por favor is an instant response company with global customers all over the world we were founded in january 1st 2020 right before you know the outbreaks of uh kovit we got employees from basically almost every corner of the world new zealand uh australia us and israel of course we are headquarters in israel um before profero i helped co-founded mineoverlaps which is an innovative endpoint security and i was the city of clear sky uh cyber intelligence a boutique cyber intelligence company in israel.
 

 

 

Highlights:

 

Community Growth: The CISO Platform community boasts over forty thousand global subscribers, united in the mission of creating tangible community goods. Over the years, the community has generated over a thousand checklists, frameworks, and security training materials, freely accessible to all, promoting collaborative learning and cybersecurity awareness.

 


As Omri Sejkov takes the virtual stage to delve into the realm of Iranian cyber threats, attendees anticipate valuable insights into this pressing cybersecurity issue. With a decade of community collaboration and the expertise of cybersecurity leaders like Omri, the CISO Platform Summit continues to drive impactful discussions and initiatives in the cybersecurity landscape, paving the way for a safer digital future.

 
 

Speaker:

 

Omri Segev Moyal is a renowned cybersecurity expert known for his expertise in ethical hacking and vulnerability research. With a background in computer science and extensive experience in the cybersecurity industry, Moyal has made significant contributions to enhancing digital security and raising awareness about cyber threats. His work spans across various domains, including penetration testing, malware analysis, and security research, making him a respected figure in the cybersecurity community.

 

https://www.linkedin.com/in/omrimoyal/

https://twitter.com/GelosSnake

 
 
 

 

Read more…

Unveiling%20Cyber%20Threats%20Exploiting%20Vulnerabilities%20and%20Geopolitical%20Intricacies.png?profile=RESIZE_710x

 

 

In this discussion, we unravel a recent cyber attack campaign that targeted organizations by exploiting vulnerabilities in Fortinet devices. We also delve into the geopolitical complexities surrounding cyber warfare and intelligence operations, shedding light on the intricate dynamics between nations like Iran and Israel.

 

 

 

 

Here is the verbatim disussion:

Welcome back so another attack um they had a wave of uh exploiting organizations and we were kind of interested to know why they came back they were they had their fortinet capability they were using that but how did they get back and this specific organization for example they actually patched the so-called fortinet vulnerability so we were trying to dig really deep and understand how they got in and we throughout our research we found the wipers we found indications of them using xero logon we found in the case of using the same ipsec helper they were using in other attacks and we're also using the same telegram leaks and the same media attention so it was obviously the same group but we were not quite sure how they got in and then we digged in a bit and surprised to price another fortinet vulnerability this time from july 2020. Something crazy that needs to be uh discussed i think that in certain operations for example countries should be aware that in some info campaign maybe should take some act and you know reduce media or maybe the media itself should take some responsibility on their actions which i probably think they wantfast forwarding a bit remember when you spoke about intelligence uh operations and international ntelligence reactor someone who used to work in the uh minister of defense home he was uh doing cleaning operations etc kind of takingcare of the house um really really you know up by the israeli the guy had many previous convictions and when he saw that the black shadow is looking for information about israel etc he communicated with them if i'm not mistaken over a telegram and he was trying to get money from them in exchange for leaking data from the minister home uh he was actually got arrested he was arrested by the shin bed and then later with the from the policeand there he was charged and he was charged upon sending them proofs andcommunicating with them as well the israeli government and the reason i'm showing it is it's really interesting in the uh claim they did not literally say it's iran it's really interesting the government is not yet officially claimed anywhere publicly however in you know in in closed calls etc everybody's saying it's iran but publicly officially even in this case they did not attribute to iran they attribute the public claims of companies and the media that this is so called an iranian group it's really interesting and this is bring me to once we looked at all of the timeline and there are some things that i missed out and on purpose it's basically because i'm trying to build this story of what actually happens and not speak about every specific attack but it really brings me to the final notes and the final notes we need to learn from it is number one there is an active operation of iranian trade actors against israel by the way of course i'm biased um israeli there is an active operation of israel in iran as well so i'm not trying to hide it but i'm only speaking from one side here and this presentation is completely biased i'm not trying even to hide it my main claim here is one in your case in your country you probably are suffering from similar attacks for example u.s has been attacked by china and other and even iran as well and iran is also being attacked by us and israel and there's many attacks all over the world russia is attacking us and many other countries threat groups attacking france the one thing you can take here from is that don't trust your government and don't believe your government will help you during an attack in most cases government prefer to stay on the side although the attacks are against private uh private companies from a threat actor that is allegedly a government based do not trust them to help you.
 
 

 

Highlights :

Exploiting Patched Vulnerabilities: The attackers returned despite organizations patching the Fortinet vulnerability, using advanced tactics like wipers and exploiting additional vulnerabilities, including the XeroLogon flaw. This highlights the attackers' persistence and adaptability.

Geopolitical Intricacies: We explore the geopolitical landscape of cyber warfare, discussing how countries conduct intelligence operations and engage in cyber attacks against each other. The case of an Israeli government official communicating with a cybercriminal group underscores the complexity of attributing cyber attacks to specific nations.

Government Assistance During Cyber Attacks: The discussion raises questions about the role of governments in assisting private companies during cyber attacks. Despite the prevalence of state-sponsored cyber attacks, governments may not always provide adequate support to affected organizations.

 

This discussion serves as a stark reminder of the evolving nature of cyber threats and the geopolitical complexities that underpin them. Organizations must remain vigilant, prioritize cybersecurity measures, and be prepared to navigate the intricate landscape of cyber warfare with or without government assistance.

 
 

Speaker:

 

Omri Segev Moyal is a renowned cybersecurity expert known for his expertise in ethical hacking and vulnerability research. With a background in computer science and extensive experience in the cybersecurity industry, Moyal has made significant contributions to enhancing digital security and raising awareness about cyber threats. His work spans across various domains, including penetration testing, malware analysis, and security research, making him a respected figure in the cybersecurity community.

 

https://www.linkedin.com/in/omrimoyal/

https://twitter.com/GelosSnake

 
 
 

 

Read more…

First%2090%20Days%20Of%20CISO%20Navigating%20Organizational%20Dynamics%3BInsights%20into%20Business%20Strategy&%20Data%20Management.png?profile=RESIZE_710x

 

In this insightful discussion, two cybersecurity professionals, Matthew and his colleague, delve into the intricacies of understanding organizational dynamics and navigating challenges within the cybersecurity landscape. The conversation touches upon various aspects, including the importance of comprehending an organization's business culture and strategy, the challenges of data management, and the influence of mentorship and continuous learning in career development.

 

 

 

 

Here is the verbatim discussion:

So um jumping on linkedin who do i know that works there or who do i know that used to work there why did someone leave especially if they're in the executive leadership capacity um you know things change and move movement around organizations is not uncommon but i start to really understand looking at the company's website what does their business do uh what what um investment tools do they have where where do they get their revenue from things like that really helps me start to understand what their business culture and business strategy looks like it at least what's available for on the public domain yeah and that's a very important part right i mean without knowing the organization and the business it's very hard to go and then uh figure out how to uh move around  absolutely and matthew you brought up some very interesting points and i found some of those to be a very interesting ones like for example you mentioned about the um inventory right so one of the challenges which i have uh noticed i don't know if you have seen um or face the same or not just knowing where data is who all has got data and how does the data flow i don't know kind of any organization who has kind of nailed this any large organization who has nailed this this such a hard problem right i mean there are of course many asset discovery  understand their language and that will help us to communicate a lot lot better so so great points uh matt which you made and um let's um close with a a few small things um interms of you you had been in the industry for a very very long time right so which which are some of these books or some of the podcasts or some of the people who really influenced you in your journey in in the cyber security field yeah i would say um what the the pivoting point in my career uh came from a mentor it's probably been 10 -15 years ago john petrie who's now the counselor to the ciso at ntt holdings in japan uh he was a manager of mine as a when he was a cso several companies ago  we used to as in the security industry we used to be afraid of or hunting down the shadow i.t organizations because shadow it was doing things in a non-standard way they may have intentionally been hiding and sliding around and preventing security controls that were this department of block right data is another challenge that we have and it's it's probably more our current challenge but there's a lot of lessons that i think we should have learned from shadow i t days and that is shadow data buckets right.

 

 

Highlights:

Understanding Organizational Culture: Matthew emphasizes the significance of researching an organization's business culture and strategy, highlighting the value of tools like LinkedIn and the company's website. This understanding forms the basis for effective navigation within the organization and alignment of security initiatives with broader business goals.

Challenges in Data Management: The conversation shifts to the challenges of data management within organizations, including the complexity of knowing where data resides, who has access to it, and how it flows. Both professionals acknowledge this as a significant and difficult problem, with Matthew suggesting that even large organizations struggle to address it effectively.

Importance of Effective Communication: Matthew underscores the importance of communicating security concepts in a language that business stakeholders understand, emphasizing the need to align language with their priorities to facilitate better communication and collaboration.

Influence of Mentorship and Learning: Matthew reflects on the pivotal role of mentorship in his career journey, citing the influence of his mentor, John Petrie, who helped shape his perspective on cybersecurity. He also highlights the lessons learned from past experiences, such as dealing with shadow IT, and emphasizes the importance of continuous learning and adaptation in the cybersecurity field.

 

 As the discussion concludes, it leaves cybersecurity professionals with valuable insights into navigating organizational dynamics effectively. By understanding organizational culture, addressing data management challenges, and embracing mentorship and continuous learning, cybersecurity professionals can enhance their effectiveness in safeguarding organizational assets and addressing evolving cybersecurity threats. This conversation serves as a reminder of the importance of adaptability, collaboration, and continuous improvement in the cybersecurity field.

 
 
Speakers:
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

Matthew Ireland serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure. With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders. serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure.

With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders.

https://www.linkedin.com/in/mdireland/

 

 

 
 
 
Read more…

First%20Month%20as%20a%20CISO%20Building%20Relationships%2c%20Strategy%20Alignment%2c%20and%20Employee%20Integration.png?profile=RESIZE_710x

 

 

 

In this insightful discussion, a new Chief Information Security Officer (CISO) shares their top priorities for the first month on the job. Emphasizing the importance of building relationships, understanding the business strategy, and assessing the alignment of the current security strategy, the conversation provides valuable insights for cybersecurity professionals stepping into leadership roles

 

.

 

 

Here is the verbatim discussion:

Thoughts what what are your top kind of priorities as i see so during the first one month yeah so definitely continue to build relationships continue to understand the business strategy but now that you're getting into the week four week five um you should start to understand current alignment of the current security strategy and start to propose and socialize opportunities for improving uh the security strategy it's it varies from place to place why are you then why are you in week five where'd the last guy go and is the last person uh that was in the role uh successful uh were they you know uh was there was their security strategy supporting the business and by by week four week five you should start to know um some of the some of that information uh it it's very important to make sure and validate or to create a complete and accurate inventory not not just of security assets uh all the security folks will tell you can't protect what you don't know you don't have uh but from a cso it's more about strategy and so not just a cmdb or a complete and accurate inventory of hardware but also services that you provide not i don't mean apache services  me out for lunch and gives me a break from the hr schedule i've worked for places where that was actually scheduled um but right after that where's where's the restroom and where where's your office and where how do you get around the building right just the the the creature comforts of your new home is important uh but much more important over that first several days is to start building relationships hopefully started to build relationships before day one uh in a  level organization you really should be starting way before day zero or day one for building those relationships start as i mentioned earlier start looking at what the public facing strategy of the business looks like but once on board as a cso you should start to find out who's the other executives that are driving the business structure the business strategy what does that structure look like and how do you establish relationships with those other peers of yours.

 

 

 

Highlights:

Building Relationships: The CISO stresses the significance of continuing to build relationships during the first month, highlighting the importance of establishing connections with key stakeholders within the organization. By fostering relationships early on, the CISO can lay the foundation for effective collaboration and support.

Understanding Business Strategy: Another priority during the initial month is gaining a deeper understanding of the organization's business strategy. By delving into the intricacies of the business model and goals, the CISO can align security initiatives with broader organizational objectives and priorities.

Assessing Security Strategy Alignment: As the first month progresses, the CISO emphasizes the need to assess the alignment of the current security strategy and identify opportunities for improvement. By understanding the successes and shortcomings of past security efforts, the CISO can propose and socialize strategies for enhancing cybersecurity posture.

 

As the discussion concludes, it leaves cybersecurity professionals with valuable insights into the key priorities for a new CISO during their first month on the job. By focusing on relationship-building, understanding business strategy, and evaluating security strategy alignment, the CISO can lay the groundwork for effective leadership and drive meaningful impact within the organization. This discussion serves as a valuable resource for cybersecurity leaders navigating the complexities of their roles and seeking to make a positive difference in safeguarding organizational assets and interests.

 

Speakers:
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

Matthew Ireland serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure. With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders. serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure.

With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders.

https://www.linkedin.com/in/mdireland/

 

 

 

Read more…

First%2090%20Days%20Of%20CISO%20Navigating%20the%20Landscape%20of%20Cybersecurity%20Leadership%3B%20Insights%2c%20Challenges%2c%20and%20Strategies.png?profile=RESIZE_710x

 

 

 

In this insightful discussion, Matt Ireland introduces himself as the Chief Information Security Officer (CISO) for NTT Research, highlighting his extensive experience in various security roles within NTT. He discusses his transition from external consulting to internal security roles, emphasizing his current focus on the security organization of NTT Research. Additionally, the conversation shifts towards the importance of leadership and team-building books, particularly in the context of inheriting established teams.

 

 

 

 

Here is the verbatim discussion:

Will take it from there okay so my name is matt ireland i am the ciso for ntt research uh ntt research is a research and development arm of nippong telephone and telegraph uh actually nippong telegraph and telephone out of japan i've been with ntt for several years in different roles working backwards i was a consultant providing virtual cso consulting services to external clients now i'm focused internal to the security organization of ntt research as well the uh i was the cso for ntt security uh providing uh security resources internally to ntt security and uh before that many other security assignments with operations and it problem management and i t infrastructure long time before that  right so that that's a very important part and also i have um i know you are a avid reader of books and uh i have seen some interesting books on this topic so let me ask you this question are there some books etc which you typically pick up any any interesting favorite books on this topic or even otherwise so so not not so much like how to look at the culture but um from a leadership perspective um actually on on my desk is uh clifton strengths uh strength finders building your teams and as a leader especially coming in as a new leader assuming that there's there's an established team um i'll talk a little bit later about um comes across in a specific manner their financial safety whatever it is  security if we look at it from the perspective of that here we are to safeguard the business we are here to safeguard the interest of each of you i think  and i was talking about like aligning our language with the business try to understand our language and trying to explain what dlp is about i think is much better we try to understand their language and that will help us to communicate a lot lot better so so great points uh matt which you organization who has nailed this this such a hard problem right i mean there are of course many asset discovery tools which does things from outside in but that's only one part of the view if you think about it in a holistic manner it's a very very big challenge right um and knowing who all got access so data inventory access like who got access to which systems this is another big challenge which um we i typically see organizations struggle with uh there are a lot of privileged users and nobody knows those guys i  mean or they're not at the top of the mind and ciso is not aware of it so just having that what you mentioned from the department.

 

 

 

Highlights :

Professional Background and Role: Matt shares his journey within NTT, from consulting to his current role as CISO for NTT Research. His experience spans various security assignments, including providing internal security resources for NTT Security and tackling operational and IT infrastructure challenges.

Leadership and Team-Building Insights: The conversation explores Matt's favorite books on leadership and team-building, highlighting the importance of leveraging individual strengths and building cohesive teams. He mentions "Clifton Strengths Finder" as a valuable resource for new leaders inheriting established teams, emphasizing the significance of understanding team dynamics and maximizing strengths.

Aligning Security Language with Business Priorities: Matt emphasizes the importance of aligning security language with business priorities, shifting the focus from traditional security perspectives to safeguarding business interests. By understanding and communicating in terms relevant to the business, cybersecurity professionals can enhance communication and demonstrate the value of security initiatives.

Challenges in Asset Discovery and Access Management: The discussion concludes with insights into the challenges organizations face in holistically discovering assets and managing access to systems. Matt highlights the complexities of asset discovery and access management, emphasizing the need for comprehensive solutions to address these challenges effectively.

 

 As the discussion draws to a close, it leaves readers with valuable insights into the multifaceted role of a cybersecurity leader and the importance of effective communication, leadership, and addressing complex challenges. Matt's experience and perspectives provide valuable guidance for cybersecurity professionals navigating the dynamic landscape of cybersecurity leadership. Overall, this conversation serves as a valuable resource for cybersecurity professionals seeking to enhance their leadership skills and drive meaningful impact within their organizations.

 
 
 
Speakers:
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

Matthew Ireland serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure. With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders. serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure.

With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders.

https://www.linkedin.com/in/mdireland/

 

 

 
 

 

Read more…

First%2090%20Days%20Of%20CISO%20Empowering%20Cybersecurity%20Leadership%3B%20Transformation%2c%20Communication%2c%20and%20Connection.png?profile=RESIZE_710x

 

In this insightful conversation, the speakers delve into the intricate world of cybersecurity, focusing on the challenges of data protection, business alignment, and effective communication with organizational leaders. The discussion highlights the importance of understanding where data resides and building relationships with business leaders to demonstrate the value of cybersecurity in supporting overall business strategy.

 

 

 

Here is the verbatim discussion:

There there's as you as you mentioned there's all this data whether it's on individuals hard drives  i once saw a chief legal officer that put all of his important documents on his hard drive uh we had to have a disaster recovery business continuity discussion about how fragile his hard drive is um we have data everywhere in this industry and data leakage protection there's solutions and tools that say they'll discover thing but who has access is actually easy once you know where the data is most systems you can right click and look and see who has access but you can't right click on something you don't know where it lives building those relationships with those leaders to show that you have value to their business strategy not a security value not a dlp value not a intellectual uh property leakage value but that you're supporting the business once you're successful in getting the business leader to recognize that you are a business leader then they want to learn about security for their business value where i made mistakes in the past as i came in as the security expert and demanded the business leaders do the security things and i was so  right you have like so many acronyms and nobody cares for those right so so how to bring in uh business alignment how how to change our language because a lot of times i hear the ciso saying oh those guys don't understand security and and stuff like that and i think um it's very unfair to expect them to learn security they do what they do very well it's probably important for us to communicate it to them in the right way so matt what are some of your tactics and strategies to convert  i try to recognize being humble and seeking to understand listening to understand it's very easy to listen to a conversation and take notes of what you're going to respond to or listen for where the speaker is making a mistake so that you're prepared to show how you're smarter than you're the smartest guy in the room um that that just doesn't work so um i i really believe that going in and asking questions seeking to understand taking notes actual listen to what they're there for in my current environment uh at ntt research i am surrounded by folks that have no less than two phds most of the people have more than two phds in completely different subject matter cardiology and and physics like totally different um people and these guys are true geniuses that i work with um i have a lot to learn from them and and the the thing every every monday night i sit down with uh several researchers and i learn two to three new topics or papers that are being written and it's hard for me i think i'm a smart guy.

 

 

Highlights :

Data Protection and Business Alignment: The conversation begins with a discussion on the challenges of data protection and the necessity of building relationships with organizational leaders. Emphasizing the importance of demonstrating cybersecurity's value in supporting business strategy, the speakers underscore the need for a shift in language and perspective to align with broader organizational goals.

Effective Communication Strategies: The dialogue transitions to effective communication strategies for bridging the gap between cybersecurity experts and business leaders. Rather than dictating security measures, the speakers advocate for humility, seeking to understand, and active listening as key tactics for engaging with stakeholders and conveying the importance of cybersecurity in a language that resonates with their priorities.

Continuous Learning and Collaboration: Lastly, the conversation highlights the significance of continuous learning and collaboration within the cybersecurity field. Matt shares his experience of surrounding himself with experts from diverse backgrounds, emphasizing the value of humility and a genuine desire to learn from others, even those outside the traditional realm of cybersecurity.

 

 

As the discussion concludes, it leaves listeners with valuable insights into the evolving landscape of cybersecurity leadership. The emphasis on building relationships, effective communication, and continuous learning underscores the dynamic nature of the field and the importance of adaptability in addressing complex challenges. By adopting a holistic approach that integrates technical expertise with business acumen and interpersonal skills, cybersecurity professionals can drive meaningful impact and contribute to the success of their organizations.

 

 

Speakers:
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

Matthew Ireland serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure. With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders. serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure.

With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders.

https://www.linkedin.com/in/mdireland/

 

 

 
 
 
 
 

 

Read more…

First%2090%20Days%20Of%20CISO%20Elevating%20Cybersecurity%20Leadership%3B%20Aligning%20Strategy%2c%20Communication%2c%20and%20Expertise.png?profile=RESIZE_710x

 

 
 
The speakers delve into the transformative power of self-assessment, team building, and aligning with business strategies within the cybersecurity domain. The discussion begins with the story of creating a fictional resume, which served as a gap assessment tool, guiding the speaker's journey to becoming a Chief Security Officer (CSO) over six to eight years. The narrative highlights the importance of recognizing and addressing personal and professional gaps to achieve career goals.

 

 

 

 

 

Here is the verbatim discussion:

 

Was uh to bring my resume and actually i brought two he gave me directions to bring my real resume that was truthful and also to bring a complete fake resume a total made-up fictional resume that made the fictional resume was me being qualified for a cso position that was currently posted in the area and so i had seen on the job description bachelor's degree required master's degree preferred experience in consulting experience in program or software development all these things that were not me and and what was an interesting you mentioned it earlier a gap assessment for many things that we do uh the difference between my fictional resume and my actual resume was the gaps right uh which became a to-do list for the next six to eight years and since then i've been a cso in two companies and um have completed my master's degree and have uh filled in every aspect of the gaps with the exception of software development i i'm never gonna be a software developer and and i'm just gonna be okay with that uh but all of the other gaps got filled so stablished team um i'll talk a little bit later about um a complete and accurate inventory but one of the things that's really important is to do an inventory of your team i personally do not want to surround myself with people that think like me act like me make decisions like me because then we'll all do the terrible things that i do i want to surround myself with people that think differently than me and act differently than me so that together we can achieve more on the the the task at hand so um so that that first before i get there or that initial stage is really about identifying the strengths and weaknesses of your team uh hopefully you already know your own strengths and weaknesses uh if not you should definitely be be working on that but um starting to build your team that reports to you or or within your organizational structure and then start to expand out what's the strengths and weaknesses of your peers and and their direct reports and that type of thing yeah that's a great point and in fact um there's some of the things which i have done and and i haven't kind of changed my role too many times by virtue of whatever i typically do but once when we got acquired and then my role changed quite obviously so one of the things which i did which was very important was actually to go and even before joining uh spend a good amount of time with the ceo uh going out may be overused but follow the money so meet the cfo find out where the revenue comes from find out where the expenses come from uh build that relationship so that you can start to understand your own budget but learning the business strategy if uh man if the if it's a manufacturing environment manufacturing quality control those those are things that are important to them the manufacturing area design software development quality assurance all those kind of things are important to those leaders so i  think that what's important is to um find out what that industry think is important right um pharmaceuticals is gonna have intellectual property concerns they're they're gonna have manufacturing quality uh they're gonna have uh fda studies or or statistics those things are important to them uh but completely opposite in the health care uh it's patient it's all patient records there there there's um very little inventions.
 
 
 

Highlights :

Self-Assessment and Career Development: The conversation emphasizes the significance of self-assessment and gap identification in personal and professional growth. The speaker's experience of creating a fictional resume and using it as a roadmap to fill gaps underscores the importance of proactive career development and continuous improvement.

Team Building and Diversity: The discussion transitions to the importance of building diverse teams and surrounding oneself with individuals who think differently. Recognizing the value of diverse perspectives, the speaker advocates for identifying strengths and weaknesses within teams to foster collaboration and achieve collective success.

Alignment with Business Strategy: The conversation concludes with insights into aligning cybersecurity initiatives with broader business strategies. By understanding industry-specific priorities and building relationships with key stakeholders, cybersecurity professionals can effectively contribute to organizational success.

 

As the conversation draws to a close, it leaves listeners with valuable insights into self-assessment, team building, and aligning cybersecurity initiatives with business strategies. The journey from self-assessment to career advancement underscores the importance of proactive career development, while the emphasis on diversity and alignment with business priorities highlights the holistic approach required to thrive in the cybersecurity domain. Overall, the conversation serves as a valuable resource for cybersecurity professionals seeking to navigate their career paths and make meaningful contributions within their organizations.

 
 
 
 
Speakers:
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

Matthew Ireland serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure. With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders. serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure.

With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders.

https://www.linkedin.com/in/mdireland/

 

 

 
 

 

Read more…