Posted by Gaya M on May 12, 2024 at 6:17pm in Blog
This illuminating discussion explores the shift in perspective from security to business safety within the realm of cybersecurity, emphasizing the importance of understanding and addressing the specific needs of a company's revenue, customers, brand, and finances. Additionally, the conversation shares an inspiring anecdote of a security operations manager's unexpected career transformation after being challenged by a mentor to pursue the CEO role. These intertwined narratives underscore the dynamic nature of cybersecurity leadership and the significance of adopting a holistic approach to safeguarding organizational assets.
Here is the verbatim discussion:
What is more important is safety and by safety i mean business safety so nobody really cares for um security in that way but they care for business safety and we need to understand what kind of safety does the business want run away is it safety from the perspective of that their brand comes across in a specific manner their financial safety whatever it is i mean it's generally what it means is safety so instead of looking at um security from the perspective of security if we look at it from the perspective of that here we are to safeguard the business we are here to safeguard the interest of each of you i think we will have a different kind of point of view and the moment we do that our language is going to change um and he at the time i had an associate's degree i had no idea what i wanted to do when i grew up i was a security operations manager and um doing things well he's got a fascinating book private to ceo uh that is just uh uh interesting read uh quick read but more importantly for me personally uh he sat down with me one day and said what do you want to do when you grow up and and i really didn't know the answer and so um thinking on my feet as slowly as i did i i i just made something up i said well i want your job uh which i wasn't qualified for and and really hadn't thought through the answer to that uh that was around 10 12 years ago and the challenge that he did for me was uh to bring my resume and actually i brought two he gave me directions.
Highlights :
Focus on Business Safety: The conversation emphasizes the shift in focus from traditional security measures to prioritizing business safety. By understanding and addressing the broader needs and concerns of the business, cybersecurity professionals can better safeguard organizational interests and contribute to overall business success.
Inspiring Career Transformation: The anecdote shared highlights the transformative power of mentorship and ambition within the cybersecurity field. Despite lacking a clear career path initially, the individual's journey demonstrates the potential for personal and professional growth through seizing unexpected opportunities and ambitious goals.
As the conversation concludes, it leaves listeners with valuable insights into the evolving landscape of cybersecurity leadership. The emphasis on prioritizing business safety and seizing unexpected career opportunities underscores the dynamic nature of the field and the potential for personal and professional growth. By adopting a holistic approach to cybersecurity and embracing challenges with ambition and determination, professionals can make meaningful contributions within the industry and achieve their career aspirations.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Matthew Ireland serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure. With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders. serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure.
With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders.
Posted by Gaya M on May 12, 2024 at 5:56pm in Blog
The speakers express appreciation for the enriching dialogue and highlight the value of sharing strategies and stories within the cybersecurity community. Matt's approach to understanding different industries by immersing himself in complex topics and encouraging firsthand experience resonates as a key takeaway for listeners. The conversation also touches on the importance of research and connections in navigating career opportunities within the cybersecurity industry.
Here is the verbatim discussion:
Anybody else wonderful matt and that's a that's a great way to end the conversation i love this story not just the story i love this strategy i think that is something definitely going to be one of the key takeaways for many of ourmembers of the community and the listeners and i guess there are quite a few interesting topics that has come up as a part of our discussion and i'd love to thank you matt for coming and joining us today thank you so much absolutely thanks for uh inviting me this is this has been a a wonderful time new topics or papers that are being written and it's hard for me i think i'm a smart guy but i'm learning about cryptography algorithms and blockchain new ways of doing blockchain and um ways of doing blood pressures on a grasshopper i mean i'm talking like really wild and crazy things um and and hopefully not everybody is in it that far um under underwater in their industry that they're a ciso in um but seek to understand what they're doing go down and talk to sit down at the at the help desk um for larger organizations for the external help desk or the internal help desk ask a leader to sit down and put the headset on and eavesdrop on the calls with the customers and learn what is actually going on that yeah so good question um obviously the the biggest concern is when and if to take a job um so even even before coming on board officially um i think i'm i'm not unique i do a lot of research with um sites like linkedin uh glassdoor sometimes but that that kind of can can be can be slanted usually uh but i the cyber security and and security in general is a very small world so um jumping on linkedin who do i know that works there or who do i know that used to work there why did someone leave especially if they're in the executive leadership capacity um you know things change and move movement around organizations is not uncommon but i start to really understand looking at the company's website what does their business do uh what what um investment tools do they have where where do they get their revenue from things like that really helps me start to understand.
Highlights :
Gratitude and Community Appreciation: The speakers express gratitude for the engaging conversation and underscore the importance of sharing insights and strategies within the cybersecurity community. This highlights the collaborative spirit and supportive environment within the industry.
Matt's Strategy for Understanding Different Industries: Matt shares his approach of immersing himself in diverse topics and gaining firsthand experience, such as visiting help desks. This strategy fosters a deeper understanding of different industries and enhances professional growth.
Importance of Research and Connections in Career Decisions: The conversation emphasizes the significance of research and connections when considering job opportunities within the cybersecurity industry. Seeking insights from trusted sources and understanding company dynamics can help professionals make informed career decisions.
As the conversation draws to a close, it leaves listeners with valuable insights and strategies for navigating the cybersecurity landscape. The emphasis on gratitude, community support, and continuous learning underscores the collaborative nature of the industry. Matt's approach to understanding different industries through immersion and firsthand experience serves as a valuable takeaway, encouraging professionals to adopt a proactive approach to career development. By leveraging research and connections, cybersecurity professionals can make informed decisions and thrive within the dynamic and interconnected world of cybersecurity.
Speakers:
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Matthew Ireland serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure. With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders. serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure.
With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders.
In the complex world of cybersecurity, bridging the gap between technical experts and business stakeholders is paramount for effective communication and collaboration. However, business leaders often find themselves lost in a sea of acronyms and technical jargon, making it challenging to grasp the importance of cybersecurity initiatives. This discussion explores strategies for aligning cybersecurity language with business priorities, emphasizing the need for relationship-building and insightful questioning to uncover valuable insights.
Here is the verbatim discusssion:
So let's matt get into a deeper into another topic which is very interesting which is how to align with the business language now when you go to business they really don't care about dlp and casbi and esmand carter or sas and dust and is and cyber security is the land of alphabet soup right you have like so many acronyms and nobody cares for those right so so how to bring in uh business alignment how how to change our language because a lot of times i hear the cso saying oh those guys don't understand security and and stuff like that and i think um it's very unfair to expect them to learn security they do what they do very well it's probably important for us to communicate it to them in the right way and of course you can use some tools etc but you can't find everything at the end of the day you need to sit across the table and have a chat with that guy and learn how to of course first build the relationship because if you don't build relationship they are not going to be with you but even after that having the ability to ask insightful question so what are the things do you do so how do you get that data where is that data so understanding it through so you have to become uh like a sherlock holmes and do that right conversation but not like the sherlock holmes who would go and uh just ask all these crazy questions but through a very relationship driven manner more like a probably psycho psychoanalyst or some psychotherapist kind of approach and then figure things o understanding it through so you have to become uh like a sherlock holmes and do that right conversation but not like the sherlock holmes who would go and uh just ask all these crazy questions but through a very relationship driven manner more like a probably psycho psychoanalyst or some psychotherapist kind of approach and then figure things so so that's very very important and a lot of times people miss that and as a result what happens is like you you build a fort but then you build the fort either on the wrong hill or on one part of the hill or partially and stuff like that so that becomes super important.
Highlights :
Aligning Language with Business Priorities: Business stakeholders are often disengaged by technical jargon and acronyms commonly used in cybersecurity discussions. To effectively communicate with them, cybersecurity professionals must translate complex concepts into language that resonates with business objectives and concerns.
Building Relationships: Establishing strong relationships with business stakeholders is essential for fostering collaboration and trust. By taking a relational approach akin to a psychotherapist, cybersecurity professionals can create a conducive environment for open dialogue and information sharing.
Asking Insightful Questions: Rather than bombarding stakeholders with technical inquiries, adopting a thoughtful, investigative approach can yield valuable insights. By asking targeted questions in a relationship-driven manner, cybersecurity professionals can uncover the intricacies of business operations and data handling practices.
In the realm of cybersecurity communication, success lies in the ability to bridge the gap between technical expertise and business priorities. By aligning language with business objectives, building relationships, and asking insightful questions, cybersecurity professionals can effectively convey the importance of security initiatives and collaborate with stakeholders to strengthen defenses against cyber threats. Embracing a relational, psychotherapist-like approach ensures that cybersecurity efforts are built on solid foundations, leading to more robust and resilient defenses in the ever-evolving landscape of cyber threats.
Speakers:
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Matthew Ireland serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure. With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders. serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure.
With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders.
Posted by Gaya M on May 8, 2024 at 10:52pm in Blog
Embark on a journey of strategic planning and preparedness as we explore the nuances of conducting tabletop exercises effectively. Our narrative unfolds with a discussion on the optimal approach to conducting these exercises, whether as a single comprehensive session or broken down into two parts. The decision to break it into two steps serves as a prelude to a deeper exploration, allowing for a more thorough examination of responses and templates. Join us as we delve into the strategies for maximizing the effectiveness of tabletop exercises, ensuring that real insights and readiness emerge from these sessions beyond mere preparedness.
Here is the verbatim discussion:
Then we decided that we're going to meet once more and go deep so what we did was it was like a Prelude to the next exercise which is where we are going to go deep so what we kind of did was instead of doing it in one go we decided to do it in two steps so Dan what had been your experience like typically do you suggest like go for like this a a single round exercise or do you think sometimes breaking it into two parts is interesting any thoughts on how to make it very effective so that some real stuff come out of it so our goal had been not just to kind of be mentally prepared but also to create those responses and to create those templates so that out of that exercise we have some real Readiness apart from the kind of preparedness from the kind of thinking perspective Etc but get all these things written down so what's your thought on that in terms of doing it uh as a single exercise or breaking it down yeah most of the times I've seen it done um again most of my I I I have been a part of couple in the private sector.
Highlights :
Strategic Planning for Tabletop Exercises: Our exploration begins with a deliberation on the structure of tabletop exercises, with a focus on whether to conduct them as a single session or in two parts. This decision is informed by the desire to not only be mentally prepared but also to create tangible responses and templates for future reference.
Optimizing Effectiveness: Delve into the considerations for maximizing the effectiveness of tabletop exercises, emphasizing the importance of generating real insights and readiness. By breaking the exercise into two steps, organizations can delve deeper into responses and templates, fostering a more thorough understanding of potential scenarios and responses.
As our exploration draws to a close, we are reminded of the importance of strategic planning and preparedness in conducting tabletop exercises effectively. Whether conducted as a single session or broken down into two parts, these exercises serve as valuable tools for enhancing organizational resilience and readiness. Join us in embracing the principles of strategic planning and preparedness as we navigate the dynamic landscape of cybersecurity and crisis management, empowered by the insights gained from thoughtful deliberation and collaborative engagement.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on May 8, 2024 at 10:38pm in Blog
Embark on a journey of insight and innovation as we explore the dynamics of feedback-driven improvement and the importance of creating engaging environments for tabletop exercises. Our narrative begins with an examination of the 'hot wash' process, a vital component of post-exercise feedback where participants reflect on their experiences and offer insights for improvement. Whether conducted through surveys or interactive discussions, the hot wash fosters critical thinking and encourages executives to explore innovative solutions beyond their usual confines. Furthermore, we delve into the significance of removing distractions and fostering focused engagement during tabletop exercises, akin to the immersive experience of having a meaningful conversation over dinner with friends or loved ones. Join us as we navigate the intersection of feedback-driven improvement and immersive environments, empowering organizations to optimize the effectiveness of tabletop exercises in bolstering cybersecurity resilience.
Here is the verbatim discussion:
I talked about the hot wash in my example a little bit a few minutes ago whether you call it a hot wash whether you call it feedback um you know maybe you do it in a in a survey you know we do this with customer service all the time and other types of things like that is you know what did you think was reasonable what could we have done better next time um what um you know and you get some some pretty sophisticated answers from some executives um you know around you know it gets them thinking it gets them thinking outside the box it changes things up from their normal environment um I've even seen people say and this is another little side tip don't do don't do you know go to um you know go to an offsite go somewhere else.But you know getting people out of their normal environment so they're not like going back and checking their email all the time or you know we had people who disrupted they would pop in and pop out pop in pop out and they were not really engaged they weren't like freed up you know some people would say you know turn your cell phone off um and and and you say when in a real emergency wouldn't we be texting each other whatever but you know if it's a tabletop exercise May the the discussion the comments are very important and you want people to be focused just like if you go to someone a friend or or spouse for dinner you don't want them on the phone the whole time while you're having dinner with them.
.
Highlights :
Harnessing Feedback for Improvement: Our exploration underscores the value of the 'hot wash' process in gathering immediate, honest feedback from participants. From soliciting suggestions for improvement to encouraging out-of-the-box thinking, the hot wash serves as a catalyst for continuous improvement and innovation.
Creating Engaging Environments: Delve into the importance of creating environments conducive to focused engagement during tabletop exercises. By removing distractions and encouraging participants to disconnect from their usual routines, organizations can foster an immersive experience akin to meaningful conversations over dinner, facilitating deeper insights and collaboration.
As our exploration draws to a close, we are reminded of the transformative power of feedback-driven improvement and immersive environments in enhancing cybersecurity preparedness. Through the 'hot wash' process and the creation of engaging tabletop exercise environments, organizations can harness the collective wisdom of participants and foster a culture of continuous improvement. Join us in embracing the principles of feedback, engagement, and innovation as we navigate the dynamic landscape of cybersecurity resilience, empowered by the insights gained from meaningful interactions and collaborative endeavors.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on May 8, 2024 at 10:08pm in Blog
Embark on a captivating journey through the complexities of cybersecurity and human behavior, where anecdotes of missed context, unexpected encounters, and security dilemmas converge to unveil invaluable insights. Our narrative begins with a recounting of a cybersecurity exercise, where the consequences of missing crucial context lead to unexpected challenges during a recovery attempt from an encrypted backup. Amidst the discourse, Bikash Barai, co-founder of FireCompass and CISO Platform, initiates a conversation with a quick introduction, setting the stage for a rich exchange of experiences and perspectives. Meanwhile, a humorous encounter unfolds as a man attempts to sell an iPhone and camera for a bargain price, only to reveal a bag of potatoes upon inspection. The narrative crescendos with a high-stakes security dilemma, as a CISO faces the ultimatum of implementing WiFi in government buildings or facing termination, prompting a nuanced exploration of principle and pragmatism. Join us as we navigate the intersections of cybersecurity challenges, human behavior, and ethical dilemmas, illuminating the complexities of decision-making in an ever-evolving digital landscape.
Here is the verbatim discussion:
But in a few cases where I had been part of The Advisory Board Etc had done some of these exercise so I I recall one of the cases where uh some of the folks got into the room late around half an hour late so they missed the complete context and the setting and then during the session we did this carve ball wherehey wanted to uh kind of revive everything from the backup and we said that the backup is encrypted.Let's get started probably with a quick small intro um I'll start a quick intro from my side I'm bash baray the host I am one of the co-founders of fireCompass as well as I'm one of the co founders of ciso platform so Dan let's start with a quick baseball card kind of intro and eventually he told me you know what I need it very badly can you give it to me I mean I'll give it to you at €1 or something like that and here is the iPhone and I'm also going to give you this camera a small point and shoot Auto automatic camera and I took that phone and I swiped and everything was working fine and i thought this is interesting because at € 10 if you get a device which is working in worst case even if things are not perfect we can go open it up and look into and use it for hackingso I found that and I'm i think i became a little bit greedy I wouldn'tsay I tried to help that guy uh but I said okay here you go I gave the € 10 EUR he took this uh iPhone and the camera put it into a small brown bag and gave it to me and i took that and he started running up the stairs and I opened this brown bag and inside that there were two potatoes oh wow so right in front of me he did the classic switch which I I was pretty well potatoes i have still and Terry just looked at me with this stunned look you know and and I have you know she asked everyone to leave the conference room but me so it was just me and Terry looking looking at each other and I've never seen a government agency meeting end so quickly in my life because you know this was an hourong meeting it was 15 minutes in and she just ended it and she looked me in the eye and she said Dan if that's your answer you cannot bethe ciso in the state of Michigan basically I was worried I was gonna get fired and I said well wait a minute Terry know you don't understand let me explain I had all these white papers and this I was going to show her all my background materials about and articles and and books about why this was a bad idea and she says no stop I've read all those articles I know what you're gonna say I I know what your thing is but but she said um I've been to DAL Ford Chrysler and General Motors they all have Wi-Fi in their conference rooms what do they know that you don't know and so they're like telling so I'm like whoa she says I'm giving you one week to to figure this out and come back and give us a plan not to not to deliver it but to give us the plan to do it securely or you're fired.
Highlights:
Consequences of Missed Context: The narrative unveils the repercussions of missing crucial context during a cybersecurity exercise, highlighting the importance of full engagement and presence to navigate complex scenarios effectively.
Unexpected Encounters and Humorous Anecdotes: Amidst discussions of cybersecurity, a humorous encounter unfolds as a man attempts to sell an iPhone and camera for a bargain price, only to swap them for a bag of potatoes, leaving the narrator stunned and bemused.
High-Stakes Security Dilemma: The narrative reaches a climactic moment as a CISO faces a high-stakes security dilemma, tasked with implementing WiFi in government buildings despite security concerns. The ultimatum of termination underscores the delicate balance between principle and pragmatism in cybersecurity decision-making.
As our exploration draws to a close, we are reminded of the multifaceted nature of cybersecurity challenges, where technical expertise intersects with human behavior and ethical considerations. Through anecdotes of missed context, unexpected encounters, and security dilemmas, we gain invaluable insights into the complexities of decision-making and the importance of resilience and adaptability in navigating cybersecurity landscapes. Join us in embracing the spirit of innovation, collaboration, and ethical stewardship as we navigate the ever-evolving challenges of cybersecurity in an increasingly interconnected world.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Embark on a riveting journey through the dynamic realms of emergency response, cybersecurity innovation, and strategic planning, guided by the insightful reflections of Dan Lurman, former Chief Security Officer for the state of Michigan. Our narrative begins amidst the chaos of a historic blackout in Michigan, where Dan and his team grappled with the aftermath for days, illustrating the resilience and adaptability required in crisis situations. However, Dan's journey is not confined to emergency response centers but extends to the realm of entertainment and entrepreneurship, where he honed his skills as a magician and ventured into the world of cybersecurity startups. As the founder of a pioneering startup focused on automated penetration testing, Dan brings a unique perspective shaped by diverse experiences and expertise. Join us as we delve into his practical tips for enhancing tabletop exercises, from preparing participants to throwing unexpected curveballs, and the imperative of collaboration among cross-functional experts in crisis planning. Through Dan's anecdotes and insights, we navigate the intricate intersections of experience, innovation, and collaboration, empowering organizations to confront the challenges of cybersecurity and crisis management with confidence and resilience.
Here is the verbatim discussion:
But two years after that we had a large blackout in Michigan where uh the whole Northeast lost power for two days basically we lost power and it was basically a situation where um you know we had to all go to the emergency coordination Center and respond to um you know no computers no power no um you know huge issues a lot of people thought it was in the US thought it was another 911 they thought you know it was another terrorist attack and uh all the people at the emergency coordination Center uh we were there for four straight days and a bunker with you know a generator and um responding to all kinds of issues that you know the state parts of the state came back like 24 hours later other parts uh came back more like two days later and some came back three days later but it was a major emergency and and New York was without power for a couple of days a lot of things happened and as a kind of little bit Prelude to the story which is important I used to do a lot of magic shows I mean long time back and bymagic shows I don't mean the rabbit out of the hat trick kind of magic shows but more like the David Blaine kind of stuff mentalism and um um closeup magic and those kind of stuff I used to do on stage as well so I was doing like opening shows for college fests and closing shows for college Fest so I'm doing I was doing it at a pretty decent level uh so and and also I started my first startup around that period we were doing this um automated penetration testing on the cloud so that was what we were working on sure uh Dan lurman I'm um Chief security officer and chief strategist and security mentor so we do security awareness training um and former CSO for state of Michigan and started my career at the National Security Agency great wonderful thanks but again this may be not a real situation but like here's what's happening in the world you know for an oil company the price of oil has plummeted yada yada yada y you know kind of Preparing People in advance for the scenario that's going to hit them on the day of the exercise so yeah I mean definitely that should always be part of so preparation and and and making sure people who are coming in know what their role is going to be know what their um know what you know some background is another thing we did so I start giv you some other tips what often happens at these is is they start th you know throw curves at people um and you know what I mean by that is you know kind of like you play cricket but B you know throw um us baseball you know curveball um change it up so what do I mean by that um like they would come in day one and say you you you you and you tap on the shoulder you're gone get up get out of here you know go stand in the corner of the room you're an observer you can't say anything it's like wait a minute that's the that's the CFL you just tapped on the shoulder you can't yeah but he's in Germany so he's not he's not able to be here right now so and what about that guy well yeah that's the C that's my chief security officer he's yeah he's on vacation at Disney World so so we're going to let him so we're going to put him down in the basement and you can call him on the phone but he can't be in the room here he can't look at any of the stuff you know going on so you know that happens a lot um so you know try and you know that's one way you can throw throw them a curve or you could something they're not expecting um because inevitably whatever you plan whatever you're thinking whenever you think you're ready you're never read right so Ci's Chief Information officers um also you know different um different types of experts in business area so whatever you know who knows which area might be hit last year the biggest area in the US was hospitals so if this was a hospital tabletop you know the scenarios for doctors might be slightly different than it might be for a government or if it's for a bank it could be different you know what are the different functions maybe it hits one part of the bank and maybe not another part of the bank so you want you know you want to make sure those leadership uh roles from all across the Enterprise are there at the table um and that's really important you know getting them involved the other thing is you want to make sure that as you're putting together your scenarios and I would just recommend you know go to in the USA I don't know um uh you know other parts of the world as well I know the UK and USA very well but you know nist is a great place to go.
Highlights:
Resilience Amidst Crisis: Our journey commences with Dan's firsthand account of navigating the aftermath of a significant blackout in Michigan, where emergency response efforts were tested to their limits. Through days of relentless effort in emergency coordination centers, Dan and his team exemplified the resilience and adaptability required in confronting unforeseen challenges.
Diverse Experiences and Entrepreneurial Ventures: Beyond the realm of emergency response, Dan's narrative unfolds to encompass his experiences as a magician and entrepreneur. From captivating audiences with magic shows reminiscent of David Blaine to founding a startup focused on automated penetration testing, Dan's journey reflects a diverse range of interests and expertise.
Practical Tips for Tabletop Exercises: Delve into Dan's practical insights for enhancing tabletop exercises, from preparing participants and setting clear roles to throwing unexpected curveballs. Through anecdotes and examples, Dan underscores the importance of adaptability and strategic planning in simulating realistic scenarios.
As our exploration draws to a close, we are reminded of the transformative power of experience, innovation, and collaboration in navigating the complex landscape of cybersecurity and crisis management. Through Dan's multifaceted journey, we gain invaluable insights into the resilience required to confront adversity, the creativity fostered by diverse experiences, and the strategic planning essential for effective crisis response. As organizations embrace these principles and cultivate a culture of preparedness, they empower themselves to navigate uncertainty with confidence and resilience. Join us in embracing the spirit of innovation and collaboration as we navigate the evolving challenges of cybersecurity and crisis management in an increasingly interconnected world.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Embark on a riveting journey through the highs and lows of cybersecurity preparedness, guided by insightful anecdotes and real-life experiences. Our narrative begins with a nod to the iconic film "Live Free or Die Hard," drawing parallels to the intense scenarios encountered during cybersecurity exercises. Witness the harrowing tale of a simulated cyber catastrophe, where bombs exploded, data centers were destroyed, and critical services faltered. Amidst the chaos, resilience emerged as teams rallied to procure a replacement mainframe, epitomizing the relentless pursuit of continuity in the face of adversity.
Here is the verbatim discussion:
But there's a lot of really good lessons we learned from that um watch the movie Die Hard four Die Hard four with Bruce Willis um it's called live free and die hard where all the power goes out and bombs are going off and it's scary stuff um so we had a situation where um we you know the first day of this exercise you know was probably over the top and most cyber exercises today wouldn't start this way but they had bombs going off kind of like 911 again they blew up our data center they blew up um big parts of government um they hacked other parts of government and all of our services were down for two days and it was very very intense and we were like getting beat up we were like humbled our team was just like we were like done I mean we were really kind of overwhelmed by Thursday afternoon though this is what I want to tell you about by Thursday afternoon we were told there's one more thing you have to do in this exercise to train your team and we said okay what is that they said we have to get our bull Mainframe bull b l l bull Mainframe which was you know that I don't know if they were even bus business anymore but back then they were a big Mainframe shop um we need to get it back online so that we can pay the employees because all of our services are down and we need to get a bll Mainframe but our two bull main frames our main Mainframe and our backup had been were gone one was blown up the other one was hacked and unusable so we had to get a new one so they said to usum we need you to contact bull headquarters in Paris in France and andget a bull Mainframe as soon as possible any thoughts on how to make it very effective so that some real stuff come out of it so our goal had been not just to kind of be mentally prepared but also to create those responses and to create those templates so that out of that exercise we have some real Readiness apart from the kind of preparedness from the kind of thinking perspective Etc but get all these things written down so what's your thought on that in terms of doing it uh as a single exercise or breaking it down yeah most of the times I've seen it done um again most of my I I I have been a part of couple in the private sector I've been part of more in government and Statewide like you know what if we had a health emergency you know we actually quite frankly did a bunch of exercises around pandemic prior to covid you know and being prepared and obviously there's all kinds of people that need to be involved in that even now there's scenario based things about what's going to happen with vaccines and all kinds of things related that aren't specifically cyber related you know so one of the things that I've seen I just want to mention a real life story that's like with ransomware they kind of put some some meat to this we had a uh I'm not going to name the name of the company we had a an organization here not a government it was a nonprofit in Michigan that had was faced with ransomware attack and it was um likeabout a let's just say I'm not going to give you too many details but the story makes sense as I go through this like was about a $5 million request they had they had they had encrypted all their data they had no access to anything their backups were were were encrypted they they had not done a good job of separating their backups and and they and they hadn't done a good job but a lot of people have backups but they have they don't test the backups and so the Bad actors get in and they actually encrypted the backups as well so they were kind of you know up a creek um they didn't want to pet um um they didn't want to pay they had cyber insurance and the and in the US the Cyber insurance company said look they came in they were this it's your decision it's always the company's decision but we know these people and we're gonna negotiate it down to 1.2 million we know we can get these guys down from five to 1.2 so they already like the Cyber insurance company had had the Playbook right so we're going to negotiate this down to 1.2 million and oh by the way if you don't do that um we're only going to give you even though the Cyber insurance policy was actually for five million we're only going to give you 1.2 million and we think it's going to cost you like eight like and again I'm not saying this is always true with cyber insurance they almost felt like they had to pay they had to go with what the Cyber insurance company wanted to do to get their data back so sure enough you know.
Highlights:
Lessons from Intense Cybersecurity Exercises: Our discussion unveils the invaluable lessons gleaned from immersive cybersecurity exercises, where simulated crises push teams to their limits. Through a vivid recounting of scenarios reminiscent of Hollywood thrillers, we explore the transformative power of adversity in honing preparedness and resilience.
Emergency Preparedness and Response: Delve into the critical imperative of emergency preparedness, as organizations grapple with the daunting task of navigating cyber threats in real-time. From securing replacement infrastructure to ensuring the continuity of essential services, proactive planning and swift response are paramount in mitigating the impact of cyber incidents.
Navigating Ransomware Realities: Transitioning to the sobering realities of ransomware attacks, we confront the stark challenges faced by organizations in the wake of malicious cyber intrusions. Through a poignant real-life example, we delve into the complexities of ransom negotiations and the pivotal role of cyber insurance in facilitating recovery efforts. Witness the delicate balance between risk mitigation, financial considerations, and the imperative of data restoration in the aftermath of cyber extortion.
As our exploration draws to a close, we are reminded of the multifaceted nature of cybersecurity preparedness, encompassing both strategic foresight and tactical response. From the adrenaline-fueled scenarios of cybersecurity exercises to the sobering realities of ransomware negotiations, our journey underscores the importance of proactive planning, collaboration, and resilience in confronting evolving cyber threats. Through continuous learning, adaptation, and vigilance, organizations can navigate the complex cyber landscape with confidence, fortified by the lessons learned from both simulated crises and real-world challenges. Join us in embracing the spirit of preparedness and resilience as we navigate the dynamic terrain of cybersecurity in an era defined by digital innovation and uncertainty.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Embark on a fascinating journey with an individual whose diverse background encompasses a rich tapestry of faith, intellectual curiosity, and a deep-rooted passion for cybersecurity. Raised in a household where the echoes of Lutheran and Presbyterian teachings resonated, their journey has been marked by an insatiable thirst for knowledge, spanning topics ranging from history and faith to the intricacies of cybersecurity. Through avid reading, blogging, podcasting, and active engagement on social media platforms, they not only enrich their own understanding but also foster meaningful conversations within their community. Join us as we delve into their insightful reflections and experiences, navigating the intersection of faith, intellectual exploration, and the evolving landscape of cybersecurity
.
Here is the verbatim discussion:
so my father was a Lutheran Pastor my wife's father was a presbyterian Pastor in the Christian faith and uh so we do a lot of reading U on on on uh different topics topics around history um but also around our faith but also around cyber security so I love to read books I I'm always blogging and writing and and and podcasting like with you um so I really I enjoy um a lot of really great uh conversation with people like like yourself and um so I I really do try and read a lot if I possibly can but um encourage people to uh on Twitter I'm gov CSO um and I'm also on LinkedIn be happy to l with people feel free to reach out to me and uh and I'll link with you wonderful Dan thanks a lot this had been a fascinating conversation thank you for joining us well thank you for having me I really really enjoyed the conversation so have a great day thank youbut even back in2013 it started getting big 2014 2015 2019 you know I think it was for me it was the top story in state and local governments in the USA 2020 they say it doubled last year 100% and now it's going to even be worse in 2021 so my point is this that whole exercise we you know Homeland Security thought of that seven years before ransomware even became very big and then even 15 years before it's like the number one story so my message to to the people listening and to people watching us is you can learn a lot in these scenarios you can think through things and even think through what might come next and who knows you may even be predicting what's going to happen five years from now in cyber security because the bad guys are always looking for new ways to get into our our networks new ways to make money new ways to um to extort money and and so we saw that way before ransomware became popular.
Highlights :
Diverse Interests and Engagements: Our discussion unveils a captivating narrative of a person deeply engaged in a multitude of pursuits, from delving into historical and theological realms to immersing themselves in the dynamic field of cybersecurity. Their voracious appetite for knowledge fuels a constant quest for learning and sharing insights through various mediums, including blogging, writing, and podcasting.
Prescient Insights into Ransomware: A poignant revelation emerges regarding the foresight of homeland security, which foresaw the looming threat of ransomware years before its widespread impact. From its initial emergence in the early 2010s to becoming a predominant cybersecurity concern by 2019, the evolution of ransomware underscores the significance of proactive measures and scenario planning in mitigating cyber threats.
As our conversation draws to a close, we are reminded of the invaluable lessons gleaned from reflecting on the past and anticipating the future. The journey of our guest serves as a testament to the power of intellectual curiosity, proactive engagement, and foresight in navigating complex challenges, both within the realm of faith and cybersecurity. Through continuous learning, dialogue, and preparedness, we equip ourselves to confront the evolving landscape of cyber threats with resilience and vigilance. Join us in embracing the spirit of exploration and innovation as we navigate the intersections of faith, knowledge, and cybersecurity in an ever-changing world.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
In the ever-evolving landscape of business and technology, the prospect of industry consolidation looms large, driven by predictions and market trends. As organizations navigate these uncertainties, comprehensive scenario planning emerges as a vital tool for ensuring readiness and resilience. In this discussion, we delve into the significance of scenario planning in preparing for potential challenges, alongside the transformative shift towards industry consolidation in cloud computing. Through insightful reflections and practical considerations, we explore the intersection of strategic foresight and technological evolution, aiming to equip businesses with the foresight needed to thrive in an era of change.
Here is the verbatim discussion:
so it just keeps growing and and I I think there's been predictions that you know there's going to be a big industry consolidation coming and as long as the stock Market keeps going up and as long as new companies keep getting bought and and and you know if if if we have a obviously a big stock market correction that may that could flush out a lot of things and cause that consolidation but um I'm not sure 2021 is going to be the year we're going to see a industry consolidation it's not going to happenin 2021 but I guess that we are kind of gradually moving towards that so s was a movement towards consolidation re we prepared for this are we prepared for that so really thinking through what would you do business-wise given this scenario so um you know ask asking questions around um you know what would the technology people be doing what would the lawyers be doing what would the legal team be doing what would the CFO be doing and so you want to make sure that your scenarios really include all of those key roles and and make them as realistic as possible so obviously you're not going to necessarily be exactly like what's your you know competitors went through recently if they had a ransomware attack or maybe what another company did but you know you can get some very realistic scenarios to say this happened.
Highlights :
Anticipating Industry Consolidation: The discussion opens with a recognition of the looming possibility of industry consolidation, driven by market dynamics and predictions. While 2021 may not witness this consolidation, gradual movement towards it is evident. This shift prompts critical questions about organizational preparedness and strategic response.
Scenario Planning for Business Resilience: A focal point emerges on the importance of comprehensive scenario planning. This involves envisioning potential challenges and formulating responses across key organizational roles, encompassing technology, legal, financial, and operational considerations. Realistic scenarios enable organizations to strategize effectively and enhance resilience against unforeseen events.
Integration with Cloud Computing: Within the context of technological evolution, the conversation transitions to the role of cloud computing and the emergence of zero trust architecture. Zero trust principles are identified as catalysts for industry consolidation, fostering a more uniform playing field in cloud security. This intersection underscores the need for holistic scenario planning that encompasses both technological and business dimensions.
The discussion underscores the imperative for organizations to embrace comprehensive scenario planning as a cornerstone of business resilience. By anticipating challenges and aligning responses across key roles, businesses can navigate uncertainties with confidence. Moreover, the convergence of scenario planning with transformative shifts in cloud computing highlights the interconnectedness of strategy and technology. As industries evolve and consolidate, proactive preparation becomes paramount, empowering organizations to thrive amidst change. Through strategic foresight and adaptive action, businesses can chart a course towards sustained success in an era defined by innovation and uncertainty.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on May 8, 2024 at 12:12am in Blog
In the ever-evolving landscape of cybersecurity, seasoned professionals offer invaluable insights into emerging trends, challenges, and strategies. In this blog post, we engage in a conversation with Dan, an experienced security expert, as he shares his perspectives on key topics such as zero trust, cloud consolidation, response and recovery, and the intersection of cybersecurity and ethics. From discussing industry dynamics to sharing recommendations on must-read books, Dan's expertise sheds light on navigating the complexities of cybersecurity in the digital age.
Here is the verbatim discussion:
o zero trust I believe has got a very interesting future uh I'm I'm very curious to see how things span out um Cloud definitely is another because that's going to help in consolidation as an industry that consolidation Drive can happen in many ways but there are these couple of very powerful kind Dynamics which are planning out right now and and last but not the least I would definitely love to highlight the topic which is response and Recovery in other words right um it's not just about trying to protect but it's also about having the right kind of response and recovery program in place which can be done through many different approaches which could be having the right kind of backups having these crisis drills and having the right kind of processes in place having bcpd etc etc many of these may not be very costly you don't need to go and buy that Appliance and shiny new device Etc these are more basic stuff but that basic stuff is becoming very very important uh so to conclude Dan um anything you want to add before we kind of wrap it up with the last question I your points are well well taken and I think the complexity it's it's funny I I I agree that you know so many organizations um don't have they don't even use the tools they have first of all and they're always you know always being asked to add more or you know you're missing this you're missing that um it's a huge challenge it's a huge challenge so simplifying you know the architecture I agree with you on zero trust um it's a challenge because I also think play Devil's Advocate the other thing they've been talking about industry consolidation for years and years and years and yet we see more and more startups all the time so it just keeps growing and and I I think there's been predictions that you know there's going to be a big industry consolidation coming and as long as the stock Market keeps going up and as long as new companies keep getting bought and and and you know if if if we have a obviously a big stock market correction that may that could flush out a lot of things and cause that consolidation but um I'm not sure 2021 is going to be the year we're going to see a industry consolidation it's not going to happen in 2021 but I guess that we are kind of gradually moving towards that so s was a movement towards consolidation age zero trust is a movement toward consolidation Cloud as a general play is a movement through consolidation because that kind of gives you this real estate to do the consolidation earlier it was very hard whereas Cloud kind of uniform creates an uniform playing Ground right so what what I mean to say is that the drivers are gradually kind of falling in place and which is going to win in the long run time will sa but the good thing is that I'm kind of seeing some of those drivers gradually falling into is and and you're absolutely right it's probably we are a decade away or five years away sometimes things can happen faster or slower but definitely I believe five to 10 years y i I agree with that so Dan the last question um what are some of I I can see a lot of books behind you so let me ask you what what which are some of your favorite books and favorite podcast sure so start off I just want to mention I I we talked about this earlier I brought my book virtual Integrity you can all look at this this is actually um there's actually believe it or not an Indian version that came out so it was uh uh this this version here which actually brings together um we talked about it earlier because um uh brings together kind of my faith and online life you know so you know the importance of of uh of protecting yourself in cyers space um brings in cyber security and everything but also brings in ethics and the importance of cyber ethics brings in kind of puts it to light you know real real meat on the bones around that so I I've been those are um some books I've read um I've been a part of a couple books CIO leadership um for state and local governments emerging Trends and best practices another book I did a a chapter in I've done chapters in about five or six books C leadership for cities and counties merging Trends and best practices again all these are available at Amazon you asked me about other books that I've read I like you this was by Bruce schneer secret and lies um he's got a number of great books topics you know we're uh my wife and I both grew up as um children of pastors.
Highlights :
Emerging Trends: Dan highlights the significance of zero trust architecture and cloud consolidation as pivotal drivers shaping the future of cybersecurity. He emphasizes the importance of response and recovery programs, underscoring the need for proactive measures beyond traditional defense mechanisms.
Simplicity Amid Complexity: Amidst the complexity of cybersecurity landscapes, Dan advocates for simplification and maximizing the use of existing tools. He reflects on the perpetual challenge of balancing security requirements with resource constraints, emphasizing the need for practical and cost-effective solutions.
Industry Consolidation: While industry consolidation has been a topic of discussion, Dan provides insights into the gradual movement towards consolidation driven by factors such as zero trust and cloud adoption. He acknowledges the evolving nature of the cybersecurity landscape and predicts a trajectory towards consolidation in the coming years.
Literary Recommendations: Dan shares his favorite books, including "Secrets and Lies" by Bruce Schneier, and highlights his own contributions to publications focusing on CIO leadership and emerging trends in state and local governments. These literary works provide valuable insights into cybersecurity governance and ethical considerations.
As cybersecurity continues to evolve, industry veterans like Dan offer valuable perspectives on navigating the challenges and opportunities in safeguarding digital assets and infrastructure. From embracing emerging trends like zero trust and cloud consolidation to prioritizing response and recovery programs, Dan's insights underscore the importance of adaptability and foresight in addressing cybersecurity threats. Furthermore, his literary recommendations serve as valuable resources for professionals seeking to deepen their understanding of cybersecurity governance and ethical principles.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on May 7, 2024 at 11:41pm in Blog
The intersection of cybersecurity and ethics is a topic of increasing relevance in today's digital landscape. In this blog post, we delve into a conversation with a seasoned professional who shares insights from his extensive experience and explores the importance of cyber ethics. From reading influential books to contributing to publications on CIO leadership and emerging trends, his journey offers valuable perspectives on navigating the complexities of cybersecurity and ethical considerations.
Here is the verbatim discussion:
so you know the importance of of uh of protecting yourself in cyers space um brings in cyber security and everything but also brings in ethics and the importance of cyber ethics brings in kind of puts it to light you know real real meat on the bones around that so I I've been those are um some books I've read um I've been a part of a couple books CIO leadership um for state and local governments emerging Trends and best practices another book I did a a chapter in I've done chapters in about five or six books C leadership for cities and counties merging Trends and best practices again all these are available at Amazon you asked me about other books that I've read I like you this was by Bruce schneer secret and lies um he's got a number of great books um that I you know I read um a lot of the books behind me as we were talking about earlier um are wide variety of topics you know we're uh my wife and I both grew up as um children of of pastors.
Highlights :
Cybersecurity and Ethics: Our discussion opens with a reflection on the significance of cyber ethics in the realm of cybersecurity. The conversation underscores the need to not only protect oneself in cyberspace but also to uphold ethical principles, adding depth and context to cybersecurity practices.
Literary Influences: The professional shares insights from books he has read, including "Secrets and Lies" by Bruce Schneier. These literary works provide foundational knowledge and provoke critical thinking on cybersecurity and related ethical considerations.
Contributions to Thought Leadership: With contributions to books on CIO leadership and emerging trends in state and local governments, the professional has actively engaged in shaping discussions around cybersecurity and leadership in public sector contexts. His experiences highlight the evolving landscape of cybersecurity governance and the importance of ethical leadership in navigating complex challenges.
Personal Background: The conversation touches upon personal influences, including growing up as children of pastors. This background likely instilled values of integrity and ethical conduct, which carry over into the professional realm of cybersecurity.
In today's digital age, the convergence of cybersecurity and ethics presents multifaceted challenges and opportunities. Through reading influential literature, contributing to thought leadership, and drawing from personal values, professionals like the one featured in this discussion offer invaluable insights into the complex interplay between cybersecurity practices and ethical considerations. As we navigate the ever-evolving landscape of cyberspace, a commitment to ethical conduct remains essential in safeguarding individuals, organizations, and society as a whole.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on May 7, 2024 at 11:18pm in Blog
Handling crises, whether natural calamities or cyber emergencies, requires preparedness, agility, and resilience. In this blog post, we delve into real-life experiences shared by Dan, a seasoned security professional, highlighting pivotal moments and lessons learned from crisis management.
Here is the verbatim discussion:
o you kind of have the forming storming norming kind of thing and this was our storming phase so anyway one of the early things that happened this was um I was asked our security team I've hadan a security team of around 30 professionals and we were asked to put um wireless networks in all of the conference rooms in state government and so um at that time that was kind of a Cutting Edge issue now you know everyone has Wireless everywhere in their homes and in you know coffee shops and everything but the reality is um you call three-letter agencies in Washington so NSA CIA Dia FBI and and I had done my home homework and I knew that this was bad you know security you know we couldn't allow Wi-Fi in conference rooms because it was it was uh going to be a problem it was um it was not secure and there was stories in the papers there lots of stories in the US papers about people pulling into Home Depot and Walmart I'm not Walmart but Home Depotand Lowe's and and different uh parking lots or car parks and and hacking into cash register because the Wi-Fi weren't secure so I had all these papers so basically Terry asked me to prepare we were in the staff meeting and it was like 10 of us in the staff meeting and we got to that agenda item and Terry says dan tell us how we're going to securely put Wi-Fi in all of our this project we're not going to do it we're not putting Wi-Fi in any of the conference rooms and Terry just lookedat me with this stunned look you know and and I have you know she asked everyone to leave the conference room but me so it was just me and Terry looking looking at each other and I've never seen a government agency meetingend so quickly in my life because you know this was an hourong meeting it was 15 minutes in and she just ended it an she looked me in the eye and she said Dan if that's your answer you cannot be the ciso in the state of Michigan basically I was worried I was gonna get fired and I said well wait a minute Terry know you don't understand let me explain I had all these white papers and this I was going to show her all my background materials about and articles and and books about why this was a bad idea and she says no stop I've read all those articles I know what you're gonna say I I know what your thing is but but she said um I've been to DAL Ford Chrysler and General Motors they all have Wi-Fi in their conference rooms what do they know that you don't know and so they're like telling so I'm like whoa she says I'm giving you one week to to figure this out and come back and give us a plan not to not to deliver it but to give us the plan to do it securely or you're fired so that was a real scary moment for meash it was scary I almost thought I was gonna lose my job I ran back to my interesting try yeah yeah I just one more quick thing I'll tell you I went back to my team they were like Did we tell them we're ging Wi-Fi and I said no we're doing Wi-Fi we've got to figure this out so two years later we win the award for top Wi-Fi security in the whole country we we but that really was a a ground a paradigm shift for me as a person you know that security needs to be enabling they need to be coming with Solutions and not just problems security Pros can't just say no can't do it you've got to come up with a solution that's going to do security on time on budget with the right level of security so that's my most embarrassing story how I almost got fired but it turned into a good thing Terry and I are still friends 20 years later actually well 18 years later and now bash I want to know what your most embarrassing moment in your career was sure sure I I I would be happy to but before that um so so did you manage to get fired no no I did I kep my but you tried but you tried I kept my job I did not I did not get fired and uh it ended up being real a paradigm shift for me because I started to think about security differently and I you know whenever I had a security challenge it's like who's doing this best who can we learn from look around um and you know state government is not known at that time certainly is one of the leaders in security and and like I said the private sector was doing that better than us and we learned from that and we actually improved we actually got better through that experience interesting very interesting learning I I I believe that there's a lot of interesting takeaway as well outside of uh a very entertaining story for sure so let me share mine yes so this is quite a long time back almost like couple of decades back and and as a kind of little bit Prelude to the story which is important I used to do a lot of magic shows I mean long time back and by magic shows I don't mean the rabbit out of the hat trick kind of magic shows but more like the David Blaine kind of stuff mentalism and um um closeup magic and those kind of stuff I I used to do on stage as well so I was doing like opening shows for college fests and closing shows for college Fest so I'm doing I was doing it at a pretty decent evel uh so and and also I started my first startup around that period we were doing this um automated penetration testing on the cloud so that was what we were working on so uh now I went for a visit to Paris to meet some partners and that that was like a slightly gloomy day and little bit of drizzles and I remember I was walking down the stairs um of um they call it Subway right yeah Subway yeah like the underground yeah they call it Subway yeah so or no they call it Metro oh the Metro I guess the Metro yeah yeah they call it the Metro the underground transport system so the US is the subway yeah us is the subway and London is the underground yeah so I was going down the stairs and there was a guy who looked like from east Europe he came and told me that I'd like to sell this um iPhone iPhone just go launched and would you like to buy and I was the Blackberry guy during those days yeah so I said no I'm happy with my phone so I was walking down and this guy still followed me and said you know what I need some money badly and my sister is at the hospital I need some money it'll be great help if you could buy this and the eventually came down like he started with somewhere around few hundred EUR and came down to some 20 and eventually he told me you know what I need it very very badly can you give it to me I mean I'll give it to you at €1 or something like that and here is the iPhone and I'm also going to give you this camera a small point and shoot Auto automatic camera and I took that phone and I swiped and everything was working fine and I thought this is interesting because at € 10 if you get a device which is working in worst case even if things are not perfect we can go open it up and look into and use it for hacking so I found that and I'm I think I became a little bit greedy I wouldn't say I tried to help that guy uh but I said okay here you go I gave the € 10 EUR he took this uh iPhone and the camera put it into a small brown bag and gave it to me and I took that and he started running up the stairs and I opened this brown bag and inside that there were two potatoes oh wow so right in front of me he did the classic switch which I I was pretty well trained to do wow he did that classic switch in front of me and that was probably the most expensive pair of potatoes I have still I mean I bought till date that's a great story that had been a pretty humbling experience being a security professional um I mean that reminds me to stay humble that's great great story so so Dan let's get started with some real crisis example today's topic is handling crisis um please share some some examples of some real crisis that you dealt with in the past well I've dealt with lots of them um you know when I was CSO for sure oneof the biggest ones was the blackout the Northeast blackout of um 2003 so you know we had just gone through the whole Y2K and I I I started in Michigan government in 97 and um you know i' come from an NSA kind of top secret background you know and Michigan Government was very different than that of course um not a lot of you know not a lot of um of very uh secure facilities but the whole Focus during those years from 97 to 2000 were was Y2K so we had prepared you know what if you know all the computers break and we had done a lot of good work to prepare for that um and that went kind of without a hitch but we were all sitting there in the Emergency Center you know and January or or actually you know December 31st January 1 of 2000 um but then three years later you know we had we had we had of course two years later we had 911 but not so much happened in Michigan but two years after that we had a large blackout in Michigan where uh the whole Northeast lost power for two days basically we lost power and it was basically a situation where um you know we had to all go to the emergency coordination Center and respond to um you know no computers no power no um you know huge issues a lot of people thought it was in the US thought it was another 911 they thought you know it was another terrorist attack and uh all the people at the emergency coordination Center uh we were there for four straight days and a bunker with you know a generator and um responding to all kinds of issues that you know the state parts of the state came back like 24 hours later other parts uh came back more like two days later and some came back three days later but it was a major emergency and and New York was without power for a couple of days a lot of things happened you know trying to get water from one side of the state to the other um some things you wouldn't necessarily think about like um it was a very hot day it was like 95 degrees Fahrenheit in the US and and restaurant were having to close there was no air conditioning but they were serving spoiled food and so like there there food um you know uh inspectors who were having to you know close restaurants because people were eating spoiled food in Detroit and uh and and they needed the technology to support that but they had no power so there was lots of things we had to do and during that time I met tons of people who ended up becoming leaders in Michigan Government over the next decade the person I worked closely with was um colonel ATU who was running the whole emergency for uh State Police in Michigan she ended up becoming the director of Michigan State Police so in those kind of emergencies if you're ready if you're prepared if you've got good plans in place um it can really strengthen your security organization to be prepared that was not a hacking attack although some people thought it was a hacking attack initially um uh and but you know we responded to that and that was a real life emergency we responded to that's interesting that veryinteresting so um I mean that happened due to more like a natural Calamity but that's something which I think all the all the nations today want to stay prepared for right so um Dan uh let's talk about some some some of the drills that you have done and um uh so any of these large scale cyber crisis drills that you conducted in the government y yeah so what what of the ones I I want to uh mention was a a um a series of drills that the US Department of Homeland Security does called cyberstorm that's cyb R storm s o RM and uh the what I'll tell you about the story I'm going to tell you is from cyberstorm one which was the first one but they're now up think cyberstorm 7 is coming they do this every two years and these are Global exercises so um you know they they do them in you know US states they use federal agencies in the US but know the United United Kingdom and France and Australia and New Zealand were all part of these exercises so thiswas a global exercise we were at the first one and my team had prepared this is a week long exercise it was an everyone our team obviously but it was a large group of people and um I tell people if you want to understand what cyberstorm one was like I'm thinking this is back in 2006 so this is going back to the first cyberstorm but there's a lot of really good lessons we learned from that um watch the movie Die Hard four Die Hard four with Bruce Willis um it's called live free and die hard where all the power goes out and bombs are going off and it's scary stuff um so we had a situation where um we you know the first day of this exercise you know was probably over the top and most cyber exercises today wouldn't start this way but they had bombs going off kind of like 911 again they blew up our data center they blew up um big parts of government um they hacked other parts of government and all of our services were down for two days and it was very very intense and we were like getting beat up we were like humbled our team was just like we were like done I mean we were really kind of overwhelmed by Thursday afternoon though this is what I want to tell you about by Thursday afternoon we were told there's one more thing you have to do in this exercise to train your team and we said okay what is that they said we have to get our bull Mainframe.
Highlights:
The Storming Phase: Dan recounts a pivotal moment during his tenure as a security professional where he was tasked with implementing Wi-Fi networks in state government conference rooms. Despite initial resistance due to security concerns, Dan's paradigm shift led to innovative solutions, ultimately earning accolades for top Wi-Fi security nationwide.
The Expensive Pair of Potatoes: A humbling experience shared by another professional underscores the importance of staying vigilant and humble in the face of unexpected challenges. In this case, a seemingly lucrative deal turned out to be a lesson in caution and awareness.
The Northeast Blackout of 2003: Dan's experience during the blackout sheds light on the importance of preparedness and collaboration in crisis management. Despite the initial chaos, effective coordination and leadership helped mitigate the impact and strengthen the security organization.
Cyberstorm Drills: Dan's participation in the Cyberstorm series of drills organized by the US Department of Homeland Security showcases the global effort in testing and enhancing cyber resilience. Lessons learned from these exercises, such as the importance of adaptability and teamwork, are invaluable in navigating modern cybersecurity challenges.
In navigating crises, whether natural or cyber-related, preparation, adaptability, and collaboration are paramount. Real-life experiences shared by security professionals like Dan offer invaluable insights into the complexities of crisis management and underscore the need for continuous learning and improvement in safeguarding critical infrastructure and information systems.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on April 28, 2024 at 2:49am in Blog
In the fast-evolving landscape of cybersecurity, the demands and expectations from technology leaders continue to grow. A vivid illustration of this dynamic is the intense conversation between Dan, a Chief Information Security Officer (CISO) in Michigan, and Terry, his superior. This dialogue not only highlights the challenges faced by CISOs but also the pressures to conform to industry standards even when security risks are evident.
Here is the verbatim discussion: Terry just looked at me with this stunned look, and she asked everyone to leave the conference room but me. So it was just me and Terry looking at each other, and I've never seen a government agency meeting end so quickly in my life, because this was an hour long meeting. It was 15 minutes in, and she just ended it. And she looked me in the eye and she said, dan, if that's your answer, you cannot be the CISO in the state of Michigan. Basically, I was worried I was you cannot be the CISO in the state of Michigan. Basically, I was worried. I was going to get fired. And I said, well, wait a minute, Terry, you don't understand. Let me explain. I had all these white papers and all this. I was going to show her all my background materials about articles and books about why this was a bad idea. And she says, no, stop. I read all those articles. I know what you're going to say. I know what you're thinking. But she said, I've been to Dow, Ford, Chrysler and General Motors. They all have Wi Fi in their conference rooms. What do idea. And she says, no, stop. I read all those articles. I know what you're going to say. I know what you're thinking. But she said, I've been to Dow, Ford, Chrysler and General Motors. They all have Wi Fi in their conference rooms. What do they know that you don't know? And so they're like, talent. So I'm like, Who, She says, I'm giving you one week to figure this out and come backand give us a plan. Not to deliver it, but to give us the plan to do it securely, or you're fired. Highlights:
Abrupt Meeting Conclusion:The discussion began in a routine government agency meeting which was abruptly ended by Terry only 15 minutes in, demonstrating the seriousness of the issue at hand.
Direct Confrontation: Terry confronted Dan directly about his stance against implementing Wi-Fi in conference rooms, questioning his suitability for the role of CISO if he maintained his position.
Resistance to Change: Dan was initially resistant, prepared with white papers and research to support his concerns about the security implications of introducing Wi-Fi.
Informed Challenge: Terry countered Dan’s arguments by noting that major corporations like Dow, Ford, Chrysler, and General Motors had already implemented such technology, pushing Dan to reconsider his stance in light of industry practices.
Ultimatum for Innovation: Terry tasked Dan with devising a secure plan to implement Wi-Fi within a week, pushing him to innovate under the threat of losing his job.
This scenario underscores the tension between maintaining rigorous cybersecurity measures and adapting to technological advancements that industry peers have adopted. The key takeaway is the essential role of flexibility and innovation in the field of information security. CISOs are often required to balance security with functionality, ensuring that their organizations both protect sensitive information and remain technologically competitive. The discussion between Terry and Dan serves as a poignant reminder of the challenges that lie in persuading diverse stakeholders of the necessity for secure yet progressive technology solutions.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on April 28, 2024 at 2:35am in Blog
In a thought-provoking conversation, Daniel discusses the ever-evolving landscape of cybersecurity, emphasizing the need for continuous improvement in combating cyber threats. As 2021 unfolds, he shares insights into emerging technologies and trends that cybersecurity professionals should be vigilant about.
.
Here is the verbatim discussion:
And so you want to constantly improve in your approach to dealing with cyber threats? That's a very important thing that you mentioned. It's not a destination, it's a journey. So, Daniel, in 2021, what are some of the things which you think, as cybersecurity professionals, we should look out for, which could be some interesting technologies. which could be some interesting trends? Anything that the cybersecurity professionals should look out for in 2021? Yeah, thanks for asking. Every year I do a top 21 or top whatever the number is, this is 2021. So 21. Last year it was 20 for 20 for 2020. I do the top predictions from all the security vendors in the industry.
Highlights:
Continuous Improvement: Daniel underscores the notion that cybersecurity is an ongoing journey rather than a fixed destination, highlighting the importance of constantly refining approaches to address evolving threats.
Top Predictions for 2021: Daniel annually compiles a list of top predictions from various security vendors in the industry. This year, he presents the top 21 trends and technologies that cybersecurity professionals should monitor closely.
Emerging Technologies: Daniel discusses intriguing technologies that are expected to shape the cybersecurity landscape in 2021, offering insights into potential advancements in threat detection, prevention, and mitigation.
Trend Analysis: By collating predictions from diverse security vendors, Daniel provides a comprehensive overview of anticipated trends, enabling professionals to stay ahead of emerging threats and challenges.
As cybersecurity professionals embark on the journey of securing digital environments in 2021, Daniel's insights serve as a valuable guide. By remaining vigilant and adaptive to emerging technologies and trends, professionals can effectively navigate the evolving cybersecurity landscape and safeguard against emerging threats. Daniel's annual compilation of top predictions offers a roadmap for professionals to anticipate and address cybersecurity challenges proactively, ensuring robust defense strategies in an ever-changing digital world.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on April 28, 2024 at 2:26am in Blog
In a comprehensive discussion, the importance of diverse expertise and scenario-based planning in cybersecurity tabletop exercises is highlighted. Emphasizing the significance of involving key leadership roles from various sectors, the conversation underscores the need for tailored scenarios and recommends resources like NIST for structuring tabletop drills.
Here is the verbatim discussion:
So CIO's chief information officers also, you know, different, different types of experts in business areas. So whatever, you know, who knows which area might be hit? Last year the biggest area in the US was hospitals. So if this was a hospital tabletop, you know, the scenarios for doctors might be slightly different than it might be for a government, or if it's for a bank, it could be different. You know, what are the different functions? Maybe it hits one part of the bank and maybe not another part of the bank. So you want, you know, you want to make sure those leadership roles from all across the enterprise are there at the table. And that's really important, you know, getting them involved. The other thing is you want to make sure that as you're putting together your scenarios, and I would just recommend go to in the USA, I don't know other parts of the world as well. I know the UK and USA very well, but Nist is a great place to go.
Highlights:
Diverse Expertise: The discussion stresses the inclusion of CIOs, experts from different business areas, and sector-specific professionals in cybersecurity tabletop exercises to ensure a holistic approach to threat preparedness.
Tailored Scenarios: Scenario planning accounts for the unique vulnerabilities and functions of different sectors, such as hospitals, government agencies, or banks, enabling targeted preparation and response strategies.
Leadership Involvement: Key decision-makers from across the enterprise should participate in tabletop exercises to gain insights into cybersecurity challenges and foster a proactive organizational culture.
Resource Recommendation: NIST (National Institute of Standards and Technology) is highlighted as a valuable resource for structuring tabletop exercises, offering comprehensive guidelines and frameworks for effective cybersecurity planning.
As organizations navigate an increasingly complex cybersecurity landscape, the insights shared underscore the importance of proactive preparation through scenario-based tabletop exercises. By involving diverse expertise and leadership roles from various sectors, organizations can enhance their readiness to address sector-specific threats and vulnerabilities. Leveraging resources like NIST facilitates the structured development of tabletop drills, ensuring comprehensive risk assessment and mitigation strategies. Ultimately, these exercises serve as invaluable tools for strengthening organizational resilience and response capabilities in the face of evolving cyber threats.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on April 23, 2024 at 8:02pm in Blog
They offers valuable takeaways for conducting successful cybersecurity crisis drills, emphasizing participant engagement and actionable outcomes.
Here is the verbatim discussion:
what do I mean by that like they would come in day one and say and you tap on the shoulder you're gone get up get out of here you know go stand in the corner of the room you're an observer you can't say anything it's like wait a minute that's the that's the CFO you just tapped on the shoulder you can't yeah but he's in Germany so he's not he's not able to be here right now so and what about that guy well yeah that's the C that's my chief security officer he's yeah he's on vacation at this Disney World so so we're going to let him so we're going to put him down in the basement and you can call him on the phone but he can't be in the room here he can't look at any of the stuff you know going on so you know that happens a lot um so you know try and you know that's one way you can throw throw them a curve or you could something they're not expecting um because inevitably whatever you plan whatever you're thinking whenever you think you're ready you're never ready right because it's never exactly like I remember during the blackout of 03 people said you know afterwards we got I got interviewed by all these TV stations were you ready were you ready and I'm like well we didn't have that exact scenario of like this blackout you know but we did have a lot of the plans we had just run a tabletop exercise we had just gone through Y2K a few years earlier and we had about 80% of it we were ready for but 20% of it was different 80% we were ready and that was pretty good so um but you know change it up so you know throw curve curve balls as we say in the US um that's another thing I think you need to really um as you mention another real tip is you know a lot of times people get through the exercise and they want to just kind of like say um okay I'm done see you next year see you next January right taking action items like you said and then having people report back it may mean it may not mean you have to have the entire team you know reassemble for part two and that's great if you can but it may be that you just have what we call um you know action items that people have to like report back on by by email or maybe the team comes back and says we want everyone to do the you know you know you assign who's responsible for those action items you have to have a name next to the action items you know these other people can participate Bob you can get together with you know Sarah and Mary and Bill but Bob is the person we're going to hold accountable and we're going to we're going to look for you to come back and update our plan to include this scenario that kind of a thing so you know making sure you do have actionable items I think is really important I think one more thing I would mention is ask people for feedback at the end you I talked about the hot wash in my example a little bit a few minutes ago whether you call it a hot wash whether you call it feedback know maybe you do it in a in a survey you know we do this with customer service all the time and other types of things like that what did you think was reasonable what could we have done better next time what um you know and you get some some pretty sophisticated answers from some Executives um you know around you know it gets them thinking it gets them thinking outside the box it changes things up from their normal environment um I've even seen people say and this is another little side tip don't do don't do you know go to um you know go to an offsite go somewhere else you know get people out of their normal environment so you know during an exercise sometimes the people are doing it all this is hard with covid because people working from home right so you know doing virtual exercises is really hard but they would get people in the same room and they would often do that as an offsite or get them to the emergency coordination Center you know if you if it's a tabletop you may or may not be able to go to the actual place where you would be if it was a real emergency you may but you may not but you know getting people out of their normal environment so they're not like going back and checking their email all the time or you know we had people who disrupted they would pop in and pop out pop in pop out and they were not really engaged they weren't like freed up you know some people would say you know turn your cell phone off and and you say we in a real emergency wouldn't we be texting each other whatever but you know if it's a tabletop exercise May the discussion the comments are very important and you want people to be focused just like if you go to someone a friend or or spouse for dinner you don't want them on the phone the whole time while you're having dinner with them right we all know that that's that's not very o it's not very U polite right it's not very U good etiquette so you want people engaged you want people participating and you want them there you don't want them kind of coming in coming out the whole time yeah Dan that's a great great point that you mentioned so I remember one of those like learning from failure cases kind of stuff so so I I mean that this is not something which I I mean not part of my usual stuff that we do I mean in my normal day-to-day stuff we are into uh red timming kind of stuff but in a few cases where I had been part of The Advisory Board Etc had done some of these exercise so I I recall one of the cases where some of the folks got into the room late around half an hour late so they missed the complete context and the setting and then during this session we did this carve ball where they wanted to uh kind of revive everything from the backup and we said that the backup is encrypted yep the cloud backup is encrypted and that kind of created a lot of frustration and these guys had a lot of challenges and issues to kind of cope up with this scenario and that created a lot of confusion in the room so I think what you mentioned is something very important that uh people should be completely dedicated they shouldn't be moving in and out and they should should have the context they should join the meeting on time and stuff like that else an exercise like this um can't go in the uh can be a very futile one and and if a few people are not engaged and involved that can actually kind of take away the seriousness of this exercise right so any any other thing you want to add Dan in terms of any of these success factors dos and don'ts before we move to the next one I just want to say one final thing that's you know you want to be growing the goal is to improve you know and and you're never going to be perfect this is a journey um it's not like you know some people come in and have observers I know Homeland Security they'll have people just sitting there taking notes and they'll grade you you can you can do that I know they have reasons you know did you do this did you accomplish what were your goals the team that's putting together the exercise certainly should have goals and outcomes that they're looking for and you know you can do that you know I know Homeland Security does that a lot they great people what worked what didn't work.
Highlights:
Throwing curveballs: Simulate unexpected events to test how the team adapts.
Actionable items: Establish clear post-drill steps to improve cybersecurity posture.
Feedback and improvement: Gather participant feedback to refine future exercises.
Minimize distractions: Encourage focused participation by limiting multitasking and interruptions.
Dedicated participants: Ensure participants arrive on time and stay engaged throughout the exercise.
Continuous improvement: View crisis drills as an ongoing process for improving cybersecurity preparedness.
Emphasizes that successful crisis drills require planning, participant focus, and a commitment to continuous improvement. By incorporating these elements, organizations can ensure their teams are better prepared to handle real-world cybersecurity incidents.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on April 23, 2024 at 7:28pm in Blog
This blog post features Dan's career experiences in cybersecurity, including crisis management and drill participation.
Here is the verbatim discussion:
so you kind of have the forming storming norming kind of thing and this was our storming phase so anyway one of the early things that happened this was um I was asked our security team I hadan a security team of around 30 professionals and we were asked to put um wireless networks in all of the conference rooms in state government and so um at that time that was kind of a Cutting Edge issue now you know everyone has Wireless everywhere in their homes and and you know coffee shops and everything but the reality is um that was a Cutting Edge thing at the time and I was my background was you know National Security Agency and we call three letter agencies in Washington so NSA CIA Dia FBI and and I had done my homework and I knew that this was bad you know security you know we couldn't allow Wi-Fi in conference rooms because it was it was uh going to be a problem it was not secure and there were stories in the papers there lots of stories in the US papers about people pulling into home Home Depot and Walmart I'm not Walmart but Home Depot and Lowe's and and different uh parking lots or car parks and and hacking into cash register because the Wi-Fi weren't secure so I had all these papers so basically Terry asked me to prepare we were in the staff meeting and it was like 10 of us in the staff meeting and we got to that agenda item and Terry says dan tell us how we're going to securely put Wi-Fi in all of our government conference rooms and I said um well Terry I've decided to cancel this project we're not going to do it we're not putting Wi-Fi in any of the conference rooms and Terry just looked at me with this stunned look and and I have you know she asked everyone to leave the conference room but me so it was just me and Terry looking looking at each other and I've never seen a government agency meeting end so quickly in my life because you know this was an hourong meeting it was 15 minutes in and she just ended it and she looked me in the eye and she said Dan if that's your answer sir you cannot be the ciso in the state of Michigan basically I was worried I was going to get fired and I said well wait a minute Terry you know you don't understand let me explain I had all these white papers and all this I was going to show her all my background materials about and articles and and books about why this was a bad idea and she says no stop I read all those articles I know what you're going to say I I know what you're thing is but but she said uh I've been to D Ford Chrysler and General Motors they all have Wi-Fi in their conference rooms what do they know that you don't know and so they're like telling so I'm like whoa she says I'm giving you one week to figure this out and come back and give us a plan not the not to deliver it but to give us the plan to do it securely or you're fired so that was a real scary moment for me because it was scary I almost thought I was gonna lose my job I ran back yeah yeah I just sou one more quick thing I'll tell you I went back to my team they were like Did we tell them we're ging Wi-Fi and I said no we're doing Wi-Fi we've got to figure this out so two years later we actually win the award for top Wi-Fi security in the whole country but that really was a a a paradigm shift for me as a person you know that security needs to be enabling they need to be coming with Solutions and not just problems security Pros can't just say no can't do it you've got to come up with a solution that's going to do security or time on budget with the right level of security so that's my most embarrassing story how I almost got fired but it turned into a good thing Terry and I are still friends 20 years later actually well 18 years later and now BOS I want to know what your most embarrassing moment in your career Place sure sure I I I would be happy to but before that did you manage to get fired no but you tried but you tried I kept my J honestly did not get fired and uh it ended up being real a paradigm shift for me because I I started to think about security differently and I you know whenever I had a security challenge it's like who's doing this best who can we learn from look around um and you know state government is not known at that time certainly as one of the leaders in security and and like I said the private sector was doing that better than us and we learned from that and we actually improved we actually got better through that experience interesting very interesting learning I I I believe that there's a lot of interesting takeaway as well outside of uh a very entertaining story for sure so let me share mine yes so this is quite a long time back so almost like couple of decades back and and as a kind of little bit Prelude to the story which is important I used to do a lot of magic shows I mean long time back and by magic shows I don't mean the rabbit out of the Hat trick kind of magic shows but more like the David Blaine kind of stuff mentalism and closeup magic and those kind of stuff I I used to do on stage as well so I was doing like opening shows for college fests and closing shows for college F so I'm doing I I was doing it at a pretty decent level so and and also I started my first startup around that period we were doing this automated penetration testing on the cloud so that was what we were working on so now I went for a visit to Paris to meet some partners and that that was like a slightly gloomy day and little bit of drizzles and I remember I was walking down the stairs um of um they call it Subway right yeah Subway yeah like the underground yeah they call it Subway yeah so or no they call it Metro oh the Metro gu the Metro yeah yeah the underground transport system yeah us is the subway and London is the underground yeah down the stairs and there was a guy who looked like from east Europe he came and told me that I'd like to sell this um iPhone iPhone just got launched and would you like to buy and I was the Blackberry guy during those days yeah now I'm happy with my phone so I was walking down and this guy still followed me and said you know what I need some money badly and my sister is at the hospital I need some money it'll be great help if you could buy this and he eventually came down like he started with somewhere around few hundred EUR and came down to some2 EUR and eventually he told me you know what I need it very very badly can you give it to me I mean I'll give it to you at € 10 or something like that and here's the iPhone and I'm also going to give you this camera a small point and shoot Auto automatic camera and I took that phone and I swiped and everything was working fine and I thought this is interesting because at € 10 EUR if you get a device which is working in worst case even if things are not perfect we can go open it up and look into and use it for hacking so I found that and I think I became a little bit greedy I wouldn't say I tried to help that guy but I said okay here you go I gave the €1 he took this iPhone and the camera put it into a small brown bag and gave it to me and I took that and he started running up the stairs and I opened this brown bag and inside that there were two potatoes oh wow so right in front of me he did the classic switch which I I was pretty well trained to do switch in front of me and that was probably the most expensive pair of potatoes I have still I mean I bought till date that's a great story humbling experience being a security professional I mean that reminds me to stay humble that's great great story so Dan let's get started with some real crisis example today's topic is handling crisis please share some some examples of some real crisis that you dealt with in the past well I've dealt with lots of them um you know when I was CSO for sure one of the biggest ones was the blackout the Northeast blackout of 2003 so you know we had just gone through the whole Y2K and I I I started in Michigan government in 97 and uh you know I'd come from an NSA kind of top secret background you know and Michigan Government was very different than that of course um not a lot of you know not a lot of um very uh secure facilities but the whole Focus during those years from 97 to 2000 were was Y2K so we had prepared you know what if you know all the computers break and we had done a lot of good work to prepare for that um and that went kind of without a hitch but we were all sitting there in the Emergency Center you know on January or or actually you know December 31st January 1st of 2000 but then three years later you know we had we had we had of course two years later we had 911 but not so much happened in Michigan but two years after that we had a a large blackout in Michigan where uh the whole Northeast lost power for two days basically we lost power and it was basically a situation where we had to all go to the emergency coordination Center and respond to no computers no power no huge issues a lot of people thought it was in the US thought it was another 911 they thought you know it was another terrorist attack and uh all the people at the emergency coordination Center uh we were there for four straight days in a in a bunker with you know a generator and um responding to all kinds of issues that parts of the state came back like 24 hours later other parts uh came back more like two days later and some came back three days later but it was a major emergency and and you New York was without power for a couple of days a lot of things happened you know trying to get water from one side of the state to the other um some things you wouldn't necessarily think about like um it was a very hot day it was like 95 degrees Fahrenheit in the US and and restaurants were having to close there was no air conditioning but they were serving spoiled food and so like there there food you know uh inspectors who were having to you know close restaurants because people were eating spoiled food in Detroit and and they needed the technology to support that but they had no power so there was lots of things we had to do and during that time I met tons of people who ended up becoming leaders in Michigan Government over the next decade the person worked closely with was um Colonel etu who was running the whole emergency for uh State Police in Michigan she ended up becoming the director of Michigan State Police so in those kind of emergencies if you're ready if you're prepared if you've got good plans in place um it can really strengthen your security organization to be prepared that was not a hacking attack although some people thought it was a hacking attack initially but you know we responded to that and that was a real life emergency we responded to that's interesting that's very interesting mean that happened due to more like a natural Calamity but that's something which I think all the all the nations today want to stay prepared for right right so uh Dan uh let's talk about some some some of the drills that you have done and so any of these large scale cyber crisis drills that you conducted in the government y yeah so what one of the ones that I want to uh mention was a a um a series of drills that the US Department of Homeland Security does called cyber storm at C YB R storm s o RM and uh the what I'll tell you about the story I'm going to tell you is from cyberstorm 1 which was the first one but they're now up to think cyberstorm 7 is coming they do this every two years and these are Global exercises so um you know they they do them in you know US states they use federal agencies in the US but know the United Kingdom and France and Australia and New Zealand were all part of these exercises so this was a global exercise we were at the first one and my team had prepared it is a weekl long exercise it was a not everyone on our team obviously but it was a large group of people and um I tell people if you want to understand what cyberstorm 1 was like I'm thinking this is back in 2006 so this is going back to the first cyberstorm but there's a lot of really good lessons we learned from that watch the movie Die Hard four Die Hard four with Bruce Willis um it's called live free and die hard where all the power goes out and bombs are going off and it's scary stuff um so we had a situation where we you know the first day of this exercise you know is probably over the top and most cyber exercises today wouldn't start this way but they had bombs going off kind of like 911 again they blew up our data center they blew up um big parts of government um they hacked other parts of government and all of our services were down for two days and it was very very intense and we were like getting beat up we were like humbled our team was just like we were like done I mean we were really kind of overwhelmed by Thursday afternoon though this is what I want to tell you about by Thursday afternoon we were told there was one more thing you have to do in this exercise to train your team and we said okay what is that they said we have to get our bull main frame.
post features Dan's career experiences in cybersecurity, including crisis management and drill participation.
Highlights:
Security needs to be enabling: Security solutions should facilitate business needs, not just create obstacles.
Learning from the private sector: Government cybersecurity can benefit from best practices used in private companies.
Importance of preparation: Cybersecurity preparedness helps navigate real-world emergencies effectively.
Northeast blackout of 2003: A real-life crisis highlighting the value of preparation and collaboration.
Cyber Storm exercises: Large-scale drills conducted by the US Department of Homeland Security to test cybersecurity preparedness.
Emphasizes the importance of proactive cybersecurity measures, including planning, drills, and adaptability. By learning from past experiences and adopting best practices, organizations can strengthen their defenses against cyber threats.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on April 23, 2024 at 6:31pm in Blog
This blog post offers cybersecurity predictions for 2021, emphasizing the evolving threat landscape and the need for continuous improvement.
Here is the verbatim discussion:
But remember that every time you do this it's it's it's different it changes the people are different you think well we all did this and we were great but yeah that was a year ago that was two years ago now the CFO is different the ciso is different the CIO is different so you're doing the sometimes you do the same thing with a different group of people because it may even be the same exercise I would update it hopefully but you remember that that the organization is always changing the world is always changing you know if we didn't exercise today because should be very different than what we would have done one year ago before covid hit you know so hard the reality is is that everything it's it's a moving Target um you're never done but I would celebrate success when you know you accomplish something you know have a party if you will no enjoy it you know you accomplish something move on um and uh and know that you're GNA constantly be hopefully improving it's not like a destination it's a journey and and so you want to constantly improve in in your approach to dealing with cyber threats yes that's a very important thing that you mentioned it's not destination it's a journey so so Dan um in in 2021 what what are some of the things which you think as as cyber Security Professionals we should look out for which could be some interestingTechnologies which could be some some interesting Trends anything that the Cyber Security Professionals should look at vote for in 2021 yeah thanks for asking I every year I do a a top 21 or top whatever the number is this is 2021 so 21 last year it was 20 for 20 for 2020 um I do the top um predictions from all the security vendors in the industry so you go to laurman on on cyber security Lohr MN laurman on cyber security and you'll see this list I do it I've done it annually for um about a decade now and it's not my predictions but it's what all the top vendors were saying so you know certainly a lot of of experts are pointing to ransomware getting you know evolving getting more complex um you know changing where you know a lot of times they're stealing the data before they encrypt it so um they're hitting you twice and if you don't pay they they threaten to release your data um ransomware is a big one working from home picas has changed so much you know threats are just coming in organizations in so many different ways people a lot of times use home computer equipment maybe home routers um even some of the technical difficulties we've had today see it's challenging when people aren't in the office so you know looking at their whole digital transformation which is really occurring at lightning speed the good news is there's a lot of really positive things happening the bad news is there's also more risks that are being introduced into business processes because people are working from home so a lot of the vendors are pointing to different things like they're saying your home network is is is like headquarters for the hackers and you know some very entertaining examples in that in that blog that people can go to and read about we can post the blog if people want to know that um but artificial intelligence is certainly and machine learning is becoming more and more Central um and it's being used against organizations so you need to be thinking hard about you know how are you going to automate a lot of your processes um that's a a big area and then one more I'll mention uh movement to the cloud I mean so much is moving to Cloud um you know Cloud security oh excuse me Cloud platforms and the cloud security is becoming so important um a lot of people say this in the US you know hey I'm moving all my data to the cloud I'm moving all my processes to the cloud you know Google does it better than we do or Microsoft does it better than we do or AWS um Amazon web services does it better than we do so but what they what they miss bicash is that you're still responsible for that end to-end Security even if you got an AWS server maybe they've got a great data center maybe they've got security practices but your people are still administering that or you're still running that business process or you're still running that end to-end security for your customers and your clients so you can't just say well I'm just Outsourcing it all to Microsoft or AWS so really uh Cloud security is becoming even more important and and really something that organizations need to really take a look at what is their processes is uh one word you know a term that we use a lot in the US is sassy s s a a s sassy s e um not not sassy like s SS y in the US is like you know it's s a uh sassy um look it up read about it it's certainly a hot a hot area for a lot of people sassy and uh zero trust correct so so interestingly what you mentioned and and and I fully agree with you the the attack surface all of a sudden has changed so dramatically for organizations yeah that today people actually don't know of all the assets they have they don't know the attack surface and and it's continuously changing even the home uh router the system which end user is using from home these are all now part of the extended attack surface right then you have the cloud and teams are creating new Cloud assets and Cloud interestingly scales everything it scales security it can also scale insecurity both together so I I'm a big believer of cloud and I believe that cloud in the long run is going to create a much more safer world if done right and I I am kind of very confident that we will do it right as an industry because because there is business in there so if there is a business driver it will get done right so uh but in the interim this time is very vulnerable because a lot of time people who are just moving to the cloud are not aware of the configurations uh the way it should be done a lot of people are not aware of mongodb having default the default kind of configuration is insecure so like uh since we monitor the kind of overall internet I I I recall I guess there there's around half a million open databases out there right now yeah which is quite crazy people just did notconfigure it right and these are all just out there open so so these are some very interesting new challenges but on top of it I I I would love to probably add one thing which is one of the biggest challenge which we as the industry face is that when it comes to security there are just too many things that we need every vendor is going to come and say you know what you need this you need that and none of these talks to each other so there is a need for consolidation of cyber security and how could that consolidation happen it could happen probably in many ways uh but one or a few interesting Trends which which are out there which could probably shape the future one is zero trust which is a in other words is a kind of consolidation right I mean you eliminate a lot of things and put everything into a single place.
Highlights
Ransomware: Growing complexity, with data exfiltration before encryption.
Work-from-home threats: Increased attack vectors due to remote work environments.
Digital transformation risks: Security challenges accompanying the rapid shift to digital processes.
Artificial intelligence and machine learning: Increased use by attackers, requiring automation of security processes.
Cloud security: Critical as more data and processes migrate to the cloud.
Shared responsibility model in cloud: Organizations remain accountable for security even with cloud-based services (SaaS).
Zero trust security: A potential consolidation approach to manage the growing number of security solutions.
Emphasizes the evolving cybersecurity landscape and the importance of adapting security strategies to address new threats and challenges. It highlights the need for consolidation within the cybersecurity industry to simplify security solutions.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.
Posted by Gaya M on April 22, 2024 at 10:16pm in Blog
In the ever-evolving landscape of cybersecurity, enterprises face the constant threat of cyberattacks. To fortify their defenses and enhance their preparedness, organizations must conduct regular tabletop exercises for cyber crisis management. Drawing from extensive experience in both government and private sectors, we'll outline a structured framework for conducting these exercises effectively.
.
Here is the verbatim discussion:
How long should it be? What should be the structure? What are some best practices? What are some do's and don'ts? So building a kind of high level structured framework for conducting cyber crisis drill for enterprise, how would you approach that? Great question. Yeah. Solve been a part of many of those, both within government and nowin the private sector, working with us, with infragard, with federal agencies, with us state agencies and others. So, first of all, obviously, there are different types of tabletops. i'm going to talk about one that really, for example, in Michigan, would be a whole of government approach, which really needs to involve the top executive.That's very interesting, Dan. So, Dan, let's consider a scenario like this that suppose we have to do a tabletop exercise for an enterprise. Can you give a kind of playbook for conducting tabletop crisis,cyber crisis drill? So you can start with, like, who are the folks who should be in the room? How long should it be? What should be the structure? What are some best practices? What are some do's and don'ts? So building a kind of high level structured framework for conducting cyber crisis drill for enterprise, how would you approach that?
Highlights:
Key Participants: Engage stakeholders from various departments, including IT, security, legal, communications, and senior management. This ensures a holistic approach and fosters collaboration across different functions.
Duration and Structure: Tailor the exercise duration to the organization's needs and the complexity of the scenario. Typically, tabletop exercises range from a few hours to a full day. Structure the exercise with a clear agenda, including scenario introduction, discussion, and debriefing.
Best Practices:
Realistic Scenarios: Craft scenarios that mimic potential real-world cyber threats faced by the organization.
Active Participation: Encourage active engagement from participants through role-playing and scenario-based discussions.
Learning and Improvement: Emphasize the learning aspect of the exercise, focusing on identifying strengths, weaknesses, and areas for improvement in the incident response process.
Do's and Don'ts:
Do: Foster a supportive environment that encourages open communication and collaboration.
Don't: Overwhelm participants with overly complex scenarios or unrealistic expectations.
Do: Conduct a thorough debriefing session post-exercise to capture lessons learned and actionable insights.
Don't: Neglect to update response plans based on feedback and lessons learned from tabletop exercises.
Tabletop exercises are invaluable tools for enhancing an organization's cyber resilience. By bringing together key stakeholders, simulating realistic scenarios, and emphasizing learning and improvement, enterprises can strengthen their preparedness to effectively respond to cyber crises. Adopting a structured framework that incorporates best practices ensures that tabletop exercises yield actionable insights and contribute to ongoing efforts to mitigate cyber risks.
Speakers:
Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.
Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.
Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.