Artwork for podcast The Cybersecurity Readiness Podcast Series
From Law Enforcement Officer to Chief Information Security Officer
Episode 441st February 2023 • The Cybersecurity Readiness Podcast Series • Dr. Dave Chatterjee
00:00:00 00:33:58

Share Episode

Shownotes

In this episode, Brian Penders, Chief Information Security Officer, at the University of North Carolina Chapel Hill Medical School, shares his exciting but challenging journey from working as an engineering lab technician in the US nuclear submarine to being a law enforcement officer with the Vermont State Police and then gravitating to his current role of Chief Information Security Officer at a major academic institution. He sheds light on the principles driving the high-reliability organizational culture in the US Nuclear Navy Propulsion Program and how those experiences influenced and shaped his growth as a cybersecurity leader.


Time Stamps

02:24 — Take us behind the scenes and share some highlights. What were the drivers? What were the motivators? What can listeners take away from your experience?

09:02 -- Let me first focus on that high-reliability, organizational culture that was established in the US nuclear Navy, and you have lived in that culture. Share a bit about what it is like and what could be some takeaways that are relatable or applicable in the world of cybersecurity governance?

16:08 — Are there any unique challenges that a medical school faces compared to the other units? And if so, how do you go about dealing with them?

19:34 — Research finds that in general, organizations don't do a very good job of rehearsing their incident response plan, sometimes they don't even have a good plan in place. Brian, as a practitioner, what's feasible and what's ideal?

21:36 — Is it fair to assume that institutions are rehearsing how to recover from a ransomware attack?

22:20 -- Is this rehearsal of proactively or reactively, responding to ransomware attacks, taking place at only certain levels, and not at all organizational levels?

23:48 -- So moving on to cybersecurity governance, best practices, there are several out there, would you like to highlight a few that you are really big on?

27:03 -- What's the reality around passwordless authentication?

28:58 -- I'd like to give you the opportunity to share some final thoughts with the listeners.


Memorable Brian Penders Quotes/Statements

"The Navy taught me how to learn, and that was more valuable to me at the time than anything I learned about nuclear engineering."

"Incident response is really a great way to learn the environment and build partnerships across an organization."

"The Navy taught me how to learn. The way admiral Rickover thought through individuals gaining technical knowledge was really amazing. It was based on if you could not draw and explain something to a group of experts sufficiently, then you are not going to move forward."

"If I had 30 seconds with a group, I would tell them to keep their software updated."

"We need to get out of the business of the shared secret. Passwordless authentication is the new and up-and-coming defense to credential theft."

"We have found that folks from liberal arts and humanities can be extremely valuable to supplement and sometimes lead our cybersecurity teams. I'm generalizing, but they're good problem-solvers. They're able to see the big picture, and they're excellent communicators, all amazing skills."


Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast

Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks.

Connect with Dr. Chatterjee on these platforms:

LinkedIn: https://www.linkedin.com/in/dchatte/

Website: https://dchatte.com/

Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338

https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712

Latest Publication: https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/

Transcripts

Introducer:

Welcome to the Cybersecurity Readiness Podcast

Introducer:

Series with Dr. Dave Chatterjee. Dr. Chatterjee is the author of

Introducer:

the book Cybersecurity Readiness: A Holistic and

Introducer:

High-Performance Approach, a SAGE publication. He has been

Introducer:

studying cybersecurity for over a decade, authored and edited

Introducer:

scholarly papers, delivered talks, conducted webinars and

Introducer:

workshops, consulted with companies, and served on a

Introducer:

cybersecurity SWAT team with Chief Information Security

Introducer:

officers. Dr. Chatterjee is Associate Professor of

Introducer:

Management Information Systems at the Terry College of

Introducer:

Business, the University of Georgia. As a Duke University

Introducer:

Visiting Scholar, Dr. Chatterjee has taught in the Master of

Introducer:

Engineering in Cybersecurity program at the Pratt School of

Introducer:

Engineering.

Dr. Dave Chatterjee:

Hello, everyone, I'm delighted to

Dr. Dave Chatterjee:

welcome you to this episode of the Cybersecurity Readiness

Dr. Dave Chatterjee:

Podcast series. Today, I have as my guest, Brian Penders, Chief

Dr. Dave Chatterjee:

Information Security Officer of the School of Medicine at the

Dr. Dave Chatterjee:

University of North Carolina, Chapel Hill. I had the pleasure

Dr. Dave Chatterjee:

of meeting Brian at a cybersecurity conference hosted

Dr. Dave Chatterjee:

by UNC's World View program. And I really enjoyed his

Dr. Dave Chatterjee:

presentation. So I felt that all of you would enjoy hearing what

Dr. Dave Chatterjee:

Brian has to share by way of his experiences and perspectives in

Dr. Dave Chatterjee:

cybersecurity. While I was learning about Brian, the

Dr. Dave Chatterjee:

professional, I was super intrigued by his background, he

Dr. Dave Chatterjee:

has a very interesting journey that began in law enforcement.

Dr. Dave Chatterjee:

In fact, it began in the US Nuclear Navy. And today, he is a

Dr. Dave Chatterjee:

senior information security governance officer, a leader.

Dr. Dave Chatterjee:

It's a fascinating story, a story that he needs to share

Dr. Dave Chatterjee:

himself, not me on his behalf. But bottom line, it's a great

Dr. Dave Chatterjee:

honor and a privilege to have Brian on the show today. Brian,

Dr. Dave Chatterjee:

welcome!

Brian Penders:

Thank you, Dave. It's great to be here. I really

Brian Penders:

appreciate the invite. And yes, it was. It was great meeting you

Brian Penders:

at the conference and having lunch and getting to know each

Brian Penders:

other.

Dr. Dave Chatterjee:

It really was. So Brian, as I just

Dr. Dave Chatterjee:

mentioned in my intro, you have a very interesting professional

Dr. Dave Chatterjee:

background, you worked as a lab technician in the US Navy

Dr. Dave Chatterjee:

Nuclear Submarine for six years, then you were a law enforcement

Dr. Dave Chatterjee:

officer for 15 years before transitioning to incident

Dr. Dave Chatterjee:

response and digital forensics. And now you are the chief

Dr. Dave Chatterjee:

information security officer at UNC School of Medicine. Wow,

Dr. Dave Chatterjee:

what a journey! Take us behind the scenes and share with us

Dr. Dave Chatterjee:

some highlights. What were the drivers? What were the

Dr. Dave Chatterjee:

motivators? What can listeners take away from your experience?

Brian Penders:

Yes, happy to do so. I know, you know many people

Brian Penders:

in the cybersecurity field as I do, I've been amazed at the

Brian Penders:

different backgrounds of these professionals, particularly

Brian Penders:

security leaders, I'm not sure if it's true in other fields,

Brian Penders:

but vast differences, no two are the same. And I love reading

Brian Penders:

about about background of these folks. And mine was like many

Brian Penders:

people in this field, I didn't think about getting into

Brian Penders:

cybersecurity way back. It was something where I wanted to I

Brian Penders:

when I was in college, I took liberal arts and humanities

Brian Penders:

courses. And I was interested in science, but I more read about

Brian Penders:

science on my own. I you know, didn't really do well in science

Brian Penders:

courses in universities, because it seemed a bit more a bit

Brian Penders:

abstract to me. And so after college, my father and my few

Brian Penders:

uncles were veterans, so that influence may. And so I went

Brian Penders:

into this program, I did some research, and I wanted to do

Brian Penders:

some traveling and really get into something that was

Brian Penders:

challenging academically and to serve served my country. And so

Brian Penders:

I looked into this program and went into the six year tour for

Brian Penders:

this naval nuclear propulsion. The first two years is in

Brian Penders:

schools, engineering schools, very challenging curriculums and

Brian Penders:

then went to my duty station, which was a fast attack

Brian Penders:

submarine out of Pearl Harbor. Hawaii. Wow. Very difficult

Brian Penders:

duty. Yeah, a gorgeous place to live no doubt but very difficult

Brian Penders:

duty, was at sea quite a bit. And the work life balance was

Brian Penders:

tough. That's why I can't really recommend this path, I should

Brian Penders:

say because some of these positions were very tough on on

Brian Penders:

the home life, as you can understand. So after the

Brian Penders:

military, I had an interest in law enforcement and you know,

Brian Penders:

people were scratching their heads. Why didn't you use this

Brian Penders:

training? Why didn't you get into civilian nuclear power. And

Brian Penders:

you know, I didn't really have an interest. And for me, and we

Brian Penders:

will talk about this a bit more later, for me, it was about the

Brian Penders:

Navy taught me how to learn. And that was more valuable to me at

Brian Penders:

the time than anything I learned about nuclear engineering. And

Brian Penders:

so that's really threaded through a lot of this journey.

Brian Penders:

And so I went and applied for and got a position with the

Brian Penders:

Vermont State Police after that, and like, like most like every

Brian Penders:

other person, you do patrol work for several years. And then I

Brian Penders:

did some executive protection with the governor's security

Brian Penders:

unit. And then I started to get the itch for technology and

Brian Penders:

something a little more intense and some training. And at first,

Brian Penders:

I looked at a polygraph examiner position, because that had

Brian Penders:

significant training, and was pretty complex and difficult job

Brian Penders:

that didn't work out. And then a Computer Crimes Unit position

Brian Penders:

opened up a very small unit. And keep in mind, this is in 2007,

Brian Penders:

which is when the iPhone came out. So this is when everybody

Brian Penders:

had computers at home. Everybody's got cell phones with

Brian Penders:

them. And as you can imagine, every crime just about had a had

Brian Penders:

a digital component to it. Huge demand for for expertise in this

Brian Penders:

area. So I was fortunate. And you and I talked about this

Brian Penders:

school last time we spoke to be able to go to this amazing

Brian Penders:

facility down in Hoover, Alabama, that's called the

Brian Penders:

National Computer forensics Institute, NCFI. It's literally

Brian Penders:

for state and local law enforcement to learn digital

Brian Penders:

forensics and prosecutors. It's run by the Department of

Brian Penders:

Homeland Security. The first course I was there for a total

Brian Penders:

of 11 weeks. The first course is five weeks where you learn from

Brian Penders:

the ground up about how computers work, how networks

Brian Penders:

operate, and then you get into forensic software and doing

Brian Penders:

forensic exams and writing reports. And then the great

Brian Penders:

thing about it is you go back to your department, with the

Brian Penders:

equipment and the software to get going from day one. And so

Brian Penders:

anyway, those first few years were were I can't say enough

Brian Penders:

about how steep learning curve was. And my biggest takeaway

Brian Penders:

from this position that I brought to North Carolina was

Brian Penders:

there's nothing more terrifying preparing for a trial where the

Brian Penders:

stakes are high. These are many of our victims were children,

Brian Penders:

heinous crimes, you need to get this right. And so it was a lot

Brian Penders:

of, you know, checking and double checking in reaching out

Brian Penders:

to anybody I could. To make sure I got this right, I needed to be

Brian Penders:

able to present data to an older jury, because I think keeping my

Brian Penders:

Vermont as an older state juries are older, a lot of them were

Brian Penders:

not familiar with technology, and then also be technical

Brian Penders:

enough so that the defense examiner, the defense attorney,

Brian Penders:

who also has a defense forensic examiner, you can survive that

Brian Penders:

cross examination. So it was really a way to not only learn

Brian Penders:

the material, but how do I document it? How do I present

Brian Penders:

this to different audiences. That was a really great takeaway

Brian Penders:

from me, when I moved on from Vermont to down here in North

Brian Penders:

Carolina, we had, we had wanted to move south for a couple of

Brian Penders:

years. And I wanted to stay in the field. But I didn't put the

Brian Penders:

work cases were pretty heavy and stressful. And so my wife had

Brian Penders:

always worked in higher education. So I had an interest

Brian Penders:

in trying to work at a university and this worked out

Brian Penders:

at Chapel Hill, like you said, I came down into a digital

Brian Penders:

forensics incident response team lead role, and I really found a

Brian Penders:

home here and it, there's, you know, I was, you know, one

Brian Penders:

flight of stairs away from experts in storage, and servers

Brian Penders:

and emails, Splunk pretty much everything. And incident

Brian Penders:

response is a really great way to learn and environment and

Brian Penders:

build partnerships across an organization. And then after

Brian Penders:

five years there, this position opened up in School of Medicine,

Brian Penders:

where I could do security more across across the board. And

Brian Penders:

it's been great. I've been here almost four years. So that's

Brian Penders:

kind of the journey in a nutshell.

Dr. Dave Chatterjee:

Fascinating. Thank you for your service. I

Dr. Dave Chatterjee:

have many former students who have been in the nuclear navy

Dr. Dave Chatterjee:

vessels, and I've heard a lot of stories. So hats off to you

Dr. Dave Chatterjee:

guys. I believe the training, the expectations are quite

Dr. Dave Chatterjee:

steep. And it really gets everything out of you. So So

Dr. Dave Chatterjee:

yes, you know, we all have our journeys. They're almost meant

Dr. Dave Chatterjee:

to be and we learn. So this is fabulous that I'm able to talk

Dr. Dave Chatterjee:

to you. The US Nuclear Navy Propulsion Program, which

Dr. Dave Chatterjee:

Admiral Hyman Rickover launched, he's considered the founding

Dr. Dave Chatterjee:

father. There was an article written about the culture that

Dr. Dave Chatterjee:

he established, which enabled the program to avoid

Dr. Dave Chatterjee:

catastrophic losses for a long period of time. And this culture

Dr. Dave Chatterjee:

that Admiral Rickover established is characterized by

Dr. Dave Chatterjee:

five or six principles. such as integrity, depth of knowledge,

Dr. Dave Chatterjee:

procedural compliance, forceful backup, questioning attitude,

Dr. Dave Chatterjee:

and formality in communications. So when I was reading this

Dr. Dave Chatterjee:

article about the culture that he had established, and I was

Dr. Dave Chatterjee:

learning about these principles, it dawned on me that why don't

Dr. Dave Chatterjee:

we apply those principles in the private sector in the context of

Dr. Dave Chatterjee:

cybersecurity governance, and try to execute them as best as

Dr. Dave Chatterjee:

we can, as they did, or as they do in the nuclear Navy world.

Dr. Dave Chatterjee:

And we in the private sector will do a lot better. So that

Dr. Dave Chatterjee:

was almost the start of my journey into cybersecurity

Dr. Dave Chatterjee:

research. And in fact that that framework helped me develop my

Dr. Dave Chatterjee:

cybersecurity, holistic governance framework, which is

Dr. Dave Chatterjee:

in my book. So I'm so glad that you are here, Brian, to talk to

Dr. Dave Chatterjee:

us about your variety of experiences. But let me first

Dr. Dave Chatterjee:

focus on that high-reliability, organizational culture that was

Dr. Dave Chatterjee:

established in the US nuclear Navy, and you have lived in that

Dr. Dave Chatterjee:

culture. Share a bit about what it is like and what could be

Dr. Dave Chatterjee:

some takeaways that are relatable or applicable in the

Dr. Dave Chatterjee:

world of cybersecurity governance?

Brian Penders:

Yes, I'll be honest, I had not really thought

Brian Penders:

about tying these principles to my current role until we spoke

Brian Penders:

about this. And you're right, these. First of all, it's

Brian Penders:

probably the least talked about success story. As you know,

Brian Penders:

this, the Nuclear Propulsion Program that was that began with

Brian Penders:

Admiral Rickover. And we're talking about this is now 40

Brian Penders:

years after he retired, and this program is still going strong,

Brian Penders:

as you said, accident free. It's really incredible. But you're

Brian Penders:

right, these principles could probably apply to many

Brian Penders:

industries, but they certainly can for this field. And I would

Brian Penders:

like to touch on a couple things that were a part of Admiral

Brian Penders:

Rickover principles and, and that I saw in my experience

Brian Penders:

there that I've that have stayed with me. One of them is depth of

Brian Penders:

knowledge. That is one thing that I mentioned, the Navy

Brian Penders:

taught me how to learn the way that Admiral Rickover thought

Brian Penders:

through individuals gaining technical knowledge was really

Brian Penders:

amazing it was it was based on if you could not draw and

Brian Penders:

explain something to a group of experts sufficiently, then you

Brian Penders:

are not going to move forward. And this is everything from the

Brian Penders:

micro to the macro, this is this could be drawn explain a

Brian Penders:

particular valve and up to a system, and then how systems

Brian Penders:

work together or an evolution like an engine room startup,

Brian Penders:

talk us through that. And that stays the same not just in the

Brian Penders:

two years of school. But when you get to your duty station,

Brian Penders:

you really are just beginning your training, it doesn't end

Brian Penders:

fact, I think I thought through all of the oral boards that I

Brian Penders:

went through before I was fully qualified as a essentially a

Brian Penders:

junior person in the engineering department and it was around 10.

Brian Penders:

Those are formal ones. That is something that I think he

Brian Penders:

doesn't want, he wanted you to move away from memorization to

Brian Penders:

understand, once you understand there was no need to memorize.

Brian Penders:

But that was a big one. And the other was his focus generally

Brian Penders:

just on people, I think he was the first military person to

Brian Penders:

this is post-WW II. So he's trying to move away from the

Brian Penders:

brawny warrior type to the thoughtful engineer type. I

Brian Penders:

don't think anyone had done that before. And how rank actually

Brian Penders:

took a backseat to knowledge. Many people may not know this,

Brian Penders:

when you stand a watch on a submarine, you may outrank

Brian Penders:

administratively people on that watch, and it seemed to work.

Brian Penders:

When you got off watch you were back in your administrative

Brian Penders:

rank. You didn't have as many privileges as that person but on

Brian Penders:

watch if, if you proved your superior knowledge and qualify

Brian Penders:

that watch station, you were over them operationally. So that

Brian Penders:

was that's fascinating. And then, lastly, another thing he

Brian Penders:

talked about was a preoccupation with failure, thinking about

Brian Penders:

failure, and this is where in cybersecurity, you get to this

Brian Penders:

idea of assume breach, and really zero-Trust is based on

Brian Penders:

having a failure already. So and then, you know, he stressed

Brian Penders:

people before the idea of people, process, and technology,

Brian Penders:

which we know today is very important in that order. And he

Brian Penders:

really stressed that early on.

Dr. Dave Chatterjee:

Sure, sure. I'd like to share something that

Dr. Dave Chatterjee:

was shared by one of my former students, and he said Dr.

Dr. Dave Chatterjee:

Chatterjee in the nuclear Navy vessel when we were given a

Dr. Dave Chatterjee:

command to do something we were required to repeat the command

Dr. Dave Chatterjee:

verbatim, before we executed. And he said, it kind of felt

Dr. Dave Chatterjee:

really awkward. We felt like we are really dumb people, as if we

Dr. Dave Chatterjee:

don't follow, but you realized how much importance and emphasis

Dr. Dave Chatterjee:

was given to communication accuracy, communication

Dr. Dave Chatterjee:

integrity, and that stayed with me as well. When you talk about

Dr. Dave Chatterjee:

cybersecurity governance, and you know it better than anybody

Dr. Dave Chatterjee:

else, because you do it for a living, a lot of it is

Dr. Dave Chatterjee:

communication, but effective communication. And one of the

Dr. Dave Chatterjee:

hallmarks of effective communication is when if you are

Dr. Dave Chatterjee:

communicating something, there has to be a mechanism whereby

Dr. Dave Chatterjee:

you know, that your communication is being received

Dr. Dave Chatterjee:

appropriately. And how do you do that? So that was one way of

Dr. Dave Chatterjee:

doing it is just tell me what I told you. And now that you've

Dr. Dave Chatterjee:

told me what I've told you, and I believe you get it, now go

Dr. Dave Chatterjee:

ahead and execute it. I think that's fabulous.

Brian Penders:

I agree. 100%, it takes out of the equation, one

Brian Penders:

error that could be costly, for sure. Yeah,

Dr. Dave Chatterjee:

exactly. Let's switch gears a little bit,

Dr. Dave Chatterjee:

you are managing the security environment in a medical school

Dr. Dave Chatterjee:

at a large institution, a very reputed medical school. That's

Dr. Dave Chatterjee:

quite the responsibility. I've had CISOs on my podcast, who've

Dr. Dave Chatterjee:

talked about the various challenges that academic

Dr. Dave Chatterjee:

institutions face, and they have shared solutions, best

Dr. Dave Chatterjee:

practices. There are many units within an academic institution,

Dr. Dave Chatterjee:

and you focus on a particular unit, the medical school, are

Dr. Dave Chatterjee:

there any unique challenges that medical school faces compared to

Dr. Dave Chatterjee:

the other units? And if so, how do you go about dealing with

Dr. Dave Chatterjee:

them?

Brian Penders:

Yes, there are. And there's a couple I'd like to

Brian Penders:

talk about. One is really true for all Health Affairs schools.

Brian Penders:

And it's something that a lot of people don't think about. And it

Brian Penders:

has to do with something simple that there are high earners in

Brian Penders:

Health Affairs. And what this means is, we're targeted for a

Brian Penders:

lot of these, what I'll call money grab type scams and

Brian Penders:

attacks. So specifically, years ago, there was a phishing

Brian Penders:

campaign around stealing W2s for tax fraud purposes, and a large

Brian Penders:

percentage of those accounts were from the School of

Brian Penders:

Medicine. Other attacks involving social engineering to

Brian Penders:

get into retirement accounts, we get, I think, we get a large

Brian Penders:

portion of the tech support scams, which really try to get a

Brian Penders:

credit card number, get a credit card number from a

Brian Penders:

doctor, it's different from others, and also just

Brian Penders:

credentials, or medical email credentials are more valuable,

Brian Penders:

frankly, on the dark web to sell. So that's something that

Brian Penders:

we talk to right from when students get here all the way

Brian Penders:

through is be careful, you may be caught up in this. And

Brian Penders:

honestly, those are really have really been the root cause for

Brian Penders:

our incidents that involve regulated data PHI, because

Brian Penders:

there really isn't an interest in the PHI. But because these

Brian Penders:

attacks happen, there may be an email, an exposure of email that

Brian Penders:

contains regulated data. So it's a real headache. It's very risky

Brian Penders:

for us. So we try to talk to our users, our faculty, staff and

Brian Penders:

students about that. The second big category is really around

Brian Penders:

governance risk. There's, if you can imagine the Venn diagram,

Brian Penders:

the School of Medicine is one of the HIPAA covered components of

Brian Penders:

the university. But we are also tied to UNC Health, our partners

Brian Penders:

there, and that's by statute, the Dean of the School of

Brian Penders:

Medicine is also the CEO of UNC Health. We are separate legal

Brian Penders:

organizations, but we share our clinical faculty. You're a

Brian Penders:

faculty members. Well, Dr. Chatterjee. So you know, as a

Brian Penders:

faculty member, you want to be available to people, you want

Brian Penders:

your work to be known. You want people to be able to get in

Brian Penders:

touch with you. And it's particularly easy in that

Brian Penders:

regard, because we're a public university. And when you add the

Brian Penders:

fact that these are also our clinicians who are working with

Brian Penders:

regulated data, they're doing research that involves health

Brian Penders:

information. It's very challenging when you get that

Brian Penders:

mix together. It takes a lot of communication with our faculty

Brian Penders:

to understand the differences and to be able to work with our

Brian Penders:

partners and UNC Health to make sure that there aren't any gaps

Brian Penders:

there that could expose data. So those are the two two big

Brian Penders:

differences here in School of Medicine.

Dr. Dave Chatterjee:

Yeah, thanks for sharing. I'll take

Dr. Dave Chatterjee:

this opportunity to share with the listeners some common

Dr. Dave Chatterjee:

cybersecurity challenges that plague educational institutions.

Dr. Dave Chatterjee:

I talked about these in my talk at UNC where I met Brian. One of

Dr. Dave Chatterjee:

the challenges is dealing with legacy systems, numerous remote

Dr. Dave Chatterjee:

endpoint devices is another challenge, securing students

Dr. Dave Chatterjee:

student body lack of incident response plans, no budget line

Dr. Dave Chatterjee:

item for cybersecurity. yhat's more true for the community

Dr. Dave Chatterjee:

colleges difficulty keeping up with emerging threats. And

Dr. Dave Chatterjee:

finally, the ability to hire and retain staff because

Dr. Dave Chatterjee:

cybersecurity jobs can be exciting, but they can also

Dr. Dave Chatterjee:

cause burnouts. So there can be a high turnover. You emphasize

Dr. Dave Chatterjee:

incident response plans, and research finds that in general,

Dr. Dave Chatterjee:

organizations don't do a very good job of rehearsing their

Dr. Dave Chatterjee:

incident response plan, sometimes they don't even have a

Dr. Dave Chatterjee:

good plan in place. I'm not going to ask you to speak

Dr. Dave Chatterjee:

specifically to your organization. But generically,

Dr. Dave Chatterjee:

Brian, as a practitioner, what's feasible and what's ideal? Yeah,

Brian Penders:

it's a good question. And you're right,

Brian Penders:

these things can slip away as everyone gets busy. But but

Brian Penders:

they're very important. I think the trick is to not think you

Brian Penders:

have to go to the nth degree with this, you know, ideally, we

Brian Penders:

would have something that involve the entire university,

Brian Penders:

UNC Health School of Medicine, and we would get all get

Brian Penders:

together, you don't have to go right there, you could just do

Brian Penders:

something as simple as when you actually have an incident, you

Brian Penders:

can actually use that as an example of checking it against

Brian Penders:

your plans. And when we work with third parties, that's their

Brian Penders:

recommendation to you know, take advantage when things come in to

Brian Penders:

run through your plan. And then honestly, working with third

Brian Penders:

parties to help with tabletops. And reviewing Incident Response

Brian Penders:

Plans, I think is is a great way to go that, you know, they can

Brian Penders:

provide some great expertise, they can sort of sit from the

Brian Penders:

outside and tell you what how you're doing and the direction

Brian Penders:

you need to go.

Dr. Dave Chatterjee:

Okay, good to know ransomware attacks are a

Dr. Dave Chatterjee:

threat to all organizations, academic institutions are no

Dr. Dave Chatterjee:

exception. In fact, they are being hit very heavily. So is it

Dr. Dave Chatterjee:

fair to assume that institutions engage in rehearsing how to

Dr. Dave Chatterjee:

recover from a ransomware attack?

Brian Penders:

Yes, I think it's done under the umbrella of

Brian Penders:

disaster recovery generally, which isn't really specific to

Brian Penders:

ransomware, you usually your infrastructure teams are in

Brian Penders:

charge of developing your business continuity and disaster

Brian Penders:

recovery plans. And they periodically do test restores of

Brian Penders:

systems that would help with ransomware incident or after it.

Dr. Dave Chatterjee:

Okay, that's good to know as well. So

Dr. Dave Chatterjee:

as a faculty member, we get communication from the

Dr. Dave Chatterjee:

Technology Office, the Security Office, from time to time, I

Dr. Dave Chatterjee:

don't recollect any communication or guidance, where

Dr. Dave Chatterjee:

they are proactively preparing us from a ransomware attack that

Dr. Dave Chatterjee:

could freeze our systems, compromise our data. So what I'm

Dr. Dave Chatterjee:

trying to understand is this rehearsal of proactively or

Dr. Dave Chatterjee:

reactively, responding to ransomware attacks, is this

Dr. Dave Chatterjee:

rehearsal taking place at a certain level, and not at all

Dr. Dave Chatterjee:

levels. What would be, I'm just trying to get a better sense,

Dr. Dave Chatterjee:

from your perspective,

Brian Penders:

right? It wouldn't be something that would

Brian Penders:

rise to the user level, it could certainly be an attack and

Brian Penders:

certainly start there. But it'd be more about when a ransomware

Brian Penders:

actors are looking at a large organization, they're not as

Brian Penders:

focused on doing a whole lot with individual users

Brian Penders:

workstations, they're going to use that as possibly an entry

Brian Penders:

point. But it would be taking some time using different

Brian Penders:

malware to move across an organization to get to something

Brian Penders:

that they want could be domain controllers, or could be bigger

Brian Penders:

servers and storage arrays, something that can really hamper

Brian Penders:

the organization such that a payment would be feasible, it

Brian Penders:

wouldn't be something that a user would really get involved

Brian Penders:

with in terms of testing those programs.

Dr. Dave Chatterjee:

So moving on to cybersecurity governance,

Dr. Dave Chatterjee:

best practices, there are several out there, would you

Dr. Dave Chatterjee:

like to highlight a few that you are really big on?

Brian Penders:

Yes, I mean, considering I mentioned, we've,

Brian Penders:

we've had some incidents with phishing and social engineering,

Brian Penders:

our best practices, the last couple of years have focused in

Brian Penders:

those areas in what I'll call a good better best type scenario,

Brian Penders:

where in terms of, let's say passwords, we talked to our

Brian Penders:

users about strong and unique passwords. Now, some of their

Brian Penders:

university accounts are automatically done, but their

Brian Penders:

own accounts. And we focus on things like think about your

Brian Penders:

primary personal email account, and how important that is. You

Brian Penders:

need a strong and unique password. And you need multi

Brian Penders:

factor authentication, because that could be the key to all of

Brian Penders:

your other accounts, least the ones that don't have multi

Brian Penders:

factor authentication. And beyond that, we say now look at

Brian Penders:

your finance, banking, retirement, and then look at

Brian Penders:

your social media. And then if you can, make sure you do that

Brian Penders:

for all them, use passphrases and a lot of those general

Brian Penders:

password guidance but lay lately because of the nuances of the

Brian Penders:

attacks, especially in terms of multifactor workarounds, our

Brian Penders:

exact playbooks of guidance don't really work with our

Brian Penders:

users. So we've been talking to them about this idea of having

Brian Penders:

situational awareness in terms of are you already logged in,

Brian Penders:

you are going to you may get an email, you should look to see if

Brian Penders:

is an external from an external source. And if there is a link

Brian Penders:

there, and if there is you should have, you should be very

Brian Penders:

careful about that link. And if you do, click the link, and

Brian Penders:

you're asked to log in, why would you need to login. And so

Brian Penders:

we use two different MFA solutions here, but the one we

Brian Penders:

use for Microsoft, they should not have to log in as you know,

Brian Penders:

when you log in, you get a session token, it should last a

Brian Penders:

while. So you should really think through why you're being

Brian Penders:

asked to put your credentials in here. Because some of the ones

Brian Penders:

we've seen have been this attack where there's a credential turn

Brian Penders:

around where attackers take the credentials in real time log in,

Brian Penders:

and that will generate a push. So the advice to our users to

Brian Penders:

only accept push notifications that they expect, doesn't work,

Brian Penders:

because they did expect one. So that's when we have had to back

Brian Penders:

up and talk to them about situational awareness. So those

Brian Penders:

are some of the big ones around passwords and MFA, and the other

Brian Penders:

one is updating software, I'll say if I had 30 seconds with a

Brian Penders:

group, I would tell them to keep their software updated. And what

Brian Penders:

we're talking to our users about is they don't really know a lot

Brian Penders:

about the software release cycles and how the software is

Brian Penders:

likely a combination of security updates and new features. Our

Brian Penders:

users get lulled into thinking that it's only new features. And

Brian Penders:

they, you know, hit remind me tomorrow, and they don't quite

Brian Penders:

understand that the updates are security patches for the

Brian Penders:

previous update. And so again, it's a good better best, we

Brian Penders:

don't expect everyone to stop what they're doing. People are

Brian Penders:

busy, but we say as soon as possible. But if you can, within

Brian Penders:

a couple of weeks, get that new software installed, you're going

Brian Penders:

to have the security updates that you need. So those are just

Brian Penders:

a few of the big ones we've been talking about.

Dr. Dave Chatterjee:

Absolutely makes sense. I'd like to react

Dr. Dave Chatterjee:

to a couple of things. When you mentioned multifactor

Dr. Dave Chatterjee:

authentication. Recently, I did an episode on multifactor

Dr. Dave Chatterjee:

authentication fatigue, and that the guest was talking about how

Dr. Dave Chatterjee:

developers detest having to authenticate time and again,

Dr. Dave Chatterjee:

when they're working on 50 different applications that

Dr. Dave Chatterjee:

they're having to go back and forth. And then there are human

Dr. Dave Chatterjee:

beings who are also at times unwilling to have it have to

Dr. Dave Chatterjee:

authenticate every time they are having to log into a system. I

Dr. Dave Chatterjee:

will I will admit that initially, I belonged to that

Dr. Dave Chatterjee:

camp. But I've changed since because I now recognize how

Dr. Dave Chatterjee:

important that security feature is. I also wonder about these

Dr. Dave Chatterjee:

passwords, you know, we're tired of remembering passwords, tired,

Dr. Dave Chatterjee:

tired of trying to save passwords, password protection

Dr. Dave Chatterjee:

managers don't work, they get hacked. We hear about them all

Dr. Dave Chatterjee:

the time. So there's a huge push towards passwordless

Dr. Dave Chatterjee:

authentication, I guess curious, what are your thoughts? What's

Dr. Dave Chatterjee:

the reality around password less authentication?

Brian Penders:

when I think about the big defenses that have

Brian Penders:

come out around identity, certainly MFA years ago was one

Brian Penders:

and I think we're on the cusp of another with web auth. And and

Brian Penders:

using biometrics on your system to prevent this idea of a shared

Brian Penders:

secret, right, we need to get out of the business of the

Brian Penders:

shared secret. And so UNC is moving to offering passwordless

Brian Penders:

authentication this year, we have a strategy to roll it out.

Brian Penders:

And I think it's going to be well received. And we'll see how

Brian Penders:

it goes. But this is going to be attackers will pivot it'll be

Brian Penders:

they may go back to malware, or they may, you know, use malware

Brian Penders:

to grab session tokens. And so there might be a new thing. But

Brian Penders:

this I think is a big new defense to credential theft.

Dr. Dave Chatterjee:

Excellent. Wonderful. So Brian, we are kind

Dr. Dave Chatterjee:

of coming towards the end of our episode here. I wish we could

Dr. Dave Chatterjee:

continue the conversation, but we will have to wrap it up. So

Dr. Dave Chatterjee:

I'd like to give you the opportunity to share some final

Dr. Dave Chatterjee:

thoughts with the listeners.

Brian Penders:

Yeah, I just wanted to spend a few minutes

Brian Penders:

talking a little bit about building teams. You and I

Brian Penders:

discussed this a bit. Last time we talked some of the things

Brian Penders:

that we look for in terms of when we're looking at someone

Brian Penders:

from IT, who's interested in coming to cyber security. We

Brian Penders:

look at Service Desk experience system and server administrators

Brian Penders:

and developers. But it's also important we have found in

Brian Penders:

addition to traditional diversity, diversity of

Brian Penders:

background, we have found that our folks from liberal arts and

Brian Penders:

humanities hat can be extremely valuable to supplement and

Brian Penders:

sometimes lead our cybersecurity teams. I'm generalizing but

Brian Penders:

they're good problem solvers. They're able to see the big

Brian Penders:

picture and they're excellent communicators, all amazing

Brian Penders:

skills. And if they have a propensity and an interest in

Brian Penders:

being technical, that just makes it all the better. And then the

Brian Penders:

other thing is for any folks who are trying to, to get into

Brian Penders:

cybersecurity, it can be really hard. It's easy for us to say,

Brian Penders:

well, you know, just take an entry level IT job and move from

Brian Penders:

there. But that's not feasible for some people. And so the only

Brian Penders:

advice I have is to bug your IT teams wherever you are. And if

Brian Penders:

you're in IT, bug, your security team, I'm, I'm surprised more

Brian Penders:

people don't come and talk to us just knock on our door and say,

Brian Penders:

can you tell us what you do? Show me, show me some of the

Brian Penders:

things that you all do. So I know a lot of my colleagues

Brian Penders:

would welcome would welcome that. So just a few tips for

Brian Penders:

anyone looking to get into cyber

Dr. Dave Chatterjee:

fantastic. In fact, I'd like to reiterate

Dr. Dave Chatterjee:

what you just said that even if you coming from a non technical

Dr. Dave Chatterjee:

background, and there is no reason to shy away from a field

Dr. Dave Chatterjee:

like cybersecurity because the field could benefit from people

Dr. Dave Chatterjee:

bringing in different perspectives, different

Dr. Dave Chatterjee:

expertise. And there are numerous instances of people

Dr. Dave Chatterjee:

with liberal arts degrees. I had a subject matter expert on

Dr. Dave Chatterjee:

another episode, she has a PhD in philosophy, phenomenology was

Dr. Dave Chatterjee:

was the focus of her dissertation. She's a real

Dr. Dave Chatterjee:

techie, she assessed cybersecurity technologies for

Dr. Dave Chatterjee:

the government. So there's nothing that you can't learn,

Dr. Dave Chatterjee:

even if you didn't have the traditional technical training

Dr. Dave Chatterjee:

or technical foundation, it's all a matter of interest and

Dr. Dave Chatterjee:

willing to be curious and being willing to adapt. So I think

Dr. Dave Chatterjee:

there are several other skill sets that come into play,

Dr. Dave Chatterjee:

Brian's own journey, where he himself mentioned coming from a

Dr. Dave Chatterjee:

liberal arts background and how he literally stumbled into these

Dr. Dave Chatterjee:

roles, and then he grew with them. I'm sure he'll be the

Dr. Dave Chatterjee:

first person to agree that he didn't envision himself doing

Dr. Dave Chatterjee:

what he is doing today, when he got out of college with a

Dr. Dave Chatterjee:

liberal arts degree. So do keep that in mind. For those of you

Dr. Dave Chatterjee:

who are aspiring to pursue a career in cybersecurity and

Dr. Dave Chatterjee:

you're sitting on the sidelines, wondering if that would be a

Dr. Dave Chatterjee:

good career move or not, I think it'll be a great career move.

Dr. Dave Chatterjee:

More importantly, there is also the opportunity to secure the

Dr. Dave Chatterjee:

enterprise secure the nation, there is the other aspect to

Dr. Dave Chatterjee:

this job. That makes it very noble. I want to take this

Dr. Dave Chatterjee:

opportunity to thank all the cybersecurity professionals out

Dr. Dave Chatterjee:

there who do this job and they often are never recognized. They

Dr. Dave Chatterjee:

do it behind the scenes. The purpose of podcasts like mine,

Dr. Dave Chatterjee:

is to try to bring them out of their cubicles and share with

Dr. Dave Chatterjee:

the world the realities behind cybersecurity governance, and

Dr. Dave Chatterjee:

all the great things they do. So, Brian, thank you again for

Dr. Dave Chatterjee:

your time. It has been a real pleasure.

Brian Penders:

Thank you very much. I enjoyed the

Brian Penders:

conversation.

Dr. Dave Chatterjee:

A special thanks to Brian Penders for his

Dr. Dave Chatterjee:

time and insights. If you liked what you heard, please leave the

Dr. Dave Chatterjee:

podcast a rating and share it with your network. Also

Dr. Dave Chatterjee:

subscribe to the show, so you don't miss any new episodes.

Dr. Dave Chatterjee:

Thank you for listening, and I'll see you in the next

Dr. Dave Chatterjee:

episode.

Introducer:

The information contained in this podcast is for

Introducer:

general guidance only. The discussants assume no

Introducer:

responsibility or liability for any errors or omissions in the

Introducer:

content of this podcast. The information contained in this

Introducer:

podcast is provided on an as-is basis with no guarantee of

Introducer:

completeness, accuracy, usefulness, or timeliness. The

Introducer:

opinions and recommendations expressed in this podcast are

Introducer:

those of the discussants and not of any organization.

Chapters