Artwork for podcast The Cybersecurity Readiness Podcast Series
Thinking Like A Hacker
Episode 2427th April 2022 • The Cybersecurity Readiness Podcast Series • Dr. Dave Chatterjee
00:00:00 00:50:23

Share Episode

Shownotes

Using compelling stories and metaphors, Ted Harrington, author of Hackable: How To Do Application Security Right, and Executive Partner at Independent Security Evaluators, explains the process of hacking and the importance of being able to think like a hacker. He encourages leaders to get excited about information security investments and look for ways of gaining a competitive edge from those investments.

To access and download the entire podcast summary with discussion highlights --

https://www.dchatte.com/episode-24-thinking-like-a-hacker/


Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast

Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks.

Connect with Dr. Chatterjee on these platforms:

LinkedIn: https://www.linkedin.com/in/dchatte/

Website: https://dchatte.com/

Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338

Transcripts

Introducer:

Welcome to the Cybersecurity Readiness Podcast

Introducer:

Series with Dr. Dave Chatterjee. Dr. Chatterjee is the author of

Cybersecurity Readiness:

A Holistic and High-Performance

Cybersecurity Readiness:

Approach. He has been studying cybersecurity for over a decade,

Cybersecurity Readiness:

authored and edited scholarly papers, delivered talks,

Cybersecurity Readiness:

conducted webinars, consulted with companies, and served on a

Cybersecurity Readiness:

cybersecurity SWAT team with Chief Information Security

Cybersecurity Readiness:

Officers. Dr. Chatterjee is an Associate Professor of

Cybersecurity Readiness:

Management Information Systems at the Terry College of

Cybersecurity Readiness:

Business, the University of Georgia, and Visiting Professor

Cybersecurity Readiness:

at Duke University's Pratt School of Engineering.

Dr. Dave Chatterjee:

Hello, everyone, I'm delighted to

Dr. Dave Chatterjee:

welcome you to this episode of the Cybersecurity Readiness

Dr. Dave Chatterjee:

Podcast Series. Today, I have the pleasure of talking with Ted

Dr. Dave Chatterjee:

Harrington, Executive Partner at Independent Security Evaluators

Dr. Dave Chatterjee:

and he's also the author of Hackable: How To Do Application

Dr. Dave Chatterjee:

Security Right. His company, made up of ethical hackers was

Dr. Dave Chatterjee:

born out of the Ph. D. Program at the Johns Hopkins University.

Dr. Dave Chatterjee:

They have been doing security assessments and security

Dr. Dave Chatterjee:

consulting for a long time for both large enterprises and

Dr. Dave Chatterjee:

funded startups and everyone in between. Since 2005, they have

Dr. Dave Chatterjee:

been hired by hundreds of companies, and they have helped

Dr. Dave Chatterjee:

discover 10s of 1000s of security vulnerabilities. Their

Dr. Dave Chatterjee:

work has appeared in The New York Times, Wall Street Journal,

Dr. Dave Chatterjee:

Washington Post, USA Today, Financial Times, Wired, and CBS

Dr. Dave Chatterjee:

News on Assignment. Hey, Ted, welcome.

Ted Harrington:

Thanks for having me. Excited to be here.

Dr. Dave Chatterjee:

So let's talk about hacking. For the

Dr. Dave Chatterjee:

benefit of the listeners, provide an overview of hacking

Dr. Dave Chatterjee:

like hacking 101, what is it? What are the many consequences?

Ted Harrington:

Sure, so I like this question a lot, because the

Ted Harrington:

concept of hacking and the concept of hackers is pretty

Ted Harrington:

misunderstood. So maybe we start there, like what is what is

Ted Harrington:

hacking? What is a hacker and a lot of times people talk about

Ted Harrington:

this idea, you know, hackers as if they're bad, right? That the

Ted Harrington:

hackers are malicious, or associated with wrongdoing or

Ted Harrington:

evil or whatever. And that's only partly true, because that's

Ted Harrington:

a certain that is certainly a type of hacker. But hackers, the

Ted Harrington:

term hacker is neutral. It's neither good nor bad. It's a

Ted Harrington:

hacker is someone who is a problem solver. They're

Ted Harrington:

creative. They're someone who looks at the way a system works

Ted Harrington:

and says, you know, can it behave differently than what was

Ted Harrington:

intended to do? Can I create something. So that's really what

Ted Harrington:

hackers are, and then the fork in the road comes to motivation,

Ted Harrington:

right? So if someone is doing this, because they want to

Ted Harrington:

obtain some sort of personal gain, they want to harm others.

Ted Harrington:

That's what attackers would be certainly. But the other forks

Ted Harrington:

of the road are ethical hackers, people who do the same things

Ted Harrington:

use the same tools, the same techniques, still want to find

Ted Harrington:

those issues with how a system works. But they do it because

Ted Harrington:

they want to fix the system, they want to make it better,

Ted Harrington:

they want to improve it. And that's the corner of the world

Ted Harrington:

that I come from, that our people all come from. And both

Ted Harrington:

are hackers. So really fundamentally, that's what

Ted Harrington:

hacking is hacking is looking at something and saying, you know,

Ted Harrington:

can it be differently, and there's this classic TV series

Ted Harrington:

called MacGyver that, you know, maybe younger generations might

Ted Harrington:

not be familiar with. I've never even actually really seen

Ted Harrington:

MacGyver myself. But I'm very familiar with the concept of

Ted Harrington:

MacGyver. And he's, you know, this dude, who would just he

Ted Harrington:

create things out of, he'd take things that were supposed to do

Ted Harrington:

one thing and make it do something else. Like if there

Ted Harrington:

was one episode where he, I think he needed to start a car

Ted Harrington:

or something and he took a paperclip, which the purpose of

Ted Harrington:

a paperclip is to clip together paper. And he used this to like

Ted Harrington:

somehow, you know, ignite the engine in a vehicle. That's a

Ted Harrington:

hacker that's someone who says, you know, things supposed to

Ted Harrington:

work in a certain way, can I make it behave differently, and

Ted Harrington:

then motivation determines whether that's a good thing or a

Ted Harrington:

bad thing.

Dr. Dave Chatterjee:

That's interesting. That's an

Dr. Dave Chatterjee:

interesting way of looking at hacking. I never thought about

Dr. Dave Chatterjee:

it as hackers as problem solvers. But I see from where

Dr. Dave Chatterjee:

you're coming. With the growing expansion of attack surfaces and

Dr. Dave Chatterjee:

evolution of attack vectors. It's hard for organizations to

Dr. Dave Chatterjee:

keep up with the latest hacking methods and techniques. And

Dr. Dave Chatterjee:

that's why companies often hire organizations that are made up

Dr. Dave Chatterjee:

of ethical hackers to help them stay on top of information

Dr. Dave Chatterjee:

security management to the extent possible. So shed some

Dr. Dave Chatterjee:

light on why hackers might be interested in breaching systems

Dr. Dave Chatterjee:

of certain types of organizations over others, if

Dr. Dave Chatterjee:

that's the case, that may not be the case. And related to that,

Dr. Dave Chatterjee:

are any organization types more vulnerable than others? Yeah,

Ted Harrington:

let's tackle those separately, because they

Ted Harrington:

let's

Ted Harrington:

are two slightly different questions. But that can be

Ted Harrington:

conflated. So why would an attacker attack a specific

Ted Harrington:

organization? I think this is a wonderful question. And it goes

Ted Harrington:

to the heart of one of the very common misunderstandings that

Ted Harrington:

people have about attackers. Most people think that this idea

Ted Harrington:

of we've already broken down that there's, you know, hackers

Ted Harrington:

can be good, or hackers can be bad. But even amongst the bad

Ted Harrington:

hackers, they're not all the same thing. But we often talk

Ted Harrington:

about them as if they're all the same thing. And that's actually

Ted Harrington:

not true. So different attacker groups, they're motivated to

Ted Harrington:

achieve different outcomes. So the most common one, almost

Ted Harrington:

everybody talks about hackers as being profit motivated. And that

Ted Harrington:

is indeed a very compelling motivation for many types of

Ted Harrington:

attackers. I mean, basically, anyone who engages in ransomware

Ted Harrington:

profit is the motive. Almost everyone, there's, there's cases

Ted Harrington:

where maybe you use that to hide your other motive, but so

Ted Harrington:

someone who wants to make money that's like organized crime as

Ted Harrington:

an example, they are attacking because they want to make money.

Ted Harrington:

But then you've got groups that are more interested in

Ted Harrington:

notoriety, right. So maybe it's someone who just they want to

Ted Harrington:

prove they can do it, or they want to go to brag about it, or

Ted Harrington:

they want to, yeah, they just want the notoriety associated

Ted Harrington:

with it. That's a different motivation from someone who may

Ted Harrington:

be like anonymous, the hacker collective that fits in the

Ted Harrington:

group of what are called hacktivists, which they attack

Ted Harrington:

organizations in order to make a statement. And then there's

Ted Harrington:

nation states that attack organizations in order to pursue

Ted Harrington:

their geopolitical objectives. And so when we think about

Ted Harrington:

different attackers having different motivations that comes

Ted Harrington:

into play, in terms of how we now think about how we defend,

Ted Harrington:

because we think about, well, what are we trying to protect,

Ted Harrington:

and is what we have something that an attacker could pursue

Ted Harrington:

their specific motivation for. So they want to feel like a lot

Ted Harrington:

of companies, they'll say, Well, I don't have anything valuable,

Ted Harrington:

I don't protect any valuable data. So no one's going to

Ted Harrington:

attack me because I don't have valuable data and no one's gonna

Ted Harrington:

make money off of attacking me. And hopefully, what I just

Ted Harrington:

illustrated makes it clear that that's actually not the case.

Ted Harrington:

You know, you might not have valuable data, but maybe you

Ted Harrington:

have, maybe your organization can be swept up in a botnet.

Ted Harrington:

Your computational power can be used in a broader DDoS type

Ted Harrington:

attack. Maybe your organization has some sort of influential

Ted Harrington:

information on maybe population trends or things that are

Ted Harrington:

happening on a national level that another nation might want

Ted Harrington:

to understand. So we have to understand the attacker, why

Ted Harrington:

they're motivated in order to help ourselves think about what

Ted Harrington:

do we need? Why would someone attack us?

Dr. Dave Chatterjee:

Very true, very true. We hear this phrase

Dr. Dave Chatterjee:

'thinking like a hacker' a lot. The ability to think like a

Dr. Dave Chatterjee:

hacker is considered a best practice in cybersecurity

Dr. Dave Chatterjee:

governance. I'd like to probe a little deeper into it. Can you

Dr. Dave Chatterjee:

shed some light on that?

Ted Harrington:

Yeah, I'm, I'm definitely one of those people

Ted Harrington:

who's out there banging this drum. I say this to anyone who

Ted Harrington:

will listen that Yeah, to defend against an attacker, we need to

Ted Harrington:

think like an attacker. Um, and this this idea of more

Ted Harrington:

generally, you know, think like a hacker, whether that's a you

Ted Harrington:

know, good type of hacker or a bad type Agere. This is

Ted Harrington:

absolutely mission critical for organizations to be able to

Ted Harrington:

secure their what it is, whatever it is, they're trying

Ted Harrington:

to protect the most, they really need to think like, someone who

Ted Harrington:

would attack a system. And that's not very easy actually to

Ted Harrington:

do. And most people aren't wired that way. I often think of this,

Ted Harrington:

like the movie, The Matrix. Maybe this is a little bit of a

Ted Harrington:

spoiler, but the movie has been out for, like 25 years. So if

Ted Harrington:

you haven't seen it yet, that's on you. And then I'm spoiling

Ted Harrington:

it. You know, you find out partway through this movie, that

Ted Harrington:

you know, everyone who's living normal life, like we live normal

Ted Harrington:

life, you know, here on Earth, all of a sudden, you're actually

Ted Harrington:

in a simulation. And when you unplug from the matrix, you

Ted Harrington:

realize you're, you're now living reality, but the reality

Ted Harrington:

is really ugly. You're in this like post apocalyptic world and

Ted Harrington:

it's like everything cold your food is basically like eating

Ted Harrington:

dust. It's, it's a terrible life, but you have freedom. And

Ted Harrington:

I often think of that's what it's like, once you can think

Ted Harrington:

like a hacker is like once you unplug from the matrix, and you

Ted Harrington:

see kind of all the darkness in the world. Hold, there's no

Ted Harrington:

going back. And so it's not for everybody, not everybody should

Ted Harrington:

not think that everybody doesn't have the capability to see the

Ted Harrington:

world that way. And most people probably don't want to see the

Ted Harrington:

world that way. But those of us who are engaged in this as a

Ted Harrington:

profession, or even as a hobby, this is the way that we see it.

Ted Harrington:

And the reason that this is important is, I guess, think of

Ted Harrington:

it like, what's any metaphor, I don't know, think of a sports

Ted Harrington:

metaphor, right? If you're, if you're playing against an

Ted Harrington:

opponent coming up this weekend, how are they going to think

Ted Harrington:

about their plan to try to win the game against you, right, you

Ted Harrington:

have to put yourself in the shoes of your opponent, in order

Ted Harrington:

to be able to understand how will you like what's, what's the

Ted Harrington:

lens through which they see you, and how will you be attacked.

Ted Harrington:

And that's why this idea of thinking like a hacker is

Ted Harrington:

really, really important. Because, again, to use a sports

Ted Harrington:

metaphor, like when when we think as defenders, that sort of

Ted Harrington:

like someone who's, you know, playing basketball, and they're,

Ted Harrington:

they're playing defense on their heels, right. And so anyone

Ted Harrington:

who's played really any ball sports, any team sports knows

Ted Harrington:

that if your weight is on your heels, it's really, really hard

Ted Harrington:

to react to the ball coming at you. And so the advice is, you

Ted Harrington:

always have to be on your toes, you have to be leaning forward,

Ted Harrington:

not leaning backwards. And so when we think like defenders,

Ted Harrington:

we're leaning backwards, we're sort of like waiting for the

Ted Harrington:

world to come to us. But that makes it really hard to react.

Ted Harrington:

Instead, we should be leaning forward, we should be on our

Ted Harrington:

toes. And we should be thinking like, Hey, we're actually on the

Ted Harrington:

offense, not on the defense. And that's what think like a hacker

Ted Harrington:

helps you do.

Dr. Dave Chatterjee:

And so, you know, as you said, that you

Dr. Dave Chatterjee:

don't expect everyone to think like a hacker. Now, maybe the

Dr. Dave Chatterjee:

cybersecurity professionals in the organization, who are paid

Dr. Dave Chatterjee:

to, you know, be proactive, make recommendations on how to secure

Dr. Dave Chatterjee:

the organization, from new attack types, maybe they are the

Dr. Dave Chatterjee:

ones who should be thinking like a hacker. But I'm just curious

Dr. Dave Chatterjee:

to know, your thoughts and perspectives on the other group,

Dr. Dave Chatterjee:

the folks who generally get compromised, they are not very

Dr. Dave Chatterjee:

security savvy, they learn as best they can, what they're told

Dr. Dave Chatterjee:

by the organization. For those folks, obviously, they are not

Dr. Dave Chatterjee:

the type that you'd recommend, think like a hacker. But what

Dr. Dave Chatterjee:

advice do you have for them?

Ted Harrington:

Yeah, so as you can, as you're gonna see,

Ted Harrington:

throughout the crowd, I'm big on metaphors. So let's, let's use

Ted Harrington:

the metaphor of someone who builds skyscrapers, right? So

Ted Harrington:

that particular type of contractor that takes a specific

Ted Harrington:

skill set, developed over a long period of time, you know, how to

Ted Harrington:

build a skyscraper. Now, if someone comes to you and says,

Ted Harrington:

Hey, we've got this other skyscraper over here, and we

Ted Harrington:

need to demo it, we need to demolish it. You know how these

Ted Harrington:

things, you build these things all day? Can you demolish this

Ted Harrington:

one? They'd be like, maybe like, I guess I know the fundamentals

Ted Harrington:

of how it's built. But like, that's not what I do. That's not

Ted Harrington:

my profession. That's not my chosen craft. So what do they

Ted Harrington:

do? They say, Well, why don't we get a demo expert in here to do

Ted Harrington:

the demo, and I'll work with them. And I'll say, you know,

Ted Harrington:

we'll, we'll talk through the mechanics of this building. And,

Ted Harrington:

and that's how we'll have a successful demolition. But

Ted Harrington:

they're two completely different crafts. So the first piece of

Ted Harrington:

advice is, you need to work with somebody, like you're the

Ted Harrington:

builder, you need to work with a breaker, right? So companies who

Ted Harrington:

are out there building, whatever system that you're building, you

Ted Harrington:

definitely want to work with ethical hackers, because they

Ted Harrington:

help you because they bring that expertise, that, as you

Ted Harrington:

correctly noted, isn't necessarily the core part of

Ted Harrington:

what it is that you're doing. It's similar to like any

Ted Harrington:

expertise that you would partner with externally, so companies

Ted Harrington:

all the time will partner with, you know, outside counsel,

Ted Harrington:

outside accountants outside, you know, pick your expertise,

Ted Harrington:

they'll, they'll say, Hey, you're gonna come and sort of be

Ted Harrington:

the surgical strike that does this specific thing that we

Ted Harrington:

don't actually fully staffing out. So that's the first thing

Ted Harrington:

is, you know, work with outside organizations. Second thing is

Ted Harrington:

to, even though that that's what has to happen is you have to

Ted Harrington:

work with outside organizations who specialize in this thing.

Ted Harrington:

You want to also make sure that you understand the principles.

Ted Harrington:

So if we use that, the skyscraper metaphor, the guy who

Ted Harrington:

or the guy or the gal who builds a skyscraper should also know

Ted Harrington:

where the weaknesses are and know and know how it might

Ted Harrington:

crumble if it's not built correctly. Now, that doesn't

Ted Harrington:

mean they're gonna go out and do demo, but they're going to know

Ted Harrington:

like, Hey, this is a, you know, this type of joint stresses in a

Ted Harrington:

in a bad way, we should make sure we don't use that type of

Ted Harrington:

joint. And I'm way oversimplifying the practice of

Ted Harrington:

building a skyscraper for sure. But you know, it's for

Ted Harrington:

illustrative purposes. And so that's the second piece of

Ted Harrington:

advice is make sure you understand the principles so

Ted Harrington:

your work with someone else, but still, you have to make sure

Ted Harrington:

that they understand the principles yourself. And then

Ted Harrington:

the third is this. It's abstract, but it's keep asking

Ted Harrington:

these questions, right? It's your whatever it is that you do

Ted Harrington:

in any profession, your core expertise, you're going to, you

Ted Harrington:

know, that's where the focus of your develop effort developing

Ted Harrington:

yourself is going to be. But there's always going to be these

Ted Harrington:

things on the periphery that like, oh, I should probably know

Ted Harrington:

about that. But maybe I'm not the expert in that. But by

Ted Harrington:

asking the questions of what do I need to know about x? So the

Ted Harrington:

person who's listening to this right now, who builds systems

Ted Harrington:

and says, What do I need to know about security? That question is

Ted Harrington:

so important, it's so powerful, because just by asking it, it

Ted Harrington:

leads you to the type of growth that is necessary, in order to

Ted Harrington:

make sure you understand the principles even though the, the

Ted Harrington:

entity or the person who's going to be responsible for this is

Ted Harrington:

going to be someone else, you can't completely delegate it to

Ted Harrington:

someone else.

Dr. Dave Chatterjee:

I agree. I wholeheartedly agree. In fact,

Dr. Dave Chatterjee:

as you were talking, a thought came to mind. I wish you know,

Dr. Dave Chatterjee:

that. There are more demonstrations, visual

Dr. Dave Chatterjee:

demonstrations, graphical illustrations, and various forms

Dr. Dave Chatterjee:

of presentations made available to the masses, where people get

Dr. Dave Chatterjee:

to see how hackers think, how hackers act. And I realized that

Dr. Dave Chatterjee:

can get very technical, but that's where the skill lies. Can

Dr. Dave Chatterjee:

we present the technical stuff in a non technical way you, you

Dr. Dave Chatterjee:

use metaphors and you, you know, kind of talked about several

Dr. Dave Chatterjee:

movies. So maybe we need more media help here to popularize

Dr. Dave Chatterjee:

thinking like a hacker. So everyone on the street literally

Dr. Dave Chatterjee:

has some sense of what these guys are up to how they are

Dr. Dave Chatterjee:

thinking how they try to attack, not to suggest that this would

Dr. Dave Chatterjee:

make everyone an expert, but at least it whets the appetite, it

Dr. Dave Chatterjee:

gives them a basic understanding. And that would

Dr. Dave Chatterjee:

help the organization to mobilize support from from all

Dr. Dave Chatterjee:

parts of the organization. Thoughts, reactions?

Ted Harrington:

Yeah, well, let me try to illustrate with maybe

Ted Harrington:

a metaphor that most people can relate to. Most people don't

Ted Harrington:

like waiting in line. Right? I think that's just, even though

Ted Harrington:

everyone does wait in line, like people literally spend money and

Ted Harrington:

vacation time to go to places like Disneyland, because they

Ted Harrington:

want to wait in line all day. So they can, you know, wait in line

Ted Harrington:

for an hour to take a three minute ride. Not for me, but

Ted Harrington:

hey, you know, whatever floats your boat, but I think but, but

Ted Harrington:

most people, even though they wait in those lines, they pay to

Ted Harrington:

wait in those lines, they take time off their job to wait in

Ted Harrington:

those lines, people would still say they don't like waiting in

Ted Harrington:

the line. I think that's sort of a universal human condition. No

Ted Harrington:

one, no one is enjoying the line. So let me tell you about a

Ted Harrington:

story that I had involving a line and this is this story

Ted Harrington:

actually is a form of social engineering. But the components

Ted Harrington:

to it describe exactly the process that an attacker would

Ted Harrington:

go through. So if we can imagine a bar, and the bar is going to

Ted Harrington:

be you know, a bar, like a nightclub. This bar represents

Ted Harrington:

our, it represents a, a system that someone is building. So I

Ted Harrington:

this was a few years ago, I wound up going to this, this

Ted Harrington:

bar, and I was meeting up with some friends. And I can't

Ted Harrington:

remember why I needed to go to this specific bar. But I mean,

Ted Harrington:

it was like someone's birthday, but I had to go to this. It

Ted Harrington:

wasn't like, we'll just go to another bar, and there was this

Ted Harrington:

huge line. And then when you you get through this whole long line

Ted Harrington:

takes a half an hour or whatever, then you pay a cover

Ted Harrington:

charge to get in. And I didn't want anything to do with either

Ted Harrington:

of those. I was like I don't want to wait in line and then

Ted Harrington:

pay you know, whatever. 20 bucks just just for the right to now

Ted Harrington:

go in and I'll spend more money. So I did what you know, really

Ted Harrington:

any hacker minded person does the first thing I did was I

Ted Harrington:

assessed the system I looked at how does the system work? Okay,

Ted Harrington:

well, there's a line that gets you in and, and then you pay a

Ted Harrington:

cover when you're in and that grants you access. But I noticed

Ted Harrington:

there's also this other area for a VIP entrance. And that VIP

Ted Harrington:

entrance, you can only there's no line, there's no cover, but

Ted Harrington:

you can only go in if you're on the list. So that's the second

Ted Harrington:

thing I did was I said alright, well, how could the challenge

Ted Harrington:

question was how can I make them believe I'm on the list? I'm not

Ted Harrington:

on the list, but how can I make them believe it? So that's the

Ted Harrington:

second thing that attackers will do, though. They'll essentially

Ted Harrington:

set out a challenge statement for themselves. Like what's the

Ted Harrington:

goal? What am I trying to do? And in this case, I was trying

Ted Harrington:

to get the privileges of someone on the VIP list when I didn't

Ted Harrington:

have those privileges. That's called privilege escalation. So

Ted Harrington:

then the next thing I did was what any attacker Do I, I probed

Ted Harrington:

some I established some assumptions about how the system

Ted Harrington:

worked. And my assumption was, if I can produce the name of

Ted Harrington:

someone on that list, they will assume I'm on the list. So that

Ted Harrington:

was my goal, I needed to produce a name on the list. I did not

Ted Harrington:

know any names. So here's what I did. So I walk right up to the

Ted Harrington:

VIP hostess, and I say, Hi, I'm on the list. Now, again, I just

Ted Harrington:

told you I'm not I'm not listed. She doesn't know this, but I'm

Ted Harrington:

not on the list. So I said, Hi, I'm on the list. So when she

Ted Harrington:

asks me, What My name is telling her my name wasn't going to

Ted Harrington:

help, because I'm not on the list. And guessing is like,

Ted Harrington:

what's the chances? I guess somebody's name, right? Like,

Ted Harrington:

it's so like, why even bother? So I'm not gonna guess. So

Ted Harrington:

instead, I issue what's called a specially crafted input. Now,

Ted Harrington:

this is when an attacker is probing a system to see how it's

Ted Harrington:

going to react. And in this case, a specially crafted input

Ted Harrington:

was I said, Well, I'm with the group, I made an assumption that

Ted Harrington:

the there was going to be a group, and the group would be on

Ted Harrington:

the VIP list. And so when she said which group again, I

Ted Harrington:

didn't, you know, same problems, I didn't know the names of any

Ted Harrington:

group guessing wasn't going to help. So again, I asked, I

Ted Harrington:

issued another specially crafted input, and I said, I'm with the

Ted Harrington:

big group. And I was making an assumption that that would be

Ted Harrington:

something that would be on the list, there would be one group

Ted Harrington:

larger than others. And with that, she looks down at her

Ted Harrington:

clipboard, she flips a couple pages, and she says, Oh, the

Ted Harrington:

Smith party. And I said, Yes, I am with the Smith party. And

Ted Harrington:

with that, I had achieved the goal, I associated myself with a

Ted Harrington:

name on the list, she opens the velvet rope escorts, we passed

Ted Harrington:

the law and pass the cover charge. And, you know, I went

Ted Harrington:

into the bar, I should say, as a sidebar, I am an ethical hacker.

Ted Harrington:

So even though I did not pay the cover charge, I'm more than made

Ted Harrington:

up for it with over tipping my bar staff, everyone, the only

Ted Harrington:

person who lost money that night was probably me, like everyone

Ted Harrington:

made out. But I didn't have to wait in line, which is what I

Ted Harrington:

didn't want to do. But the point of that story, whether you like

Ted Harrington:

going to bars or not, or you've never even been to a bar, we've

Ted Harrington:

all been in situations we don't like waiting in line. And that

Ted Harrington:

story can illustrate in a way that I think everyone can relate

Ted Harrington:

to the process that attackers go through.

Dr. Dave Chatterjee:

Excellent. That's a very, very interesting

Dr. Dave Chatterjee:

and telling story. In fact, that reminds me, this is not so much

Dr. Dave Chatterjee:

about how hackers hack, but how to be on your guard to be on

Dr. Dave Chatterjee:

your defense. And I wasn't that night, where I went to a

Dr. Dave Chatterjee:

restaurant at great city, I won't name it here. And it was a

Dr. Dave Chatterjee:

Halloween, I think, and it was a haunted restaurant. So we were

Dr. Dave Chatterjee:

having dinner there. And the lights were very dim. And you

Dr. Dave Chatterjee:

know, they were trying to create that atmosphere I was in my

Dr. Dave Chatterjee:

family. So we had dinner. And then when the waitress came up

Dr. Dave Chatterjee:

asking for the credit card, I gave it to her without thinking

Dr. Dave Chatterjee:

twice that I should be scanning the card right there. And then I

Dr. Dave Chatterjee:

shouldn't be giving it to somebody. And next moment. Well,

Dr. Dave Chatterjee:

you know, that night, everything went off. Well, we checked out

Dr. Dave Chatterjee:

and we had a good night's rest. Next morning, I was driving my

Dr. Dave Chatterjee:

son for his tennis match. And then I got a call. I was not

Dr. Dave Chatterjee:

planning to take the call. It was an 800 number call. But then

Dr. Dave Chatterjee:

I did. I'm glad I did. It was a Bank of America representatives

Dr. Dave Chatterjee:

asking where I was the previous night. And then he was able to

Dr. Dave Chatterjee:

share some data and facts that told me that my card got hacked.

Dr. Dave Chatterjee:

And it was already being used in the state of California. And I

Dr. Dave Chatterjee:

was on the eastern part of the country. So I knew that somebody

Dr. Dave Chatterjee:

had gotten access to it. So this is an example where even those

Dr. Dave Chatterjee:

of us who are conscious about this phenomenon will play a

Dr. Dave Chatterjee:

role. Even they can get caught napping and they can get

Dr. Dave Chatterjee:

compromised, and which has happened to me not once but

Dr. Dave Chatterjee:

several times. And that's all the more I believe the need for

Dr. Dave Chatterjee:

reiterating reinforcing some fundamental principles, some

Dr. Dave Chatterjee:

guidelines and recommendations. Because I believe that the very

Dr. Dave Chatterjee:

best of people have been, can be or will be breached in the

Dr. Dave Chatterjee:

future. So that is great. Good discussion on that topic.

Dr. Dave Chatterjee:

Switching gears a little bit. Let's talk about security

Dr. Dave Chatterjee:

assessments. It's reasonable to assume that most organizations

Dr. Dave Chatterjee:

are engaging in security assessments. But the more

Dr. Dave Chatterjee:

nuanced question is, are they engaging in the right kinds of

Dr. Dave Chatterjee:

security assessments with methodologies that best align

Dr. Dave Chatterjee:

with their desired outcomes? What are your thoughts?

Ted Harrington:

You are preaching to the choir right

Ted Harrington:

now? That is that is the question in that matter that

Ted Harrington:

absolutely is the question that matters. Wow. So the way you

Ted Harrington:

actually framed the question first was, you know, we're

Ted Harrington:

assuming that most organizations are getting security

Ted Harrington:

assessments. I hope that is true. I guess it should be

Ted Harrington:

stated that that's assuming an organization is something worth

Ted Harrington:

protecting, that is actually an important item to note. So if

Ted Harrington:

you don't have something worth protecting, then like, why would

Ted Harrington:

you invest in protecting it doesn't matter. But assuming you

Ted Harrington:

do, I mean, someone who's listening to a show like this,

Ted Harrington:

you probably do. Right? You wouldn't be investing your time,

Ted Harrington:

in listening to Ted ramble until random metaphors, if you didn't

Ted Harrington:

have something to protect, so we're assuming have something to

Ted Harrington:

protect, you're getting these security assessments done. And

Ted Harrington:

the real problem that I see, I mean, one of the motivations to

Ted Harrington:

want to write a book was because I saw this rampant problem all

Ted Harrington:

over the place, which is that the way that we talk about

Ted Harrington:

security testing, and we I'm talking about collectively, the

Ted Harrington:

security community, but also those who engage with security

Ted Harrington:

community who hire security professionals to do security

Ted Harrington:

testing, we talk about it in very imprecise ways. And it

Ted Harrington:

winds up leading to some really bad outcomes. So what most

Ted Harrington:

people want when they're hiring, security testing? Well, there

Ted Harrington:

are different motivations for why someone would go hire one.

Ted Harrington:

But they're usually something like, well, I need to prove it

Ted Harrington:

to someone else. And I need to actually secure the thing. So

Ted Harrington:

those are, sometimes hopefully, it's both sometimes it's just

Ted Harrington:

one, like, I need to prove this, I don't care what it is, I need

Ted Harrington:

to prove it to someone else that I did a security test. But In

Ted Harrington:

but in the case of, you know, the more progressive companies

Ted Harrington:

definitely, they're actually trying to improve the security

Ted Harrington:

of the system. They're not just going through the motions. But

Ted Harrington:

the problem is, the way we talk about security testing is we use

Ted Harrington:

terms incorrectly all the time. So people often will ask for

Ted Harrington:

penetration testing. That's sort of the term that's become the

Ted Harrington:

catch all. But penetration testing is a very specific type

Ted Harrington:

of thing. But complicating that problem, they're asking for

Ted Harrington:

penetration testing, they're usually sold something else.

Ted Harrington:

Like if you Google that term, right now, almost all the

Ted Harrington:

results you're gonna get, not all of them, but at least three

Ted Harrington:

quarters of them are something else, they're going to be

Ted Harrington:

vulnerability scanning, they're not penetration testing. But

Ted Harrington:

then what makes it even more complicated is that what people

Ted Harrington:

actually need usually isn't actually penetration testing at

Ted Harrington:

all. What they usually need is what's called vulnerability

Ted Harrington:

assessments. And I can definitely I've, of course, I've

Ted Harrington:

metaphors, I can explain the difference between these these

Ted Harrington:

three types. But the point that I want to leave on answering

Ted Harrington:

your question here is that those are three really different

Ted Harrington:

things. They entail different investments of time, and money

Ted Harrington:

and person power, and they deliver different things. So

Ted Harrington:

when people are asking for something, they're getting

Ted Harrington:

something else, and yet they actually needed a third thing

Ted Harrington:

altogether, have we actually achieved the mission? Right?

Ted Harrington:

Have we actually accomplished what we set out to accomplish,

Ted Harrington:

and that is a really big problem.

Dr. Dave Chatterjee:

There are a few things that you've mentioned

Dr. Dave Chatterjee:

more than once now, and I believe it, it's worth

Dr. Dave Chatterjee:

reiterating, re emphasizing, and that is, an organization needs

Dr. Dave Chatterjee:

to know, or needs to have a good understanding of what it wants

Dr. Dave Chatterjee:

to secure. And what are the tools, the methodologies, the

Dr. Dave Chatterjee:

techniques that are out there? Now, one is not expecting an

Dr. Dave Chatterjee:

organization, especially smaller organizations resource

Dr. Dave Chatterjee:

constrained to have the kinds of expertise to make those calls,

Dr. Dave Chatterjee:

but they need to reach out and get help. Again, you know,

Dr. Dave Chatterjee:

trying to follow your example of using a metaphor. It's like,

Dr. Dave Chatterjee:

when you go to a doctor, and or you're, you're thinking of going

Dr. Dave Chatterjee:

to a doctor, because you feel there is an issue. And so you're

Dr. Dave Chatterjee:

doing your best due diligence possible, doing your searches,

Dr. Dave Chatterjee:

you know, talking to people getting advice. So you have a

Dr. Dave Chatterjee:

planning process in place. And it's important, why is it

Dr. Dave Chatterjee:

important because it's your health. And I like to use the

Dr. Dave Chatterjee:

health metaphor, because when it comes to security, that's the

Dr. Dave Chatterjee:

security is the health of the organization. It is I believe

Dr. Dave Chatterjee:

that there is not far where we'll be ranking organizations

Dr. Dave Chatterjee:

on their security health rating. So therefore, developing an

Dr. Dave Chatterjee:

understanding of what the security needs are, and who is

Dr. Dave Chatterjee:

the right person who can provide the help or who are the right

Dr. Dave Chatterjee:

people who can deliver the goods is absolutely mission critical.

Dr. Dave Chatterjee:

So therefore, your points are very well made that to recognize

Dr. Dave Chatterjee:

what kind of help you need from a security standpoint. And that

Dr. Dave Chatterjee:

will immediately help align what you get by way of security

Dr. Dave Chatterjee:

mechanisms, along with your overall organizational goals and

Dr. Dave Chatterjee:

strategies. So I just wanted to re emphasize there anything else

Dr. Dave Chatterjee:

you'd like to add to that?

Ted Harrington:

Well, just that the doctor patient metaphor for

Ted Harrington:

security is so good. And there's so many aspects of that

Ted Harrington:

relationship that we can, you know, tie back to security, and

Ted Harrington:

I'm just deciding whether or not to go down all those different

Ted Harrington:

rabbit holes right now. But I'll definitely tie back to one or

Ted Harrington:

more of them as as we go. But, um, if we want to use the doctor

Ted Harrington:

metaphor, and the context of the question that you're asking

Ted Harrington:

about, like, how do we make sure we're getting the right thing? I

Ted Harrington:

think it's, that's actually, maybe that's a good metaphor for

Ted Harrington:

us to use, because it's like when people go into the doctor's

Ted Harrington:

office, and they're like, Oh, I checked on WebMD, my, you know,

Ted Harrington:

my symptoms or whatever. And so they, they've self diagnosed, so

Ted Harrington:

they go into the doctor, and they're like, I need a, I don't

Ted Harrington:

know, insert jargon, technical term right now. And the doctor

Ted Harrington:

is like, we'll get to that limit. Let me instead, evaluate

Ted Harrington:

your symptoms, see where we're at. And I'll tell you, then, you

Ted Harrington:

know, what we need. But the problem that happens in security

Ted Harrington:

would be like, so doctors, I guess I don't know what I'm

Ted Harrington:

about to say for 100% Certain, because I am not a doctor. But

Ted Harrington:

my understanding is that in medicine, a procedure has a

Ted Harrington:

name. And that's a universally understood procedure. The

Ted Harrington:

problem with what's happening with security. So let's say I

Ted Harrington:

don't know what the technical term would be, let's just say

Ted Harrington:

it's called knee replacement. You know, someone goes in, and

Ted Harrington:

they're like, I think I might, you know, my knees bother me, I

Ted Harrington:

need some help with my knee. And then a doctor is like, you need

Ted Harrington:

a knee replacement. The problem, insecurity would be like, when

Ted Harrington:

one doctor says knee replacement, he means I'm going

Ted Harrington:

to replace your knee, another doctor means I'm going to give

Ted Harrington:

you orange juice. And a third doctor means I'm going to give

Ted Harrington:

you a physical, and you're like, these are all using the same

Ted Harrington:

term to describe really, really different things. And the

Ted Harrington:

patient doesn't know any better to like, because the patient's

Ted Harrington:

going to the expert. That's why this is a real problem. Like if

Ted Harrington:

you went to the doctor, and three different doctors said the

Ted Harrington:

same term, but they meant three different things. You probably

Ted Harrington:

wouldn't go to the doctor anymore. And that's why is such

Ted Harrington:

a significant problem.

Dr. Dave Chatterjee:

Yep, very cool. You know, I, I authored a

Dr. Dave Chatterjee:

book, which, which was published by SAGE last year on

Cybersecurity Readiness:

A Holistic and High-Performance

Cybersecurity Readiness:

Approach. In that book, I, I presented a framework, it's

Cybersecurity Readiness:

called the Commitment, Preparedness and Discipline

Cybersecurity Readiness:

framework that is associated with 17 cybersecurity readiness

Cybersecurity Readiness:

success factors. And I'm not going to go down that list, but

Cybersecurity Readiness:

I wanted your thoughts on some of them, which I have found to

Cybersecurity Readiness:

be very important for an organization to secure

Cybersecurity Readiness:

themselves or get the resources they need to secure themselves.

Cybersecurity Readiness:

And one of those success factors happens to be hands-on top

Cybersecurity Readiness:

management. And it's a challenge out there. In terms of how to

Cybersecurity Readiness:

get top management attention, how to get top management

Cybersecurity Readiness:

actively engaged in cybersecurity planning,

Cybersecurity Readiness:

execution, monitoring. Just curious because you're in the

Cybersecurity Readiness:

field, and you are you and your company are engaging in engaging

Cybersecurity Readiness:

with numerous organizations. What are you seeing out there,

Cybersecurity Readiness:

in terms of top management commitment to information

Cybersecurity Readiness:

security?

Ted Harrington:

Well, it's it's definitely becoming more and

Ted Harrington:

more of a priority for executive leadership. I think you probably

Ted Harrington:

could have any number of security professionals on here

Ted Harrington:

to answer that question that would probably all say, some

Ted Harrington:

version of the same thing, right, which is like, security

Ted Harrington:

is a business problem, not a technical problem. We need to

Ted Harrington:

speak in the language of leaders, which is, you know, in

Ted Harrington:

terms of numbers and outcomes, and all that stuff. And we need

Ted Harrington:

to make sure that we, you know, don't make it technical and all

Ted Harrington:

that. So I would say all those things, too. But instead, what I

Ted Harrington:

want to share is something that I see the most progressive

Ted Harrington:

organizations doing that are the ones who are getting it right.

Ted Harrington:

And they're currently in the minority. They're on if we think

Ted Harrington:

about, you know, a bell curve. They're on the early early

Ted Harrington:

adopter side. And my hope is that eventually we're going to

Ted Harrington:

get the whole world thinking this way. And the way is this

Ted Harrington:

one Most people think about security as avoid a bad thing,

Ted Harrington:

right, let's not get hacked. That is, in fact, a good way to

Ted Harrington:

think about security. But it's incomplete. We also need to

Ted Harrington:

think about not just how do we avoid a bad thing? But how do we

Ted Harrington:

get a good thing? So not just how do we not get hacked? But

Ted Harrington:

how do we gain an advantage. And one of the things that is very,

Ted Harrington:

very obvious to me, as I look at the companies really across

Ted Harrington:

industries across sectors, the ones who do two things, first,

Ted Harrington:

actually secure their systems. And then secondly, in an

Ted Harrington:

authentic and credible way, prove it, they gain this

Ted Harrington:

incredible competitive advantage over their competitors. So if

Ted Harrington:

that's a company, they're competing the way a company

Ted Harrington:

will, you know, for customers and market share. But there's

Ted Harrington:

other ways you can compete, too, whether that's maybe you're a

Ted Harrington:

nonprofit, and you need donors, maybe you're a government, and

Ted Harrington:

you need your political influence, or whatever. people

Ted Harrington:

and companies and organizations, they want to do business with

Ted Harrington:

organizations that are secure, they want trust is the

Ted Harrington:

foundation of so they trust someone, they're going to want

Ted Harrington:

to work with them, or at least if they don't trust them,

Ted Harrington:

they're going to be hesitant to work with them. And so this is

Ted Harrington:

one of the things that I see executives at the more

Ted Harrington:

progressive organizations capturing, they see it, they

Ted Harrington:

look at it, and they're like, if we only think of security as a

Ted Harrington:

bad avoid a bad thing, what we're going to do is we're going

Ted Harrington:

to make some risk based decisions about, look, this is

Ted Harrington:

just a tax on the business. How do we reduce the tax to the

Ted Harrington:

right amount that's not so low that we expose ourselves to huge

Ted Harrington:

risk, but we're not overspending? That's the way

Ted Harrington:

that's the way most people actually think about security,

Ted Harrington:

when it's the idea of avoid a bad thing. But now when you

Ted Harrington:

change the frame, and you say, Well, how do we get a good

Ted Harrington:

thing? How do we get this competitive advantage? Now

Ted Harrington:

you're looking at it as an investment. And you're saying

Ted Harrington:

it's no longer a cost center to reduce? It's an advantage to

Ted Harrington:

optimize? How do we spend in a way that helps us beat the

Ted Harrington:

competition? How do we move faster? How do we get more

Ted Harrington:

enterprises using us than someone else? And I found that

Ted Harrington:

to be the thing that really gets leaders excited, because it's no

Ted Harrington:

longer this, like, this is annoying, I don't want to talk

Ted Harrington:

about this, make make this problem go away. That's the way

Ted Harrington:

most people think about security. Now it is, oh, wait a

Ted Harrington:

minute, there is an untapped opportunity to gain a

Ted Harrington:

competitive edge. No one else is doing it or not enough people

Ted Harrington:

are doing it. Talk to me about that. That's what progressive

Ted Harrington:

organizations are doing right now.

Dr. Dave Chatterjee:

brilliant, absolutely brilliant. I love the

Dr. Dave Chatterjee:

way you put it. One has to look at information security

Dr. Dave Chatterjee:

capability as a distinctive competency. And focusing on

Dr. Dave Chatterjee:

developing the competency, using that competency or leveraging

Dr. Dave Chatterjee:

that competency to achieve a competitive edge is the way to

Dr. Dave Chatterjee:

go. The moment you are thinking of security ah that's one more

Dr. Dave Chatterjee:

thing we have to do, we don't have a choice, that really

Dr. Dave Chatterjee:

doesn't cut it. Rather, taking a very optimistic approach, and

Dr. Dave Chatterjee:

saying -- yes, there is this is a problem. This is a constant

Dr. Dave Chatterjee:

issue that we have to deal with. So let's see, we can convert the

Dr. Dave Chatterjee:

so called problem into an opportunity and be the best we

Dr. Dave Chatterjee:

can be in managing this risk. I love that kind of a mindset,

Dr. Dave Chatterjee:

that kind of approach. And I'm sure people who are listening

Dr. Dave Chatterjee:

are making note of it. I'm sure many, many organizations, many

Dr. Dave Chatterjee:

senior executives approach it that way. So, Ted, a couple of

Dr. Dave Chatterjee:

months ago, probably in a podcast session, a renowned

Dr. Dave Chatterjee:

cybersecurity expert lamented that companies keep making the

Dr. Dave Chatterjee:

same mistakes over and over again. So I asked him, I said,

Dr. Dave Chatterjee:

What kind of mistakes are they making over and over again? And

Dr. Dave Chatterjee:

he talked about vulnerability management, patch management.

Dr. Dave Chatterjee:

And, you know, you being in the business, leading a team of

Dr. Dave Chatterjee:

ethical hackers, I'm sure you see that a lot. What are your

Dr. Dave Chatterjee:

thoughts about what is so difficult or challenging about

Dr. Dave Chatterjee:

patch management, vulnerability management, that to use his

Dr. Dave Chatterjee:

words again, that companies keep making the same mistakes?

Ted Harrington:

Well, I definitely agree with the

Ted Harrington:

problem that companies continue making the same mistakes over

Ted Harrington:

and over again, I would not limit it just to this particular

Ted Harrington:

issue of patch management. I'm a little befuddled myself as to

Ted Harrington:

why patch management continues to be such an issue. And that's

Ted Harrington:

not to diminish how hard it is. It's hard. Patch management is

Ted Harrington:

difficult. What I, for me personally, like if my job was

Ted Harrington:

to be In charge of patch management, I'd be terrible at

Ted Harrington:

it. Because what it requires for patch management are the kinds

Ted Harrington:

of things that like the your brain is wired in a certain way

Ted Harrington:

to excel at that I think the kind of person who's really good

Ted Harrington:

at like, maybe accounting, the kind of person who wants to make

Ted Harrington:

sure that the numbers perfectly zero out and everything's like

Ted Harrington:

exactly an order the way that should be. Patch management is

Ted Harrington:

kinda like that to like you have that absolute overriding drive

Ted Harrington:

for the perfection. But you can take that you combine it with

Ted Harrington:

the fact that patches, sometimes break systems and braking

Ted Harrington:

systems gets in the way of operational uptime, and

Ted Harrington:

operational uptime, and a lot of situations is non negotiable, or

Ted Harrington:

operational downtime is not allowable. So there's all these

Ted Harrington:

complexities to it. But really, I think that what's happening if

Ted Harrington:

we go broader than just patch management, and we say, well,

Ted Harrington:

why do we keep making the same problem, like making the same

Ted Harrington:

mistakes over and over and over again? And I think it's because

Ted Harrington:

we don't necessarily truly understand the problem. And we

Ted Harrington:

don't truly understand the solution. And the we I'm

Ted Harrington:

describing here is the people who have the problem, and

Ted Harrington:

certain corners of the security community who are willing to

Ted Harrington:

present the incorrect solution. We talked about penetration

Ted Harrington:

testing before. And that's a great example of where, you

Ted Harrington:

know, there are people willing to sell companies a penetration

Ted Harrington:

test, that isn't a penetration test, they're willing to do

Ted Harrington:

that. Now, maybe they don't know that there's a difference.

Ted Harrington:

That's negative, that's negligent. Or they do know

Ted Harrington:

there's a difference, and they're misrepresenting it

Ted Harrington:

anyway. That's irresponsible. So whichever it is, is not good.

Ted Harrington:

But the problem is, that's a two sided problem, right? That

Ted Harrington:

companies were building things like we talked about before,

Ted Harrington:

it's not there every moment of every day working on how do you

Ted Harrington:

break things, they're looking to their expert partners to help

Ted Harrington:

them and the expert partner isn't actually presenting the

Ted Harrington:

appropriate solution, those two issues combined become this

Ted Harrington:

like, kind of catastrophic problem.

Dr. Dave Chatterjee:

Yep. True. So here comes my final two

Dr. Dave Chatterjee:

questions. First one is, What lessons do organizations refuse

Dr. Dave Chatterjee:

to learn? Have you come across anything like that? Do you have

Dr. Dave Chatterjee:

any thoughts on that? And I don't mean to stump you. So feel

Dr. Dave Chatterjee:

free to say what's the next one? And I'm happy to throw out the

Dr. Dave Chatterjee:

next one.

Ted Harrington:

No, I like that question. Actually, a lot. I

Ted Harrington:

would the way I would answer that, though, is I don't think

Ted Harrington:

you could say there's a universal, there's not like one

Ted Harrington:

lesson that everybody refuses to learn. But within every

Ted Harrington:

organization, there is at least one lesson that everybody that

Ted Harrington:

that organization refuses to learn. The one that as an

Ted Harrington:

example, that it saddens me actually, I was gonna say it

Ted Harrington:

irritates me or angers me. I was like, what's the right word for

Ted Harrington:

this? But I think it saddens me is the way that sometimes

Ted Harrington:

politics work in large enterprises. I've seen it happen

Ted Harrington:

time and time again, where, you know, one executive will build a

Ted Harrington:

program in a certain way. And that program is succeeding in

Ted Harrington:

some way. And then the next, you know, that executive either gets

Ted Harrington:

promoted or gets poached go somewhere else. And then the

Ted Harrington:

next executive comes in, and the way that exec, that new

Ted Harrington:

executive is going to quote unquote, create their own thing,

Ted Harrington:

right, is going to create their opportunity to get promoted, or

Ted Harrington:

get poached to go somewhere else. They need to do something

Ted Harrington:

unique. They can't just do what's already been done. And so

Ted Harrington:

that, what do they have to do? They have to look at the this

Ted Harrington:

program that's already been built, and say, we're gonna do

Ted Harrington:

it totally differently, because I know a better way. But if it's

Ted Harrington:

already working, why are you tearing it down? And that is

Ted Harrington:

actually a pretty significant problem in corporate America

Ted Harrington:

today, that that sort of political need, which I

Ted Harrington:

actually, I have no problem with someone needing to say, I need

Ted Harrington:

to make my mark on this organization so that I can make

Ted Harrington:

more money and provide more for my family. And like, what's

Ted Harrington:

wrong with that? That's amazing. But unfortunately, the way that

Ted Harrington:

it typically has to play out is by dismantling some other thing

Ted Harrington:

that already worked. And so now you have in these, it's kind of

Ted Harrington:

amazing when you see large enterprises, how inefficient

Ted Harrington:

they can be. Because every few years as there's this turnover,

Ted Harrington:

and you know, executive positions. You You've, you're

Ted Harrington:

kind of starting things all over again. And I mean, how many

Ted Harrington:

people listening right now work in a large enterprise and go

Ted Harrington:

through a reorganization? Like every three or four years,

Ted Harrington:

you're like, I'll just wait this out, because by the time it

Ted Harrington:

actually is implemented, there's going to be a reorg you know.

Dr. Dave Chatterjee:

Yep. So let me give you my answer to the

Dr. Dave Chatterjee:

question I posed to you. So, you know, two things happen, as your

Dr. Dave Chatterjee:

probably aware, it is the medium sized organizations that

Dr. Dave Chatterjee:

generally capitulate after a major cyber attack, they go out

Dr. Dave Chatterjee:

of business, there is data to support that. 60 to 70%, of

Dr. Dave Chatterjee:

small and medium sized enterprises cease to exist,

Dr. Dave Chatterjee:

which is a very rough consequence, probably the most

Dr. Dave Chatterjee:

severe consequence. But then there are large organizations.

Dr. Dave Chatterjee:

And again, I won't take any names here, who, for lack of a

Dr. Dave Chatterjee:

better word, made some very reckless mistakes, that

Dr. Dave Chatterjee:

borderlines gross negligence, and breach has happened. There

Dr. Dave Chatterjee:

were severe consequences. But they get bailed out for a

Dr. Dave Chatterjee:

variety of reasons. And that's where my concern lies. Not that

Dr. Dave Chatterjee:

we're going to solve this problem here, and neither am I

Dr. Dave Chatterjee:

trying for you to suggest what the solution should be. But

Dr. Dave Chatterjee:

that's where my concern is that when these organizations get

Dr. Dave Chatterjee:

bailed out, do they learn the lessons and they or are they do

Dr. Dave Chatterjee:

they make the necessary changes. And these are not symbolic

Dr. Dave Chatterjee:

things that you put out there to impress the media and impress

Dr. Dave Chatterjee:

your investors. But it goes deeper into their processes into

Dr. Dave Chatterjee:

how security is approached by the organization, whether

Dr. Dave Chatterjee:

security is built into their organizational culture. In my

Dr. Dave Chatterjee:

book, I talk about creating and sustaining a high-performance

Dr. Dave Chatterjee:

information security culture, it's hard to do. But it is

Dr. Dave Chatterjee:

definitely something that organizations should, should

Dr. Dave Chatterjee:

strive towards. So that's from where I was coming, when I asked

Dr. Dave Chatterjee:

you that question.

Ted Harrington:

It's hard to say without being on the inside of

Ted Harrington:

every organization, right, whether they've learned their

Ted Harrington:

lesson or not, but you see plenty of cool success stories,

Ted Harrington:

you know, I'm in the aftermath of major breaches, including the

Ted Harrington:

industry around whoever the victim was, you know, the movie

Ted Harrington:

business is a great example. Sony, you know, went through

Ted Harrington:

that really very public. You know, that was a real bummer

Ted Harrington:

that that breach for everyone who not just the people at Sony,

Ted Harrington:

but the people who work with Sony in the movie business is a

Ted Harrington:

it's kind of a small world, everyone kind of knows everyone.

Ted Harrington:

And, you know, there was a lot of a lot of hearts went out for

Ted Harrington:

that. That was a really tough time for a lot of people. But

Ted Harrington:

it's really cool to see in the aftermath, how the security

Ted Harrington:

programs at different studios, got more funding got more

Ted Harrington:

people, they got more sophisticated. And that's a cool

Ted Harrington:

aftermath. I mean, yeah, you don't want a company to go

Ted Harrington:

through what Sony went through. That's, that's terrible. But if

Ted Harrington:

it has to happen, then let's make sure that some really

Ted Harrington:

positive result. And that's, that's definitely what's been

Ted Harrington:

happening. So that was pretty cool. That was pretty cool to

Ted Harrington:

see that.

Dr. Dave Chatterjee:

That's great to hear. I'm glad you

Dr. Dave Chatterjee:

shared that with us. There are I'm sure many, many positive

Dr. Dave Chatterjee:

stories of recovery, and, you know, coming back revitalized

Dr. Dave Chatterjee:

and in ways that has made the organization better. So that's

Dr. Dave Chatterjee:

good to hear. Hey, as much as I would like to keep talking with

Dr. Dave Chatterjee:

you, I've been enjoying this, you know, we are getting to the

Dr. Dave Chatterjee:

end of our time here. So let's try to wrap things up with you

Dr. Dave Chatterjee:

sharing any final takeaways for the audience. Any final thoughts

Dr. Dave Chatterjee:

for the audience?

Ted Harrington:

Yeah, I mean, I definitely always like to end on

Ted Harrington:

a high note. And I feel like the story I just told was, was a

Ted Harrington:

high note. So there we go, you already have your high note. You

Ted Harrington:

know, we're seeing industries react really well in the

Ted Harrington:

aftermath of, of breaches. But I think that I would just leave

Ted Harrington:

people with this fact that the security community is a

Ted Harrington:

passionate one that really is trying to improve things every

Ted Harrington:

day. Ethical hackers included amongst that, and that, to me is

Ted Harrington:

really exciting to live in it and to see it and to those of

Ted Harrington:

you who maybe are wanting to join security, or maybe you are

Ted Harrington:

not in security, but you work with security companies, just

Ted Harrington:

know that there's a really passionate group, let's move

Ted Harrington:

forward. And yeah, I mean, that just we can end on that note,

Ted Harrington:

and if anyone wants to know anything more about, you know,

Ted Harrington:

if any of the ideas we talked about you wanted to ask me

Ted Harrington:

about, personally, you want to follow me on social media, you

Ted Harrington:

want to know more about my book, you you want help with your

Ted Harrington:

security testing program. Just hit me up, I'm easy to find at

Ted Harrington:

Ted harrington.com. And everything you could need to

Ted Harrington:

know is right there.

Dr. Dave Chatterjee:

Fantastic Ted, thank you again for your

Dr. Dave Chatterjee:

time. It's been a pleasure.

Ted Harrington:

Thank you for having me.

Dr. Dave Chatterjee:

A special thanks to Ted Harrington for his

Dr. Dave Chatterjee:

time and insights. If you like what you heard, please leave the

Dr. Dave Chatterjee:

podcast a rating and share it with your network. Also,

Dr. Dave Chatterjee:

subscribe to the show, so you don't miss any new episodes.

Dr. Dave Chatterjee:

Thank you for listening, and I'll see you in the next

Dr. Dave Chatterjee:

episode.

Introducer:

The information contained in this podcast is for

Introducer:

general guidance only. The discussants assume no

Introducer:

responsibility or liability for any errors or omissions in the

Introducer:

content of this podcast. The information contained in this

Introducer:

podcast is provided on an as-is basis with no guarantee of

Introducer:

completeness, accuracy, usefulness, or timeliness. The

Introducer:

opinions and recommendations expressed in this podcast are

Introducer:

those of the discussants and not of any organization.

Chapters

Video

More from YouTube