<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:admin="http://webns.net/mvcb/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
	<channel>
<title>My RSS Feed</title><link>https://getsecure.com/index.html</link><description>Hot News&#x21;</description><dc:language>en</dc:language><language>en</language><dc:date>2025-03-31T21:12:08-04:00</dc:date><admin:generatorAgent rdf:resource="http://www.realmacsoftware.com/" />
<sy:updatePeriod>hourly</sy:updatePeriod>
<sy:updateFrequency>1</sy:updateFrequency>
<sy:updateBase>2000-01-01T12:00+00:00</sy:updateBase>
<lastBuildDate>Wed, 29 Mar 2023 12:09:26 -0400</lastBuildDate><item><title>We&#x2019;re not Joking. Good EGGs are the SANE Approach</title><dc:subject>Relevant Rants</dc:subject><dc:date>2025-03-31T21:12:08-04:00</dc:date><link>https://getsecure.com/blog/files/6199b8398fe780e3b38ff49e477771e3-17.html#unique-entry-id-17</link><guid isPermaLink="true">https://getsecure.com/blog/files/6199b8398fe780e3b38ff49e477771e3-17.html#unique-entry-id-17</guid><content:encoded><![CDATA[<span style="font-size:16px; color:#000000;">I interrupt your normally scheduled program for breaking news. </span><span style="font-size:16px; color:#000000;font-weight:bold; "><br /><br />As, promised: </span><span style="font-size:16px; color:#000000;">We are releasing exciting new research to the community featuring EGGs (Emergent Generative Generators) combined with SANE.<br /></span><p style="text-align:center;"><a href="https://www.day-con.org/resources/GoodEGGS2025.pdf"><img class="imageStyle" alt="Pasted Graphic" src="https://getsecure.com/blog/files/pasted-graphic.png" width="1224" height="652" /></a><span style="font-size:16px; color:#000000;"><br /></span></p><p style="text-align:left;"><span style="font-size:16px; color:#000000;"><br />Be safe. Talk soon.<br /><br />&nbsp;<br /></span></p>]]></content:encoded></item><item><title>The Good&#x2c; the Bad and the Ugly</title><dc:subject>Relevant Rants</dc:subject><dc:date>2025-02-03T13:46:49-05:00</dc:date><link>https://getsecure.com/blog/files/e71ee7767724433ada2f84c9170c4d01-16.html#unique-entry-id-16</link><guid isPermaLink="true">https://getsecure.com/blog/files/e71ee7767724433ada2f84c9170c4d01-16.html#unique-entry-id-16</guid><content:encoded><![CDATA[<img class="imageStyle" alt="AIm3b" src="https://getsecure.com/blog/files/aim3b.png" width="1600" height="1267" /><br /><br /><span style="font-size:16px; color:#000000;">Hey sports fans, here comes the next installment of AI Matters Unfiltered. I&rsquo;m still working through the AI Vendor landscape, looking for ways to develop system confidence without control (Trust Enhanced Risk Management anyone?). This prompted me to ping </span><span style="font-size:16px; color:#000000;"><a href="https://www.linkedin.com/in/piotr-cofta-bb7a0ab9/" target="_blank">Dr Cofta</a></span><span style="font-size:16px; color:#000000;"> and re-review his most excellent paper on becoming &ldquo;</span><span style="font-size:16px; color:#000000;"><a href="https://troopers.de/media/filer_public/ec/f0/ecf0a507-a8a2-4371-a17d-9d0b46f06679/tr12_day02_cofta_plumbers_of_trust.pdf" target="_blank">Plumbers of Trust</a></span><span style="font-size:16px; color:#000000;">&rdquo;. I love the concept and it&rsquo;s never been more relevant or needed. More to come soon, but for now do your homework and click the legacy links above.<br /><br />Speaking of plumbers of trust, I wanted to share some work I have been doing with two of our newest neighbors </span><span style="font-size:16px; color:#000000;"><a href="https://www.linkedin.com/in/hannah-feltz/" target="_blank">Hannah Feltz</a></span><span style="font-size:16px; color:#000000;"> and </span><span style="font-size:16px; color:#000000;"><a href="https://www.linkedin.com/in/vin-aragona/" target="_blank">Vinnie Aragona</a></span><span style="font-size:16px; color:#000000;">, who I have the distinct pleasure of working with at </span><span style="font-size:16px; color:#000000;"><a href="https://www.wwt.com/" target="_blank">WWT</a></span><span style="font-size:16px; color:#000000;">. The Artificial Intelligence Security & Compliance Ops Unit Technical Services (AI SCOUTS), as our team is known, has the coolest remit in the world. We focus on holistic Trustworthy and Responsible AI systems through their entire life-cycle. <br /><br />So, as a very special February valentine to the community, I present &ldquo;</span><span style="font-size:16px; color:#000000;"><a href="https://www.wwt.com/blog/the-good-the-bad-and-the-ugly" target="_blank">Exploitable Insight</a></span><span style="font-size:16px; color:#000000;">&rdquo; from WWT&rsquo;s AI SCOUTS. It's about ready to get all real up in here, if you know what I mean, because&hellip;AI Matters!<br /><br />#AIMATTERS<br /><br /></span>]]></content:encoded></item><item><title>Day-Con XVIII and Beyond...</title><dc:subject>Relevant Rants</dc:subject><dc:date>2024-12-31T17:39:38-05:00</dc:date><link>https://getsecure.com/blog/files/79a093df8b8f6e57643af3520b7e0789-15.html#unique-entry-id-15</link><guid isPermaLink="true">https://getsecure.com/blog/files/79a093df8b8f6e57643af3520b7e0789-15.html#unique-entry-id-15</guid><content:encoded><![CDATA[<span style="font-size:16px; color:#000000;">I interrupt your normally scheduled program for breaking news. </span><span style="font-size:16px; color:#000000;font-weight:bold; ">Day-Con XVIII crowned the Best Year Ever!</span><span style="font-size:16px; color:#000000;"> It's an inside joke for Day-Con alumni. -Basically once you reach a certain maturity level, every year you are still breathing is the Best Year Ever!<br />&nbsp;<br />I can honestly say, this was the best year ever. My Bliss Index is high, my stress level is low and I am rediscovering my passion for hacking. What a stellar way to head into 2025.<br /><br />Speaking of 2025, here is a sneak peak:<br /><br />1. We will be posting presentations and summit notes from Day-Con XVIII in the coming weeks.<br />2. The Deep Fake Justice League will be coming to a conference near you. There will be </span><span style="font-size:16px; color:#000000;"><a href="https://evilrobot.ai" target="_blank">games</a></span><span style="font-size:16px; color:#000000;">, because "something wicked this ways comes"<br />3. Supply Chain Smoking, The "Glitch Index" and "The Good, the Bad, and the Ugly" blogs are in the queue.<br />4. Save the date for Day-Con XIX - September 13th, 2025 - Learn, Work and Play Harder in Dayton!<br />5. We will be releasing exciting new research to the community featuring EGGs (Emergent Generative Generators) combined with SANE.<br /></span><p style="text-align:center;"><img class="imageStyle" alt="Pasted Graphic" src="https://getsecure.com/blog/files/pasted-graphic.png" width="1224" height="652" /><span style="font-size:16px; color:#000000;"><br /></span></p><p style="text-align:left;"><span style="font-size:16px; color:#000000;"><br />Be safe. Talk soon.<br /><br />&nbsp;<br /></span></p>]]></content:encoded></item><item><title>The Dirty Dozen vs The Magnificent Seven</title><dc:subject>Relevant Rants</dc:subject><dc:date>2024-11-03T19:19:06-05:00</dc:date><link>https://getsecure.com/blog/files/8c2d1062b17150bbe32b99bd5d734b04-14.html#unique-entry-id-14</link><guid isPermaLink="true">https://getsecure.com/blog/files/8c2d1062b17150bbe32b99bd5d734b04-14.html#unique-entry-id-14</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="AI2" src="https://getsecure.com/blog/files/ai2.png" width="526" height="323" /><br /></p><p style="text-align:left;"><span style="font-size:16px; color:#000000;font-weight:bold; ">Trustworthy & Responsible</span><span style="font-size:16px; color:#000000;"> Generative AI (Gen AI) is tough - Full Stop. Agreeing on what it is, or more importantly what it isn&rsquo;t, is also not easy. Perhaps, that is the root of all the confusion. Without discussing the merits of any one stakeholder&rsquo;s position, perhaps we can pick one definition and then compare that against real world mission statements and Service Level Agreements (SLA&rsquo;s), Warranties and Guarantees.<br />&nbsp;<br />I have become fond of calling the 12 risk categories associated with Generative AI as described in </span><span style="font-size:16px; color:#0B4CB3;"><u><a href="https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.600-1.pdf">NIST AI 600-1</a></u></span><span style="font-size:16px; color:#000000;">, as &ldquo;The Dirty Dozen&rdquo;. Distilled down to its essence, the document describes in detail how human beneficiaries could be harmed if a generative AI system fails. It has become my lens of choice when assessing Gen AI systems.<br />&nbsp;<br /></span><span style="font-size:16px; color:#000000;font-weight:bold; ">The 12 listed out:</span><span style="font-size:16px; color:#000000;"><br /></span><span style="font-size:16px; color:#000000;">1.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#000000;">CBRN Information<br />2.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#000000;">Confabulation<br />3.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#000000;">Dangerous or Violent Recommendations<br />4.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#000000;">Data Privacy<br />5.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#000000;">Environmental<br />6.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#000000;">Human-AI Configuration<br />7.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#000000;">Information Integrity<br />8.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#000000;">Information Security<br />9.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#000000;">Intellectual Property<br />10.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp; </span><span style="font-size:16px; color:#000000;">Obscene, Degrading, and/or Abusive Content<br />11.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp; </span><span style="font-size:16px; color:#000000;">Harmful Bias or Homogenization<br />12.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp; </span><span style="font-size:16px; color:#000000;">Value Chain and Component Integration<br /></span><span style="font-size:16px; color:#000000;">&nbsp;<br />Humans love stories. Armed with the Dirty Dozen I can have impactful and productive conversations with various stakeholders when discussing curated threat catalogs and control affinities. This approach has proven to be very effective when communicating complex concepts like &ldquo;AI Hallucinations&rdquo; (i.e. Confabulation) to the people responsible for securing these systems. Further, it allows me to be very prescriptive when discussing reasonable ways to address residual risk with compensating controls.<br />&nbsp;<br />A curated threat catalog is simply a list of bad things that have or could happen to an organization that would cause harm to their stakeholders. Historically, organizations focus more on risk management than threat catalogs. However, from a story telling perspective people seem to gravitate to the threats regardless of the likelihood that bad thing could happen. A proper threat catalog distills the world of threats into &ldquo;stories&rdquo; (aka. threat scenarios) of the most relevant threat items to your organization and stakeholders. What&rsquo;s in your threat catalog?<br />&nbsp;<br />System confidence is a combination of trust and control. In the absence of trust, control is all you have. By assessing specific threat catalog items against the harm they could cause, we can develop &ldquo;structured choice&rdquo; by suppling lists or groups of controls that have a high degree of affinity for addressing the harm that could be caused by said threat item. <br />&nbsp;<br />Once an organization decides to address its threat catalog items, they must actually choose the controls they will use to address residual risk. [Residual risk is the difference between the organization&rsquo;s current risk profile and the risk profile the organization wants.] Then the organization can leverage its understanding of control affinities to choose the best controls to mitigate the possibility or impact of bad outcome for their organization. Compensating controls allow organizations to &ldquo;treat&rdquo; residual risk.<br />&nbsp;<br />When we put it all together, these are the types of informed conversations I can now have.<br />&nbsp;<br /></span><span style="font-size:16px; color:#000000;font-weight:bold; ">Client:</span><span style="font-size:16px; color:#000000;"> &ldquo;We want to use Generative AI to do something cool. But we want to make sure our system doesn&rsquo;t tell people to hurt themselves or others (bad things). We want to make sure that our system does not discriminate, exclude or insulant its users (our stakeholders). We want to make sure we are good stewards of the world&rsquo;s limited resources (see hammer and nails). We also want it to be cost effective, safe, secure and easy to operate.&rdquo; [No tall order here ;)]<br />&nbsp;<br /></span><span style="font-size:16px; color:#000000;font-weight:bold; ">Me:</span><span style="font-size:16px; color:#000000;"> &ldquo;It sounds like you want to implement a new productivity tool and have a holistic view on Trustworthy and Responsible AI. Assuming you already have a mature governance foundation in place, you should start by validating your business case, agreeing to a list of bad things you want to protect against and putting controls in place that will provide a high degree of certainty in how it is operated.&rdquo;<br />&nbsp;<br /></span><span style="font-size:16px; color:#000000;font-weight:bold; ">Client: </span><span style="font-size:16px; color:#000000;">&ldquo;Yeah, that sounds about right.&rdquo;<br />&nbsp;<br />We now have a reasonable starting point and can move on to control selection. It&rsquo;s beyond the scope of this blog to talk about all the types of controls available to organizations. Suffice to say, one size does not fit all and there are many controls that can be used to provide the required system confidence. Much like threat catalogs, organizations should consider building their own curated control catalogs. These catalogs contain lists of controls that currently exist in the organization and some insight to their cost and maturity. <br />&nbsp;<br />One set of controls that are NOT often discussed, but should be considered, are Service Level Agreements (SLA&rsquo;s), Warranties and Guarantees. There are controls that attempt to boost system confidence via commercial remediates and assertions. This is where it gets interesting.<br />&nbsp;<br />Besides being a most excellent western, The Magnificent Seven is also what </span><span style="font-size:16px; color:#0B4CB3;"><u><a href="https://money.usnews.com/investing/articles/magnificent-7-stocks-explainer">Bank of America analyst Michael Hartnett</a></u></span><span style="font-size:16px; color:#000000;"> calls the market dominating tech companies. I wondered what the leaders in technological change, dominance and influence, consider Trustworthy and Responsible? More importantly, do they put their shareholder's money where their mouth is? So, I decided to collect and review their words:<br />&nbsp;<br /></span><span style="font-size:16px; color:#000000;">1.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#0B4CB3;"><u><a href="https://ai.google/responsibility/principles/">Alphabet</a></u></span><span style="font-size:16px; color:#000000;"> <br />2.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#0B4CB3;"><u><a href="https://aws.amazon.com/ai/responsible-ai/policy/">Amazon</a></u></span><span style="font-size:16px; color:#000000;"><br />3.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#0B4CB3;"><u><a href="https://www.apple.com/compliance/">Apple</a></u></span><span style="font-size:16px; color:#000000;"><br />4.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#0B4CB3;"><u><a href="https://ai.meta.com/responsible-ai/">Meta</a></u></span><span style="font-size:16px; color:#000000;"> <br />5.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#0B4CB3;"><u><a href="https://www.microsoft.com/en-us/ai/principles-and-approach">Microsoft</a></u></span><span style="font-size:16px; color:#000000;"> <br />6.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#0B4CB3;"><u><a href="https://www.nvidia.com/en-us/ai-data-science/trustworthy-ai/">NVIDIA</a></u></span><span style="font-size:16px; color:#000000;"><br />7.</span><span style="font:9px Times, Georgia, Courier, serif; color:#000000;">&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-size:16px; color:#0B4CB3;"><u><a href="https://www.auvsi.org/elon-musk-donates-10-million-responsible-ai-research-program">TESLA</a></u></span><span style="font-size:16px; color:#000000;"><br /></span><span style="font-size:16px; color:#000000;">&nbsp;<br />My initial read is that there is an overabundance of platitudes and &ldquo;good words&rdquo; and little on commercial remedy or legal recourse should the vendor fail to deliver on their obligations in these vendor assurances. This exercise reminded of another awesome movie, &ldquo;The Good, the Bad and the Ugly&rdquo;. Please make sure to check out my deep dive review of The Good the Bad and the Ugly in my next blog coming to a small screen near you because&hellip;AI Matters! <br /></span></p>]]></content:encoded></item><item><title>AI Matters: Hammers &#x26; Nails</title><dc:subject>Relevant Rants</dc:subject><dc:date>2024-07-23T09:04:38-04:00</dc:date><link>https://getsecure.com/blog/files/bf1e996792605e6b614d66268ea2db16-13.html#unique-entry-id-13</link><guid isPermaLink="true">https://getsecure.com/blog/files/bf1e996792605e6b614d66268ea2db16-13.html#unique-entry-id-13</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="toolsoftrade" src="https://getsecure.com/blog/files/toolsoftrade.png" width="2289" height="2289" /><span style="color:#000000;"><br /></span></p><p style="text-align:left;"><span style="color:#000000;">Ever heard the old adage, &ldquo;When all you have is a hammer, every problem looks like a nail.&rdquo;?  It pops into my head every time I have a conversation about using AI (the hammer) to solve &ldquo;Wicked&rdquo; problems (the nails) in Cyber Operations. Don&rsquo;t get me wrong, I am stoked by the potential of (Generative) AI. The buzz is contagious. In some ways it feels like we are living in a modern Renaissance. A fountainhead of creativity, experimentation and insight, if you will. However, I am also a weathered practitioner and aspiring curmudgeon, who knows there is no such thing as a silver bullet. Responsible AI is not easy or cheap. Full Stop!<br /><br />Shouts out to </span><span style="color:#000000;"><a href="https://www.linkedin.com/in/sidragon1/" target="_blank">Chris Roberts</a></span><span style="color:#000000;">, as this post was inspired by a conversation we had and this line from his recent </span><span style="color:#000000;"><a href="https://www.linkedin.com/posts/sidragon1_ai-artificialintelligence-machinelearning-activity-7212467914317127680-VYdt?utm_source=share&utm_medium=member_desktop" target="_blank">LinkedIn post</a></span><span style="color:#000000;"> positing: &ldquo;Do we need A.I. to solve our problem? If so, why?&rdquo;<br /><br />To that end, I&rsquo;ve compiled a short list of observations and possible approaches you should consider when determining if using AI will actually solve a problem a create new problems to solve. <br /><br />1. </span><span style="color:#000000;font-weight:bold; ">Inertia and status quo </span><span style="color:#000000;">- In my experience, most organizations struggle with the fundamentals. Once they find a path that &ldquo;works&rdquo;, they resist change because its &ldquo;good enough&rdquo; #statusquo. This is sad because it means people lose their ability to imagine the world of possibilities, by building a perceptual blind spot for seeing alternatives. Improving the fundamentals is always a good thing. Incremental changes are often more valuable than &ldquo;big bang&rdquo; projects or transformations that take months or years to complete. Optimizing existing workflows as a normal practice can yield more benefit/value at higher frequencies. However, you must proceed with caution, as the way to fail at scale is to automate a broken business process. Please don&rsquo;t make that mistake.<br /><br />2. </span><span style="color:#000000;font-weight:bold; ">It Takes a Village </span><span style="color:#000000;">&ndash; The key to creating a pipeline of cyber operations optimization candidates [aka Innovations] is to understand the &ldquo;Wicked Problem&rdquo; you are trying to solve. I mean really understand it. You should be able to explain it to a 12-year-old or an executive in a suit ;) If you need to role play that conversation this would be a good time to confer with your favorite chat bot. [Insert Phun Prompt Here: &ldquo;Explain to me as if I am a 12-year-old, why passwords are important but not executive friendly?&rdquo;]. Next, you will need to identify your core stakeholder community. 3-5 stakeholders will typically give you the perspectives needed to find critical mass and more importantly governance & resourcing support. Finally, you need to understand what motivates your key stakeholders, what they value and how they are graded. Ensure your Innovation candidate selection criteria and KPI&rsquo;s resonate with your stakeholders and your stories are tailored to them. Make it real to them when describing the possibilities of a new approach. Be disciplined and ruthless, once selection criteria are agreed. Move quickly with purpose.  Don&rsquo;t get distracted with &ldquo;bright shiny things&rdquo; that do NOT align with your selection criteria. Each use case should tell a story that appeals to at least 75% of your stakeholder community. Less than that and inertia will make it too hard to realize value in a timely manner. Move on from candidates that do not make the cut, without regret as there should be a continuous pipeline of other opportunities to be reviewed.<br /><br />3. </span><span style="color:#000000;font-weight:bold; ">Latent Capabilities &ndash; Take the easy wins first! </span><span style="color:#000000;">&ndash; Once you have a vetted pipeline of innovation candidates, it&rsquo;s time to determine if you can extract incremental value using the AI features or embedded capabilities already in place. This is most easily accomplished by reading the tin and looking for key words like BIG DATA, Behavioral Analysis, Machine Learning, Neural Network, LLM or (Generative) AI. It&rsquo;s very likely you have been using AI-enabled tools already. If so, how are they performing? If they are available but you aren&rsquo;t using them, why not? Of course, if capabilities were available and you weren&rsquo;t aware of them or there are commercial considerations, then we need to quickly determine what level of effort is needed to implement. If it doesn&rsquo;t pass the sniff test move on to the next candidate. Leverage your suppliers to educate but temper their claims with real world testing and assessment. <br /><br />What next? Look for opportunities to integrate, optimize and automate at scale for operational improvement, which could include AI force multipliers such as Security Co-Pilots, organizationally aware GPT agents or automated Hackbots. We will look at these use cases in future blogs.<br /><br />So, do we need an AI to solve our &ldquo;wicked&rdquo; problem? The simple answer is probably not. However, there are &ldquo;Wicked&rdquo; problems that AI can address and you should be looking for those opportunities too. Because AI Matters. Stay tuned.<br /><br /></span></p>]]></content:encoded></item><item><title>Day-Con XVII: Summit Notes</title><dc:subject>Relevant Rants</dc:subject><dc:date>2024-01-21T13:50:01-05:00</dc:date><link>https://getsecure.com/blog/files/07e507173446501959cf6150055952a1-12.html#unique-entry-id-12</link><guid isPermaLink="true">https://getsecure.com/blog/files/07e507173446501959cf6150055952a1-12.html#unique-entry-id-12</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="cfys" src="https://getsecure.com/blog/files/cfys.jpeg" width="11558" height="3894" /><span style="color:#000000;"><br /></span><span style="color:#000000;">Once again, neighbors came together to discuss wicked problems and how the community could & should address them. The 17th annual event's tag line is </span><span style="color:#000000;font-weight:bold; ">"Chlorine for your soul!"</span><span style="color:#000000;">. Check out the summit notes </span><span style="color:#000000;"><a href="https://www.getsecure.com/resources/SummitNotes2023.pdf" target="_blank">HERE</a></span><span style="color:#000000;"> to learn more.<br /></span></p>]]></content:encoded></item><item><title>Future Shock: The Future of Fraud Today</title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-11-11T09:40:00-05:00</dc:date><link>https://getsecure.com/blog/files/915f872d15b996cf443dc265ef955e9e-11.html#unique-entry-id-11</link><guid isPermaLink="true">https://getsecure.com/blog/files/915f872d15b996cf443dc265ef955e9e-11.html#unique-entry-id-11</guid><content:encoded><![CDATA[<img class="imageStyle" alt="pointoforigin" src="https://getsecure.com/blog/files/pointoforigin.png" width="2289" height="2289" /><span style="color:#000000;"><br /></span><span style="color:#000000;">Below is the abstract and link to the referenced material, including the presentation, from the </span><span style="color:#000000;"><a href="https://www.technologyfirst.org/toit-2023" target="_blank">Taste of IT on Nov 8, 2023</a></span><span style="color:#000000;">. This is the first release in the Future Shock series. [FYI: Mo was unable to attend so I presented his slides]. Enjoy!<br /></span><span style="color:#000000;"><br /></span><br /><span style="color:#000000;">"The presenters will discuss the evolution of Organizational Identity Fraud and the abuse of organizational identity assets from the beginning of the World Wide Web to its current incarnation. They will assess the state of organizational identity asset protection programs and answer the question &ldquo;Are organizations prepared for the world of software defined everything, nation state threat actors and coexisting with the Internet of Dangerous Things?&rdquo;<br /><br />The presentation will update the definition of Corporate Identity Assets and introduce relevant, novel, and forward-thinking threat catalog items associated with Organizational Identity Fraud. The presenters will articulate control affinities and practical life-cycle management practices for consideration, positing how transformational trends in mobility, computing and social media conspire to make organizations more vulnerable, while demonstrating how marketing, security and operations can join forces to turn the tables on their adversaries by becoming &ldquo;hard targets&rdquo;.<br /><br />Building on prior work published in 2006 (</span><span style="color:#0B4CB3;"><u><a href="https://www.sans.org/reading-room/whitepapers/engineering/corporate-identity-fraud-life-cycle-management-corporate-identity-assets-1650">https://www.sans.org/reading-room/whitepapers/engineering/corporate-identity-fraud-life-cycle-management-corporate-identity-assets-1650</a></u></span><span style="color:#000000;"> ) and 2021 </span><span style="color:#0B4CB3;"><u><a href="https://www.sans.org/white-papers/corporate-identity-fraud-ii-future-fraud-today/">https://www.sans.org/white-papers/corporate-identity-fraud-ii-future-fraud-today/</a></u></span><span style="color:#000000;"> ) the presenters will share new research & insight that demonstrate multi-domain mayhem caused by abusing organizational identity assets and exploiting (hidden) dependencies! Further, they will share their methodology, findings, and novel & emerging threat catalog items (aka relevant use cases).<br /><br />Presentation Link </span><span style="color:#000000;"><a href="https://www.getsecure.com/resources/FS_FoFv2.pdf" target="_blank">HERE</a></span><span style="color:#000000;"><br /></span><span style="font-size:14px; color:#000000;"><br /></span>]]></content:encoded></item><item><title>Innovation Matters: Invisibility Cloak</title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-10-05T13:10:23-04:00</dc:date><link>https://getsecure.com/blog/files/4ebc87f300f6eb6b3557657fbf4ef7a4-10.html#unique-entry-id-10</link><guid isPermaLink="true">https://getsecure.com/blog/files/4ebc87f300f6eb6b3557657fbf4ef7a4-10.html#unique-entry-id-10</guid><content:encoded><![CDATA[<img class="imageStyle" alt="toolsoftrade" src="https://getsecure.com/blog/files/toolsoftrade.png" width="2289" height="2289" /><span style="color:#000000;font-weight:bold; "><br /></span><span style="color:#000000;font-weight:bold; ">&ldquo;Wicked&rdquo; Business Problem:</span><span style="color:#000000;"><br /></span><span style="color:#000000;">The simple act of connecting a device to a network (wired or wireless) exposes (high-value) it to more risk. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="color:#000000;font-weight:bold; "><br /></span><span style="color:#000000;font-weight:bold; ">Innovative Approach:</span><span style="color:#000000;"><br /></span><span style="color:#000000;">Provide dynamic connectivity protection and resource sharing, in hostile environments, with no externally visible attack surface.<br /></span><span style="font-size:16px; color:#000000;">&nbsp;</span><span style="color:#000000;">&nbsp;<br /></span><span style="color:#000000;font-weight:bold; ">Vetted Solution:</span><span style="color:#000000;"><br /></span><span style="color:#000000;">BYOS&rsquo; human friendly approach uses a physical dongle to effectively &ldquo;Cloak&rdquo; personal computing devices, rendering them invisible and allowing them to connect with confidence.<br /></span><span style="color:#000000;">&nbsp;<br /></span><span style="color:#000000;font-weight:bold; ">Call To Action:</span><span style="color:#000000;"><br /></span><span style="color:#000000;">If you are interested in learning more dm me on LinkedIn or check them out @ </span><span style="color:#000000;"><a href="https://www.byos.io/" target="_blank">BYOS</a></span><span style="color:#000000;"> [ Tell them Bryan sent you ;) ]<br /></span>]]></content:encoded></item><item><title>Innovation Matters: Ransomware &#x22;Kill Switch&#x22;</title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-09-15T13:13:19-04:00</dc:date><link>https://getsecure.com/blog/files/c69924d2219153167f34d01c57bd785a-9.html#unique-entry-id-9</link><guid isPermaLink="true">https://getsecure.com/blog/files/c69924d2219153167f34d01c57bd785a-9.html#unique-entry-id-9</guid><content:encoded><![CDATA[<img class="imageStyle" alt="radicalthinking" src="https://getsecure.com/blog/files/radicalthinking.png" width="2289" height="2289" /><span style="color:#000000;font-weight:bold; "><br /></span><span style="color:#000000;font-weight:bold; "><br />&ldquo;Wicked&rdquo; Business Problem:</span><span style="color:#000000;"><br />Organizations running flat networks are especially vulnerable to high-impact attacks that rely on lateral movement like ransomware.<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br /></span><span style="color:#000000;font-weight:bold; ">Innovative Approach:</span><span style="color:#000000;"><br />The ability to move from a flat network to a layer-3 isolated (micro-segmentation) network (IT/OT) in a matter of hours with NO downtime or 3</span><span style="color:#000000;">rd</span><span style="color:#000000;"> party agent software.<br />&nbsp;<br /></span><span style="color:#000000;font-weight:bold; ">Vetted Solution:</span><span style="color:#000000;"><br />Airgap&rsquo;s elegant approach is truly innovative and worthy of consideration. Using DHCP to build a layer-3 overlay network, they can transform a legacy network into a virtual Purdue compliant environment. Prebuilt logic provides the ability to prevent ransomware propagation and introduces a &ldquo;kill switch&rdquo;, which can be activated in the case of a ransomware outbreak.<br />&nbsp;<br /></span><span style="color:#000000;font-weight:bold; ">Call To Action:</span><span style="color:#000000;"><br />Educate yourself on </span><span style="color:#000000;"><a href="https://go.airgap.io/detect-defend-deny-getsecure" target="_blank">Airgap's</a></span><span style="color:#000000;"> innovative approach to layer-3 isolation and segmentation.<br /></span>]]></content:encoded></item><item><title>Facilitated Innovation &#x26; Structured Choice</title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-09-15T12:44:16-04:00</dc:date><link>https://getsecure.com/blog/files/95786f5907ee0241eff783326bc8ebff-8.html#unique-entry-id-8</link><guid isPermaLink="true">https://getsecure.com/blog/files/95786f5907ee0241eff783326bc8ebff-8.html#unique-entry-id-8</guid><content:encoded><![CDATA[<span style="color:#000000;font-weight:bold; ">What is it? </span><span style="color:#000000;"><br /></span><span style="color:#000000;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A field-proven methodology that identifies self-funding business cases and drives transformational change. I have used this method successfully in my practice for many years now.<br /></span><span style="color:#000000;">&nbsp;<br /></span><span style="color:#000000;font-weight:bold; ">How does it work? </span><span style="color:#000000;"><br /></span><span style="color:#000000;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Facilitates a dialog with key stakeholders who can affect organizational change.<br />&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Aligns the organization&rsquo;s mission with stakeholder capabilities (known & latent).<br />&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Determines what MUST be true in order for the organization to achieve its mission objectives.<br />&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Optimizes value across diverse stakeholder communities.<br />&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Leverages rapid prototyping to Fail/Succeed Fast as measured against key proof points.<br />&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Delivers in 30-90 Day Proof of Value (PoV) sprints.<br />&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Produces a pipeline of Innovation Candidates to support a transformation plan of record.<br />&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Populates an organization specific Curated Service Catalog that is fit for purpose and provides choice<br />&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Institutionalizes a bespoke service selection methodology that ensures the Optimal Choice is made to capture Maximum Value as defined by the relevant stakeholders.<br /></span><span style="color:#000000;">&nbsp;<br />Here is an example of a Curated Service Catalog for the manufacturing sector:<br /></span><img class="imageStyle" alt="mfgexample" src="https://getsecure.com/blog/files/mfgexample.png" width="1920" height="1080" /><span style="color:#000000;"><br /></span><span style="color:#000000;"><br /></span><span style="color:#000000;font-weight:bold; ">So what?</span><span style="color:#000000;"><br />By distilling the world of possibilities down to business-friendly options, organizations can realize more value faster and at scale. I plan on sharing some of the most interesting, timely and relevant candidates via a new blog series called Innovation Matters. <br /></span>]]></content:encoded></item><item><title>Point of Origin Hacking (POOH)</title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-09-05T07:59:43-04:00</dc:date><link>https://getsecure.com/blog/files/96935be562219a3a6a25da26c0dfd13c-7.html#unique-entry-id-7</link><guid isPermaLink="true">https://getsecure.com/blog/files/96935be562219a3a6a25da26c0dfd13c-7.html#unique-entry-id-7</guid><content:encoded><![CDATA[<span style="color:#000000;">Historically, infosec risk managers have stressed only focusing on the most likely and impactful threats. However, this practice often misses &ldquo;obvious&rdquo; vulnerabilities that lead to catastrophic failure. When realized, these threats are often branded as &ldquo;black swan&rdquo; events, which some believe could never be predicted. This lack of imagination is no longer acceptable, given advances in modeling and simulation capabilities. <br />&nbsp;<br />Rather, novel, forward thinking and expanded threat catalogs need to be developed and adopted. This is the fundamental tenant behind POOH (Point of Origin Hacking). The concept goes like this; If you have a properly motivated adversary, they will (eventually) develop or obtain a (theoretical) capability that they will use against you. So, build systems that take into account theoretical vulnerabilities, as they will likely become practical in the fullness of time. <br />&nbsp;<br /><br /></span><p style="text-align:center;"><img class="imageStyle" alt="POOH" src="https://getsecure.com/blog/files/pooh.png" width="663" height="403" /><span style="color:#000000;"><br /></span></p><p style="text-align:left;"><span style="color:#000000;"><br /><br /><br />Example: In a post quantum world, many encryption algorithms will be worthless as a protection mechanism. Knowing this, organizations should choose algorithms that are post quantum secure.<br />&nbsp;<br />So the next time someone tells you that an alien invasion, zombie apocalypse and giant meteors are out of scope for your threat catalog, just remind them that those items look a lot like volcanoes, pandemics, unprovoked war, trucker strikes, train derailments, global warming...Plan accordingly, because you never see the one that gets you.<br /><br /></span></p>]]></content:encoded></item><item><title>Would you be embarrassed by your password&#x2026;or worse?</title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-07-11T11:16:03-04:00</dc:date><link>https://getsecure.com/blog/files/52ef1ba6e565a3a4417c46c8b89f27ad-6.html#unique-entry-id-6</link><guid isPermaLink="true">https://getsecure.com/blog/files/52ef1ba6e565a3a4417c46c8b89f27ad-6.html#unique-entry-id-6</guid><content:encoded><![CDATA[<span style="color:#000000;">That was the nagging question in my head after hosting last month&rsquo;s security summit. It was seeded by a conversation with </span><span style="color:#0B4CB3;"><u><a href="https://www.linkedin.com/in/britton-white-739b966/">Britton White</a></u></span><span style="color:#000000;">, a security practitioner, who is trying to raise awareness of the very real threat posed by infostealers like Raccoon, Vidar and RedLine. Britton shared details of several incidents (use cases) leading to exposure of extremely sensitive information, including diagnostic medical records, like exam pictures. We also discussed the disappearing lines between work, home and &ldquo;play&rdquo; in a post Covid world. What I found most interesting about these incidents, were the reactions of the victims. They ranged from shocked disbelief to denial and everything in between.<br /> <br />Infostealers are a type of malware sold on underground forums and criminal marketplaces. Infostealers are part of a fascinating and growing ecosystem. Victims can be infected via phishing, compromised websites and interaction with infected files. Once infected, the victim&rsquo;s data is exfiltrated, packaged and sold. While the data stolen can vary, of special interest are authentication credentials like user names and passwords. An excellent primer on infostealers can be found </span><span style="color:#0B4CB3;"><u><a href="https://www.secureworks.com/research/the-growing-threat-from-infostealers">here</a></u></span><span style="color:#000000;">.<br />&nbsp; <br />A common theme in many of the use cases, involve organization&rsquo;s system credentials being compromised by infostealers installed on personal computing devices. Since many organizations, allow users to access organizational systems from unmanaged devices, those systems can become collateral damage from an infostealer attack. Key personnel with privileged system access pose a special risk to organizations. Those users have a responsibility to alert their organizations of a breach, however, they are typically the last to learn they have been compromised!<br /><br />In a recent incident, I observed an interesting variant of the above scenario. Corporate security personnel were made aware of an infostealer incident involving one of their employees. It appeared the victim had been accessing corporate systems from an impacted personal computer. The corporate systems were protected via multi-factor authentication, but the victim&rsquo;s personal accounts were not. While the employee had an obligation to report the breach, that obligation did not necessarily apply to their employer. In fact, the corporate security team did not have a clear policy or procedure in place to deal with this incident. Therefore, they had to engage with HR, legal and compliance before finding a way forward.<br /><br />Of course, the right thing to do is to help the victim, however, the specific intelligence and how it is acquired matters. Does it contain stolen or doxed data? Does it fall under PII protections? Should corporations monitor their employee&rsquo;s activity while not working? Are there any liability pitfalls? &nbsp;This type of intelligence will most assuredly contain compromised passwords associated with the victim. Those &ldquo;secrets&rdquo; can NEVER be unseen. Let that sink in. Best case, the victim is shown to use strong passwords but was still compromised. Perhaps they use simple easily guessed passwords that frame them as lazy or ignorant. Or worse, what if the victim&rsquo;s password is a racial slur, sexually suggestive or otherwise prohibited by company policy? Malware, the gift that keeps on giving.<br /><br />What does a reasonable response to the growing threat of infostealers look like? Consider these four simple practices that could limit the negative impact of an infostealer attack:<br /></span><span style="color:#000000;">1.&nbsp;&nbsp;&nbsp;&nbsp; Don&rsquo;t do company business on personal systems <br />2.&nbsp;&nbsp;&nbsp;&nbsp; Don&rsquo;t use password vaults<br />3.&nbsp;&nbsp;&nbsp;&nbsp; Don&rsquo;t save credentials in your browsers<br /></span><span style="color:#000000;">4.&nbsp;&nbsp;&nbsp;&nbsp; Don&rsquo;t use embarrassing passwords<br /></span><span style="color:#000000;"><br />Unfortunately, convenience is the antithesis of security, safety and privacy. Please be thoughtful when finding your balance.<br /></span><span style="font-size:14px; color:#000000;"><br /></span>]]></content:encoded></item><item><title>State Of The (Snake Oil) Business: A Manifesto For Change</title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-04-24T10:09:30-04:00</dc:date><link>https://getsecure.com/blog/files/34219b57e8416775c58de69aa35ae156-5.html#unique-entry-id-5</link><guid isPermaLink="true">https://getsecure.com/blog/files/34219b57e8416775c58de69aa35ae156-5.html#unique-entry-id-5</guid><content:encoded><![CDATA[<span style="color:#000000;">Ahead of this year&rsquo;s RSA Conference I have spent some cycles thinking about how far our industry has come, or more precisely, how little we have accomplished. The world is not a safer place, our systems are more complex than ever and threat actors continue to win while defenders burn out.<br /><br />The modern cyber security industry arguable started in the early nineties with the advent of the WWW. As organizations and individuals rushed to get &ldquo;online&rdquo;, little regard was given to basic security principles like Confidentiality, Integrity and Availability. Very few people understood how the underlying technology worked or more importantly how it could fail or be corrupted. The quest for subscribers and fear of missing out fueled exponential growth. &ldquo;Houston, we have a problem.&rdquo;, but that realization was too late, the proverbial genie was out of the bottle. Never fear, we will use technology to &ldquo;fix&rdquo; technology. Passwords, AV, Firewalls, A/V and IDS to the rescue&hellip;<br /><br />I was one of the many who believed technology could save us from ourselves. In 1998 I started socializing a methodology I developed called </span><span style="color:#000000;"><a href="https://www.afirm.org" target="_blank">AFIRM</a></span><span style="color:#000000;"> (Active Forensic Intelligent Response Method). The following year I published a reference architecture & platform called </span><span style="color:#000000;"><a href="https://www.afirm.org/sane_final.pdf" target="_blank">SANE</a></span><span style="color:#000000;"> (Security Adaptive Network Environment), which was originally designed for the Air Force SBIR program. Not withstanding my cringe-worthy obsession with acronyms, lack of an accepted taxonomy and a strong conviction that Y2K civil litigation would be a compelling event, it occurs to me that SANE is still relevant.<br /><br />25 years later, the market has caught up with the vision. A SANE platform is achievable. We could argue some of the nuances, but it effectively represents the capabilities organizations need to actively achieve a business reasonable security posture today. However, between the FUD, Silver Bullets and the &ldquo;Illusion of Choice&rdquo; our industry is not driving positive change but expanding the status quo. How can we break this cycle? More swag bags, back-to-back meetings to justify airfare, copious badge scanning to feed next quarter&rsquo;s cold calls or dueling parties where the vendors outnumber the clients&hellip;I think not.<br /><br />Rather, consider adopting these simple principles when considering the how you spend your limited resources:<br /></span><ol class="arabic-numbers"><li><span style="color:#000000;">Know what matters most. Understand your organization&rsquo;s mission, stakeholders and risk register. Effective governance is more important than technology. #CultureCounts</span></li><li><span style="color:#000000;">Don&rsquo;t be in a rush to buy more technology. If your tech is not &ldquo;optionally transparent&rdquo; it can easily become a liability. Leverage the latent capabilities present in your current estate. Consider removing two technologies for every new technology brought into your environment. #OptimizeValue</span></li><li><span style="color:#000000;">Humans matter. Make it easy to do the right thing and hard to do the wrong thing. #HumanFirewall</span></li><li><span style="color:#000000;">Automate whenever possible. Humans only need to be involved when discretion is required. Automate everything else. However, beware of automating a broken business process. That is a sure-fire way to fail at scale. #FailAtScale</span></li><li><span style="color:#000000;">Adopt meaningful metrics and score your decisions accordingly. Learn from your mistakes as they are often very expensive. Treat them as an investment not as an embarrassment. #MeaningfulMetrics</span></li></ol><span style="color:#000000;"><br /></span><span style="color:#000000;">This is my call to action and request to our industry leaders as they meet this week in San Francisco. Let&rsquo;s build SANE systems and protect what matters most!<br /> </span>]]></content:encoded></item><item><title>Zero Trust Doesn&#x27;t Have a Part Number&#x21;</title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-04-12T11:24:44-04:00</dc:date><link>https://getsecure.com/blog/files/feacb47e7e7a215e159c9a8f78032cd1-4.html#unique-entry-id-4</link><guid isPermaLink="true">https://getsecure.com/blog/files/feacb47e7e7a215e159c9a8f78032cd1-4.html#unique-entry-id-4</guid><content:encoded><![CDATA[There is no part number or SKU for Zero Trust (ZT), regardless what some vendors might want us to believe. Every organization's ZT journey will be different. However, there are some fundamental themes and key characteristics that most successful ZT travelers consider and adopt. <br />-They assume they are operating in a hostile environment &ndash; plan accordingly #securebydesign<br />-They don&rsquo;t rush to spend money on point products &ndash; pursue &ldquo;latent capabilities&rdquo; first #optimizevalue<br />-They make it easy to do the right thing and hard to do the wrong thing &ndash; leverage the human firewall #humansmatter<br /><br />High-level architectural principles can act as your North Star:<br />-Dynamic vs static<br />-Granular vs wholesale<br />-Automated vs manual<br />-Segmented vs flat<br />-Minimized Attack Surface Vs Porous Perimeter<br /><br />Also consider the reality of how stakeholders use technology. &ldquo;The Perimeter is Dead. Long Live The New Perimeter. Identity!&rdquo;, which is my cheeky response to pesky stakeholders who want to access any application, on any device anywhere. Digital identity for people and things play an important part in creating a friction-less user experience without sacrificing system confidence. Practically speaking, &ldquo;Digital Identity&rdquo; MUST be considered as part of any ZT journey. <br /><br />So even though ZT doesn't have a part number, it doesn't mean your organization can't benefit from taking a ZT journey. Which path will you take?<br />]]></content:encoded></item><item><title>Bliss Index: A Reasonable Response?</title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-04-05T18:03:16-04:00</dc:date><link>https://getsecure.com/blog/files/16c6275f66dbe1aacec8f4ef35a2ee73-3.html#unique-entry-id-3</link><guid isPermaLink="true">https://getsecure.com/blog/files/16c6275f66dbe1aacec8f4ef35a2ee73-3.html#unique-entry-id-3</guid><content:encoded><![CDATA[This morning I was honored and excited to be included on a <a href="https://www.linkedin.com/company/technologyfirst/" target="_blank">Technology First</a> cybersecurity panel. I was especially stoked to be on the panel with my old friend <a href="https://www.linkedin.com/in/brian-clayton-78086b13/" target="_blank">Brian Clayton</a> and fellow researcher <a href="https://www.linkedin.com/in/jeffalanhughes/" target="_blank">Jeff Hughes</a>. The panel's ambitious objective was to share practical advice on dealing with job burnout and ways to drive positive change that is "Human Friendly". We discussed practical ways to make it easy to do the right thing and hard to do the wrong thing with regard to all things cyber. The session was aptly named <a href="https://www.technologyfirst.org/event-4874481" target="_blank">"Cybersecurity &ndash; Team Burnout and Breaking the Cycle"</a>.&nbsp;<br />&nbsp;<br />The session was very interactive with attendees sharing challenges, real-world experiences and the obligatory references to AI and Killer Robots. The group kept coming back to the human factors side of burnout, churn and operator effectiveness. Security metrics, SLA's, OLA's, role objectives and business outcomes are important to measure, but often tough to define, align and maintain. While it's beyond the scope of this post to catalog all the valuable insights shared, the one that hit home with me was the challenge of measuring "good".<br />&nbsp;<br />After I left the session, I kept thinking about measuring &ldquo;good&rdquo;. &ldquo;Good&rdquo; is too subjective, personal and doesn't scale. #FAIL&nbsp;On the flip side, tough problems are often worth solving. How good could it get if we could crack that nut? Perhaps the approach I am taking myself could be applicable. I have a very simple life journey navigation system, which I&rsquo;ve recently adopted. Simply put, I try to maximize my "Bliss Index"(BI) by working on projects that give me joy, with people that value my time and for the benefit of humanity. It's early days but I find it is decisive, intuitive and removes much of the stress associated with being a cyber security professional. How good could it get if everyone had visibility to their own BI factors? Or visibility to their stakeholder&rsquo;s BI factors? Or if organizations aligned themselves to harmonize and amplify their BI versus creating BI conflict? &nbsp;<br />&nbsp;<br />So, I did the obvious thing and asked an AI (<a href="https://chat.openai.com/" target="_blank">chatGPT</a>) how to express BI - "The "Bliss Index" could be expressed as a measure of the level of happiness or contentment that an individual experiences in their life. It could be calculated based on various factors such as overall life satisfaction, emotional well-being, fulfillment of personal goals and aspirations, and positive experiences or moments of joy. The Bliss Index could be used as a tool to gauge the level of happiness in a population or to track an individual's happiness over time. Additionally, it could be used as a benchmark for policymakers to measure the effectiveness of programs or policies aimed at improving people's well-being and happiness."&nbsp;<br /><br />...out of the mouths of babes.&nbsp;<br />]]></content:encoded></item><item><title>FoFT: Virtual Kidnapping </title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-04-03T07:12:59-04:00</dc:date><link>https://getsecure.com/blog/files/9e74b44b76df95464a45b0926d435931-1.html#unique-entry-id-1</link><guid isPermaLink="true">https://getsecure.com/blog/files/9e74b44b76df95464a45b0926d435931-1.html#unique-entry-id-1</guid><content:encoded><![CDATA[File under #FoFT (Future of Fraud Today) - Scammers are still out there committing Virtual Kidnapping (& extortion) by duping victims into thinking their loved ones have been kidnapped and threatening to kill them if they don't pay the ransom. This type of crime is not new (1880 hits on <a href="https://www.fbi.gov/@@search?SearchableText=virtual+kidnapping&searchHelpText=To+narrow+your+search%2C+select+a+content+type+option+listed+under+%E2%80%9CMore.%E2%80%9D+To+broaden+your+search+to+other+FBI+sites%2C+select+a+subdomain+listed+under+%E2%80%9CSource.%E2%80%9D&pageSize=20&page=1&sort_on=&sort_order=descending&after=" target="_blank">FBI.gov</a>). <br /><br />However, as criminals create more plausible "Deep Fake" scams and automate they can scale up and become more effective. This in turn motives more criminals to adopt the TTP's for profit. Here is a pretty <a href="https://www.youtube.com/watch?v=TDpGQIR7OYY" target="_blank">good primer</a> on how this scam works. If you dissect the components it looks like a lot of other scams; unsolicited (in bound communication), exploiting fears & creating urgency as they abuse some trust credential (caller ID). Many of our <a href="https://www.sans.org/white-papers/corporate-identity-fraud-ii-future-fraud-today/" target="_blank">current practices</a> to avoid such scams should be effective. However, if our humans are not aware and properly trained they could easily become victims. <br /><br />Let's spend some cycles coming up with ways to make it easy to do the right thing and hard to do the wrong thing (like paying scammers). Until then, protect yourself and the people you care about by making them aware.]]></content:encoded></item><item><title>Hello Again</title><dc:subject>Relevant Rants</dc:subject><dc:date>2023-03-29T12:09:44-04:00</dc:date><link>https://getsecure.com/blog/files/6158814aa76b6a22f85799e0c51473ea-0.html#unique-entry-id-0</link><guid isPermaLink="true">https://getsecure.com/blog/files/6158814aa76b6a22f85799e0c51473ea-0.html#unique-entry-id-0</guid><content:encoded><![CDATA[Hello World!]]></content:encoded></item></channel>
</rss>