In this riveting episode, we'll be joined by special guests who do
Speaker:information security work taking us into the deep, dark
Speaker:realms of high level hacking. We'll explore the pyramid of
Speaker:threats from those bumbling high school hackers who couldn't hack their way out of a
Speaker:paper bag to the notorious figures backed by nation states.
Speaker:But hold on to your keyboards, folks, because this conversation takes
Speaker:a turn towards Linux and the intricate world of Ozint.
Speaker:Yes, that's open source intelligence for those scratching their
Speaker:heads. We'll unravel the mysteries of Ozint, its
Speaker:uses, its implications, and how it can be a double edged
Speaker:sword in the wrong hands. With a touch of espionage and a sprinkle of
Speaker:humor, we'll leave you on the edge of your ergonomic office chair craving
Speaker:more. And if that's not enough to make your encryption keys quiver,
Speaker:we'll also touch upon the interconnectedness of the past with stories
Speaker:of legendary minds crossing paths in unexpected cafes.
Speaker:All right. Hello and welcome to Data Driven, the podcast where we explore the emerging
Speaker:fields of data science, artificial intelligence and of course, data engineering,
Speaker:which actually makes the whole thing possible. But there's another
Speaker:field that we're going to talk about today, so it's going to be a little
Speaker:bit different. We kind of did that with the last show or two, kind of
Speaker:expanding our purview of topics.
Speaker:And speaking of purview, I said
Speaker:Purview, hopefully I pronounced it right, but I know, Andy, you've been playing
Speaker:around with Azure Purview. I have, yeah. And it's
Speaker:kind of it's speaking of data engineering, there's a lot there
Speaker:with data lineage and the
Speaker:secret sauce to it is it does automated scans and if
Speaker:it can figure out where something new belongs in
Speaker:the diagrams, it'll just put it in there and that is
Speaker:almost magic from a data engineering perspective.
Speaker:There really is a lot of innovation happening in that space. And
Speaker:today, as we're recording this, my wife we
Speaker:mentioned this, does cybersecurity at NIST and
Speaker:my oldest son went with her to Take Your Sons and Daughters to Work
Speaker:Day. That's cool. And yeah, so it's really cool.
Speaker:So we have two guys here on the show. It's one of the few times
Speaker:we've actually have had two guests at the same time. We have Patrick and Dwayne
Speaker:who are fellow podcasters for a show called Security this
Speaker:week. We need applause. Where's your effect? I don't have it. Plugged
Speaker:in the effect. And
Speaker:they also are the CEO and CTO, respectively of Pulsar
Speaker:Security. Combined with them, they have 50
Speaker:plus years of combined experience in cybersecurity and technology
Speaker:and they provided services for Disney, the military,
Speaker:bank of America, the NHL and more.
Speaker:So welcome to the show, Patrick and Dwayne. Thank you. I just want to
Speaker:clarify, I have 49 and he has one.
Speaker:Wow. Just kidding. You look great for your age, by the way.
Speaker:You started when you were like five. Is that what.
Speaker:So there's actually a funny thing. There was a namespace collision
Speaker:because you, Patrick, attended West Point, and thank you for
Speaker:your service. Thanks, sir. There was another Frank Lavinia that apparently
Speaker:went through West Point. Yes.
Speaker:And I almost went to West Point, which probably would have confused a lot of
Speaker:the professors and staff.
Speaker:Wait a minute. Did you just leave here? What do you want, the eight year
Speaker:plan? Yeah. You know what
Speaker:I'm thinking? This is a time travel thing, Frank. It
Speaker:is? Yeah. Yes. One of the
Speaker:NCOs I served with sent me a picture of a Life
Speaker:magazine cover that showed troops in the
Speaker:landing craft at Normandy. And the guy at the center of the picture
Speaker:looked exactly the way I did as a second lieutenant. He's like, I didn't know
Speaker:you were in World War II. So I bought a copy of it. It's exactly
Speaker:the way I looked when I was 22 years old. That's great. Okay, so
Speaker:now both of you are time travel. Maybe that's what West Point does. It's
Speaker:time travel now. We got to delete this.
Speaker:We'll do it from the future. It'll be fun. The
Speaker:neuralizer.
Speaker:That would only work if. We do the video part of this, but that's true.
Speaker:I want to repeat the name of the website because I was rambling when Frank
Speaker:mentioned securitythewsweek.com
Speaker:and you picked up a couple of new listeners, just
Speaker:the banner in the virtual green room was enough to say, all
Speaker:right, I got to make some time to listen to this. All right, we appreciate
Speaker:it. We're trying to educate just like you. Guys,
Speaker:and it's always fun.
Speaker:It's a growth field, I think, to put it mildly.
Speaker:Someone was asking me recently because a lot of big tech layoffs happening and
Speaker:things like that, someone was asking me lately, someone who's not in data science, and
Speaker:I was like, look, if I had to do it all over again in 2023
Speaker:well, actually it was 2022 when I was asked this. I was like, I
Speaker:would go with security. I'd probably go with security if you have
Speaker:50 50 data or security. But you can't go wrong with either.
Speaker:And there have been recent events in my life which I
Speaker:keep alluding to a court case,
Speaker:but definitely I discovered the wonderful world of
Speaker:OSINT. My
Speaker:wife is really good at OSINT, right? Because that's her career. Yeah.
Speaker:But kind of watching what she's able to dig out and
Speaker:kind of know me doing it, too, we've been able to kind of Swiss out
Speaker:more information and get clarity on things, and
Speaker:it's amazing what is available. I took a course on
Speaker:pluralsight on kind of using Kali Linux. Andy and
Speaker:I I now work at Red Hat, so I've kind of went from
Speaker:promoting Windows and using Windows 100% to, thanks
Speaker:to Windows Eleven, being driven away from the Windows world and into
Speaker:the wonderful arms of Linux
Speaker:and fascinated by kind of
Speaker:the tooling that's out there and built into something like Kali or
Speaker:Kali. I'm not sure how to pronounce it. Depends on who you are. Yeah, we
Speaker:usually call it Kali, but that's our bread and butter. We love Kali, right? Yeah.
Speaker:That's an awesome operating system. So tell us a little bit about because I know
Speaker:I don't think our listeners are necessarily up on the
Speaker:Linux, let alone kind of the hacking world making
Speaker:that assumption. If I'm wrong, please let me know kindly through
Speaker:email comments
Speaker:in angry letter form. It's a siloed kind of world. We live in technology,
Speaker:right. There's a lot of specialization. There's this notion of full
Speaker:stack this, full stack that, but
Speaker:I've noticed in security that poison of the notion of full
Speaker:stack has not hitting you guys yet. It started to kind of
Speaker:flirt with the data science world. But I don't think you can be because just
Speaker:looking at what are the disciplines. Right, so I think that's one of the things
Speaker:we mentioned, OSINT, which for those that don't know is open source intelligence. And I
Speaker:don't mean open source like Linux or anything like that. What is open source
Speaker:intelligence? So open source intelligence is
Speaker:from my field. It's awesome because what open source intelligence
Speaker:is there's information about every human out there and you can
Speaker:go like Cambridge Analytica or whoever, right? There's tons of data out there about
Speaker:every human being on the planet that you can pull from just publicly
Speaker:available either databases, websites, some of them say the Dark Web, but
Speaker:you don't need to go to the Dark Web. It's all out there. And we
Speaker:have some crazy OSINT stories.
Speaker:There was one company we were trying to break into, Fortune 500,
Speaker:they said, hey, listen, we'd love you to do a spear phishing campaign.
Speaker:I was going to say and to be clear, you were hired to break in,
Speaker:right? Sure, whatever. Yeah. So if there's any attorneys
Speaker:listening, there's any federal DA listening. Let's make that clear
Speaker:publicly what we're. Saying on the podcast. No, we were
Speaker:hired to break into this Fortune 500 and they said, listen, we'd love you to
Speaker:do spear phishing. And for those of you who may not know, spear phishing is
Speaker:where you target one user. It's either like a CEO,
Speaker:CFO, something along those lines. So you start to gather some really detailed
Speaker:information. And we said, listen, it's too easy, we don't want to do that. Let
Speaker:us just focus on the technology. They're like, no, you have to do spear phishing.
Speaker:We said okay. Cool. And we did a lot of research on and we said,
Speaker:we're going to take your head of HR. We took the head of HR and
Speaker:we did a lot of research on her. They said, before you send these emails
Speaker:out, can you come talk to us about them? Just show us them so we
Speaker:can approve them. Said, sure. We sat down with them and said, listen, we got
Speaker:two campaigns we're super excited about. Super excited about. They're like, all right, hit us
Speaker:with them. What are they? We said, okay, we found out that she just
Speaker:purchased a Dodge Durango. I have the Vin number of it, and I know where
Speaker:she bought it from. We've actually purchased a website that's very close to the
Speaker:same dealership website. We're going to send her an email that there's a recall on
Speaker:her Durango with her Vin number. She needs to click a link, come to a
Speaker:website, start typing in some information. We'll take over her computer, access the
Speaker:systems. They're like, no, you can't do that. No,
Speaker:that's way too personal. Okay, cool. Awesome. We got the
Speaker:second campaign, which I think is a real winner. We're just going to kidnap her
Speaker:kids, right? They're like, okay, so hit us with the second 1.
Speaker:Second one is probably great. I said, okay, so we found out what her
Speaker:kids names are, where she lives. We know what school they go to, the
Speaker:teacher's name for each of the kids. And we found the school nurse name. We've
Speaker:set up a website that's close to the school's website, and we can
Speaker:send an email from the nurse with a form that she has to fill out
Speaker:that's a PDF that's infected with a virus that will take over her computer. Right?
Speaker:And we'll mention her kids names and the classes they're in, that sort of stuff.
Speaker:And they're like, what is wrong with you guys? You can't do any of this
Speaker:stuff. No. Yeah.
Speaker:Open source intelligence is crazy right now. It's data, the things you can find. It's
Speaker:all about data. It's the information you give. So what's the lesson here? The big
Speaker:lesson is your data is out there. And even if you don't think it's
Speaker:out there, your data is out there. And you need to use secondary
Speaker:channels of communication to verify things. So if you get a call
Speaker:from the school, get an email, get a text message, call them up, call up
Speaker:the office. If you get a message to call a phone number about your credit
Speaker:card, call the number in the back of your credit card. Try to find a
Speaker:safe, reliable channel and use that to verify. I get calls
Speaker:all the time from my staff that says, did you send me an email to
Speaker:do this? And I invite that because it's like, you should be using
Speaker:second channel verification, and it's incredibly inconvenient. And
Speaker:that's how you know the security is working.
Speaker:If it's convenient, it's probably not as secure as you'd like. Yeah,
Speaker:well, I mean, that's an interesting point because people like convenience.
Speaker:There is a tension you could just feel like, between convenience. I
Speaker:mean, I have to log in
Speaker:to my account using two factor authentication
Speaker:for both my work and my personal stuff. And I know
Speaker:it's annoying, but I know why.
Speaker:And Roblox apparently must have some really
Speaker:hairy security stories because
Speaker:their captions, their two factor authentication,
Speaker:I mean, it's pretty rigorous. And
Speaker:my eight year old, he's, like, complaining about I'm like, no,
Speaker:there's a good reason for this. You got
Speaker:to protect the kids, but also kind of train them early. Oh,
Speaker:yeah, I like that. Yeah, it's a great idea. I was on a
Speaker:panel with a colonel from Disa, and he said he went on vacation
Speaker:and he got bit by a spider on his hand and came back to work.
Speaker:Went into the office, started working, and ten minutes later, armed
Speaker:guard showed up at his desk. And we forced him to identify
Speaker:himself, improve his identity, because his typing cadence had
Speaker:changed. Wow. We're
Speaker:starting to get to the world of the military is doing things we're
Speaker:not thinking of, and eventually we're going to have to do those things. Right. So
Speaker:Dwayne smiled when you said two factor authentication, and I want to know
Speaker:why. Okay. All right. I get the sense
Speaker:it's like the tooth Fairy, right? Like, you want to believe in it, but it's
Speaker:not as effective as it is as it's supposed to be. No, actually.
Speaker:So, interestingly enough, Google and Microsoft both have released
Speaker:independent research that says two factor auth will
Speaker:mitigate about 95% to 98% of most common
Speaker:attacks, but not everything, which is fantastic. We love using it
Speaker:because we look for the gaps in between systems. So there's
Speaker:a couple of two factor authentication providers out there that allow us
Speaker:to verify that you have valid accounts and that sort of stuff, without actually
Speaker:yeah, there's all sorts of once you start digging into the APIs of two
Speaker:FAS, some of them are easily bypassed, some of them are easily mimicked. Some of
Speaker:them allow you to get more information you wouldn't normally get.
Speaker:So just be careful. There's nothing in security. That's the panacea of security.
Speaker:Right. It's the same thing with data analytics. There's nothing that's like, oh, my
Speaker:God, there's this one product, and if you buy it, you know everything and you
Speaker:can see into the future. No, it doesn't work that way. Right. All
Speaker:right. I need to ask you about my password vault off the air.
Speaker:Yes, you do. Let me tell you
Speaker:password for it. No matter what you heard in the news, you should have one,
Speaker:but there's one you might not want to have. Yeah,
Speaker:I may have that pass.
Speaker:I think we're on the same one. Well, when someone tells you who they are,
Speaker:believe them, and then when they tell you again, believe them again.
Speaker:Yes. That's my concern with these
Speaker:password vaults, is that you are putting all your eggs in one basket,
Speaker:and you don't have two arguments, really. You
Speaker:could use hints in your password vault instead of the passwords.
Speaker:It's less convenient, and therefore it works.
Speaker:But that means you still have to use long passwords. So you might have
Speaker:zip codes and phone numbers and favorite words and favorite
Speaker:songs and you know what you're going to pull out of them. You'd still have
Speaker:to have that cognitive presence to understand, but you can put hints
Speaker:in them and then that'll let you get to where you need to be.
Speaker:A friend of mine would put incorrect information
Speaker:in it. Right. And he would know that's what it's same principle.
Speaker:Exactly. Yeah. That is just
Speaker:intriguing. So, quick question. Scrambled up symbols,
Speaker:letters and stuff, or.
Speaker:Better, longer the better complexity. So okay.
Speaker:At our office, we break in at companies all the time legally. Right.
Speaker:I'm going to keep adding that, Patrick, just for the
Speaker:thank you. So when we find a hash so a hash is a representation
Speaker:of a password or an account on a particular system. It's not the actual
Speaker:password. We need to crack it. We need to go and figure out, okay, well,
Speaker:does the word book match to this hash? No. Does the word car match?
Speaker:This is a brute force technique. We're not able to reverse it, but we can
Speaker:brute force it. Right. And so in doing that, we have a crack cluster at
Speaker:the office. So you know the 30, 90 video cards that you might have in
Speaker:your computer? We have a crack cluster that has like 40 of them all in
Speaker:one motherboard. So we can guess 3 billion
Speaker:passwords a second. Wow. Yeah. So if
Speaker:you take a normal hash, we're
Speaker:guessing let's say we're only doing
Speaker:lowercase characters, it's 26 characters. And let's say
Speaker:at ten character password, it takes us a day. Right? Well,
Speaker:at eleven characters, it's a day times 26. Now we're at about a
Speaker:month. At twelve Characters it's a month times
Speaker:26. Now we're at a little over two years for twelve characters.
Speaker:Now let's do one thing. So we also have a
Speaker:dictionary file with 8.4 billion
Speaker:passwords that have been found on the Internet through over the last breach.
Speaker:Ten years. Over the last ten years. If your password is in that, we'll get
Speaker:it in 3 seconds. Right. Because we can get so we also. Have to talk
Speaker:about that after. Yes, for sure.
Speaker:And to be clear, passwords are better. And to be clear, you're doing this
Speaker:offline. Right. It's not like somebody's listening. You're not like hitting the login
Speaker:page and clicking that a billion times. Let me give you stolen the hash.
Speaker:Okay. Yeah. So good example, because that's a great question, Frank. So let's say
Speaker:I'm trying to break into your Wi Fi. Now, there's a couple of ways to
Speaker:do that. One is to try to break into your Wi Fi
Speaker:system because you've allowed a remote administration, which you shouldn't
Speaker:do. And then I have to guess the password, and I might be able to
Speaker:get that to accept 1000 attempts per
Speaker:minute, maybe more, but I'm
Speaker:still throttled by having to send it, having to receive it. It
Speaker:processing. And some of those things are going to be slow. But if I can
Speaker:monitor the airwaves, which I can if I'm local to you and I
Speaker:get the hash through going through the air to
Speaker:someone's phone, which we will get, then we can take that home
Speaker:and we can brute force it in the comfort of our own systems. And that's
Speaker:offline hacking. So online attacks are harder to do
Speaker:because you can't get the speed, you can't parallelize them them
Speaker:parallelize them as easily. But the ones where we can do
Speaker:offline, we can do those much faster and much more powerfully.
Speaker:There are cool ways, though, to do online ones. Okay. Really?
Speaker:Yeah. Okay, real quick, you know how you try and log into a
Speaker:website and if you log in with the wrong password five times it kind of
Speaker:locks you out for a period of time? Sure. So what they're doing is they're
Speaker:saying five times from that one IP address. So what if you could have an
Speaker:infinite amount of IP addresses, which is what
Speaker:Azure and AWS will give you. So you can actually route every
Speaker:password attempt through AWS, for example, and get a new
Speaker:IP address every single time. You can do thousands, but you're still. Throttled by how
Speaker:fast it can reply. And it probably can't reply 3 billion. Not as fast as
Speaker:an offline crack. Exactly. But it can be. I'm just saying won't at some point
Speaker:AWS or Azure kind of like figure. Out you would think. You
Speaker:would think. Okay, no, interesting. So it's a game
Speaker:of cat and mouse. They're dealing with amazing amounts of
Speaker:traffic. Eventually, maybe there'll be an AI that helps, but then we'll use our
Speaker:AI to fight it and it'll be and. Then the Robot Wars.
Speaker:And I would imagine that Microsoft has bigger fish
Speaker:to fry and AWS has. Bigger fish to fry. Problem is, if you're
Speaker:not using Amazon, you just use a botnet and then there's
Speaker:no limitation on that. I got you. Right. And for
Speaker:the education of our audience, just in case you may have heard it in the
Speaker:news, what exactly is a botnet? I think I know what it is,
Speaker:but I want to hear it straight. From the when hackers take over systems,
Speaker:they can do various things with them. They can ransomware them, they can steal your
Speaker:personal information and do identity theft and credential theft. But they can
Speaker:also just turn your computer into one of their slaves and it'll be a
Speaker:zombie in their army. And they get 100,000 of these systems. They could do
Speaker:Denial of Service, they can rent them out. Think of
Speaker:Coin, I think was a thing for a while. Yeah. And honestly, what's interesting,
Speaker:talking about data trends, you start to see ransomware
Speaker:attacks on systems go up when bitcoin's
Speaker:value goes down. So if it's
Speaker:more advantageous for you to use those systems to mine
Speaker:coins, that's what they do. But when it's not, then they just switch over to
Speaker:ransomware and they start making more money that way. So you keep an eye on
Speaker:that market and, you'll know interesting. Yeah,
Speaker:interesting. So they make money, whoever they are,
Speaker:they make money on the way up. One way or
Speaker:another. Yeah, exactly. Right. You have to admire they're business
Speaker:savvy. Oh, it's impressive. You shouldn't, but you
Speaker:can rent a botnet, rent a ransomware framework.
Speaker:So let's talk about one thing. There's different levels of threats. So the
Speaker:kid that's walking through the parking lot trying car doors to steal stuff out of
Speaker:a car is not as much of a threat as the professional who knows how
Speaker:to break into a vault. And there's
Speaker:fewer of that latter than there are of the former. So what you're
Speaker:trying to do is you're trying to build up enough defense that the threats that
Speaker:are likely to come your way are going to be thwarted. You can't stop
Speaker:everything if Dwayne comes after you, I can confidently
Speaker:say we're getting you because that's what we
Speaker:do. And we're not script kitties. We're not amateurs, and we have a lot
Speaker:of capabilities, a lot of software. Some of the software packets we use cost
Speaker:$60,000 a year. Wow. Hackers sitting in their basement
Speaker:aren't doing that. We're a different level of organization. But you
Speaker:want to prepare for the highest level you can so that things
Speaker:bounce off you. Isn't that referred to as
Speaker:advanced persistent threats? Yeah, we would represent
Speaker:an advanced persistent threat because we can do things and
Speaker:spin up resources that aren't available at the lower levels. The lower levels
Speaker:are like kids in high school that are just
Speaker:trying to make a name for themselves. And then there's the we
Speaker:actually have a slide called the Pyramid of Threats that goes through all this. And
Speaker:the next level would be basically a
Speaker:stalker, technical stalker, somebody who's a little bit of a techie and is mad at
Speaker:you and comes after you. That's very personal. Kim Jong
Speaker:UN is probably not your stalker.
Speaker:Probably. The next level is the criminal syndicates who are just in it for the
Speaker:money, and they're going to go after the softest target they can
Speaker:find. And if you make it hard for them, they're just going to go away
Speaker:because you're not what they want. They look for another target. And then you get
Speaker:up to organizations like ours that work with enterprises and
Speaker:governments and billion dollar entities, and then you get to governments themselves,
Speaker:which, when we talk about Mitigation, we have levels of what you need
Speaker:to do to stop the script kitties and everything else. And the top, when we
Speaker:get to nation states, it's prayer. Yeah. There's not much.
Speaker:That'S perfect. Yeah. What's fascinating,
Speaker:though, is I remember reading Bruce Schneier wrote a book on
Speaker:cryptography, which is probably still a vaunted
Speaker:tome, but I remember one of the things
Speaker:was he didn't say exactly what you said, but he
Speaker:phrased it differently. If you're talking about cryptography. There's cryptography to keep your little
Speaker:sister out of it, and there's cryptography to keep nation states out of it. And
Speaker:that's a very wide spectrum.
Speaker:Even though he wasn't writing about cryptography, it sounds like the same philosophy
Speaker:holds true. There's also a duration aspect. So if I'm firing
Speaker:artillery at you, I need the coordinates those are going to land at to be
Speaker:secret for about two minutes, and then after that, it doesn't matter. Then it doesn't
Speaker:matter. Right. But if it's nuclear missile silo locations, I need that
Speaker:for decades. Or mineral depots or things
Speaker:like that. So there's a time duration that also. Factors
Speaker:in which actually, I think is a good topic of something else I'm
Speaker:fascinated with is quantum computing. And I know that
Speaker:you're laughing, so that I know there's a good story behind this. I have a
Speaker:podcast on quantum computing called Things, and
Speaker:it's the only topic that shuts Dwayne up.
Speaker:I'm going to go do something else now. So that's why I saw the eye
Speaker:roll and then you were laughing. Okay. So the reason why
Speaker:people are kind of because in the security space and in the government, there's this
Speaker:whole thing of how do we get post? Yeah. Shore's law.
Speaker:So Shore wrote this algorithm that could theoretically
Speaker:break how we do
Speaker:cryptography now is largely based on it's hard
Speaker:to reverse factor prime numbers. It's the discrete log
Speaker:problem. Right. Which underlies RSA,
Speaker:diffie hellman and elliptical curve. Oh,
Speaker:elliptical curve, too. Yeah. I thought that was meant to be post.
Speaker:Okay, well, they thought so, not so much. Oh, is this the one that
Speaker:was broken? And don't worry, listeners, we'll unpack
Speaker:this. That was the NIST psych. It was an
Speaker:implementation break. So if I can just give a quick
Speaker:reel. No, please do. There's a lot to unpack here, particularly. For folks that are
Speaker:I'm not an. Expert, but I've got a podcast for the last two years on
Speaker:quantum computing called Entangled Things, and it's a great
Speaker:way to learn a topic really well. I took the MIT courses.
Speaker:Peter Short was one of the professors, and so he came up with a
Speaker:way if we had a suitably advanced quantum computer, we could
Speaker:break RSA 2048 or RSA anything. Diffie
Speaker:helman and elliptical curve. Now, those aren't our
Speaker:primary symmetric encryption
Speaker:protocols. Those are our primary asymmetric encryption protocols. So those are
Speaker:the protocols we use to share the key that then does all the
Speaker:encryption. Because files and large amounts of data can't be
Speaker:encrypted with an asymmetric key, it has to use symmetric. But
Speaker:how do you share that key? Well, that's where the asymmetric comes in. And so
Speaker:it's the key to the key drawer is really what it is. And
Speaker:so if those all break, then we need replacements.
Speaker:And NIST, which is one of the reasons I'm a big fan, has come out
Speaker:with basically, they did a Bake off over the last five,
Speaker:six years to figure out which algorithms would not be
Speaker:quantum based, but would be quantum resistant. And
Speaker:Crystals.org has crystals, kyber crystals,
Speaker:dilithium. So you got to love the techies, right?
Speaker:It looks like those kinds
Speaker:of technologies are in our future as well as when
Speaker:quantum finally arrives. The problem is no one knows when quantum will actually be
Speaker:ready. And that's the sticking point. Is it the end of this decade? Is it
Speaker:three decades? I think it's closer to the end of this decade, but we don't
Speaker:know because we're in the middle of the infancy of quantum. But
Speaker:the computers do exist now. But the point you're doing about
Speaker:time, right? So if you need something to be secure for decades,
Speaker:right now is the time to at least
Speaker:try with post quantum cryptography. Because and
Speaker:supposedly there are stories that there are bad actors
Speaker:out there storing stuff, storing data
Speaker:for later. That's what's motivating. Honestly, that's where
Speaker:a lot of the money is coming from for quantum computing, is
Speaker:because of this threat, nothing funds like
Speaker:defense. So this has turned quantum into a defense
Speaker:spending among the primary powers. But it also solves a lot of
Speaker:problems, does a lot of other things. So speaking of geeky stuff, there's
Speaker:a quote from one of the Ferengi characters on Deep Space Nine, and
Speaker:it's something to the effect quark. Yeah, it
Speaker:might even be one of the Rules of Acquisition, but it was basically something to
Speaker:the effect of no one ever went broke selling weapons.
Speaker:I have that book somewhere on this bookshelf. I have that too. That's an awesome
Speaker:book. Yeah, not wrong. I highly recommend that book. I don't know if
Speaker:it's print, but. The other thing I'd say about quantum, and I bring
Speaker:this up every now and then, we have a podcast called Impact
Speaker:Quantum as well. We've been doing it about a year and a half, two years.
Speaker:So it sounds like we started around the same time. Wow. But it's interesting
Speaker:spinning around in the corner in all of this is as
Speaker:they run simulations to try and simulate
Speaker:Quantum every six months or so, they go, oh
Speaker:man, we can take this problem. That was going to take 100,000 years
Speaker:on traditional hardware. Now we can do it in a couple of months.
Speaker:They keep finding these optimizations, I guess.
Speaker:And so it's like without meaning to be here already,
Speaker:quantum is kind of sneaking in. It certainly
Speaker:is. And I think we've just hijacked the podcast here. I
Speaker:know, right? Yeah, it's all good. All these things are. So one
Speaker:of my favorite shows of all time, aside from D Space Nine, of
Speaker:course, is there was this British television series called, I think
Speaker:was Connections. Yeah. And I think it
Speaker:was with the guy who's done a bunch of documentaries, or it was
Speaker:the guy who played a James Bond villain at one point, I forget. But
Speaker:they would basically try to connect. I'm. Going to get a lot of
Speaker:hate mail on that one because I'm totally messy.
Speaker:1978 TV series. This guy, he had a bunch of
Speaker:James Burke. James Burke. You're right. Yes. But he looks like a
Speaker:guy that would play he was also in Game of
Speaker:Thrones, looks like a mad scientist. But
Speaker:he had a number of shows from the 70s into the don't know if there's
Speaker:any newer ones, but you basically show how the way
Speaker:we learn about anything right. Is a very siloed right. You have English class, you
Speaker:have math class, and then you put your brain
Speaker:on part of your brain on the shelf. But he kind of shows how one
Speaker:particular one that stuck out was the connection between perfumes
Speaker:and the carburetor. And that's awesome.
Speaker:The spoiler alert was the Atomizer for the
Speaker:carburetor came from. But there was a whole connection of
Speaker:people that knew each other, who knew each other, just like today. They didn't have
Speaker:LinkedIn then, but you would always have these second and third connections that you
Speaker:would meet at a cocktail party or ballroom dance,
Speaker:depending on the time period. And it was just interesting how these ideas would intermingle.
Speaker:Another story I like that kind of illustrates that, is that apparently there's some cafe
Speaker:in Vienna where Freud would hang out, einstein
Speaker:would hang out, and so would Vladimir Lenin hang out from time
Speaker:to they did they have conversations with each
Speaker:other? I don't know. But just the fact that they were in the same coffee
Speaker:shop around the same time opens up the thing of
Speaker:did Einstein say to Freud, like, hey, can you pass the sugar? And
Speaker:then, you know, that's what your mom said, or something
Speaker:like stupid stuff like
Speaker:or or Lenin would have said, is it really your sugar?
Speaker:But you have to wonder. These little type of chance
Speaker:encounters, those are the types of things that the thought of which fascinate
Speaker:me. Yeah. It is impressive how some of the modern
Speaker:day, you think brilliant inventions, and when you unpack them, you're like,
Speaker:it was a lot of little steps and a lot of weird connections that happened
Speaker:that brought this thing about, right? Yeah. And Quantum to me, is still
Speaker:mind blowing. I'm working on breaking into conventional systems
Speaker:for now. I'll break into Quantum systems later. Well, yeah, I mean,
Speaker:eventually anything can be broken,
Speaker:apparently. You can watch the movie War Games, and War Games
Speaker:came out at 83. I would have been impressionable young youth,
Speaker:and I was just fascinated by that movie. And there's a scene
Speaker:in there where he smugly turns to I guess it would have been Ali. Sheedy
Speaker:like, anything could be broken.
Speaker:Like, if nothing has ever been such a
Speaker:timeless, a just existing is kind of like a
Speaker:vulnerability. I'm telling you, those movies
Speaker:all right, how many of you are fans of Sneakers? Oh,
Speaker:yeah. Well, that wasn't Robert Redford.
Speaker:Yeah, that was the one where I. Was like, okay, if there's a job in
Speaker:the real world to do that, that's what I want to do.
Speaker:Social engineering, right? That was the first time I saw it. Oh, my
Speaker:gosh, I just love that. Movie because it showed,
Speaker:like it's not just the obvious, right? Like the thing where the
Speaker:guy who was blind was playing back with tape
Speaker:whistler was playing, like, the tape. Okay, well, what did the road sound
Speaker:like? And he goes, he described he goes, did it sound like this? I was
Speaker:like, no, a little slower. Oh my God. I was like, So you were on
Speaker:that highway? It was just like but that was one of those
Speaker:moments where you're like, wow, holy crap. That sort of thing possible.
Speaker:Where he's listening to neon signs as they're moving the mic around, and he's like,
Speaker:no, that's an exit sign. And they're like, Dwayne, do you want. To talk about
Speaker:the way you hack a database without actually reading any of the
Speaker:data? So awesome. Based on denials. Have you guys ever heard of blind
Speaker:injection? No? Okay. Blind injection is the coolest thing ever. So let's
Speaker:say we go to a website and it's blackmagic, it's like
Speaker:voodoo stuff. You go to a website and let's say in the website, all you
Speaker:can do is you have a little drop down and you can change the language
Speaker:of the website. And that's it. That's all you can do. No login screen? No
Speaker:none of that stuff. But in that drop down, as a website owner, you
Speaker:keep adding languages. So you add French and you add Spanish and you add whatever,
Speaker:right? So that pulls it out of a database. So what
Speaker:I can do is, even though I don't have
Speaker:the ability to inject data, I can stack the query for
Speaker:the language, and then at that point, I have the ability
Speaker:to gauge how quickly the web page comes
Speaker:back, so I can say, okay, give me the language
Speaker:Spanish. And if the first column in
Speaker:the first database is
Speaker:an A, then pause for a fraction of a second
Speaker:and the page will pause for a fraction of a second.
Speaker:So you can pull all the information out of the back end database just by
Speaker:how quickly the page comes back to you, whether it's two milliseconds
Speaker:or five milliseconds or ten milliseconds, just by blindly injecting, which
Speaker:is awesome. Yeah, that's insidious.
Speaker:The first time I heard about SQL injection was actually at a Microsoft like,
Speaker:dev days thing in New York, and they built this
Speaker:website, I might have been Channel Nine, which for our listeners, they know what
Speaker:Channel Nine is, but it was basically like a community site where they would post
Speaker:content they since killed. It rebranded it's been
Speaker:rebranded to learn. TV or something like that. But
Speaker:I was on channel nine. You were
Speaker:half microsoft flew me out to and five other
Speaker:hackers flew us out to Vegas to break into a casino and
Speaker:they did a half hour long, like breaking into
Speaker:casino. So we did injection. It was called the code room. I remember the code
Speaker:room. I got to see if they've archived that.
Speaker:We have to check it out. You're like that guy in Oceans Eleven, right?
Speaker:I'd like to say it's the only time I've ever been walked through a casino
Speaker:in handcuffs, but whatever. Anyway,
Speaker:another show. Exactly.
Speaker:No. So the same team that built Channel Nine, this would have been early
Speaker:2003, 2004, they basically
Speaker:had shown how they did this challenge, like, who can
Speaker:hack this? And basically somebody had basically said, well, your database sent
Speaker:the email back saying, know, hey, this is what your database looks like. And everybody
Speaker:at Microsoft was freaking out. And it turns out it was a SQL
Speaker:injection. But when I first heard that, my mind was blown like I never thought
Speaker:of cool. And the wife
Speaker:did nix the idea of naming our kid Little Bobby Table. Bobby
Speaker:table, right? Missed
Speaker:opportunities right there. Right? Little Bobby tables.
Speaker:Which if you don't know that story, you have to Google it because the
Speaker:Xkcd cartoon does it. Those are excellent.
Speaker:Brilliant. One of many.
Speaker:So this is awesome.
Speaker:We've talked about OSINT, but there are other disciplines in this. Oh, there's, there's, there's
Speaker:Red Team, Blue Team, pen testing,
Speaker:auditing, auditing, CNA
Speaker:certification, accreditation. Being a good developer. OSCPs.
Speaker:Oh, yeah. Just not being a bad developer using oh my God. Well,
Speaker:that's really true.
Speaker:Oh, Patrick. You froze Patrick. I think we lost him. We lost
Speaker:him. So while we're hoping his video
Speaker:comes back, I will tell you a joke that
Speaker:because when my first child, I think I'm back.
Speaker:You are back. So think about building a house. And then
Speaker:afterwards you say, okay, now secure it. You got to replace all the
Speaker:doors. You got to think about Windows. Now, it's much more expensive when
Speaker:you build anything, whether it's hardware, software, or anything,
Speaker:if you start with security in mind, it's much cheaper. And so really, security is
Speaker:a job for everybody. Data architects, SQL
Speaker:administrators, network, file systems, Nas
Speaker:administrators, everyone. And then there's the ones who are just thinking about
Speaker:security all the time. But we have to make it pervasive. We have to make
Speaker:everybody think about it. Well, I mean, that's a good point, because there's
Speaker:an acquaintance of my wife who does I forget what it's called, but it
Speaker:was basically physical security. He does all kinds of security, but one of the things
Speaker:that he does is more like the stuff you would see
Speaker:in movies where they follow people. They kind of
Speaker:do kind of like the lock picking and the lock picking, stuff
Speaker:like that. There's actually a video on it might have
Speaker:been from Defcon where breaking into like 50
Speaker:places in 50 days or something like that. But
Speaker:I was talking to this acquaintance of my wife and no
Speaker:names, but he basically that's one of the jobs that he
Speaker:does. He's contracted to do that. And
Speaker:he'll get some interesting things where they
Speaker:have some really good stories. This guy. This guy's. Stories. So one story
Speaker:was he's testing out a new data center for
Speaker:someone, and they want to test the security. And he's
Speaker:like, okay. Takes a look around outside, he walks in and he goes
Speaker:and the customer says, well, when do we start to test? And he goes, has
Speaker:the paperwork been signed? He goes, yeah. So he looks at this
Speaker:bulletproof door, and then he's got these giant
Speaker:boots. That's what he always wears, these giant boots. And he just basically looks
Speaker:around. He goes, and the paperwork signed, right? He talked to the lawyer who was
Speaker:there. He goes, yes. Paperwork signed. And he turns to the customer
Speaker:once again, he goes, Are you sure you want to do this? They're like, absolutely.
Speaker:We're secure. We'll get it. And then he does and he does this, like, karate
Speaker:kick, and he's a big guy. Basically knocks down the
Speaker:bulletproof door. Oh, my God. Because the bulletproof door was not on
Speaker:reinforced hinges. Sure, but it was just kind of.
Speaker:Like the description that he gives of
Speaker:whoever was the chief security officer's face just blew color drained from
Speaker:his face. We've done physical security and seen
Speaker:bulletproof systems where they were installed backwards
Speaker:so that people attacking could have taken it out.
Speaker:Because the hinges you have to think about where the hinges are and where the
Speaker:nuts so when you disassemble it.
Speaker:We lost them again. Oh, no. Sadness. I want to know how
Speaker:it ends.
Speaker:So while we wait for him, there's this TV show called Burn
Speaker:Notice, which always has some oh, I love Burn Notice.
Speaker:It's one of my favorite shows. Yeah, well, the one where the drug
Speaker:dealer and I love how he does like the voiceover. He
Speaker:goes, this drug dealer has a bulletproof angel.
Speaker:Angel. That's right. Sugar. Sugar. Sugar. It was sugar. He lived downstairs
Speaker:from him. He shot the door. He shot through the door. The wall. The
Speaker:wall. No, the wall. He's like, yeah, but there's not bulletproof drywall.
Speaker:The way he says it was funny. Yeah, I highly
Speaker:recommend I forget what service it's on, but I discovered it because
Speaker:it was on Pluto. They had a channel that was just burned. Notice.
Speaker:Twenty four seven. And then like 7 hours later I was like, oh, my God,
Speaker:7 hours. It's that good of a show.
Speaker:So you were talking about the before you froze up, you were
Speaker:talking about the hinges.
Speaker:Oh, I'm sorry. I don't know what's going on with my Internet connection. I apologize.
Speaker:No worries. You're probably in the middle of a hack.
Speaker:Dwayne is actually hacking. Yeah. Let me stop. Hold on.
Speaker:So my password is 54 characters long because he kept telling me what my password
Speaker:was in the Smarmiest voice
Speaker:possible. How many years would that take to break
Speaker:all of them? More years than we all have. Until
Speaker:I get quantum computing comes up. To speed, then we're good.
Speaker:Probabilistically. Yeah, I think I was just saying
Speaker:that you got to make sure you think about where the hinges are, which
Speaker:direction they're facing and stuff like that, but it's
Speaker:mistakes. If you look at the news of the day, it's
Speaker:misconfigurations. It's social engineering,
Speaker:and it's getting more and more complex, and so we're having a tough time keeping
Speaker:up with the education, which is why podcasts like yours and ours are so
Speaker:important. No, absolutely. And you're right. Security is
Speaker:everybody's businessweek.com. I've got to
Speaker:check that out. And you got the.
Speaker:Oh, my God. You need a we did it. Yeah,
Speaker:we.
Speaker:Were talking about you were talking about the physical security part. I did a little
Speaker:bit of that back in one day. You were in the military, so you
Speaker:did a lot of the back. Yeah, think about it. At least
Speaker:the National Guard stuff. But it was interesting because
Speaker:being in Virginia and working with a little bit
Speaker:of physical security here, it was amped up a
Speaker:notch. Same way Frank's in Maryland. Same way in Maryland, if you are in
Speaker:driving distance of important places, you
Speaker:know that there's no need to give anybody any more ideas,
Speaker:but occasionally, somebody would
Speaker:do something clever. And the gist
Speaker:of the story, kind of the moral of the story was they didn't beat the
Speaker:electronics. No. They beat the.
Speaker:Was. And it's the same thing with social engineering. It's the same thing with
Speaker:all of this stuff. So hopefully I didn't say too much. Frank, you may have
Speaker:to take that out. I don't know. I
Speaker:live now. I was being the tomahawks on its way. Andy.
Speaker:We have the watch lies come back on, but
Speaker:no, I live up the road on Route 32 from if you know, you know,
Speaker:from places. I know from places from places
Speaker:in and around that county and the next county. There's a lot of
Speaker:office buildings know, just have no signs on them, have
Speaker:suspiciously high degrees of security, and they. Don'T like when you
Speaker:pull up unannounced. Oh, my. No.
Speaker:So right next to where the Microsoft Reston office used to be,
Speaker:there is an unmarked building with
Speaker:a high number of security. And one of my former
Speaker:bosses who drove down from Pittsburgh, his first trip to the Rest in
Speaker:office, he missed the turn, and he was trying to turn around inside that
Speaker:parking lot. Yeah, no. And yeah, he learned
Speaker:very quickly. He went back up. Severe tire. Not that
Speaker:parking. No. Well, I mean, law enforcement showed up pretty
Speaker:quickly with seconds, and they're like, what are you doing here? And he's
Speaker:like, I'm just trying to get the money. Just turn around. Like, sure you are.
Speaker:So ten years ago, my daughter was moving out of
Speaker:a place that she was renting down in Boston, right by the VA hospital.
Speaker:She was finishing her senior year of college, and I had
Speaker:a U Haul truck. And I took the U Haul truck
Speaker:and parked it in the VA parking lot because I'm a veteran, right?
Speaker:And I moved a barrier to do it because I'm a veteran. And I
Speaker:parked it. And then I went and walked through the woods to where her apartment
Speaker:was to talk to her and left my 17 year old nephew in the car.
Speaker:And the cops came, guns drawn,
Speaker:like, Open the truck. Open the truck. Oh, my goodness. Okay. And
Speaker:he opened the truck. It was empty. They're like, what are you doing here? And
Speaker:he's like, oh, my uncle. And he's like, this better not be here when I
Speaker:come back. I came back, and he's like, telling me this story. I'm like, I'll
Speaker:be fine. We're leaving now anyways. And we leave, and the cops coming back, and
Speaker:I'm like, I wave. That's funny.
Speaker:Yeah, there's a lot of good stories. My first day at Microsoft
Speaker:not my first day, but my first speaking gig, because I was doing a developer
Speaker:evangelism then was at a nondescript office building in and around the
Speaker:Bethesda area. And I've driven past 100 times, never noticed
Speaker:it. I still think
Speaker:to this day it was a hazing thing, right? I was a last minute
Speaker:replacement for somebody else, so my name wasn't on the big list. So I
Speaker:show up, and I wasn't on the big list. And then the guard
Speaker:looks at me and was like, well,
Speaker:why don't you go over there? I'm like, uhoh
Speaker:all of a sudden, out of nowhere, this normal suburban looking building
Speaker:like, armed machine guns meant it was just like, oh, my God.
Speaker:Like dogs sniffing around the car. It was crazy.
Speaker:And the guy with the heavy machine gun said to me, you want you to
Speaker:sit in the car and wait for Ain't getting out?
Speaker:And so finally, they did manage to get in a hold of somebody, but it
Speaker:was just kind of like, oh, my God. Yeah.
Speaker:So I've been drawn on at an air force base. We
Speaker:went in to do work, and I was working with I won't mention the military
Speaker:contractor, but military contractor. I wasn't cleared for the particular
Speaker:intelligence systems, but I was helping them do security
Speaker:work. So the contractor had to type,
Speaker:and I had to tell her what to type. And after two days, she's like,
Speaker:listen, I don't know what you're telling me to type anyways. Doesn't matter, right? Just
Speaker:sit down and type at the computer. I was like, okay. So I'm sitting there
Speaker:typing. After a couple of hours, she leaves. A fully uniform guy comes in
Speaker:like, what's your clearance for that system? Oh, my God. I don't have any clearance.
Speaker:Pulls his gun, pulls his gun. Is like, don't touch the key.
Speaker:Step away from that keyboard. And I was just like, I got to get shot.
Speaker:Yeah. Back up slowly. Yeah. No, that
Speaker:was probably the scariest cyber incident I've ever been
Speaker:in. Well, it's interesting because the
Speaker:cybersecurity world, I think, is really an interesting
Speaker:space for a lot of reasons, but it does blend the physical and the real,
Speaker:right. The kinetic and the virtual, as I've heard
Speaker:said. It's fascinating. Yeah.
Speaker:You know what, we didn't get to our questions. I
Speaker:know, I'm okay with that. This was an awesome
Speaker:conversation to come back. There you go. I love
Speaker:it. So we will ask this because
Speaker:you told us in the virtual green room you didn't want to be
Speaker:advertising your company and that sort of stuff, but we ask everyone,
Speaker:where can people learn more about you? And feel free
Speaker:to plug your business. Our website is
Speaker:Pulsarsecurity.com. We're in a weird situation
Speaker:because we have very high end cybersecurity talent. We have
Speaker:several billion dollar customers, and we try to do a lot
Speaker:for community school systems, things like that, on a budget. So cool.
Speaker:But we're really not looking for a ton of customers, which is
Speaker:a good place to be. So we're mostly promoting the podcast
Speaker:to say, that said, we do try to help people who need
Speaker:it, but we also have to pay a lot of cost for that high end
Speaker:software that makes sense.
Speaker:Securitytheweek.com, podcast.
Speaker:And entangle things. Okay. Entangle things. Okay. So
Speaker:before you go, there's one question I think that everybody who's listening to this is
Speaker:probably asking themselves, if you're not in the security field, how does
Speaker:one get started? Where does one get started?
Speaker:You mentioned, like, pluralsight, LinkedIn. There's all sorts
Speaker:of training out there. If there was this much training when I was a kid,
Speaker:I would be way smarter than I am now.
Speaker:You just have to start going and surveying. I tell people they
Speaker:should start a mile wide and an inch deep. They need to learn
Speaker:terminology. They need to learn what is SQL? Well.
Speaker:SQL injection. What'sql? You have to understand what a database is. You have to understand
Speaker:what a file is. You have to understand what Red Hat is and
Speaker:what Kali is and what Linux is. You need that basis. And
Speaker:then you can figure out where your niche will be. Whether you're going to be
Speaker:an auditor, or a hacker, or a red teamer or blue teamer
Speaker:or project manager or whatever. Because it's kind of like saying,
Speaker:I want to be in security or I want to be in technology. That's like
Speaker:saying, I want to be in medicine. It's a wide range. You need to just
Speaker:start getting that understanding so that when you listen to a
Speaker:podcast or read an article, you understand what they mean when they
Speaker:say deployment or compile. That's where you
Speaker:start. You start with the vocabulary. And I'd say the other thing is reach out
Speaker:to companies. I can't tell you how many times I have people reach out to
Speaker:me and say, hey, listen, I'm interested in cybersecurity. What should I
Speaker:do? And we'll do things like, I'll have them sign an NDA
Speaker:and bring them on an engagement. See if this is for you before you actually
Speaker:go. And just watch and ask questions and use
Speaker:it as a training event.
Speaker:So it's things like that. I think you'll find
Speaker:companies out there who are just there's so little people in the cybersecurity space.
Speaker:They're just willing to help and educate and see if this is a field you're
Speaker:interested in. Also, we are summer program
Speaker:True with interns that come in with
Speaker:us. We're working with high school in the area
Speaker:for kids that it's a Stem high school
Speaker:bringing them on and having them do their required hours just to get
Speaker:a feel for what it's all. About, what it's like. Yeah,
Speaker:right? And that mystery voice is Jill.
Speaker:Just for the listeners that are like. Who was somebody broke into the podcast.
Speaker:That's hilarious. Nothing's safe.
Speaker:Okay, Joe. We didn't say your last name. We're good. Yeah.
Speaker:That's really interesting to know about the intern program. My
Speaker:daughter is headed to Virginia Tech for computer science,
Speaker:and she's looking for I don't know if she'll want to do
Speaker:cybersecurity, but if she does now, I know some people. Yeah, there you go.
Speaker:Have her reach out. Because, honestly, even if she just wants to sit in and
Speaker:watch what a Red Team engagement looks like, I've had people my son's 19 years
Speaker:old, and I got him to intern and look at engagements, and he came to
Speaker:me after, like, a year, and he was like, hey, dad, you know what? And
Speaker:I was like, yeah. And he's like, I hate this. This is not yeah,
Speaker:this is not for me. That's a good thing, though, right? Because it's a
Speaker:great thing. Did he say this or you
Speaker:fire targets down. Tell him his 54 character
Speaker:password. That'll get.
Speaker:Well. This has been an awesome show. I hate to end it, but all good
Speaker:things must end. But we'll definitely have you back, because this is a field that
Speaker:I think and there's topics in my head that we didn't come up with. Right.
Speaker:The idea of how do you secure data from
Speaker:the source to the end, right? Because if you're training these AI
Speaker:models, particularly with something like a
Speaker:Kafka stream, what if you inject bad data in? How do you detect that?
Speaker:A friend of mine was talking about there was some talk of using
Speaker:blockchain technology to kind of
Speaker:authenticate data transactions. So that way when you're learning
Speaker:it, you have kind of a trail to it. And obviously that could probably be
Speaker:another hour episode right there. But in the interest of time,
Speaker:we'll definitely love to have you back, and. We'D love to join
Speaker:you. Any parting thoughts? Stay
Speaker:in school. Yes, stay in school. Use long. Change your
Speaker:password. Right? And keep listening to this podcast. It's great. That's
Speaker:right. And the other ones? Awesome. All right. And I'll let the
Speaker:nice British lady finish the show. And that,
Speaker:dear listeners, brings us to the end of another riveting episode of
Speaker:Data Driven. I hope you've all enjoyed delving into
Speaker:the mysterious world of cybersecurity. I must
Speaker:admit, the idea of advanced persistent threats and hacking can be a bit
Speaker:unnerving. But, hey, who needs beauty sleep when you
Speaker:can have nightmares about hackers instead? As we sign
Speaker:off, I'd like to extend a big thank you to our guest speakers, who shared
Speaker:their insights and experiences, including that rogue AI of
Speaker:theirs. Remember, folks, hacking might be a
Speaker:dark art, but with great knowledge comes great,
Speaker:um, well, cybersecurity skills, I suppose.
Speaker:But wait. Before we biddered you, I'd like to remind you all to
Speaker:secure those passwords, enable two factor authentication, and
Speaker:resist the urge to click on suspicious links.
Speaker:Because, let's face it, no one wants to wake up one morning to
Speaker:find out their bank account has been drained by a hacker named Dwayne.