Episode 20
A Deep Dive into Ransomware Attacks and Negotiations
Art Ehuan, Vice President, Palo Alto Networks, and Former FBI Special Agent, discusses at length the unfortunate evolution and escalation of ransomware attacks. He explains how the threat actors have upped their game and are now engaging in double, triple, and quadruple extortions. While lamenting that "organizations continue to make the same mistakes," Art also acknowledges the challenges of vulnerability management. He offers some interesting insights into ransomware negotiations and provides excellent advice and recommendations on how to proactively thwart such attacks.
Time Stamps
Before we started the recording, you made a statement that "companies keep making the same mistakes." Tell us more about it.
For the benefit of our listeners, if you would explain what a ransomware attack is and what the threat landscape is like? Who are the threat actors?
What is the level of preparedness?
Have you seen any best practices out there or any exemplars where irrespective of the directive, irrespective of board oversight, there is a conscious commitment to create and sustain a high-performance information security culture? Have you seen evidence of that?
I have seen a difference between having frameworks and truly following the framework in a very disciplined and committed manner. And there being some oversight to ensure that the compliance is thorough, the compliance is meticulous. What have you seen?
Please provide some insights into ransomware negotiations.
What is the best defense against ransomware attacks? And you've already shared with us that, patch management is important, but that can be challenging. What else? What else should companies be doing to reduce the possibility of such attacks?
Have you come across an instance where a company was a victim of a ransomware attack and they're like, "doesn't matter, thank you very much, we are all backed up and good to go?"
I've also heard that if you (organization) pay, you are on that list. And they (threat actors) know that if you are attacked again, you will pay again. Is that true?
We are aware of the Colonial Pipeline attack, and how the FBI was able to recover some of the ransom money. Given your experience with the FBI, why is it so hard to get hold of these criminals, and put them away?
If crypto could be regulated, that might help mitigate some of these types of attacks? Do you have any thoughts on that?
What are your thoughts on senior leadership treating cybersecurity as a strategic priority, as a distinctive competency, and making every effort to protect against all possible vulnerabilities?
There might come a time, hopefully, sooner than later, when the CISO reports directly to the Board? This would allow the CISO function to operate as independently as possible. Your thoughts?
I would like you to wrap it up for us with some final words.
Memorable Art Euhan Quotes
The importance of hygiene around patch management -- making sure that you've got a vulnerability management program, and that you implement it so that as vulnerabilities are identified on systems, you're patching them in a timely fashion.
You could potentially have a nation-state masking their activity as a ransomware attack when they're actually burrowing into your infrastructure.
You're (CEO) trying to make a determination, do I put more money into cyber, or do I put more money into customer satisfaction? You know, that's sometimes a hard decision because you've got limited dollars, and trying to make that decision is sometimes difficult? If you're the CEO, you want to do the right thing, make sure the company is protected. But you also want to make sure that your customers are happy and you're doing everything possible to provide those products or services. So, sometimes that's a very difficult balancing act.
If you're just checking a box, you're not meeting the spirit of the framework, you're not actually doing what you really need to be doing to ensure the security of the organization.
There is this view out there, that if we pay and get the key, the next day, we're up and back in operation. I want to dispel that myth that you get the key and you're back in operation the next day. It typically is going to take several days, even when you get the key.
One of the first things that these threat actors do when they get into the environment is go looking for the backups because those are going to be some of the first systems they hit you with ransomware attacks. They're going after the backups.
It is very difficult for an organization to say to their C-level or their board, hey, I absolutely 100% guarantee we will never suffer a breach. But you can do things to minimize impact. Or, even better, make it hard for that group or that attacker. Make it so hard that they're just going to move on to another company.
If you pay, the threat actor group will follow through with what they've promised to you.
Right now, the deterrence factor, unfortunately, is very low. Because it's very difficult to have these individuals (threat actors) arrested.
Ransomware is more than just a CISO problem. It's a corporate problem. You need the executives, you need the Board, you need the executives, you need the management, and you need the employees to all to be in unison, in how do we protect our company?
I'm a huge fan of anything that will get the CISO as close to the CEO, or the Board as possible so they can have that influence.
Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast
Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks.
Connect with Dr. Chatterjee on these platforms:
LinkedIn: https://www.linkedin.com/in/dchatte/
Website: https://dchatte.com/
Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338
Transcript
Welcome to the Cybersecurity Readiness Podcast
Introducer:Series with Dr. Dave Chatterjee, Dr. Chatterjee is the author of
Cybersecurity Readiness:A Holistic and High-Performance
Cybersecurity Readiness:approach. He has been studying cybersecurity for over a decade,
Cybersecurity Readiness:authored and edited scholarly papers, delivered talks,
Cybersecurity Readiness:conducted webinars, consulted with companies, and served on a
Cybersecurity Readiness:cybersecurity SWAT team with Chief Information Security
Cybersecurity Readiness:officers. Dr. Chatterjee is an Associate Professor of
Cybersecurity Readiness:Management Information Systems at the Terry College of
Cybersecurity Readiness:Business, the University of Georgia, and Visiting Professor
Cybersecurity Readiness:at Duke University's Pratt School of Engineering.
Dr. Dave Chatterjee:Hello, everyone, I'm delighted to
Dr. Dave Chatterjee:welcome you to this episode of the Cybersecurity Readiness
Dr. Dave Chatterjee:Podcast Series. Today, I have the pleasure of talking with Art
Dr. Dave Chatterjee:Ehuan, Vice President of Palo Alto Networks, Art has extensive
Dr. Dave Chatterjee:experience in the field of cybersecurity. Having worked
Dr. Dave Chatterjee:both in the public and private sector to share a few highlights
Dr. Dave Chatterjee:of his work experience and expertise. As Vice President at
Dr. Dave Chatterjee:Palo Alto Networks, Art manages federal and international
Dr. Dave Chatterjee:customer relationships. He provides cybersecurity advisory
Dr. Dave Chatterjee:services to board of directors, chief information security
Dr. Dave Chatterjee:officers, chief risk officers and senior management of risk
Dr. Dave Chatterjee:mitigation. Art has also been retained as a cybersecurity
Dr. Dave Chatterjee:expert for matters that include Marriott, international, Capital
Dr. Dave Chatterjee:One, Equifax, Anthem, Sony and others. He has also been
Dr. Dave Chatterjee:involved in cybersecurity operations in organizations such
Dr. Dave Chatterjee:as USAA, Cisco Systems, and he has served with the Federal
Dr. Dave Chatterjee:Bureau of Investigation as a supervisory special agent in
Dr. Dave Chatterjee:computer crime investigations. Last but not least, Art is a
Dr. Dave Chatterjee:colleague of mine, at Duke University's Master of
Dr. Dave Chatterjee:Engineering in cybersecurity program, where he'll be teaching
Dr. Dave Chatterjee:a class on security, incident response, and resilience. Our
Dr. Dave Chatterjee:discussion today will focus on ransomware attacks. And I can't
Dr. Dave Chatterjee:think of a better person than Art to discuss this topic, and
Dr. Dave Chatterjee:more. So I'm sure we are all excited to hear from him.
Dr. Dave Chatterjee:Without any further ado, Art, welcome.
Art Ehuan:Thank you, Dave, appreciate the opportunity to
Art Ehuan:speak with you and the audience about what what I'm seeing in
Art Ehuan:the world of ransomware, which unfortunately, has exploded in
Art Ehuan:the past couple of years. And I anticipate will continue to grow
Art Ehuan:as the the threats to corporations continues to
Art Ehuan:increase.
Dr. Dave Chatterjee:Before we started the recording, you made
Dr. Dave Chatterjee:the statement that "companies keep making the same mistakes."
Dr. Dave Chatterjee:Tell us more about it.
Art Ehuan:Yeah, so you know, some of the basic things, some
Art Ehuan:of the the hygiene that you would expect to see in
Art Ehuan:organizations, for whatever reason, sometimes aren't done
Art Ehuan:right, so I'm specifically I'm going to mention patch
Art Ehuan:management, right? Because, I mean, attackers have several
Art Ehuan:ways of getting into an organization, you know, it can
Art Ehuan:be through a phishing attack, it could be through through, you
Art Ehuan:know, an attack on credentials. But another way, obviously, is
Art Ehuan:through vulnerabilities and systems. And if those system
Art Ehuan:vulnerabilities exist, an attacker can leverage that to
Art Ehuan:access the network. So that highlights to me the importance
Art Ehuan:of hygiene around patch management, you know, making
Art Ehuan:sure that you've got a vulnerability management
Art Ehuan:program, and that you implement it so that as vulnerabilities
Art Ehuan:are identified on systems, you're you're patching them in
Art Ehuan:in a timely fashion. Now, having said that, and having been on a
Art Ehuan:on the back end of corporations where I'd been CISO or acting
Art Ehuan:CISO, sometimes it can be difficult, right? Because
Art Ehuan:there's so many dependencies in in systems that maybe if you do,
Art Ehuan:you know, put a patch into a system without appropriate
Art Ehuan:testing, you're potentially going to break something where
Art Ehuan:your customers are no longer able to access your data. Or you
Art Ehuan:may create additional vulnerabilities. So you close
Art Ehuan:one vulnerability but you create additional vulnerabilities
Art Ehuan:downstream. So I do understand that you need to be careful when
Art Ehuan:identifying vulnerabilities and conducting patch management, but
Art Ehuan:there are vulnerabilities, certain vulnerabilities, like
Art Ehuan:the recent Log4j, that are so critical that you absolutely
Art Ehuan:have to patch those systems, especially on the perimeter. And
Art Ehuan:then I've been talking to companies here, since that that
Art Ehuan:Log4j vulnerability was posted in, you know, to me, it's one of
Art Ehuan:the largest vulnerabilities I've seen in a very, very, very long
Art Ehuan:time, just because of the potential for an attacker to
Art Ehuan:access the corporation with, you know, potentially leaving little
Art Ehuan:trace evidence, right. So, in my discussions with companies, I
Art Ehuan:mean, especially the large companies, they were immediately
Art Ehuan:looking at identifying where that vulnerability existed, and
Art Ehuan:then trying to patch it without breaking anything, at least at
Art Ehuan:the perimeter. And then now companies I see are now trying
Art Ehuan:to go in the back end, because this vulnerability, even if
Art Ehuan:patched at the at the perimeter, if it exists in your back end
Art Ehuan:systems, it's still vulnerable. And, you know, one of the things
Art Ehuan:that I do hear from, from organizations is, I don't
Art Ehuan:understand what my environment looks like a complex environment
Art Ehuan:on the backend, or some of these these questions come up, you
Art Ehuan:know, with customers that, you know, they need help, right,
Art Ehuan:they need assistance in identifying what the data flow
Art Ehuan:looks like, what the network looks like. So it isn't easy.
Art Ehuan:And I I will, I will always agree when, when the CISO says
Art Ehuan:it's hard, I absolutely agree it's hard. But there are certain
Art Ehuan:things that in my opinion, patch management, you just have to be
Art Ehuan:doing it right. Especially, especially critical
Art Ehuan:vulnerabilities. It's one of the things that we need to put, you
Art Ehuan:know, those those appropriate controls in place to protect,
Art Ehuan:you know, when a critical vulnerability is identified.
Dr. Dave Chatterjee:Fair enough, fair enough. So let's
Dr. Dave Chatterjee:back up a little bit. For the benefit of our listeners, if you
Dr. Dave Chatterjee:would explain what ransomware attack is, what's the threat
Dr. Dave Chatterjee:landscape Like? Who are the threat actors? That would be
Art Ehuan:Oh, absolutely. Okay. So I'll start with Yeah, what is
Art Ehuan:very beneficial.
Art Ehuan:ransomware. Ransomware is is a an attack, that a threat actor
Art Ehuan:will conduct and that threat actor, usually an organized
Art Ehuan:crime or some criminal group. And now, I'm not, I won't say
Art Ehuan:never going to be a nation- state, because you could
Art Ehuan:potentially have a nation-state masking their activity as a
Art Ehuan:ransomware attack when they're actually burrowing into your
Art Ehuan:infrastructure. But a ransomware attack is an attack that is
Art Ehuan:designed to encrypt systems encrypt data, so you no longer
Art Ehuan:have access either to the systems or your data. Now,
Art Ehuan:what's happened in the past, say year or two, is that the threat
Art Ehuan:actors as they've come to the realization that some companies
Art Ehuan:are able to recover on their own right, they're able to recover
Art Ehuan:their systems, because they do a real good backup process of, you
Art Ehuan:know, real good disaster recovery process, you know, and
Art Ehuan:thus, are not inclined then to to conduct negotiations with the
Art Ehuan:threat actor to pay them to get access to their systems, what
Art Ehuan:the threat actors are now doing is they've upped their game. And
Art Ehuan:by that, I mean, what they now do is along with encrypting your
Art Ehuan:systems and your data, they're doing now something called
Art Ehuan:double extortion. They're also stealing your data before they
Art Ehuan:encrypt it. And now they're forcing you to negotiate. Even
Art Ehuan:if you can recover your systems on your own, even if you can
Art Ehuan:recover your data on your own with your backups and your
Art Ehuan:disaster recovery business continuity plan, you are still
Art Ehuan:forced to negotiate a to get an agreement from them that they're
Art Ehuan:not going to post that, you know, customer data that you
Art Ehuan:know, protected health information out on the internet,
Art Ehuan:so and then now they've even increased that tempo, because
Art Ehuan:now the threat actors are going to triple extortion where
Art Ehuan:they're encrypting system data, they're stealing data. And
Art Ehuan:they're launching a denial of service attack on you so that
Art Ehuan:your businesses no longer able to function. And then we're now
Art Ehuan:seeing something called quadruple extortion, where
Art Ehuan:they're doing all three of those, but they're adding the
Art Ehuan:element that they're not communicating with your
Art Ehuan:customers whose data they have, and telling them your that your
Art Ehuan:customers or your patients, hey, we've got your data we breached
Art Ehuan:you know the organization and we're gonna post this
Art Ehuan:information to the internet. You might want to talk to you know,
Art Ehuan:your company that has this, that who, from whom the data we stole
Art Ehuan:and tell them to do the right thing and pay us, right. So, you
Art Ehuan:know, now they're putting that pressure on the company, because
Art Ehuan:now they're notifying the victims as well, that they've
Art Ehuan:got your data so. So they really, you know, upped their
Art Ehuan:game in, in a sense, because, you know, they're really forcing
Art Ehuan:an organization to negotiate and make some kind of payment to get
Art Ehuan:those assurances that, you know, they're going to stop that
Art Ehuan:activity. So yeah, the number of matters, I, you know, that we
Art Ehuan:see now, every year, they're increasing and they continue to
Art Ehuan:increase. I certainly, in as I look at the future, I certainly
Art Ehuan:don't see a future where I'm saying, hey, ransomware is going
Art Ehuan:to come down, there's just so much money to be made, right.
Art Ehuan:And these threat actors have identified that there's a lot of
Art Ehuan:money to be made. So it's, it's a very cost effective way to
Art Ehuan:commit crime and make make money.
Dr. Dave Chatterjee:I was just reading an article, where it
Dr. Dave Chatterjee:states that there's a severe increase in ransomware attacks,
Dr. Dave Chatterjee:that cybersecurity authorities from Australia, the United
Dr. Dave Chatterjee:Kingdom, United States, have published a joint advisory
Dr. Dave Chatterjee:warning of an increase in sophisticated high impact
Dr. Dave Chatterjee:ransomware attacks targeting critical infrastructure
Dr. Dave Chatterjee:organizations across the world. And that's what concerns me
Dr. Dave Chatterjee:means you don't want ransomware attack on anyone, individuals or
Dr. Dave Chatterjee:organizations. But I especially worried about the critical
Dr. Dave Chatterjee:infrastructure, you know, you were candid enough to say that
Dr. Dave Chatterjee:it's difficult, it's not an easy task, to be super protected, to
Dr. Dave Chatterjee:do the kinds of patch management and other things that needs to
Dr. Dave Chatterjee:be done. But having said that, given the severe consequences of
Dr. Dave Chatterjee:these attacks, what are you finding out there, both public
Dr. Dave Chatterjee:sector and private sector? What is the level of preparedness?
Art Ehuan:Yeah, so I think it's going to depend on an industry
Art Ehuan:Dave, you know, especially critical infrastructure, you
Art Ehuan:know, there's more regulation around financial services around
Art Ehuan:energy. So typically, organizations that fall under
Art Ehuan:some kind of regulatory regime, typically, you know, are putting
Art Ehuan:more of an investment in protecting the organization.
Art Ehuan:Also organizations where there's more Board involvement, more,
Art Ehuan:you know, governance and oversight, because, you know, in
Art Ehuan:my opinion, especially with, with publicly traded companies,
Art Ehuan:you know, they have a Board, for instance, if there's an engaged
Art Ehuan:Board, that's asking questions of the cybersecurity program on
Art Ehuan:a regular basis, that's gonna, you know, I think for the C-
Art Ehuan:level, that shows that, you know, the Board is very
Art Ehuan:interested in this, we, as the C-level, obviously have to also
Art Ehuan:support those types of activities and make sure that
Art Ehuan:they get the appropriate funding, they get the
Art Ehuan:appropriate resources that are needed. Now, again, there's
Art Ehuan:always outliers, right. So,and by that, I mean, you know,
Art Ehuan:companies, you know, they're, they exist, obviously, to, to,
Art Ehuan:to generate revenue, right? I mean, they, they produce a
Art Ehuan:product, or they provide a service and for the purpose of
Art Ehuan:generating revenue. Sometimes, you know, if you're in a
Art Ehuan:particular industry, and, and, and you're trying to make a
Art Ehuan:determination, do I, you know, do I put more money into cyber,
Art Ehuan:or do I put more money into customer satisfaction, you know,
Art Ehuan:that's sometimes that's a hard one, right? Because you've got
Art Ehuan:limited dollars, and, and trying to make that decision is
Art Ehuan:sometimes difficult, right? If you're the CEO, you know, you
Art Ehuan:want to do the right thing, make sure the company is protected.
Art Ehuan:But you also want to make sure that your customers are happy
Art Ehuan:and you're doing everything, you know, possible to, to provide
Art Ehuan:those either products or services. So, sometimes that's a
Art Ehuan:very difficult balancing act for, you know, executives, right
Art Ehuan:to, to have to manage, right, because in a perfect world, they
Art Ehuan:would, they would have enough funding for everything, but it's
Art Ehuan:never perfect world and there's always going to be that
Art Ehuan:push-pull inside of an organization, you know, the
Art Ehuan:site, really, the cyber organization is going to be
Art Ehuan:asking for money and resources, you know, and operations is
Art Ehuan:asking for money and resources and the CEOs, you know, got a
Art Ehuan:limited budgets to work with and, you know, he's trying to do
Art Ehuan:the right thing, you know, to maybe, you know, keep both
Art Ehuan:constituents happy, right. I make sure that I'm protected and
Art Ehuan:I make sure my, my customers are happy and and it's a It's a
Art Ehuan:balancing act. And I think that's why it's important, you
Art Ehuan:know, to have that governance and oversight with with, with
Art Ehuan:the board, you know, so that they can provide you know that
Art Ehuan:you know that that top level guidance to the organization.
Dr. Dave Chatterjee:You know, you talk about governance,
Dr. Dave Chatterjee:oversight, regulation. It brings to mind Sarbanes Oxley Sox. As
Dr. Dave Chatterjee:you might know, Sarbanes Oxley was introduced when fraudulent
Dr. Dave Chatterjee:accounting transactions were taking place. Yep. And there
Dr. Dave Chatterjee:wasn't that level of top management commitment to ensure
Dr. Dave Chatterjee:that those kinds of activities didn't happen. So it took
Dr. Dave Chatterjee:legislation to get senior leadership attention. Yeah. And
Dr. Dave Chatterjee:it's my hunch that we are going that way, even with cyber, there
Dr. Dave Chatterjee:are some regulations out there existing laws are being used to
Dr. Dave Chatterjee:regulate cyber activities or to provide reasonable oversight,
Dr. Dave Chatterjee:you know, but I almost feel that there's going to be a major
Dr. Dave Chatterjee:legislation which will come down the pipe, and that's going to
Dr. Dave Chatterjee:really get everybody's attention, because like you
Dr. Dave Chatterjee:said, it is a hard balance for the CEO. Yeah, yeah. But then if
Dr. Dave Chatterjee:you have that regulatory pressure, the regulatory burden,
Dr. Dave Chatterjee:that would force you to do the right thing when it comes to
Dr. Dave Chatterjee:cybersecurity competency, cybersecurity due diligence. And
Dr. Dave Chatterjee:I know, this is easier said than done, it's a great conversation
Dr. Dave Chatterjee:to have, but for people who are trying to make things happen,
Dr. Dave Chatterjee:it's a it's a tough ask. Given your experience, you know,
Dr. Dave Chatterjee:you've been industry you've actively engaged with the senior
Dr. Dave Chatterjee:leadership, have you seen any best practice out there, or any
Dr. Dave Chatterjee:exemplars where irrespective of the directors, irrespective of
Dr. Dave Chatterjee:Board oversight, there is a conscious commitment, it's like,
Dr. Dave Chatterjee:woven into the organizational culture, that we must create and
Dr. Dave Chatterjee:sustain a high performance Information Security Culture,
Dr. Dave Chatterjee:have you seen evidence of that? Oh, absolutely.
Art Ehuan:Yes, I certainly see it, you know, again, especially
Art Ehuan:with the large organizations that, you know, have, you know,
Art Ehuan:have a dedicated program, right. So, it is possible, I will say
Art Ehuan:that a cybersecurity program is a dynamic thing, right? It's a
Art Ehuan:living to me, it's a living thing, that that is always
Art Ehuan:changing as the threat evolves, right, because, as I mentioned
Art Ehuan:earlier with ransomware, right, you know, as as, as
Art Ehuan:organizations put up defenses, the threat actors, you know, put
Art Ehuan:up countermeasures, right to to get around those defenses. So,
Art Ehuan:cybersecurity can never be static. And and if it's static,
Art Ehuan:then I, I fear that a company may be is not, you know,
Art Ehuan:thinking about the, the, you know, the the, how would I say
Art Ehuan:the evolving nature of cyber threats, and because of the
Art Ehuan:evolving nature of cyber threats, you've got to have a
Art Ehuan:dynamic program and to me, a dynamic program, you know, you
Art Ehuan:would have one, you would have a program that follows a
Art Ehuan:recognized cybersecurity standard or framework and, and
Art Ehuan:I'll throw out, I'll throw out like the NIST cybersecurity
Art Ehuan:framework, right? It's been around since 2014. It's, it's, I
Art Ehuan:recently saw some statistics that over 50% of large
Art Ehuan:corporations are adhering to to that framework, right? Because
Art Ehuan:that framework gives you a baseline right? The NIST
Art Ehuan:cybersecurity framework is designed to establish a baseline
Art Ehuan:and then also assist an organization in determining what
Art Ehuan:is the future state of the cybersecurity program look like?
Art Ehuan:But what I really like about it is again, it's dynamic in nature
Art Ehuan:in that you never reach a state where you're completely happy
Art Ehuan:and I will never be breached because again, we've got to stay
Art Ehuan:dynamic, and there is NIST, you've got the the ISO 27001 two
Art Ehuan:series, you've got the the CIS 20. So there's a number of
Art Ehuan:standards out there but to me, when I'm looking at an
Art Ehuan:organization, I'm gonna say okay, this organization is, is
Art Ehuan:on track they're thinking you You know, they're putting that
Art Ehuan:security mindset. I look to see if they've got Are they are they
Art Ehuan:mapping to one of these recognized cybersecurity
Art Ehuan:standards? Now, you brought up the the regulatory regime.
Art Ehuan:Having worked with having worked with regulators in the past,
Art Ehuan:right been hired as a kind of an expert advisor to regulators,
Art Ehuan:when they're when they're conducting an investigation or
Art Ehuan:analysis of a regulated company. I will tell you, the regulators
Art Ehuan:are using the NIST CSF as their model to assess companies. And
Art Ehuan:then even more recently, the US Department of Defense, they,
Art Ehuan:they actually released a a something called the CMMC, the
Art Ehuan:Cybersecurity Maturity Models Certification. That is a
Art Ehuan:requirement for organizations that are doing business with the
Art Ehuan:US Department of Defense to follow the CMMC. In order for
Art Ehuan:them to be able to do business with the Department of Defense,
Art Ehuan:I would anticipate as I look at the the CMMC. As its
Art Ehuan:effectiveness grows, I potentially would forecast that
Art Ehuan:other agencies within the United States government, Homeland
Art Ehuan:Security or Veterans Affairs, I would see other organizations
Art Ehuan:potentially adopting this similar model where they will
Art Ehuan:say to organizations, if you're going to do business with us,
Art Ehuan:you have to go through this, this this accreditation, and get
Art Ehuan:certified in order to do business with us. So again, that
Art Ehuan:adds more of that kind of, you know, kind of a regulatory type
Art Ehuan:type spin for organizations that I would envision would, would
Art Ehuan:flow down to to to the corporate sector.
Dr. Dave Chatterjee:You're talking about frameworks, and
Dr. Dave Chatterjee:there are several out there. And I've had, I've had the
Dr. Dave Chatterjee:opportunity to review them when I was authoring my book. They're
Dr. Dave Chatterjee:all great frameworks. Yeah. But what I have found from my work,
Dr. Dave Chatterjee:is there's a significant variance in how these
Dr. Dave Chatterjee:organizations follow the framework. How disciplined is
Dr. Dave Chatterjee:their approach in following in complying with or following
Dr. Dave Chatterjee:through with the guidelines? You know, often I have seen, it's
Dr. Dave Chatterjee:like, let's check the box here. Yeah, you're supposed to offer
Dr. Dave Chatterjee:this kind of training, we have done it, move on, as opposed to
Dr. Dave Chatterjee:going deeper, and making sure the training is substantive, it
Dr. Dave Chatterjee:is year round, it is continuous. So that's where I have seen a
Dr. Dave Chatterjee:difference between having frameworks and the frameworks,
Dr. Dave Chatterjee:guiding cybersecurity operations, and truly following
Dr. Dave Chatterjee:the framework in a very disciplined and committed
Dr. Dave Chatterjee:manner. And there being some oversight to ensure that the
Dr. Dave Chatterjee:compliance is thorough, the compliance is meticulous, what
Dr. Dave Chatterjee:have you seen? Dave, I
Art Ehuan:will agree with you that, that I mean, to me a
Art Ehuan:framework is is only as good as the the implementation and as
Art Ehuan:good as the, the following of that framework, right? Because
Art Ehuan:yeah, so I completely agree with you. I mean, I've seen, I've
Art Ehuan:seen plenty of organizations that are, you know, that are,
Art Ehuan:you know, box checking, and they suffer a breach. Because when
Art Ehuan:you get past the box checking, they're not, you know, they
Art Ehuan:haven't actually implemented correctly, right. So, so it's
Art Ehuan:more than just checking the box, if you're just checking a box,
Art Ehuan:in my opinion, you're not meeting the, you know, maybe
Art Ehuan:you're meeting the spirit of the framework, but you're not
Art Ehuan:actually doing what you really need to be doing to ensure the
Art Ehuan:security of the organization. So, yeah, I mean, when I think
Art Ehuan:of frameworks, right, so, so PCI, right, that's a framework
Art Ehuan:for organizations that handle credit card data. I have seen
Art Ehuan:many, many, a organization that are PCI compliant, they've
Art Ehuan:checked off the box that have suffered breaches. And us you
Art Ehuan:know, the questions asked, well, they, they they've been
Art Ehuan:accredited, you know, by by an assessor and they, you know, all
Art Ehuan:the boxes are checked off, yet they still suffered the breach.
Art Ehuan:It's because we didn't do that deeper digging. Unfortunately,
Art Ehuan:so if, if you're just looking to hey, you know, I'm gonna follow
Art Ehuan:this and you know, so I can check off the boxes. Maybe in
Art Ehuan:spirit, you know, you're following the framework, but you
Art Ehuan:certainly are doing good Cybersecurity, you're you're
Art Ehuan:not, you know, you're not going deeper than just checking a box.
Art Ehuan:So I yeah, I, I can't tell you the number of organizations that
Art Ehuan:I've seen that have checked off the boxes and they still suffer
Art Ehuan:a breach. And then when you're doing the analysis, you you when
Art Ehuan:you dig in, it's like, okay, you checked off a box, but you
Art Ehuan:didn't do these things, you know, these, these, these things
Art Ehuan:underneath that box that does allow and contributed to the
Art Ehuan:breach to occur.
Dr. Dave Chatterjee:Exactly. In fact, talking about PCI
Dr. Dave Chatterjee:standard, it brings back memories of a major breach that
Dr. Dave Chatterjee:happened several years ago, I don't want to name the
Dr. Dave Chatterjee:organization. But there was detailed reports and of the
Dr. Dave Chatterjee:findings. And one of the very concerning finding was they were
Dr. Dave Chatterjee:warned by their auditors, that they were not in compliance with
Dr. Dave Chatterjee:most of the PCI standards. Yeah. And they did nothing about it.
Dr. Dave Chatterjee:Sure. So I'm sure all kinds of things are happening there. And
Dr. Dave Chatterjee:it again, goes back to what we started the discussion with.
Dr. Dave Chatterjee:Like, why are companies making the same mistakes over and over
Dr. Dave Chatterjee:again, you shared with us the challenges that senior
Dr. Dave Chatterjee:executives face. But at the same time, there is this reality of
Dr. Dave Chatterjee:ransomware type attacks that keep getting more sophisticated.
Dr. Dave Chatterjee:And it's a it's a game that's hard to win. Yeah. So going back
Dr. Dave Chatterjee:to ransomware attacks. Let's talk a little bit about what
Dr. Dave Chatterjee:does a ransomware negotiation look like? Not that I'm a fan of
Dr. Dave Chatterjee:ransomware negotiations. In fact, I think the recommendation
Dr. Dave Chatterjee:is not to negotiate. But please share with the listeners your
Dr. Dave Chatterjee:thoughts.
Art Ehuan:Yeah. So and I will agree with you, you know, I I'm
Art Ehuan:not a fan of paying a criminal to get access to your systems
Art Ehuan:and your data. I certainly, you know, don't support it, but
Art Ehuan:there are occasions where a customer will say I have no
Art Ehuan:other choice, I, my systems, my backups are encrypted. And you
Art Ehuan:know, I need my data in healthcare provider, right, you
Art Ehuan:can't be down. So there's certain industries that
Art Ehuan:absolutely cannot be down, they've got to be up, you know,
Art Ehuan:for public safety. And they've got no other recourse. So if
Art Ehuan:that occurs, then, you know, you you contact the threat actor,
Art Ehuan:and again, these communications are taking place on the the Dark
Art Ehuan:Web, right, they give you an address where you can contact
Art Ehuan:them, they tell you what they're looking for, you know, you you
Art Ehuan:get an understanding of you know, what kind of payment
Art Ehuan:they're looking to be made. And you know, it's a, it's literally
Art Ehuan:a back and forth, you want to have, you want to get a proof
Art Ehuan:that they really do have the keys, you know, you you provide
Art Ehuan:them with, with a file that's encrypted, then you know, the
Art Ehuan:contents of that file they get it they they unencrypt it and
Art Ehuan:send it back to you so that you know that indeed they do have
Art Ehuan:the key. You know, and then you're you're you're negotiating
Art Ehuan:a price, right, that everyone can agree to once that that
Art Ehuan:agreement is made, you know, payment is made in
Art Ehuan:cryptocurrency, you know, you name the cryptocurrency and you
Art Ehuan:know, payments made after you've got the the guarantees, you
Art Ehuan:know, from if they're if cyber insurance is gonna pay or, you
Art Ehuan:know, the law firms, the customer, and then you help with
Art Ehuan:the payment. One of the other things I need to real quickly
Art Ehuan:bring up as well though is if, if this is going to occur if if
Art Ehuan:contact with a threat actor is going to take place, at least in
Art Ehuan:the US, because of the you know, US Treasury requirements, you
Art Ehuan:know, a checks have to be made. And they're typically made by,
Art Ehuan:you know, the, the insurance company by the by the law firm,
Art Ehuan:to see if the the threat actor group is potentially a sanction
Art Ehuan:group. So, as an example, REvil was the sanction group. So, a in
Art Ehuan:a in American organization, American corporation could find
Art Ehuan:themselves in legal jeopardy. For instance, if they were to,
Art Ehuan:you know, make payment to to one of these sanction groups. So, so
Art Ehuan:checking, checking the sanction list to make sure it's not a
Art Ehuan:sanction group is going to be very important. But again, it's
Art Ehuan:that communication back and forth. Getting assurance that
Art Ehuan:indeed they have the key, making payment, getting a copy of the
Art Ehuan:key, analyzing that key to make sure it doesn't contain anything
Art Ehuan:that potentially is going to be nefarious try it, you want to
Art Ehuan:make sure that the key in using the key and potentially download
Art Ehuan:additional payloads and then helping the organization start
Art Ehuan:unencrypting. One of the things I want to point out that I think
Art Ehuan:a lot, especially a lot of executives, a lot of, I think
Art Ehuan:Boards, there's this view up there, okay, this happens, I get
Art Ehuan:a ransomware attack, we pay and, you know, we get the key. And,
Art Ehuan:you know, the next day, we're up in, in, in, in back in
Art Ehuan:operation. You know, unfortunately, that's, uh, I
Art Ehuan:want to dispel that myth that, you know, you get the key and
Art Ehuan:you're back in operation, you know, the next day, it typically
Art Ehuan:is going to take several days, even when you get the key.
Art Ehuan:Because, you know, you want to make sure that your systems that
Art Ehuan:you're recovering don't contain any backdoors. In some cases,
Art Ehuan:organizations are building a greenfield a clean environment
Art Ehuan:to go into. So it's, it's typically multiple days,
Art Ehuan:especially larger organization multiple weeks, multiple months,
Art Ehuan:as you're restoring backed operation. So, so even when
Art Ehuan:payment is made.
Dr. Dave Chatterjee:It is it is
Art Ehuan:not as quick as you know, I'm up and running the
Art Ehuan:next day, and everything is great. And, you know, I'm back
Art Ehuan:back to business, it's it's typically an effort, a long term
Art Ehuan:effort to to really get back to operations.
Dr. Dave Chatterjee:Good to know, thanks for sharing. So, in
Dr. Dave Chatterjee:your opinion, what is the best defense against ransomware
Dr. Dave Chatterjee:attacks? And you've already shared with us that, you know,
Dr. Dave Chatterjee:patch management is important, but that can be challenging.
Dr. Dave Chatterjee:What else should companies be doing to, you know, to reduce
Art Ehuan:Companies encrypting their own data, so that even if
Art Ehuan:a threat actor gets access to them, they're not able to do
Art Ehuan:the possibility of such attacks?
Art Ehuan:anything with it would be would be a great defense, having your
Art Ehuan:backups in an environment where, you know, it's it's not
Art Ehuan:connected to the to the network, having backups that are
Art Ehuan:immutable, so that they can't be changed. You know, one of the
Art Ehuan:first things that these threat actors do when they get into the
Art Ehuan:environment literally is where are the backups, they're looking
Art Ehuan:for the backups, because those are going to be some of the
Art Ehuan:first systems when they hit you with with a ransomware attack.
Art Ehuan:They're going after the backups, right? So if you can protect
Art Ehuan:those backups, it's absolutely, I think, very critical for you
Art Ehuan:to be able to restore operations on your own, if you can, you
Art Ehuan:know if you can do that on your own, because your backups aren't
Art Ehuan:impacted. And like I said, I mean, segmenting the network,
Art Ehuan:I'm a big fan of segmentation. Again, it's not easy, I'll be
Art Ehuan:the first ones again, having been, you know, in the CISO
Art Ehuan:seat, segmentation, especially if you've got a large network,
Art Ehuan:and you know, you, you've grown it, and it's never really been
Art Ehuan:properly segmented. It could be a multi year effort, right. But
Art Ehuan:I'm a big fan of segmentation. I mean, I, I worked with, worked
Art Ehuan:with a health care organization some time ago that suffered a
Art Ehuan:ransomware attack. And there were three companies under the
Art Ehuan:umbrella company, but because of lack of segmentation, instead of
Art Ehuan:just getting access to one company, they got access to all
Art Ehuan:three companies within the umbrella, because there was zero
Art Ehuan:segmentation, so segmentation, you know, you know, a robust
Art Ehuan:backup plan, where those are'nt acce. And not only that, a
Art Ehuan:robust recovery plan, right? That's just as important. You
Art Ehuan:know, testing your recovery is absolutely critical, right?
Art Ehuan:Because if, again, something bad does happen. Have you even
Art Ehuan:tested your recovery capability, so that, you know, you can
Art Ehuan:recover in you know, X amount of time of critical systems, so, so
Art Ehuan:there are certainly things that we can do. Because I'll be the
Art Ehuan:first one to tell you that there is no such thing as 100%
Art Ehuan:guarantee that anybody can make that a company is never going to
Art Ehuan:suffer a breach, right? Because it's just the environment is so
Art Ehuan:complex. We've got remote workers, you know, we've got you
Art Ehuan:know, we've got the cloud and the environment is just so darn
Art Ehuan:complex. That that is just very difficult for an organization to
Art Ehuan:say to to their C level or to their Board, hey, I absolutely
Art Ehuan:100% guarantee we will never suffer a breach. But you can do
Art Ehuan:things to minimize impact or or even better, make it hard for
Art Ehuan:for that in that group or that attacker, make it so hard that
Art Ehuan:you know what, they're just gonna move on to another
Art Ehuan:company. Right? Because you've made it too hard for them.
Dr. Dave Chatterjee:I'm so happy that you mentioned about
Dr. Dave Chatterjee:the importance of having offline backups. Yeah. It kind of
Dr. Dave Chatterjee:probably sounds a little too simple and trivial. But the way
Dr. Dave Chatterjee:I look at it is, you know, let's, let's take a personal
Dr. Dave Chatterjee:example. Our house could get destroyed in a fire. Yeah. So if
Dr. Dave Chatterjee:you think about the possibility, and then ask the question, what
Dr. Dave Chatterjee:all would I like, you know, to be protected, I don't want to
Dr. Dave Chatterjee:lose that stuff to fire. So kind of taking an inventory of your
Dr. Dave Chatterjee:priority items. Yeah. And then making sure that you've done
Dr. Dave Chatterjee:everything possible, whereby even in the event of fire,
Dr. Dave Chatterjee:you're not going to lose them. Yeah. Now, I realize that
Dr. Dave Chatterjee:there's a scale aspect to it, large organizations, tons of
Dr. Dave Chatterjee:data, located in all kinds of places, but even then, I think
Dr. Dave Chatterjee:some of these simple rules and guidelines can work very well,
Dr. Dave Chatterjee:if there is a concerted effort to prioritize, to identify
Dr. Dave Chatterjee:what's important, and then closely monitor how they are
Dr. Dave Chatterjee:being backed up, you know, testing the recovery
Dr. Dave Chatterjee:capabilities. So even in the event of an attack, they are
Dr. Dave Chatterjee:minimizing the damage. That warrants a question for you:
Dr. Dave Chatterjee:have you come across an instance where a company was a victim of
Dr. Dave Chatterjee:a ransomware attack, and they're like, doesn't matter, thank you
Dr. Dave Chatterjee:very much. We are we are all backed up, you're good to go?
Dr. Dave Chatterjee:Oh, yeah, has that happened.
Art Ehuan:It has happened. I have seen companies that have
Art Ehuan:have been in that situation where they're going to recover
Art Ehuan:on their own, they've got good backups, and they don't need to
Art Ehuan:be, you know, need to communicate with the with the
Art Ehuan:attacker. But as I mentioned, now, we're starting to see that
Art Ehuan:double extortion, right, where, where they're taking your data,
Art Ehuan:so that even if you can restore on your own, you now have to get
Art Ehuan:in communication with them to get an assurance from them. And
Art Ehuan:that's all it is, right? It's an assurance from them that if you
Art Ehuan:pay them, they will not release your data. Now, you, you may
Art Ehuan:ask, well, they still have your data, can you believe them? If
Art Ehuan:they say they're not gonna release your data, if you pay
Art Ehuan:them, you know, for the threat actors, their business model is
Art Ehuan:that such that, you know, they make an assurance to you because
Art Ehuan:you've paid that they are not going to release your data,
Art Ehuan:they're probably not going to release your data, right? You
Art Ehuan:can't say 100%. But, you know, their community is so small that
Art Ehuan:if a threat actor group does not follow through on on their
Art Ehuan:assurance, you know, the word gets out. And then other other
Art Ehuan:cybersecurity companies say, Oh, this group does, you know, even
Art Ehuan:if you pay them, they don't, you know, they still post your data,
Art Ehuan:that that destroys your business model. Right. So, yeah, the way
Art Ehuan:these folks think is that, you know, if you pay, they're there,
Art Ehuan:they're gonna follow through with with, with what they've
Art Ehuan:promised to you. And I'll tell you, I recall having a
Art Ehuan:conversation with a CIO, one time that he said, you know,
Art Ehuan:the, the the support that the threat actors were providing and
Art Ehuan:helping restore, he said, it was better than his own his own
Art Ehuan:organizations, IT support group, he said, you know, we'd asked
Art Ehuan:him something, you know, we were having trouble rest,
Art Ehuan:restoration, and they'd get right back to us. And, you know,
Art Ehuan:walking us through, he said, I mean, so it is a model design,
Art Ehuan:at least for the threat actors that if you pay, you know,
Art Ehuan:they're, they're gonna follow through with what they what they
Art Ehuan:promised as part of that payment.
Dr. Dave Chatterjee:But I've also heard that if you pay, you
Dr. Dave Chatterjee:are in that list, and they know that if you are attacked again,
Dr. Dave Chatterjee:you will pay again, is that true?
Art Ehuan:I did have an organization that, that in the
Art Ehuan:space, I want to say months, was attacked by three different
Art Ehuan:ransomware groups. They paid the first time and then literally, a
Art Ehuan:different group comes in the second time. They pay the second
Art Ehuan:time and then a third group came in the third time before they
Art Ehuan:were able to then get their environment so that they
Art Ehuan:couldn't be attacked again. So it happens. It does. It
Art Ehuan:certainly happens.
Dr. Dave Chatterjee:Very, very interesting. Concerning but
Dr. Dave Chatterjee:interesting. You mentioned cryptocurrency, you mentioned
Dr. Dave Chatterjee:cyber insurance. I have a couple of questions in that area. But
Dr. Dave Chatterjee:before I go there, we are aware of the Colonial attack, and how
Dr. Dave Chatterjee:the FBI was able to recover some of the ransom money. Given your
Dr. Dave Chatterjee:experience with the FBI, why is it so hard to get hold of these
Dr. Dave Chatterjee:criminals, and, you know, put them away?
Art Ehuan:Yeah, well, unfortunately, a lot of these
Art Ehuan:groups are, are out of the reach of American law enforcement, or
Art Ehuan:or, say Western European law enforcement, a lot of these
Art Ehuan:groups are in, in countries where we don't have the best
Art Ehuan:relations with. And, you know, if we indict someone, say the
Art Ehuan:Bureau, Department of Justice indicted a threat actor, if you
Art Ehuan:can't get you know them into your your control, in your
Art Ehuan:custody, then, you know, makes it difficult to, to be able to
Art Ehuan:to, you know, put these individuals in jail and kind of
Art Ehuan:show a deterrence. Right now, the deterrence factor,
Art Ehuan:unfortunately, is very low. Because, you know, it's it's
Art Ehuan:very difficult to have these individuals arrested.
Dr. Dave Chatterjee:That's tough. Yeah. So what is your
Dr. Dave Chatterjee:opinion about this thought that if crypto could be regulated,
Dr. Dave Chatterjee:that might help mitigate some of these types of attacks? Do you
Dr. Dave Chatterjee:have any thoughts on that?
Art Ehuan:Well, in in with crypto being regulated, I mean,
Art Ehuan:to some extent, it is regulated in the United States, right. So
Art Ehuan:so there are rules, you know, regulatory standards that have
Art Ehuan:to be followed in the United States, but how do you pass that
Art Ehuan:on to other countries, so that they have a better understanding
Art Ehuan:of who, who's signing up for these accounts, right. Because
Art Ehuan:if you can, you can, you know, the US we have, you know, the
Art Ehuan:the know, your customer laws, right, where you have to know,
Art Ehuan:you have to know who it is who's opening an account, you know,
Art Ehuan:those, those laws don't necessarily transfer over to
Art Ehuan:other countries where you, you may be able to sign up over the
Art Ehuan:internet, and you can, you know, be whoever you want to be. And
Art Ehuan:it just makes it so much more difficult to, to to identify
Art Ehuan:these individuals as to who they are. So I think more regulation,
Art Ehuan:probably will, will help. But it's got to be international,
Art Ehuan:just can't be the US saying, Hey, we're going to do these
Art Ehuan:things. Because, I mean, at the end of the day, cybercrime is a
Art Ehuan:it's a transnational crime, right? It is, you know, and I
Art Ehuan:look at it, you know, from from my time when I was in the FBI,
Art Ehuan:so, when I was in the FBI, we used to investigate bank
Art Ehuan:properties, right, I would go to a bank robbery where someone
Art Ehuan:would come in, and they'd hold up the bank with a gun, but
Art Ehuan:they're leaving all kinds of evidence, right, you know,
Art Ehuan:there's video cameras, there's, you know, DNA, potentially,
Art Ehuan:you're leaving, you know, you're leaving a lot of physical
Art Ehuan:evidence, you know, there may be a mark police units driving by
Art Ehuan:their silent alarms. So, you know, there's a lot of risk with
Art Ehuan:with a physical bank robbery. To this day, I think the FBI
Art Ehuan:closure rate on bank robberies, I want to say probably in the,
Art Ehuan:the 8080 plus percent, right. So if you brought a bank, you're
Art Ehuan:probably going to get caught arrested and thrown in jail for
Art Ehuan:a long time. With with cyber, you don't have to be on the US,
Art Ehuan:you don't have to be in the UK, in France, you don't have to be
Art Ehuan:anywhere near the country, that you're attacking and conducting
Art Ehuan:a ransomware, you can be virtually anywhere in the world
Art Ehuan:conduct that activity. And, again, if the rules are not
Art Ehuan:consistent across the globe, this is where we run into
Art Ehuan:problems. So if other countries don't recognize that these type
Art Ehuan:of criminals, you know, right now they're, say attacking the
Art Ehuan:United States, or they're attacking the UK, you know, they
Art Ehuan:could potentially turn on your country and attack you as well.
Art Ehuan:So I really think we're at the point where where a regime needs
Art Ehuan:to be put in place, you know, international standards on, on
Art Ehuan:cooperation on these types of cyber criminals is, I think,
Art Ehuan:absolutely critical.
Dr. Dave Chatterjee:Absolutely. I totally agree with you that
Dr. Dave Chatterjee:there needs to be a lot more cooperation globally. If we want
Dr. Dave Chatterjee:to have any success. Yes. Dealing with these cyber
Dr. Dave Chatterjee:criminals, like the examples you gave and if they are operating
Dr. Dave Chatterjee:from countries where there is very little regulation, they are
Dr. Dave Chatterjee:not being tracked or they are not being brought to justice.
Dr. Dave Chatterjee:Yeah, there's there's no reason why they won't continue to
Dr. Dave Chatterjee:engage in correct kinds of these kinds of activities. So true, so
Dr. Dave Chatterjee:true. In fact, I also want to take this opportunity to share
Dr. Dave Chatterjee:with the listeners one of the realities of securing an
Dr. Dave Chatterjee:organization. Art spoke to that, even in my book based on my
Dr. Dave Chatterjee:research and my work with companies, you know, I found 17
Dr. Dave Chatterjee:success factors. And they're associated with three,
Dr. Dave Chatterjee:high-performance information security cultural traits. And I
Dr. Dave Chatterjee:call these traits -- commitment, preparedness and discipline. And
Dr. Dave Chatterjee:each of these traits are associated with factors such as
Dr. Dave Chatterjee:for commitment, there's Hands-on Top Management, Joint Ownership
Dr. Dave Chatterjee:& Accountability, Cross-Functional Participation,
Dr. Dave Chatterjee:and I can go on, I don't want to provide you with the long list.
Dr. Dave Chatterjee:But the point I'm trying to make here is, it is no easy task to
Dr. Dave Chatterjee:manage these 17 factors. So it's, it's easy to blame and
Dr. Dave Chatterjee:maybe get rid of the CISO, and you make a point. And it's a
Dr. Dave Chatterjee:symbolic reaction. But there are just too many vulnerabilities.
Dr. Dave Chatterjee:And you have to really cover a lot of ground. And that's all
Dr. Dave Chatterjee:the more reason why I have been preaching about making
Dr. Dave Chatterjee:cybersecurity a distinctive competency, the extent to which
Dr. Dave Chatterjee:top management gives it priority, the chances of
Dr. Dave Chatterjee:effectively addressing these success factors are a lot higher
Dr. Dave Chatterjee:than if you just give up and say, oh, you know, what, we'll
Dr. Dave Chatterjee:deal with with it when it happens. There's too many
Dr. Dave Chatterjee:vulnerabilities, we don't know where to start. And I've heard
Dr. Dave Chatterjee:that from many organizations, your thoughts Art?
Art Ehuan:No, no, you're absolutely right. I mean, so
Art Ehuan:this, this is more than just a CISO problem. It's, it's a, it's
Art Ehuan:a corporate problem, right? Because you need the executives,
Art Ehuan:you need, you need the Board, you need the Executives, you
Art Ehuan:need the Management, and you need the employees to all be in
Art Ehuan:unison, in in how do we protect our company? And how do we
Art Ehuan:protect our company's information? Whether that be,
Art Ehuan:you know, employee information, customer information, r&d, you
Art Ehuan:know, it's absolutely crucial that it there's a, there's a, a
Art Ehuan:unified approach, you know, that is that is, you know, with
Art Ehuan:oversight from, from the Board with, with concurrence, you
Art Ehuan:know, from from senior management, with, with middle
Art Ehuan:management, implementing, and employees obviously, following
Art Ehuan:that, that, that plan that that's been developed, but to
Art Ehuan:say, Okay, we just leave it up to the CISO, and, you know, they
Art Ehuan:need to, they need to fix it. They're just setting up that
Art Ehuan:poor CISO for failure, it's, it's moved beyond CISO, so it to
Art Ehuan:move beyond the CIO, it's, it really is a corporate issue that
Art Ehuan:needs to be addressed at the highest levels of the
Art Ehuan:organization.
Dr. Dave Chatterjee:I think you're talking about the board
Dr. Dave Chatterjee:of directors, yeah. You know, providing oversight, requiring
Dr. Dave Chatterjee:senior leadership, to provide them with regular updates. And
Dr. Dave Chatterjee:there might come a time, hopefully, sooner than later,
Dr. Dave Chatterjee:where the CISO reports directly to the Board. To that extent,
Dr. Dave Chatterjee:the CISO function can operate as independently as possible. Your
Dr. Dave Chatterjee:thoughts? Yeah,
Art Ehuan:I Yeah. So I'm going to tell you, I'm going to always
Art Ehuan:be of the opinion, the the closer you can get the CISO, to
Art Ehuan:the CEO or to to the Board, the better that organization is
Art Ehuan:going to be because nothing is being you know, you're trying to
Art Ehuan:minimize filtering, right? Because I've seen CISO
Art Ehuan:organizations buried under under IT or Operations. And, you know,
Art Ehuan:when that happens, and you know, you've got, you know, you've
Art Ehuan:got, you know, the personalities involved. You've got operations
Art Ehuan:or the CIO, that, you know, I got to have, you know, I've got
Art Ehuan:to have the, the infrastructure, always running anything that's
Art Ehuan:going to slow it down, potentially, by by subsidiary
Art Ehuan:organization, you know, you know, not a good thing for me,
Art Ehuan:if I've got a budget, and I'll have to provide it to the CISO,
Art Ehuan:so that's a budget away from operations. So I'm a huge fan of
Art Ehuan:anything that will get that CISO as close to the CEO or the Board
Art Ehuan:as possible, so that they can have that that that influence in
Art Ehuan:effect on these very key either executives, or or, or, or board
Art Ehuan:members, right, so that they understand the risk directly.
Art Ehuan:It's not being filtered in any way when it's been reported.
Dr. Dave Chatterjee:Full true, so very true. And I think that
Dr. Dave Chatterjee:an organization that truly cares about security, it should be a
Dr. Dave Chatterjee:no brainer for the leadership to do exactly what you are saying
Dr. Dave Chatterjee:that let the CISO operate as independently as possible. When
Dr. Dave Chatterjee:I say CISO, I mean the team, and let them directly report whether
Dr. Dave Chatterjee:it's the audit committee or the board of directors. So there is
Dr. Dave Chatterjee:some independence to the reporting. And I think that that
Dr. Dave Chatterjee:would be a reflection of true commitment on the part of the
Dr. Dave Chatterjee:organization towards cyber diligence, cybersecurity
Dr. Dave Chatterjee:management. So I wonder why that's not the norm. But, you
Dr. Dave Chatterjee:know, it's, it's at least, I'm glad we're having this
Dr. Dave Chatterjee:discussion. Hopefully, folks are listening. Hopefully, some
Dr. Dave Chatterjee:actions will be will be taken. Yeah.
Art Ehuan:I don't know if you've seen. There's there's a
Art Ehuan:bill. I don't know if it's getting much traction. I believe
Art Ehuan:in the Senate, that will require publicly traded organizations to
Art Ehuan:have a board member who is knowledgeable on cyber. Again, I
Art Ehuan:don't know, I don't think it's getting much traction, right.
Art Ehuan:But I, for me, you know, from what I've seen in the past 25
Art Ehuan:years of working cyber related crime and working with
Art Ehuan:organizations and helping them protect themselves. I think that
Art Ehuan:that has some good viability, right. If you have someone that
Art Ehuan:understands cyber at the Board level, you know, they can help
Art Ehuan:in they can help the board and understanding the risk. Because
Art Ehuan:at the end of the day, right, it's it's about risk and risk,
Art Ehuan:acceptance. And, and, and understanding how that
Art Ehuan:potentially would impact an organization.
Dr. Dave Chatterjee:Absolutely means, of course, it is
Dr. Dave Chatterjee:desirable, that you have somebody who understands cyber,
Dr. Dave Chatterjee:you're at a certain level of depth. But I'd also argue that
Dr. Dave Chatterjee:even if you didn't understand cyber, we all know what's going
Dr. Dave Chatterjee:on. And I was talking to the CEO of a major corporation. And I
Dr. Dave Chatterjee:asked him, I said, I keep getting these research reports
Dr. Dave Chatterjee:that the senior leadership are not very willing to stay up to
Dr. Dave Chatterjee:date, and undergo cybersecurity training. And he says, I don't
Dr. Dave Chatterjee:know about other organizations, but in my organization, we
Dr. Dave Chatterjee:totally believe in continuous training, we are engaged. So I
Dr. Dave Chatterjee:asked him, I said, So what convincing is required for all
Dr. Dave Chatterjee:other organizations to do what you all do. And his reaction
Dr. Dave Chatterjee:was, I don't know why there needs to be any convincing, you
Dr. Dave Chatterjee:just have to read Wall Street Journal to see the consequences
Dr. Dave Chatterjee:of these attacks. So if that if that data is not compelling
Dr. Dave Chatterjee:enough for people to sit up and say, You know what, even if I
Dr. Dave Chatterjee:don't understand cyber, I'm going to make every effort to
Dr. Dave Chatterjee:understand as much as I can, or at least engage people and have
Dr. Dave Chatterjee:regular conversations, so I'm securing my organization. You
Dr. Dave Chatterjee:know, it's like sending your kids to school. I obviously
Dr. Dave Chatterjee:don't understand all the subjects the way the teachers do
Dr. Dave Chatterjee:who teach them. But I want my kid to do well. So I would take
Dr. Dave Chatterjee:every step as a parent, to provide oversight to provide
Dr. Dave Chatterjee:guidance to hire tutors, whatever it takes to help the
Dr. Dave Chatterjee:kid be successful. And I think if that kind of mindset
Dr. Dave Chatterjee:prevails, we will we would do a lot better.
Art Ehuan:Yeah, yeah. Yeah. I agree with you.
Dr. Dave Chatterjee:But I'd like you to wrap it up for us
Dr. Dave Chatterjee:with some final words. I so appreciate you coming this
Dr. Dave Chatterjee:afternoon to talk to us. So,
Art Ehuan:of course, ya know, so, so final word is, I mean, I
Art Ehuan:get it. It is cybersecurity is hard. If someone says it's easy,
Art Ehuan:I again, I would raise an eyebrow and ask, you know, how
Art Ehuan:can you think that, it is difficult. The environments are
Art Ehuan:complex, the threat actors are getting more and more aggressive
Art Ehuan:and sophisticated. But there are things we can do, right? We just
Art Ehuan:can't throw up our hands and say, you know, i i there's no
Art Ehuan:way I can defend against this. There are things we can do to
Art Ehuan:better protect organizations. There are there's messaging that
Art Ehuan:we can do with the C level and the Board to get them more
Art Ehuan:involved in understanding what the what the threat is. The
Art Ehuan:threat is to the organization. So I certainly will would never
Art Ehuan:say there's just nothing we can do. There are things we can do.
Art Ehuan:And I it's always going to be very important, in my opinion to
Art Ehuan:have a plan right, have a plan. Put that plan in place and
Art Ehuan:follow your plan.
Dr. Dave Chatterjee:Thank you again. Thanks for coming. It's
Dr. Dave Chatterjee:been a pleasure.
Art Ehuan:Thank you Dave, appreciated.
Dr. Dave Chatterjee:A special thanks to Art Ehuan, for his
Dr. Dave Chatterjee:time and insights. If you liked what you heard, please leave the
Dr. Dave Chatterjee:podcast a rating and share it with your network. Also
Dr. Dave Chatterjee:subscribe to the show, so you don't miss any new episodes.
Dr. Dave Chatterjee:Thank you for listening, and I'll see you in the next
Dr. Dave Chatterjee:episode.
Introducer:The information contained in this podcast is for
Introducer:general guidance only. The discussants assume no
Introducer:responsibility or liability for any errors or omissions in the
Introducer:content of this podcast. The information contained in this
Introducer:podcast is provided on an as-is basis with no guarantee of
Introducer:completeness, accuracy, usefulness, or timeliness. The
Introducer:opinions and recommendations expressed in this podcast are
Introducer:those of the discussants and not of any organization