Episode 30

The State of Attack Surface Management

With increasing digitization and the use of cloud-hosted assets, managing attack surfaces continues to be a major challenge. A recent survey report on the state of attack surface management (ASM) finds security teams drowning in a flood of legacy and ineffective tools with limited discovery capabilities. The need for ASM platforms with advanced digital asset detection capabilities is revealed in the survey findings. David Monnier, Team Cymru Fellow, sheds light on the latest ASM platform capabilities and discusses the implementation challenges and success factors.

Time Stamps

00:50 -- I'd like to take this opportunity to welcome David and have him share with all of us some highlights of his professional journey.

03:14 -- What was the motivation? What led to this very important study that y'all conducted?

07:41 -- David, would you like to add anything to that from a methodology and participant demographic standpoint?

09:52 -- The first finding that I'd like to talk about is "the biggest reason organizations implemented ASM is to increase the visibility of Shadow IT in the enterprise." I think this is a very significant finding. If you would expand on this and also describe what Shadow IT means?

14:50 -- Over the years have ASM platform capabilities been enhanced to better monitor cloud-hosted assets? What's been the trend?

19:17 -- Moving along to another interesting finding, which states that "23% of the respondents said that identification of rogue or unclassified assets is the most valuable capability that ASM has provided their organization." I guess my question here is, shouldn't this be obvious? Shouldn't that be what an ASM is supposed to be doing?

20:56 -- What steps should an organization take, should the security analysts, the security professionals take, to ensure that their ASM platform is performing at a satisfactory level?

24:30 -- To what extent is AI being used to enhance the functionality, the capabilities, of these ASM platforms?

27:48 -- So talking about the human component, and in this discussion, we have been talking about attack surfaces, more from a physical standpoint, devices, and so on, so forth. How about humans as attack surfaces, as very vulnerable attack surfaces? Are we doing better in terms of securing this very vulnerable attack surface? Can tools help us secure that attack surface? What are your thoughts?

31:23 -- Is there anything that you'd like to address that you found interesting, or something that surprised you all?

34:22 -- Is there a way of notifying multiple personnel just to make sure that the alerts don't go unheard?

36:43 -- So if you had to make recommendations to potential buyers, or investors of this ASM platform, what does it take to prepare the organization, so they can effectively use such a platform?

40:33 -- I'd like you to share some final thoughts.


Memorable David Monnier Quotes

"You have to approach the tool sets as, am I going to have a tool that's going to show me things I didn't know to know. And that, in my opinion, is the killer feature, way more important, in my opinion, is discovery, than the vulnerability management component."

"If your tool can't tell you that your DNS hosting provider has a poor reputation, or that the IPs around your IP services are bad, if it's not able to show you these kinds of things, then it suggests that you are probably working with an antiquated tool. But frankly, let's use the word static. And if it is static, I think in the information age, that should be a huge red flag to you."

"The number one compromised source is still stolen credentials. And the number one method for that is still some type of phishing, or some type of social engineering, so nothing seems to really be changing there."

"We still work and live in a world where everything is kind of magic. And the majority of people who are relying on technology, still have absolutely no idea how it works, and therefore can't really spot things when they aren't correct, right."

Frankly, there's only so much time in the day. And if you have to pick between defending the mothership or defending a rowboat out in the dock, you know, you're going to defend the mothership, hopefully. So your tool, if it's not aware of that, that's going to be a problem."

"There are entities and organizations that carry adequate insurance to pay the fines for non-compliance because they wholly expect to be out of compliance because they consider the compliance component, a burden."

"So my number one advice to anybody considering to go down the path of implementation of ASM is, one, be willing to do something that you find, but number two, be willing to actually use it because it's going to make your job easier, it's going to make your life easier."


Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast

Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks.

Connect with Dr. Chatterjee on these platforms:

LinkedIn: https://www.linkedin.com/in/dchatte/

Website: https://dchatte.com/

Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338

Transcript
Introducer:

Welcome to the Cybersecurity Readiness Podcast

Introducer:

Series with Dr. Dave Chatterjee. Dr. Chatterjee is the author of

Introducer:

the book Cybersecurity Readiness: A Holistic and

Introducer:

High-Performance Approach, a SAGE publication. He has been

Introducer:

studying cybersecurity for over a decade, authored and edited

Introducer:

scholarly papers, delivered talks, conducted webinars and

Introducer:

workshops, consulted with companies and served on a

Introducer:

cybersecurity SWAT team with Chief Information Security

Introducer:

officers. Dr. Chatterjee is Associate Professor of

Introducer:

Management Information System at the Terry College of Business,

Introducer:

the University of Georgia. As a Duke University Visiting

Introducer:

Scholar, Dr. Chatterjee has taught in the Master of

Introducer:

Engineering in Cybersecurity program at the Pratt School of

Introducer:

Engineering.

Dr. Dave Chatterjee:

Hello, everyone, I'm delighted to

Dr. Dave Chatterjee:

welcome you to this episode of the Cybersecurity Readiness

Dr. Dave Chatterjee:

Podcast series. Our discussion today will revolve around the

Dr. Dave Chatterjee:

state of attack surface management. David Monnier, Team

Dr. Dave Chatterjee:

Cymru Fellow will share his thoughts and perspectives on

Dr. Dave Chatterjee:

this very important subject. Another highlight of our

Dr. Dave Chatterjee:

discussion today will be the findings from a very interesting

Dr. Dave Chatterjee:

research study that focused on the state of attack surface

Dr. Dave Chatterjee:

management. But before we get into all those details, I'd like

Dr. Dave Chatterjee:

to take this opportunity to welcome David and have him share

Dr. Dave Chatterjee:

with all of us some highlights of his professional journey.

Dr. Dave Chatterjee:

David, thanks for being on the podcast.

David Monnier:

Thank you, David, thank you very much for inviting

David Monnier:

us on to talk about our study. So it's always a pleasure to

David Monnier:

come on. Some background about myself. So I'm, I'm from the

David Monnier:

United States. In the Midwest, I had started my career.

David Monnier:

Originally I was in the US Marine Corps worked as a

David Monnier:

noncommissioned officer there. But when I got out of the Marine

David Monnier:

Corps, I got into working with technology, just out of

David Monnier:

coincidence of funnily enough, a computer breaking that I ended

David Monnier:

up fixing, and discovering I had some natural talents, I ended up

David Monnier:

going to work for Indiana University, working in high

David Monnier:

performance computing. And from there moving on to their

David Monnier:

security office working as a security engineer for them,

David Monnier:

basically looking after all the campuses around the state. And

David Monnier:

then shortly after that, I was invited to help come start the

David Monnier:

research and education, networking, ISAC, which is an

David Monnier:

executive ordered set of organizations largely geared

David Monnier:

around kind of specific industrial sectors. In my case,

David Monnier:

it was research and education, networking, there are also like,

David Monnier:

financial sector there are itI sec, and so on. But ISAC is an

David Monnier:

Information Sharing and Analysis Center. So you could think of it

David Monnier:

as groups of people working together to share threat

David Monnier:

intelligence. And then after that, I was invited to join Team

David Monnier:

Cymru where I've been here for about 15 years. Presently,

David Monnier:

working as a Fellow, but periodically helping to spin up

David Monnier:

new teams for us and identify new product needs and things

David Monnier:

like that. But I've been practicing for, I think it's 27

David Monnier:

years now, something like that.

Dr. Dave Chatterjee:

Well, we're delighted to have you on the

Dr. Dave Chatterjee:

show. And thanks again for your service. So David, before we

Dr. Dave Chatterjee:

launch into talking about the various findings, and I find

Dr. Dave Chatterjee:

them very interesting. To set the motivation, the context for

Dr. Dave Chatterjee:

the research study, it's a fact that the attack surfaces are

Dr. Dave Chatterjee:

evolving, the more digitized we get, the more we go to the

Dr. Dave Chatterjee:

cloud. And the hackers are not sitting idle. They're constantly

Dr. Dave Chatterjee:

getting more innovative with their techniques, tools,

Dr. Dave Chatterjee:

approaches. So it's a moving target for organizations to stay

Dr. Dave Chatterjee:

on top of things, I find it almost hard to believe that

Dr. Dave Chatterjee:

organizations can be ahead, but if they can, more power to them.

Dr. Dave Chatterjee:

So what was the motivation? What led to this very important study

Dr. Dave Chatterjee:

that y'all conducted?

David Monnier:

Well, very much like you said, so we've been

David Monnier:

working, Team Cymru, we've been threat intelligence supplier to

David Monnier:

the industry since our inception. It's how we began our

David Monnier:

business, we used to kind of boast that we were the best

David Monnier:

security company no one had ever heard of, because our research

David Monnier:

and efforts went into other people's products. So if you're

David Monnier:

familiar with a company BASF we don't make antivirus. We make

David Monnier:

antivirus better, we don't make firewalls, we make firewalls

David Monnier:

better. You know, this type of slogan, if you remember their

David Monnier:

advertising back in the day. And that was really the core of our

David Monnier:

business and we observe miscreant activities every day.

David Monnier:

It's a byproduct of our analysis efforts. It's a byproduct of our

David Monnier:

interest in understanding how the internet is used by society.

David Monnier:

We happen to feel that the internet is probably one of the

David Monnier:

greatest creations mankind has ever developed and we were

David Monnier:

looking at kind of how the security world was moving

David Monnier:

towards this notion of attack surface management, where they

David Monnier:

were kind of blending a few types of technologies together,

David Monnier:

which you could think of as your vulnerability scanning, your

David Monnier:

asset discovery. And those things were coming together. And

David Monnier:

we felt there was an obvious and useful connection for us to be

David Monnier:

able to add threat intelligence to it. And threat intelligence,

David Monnier:

you know, when you think of it in terms of, of defense, a lot

David Monnier:

of people often just think it's, you know, lists of bad IPs or

David Monnier:

things like that. But in reality, it also is, if you turn

David Monnier:

it around, it's also lists of IPs of yours, that might be bad.

David Monnier:

So when you think of like reputational data, and things

David Monnier:

like that, so what became obvious to us is, you know, if

David Monnier:

you're doing attack surface management, wouldn't it be great

David Monnier:

to know what attacks you may have already been subjected to?

David Monnier:

And, and to that end, what devices that you already own,

David Monnier:

that may already be compromised? So kind of taking, you know,

David Monnier:

that idea of knowing how bad things already are to decide,

David Monnier:

you know, is this a system that I should patch? Or is this a

David Monnier:

system that I need to completely rebuild, because it's already

David Monnier:

been compromised. And we saw that obvious need from an

David Monnier:

intelligence perspective. But then as we started to look at

David Monnier:

ways that we could apply it to kind of the existing

David Monnier:

marketplace, we realized that kind of none of the other

David Monnier:

products that were out there, were approaching ASM the same

David Monnier:

way we were, they were very much looking at things, most people's

David Monnier:

tools seemed very much geared towards, here's your IP, here's

David Monnier:

a problem it has, here's something you should do about

David Monnier:

it. But without really giving the people the ability to

David Monnier:

highlight which IP or what device let's let's use the term

David Monnier:

device, actually, because the devices just happen to use an IP

David Monnier:

address. But But what devices on the network are most critical to

David Monnier:

your operation, you know that these tools in the marketplace,

David Monnier:

they didn't really have a way to highlight which ones were most

David Monnier:

important. And the devices themselves couldn't really tell

David Monnier:

you, which was important. So we also sat down and said, Okay, if

David Monnier:

you were going to look at ASM, what's the key value piece

David Monnier:

there, and what we concluded was that risk understanding the risk

David Monnier:

to your business needed to be a piece that was part of it. So

David Monnier:

what we've approached ASM as, is the traditional sense. But what

David Monnier:

what we have attempted to bring to the market as a new offering,

David Monnier:

is the application of intelligence on top of that,

David Monnier:

with kind of user definable values for the assets as they're

David Monnier:

discovered.

Dr. Dave Chatterjee:

Okay, thanks for sharing. So just to

Dr. Dave Chatterjee:

let listeners know, that, as far as the methodology and and

Dr. Dave Chatterjee:

participant demographics go, the study was commissioned on March

Dr. Dave Chatterjee:

14 2022. 440 security practitioners were surveyed in

Dr. Dave Chatterjee:

the US and Europe, the survey was conducted online via

Dr. Dave Chatterjee:

Pollfish using organic sampling. All respondents work on their

Dr. Dave Chatterjee:

company's security team. And all these organizations are using an

Dr. Dave Chatterjee:

attacks surface management platform. Their industry

Dr. Dave Chatterjee:

representation is also pretty broad, ranging from finance to

Dr. Dave Chatterjee:

IT to military and defense, among others. The team size

Dr. Dave Chatterjee:

varied relatively little from less than 10 to over 30. So

Dr. Dave Chatterjee:

David, would you like to add anything to that from a

Dr. Dave Chatterjee:

methodology and participant demographic standpoint?

David Monnier:

Well, we had originally considered making it

David Monnier:

split into, you know, additional slices. So to differentiate, for

David Monnier:

example, between practitioner and executive, not that

David Monnier:

executive practitioning isn't practitioning of a sort, but we

David Monnier:

thought it might be useful to split those out. But in the end,

David Monnier:

what we found actually was that kind of the bulk of the world

David Monnier:

really isn't divided up that way, it's only kind of the

David Monnier:

biggest companies that have those kinds of separations. So

David Monnier:

when you think of the folks that took the time to fill out the

David Monnier:

review for us, many of which are most of which I should say,

David Monnier:

really knew what they were talking about. So to kind of

David Monnier:

give you that, you know, value of of what their answers mean,

David Monnier:

these are the people who roll up their sleeves every day, and

David Monnier:

actually have to reach into the problem and do something about

David Monnier:

what they find, you know, not just run the tools, but

David Monnier:

oftentimes, these were the folks in particular, those smaller

David Monnier:

teams, those less than 10 people teams, they were often the same

David Monnier:

person who, who helped manage, you know, the patching program

David Monnier:

or, or who helped manage their inventory systems and things

David Monnier:

like that. So value wise, these people's opinions are not

David Monnier:

speculative that they are the practitioners who were largely

David Monnier:

responsible for making things happen based on the findings.

Dr. Dave Chatterjee:

Okay, good to know. Good to know. So let's

Dr. Dave Chatterjee:

discuss some of the finding. There are several interesting

Dr. Dave Chatterjee:

findings, not sure how much time we'll have to go over all of

Dr. Dave Chatterjee:

them. But we can definitely cover some. The first one that

Dr. Dave Chatterjee:

I'd like to talk about is the biggest reason organizations

Dr. Dave Chatterjee:

implemented ASM is to increase the visibility of Shadow IT in

Dr. Dave Chatterjee:

the enterprise, I think this is very significant, if you would

Dr. Dave Chatterjee:

expand on this and also describe what Shadow IT means to the

Dr. Dave Chatterjee:

listeners.

David Monnier:

Sure, absolutely. So, you know, Shadow IT is a

David Monnier:

side effect, more or less of what you could think of as

David Monnier:

necessary growth. So organizations oftentimes have

David Monnier:

disparate teams that are spread out in function, but you know,

David Monnier:

typically working towards the same goal, you know, keep the

David Monnier:

company open, keep the company in business and so on. But what

David Monnier:

ends up happening is, as needs change, in particular needs in

David Monnier:

the scope of being able to spin up new infrastructure very

David Monnier:

quickly, and things like that. A lot of companies don't, don't, I

David Monnier:

don't know what the right word is, I don't want to say don't

David Monnier:

like to, because obviously, they would, they would prefer to do

David Monnier:

it the right way. Um, but a lot of companies find that like

David Monnier:

policy around asset controls, hinder or stifle innovation. And

David Monnier:

then whether it's real or not, whether that's true or not, you

David Monnier:

know, we can't really speak to that I'm sure that some kind of

David Monnier:

psychology of the human work experience, but in actual

David Monnier:

practice, though, with with certainty, organizations are

David Monnier:

hesitant to, you know, have to talk to the IT team, let's and

David Monnier:

let me use a practical example. So you have a software

David Monnier:

development team who has the need to work with some temporary

David Monnier:

data, they don't want to work with data from some live

David Monnier:

production database. So they need to set up, you know, a

David Monnier:

secondary, you know, temporary database. And these folks, you

David Monnier:

know, oftentimes will spin up an instance in a cloud, or, you

David Monnier:

know, maybe some new VM even within their infrastructure, but

David Monnier:

they'll spin it up, they'll put data for use in that, and then

David Monnier:

they'll make use of the project, right? Well, if your main IT

David Monnier:

team is unaware that someone on the development team has done

David Monnier:

this, you now have an asset that is not under centralized control

David Monnier:

isn't, but the organization itself isn't aware of it. And

David Monnier:

it's full of, of data, you know, and presumably, if you're

David Monnier:

spending the time to develop software to interact with that

David Monnier:

data, that data must be important. And we read about

David Monnier:

this all the time you read about so for example, Amazon S3

David Monnier:

buckets, right? There are these virtual storage instances that

David Monnier:

people can spin up very quickly and put information and for

David Monnier:

various purposes, right. But it's think of it as file

David Monnier:

storage. And there are tools that you can, you know, you

David Monnier:

could pull up your favorite search engine and put in and

David Monnier:

look for, you know, Amazon S3, open bucket finder, or

David Monnier:

something. And you'll see almost every day that there are people

David Monnier:

who have left these instances open, so meaning no

David Monnier:

authentication, and anybody in the world could identify it,

David Monnier:

download the data and do something with that. So this is

David Monnier:

kind of the traditional understanding of Shadow IT

David Monnier:

right, it's these things that get stood up that people may not

David Monnier:

necessarily wholly know about. The organization itself may not

David Monnier:

be completely aware of. And the reason why it's such a big issue

David Monnier:

to folks is precisely the example I gave data ends up

David Monnier:

getting exposed this way. And not just, you know, random data,

David Monnier:

who we're talking often legally regulated data, you know,

David Monnier:

whether it be personally identifying information, whether

David Monnier:

it be health records, whether it be financial information, I

David Monnier:

mean, all kinds of stuff gets leaked out this way. So our

David Monnier:

intention for this with asking folks that was to see if our

David Monnier:

capability, how much effort we should really apply to doing

David Monnier:

this Shadow IT identification, because it's not easy, right?

David Monnier:

How do you how do you help somebody find something they

David Monnier:

didn't know they had? It's not an easy problem. So that was the

David Monnier:

reason for us to ask. We saw how many data exposure notifications

David Monnier:

go out. If you ever noticed, by the way, those are never

David Monnier:

discussed, described as breaches, which if you think

David Monnier:

about it, it's it's kind of interesting, the choice of words

David Monnier:

that people use around those, but those, quote unquote,

David Monnier:

exposures do add up to a great deal of loss, both in terms of

David Monnier:

productivity, but you know, every time PII personally

David Monnier:

identifying information is exposed, there's a lot of times

David Monnier:

where there's government regulatory components on there

David Monnier:

where you have to go notify people, or perhaps even a

David Monnier:

company has to now provide credit monitoring or identity

David Monnier:

monitoring, you know, based on what type of data was that was

David Monnier:

exposed. So those kinds of costs were very, very real. And so

David Monnier:

that we weren't surprised to hear that so many people

David Monnier:

considered Shadow IT to be such a big problem.

Dr. Dave Chatterjee:

Yeah, I mean, doesn't surprise me either

Dr. Dave Chatterjee:

because as as you discussed, Shadow IT gets formed, gets

Dr. Dave Chatterjee:

created because certain divisions, certain parts of the

Dr. Dave Chatterjee:

organization wants to get certain things done. And for

Dr. Dave Chatterjee:

whatever reason Central IT is not able to respond in time or

Dr. Dave Chatterjee:

as per their expectation so, and for other reasons as well. But

Dr. Dave Chatterjee:

that creates a problem in terms of data exposure, and you really

Dr. Dave Chatterjee:

cannot defend effectively if you don't know where all your

Dr. Dave Chatterjee:

vulnerabilities are, where or where your data is residing,

Dr. Dave Chatterjee:

where your applications are residing. So it's great to know

Dr. Dave Chatterjee:

that there is a high level of sensitivity towards towards this

Dr. Dave Chatterjee:

challenge. And one of the capabilities of ASM should be to

Dr. Dave Chatterjee:

increase the visibility of, of Shadow IT. So that's, that's a

Dr. Dave Chatterjee:

very significant finding. Moving along, another finding that got

Dr. Dave Chatterjee:

my attention, which is not surprising, but it it validates

Dr. Dave Chatterjee:

the fact that more and more applications and infrastructure

Dr. Dave Chatterjee:

are in the cloud, and which is what 75% of your respondents

Dr. Dave Chatterjee:

said, but what is interesting to me is the statement here in the

Dr. Dave Chatterjee:

report, which says "ASM, which stands for attack, surface

Dr. Dave Chatterjee:

management, is critical for all organizations, regardless of

Dr. Dave Chatterjee:

their cloud adoption, but should be an even higher priority for

Dr. Dave Chatterjee:

tracking and managing the attack surface for cloud hosted assets.

Dr. Dave Chatterjee:

So I guess my question for you, David, is, and you obviously

Dr. Dave Chatterjee:

have a better understanding of the evolution of the ASM

Dr. Dave Chatterjee:

platform, over the years have they have they enhanced their

Dr. Dave Chatterjee:

capabilities to better monitor cloud hosted assets? Is that

Dr. Dave Chatterjee:

what's been the trend?

David Monnier:

Well, you know, unfortunately, not really. A big

David Monnier:

component to this is kind of the discovery problem. And how most

David Monnier:

vendors choose to remedy this is either by IP space, so IP

David Monnier:

addresses, Internet Protocol address that people use to be on

David Monnier:

the internet, they are defined and issued out typically, as

David Monnier:

network address space, you'll get a range of IP addresses, or

David Monnier:

they will tend to classify their assets based on namespace, which

David Monnier:

typically is in internet terms would be something like DNS,

David Monnier:

where DNS, you put in your domain name, let's use an

David Monnier:

example, you know, foo.com. And as you add things in the form of

David Monnier:

subdomains, or host names to that, in theory, they start to

David Monnier:

become discoverable. Where the problem with cloud computing

David Monnier:

comes in is, you know, when you license your ASM product, you're

David Monnier:

not going to go out and license a product for and I'm not trying

David Monnier:

to pick on AWS here. But Amazon's AWS services, one of

David Monnier:

the world's largest and most popular cloud hosting services

David Monnier:

in the world, but you're not going to go license an ASM

David Monnier:

product to scan the entirety of their IP space, is just not

David Monnier:

realistic. So you have to know your IPs. And again, it goes

David Monnier:

back to this problem of you know, how will you know, which

David Monnier:

are yours. In our case, we also well, we work with IP addresses,

David Monnier:

obviously. But in our case, we because we are an intelligence

David Monnier:

provider, we see a great deal of information already, in

David Monnier:

particular IP, IP space, as well as namespace. But we also see

David Monnier:

things like certificates and keys and all this kind of

David Monnier:

additional metadata that the internet kind of operates on. So

David Monnier:

we saw it as kind of an an easy evolution to help do these

David Monnier:

discoveries that nobody else really had. Because the other

David Monnier:

products are requiring the user to know in advance all of their

David Monnier:

things. Shadow IT by definition means you don't know that you

David Monnier:

have some of this. So you know, it's an approach, frankly, that

David Monnier:

starts off already hindered. So what we how we change this as we

David Monnier:

look for, you know, other instances, and other examples

David Monnier:

that we've identified through our other threat, exploring and

David Monnier:

threat hunting efforts that appear to be related to other

David Monnier:

people's organizations, and we try to highlight those kinds of

David Monnier:

datasets to better inform the discovery model.

Dr. Dave Chatterjee:

Okay. Thanks for sharing. Moving along

Dr. Dave Chatterjee:

to another interesting finding, which states that 23% of the

Dr. Dave Chatterjee:

respondents said that identification of rogue or

Dr. Dave Chatterjee:

unclassified assets is the most valuable capability that ASM has

Dr. Dave Chatterjee:

provided their organization. I guess my question here is, you

Dr. Dave Chatterjee:

know, shouldn't this be obvious? Shouldn't that be what an ASM is

Dr. Dave Chatterjee:

supposed to be doing?

David Monnier:

Yes, it certainly is exactly what ASM should be

David Monnier:

doing. And and I think this highlights the shortcoming that

David Monnier:

I just described, right. So the reason why only 23% of them said

David Monnier:

that their application of of ASM in their workplace was that

David Monnier:

effective at discovering those things is because the rest of

David Monnier:

the respondents, you know, the remaining 77%, they are clearly

David Monnier:

limited, because the only thing that ASM knows about are the

David Monnier:

things they already know about. So if you already know about it,

David Monnier:

it's unlikely for something to be rogue or unclassified. Right?

David Monnier:

So this kind of static discovery approach, this is the fruit that

David Monnier:

comes off that tree, when you take a non dynamic approach to

David Monnier:

understanding assets in a very dynamic environment. That is

David Monnier:

what I would call modern, you know, computing, you're going to

David Monnier:

end up with low numbers like that, because the rest of them,

David Monnier:

their tools probably just don't identify rogue devices. And

David Monnier:

that's an unfortunate side effect. Again, this was one of

David Monnier:

the motivations that led us to to create a product for the

David Monnier:

space.

Dr. Dave Chatterjee:

Okay. Now, you know, some of the findings

Dr. Dave Chatterjee:

speak to the challenges of deploying and implementing ASM

Dr. Dave Chatterjee:

platforms. And these challenges range range from lack of

Dr. Dave Chatterjee:

integration with existing platforms, the amount of

Dr. Dave Chatterjee:

training that's required. And also I found it interesting,

Dr. Dave Chatterjee:

where organizations where the respondents said that they feel

Dr. Dave Chatterjee:

that the current platform has become more of a legacy. So my

Dr. Dave Chatterjee:

question to you is as follows When an organization is

Dr. Dave Chatterjee:

investing in an ASM platform, they know fully well that at

Dr. Dave Chatterjee:

some point, it will move towards becoming obsolete. I don't know

Dr. Dave Chatterjee:

if obsolete is the right word, but what steps should an

Dr. Dave Chatterjee:

organization take, should the security analysts, the security

Dr. Dave Chatterjee:

professionals take, to ensure that their ASM platform is

Dr. Dave Chatterjee:

performing at a satisfactory level?

David Monnier:

Well, I think the initial steps are are

David Monnier:

introvertish. Introvertal steps right? So you have to ask

David Monnier:

yourself, Do I know everything about my network? Do I know all

David Monnier:

of the devices I have? And if that answer isn't an absolute

David Monnier:

certain, yes. Which a hint to the listeners, It isn't. Then

David Monnier:

you have to approach the tool sets as am I going to have a

David Monnier:

tool that's going to show me things I didn't know to know.

David Monnier:

And that, in my opinion, is the killer feature, way more

David Monnier:

important, in my opinion, is discovery, then even say, the

David Monnier:

vulnerability management and discovery component, right?

David Monnier:

Like, if you don't know, to know, then you won't, won't get

David Monnier:

any benefit from it. But if you do discover something that's on

David Monnier:

your infrastructure that you didn't realize was there, or

David Monnier:

that is your system is reliant on, because there are a bunch of

David Monnier:

non system concerns as well. Like, for example, you know,

David Monnier:

every is every person's network, they get onto the Internet by

David Monnier:

way of a set of internet service providers. And what about the

David Monnier:

safety and reputation of those folks? You know, if your tool

David Monnier:

can't tell you that your DNS hosting provider has a poor

David Monnier:

reputation, or that your internet service provider, you

David Monnier:

know that the IPs around your IP services are bad. If it's not

David Monnier:

able to show you these kinds of things, then it suggests that

David Monnier:

you are probably working with something that is, frankly, like

David Monnier:

I said, antiquated of some sort. But frankly, let's use the word

David Monnier:

static. And if it is static, I think in the information age,

David Monnier:

that should be a huge red flag to you. That if this tool

David Monnier:

doesn't teach itself to some degree, and I'm the operator is

David Monnier:

responsible for informing this, that I probably have a tool that

David Monnier:

is not future proofed? Not that our any tool is completely

David Monnier:

future proofed, right. But there are certain methodologies that

David Monnier:

can help assure a future proofed capability. And this kind of

David Monnier:

dynamic discovery is absolutely one of those capabilities. But

David Monnier:

in the end, I think practitioner, or decision makers

David Monnier:

need to ask themselves, how much is this tool teaching me that I

David Monnier:

didn't already know. And I'm not talking about you know, that you

David Monnier:

have a vulnerability on some device you already knew you had.

David Monnier:

I mean, how much infrastructure is it really exposing to me that

David Monnier:

I didn't know before? And even inadvertently, you know, if,

David Monnier:

like I said, maybe someone plugged in some new device on

David Monnier:

your network. If it's not at least catching those types of

David Monnier:

things for you, then I would say you have an older tool,

Dr. Dave Chatterjee:

Right, makes sense. And I'm glad you

Dr. Dave Chatterjee:

mentioned about the self learning capability. So to what

Dr. Dave Chatterjee:

extent is AI being used to enhance the functionality, the

Dr. Dave Chatterjee:

capabilities, of these ASM platforms?

David Monnier:

So in our case, we're not really using AI. Not

David Monnier:

that we're against AI per se, but we didn't really see a great

David Monnier:

need for it per se, relative to machine learning and machine

David Monnier:

learning sense, you know, where there's a human who is, I guess

David Monnier:

suggesting, to the system, what it should be doing, as it's

David Monnier:

doing it, as opposed to AI where they become somewhat autonomous,

David Monnier:

you know. So, in our case, though, is a great deal of what

David Monnier:

I would call machine learning, where as assets are discovered,

David Monnier:

we look at kind of the nuance of that asset, both from a service

David Monnier:

level from an IP level, and then from like, what the operating

David Monnier:

system looks like, think of it as a very signal focused view,

David Monnier:

internet signal that is, and we use what's discovered to kind of

David Monnier:

inform the next level of discovery. So for example, if we

David Monnier:

discovered a new, you know, domain within your namespace,

David Monnier:

say, you know, again, using this foo.com example, but let's say,

David Monnier:

yesterday, you didn't have www.dev.foo.com. And today,

David Monnier:

we're seeing that name being looked up in passive DNS data,

David Monnier:

we know that you have some new asset out there somewhere, and

David Monnier:

can then start to go looking for it. And that type of informed

David Monnier:

learning is precisely how we approach this, but it's a

David Monnier:

continuous thing, you know, what happens 24 hours a day, we

David Monnier:

continuously learn about the surface of the internet as a

David Monnier:

whole, for that matter. But in particular, you know, of the

David Monnier:

asset tools for folks. And then those assets, as we kind of

David Monnier:

learned from them, we go to look for similarities. And we say,

David Monnier:

Okay, what's just like this, but maybe, you know, isn't

David Monnier:

previously known. And we show you, hey, here's these potential

David Monnier:

things that we think might be related to you. And we let the

David Monnier:

the individual decide like, Oh, this is related to me, or Oh,

David Monnier:

no, this isn't me, but sure looks a lot like me. Maybe this

David Monnier:

is a phishing site or something, you know, there are other

David Monnier:

approaches and other outcomes aside from your own attack

David Monnier:

surface, you know, that you can discover using the kind of

David Monnier:

machine learning metal method that we use. But I don't know

David Monnier:

that AI will ever totally get there for what it's worth.

David Monnier:

Because I, I still think that when it comes to ASM, the human

David Monnier:

component is required, like aI won't know the difference,

David Monnier:

unless you share with it all of your client configurations, AI

David Monnier:

won't know the difference, for example, between your primary

David Monnier:

active directories host and some dev Active Directory host. So,

David Monnier:

they will both appear to be running the same services. But

David Monnier:

you as the human know that one of them has your actual users,

David Monnier:

and maybe another one has dummy data. So you can prioritize and

David Monnier:

say, Ah, this IP, this host, this asset, is my actual Active

David Monnier:

Directory directory server, whereas this other one is not.

David Monnier:

So don't show this as a high risk show this other one as the

David Monnier:

high priority asset. And for that reason, I don't know that

David Monnier:

AI will ever really fill in in this role. But we'll see.

Dr. Dave Chatterjee:

Okay, good to know. So talking about the

Dr. Dave Chatterjee:

human component, and in this discussion, we have been talking

Dr. Dave Chatterjee:

about attack surfaces, more from a physical standpoint, devices,

Dr. Dave Chatterjee:

and so on, so forth. How about humans as attack surfaces as

Dr. Dave Chatterjee:

very vulnerable attack surface? What are your thoughts about,

Dr. Dave Chatterjee:

you know, you know, are we doing better in terms of securing that

Dr. Dave Chatterjee:

very vulnerable attack surface? Can tools help us secure that

Dr. Dave Chatterjee:

attack surface? What are your thoughts?

David Monnier:

Well, I hate to be a naysayer. But things aren't

David Monnier:

getting any better there, it seems. If you look at the SANS

David Monnier:

survey comes out every year, if you look at the US government's

David Monnier:

breach report, or Verizon, they they publish a report any of

David Monnier:

these reports, if you go look at them continuously, for the last,

David Monnier:

you know, I mean, since forever since these reports have been

David Monnier:

produced, the number one compromised source is still

David Monnier:

stolen credentials. And the number one method for that is

David Monnier:

still some type of phishing, or some type of social engineering

David Monnier:

still, so nothing seems to really be changing there. The

David Monnier:

tools and the tactic techniques being employed to gain access to

David Monnier:

this type of information, haven't really needed to change

David Monnier:

much, because the human element is still you know, largely the

David Monnier:

same. And I say this all the time, until listeners who may

David Monnier:

have heard me on any other podcast or may tune in who or

David Monnier:

who happened to listen to ours, probably have heard me say many

David Monnier:

times, but we still work and live in a world where everything

David Monnier:

is kind of magic. And the majority of people who are

David Monnier:

relying on technology, still have absolutely no idea how it

David Monnier:

works, and therefore can't really spot things when they

David Monnier:

aren't correct, right. And for the longest time, vendors tried

David Monnier:

to implement methodologies like if you recall, you know, It was

David Monnier:

always look for the lock icon in your browser window and make

David Monnier:

sure that that's always there. And so miscreants just started

David Monnier:

to put a block of the locked lock icon right on in the

David Monnier:

content of a phishing effort. And people would say, Well, I

David Monnier:

saw the lock, so I figured it was safe. And here we are. And

David Monnier:

I'm not talking about fools here. I'm talking about, you

David Monnier:

know, Board members and C-level operators and decision makers,

David Monnier:

you know, around the world, in the largest companies in the

David Monnier:

world, the most capable, most successful people in the world

David Monnier:

still fall victim to this stuff. So unfortunately, I just don't

David Monnier:

know that any of that can be changed, either, you know, where

David Monnier:

we move to these concepts like zero trust, or you look for the

David Monnier:

behaviors of of specific devices and try to key on that. But

David Monnier:

realistically, by the time you're keying in on a behavior,

David Monnier:

it may already be too late, right? So the stolen credential,

David Monnier:

the credential reuse, so you know, what, however you want to

David Monnier:

call them, there's variations of, of the methodology, the

David Monnier:

attack, but they all come down to an imposter, if you will.

David Monnier:

That still turns out to be, you know, if not, number one, top

David Monnier:

three, year after year, way, way back, I remember when it was a

David Monnier:

tax where like buffer overflows were the primary method, and

David Monnier:

people were, you know, looking for at the software stack, for

David Monnier:

what waves to gain entry. And then along the way, somebody

David Monnier:

figured out that we don't even need to talk to machines, talk

David Monnier:

to the people, and that people will just give you access to the

David Monnier:

machines. And that hasn't changed. And unfortunately, I

David Monnier:

don't know that it will change. We look to incorporate that type

David Monnier:

of intelligence, though, into our ASM to let folks know, you

David Monnier:

know, when they have account level risks that are there,

David Monnier:

we're looking to add that capability as well.

Dr. Dave Chatterjee:

Awesome. That's awesome. Yeah, I think

Dr. Dave Chatterjee:

that's a very difficult challenge when you're trying to

Dr. Dave Chatterjee:

secure every individual that works for an organization,

Dr. Dave Chatterjee:

whether it's through training, or whether it's through some

Dr. Dave Chatterjee:

some some sort of technology. So that's, that's a very big hurdle

Dr. Dave Chatterjee:

to overcome. But anyhow, moving along, so we've had the chance

Dr. Dave Chatterjee:

to discuss some findings that I found significant or

Dr. Dave Chatterjee:

interesting. Are there any others? Or is there anything

Dr. Dave Chatterjee:

that you'd like to address that you found interesting, or

Dr. Dave Chatterjee:

something that surprised you all?

David Monnier:

Well, one of the things that surprised us, I

David Monnier:

think, was something that I touched on at the beginning of

David Monnier:

our conversation here, we were kind of surprised that we that

David Monnier:

we weren't able to just apply intelligence to kind of the

David Monnier:

tools that were already out there, we thought we thought it

David Monnier:

would be it would be possible for us to like find someone we

David Monnier:

could kind of go with our typical business model, which

David Monnier:

was being intelligent supplier, we were kind of surprised to see

David Monnier:

that none of the offerings out there really met what we felt

David Monnier:

were what you would want in the marketplace as the, you know, as

David Monnier:

the consumer. And we were surprised that by that because

David Monnier:

we weren't in the space. You know, there were already lots of

David Monnier:

expertise in the space. There's a lot of people out there who

David Monnier:

already have these types of tools, but they weren't seeing

David Monnier:

the problem the same way we were. And we're not totally sure

David Monnier:

why that is. I'm not, you know, proposing were geniuses or

David Monnier:

anything like that. In fact, I can assure you we're not. But it

David Monnier:

was interesting to us as intelligence practitioners, how

David Monnier:

we saw the world as opposed to say, security practitioners. And

David Monnier:

when you think about ASM, you think attack service management,

David Monnier:

you automatically think in terms of security, but really what if

David Monnier:

you really think about it, ASM is an intelligence tool. ASM is

David Monnier:

is being self aware is some type of self aware intelligence

David Monnier:

capability that you then key on to other capabilities to the

David Monnier:

backup. So as you learn something new, aka as your

Dr. Dave Chatterjee:

Another question that comes to mind

Dr. Dave Chatterjee:

intelligence increases, you then have some action to do. So

Dr. Dave Chatterjee:

perhaps it's vulnerability scan this device, perhaps it's

Dr. Dave Chatterjee:

updated inventory management component, perhaps it's disable

Dr. Dave Chatterjee:

the switch port that the device is plugged into, if you can,

Dr. Dave Chatterjee:

because it wasn't plugged in there yesterday. And it's, you

Dr. Dave Chatterjee:

know, not an authorized device. But any way you look at it, and

Dr. Dave Chatterjee:

regardless of the outcome, that initial step really is an

Dr. Dave Chatterjee:

intelligence step. And that was kind of surprising to us. And I

Dr. Dave Chatterjee:

think it's a side effect of like I said, our approach has been

Dr. Dave Chatterjee:

for lack of a better term intelligence applied to

Dr. Dave Chatterjee:

security, as opposed to security applied to asset management. And

Dr. Dave Chatterjee:

so because we kind of approached it from that step back, I think

Dr. Dave Chatterjee:

we came up with different what I would call killer features, you

Dr. Dave Chatterjee:

know, for something if we were going to make it and then the

Dr. Dave Chatterjee:

end result when we went out looked to see, you know, to make

Dr. Dave Chatterjee:

sure there was really nothing out there like it and discovered

Dr. Dave Chatterjee:

there wasn't. We were kind of surprised by that. Because like

Dr. Dave Chatterjee:

I said, we were you know, I wouldn't say we're late to the

Dr. Dave Chatterjee:

party, but we definitely weren't first people in the ASM space.

Dr. Dave Chatterjee:

based on attack reports that are published in the media, where

Dr. Dave Chatterjee:

So that was kind of a surprise to us.

Dr. Dave Chatterjee:

often times organizations are accused of not promptly reacting

Dr. Dave Chatterjee:

or responding to alerts that they receive from various types

Dr. Dave Chatterjee:

of monitoring tools, technologies, service providers,

Dr. Dave Chatterjee:

various types of intelligence sources. So, going back to this

Dr. Dave Chatterjee:

platform, the ASM platform, which obviously is there to help

Dr. Dave Chatterjee:

organizations have a better understanding of their attack

Dr. Dave Chatterjee:

surfaces provide advanced warning. Now, have you all

Dr. Dave Chatterjee:

thought of a feature whereby, you know, there is some kind of

Dr. Dave Chatterjee:

a logging that certain alerts certain notifications went

Dr. Dave Chatterjee:

unheeded, or went unresponded? Or there is a, there's a way of

Dr. Dave Chatterjee:

notifying multiple personnel just to make sure that this, the

Dr. Dave Chatterjee:

signal doesn't get go unheard? Or do you see my question from

Dr. Dave Chatterjee:

where I'm coming?

David Monnier:

Yes, absolutely. And we have, so we're not trying

David Monnier:

to reinvent the wheel at every turn. So an AR capability, we

David Monnier:

have, obviously, incorporate the idea of external API's so that

David Monnier:

you can trigger to, you know, specific systems, or if nothing

David Monnier:

else, at least, have the notion of roles or groups within the

David Monnier:

tool so that if a specific category of event happens,

David Monnier:

notify a specific group of people. Exactly. Yeah, of

David Monnier:

course, those capabilities are there. But what we really think

David Monnier:

is one of the key differentiators, at least for

David Monnier:

our approach is this ability for individuals to prioritize assets

David Monnier:

themselves, so that you're not, so that you're not required to

David Monnier:

react to every "high or critical event," because you know, not

David Monnier:

every device is created equal, not every service is equal. And

David Monnier:

frankly, there's only so much time in the day. And if you have

David Monnier:

to pick between defend the mothership or defend a rowboat

David Monnier:

out in the dock, you know, you're going to defend the

David Monnier:

mothership, hopefully. So your tool, if it's not aware that is

David Monnier:

going to be that's going to be a problem. So we've approached

David Monnier:

them in the terms of both communication level, tuning,

David Monnier:

group and role tuning. And then also asset prioritization tuning

David Monnier:

as well.

Dr. Dave Chatterjee:

Fantastic, because that's been one of my

Dr. Dave Chatterjee:

concerns, one of my pet peeves, that if you have access to all

Dr. Dave Chatterjee:

this intelligence, access to all these tools, you must have a

Dr. Dave Chatterjee:

good governance system in place where you're paying heed to the

Dr. Dave Chatterjee:

alarms that are being raised. Talking about governance, this

Dr. Dave Chatterjee:

is my final two part question to you. Okay. So let's say an

Dr. Dave Chatterjee:

organization decides to buy or invest in a new ASM platform, as

Dr. Dave Chatterjee:

we all recognize that just investing in a tool is not good

Dr. Dave Chatterjee:

enough to extract the maximum value from it. There is a people

Dr. Dave Chatterjee:

aspect to the implementation, there's a process aspect to the

Dr. Dave Chatterjee:

implementation. So if you had to make recommendations to

Dr. Dave Chatterjee:

potential buyers, or investors of this platform, what does it

Dr. Dave Chatterjee:

take to prepare the organization, so they can

Dr. Dave Chatterjee:

effectively use such a platform, what would you say?

David Monnier:

I have a very simple answer to your at least

David Monnier:

the first part there, and that is the will to do something

David Monnier:

about it. You mentioned compliance, regulatory typically

David Monnier:

is that you know, these kinds of policy concerns are usually what

David Monnier:

drive people implementing ASM solutions. And those external

David Monnier:

drivers are rarely effective motivators, in fact, there are

David Monnier:

whole own entities and organizations that carry

David Monnier:

adequate insurance to pay the fines for non compliance,

David Monnier:

because they wholly expect to be out of compliance because they

David Monnier:

consider the compliance component, a burden. So the

David Monnier:

first thing that I propose is that be willing to do something

David Monnier:

with the findings, you know, don't approach ASM as a

David Monnier:

something that you have to do because someone else said so.

David Monnier:

But recognize that someone else said so because what you do is

David Monnier:

important to the world, to society, to people, you know,

David Monnier:

perhaps even you know, to relatives and things like that.

David Monnier:

I mean, and think of the impact of what happens if you turn this

David Monnier:

thing on and discover that you have something bad going on? A

David Monnier:

lot of people are hesitant to turn on a tool like ASM because

David Monnier:

they know what's going to come out the other side is going to

David Monnier:

be something they're gonna have to do something about. And I'm

David Monnier:

not saying that people are lazy, but I will tell you that only

David Monnier:

bodies in motion tend to stay in motion, I think is the is the

David Monnier:

adage, right? So if bodies aren't in motion to begin with

David Monnier:

going and getting an ASM tool isn't going to set them in

David Monnier:

motion at all. So my number one advice to anybody considering to

David Monnier:

go down the path of implementation of ASM is one be

David Monnier:

willing to do something that you find but number two, be willing

David Monnier:

to actually use it because it's going to make your job easier,

David Monnier:

it's going to make your life easier. And kind of taking the

David Monnier:

ostrich, you know, head in the sand approach that doesn't help

David Monnier:

anyone. And like I said, think of the people using the service.

David Monnier:

Think of why it is that you're running the service to begin

David Monnier:

with. Think of those people think of that money, think of

David Monnier:

you know, whatever is the driver, but think of that stuff

David Monnier:

and ask yourself, how important is this to everybody? And how

David Monnier:

willing am I to keep it working and keep it going, and ensure

David Monnier:

that willingness is present and communicated to all of your

David Monnier:

staff, you know, if you have people, maybe as this tool turns

David Monnier:

out work to do, if you have a bunch of other people there that

David Monnier:

are going to have to be doing the actual work, make sure that

David Monnier:

they understand make sure they are all bought in. But I know

David Monnier:

that's a silly answer to a technical question, because it's

David Monnier:

not technical at all, if you will, the answer is not

David Monnier:

technical at all. It's it's human will. So sorry, that was a

David Monnier:

very verbose thing to what I had warned was going to be a simple

David Monnier:

answer, but simply have the will to do something about it.

Dr. Dave Chatterjee:

Well, I think that's a very sound

Dr. Dave Chatterjee:

advice. It's a very wise answer. And that's what most

Dr. Dave Chatterjee:

organizations struggle with. It's the softer side of things

Dr. Dave Chatterjee:

that organizations struggle with more than the harder side of

Dr. Dave Chatterjee:

things, not trying to suggest that implementing technology

Dr. Dave Chatterjee:

effectively is any easier, but providing the appropriate

Dr. Dave Chatterjee:

governance, around technology implementation around leveraging

Dr. Dave Chatterjee:

these tools can be equally if not more challenging. And I want

Dr. Dave Chatterjee:

to reiterate what you said about having the will having the

Dr. Dave Chatterjee:

commitment. In my book on Cybersecurity Readiness: A

Dr. Dave Chatterjee:

Holistic and High- Performance Approach, one of the top

Dr. Dave Chatterjee:

cybersecurity success factors, which I share in the context of

Dr. Dave Chatterjee:

the framework that I propose is the top management commitment.

Dr. Dave Chatterjee:

Another related factor is creating and sustaining a

Dr. Dave Chatterjee:

We-Are-In-Together culture where everybody gets involved. This is

Dr. Dave Chatterjee:

just not the SOC team that can make miracles happen. Everyone

Dr. Dave Chatterjee:

has to play their role. So taking this example of the

Dr. Dave Chatterjee:

attack surface management platform, obviously, specialists

Dr. Dave Chatterjee:

will be running this platform, and they have to be adequately

Dr. Dave Chatterjee:

trained. Because if you don't have good training, you can't

Dr. Dave Chatterjee:

get most out of these platforms. But then, as you mentioned, when

Dr. Dave Chatterjee:

you get those that feedback, and I love what you said,

Dr. Dave Chatterjee:

oftentimes, we don't want to probe in a certain direction, or

Dr. Dave Chatterjee:

we don't want to invest in certain things, because we don't

Dr. Dave Chatterjee:

want to know what we don't know. You can go with it in many

Dr. Dave Chatterjee:

different ways. I don't want any further education, because that

Dr. Dave Chatterjee:

will enlighten me on my lack of awareness, right? Absolutely. So

Dr. Dave Chatterjee:

so here we go in the context of ASM, you are investing in it

Dr. Dave Chatterjee:

because you truly care. Because you truly want to do your part

Dr. Dave Chatterjee:

in trying to secure as best as you can, we all understand that

Dr. Dave Chatterjee:

you cannot secure everything and that you will never be in a

Dr. Dave Chatterjee:

situation where your systems can't be compromised. But you

Dr. Dave Chatterjee:

know, putting your best foot forward and doing everything you

Dr. Dave Chatterjee:

can, and constantly monitoring these devices constantly making

Dr. Dave Chatterjee:

sure you have an oversight team, you have a incident response

Dr. Dave Chatterjee:

team or why by whatever name, you may want to call this team.

Dr. Dave Chatterjee:

Bottom line, again, it boils down to asking yourself, the

Dr. Dave Chatterjee:

fundamental question we've invested in this platform, are

Dr. Dave Chatterjee:

we making full use of it? Are we getting what we wanted from it?

Dr. Dave Chatterjee:

And if there is a deficiency, what is it? And how do we

Dr. Dave Chatterjee:

address it? So that kind of active proactive approach is so

Dr. Dave Chatterjee:

so critical. So David, we're running out of time, I'd like

Dr. Dave Chatterjee:

you to share some final thoughts.

David Monnier:

Yeah, so much of what we've said today, probably

David Monnier:

sounds somewhat elementary to folks. And I'd ask everybody to

David Monnier:

kind of consider why that is, like, why does something so

David Monnier:

obvious, or seemingly obvious, you know, once it's explained to

David Monnier:

you, why is it still so rare? And why is it? Why is it's not

David Monnier:

happening in broader scale? And we should ask ourselves these

David Monnier:

questions, because we are the people who are the solution,

David Monnier:

right? Even if we're just the user, we can go ask the provider

David Monnier:

and say, Hey, why are you why are if you're not doing this?

David Monnier:

Why Why aren't you and start to kind of apply that, you know,

David Monnier:

upward pressure and everything that we're doing, because, like

David Monnier:

I said, we're all reliant on technology, this is not going to

David Monnier:

go away. I mean, barring some type of Corona event where you

David Monnier:

know, we have a sun flare, knock everything out, you know, we're

David Monnier:

we're in this for the long haul, you know, capitalism alone is

David Monnier:

going to drive things towards lower cost solutions. I mean,

David Monnier:

that's just that, that's the direction of that energy. And if

David Monnier:

we're not looking at it as an I don't, I'm not trying to paint a

David Monnier:

dire picture. But if we don't I paint it as a very, very serious

David Monnier:

component of our entire existence, I fear that we're

David Monnier:

going to miss something. So when it is that, you know, someone

David Monnier:

comes along and kind of upsets a space, arguably, as we have with

David Monnier:

these new capabilities, we should ask ourselves, why why

David Monnier:

why is that? And? And if that was like that, what more could

David Monnier:

we be doing? And of those, what more's, how many of those things

David Monnier:

are unknown. So like, if you're out there, and you have an idea,

David Monnier:

you think like, oh, man, you could even then go add on to X,

David Monnier:

Y, or Z, share that idea, or start up in a solution, because

David Monnier:

frankly, the world needs it. We're getting more and more

David Monnier:

reliant on technology, more and more of our whole life, data

David Monnier:

wise, is stored electronically. And for us to be such so reliant

David Monnier:

on something that's seemingly under constant attack and

David Monnier:

continuously growing, and just, you know, out of hand, we should

David Monnier:

be asking, you know, is everything being done that we

David Monnier:

could, and I don't mean just asking of ourselves, but like I

David Monnier:

said, we should be asking the people that we take services

David Monnier:

from, you know, what are you doing to secure my things that

David Monnier:

you, you know, have possession of? So I know, again, that's

David Monnier:

kind of, you know, the lofty answer, but I think it really

David Monnier:

does, it comes down to mass participation, like you said,

David Monnier:

it's that we can do attitude, it's absolutely critical. We're

David Monnier:

all subject to the technology. So let's at least make it work

David Monnier:

to our will. And that's, that's what I think would be a bright

David Monnier:

future. And if everybody got involved, including just every

David Monnier:

user, so absolutely,

Dr. Dave Chatterjee:

Absolutely! Well, David, this was great.

Dr. Dave Chatterjee:

Thanks for your time, for your insights, I know the listeners

Dr. Dave Chatterjee:

appreciate it.

David Monnier:

Thank you Dr.

Dr. Dave Chatterjee:

A special thanks to David Monnier for his

Dr. Dave Chatterjee:

time and insights. If you like what you heard, please leave the

Dr. Dave Chatterjee:

podcast a rating and share it with your network. Also,

Dr. Dave Chatterjee:

subscribe to the show, so you don't miss any new episodes.

Dr. Dave Chatterjee:

Thank you for listening, and I'll see you in the next

Dr. Dave Chatterjee:

episode.

Introducer:

The information contained in this podcast is for

Introducer:

general guidance only. The discussants assume no

Introducer:

responsibility or liability for any errors or omissions in the

Introducer:

content of this podcast. The information contained in this

Introducer:

podcast is provided on an as-is basis with no guarantee of

Introducer:

completeness, accuracy, usefulness, or timeliness. The

Introducer:

opinions and recommendations expressed in this podcast are

Introducer:

those of the discussants and not of any organization.

About the Podcast

Show artwork for The Cybersecurity Readiness Podcast Series
The Cybersecurity Readiness Podcast Series
with Dr. Dave Chatterjee

About your host

Profile picture for Dave Chatterjee

Dave Chatterjee

Dr. Debabroto 'Dave' Chatterjee is tenured professor in the Management Information Systems (MIS) department, at the Terry College of Business, The University of Georgia (UGA). He is also a Visiting Scholar at Duke University, affiliated with the Master of Engineering in Cybersecurity program in the Pratt School of Engineering. An accomplished scholar and technology thought leader, Dr. Chatterjee’s interest and expertise lie in the various facets of information technology management – from technology sense-making to implementation and change management, data governance, internal controls, information security, and performance measurement. His work has been accepted and published in prestigious outlets such as The Wall Street Journal, MIT Sloan Management Review, California Management Review, Business Horizons, MIS Quarterly, and Journal of Management Information Systems. Dr. Chatterjee’s research has been sponsored by industry and cited over two thousand times. His book Cybersecurity Readiness: A Holistic and High-Performance Approach was published by SAGE Publishing in March 2021.