Episode 30
The State of Attack Surface Management
With increasing digitization and the use of cloud-hosted assets, managing attack surfaces continues to be a major challenge. A recent survey report on the state of attack surface management (ASM) finds security teams drowning in a flood of legacy and ineffective tools with limited discovery capabilities. The need for ASM platforms with advanced digital asset detection capabilities is revealed in the survey findings. David Monnier, Team Cymru Fellow, sheds light on the latest ASM platform capabilities and discusses the implementation challenges and success factors.
Time Stamps
00:50 -- I'd like to take this opportunity to welcome David and have him share with all of us some highlights of his professional journey.
03:14 -- What was the motivation? What led to this very important study that y'all conducted?
07:41 -- David, would you like to add anything to that from a methodology and participant demographic standpoint?
09:52 -- The first finding that I'd like to talk about is "the biggest reason organizations implemented ASM is to increase the visibility of Shadow IT in the enterprise." I think this is a very significant finding. If you would expand on this and also describe what Shadow IT means?
14:50 -- Over the years have ASM platform capabilities been enhanced to better monitor cloud-hosted assets? What's been the trend?
19:17 -- Moving along to another interesting finding, which states that "23% of the respondents said that identification of rogue or unclassified assets is the most valuable capability that ASM has provided their organization." I guess my question here is, shouldn't this be obvious? Shouldn't that be what an ASM is supposed to be doing?
20:56 -- What steps should an organization take, should the security analysts, the security professionals take, to ensure that their ASM platform is performing at a satisfactory level?
24:30 -- To what extent is AI being used to enhance the functionality, the capabilities, of these ASM platforms?
27:48 -- So talking about the human component, and in this discussion, we have been talking about attack surfaces, more from a physical standpoint, devices, and so on, so forth. How about humans as attack surfaces, as very vulnerable attack surfaces? Are we doing better in terms of securing this very vulnerable attack surface? Can tools help us secure that attack surface? What are your thoughts?
31:23 -- Is there anything that you'd like to address that you found interesting, or something that surprised you all?
34:22 -- Is there a way of notifying multiple personnel just to make sure that the alerts don't go unheard?
36:43 -- So if you had to make recommendations to potential buyers, or investors of this ASM platform, what does it take to prepare the organization, so they can effectively use such a platform?
40:33 -- I'd like you to share some final thoughts.
Memorable David Monnier Quotes
"You have to approach the tool sets as, am I going to have a tool that's going to show me things I didn't know to know. And that, in my opinion, is the killer feature, way more important, in my opinion, is discovery, than the vulnerability management component."
"If your tool can't tell you that your DNS hosting provider has a poor reputation, or that the IPs around your IP services are bad, if it's not able to show you these kinds of things, then it suggests that you are probably working with an antiquated tool. But frankly, let's use the word static. And if it is static, I think in the information age, that should be a huge red flag to you."
"The number one compromised source is still stolen credentials. And the number one method for that is still some type of phishing, or some type of social engineering, so nothing seems to really be changing there."
"We still work and live in a world where everything is kind of magic. And the majority of people who are relying on technology, still have absolutely no idea how it works, and therefore can't really spot things when they aren't correct, right."
Frankly, there's only so much time in the day. And if you have to pick between defending the mothership or defending a rowboat out in the dock, you know, you're going to defend the mothership, hopefully. So your tool, if it's not aware of that, that's going to be a problem."
"There are entities and organizations that carry adequate insurance to pay the fines for non-compliance because they wholly expect to be out of compliance because they consider the compliance component, a burden."
"So my number one advice to anybody considering to go down the path of implementation of ASM is, one, be willing to do something that you find, but number two, be willing to actually use it because it's going to make your job easier, it's going to make your life easier."
Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast
Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks.
Connect with Dr. Chatterjee on these platforms:
LinkedIn: https://www.linkedin.com/in/dchatte/
Website: https://dchatte.com/
Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338
Transcript
Welcome to the Cybersecurity Readiness Podcast
Introducer:Series with Dr. Dave Chatterjee. Dr. Chatterjee is the author of
Introducer:the book Cybersecurity Readiness: A Holistic and
Introducer:High-Performance Approach, a SAGE publication. He has been
Introducer:studying cybersecurity for over a decade, authored and edited
Introducer:scholarly papers, delivered talks, conducted webinars and
Introducer:workshops, consulted with companies and served on a
Introducer:cybersecurity SWAT team with Chief Information Security
Introducer:officers. Dr. Chatterjee is Associate Professor of
Introducer:Management Information System at the Terry College of Business,
Introducer:the University of Georgia. As a Duke University Visiting
Introducer:Scholar, Dr. Chatterjee has taught in the Master of
Introducer:Engineering in Cybersecurity program at the Pratt School of
Introducer:Engineering.
Dr. Dave Chatterjee:Hello, everyone, I'm delighted to
Dr. Dave Chatterjee:welcome you to this episode of the Cybersecurity Readiness
Dr. Dave Chatterjee:Podcast series. Our discussion today will revolve around the
Dr. Dave Chatterjee:state of attack surface management. David Monnier, Team
Dr. Dave Chatterjee:Cymru Fellow will share his thoughts and perspectives on
Dr. Dave Chatterjee:this very important subject. Another highlight of our
Dr. Dave Chatterjee:discussion today will be the findings from a very interesting
Dr. Dave Chatterjee:research study that focused on the state of attack surface
Dr. Dave Chatterjee:management. But before we get into all those details, I'd like
Dr. Dave Chatterjee:to take this opportunity to welcome David and have him share
Dr. Dave Chatterjee:with all of us some highlights of his professional journey.
Dr. Dave Chatterjee:David, thanks for being on the podcast.
David Monnier:Thank you, David, thank you very much for inviting
David Monnier:us on to talk about our study. So it's always a pleasure to
David Monnier:come on. Some background about myself. So I'm, I'm from the
David Monnier:United States. In the Midwest, I had started my career.
David Monnier:Originally I was in the US Marine Corps worked as a
David Monnier:noncommissioned officer there. But when I got out of the Marine
David Monnier:Corps, I got into working with technology, just out of
David Monnier:coincidence of funnily enough, a computer breaking that I ended
David Monnier:up fixing, and discovering I had some natural talents, I ended up
David Monnier:going to work for Indiana University, working in high
David Monnier:performance computing. And from there moving on to their
David Monnier:security office working as a security engineer for them,
David Monnier:basically looking after all the campuses around the state. And
David Monnier:then shortly after that, I was invited to help come start the
David Monnier:research and education, networking, ISAC, which is an
David Monnier:executive ordered set of organizations largely geared
David Monnier:around kind of specific industrial sectors. In my case,
David Monnier:it was research and education, networking, there are also like,
David Monnier:financial sector there are itI sec, and so on. But ISAC is an
David Monnier:Information Sharing and Analysis Center. So you could think of it
David Monnier:as groups of people working together to share threat
David Monnier:intelligence. And then after that, I was invited to join Team
David Monnier:Cymru where I've been here for about 15 years. Presently,
David Monnier:working as a Fellow, but periodically helping to spin up
David Monnier:new teams for us and identify new product needs and things
David Monnier:like that. But I've been practicing for, I think it's 27
David Monnier:years now, something like that.
Dr. Dave Chatterjee:Well, we're delighted to have you on the
Dr. Dave Chatterjee:show. And thanks again for your service. So David, before we
Dr. Dave Chatterjee:launch into talking about the various findings, and I find
Dr. Dave Chatterjee:them very interesting. To set the motivation, the context for
Dr. Dave Chatterjee:the research study, it's a fact that the attack surfaces are
Dr. Dave Chatterjee:evolving, the more digitized we get, the more we go to the
Dr. Dave Chatterjee:cloud. And the hackers are not sitting idle. They're constantly
Dr. Dave Chatterjee:getting more innovative with their techniques, tools,
Dr. Dave Chatterjee:approaches. So it's a moving target for organizations to stay
Dr. Dave Chatterjee:on top of things, I find it almost hard to believe that
Dr. Dave Chatterjee:organizations can be ahead, but if they can, more power to them.
Dr. Dave Chatterjee:So what was the motivation? What led to this very important study
Dr. Dave Chatterjee:that y'all conducted?
David Monnier:Well, very much like you said, so we've been
David Monnier:working, Team Cymru, we've been threat intelligence supplier to
David Monnier:the industry since our inception. It's how we began our
David Monnier:business, we used to kind of boast that we were the best
David Monnier:security company no one had ever heard of, because our research
David Monnier:and efforts went into other people's products. So if you're
David Monnier:familiar with a company BASF we don't make antivirus. We make
David Monnier:antivirus better, we don't make firewalls, we make firewalls
David Monnier:better. You know, this type of slogan, if you remember their
David Monnier:advertising back in the day. And that was really the core of our
David Monnier:business and we observe miscreant activities every day.
David Monnier:It's a byproduct of our analysis efforts. It's a byproduct of our
David Monnier:interest in understanding how the internet is used by society.
David Monnier:We happen to feel that the internet is probably one of the
David Monnier:greatest creations mankind has ever developed and we were
David Monnier:looking at kind of how the security world was moving
David Monnier:towards this notion of attack surface management, where they
David Monnier:were kind of blending a few types of technologies together,
David Monnier:which you could think of as your vulnerability scanning, your
David Monnier:asset discovery. And those things were coming together. And
David Monnier:we felt there was an obvious and useful connection for us to be
David Monnier:able to add threat intelligence to it. And threat intelligence,
David Monnier:you know, when you think of it in terms of, of defense, a lot
David Monnier:of people often just think it's, you know, lists of bad IPs or
David Monnier:things like that. But in reality, it also is, if you turn
David Monnier:it around, it's also lists of IPs of yours, that might be bad.
David Monnier:So when you think of like reputational data, and things
David Monnier:like that, so what became obvious to us is, you know, if
David Monnier:you're doing attack surface management, wouldn't it be great
David Monnier:to know what attacks you may have already been subjected to?
David Monnier:And, and to that end, what devices that you already own,
David Monnier:that may already be compromised? So kind of taking, you know,
David Monnier:that idea of knowing how bad things already are to decide,
David Monnier:you know, is this a system that I should patch? Or is this a
David Monnier:system that I need to completely rebuild, because it's already
David Monnier:been compromised. And we saw that obvious need from an
David Monnier:intelligence perspective. But then as we started to look at
David Monnier:ways that we could apply it to kind of the existing
David Monnier:marketplace, we realized that kind of none of the other
David Monnier:products that were out there, were approaching ASM the same
David Monnier:way we were, they were very much looking at things, most people's
David Monnier:tools seemed very much geared towards, here's your IP, here's
David Monnier:a problem it has, here's something you should do about
David Monnier:it. But without really giving the people the ability to
David Monnier:highlight which IP or what device let's let's use the term
David Monnier:device, actually, because the devices just happen to use an IP
David Monnier:address. But But what devices on the network are most critical to
David Monnier:your operation, you know that these tools in the marketplace,
David Monnier:they didn't really have a way to highlight which ones were most
David Monnier:important. And the devices themselves couldn't really tell
David Monnier:you, which was important. So we also sat down and said, Okay, if
David Monnier:you were going to look at ASM, what's the key value piece
David Monnier:there, and what we concluded was that risk understanding the risk
David Monnier:to your business needed to be a piece that was part of it. So
David Monnier:what we've approached ASM as, is the traditional sense. But what
David Monnier:what we have attempted to bring to the market as a new offering,
David Monnier:is the application of intelligence on top of that,
David Monnier:with kind of user definable values for the assets as they're
David Monnier:discovered.
Dr. Dave Chatterjee:Okay, thanks for sharing. So just to
Dr. Dave Chatterjee:let listeners know, that, as far as the methodology and and
Dr. Dave Chatterjee:participant demographics go, the study was commissioned on March
Dr. Dave Chatterjee:14 2022. 440 security practitioners were surveyed in
Dr. Dave Chatterjee:the US and Europe, the survey was conducted online via
Dr. Dave Chatterjee:Pollfish using organic sampling. All respondents work on their
Dr. Dave Chatterjee:company's security team. And all these organizations are using an
Dr. Dave Chatterjee:attacks surface management platform. Their industry
Dr. Dave Chatterjee:representation is also pretty broad, ranging from finance to
Dr. Dave Chatterjee:IT to military and defense, among others. The team size
Dr. Dave Chatterjee:varied relatively little from less than 10 to over 30. So
Dr. Dave Chatterjee:David, would you like to add anything to that from a
Dr. Dave Chatterjee:methodology and participant demographic standpoint?
David Monnier:Well, we had originally considered making it
David Monnier:split into, you know, additional slices. So to differentiate, for
David Monnier:example, between practitioner and executive, not that
David Monnier:executive practitioning isn't practitioning of a sort, but we
David Monnier:thought it might be useful to split those out. But in the end,
David Monnier:what we found actually was that kind of the bulk of the world
David Monnier:really isn't divided up that way, it's only kind of the
David Monnier:biggest companies that have those kinds of separations. So
David Monnier:when you think of the folks that took the time to fill out the
David Monnier:review for us, many of which are most of which I should say,
David Monnier:really knew what they were talking about. So to kind of
David Monnier:give you that, you know, value of of what their answers mean,
David Monnier:these are the people who roll up their sleeves every day, and
David Monnier:actually have to reach into the problem and do something about
David Monnier:what they find, you know, not just run the tools, but
David Monnier:oftentimes, these were the folks in particular, those smaller
David Monnier:teams, those less than 10 people teams, they were often the same
David Monnier:person who, who helped manage, you know, the patching program
David Monnier:or, or who helped manage their inventory systems and things
David Monnier:like that. So value wise, these people's opinions are not
David Monnier:speculative that they are the practitioners who were largely
David Monnier:responsible for making things happen based on the findings.
Dr. Dave Chatterjee:Okay, good to know. Good to know. So let's
Dr. Dave Chatterjee:discuss some of the finding. There are several interesting
Dr. Dave Chatterjee:findings, not sure how much time we'll have to go over all of
Dr. Dave Chatterjee:them. But we can definitely cover some. The first one that
Dr. Dave Chatterjee:I'd like to talk about is the biggest reason organizations
Dr. Dave Chatterjee:implemented ASM is to increase the visibility of Shadow IT in
Dr. Dave Chatterjee:the enterprise, I think this is very significant, if you would
Dr. Dave Chatterjee:expand on this and also describe what Shadow IT means to the
Dr. Dave Chatterjee:listeners.
David Monnier:Sure, absolutely. So, you know, Shadow IT is a
David Monnier:side effect, more or less of what you could think of as
David Monnier:necessary growth. So organizations oftentimes have
David Monnier:disparate teams that are spread out in function, but you know,
David Monnier:typically working towards the same goal, you know, keep the
David Monnier:company open, keep the company in business and so on. But what
David Monnier:ends up happening is, as needs change, in particular needs in
David Monnier:the scope of being able to spin up new infrastructure very
David Monnier:quickly, and things like that. A lot of companies don't, don't, I
David Monnier:don't know what the right word is, I don't want to say don't
David Monnier:like to, because obviously, they would, they would prefer to do
David Monnier:it the right way. Um, but a lot of companies find that like
David Monnier:policy around asset controls, hinder or stifle innovation. And
David Monnier:then whether it's real or not, whether that's true or not, you
David Monnier:know, we can't really speak to that I'm sure that some kind of
David Monnier:psychology of the human work experience, but in actual
David Monnier:practice, though, with with certainty, organizations are
David Monnier:hesitant to, you know, have to talk to the IT team, let's and
David Monnier:let me use a practical example. So you have a software
David Monnier:development team who has the need to work with some temporary
David Monnier:data, they don't want to work with data from some live
David Monnier:production database. So they need to set up, you know, a
David Monnier:secondary, you know, temporary database. And these folks, you
David Monnier:know, oftentimes will spin up an instance in a cloud, or, you
David Monnier:know, maybe some new VM even within their infrastructure, but
David Monnier:they'll spin it up, they'll put data for use in that, and then
David Monnier:they'll make use of the project, right? Well, if your main IT
David Monnier:team is unaware that someone on the development team has done
David Monnier:this, you now have an asset that is not under centralized control
David Monnier:isn't, but the organization itself isn't aware of it. And
David Monnier:it's full of, of data, you know, and presumably, if you're
David Monnier:spending the time to develop software to interact with that
David Monnier:data, that data must be important. And we read about
David Monnier:this all the time you read about so for example, Amazon S3
David Monnier:buckets, right? There are these virtual storage instances that
David Monnier:people can spin up very quickly and put information and for
David Monnier:various purposes, right. But it's think of it as file
David Monnier:storage. And there are tools that you can, you know, you
David Monnier:could pull up your favorite search engine and put in and
David Monnier:look for, you know, Amazon S3, open bucket finder, or
David Monnier:something. And you'll see almost every day that there are people
David Monnier:who have left these instances open, so meaning no
David Monnier:authentication, and anybody in the world could identify it,
David Monnier:download the data and do something with that. So this is
David Monnier:kind of the traditional understanding of Shadow IT
David Monnier:right, it's these things that get stood up that people may not
David Monnier:necessarily wholly know about. The organization itself may not
David Monnier:be completely aware of. And the reason why it's such a big issue
David Monnier:to folks is precisely the example I gave data ends up
David Monnier:getting exposed this way. And not just, you know, random data,
David Monnier:who we're talking often legally regulated data, you know,
David Monnier:whether it be personally identifying information, whether
David Monnier:it be health records, whether it be financial information, I
David Monnier:mean, all kinds of stuff gets leaked out this way. So our
David Monnier:intention for this with asking folks that was to see if our
David Monnier:capability, how much effort we should really apply to doing
David Monnier:this Shadow IT identification, because it's not easy, right?
David Monnier:How do you how do you help somebody find something they
David Monnier:didn't know they had? It's not an easy problem. So that was the
David Monnier:reason for us to ask. We saw how many data exposure notifications
David Monnier:go out. If you ever noticed, by the way, those are never
David Monnier:discussed, described as breaches, which if you think
David Monnier:about it, it's it's kind of interesting, the choice of words
David Monnier:that people use around those, but those, quote unquote,
David Monnier:exposures do add up to a great deal of loss, both in terms of
David Monnier:productivity, but you know, every time PII personally
David Monnier:identifying information is exposed, there's a lot of times
David Monnier:where there's government regulatory components on there
David Monnier:where you have to go notify people, or perhaps even a
David Monnier:company has to now provide credit monitoring or identity
David Monnier:monitoring, you know, based on what type of data was that was
David Monnier:exposed. So those kinds of costs were very, very real. And so
David Monnier:that we weren't surprised to hear that so many people
David Monnier:considered Shadow IT to be such a big problem.
Dr. Dave Chatterjee:Yeah, I mean, doesn't surprise me either
Dr. Dave Chatterjee:because as as you discussed, Shadow IT gets formed, gets
Dr. Dave Chatterjee:created because certain divisions, certain parts of the
Dr. Dave Chatterjee:organization wants to get certain things done. And for
Dr. Dave Chatterjee:whatever reason Central IT is not able to respond in time or
Dr. Dave Chatterjee:as per their expectation so, and for other reasons as well. But
Dr. Dave Chatterjee:that creates a problem in terms of data exposure, and you really
Dr. Dave Chatterjee:cannot defend effectively if you don't know where all your
Dr. Dave Chatterjee:vulnerabilities are, where or where your data is residing,
Dr. Dave Chatterjee:where your applications are residing. So it's great to know
Dr. Dave Chatterjee:that there is a high level of sensitivity towards towards this
Dr. Dave Chatterjee:challenge. And one of the capabilities of ASM should be to
Dr. Dave Chatterjee:increase the visibility of, of Shadow IT. So that's, that's a
Dr. Dave Chatterjee:very significant finding. Moving along, another finding that got
Dr. Dave Chatterjee:my attention, which is not surprising, but it it validates
Dr. Dave Chatterjee:the fact that more and more applications and infrastructure
Dr. Dave Chatterjee:are in the cloud, and which is what 75% of your respondents
Dr. Dave Chatterjee:said, but what is interesting to me is the statement here in the
Dr. Dave Chatterjee:report, which says "ASM, which stands for attack, surface
Dr. Dave Chatterjee:management, is critical for all organizations, regardless of
Dr. Dave Chatterjee:their cloud adoption, but should be an even higher priority for
Dr. Dave Chatterjee:tracking and managing the attack surface for cloud hosted assets.
Dr. Dave Chatterjee:So I guess my question for you, David, is, and you obviously
Dr. Dave Chatterjee:have a better understanding of the evolution of the ASM
Dr. Dave Chatterjee:platform, over the years have they have they enhanced their
Dr. Dave Chatterjee:capabilities to better monitor cloud hosted assets? Is that
Dr. Dave Chatterjee:what's been the trend?
David Monnier:Well, you know, unfortunately, not really. A big
David Monnier:component to this is kind of the discovery problem. And how most
David Monnier:vendors choose to remedy this is either by IP space, so IP
David Monnier:addresses, Internet Protocol address that people use to be on
David Monnier:the internet, they are defined and issued out typically, as
David Monnier:network address space, you'll get a range of IP addresses, or
David Monnier:they will tend to classify their assets based on namespace, which
David Monnier:typically is in internet terms would be something like DNS,
David Monnier:where DNS, you put in your domain name, let's use an
David Monnier:example, you know, foo.com. And as you add things in the form of
David Monnier:subdomains, or host names to that, in theory, they start to
David Monnier:become discoverable. Where the problem with cloud computing
David Monnier:comes in is, you know, when you license your ASM product, you're
David Monnier:not going to go out and license a product for and I'm not trying
David Monnier:to pick on AWS here. But Amazon's AWS services, one of
David Monnier:the world's largest and most popular cloud hosting services
David Monnier:in the world, but you're not going to go license an ASM
David Monnier:product to scan the entirety of their IP space, is just not
David Monnier:realistic. So you have to know your IPs. And again, it goes
David Monnier:back to this problem of you know, how will you know, which
David Monnier:are yours. In our case, we also well, we work with IP addresses,
David Monnier:obviously. But in our case, we because we are an intelligence
David Monnier:provider, we see a great deal of information already, in
David Monnier:particular IP, IP space, as well as namespace. But we also see
David Monnier:things like certificates and keys and all this kind of
David Monnier:additional metadata that the internet kind of operates on. So
David Monnier:we saw it as kind of an an easy evolution to help do these
David Monnier:discoveries that nobody else really had. Because the other
David Monnier:products are requiring the user to know in advance all of their
David Monnier:things. Shadow IT by definition means you don't know that you
David Monnier:have some of this. So you know, it's an approach, frankly, that
David Monnier:starts off already hindered. So what we how we change this as we
David Monnier:look for, you know, other instances, and other examples
David Monnier:that we've identified through our other threat, exploring and
David Monnier:threat hunting efforts that appear to be related to other
David Monnier:people's organizations, and we try to highlight those kinds of
David Monnier:datasets to better inform the discovery model.
Dr. Dave Chatterjee:Okay. Thanks for sharing. Moving along
Dr. Dave Chatterjee:to another interesting finding, which states that 23% of the
Dr. Dave Chatterjee:respondents said that identification of rogue or
Dr. Dave Chatterjee:unclassified assets is the most valuable capability that ASM has
Dr. Dave Chatterjee:provided their organization. I guess my question here is, you
Dr. Dave Chatterjee:know, shouldn't this be obvious? Shouldn't that be what an ASM is
Dr. Dave Chatterjee:supposed to be doing?
David Monnier:Yes, it certainly is exactly what ASM should be
David Monnier:doing. And and I think this highlights the shortcoming that
David Monnier:I just described, right. So the reason why only 23% of them said
David Monnier:that their application of of ASM in their workplace was that
David Monnier:effective at discovering those things is because the rest of
David Monnier:the respondents, you know, the remaining 77%, they are clearly
David Monnier:limited, because the only thing that ASM knows about are the
David Monnier:things they already know about. So if you already know about it,
David Monnier:it's unlikely for something to be rogue or unclassified. Right?
David Monnier:So this kind of static discovery approach, this is the fruit that
David Monnier:comes off that tree, when you take a non dynamic approach to
David Monnier:understanding assets in a very dynamic environment. That is
David Monnier:what I would call modern, you know, computing, you're going to
David Monnier:end up with low numbers like that, because the rest of them,
David Monnier:their tools probably just don't identify rogue devices. And
David Monnier:that's an unfortunate side effect. Again, this was one of
David Monnier:the motivations that led us to to create a product for the
David Monnier:space.
Dr. Dave Chatterjee:Okay. Now, you know, some of the findings
Dr. Dave Chatterjee:speak to the challenges of deploying and implementing ASM
Dr. Dave Chatterjee:platforms. And these challenges range range from lack of
Dr. Dave Chatterjee:integration with existing platforms, the amount of
Dr. Dave Chatterjee:training that's required. And also I found it interesting,
Dr. Dave Chatterjee:where organizations where the respondents said that they feel
Dr. Dave Chatterjee:that the current platform has become more of a legacy. So my
Dr. Dave Chatterjee:question to you is as follows When an organization is
Dr. Dave Chatterjee:investing in an ASM platform, they know fully well that at
Dr. Dave Chatterjee:some point, it will move towards becoming obsolete. I don't know
Dr. Dave Chatterjee:if obsolete is the right word, but what steps should an
Dr. Dave Chatterjee:organization take, should the security analysts, the security
Dr. Dave Chatterjee:professionals take, to ensure that their ASM platform is
Dr. Dave Chatterjee:performing at a satisfactory level?
David Monnier:Well, I think the initial steps are are
David Monnier:introvertish. Introvertal steps right? So you have to ask
David Monnier:yourself, Do I know everything about my network? Do I know all
David Monnier:of the devices I have? And if that answer isn't an absolute
David Monnier:certain, yes. Which a hint to the listeners, It isn't. Then
David Monnier:you have to approach the tool sets as am I going to have a
David Monnier:tool that's going to show me things I didn't know to know.
David Monnier:And that, in my opinion, is the killer feature, way more
David Monnier:important, in my opinion, is discovery, then even say, the
David Monnier:vulnerability management and discovery component, right?
David Monnier:Like, if you don't know, to know, then you won't, won't get
David Monnier:any benefit from it. But if you do discover something that's on
David Monnier:your infrastructure that you didn't realize was there, or
David Monnier:that is your system is reliant on, because there are a bunch of
David Monnier:non system concerns as well. Like, for example, you know,
David Monnier:every is every person's network, they get onto the Internet by
David Monnier:way of a set of internet service providers. And what about the
David Monnier:safety and reputation of those folks? You know, if your tool
David Monnier:can't tell you that your DNS hosting provider has a poor
David Monnier:reputation, or that your internet service provider, you
David Monnier:know that the IPs around your IP services are bad. If it's not
David Monnier:able to show you these kinds of things, then it suggests that
David Monnier:you are probably working with something that is, frankly, like
David Monnier:I said, antiquated of some sort. But frankly, let's use the word
David Monnier:static. And if it is static, I think in the information age,
David Monnier:that should be a huge red flag to you. That if this tool
David Monnier:doesn't teach itself to some degree, and I'm the operator is
David Monnier:responsible for informing this, that I probably have a tool that
David Monnier:is not future proofed? Not that our any tool is completely
David Monnier:future proofed, right. But there are certain methodologies that
David Monnier:can help assure a future proofed capability. And this kind of
David Monnier:dynamic discovery is absolutely one of those capabilities. But
David Monnier:in the end, I think practitioner, or decision makers
David Monnier:need to ask themselves, how much is this tool teaching me that I
David Monnier:didn't already know. And I'm not talking about you know, that you
David Monnier:have a vulnerability on some device you already knew you had.
David Monnier:I mean, how much infrastructure is it really exposing to me that
David Monnier:I didn't know before? And even inadvertently, you know, if,
David Monnier:like I said, maybe someone plugged in some new device on
David Monnier:your network. If it's not at least catching those types of
David Monnier:things for you, then I would say you have an older tool,
Dr. Dave Chatterjee:Right, makes sense. And I'm glad you
Dr. Dave Chatterjee:mentioned about the self learning capability. So to what
Dr. Dave Chatterjee:extent is AI being used to enhance the functionality, the
Dr. Dave Chatterjee:capabilities, of these ASM platforms?
David Monnier:So in our case, we're not really using AI. Not
David Monnier:that we're against AI per se, but we didn't really see a great
David Monnier:need for it per se, relative to machine learning and machine
David Monnier:learning sense, you know, where there's a human who is, I guess
David Monnier:suggesting, to the system, what it should be doing, as it's
David Monnier:doing it, as opposed to AI where they become somewhat autonomous,
David Monnier:you know. So, in our case, though, is a great deal of what
David Monnier:I would call machine learning, where as assets are discovered,
David Monnier:we look at kind of the nuance of that asset, both from a service
David Monnier:level from an IP level, and then from like, what the operating
David Monnier:system looks like, think of it as a very signal focused view,
David Monnier:internet signal that is, and we use what's discovered to kind of
David Monnier:inform the next level of discovery. So for example, if we
David Monnier:discovered a new, you know, domain within your namespace,
David Monnier:say, you know, again, using this foo.com example, but let's say,
David Monnier:yesterday, you didn't have www.dev.foo.com. And today,
David Monnier:we're seeing that name being looked up in passive DNS data,
David Monnier:we know that you have some new asset out there somewhere, and
David Monnier:can then start to go looking for it. And that type of informed
David Monnier:learning is precisely how we approach this, but it's a
David Monnier:continuous thing, you know, what happens 24 hours a day, we
David Monnier:continuously learn about the surface of the internet as a
David Monnier:whole, for that matter. But in particular, you know, of the
David Monnier:asset tools for folks. And then those assets, as we kind of
David Monnier:learned from them, we go to look for similarities. And we say,
David Monnier:Okay, what's just like this, but maybe, you know, isn't
David Monnier:previously known. And we show you, hey, here's these potential
David Monnier:things that we think might be related to you. And we let the
David Monnier:the individual decide like, Oh, this is related to me, or Oh,
David Monnier:no, this isn't me, but sure looks a lot like me. Maybe this
David Monnier:is a phishing site or something, you know, there are other
David Monnier:approaches and other outcomes aside from your own attack
David Monnier:surface, you know, that you can discover using the kind of
David Monnier:machine learning metal method that we use. But I don't know
David Monnier:that AI will ever totally get there for what it's worth.
David Monnier:Because I, I still think that when it comes to ASM, the human
David Monnier:component is required, like aI won't know the difference,
David Monnier:unless you share with it all of your client configurations, AI
David Monnier:won't know the difference, for example, between your primary
David Monnier:active directories host and some dev Active Directory host. So,
David Monnier:they will both appear to be running the same services. But
David Monnier:you as the human know that one of them has your actual users,
David Monnier:and maybe another one has dummy data. So you can prioritize and
David Monnier:say, Ah, this IP, this host, this asset, is my actual Active
David Monnier:Directory directory server, whereas this other one is not.
David Monnier:So don't show this as a high risk show this other one as the
David Monnier:high priority asset. And for that reason, I don't know that
David Monnier:AI will ever really fill in in this role. But we'll see.
Dr. Dave Chatterjee:Okay, good to know. So talking about the
Dr. Dave Chatterjee:human component, and in this discussion, we have been talking
Dr. Dave Chatterjee:about attack surfaces, more from a physical standpoint, devices,
Dr. Dave Chatterjee:and so on, so forth. How about humans as attack surfaces as
Dr. Dave Chatterjee:very vulnerable attack surface? What are your thoughts about,
Dr. Dave Chatterjee:you know, you know, are we doing better in terms of securing that
Dr. Dave Chatterjee:very vulnerable attack surface? Can tools help us secure that
Dr. Dave Chatterjee:attack surface? What are your thoughts?
David Monnier:Well, I hate to be a naysayer. But things aren't
David Monnier:getting any better there, it seems. If you look at the SANS
David Monnier:survey comes out every year, if you look at the US government's
David Monnier:breach report, or Verizon, they they publish a report any of
David Monnier:these reports, if you go look at them continuously, for the last,
David Monnier:you know, I mean, since forever since these reports have been
David Monnier:produced, the number one compromised source is still
David Monnier:stolen credentials. And the number one method for that is
David Monnier:still some type of phishing, or some type of social engineering
David Monnier:still, so nothing seems to really be changing there. The
David Monnier:tools and the tactic techniques being employed to gain access to
David Monnier:this type of information, haven't really needed to change
David Monnier:much, because the human element is still you know, largely the
David Monnier:same. And I say this all the time, until listeners who may
David Monnier:have heard me on any other podcast or may tune in who or
David Monnier:who happened to listen to ours, probably have heard me say many
David Monnier:times, but we still work and live in a world where everything
David Monnier:is kind of magic. And the majority of people who are
David Monnier:relying on technology, still have absolutely no idea how it
David Monnier:works, and therefore can't really spot things when they
David Monnier:aren't correct, right. And for the longest time, vendors tried
David Monnier:to implement methodologies like if you recall, you know, It was
David Monnier:always look for the lock icon in your browser window and make
David Monnier:sure that that's always there. And so miscreants just started
David Monnier:to put a block of the locked lock icon right on in the
David Monnier:content of a phishing effort. And people would say, Well, I
David Monnier:saw the lock, so I figured it was safe. And here we are. And
David Monnier:I'm not talking about fools here. I'm talking about, you
David Monnier:know, Board members and C-level operators and decision makers,
David Monnier:you know, around the world, in the largest companies in the
David Monnier:world, the most capable, most successful people in the world
David Monnier:still fall victim to this stuff. So unfortunately, I just don't
David Monnier:know that any of that can be changed, either, you know, where
David Monnier:we move to these concepts like zero trust, or you look for the
David Monnier:behaviors of of specific devices and try to key on that. But
David Monnier:realistically, by the time you're keying in on a behavior,
David Monnier:it may already be too late, right? So the stolen credential,
David Monnier:the credential reuse, so you know, what, however you want to
David Monnier:call them, there's variations of, of the methodology, the
David Monnier:attack, but they all come down to an imposter, if you will.
David Monnier:That still turns out to be, you know, if not, number one, top
David Monnier:three, year after year, way, way back, I remember when it was a
David Monnier:tax where like buffer overflows were the primary method, and
David Monnier:people were, you know, looking for at the software stack, for
David Monnier:what waves to gain entry. And then along the way, somebody
David Monnier:figured out that we don't even need to talk to machines, talk
David Monnier:to the people, and that people will just give you access to the
David Monnier:machines. And that hasn't changed. And unfortunately, I
David Monnier:don't know that it will change. We look to incorporate that type
David Monnier:of intelligence, though, into our ASM to let folks know, you
David Monnier:know, when they have account level risks that are there,
David Monnier:we're looking to add that capability as well.
Dr. Dave Chatterjee:Awesome. That's awesome. Yeah, I think
Dr. Dave Chatterjee:that's a very difficult challenge when you're trying to
Dr. Dave Chatterjee:secure every individual that works for an organization,
Dr. Dave Chatterjee:whether it's through training, or whether it's through some
Dr. Dave Chatterjee:some some sort of technology. So that's, that's a very big hurdle
Dr. Dave Chatterjee:to overcome. But anyhow, moving along, so we've had the chance
Dr. Dave Chatterjee:to discuss some findings that I found significant or
Dr. Dave Chatterjee:interesting. Are there any others? Or is there anything
Dr. Dave Chatterjee:that you'd like to address that you found interesting, or
Dr. Dave Chatterjee:something that surprised you all?
David Monnier:Well, one of the things that surprised us, I
David Monnier:think, was something that I touched on at the beginning of
David Monnier:our conversation here, we were kind of surprised that we that
David Monnier:we weren't able to just apply intelligence to kind of the
David Monnier:tools that were already out there, we thought we thought it
David Monnier:would be it would be possible for us to like find someone we
David Monnier:could kind of go with our typical business model, which
David Monnier:was being intelligent supplier, we were kind of surprised to see
David Monnier:that none of the offerings out there really met what we felt
David Monnier:were what you would want in the marketplace as the, you know, as
David Monnier:the consumer. And we were surprised that by that because
David Monnier:we weren't in the space. You know, there were already lots of
David Monnier:expertise in the space. There's a lot of people out there who
David Monnier:already have these types of tools, but they weren't seeing
David Monnier:the problem the same way we were. And we're not totally sure
David Monnier:why that is. I'm not, you know, proposing were geniuses or
David Monnier:anything like that. In fact, I can assure you we're not. But it
David Monnier:was interesting to us as intelligence practitioners, how
David Monnier:we saw the world as opposed to say, security practitioners. And
David Monnier:when you think about ASM, you think attack service management,
David Monnier:you automatically think in terms of security, but really what if
David Monnier:you really think about it, ASM is an intelligence tool. ASM is
David Monnier:is being self aware is some type of self aware intelligence
David Monnier:capability that you then key on to other capabilities to the
David Monnier:backup. So as you learn something new, aka as your
Dr. Dave Chatterjee:Another question that comes to mind
Dr. Dave Chatterjee:intelligence increases, you then have some action to do. So
Dr. Dave Chatterjee:perhaps it's vulnerability scan this device, perhaps it's
Dr. Dave Chatterjee:updated inventory management component, perhaps it's disable
Dr. Dave Chatterjee:the switch port that the device is plugged into, if you can,
Dr. Dave Chatterjee:because it wasn't plugged in there yesterday. And it's, you
Dr. Dave Chatterjee:know, not an authorized device. But any way you look at it, and
Dr. Dave Chatterjee:regardless of the outcome, that initial step really is an
Dr. Dave Chatterjee:intelligence step. And that was kind of surprising to us. And I
Dr. Dave Chatterjee:think it's a side effect of like I said, our approach has been
Dr. Dave Chatterjee:for lack of a better term intelligence applied to
Dr. Dave Chatterjee:security, as opposed to security applied to asset management. And
Dr. Dave Chatterjee:so because we kind of approached it from that step back, I think
Dr. Dave Chatterjee:we came up with different what I would call killer features, you
Dr. Dave Chatterjee:know, for something if we were going to make it and then the
Dr. Dave Chatterjee:end result when we went out looked to see, you know, to make
Dr. Dave Chatterjee:sure there was really nothing out there like it and discovered
Dr. Dave Chatterjee:there wasn't. We were kind of surprised by that. Because like
Dr. Dave Chatterjee:I said, we were you know, I wouldn't say we're late to the
Dr. Dave Chatterjee:party, but we definitely weren't first people in the ASM space.
Dr. Dave Chatterjee:based on attack reports that are published in the media, where
Dr. Dave Chatterjee:So that was kind of a surprise to us.
Dr. Dave Chatterjee:often times organizations are accused of not promptly reacting
Dr. Dave Chatterjee:or responding to alerts that they receive from various types
Dr. Dave Chatterjee:of monitoring tools, technologies, service providers,
Dr. Dave Chatterjee:various types of intelligence sources. So, going back to this
Dr. Dave Chatterjee:platform, the ASM platform, which obviously is there to help
Dr. Dave Chatterjee:organizations have a better understanding of their attack
Dr. Dave Chatterjee:surfaces provide advanced warning. Now, have you all
Dr. Dave Chatterjee:thought of a feature whereby, you know, there is some kind of
Dr. Dave Chatterjee:a logging that certain alerts certain notifications went
Dr. Dave Chatterjee:unheeded, or went unresponded? Or there is a, there's a way of
Dr. Dave Chatterjee:notifying multiple personnel just to make sure that this, the
Dr. Dave Chatterjee:signal doesn't get go unheard? Or do you see my question from
Dr. Dave Chatterjee:where I'm coming?
David Monnier:Yes, absolutely. And we have, so we're not trying
David Monnier:to reinvent the wheel at every turn. So an AR capability, we
David Monnier:have, obviously, incorporate the idea of external API's so that
David Monnier:you can trigger to, you know, specific systems, or if nothing
David Monnier:else, at least, have the notion of roles or groups within the
David Monnier:tool so that if a specific category of event happens,
David Monnier:notify a specific group of people. Exactly. Yeah, of
David Monnier:course, those capabilities are there. But what we really think
David Monnier:is one of the key differentiators, at least for
David Monnier:our approach is this ability for individuals to prioritize assets
David Monnier:themselves, so that you're not, so that you're not required to
David Monnier:react to every "high or critical event," because you know, not
David Monnier:every device is created equal, not every service is equal. And
David Monnier:frankly, there's only so much time in the day. And if you have
David Monnier:to pick between defend the mothership or defend a rowboat
David Monnier:out in the dock, you know, you're going to defend the
David Monnier:mothership, hopefully. So your tool, if it's not aware that is
David Monnier:going to be that's going to be a problem. So we've approached
David Monnier:them in the terms of both communication level, tuning,
David Monnier:group and role tuning. And then also asset prioritization tuning
David Monnier:as well.
Dr. Dave Chatterjee:Fantastic, because that's been one of my
Dr. Dave Chatterjee:concerns, one of my pet peeves, that if you have access to all
Dr. Dave Chatterjee:this intelligence, access to all these tools, you must have a
Dr. Dave Chatterjee:good governance system in place where you're paying heed to the
Dr. Dave Chatterjee:alarms that are being raised. Talking about governance, this
Dr. Dave Chatterjee:is my final two part question to you. Okay. So let's say an
Dr. Dave Chatterjee:organization decides to buy or invest in a new ASM platform, as
Dr. Dave Chatterjee:we all recognize that just investing in a tool is not good
Dr. Dave Chatterjee:enough to extract the maximum value from it. There is a people
Dr. Dave Chatterjee:aspect to the implementation, there's a process aspect to the
Dr. Dave Chatterjee:implementation. So if you had to make recommendations to
Dr. Dave Chatterjee:potential buyers, or investors of this platform, what does it
Dr. Dave Chatterjee:take to prepare the organization, so they can
Dr. Dave Chatterjee:effectively use such a platform, what would you say?
David Monnier:I have a very simple answer to your at least
David Monnier:the first part there, and that is the will to do something
David Monnier:about it. You mentioned compliance, regulatory typically
David Monnier:is that you know, these kinds of policy concerns are usually what
David Monnier:drive people implementing ASM solutions. And those external
David Monnier:drivers are rarely effective motivators, in fact, there are
David Monnier:whole own entities and organizations that carry
David Monnier:adequate insurance to pay the fines for non compliance,
David Monnier:because they wholly expect to be out of compliance because they
David Monnier:consider the compliance component, a burden. So the
David Monnier:first thing that I propose is that be willing to do something
David Monnier:with the findings, you know, don't approach ASM as a
David Monnier:something that you have to do because someone else said so.
David Monnier:But recognize that someone else said so because what you do is
David Monnier:important to the world, to society, to people, you know,
David Monnier:perhaps even you know, to relatives and things like that.
David Monnier:I mean, and think of the impact of what happens if you turn this
David Monnier:thing on and discover that you have something bad going on? A
David Monnier:lot of people are hesitant to turn on a tool like ASM because
David Monnier:they know what's going to come out the other side is going to
David Monnier:be something they're gonna have to do something about. And I'm
David Monnier:not saying that people are lazy, but I will tell you that only
David Monnier:bodies in motion tend to stay in motion, I think is the is the
David Monnier:adage, right? So if bodies aren't in motion to begin with
David Monnier:going and getting an ASM tool isn't going to set them in
David Monnier:motion at all. So my number one advice to anybody considering to
David Monnier:go down the path of implementation of ASM is one be
David Monnier:willing to do something that you find but number two, be willing
David Monnier:to actually use it because it's going to make your job easier,
David Monnier:it's going to make your life easier. And kind of taking the
David Monnier:ostrich, you know, head in the sand approach that doesn't help
David Monnier:anyone. And like I said, think of the people using the service.
David Monnier:Think of why it is that you're running the service to begin
David Monnier:with. Think of those people think of that money, think of
David Monnier:you know, whatever is the driver, but think of that stuff
David Monnier:and ask yourself, how important is this to everybody? And how
David Monnier:willing am I to keep it working and keep it going, and ensure
David Monnier:that willingness is present and communicated to all of your
David Monnier:staff, you know, if you have people, maybe as this tool turns
David Monnier:out work to do, if you have a bunch of other people there that
David Monnier:are going to have to be doing the actual work, make sure that
David Monnier:they understand make sure they are all bought in. But I know
David Monnier:that's a silly answer to a technical question, because it's
David Monnier:not technical at all, if you will, the answer is not
David Monnier:technical at all. It's it's human will. So sorry, that was a
David Monnier:very verbose thing to what I had warned was going to be a simple
David Monnier:answer, but simply have the will to do something about it.
Dr. Dave Chatterjee:Well, I think that's a very sound
Dr. Dave Chatterjee:advice. It's a very wise answer. And that's what most
Dr. Dave Chatterjee:organizations struggle with. It's the softer side of things
Dr. Dave Chatterjee:that organizations struggle with more than the harder side of
Dr. Dave Chatterjee:things, not trying to suggest that implementing technology
Dr. Dave Chatterjee:effectively is any easier, but providing the appropriate
Dr. Dave Chatterjee:governance, around technology implementation around leveraging
Dr. Dave Chatterjee:these tools can be equally if not more challenging. And I want
Dr. Dave Chatterjee:to reiterate what you said about having the will having the
Dr. Dave Chatterjee:commitment. In my book on Cybersecurity Readiness: A
Dr. Dave Chatterjee:Holistic and High- Performance Approach, one of the top
Dr. Dave Chatterjee:cybersecurity success factors, which I share in the context of
Dr. Dave Chatterjee:the framework that I propose is the top management commitment.
Dr. Dave Chatterjee:Another related factor is creating and sustaining a
Dr. Dave Chatterjee:We-Are-In-Together culture where everybody gets involved. This is
Dr. Dave Chatterjee:just not the SOC team that can make miracles happen. Everyone
Dr. Dave Chatterjee:has to play their role. So taking this example of the
Dr. Dave Chatterjee:attack surface management platform, obviously, specialists
Dr. Dave Chatterjee:will be running this platform, and they have to be adequately
Dr. Dave Chatterjee:trained. Because if you don't have good training, you can't
Dr. Dave Chatterjee:get most out of these platforms. But then, as you mentioned, when
Dr. Dave Chatterjee:you get those that feedback, and I love what you said,
Dr. Dave Chatterjee:oftentimes, we don't want to probe in a certain direction, or
Dr. Dave Chatterjee:we don't want to invest in certain things, because we don't
Dr. Dave Chatterjee:want to know what we don't know. You can go with it in many
Dr. Dave Chatterjee:different ways. I don't want any further education, because that
Dr. Dave Chatterjee:will enlighten me on my lack of awareness, right? Absolutely. So
Dr. Dave Chatterjee:so here we go in the context of ASM, you are investing in it
Dr. Dave Chatterjee:because you truly care. Because you truly want to do your part
Dr. Dave Chatterjee:in trying to secure as best as you can, we all understand that
Dr. Dave Chatterjee:you cannot secure everything and that you will never be in a
Dr. Dave Chatterjee:situation where your systems can't be compromised. But you
Dr. Dave Chatterjee:know, putting your best foot forward and doing everything you
Dr. Dave Chatterjee:can, and constantly monitoring these devices constantly making
Dr. Dave Chatterjee:sure you have an oversight team, you have a incident response
Dr. Dave Chatterjee:team or why by whatever name, you may want to call this team.
Dr. Dave Chatterjee:Bottom line, again, it boils down to asking yourself, the
Dr. Dave Chatterjee:fundamental question we've invested in this platform, are
Dr. Dave Chatterjee:we making full use of it? Are we getting what we wanted from it?
Dr. Dave Chatterjee:And if there is a deficiency, what is it? And how do we
Dr. Dave Chatterjee:address it? So that kind of active proactive approach is so
Dr. Dave Chatterjee:so critical. So David, we're running out of time, I'd like
Dr. Dave Chatterjee:you to share some final thoughts.
David Monnier:Yeah, so much of what we've said today, probably
David Monnier:sounds somewhat elementary to folks. And I'd ask everybody to
David Monnier:kind of consider why that is, like, why does something so
David Monnier:obvious, or seemingly obvious, you know, once it's explained to
David Monnier:you, why is it still so rare? And why is it? Why is it's not
David Monnier:happening in broader scale? And we should ask ourselves these
David Monnier:questions, because we are the people who are the solution,
David Monnier:right? Even if we're just the user, we can go ask the provider
David Monnier:and say, Hey, why are you why are if you're not doing this?
David Monnier:Why Why aren't you and start to kind of apply that, you know,
David Monnier:upward pressure and everything that we're doing, because, like
David Monnier:I said, we're all reliant on technology, this is not going to
David Monnier:go away. I mean, barring some type of Corona event where you
David Monnier:know, we have a sun flare, knock everything out, you know, we're
David Monnier:we're in this for the long haul, you know, capitalism alone is
David Monnier:going to drive things towards lower cost solutions. I mean,
David Monnier:that's just that, that's the direction of that energy. And if
David Monnier:we're not looking at it as an I don't, I'm not trying to paint a
David Monnier:dire picture. But if we don't I paint it as a very, very serious
David Monnier:component of our entire existence, I fear that we're
David Monnier:going to miss something. So when it is that, you know, someone
David Monnier:comes along and kind of upsets a space, arguably, as we have with
David Monnier:these new capabilities, we should ask ourselves, why why
David Monnier:why is that? And? And if that was like that, what more could
David Monnier:we be doing? And of those, what more's, how many of those things
David Monnier:are unknown. So like, if you're out there, and you have an idea,
David Monnier:you think like, oh, man, you could even then go add on to X,
David Monnier:Y, or Z, share that idea, or start up in a solution, because
David Monnier:frankly, the world needs it. We're getting more and more
David Monnier:reliant on technology, more and more of our whole life, data
David Monnier:wise, is stored electronically. And for us to be such so reliant
David Monnier:on something that's seemingly under constant attack and
David Monnier:continuously growing, and just, you know, out of hand, we should
David Monnier:be asking, you know, is everything being done that we
David Monnier:could, and I don't mean just asking of ourselves, but like I
David Monnier:said, we should be asking the people that we take services
David Monnier:from, you know, what are you doing to secure my things that
David Monnier:you, you know, have possession of? So I know, again, that's
David Monnier:kind of, you know, the lofty answer, but I think it really
David Monnier:does, it comes down to mass participation, like you said,
David Monnier:it's that we can do attitude, it's absolutely critical. We're
David Monnier:all subject to the technology. So let's at least make it work
David Monnier:to our will. And that's, that's what I think would be a bright
David Monnier:future. And if everybody got involved, including just every
David Monnier:user, so absolutely,
Dr. Dave Chatterjee:Absolutely! Well, David, this was great.
Dr. Dave Chatterjee:Thanks for your time, for your insights, I know the listeners
Dr. Dave Chatterjee:appreciate it.
David Monnier:Thank you Dr.
Dr. Dave Chatterjee:A special thanks to David Monnier for his
Dr. Dave Chatterjee:time and insights. If you like what you heard, please leave the
Dr. Dave Chatterjee:podcast a rating and share it with your network. Also,
Dr. Dave Chatterjee:subscribe to the show, so you don't miss any new episodes.
Dr. Dave Chatterjee:Thank you for listening, and I'll see you in the next
Dr. Dave Chatterjee:episode.
Introducer:The information contained in this podcast is for
Introducer:general guidance only. The discussants assume no
Introducer:responsibility or liability for any errors or omissions in the
Introducer:content of this podcast. The information contained in this
Introducer:podcast is provided on an as-is basis with no guarantee of
Introducer:completeness, accuracy, usefulness, or timeliness. The
Introducer:opinions and recommendations expressed in this podcast are
Introducer:those of the discussants and not of any organization.