Welcome to the Cybersecurity Readiness Podcast Site
March 2, 2022

A Deep Dive into Ransomware Attacks and Negotiations

Art Ehuan, Vice President, Palo Alto Networks, and Former FBI Special Agent, discusses at length the unfortunate evolution and escalation of ransomware attacks. He explains how the threat actors have upped their game and are now engaging in double, triple, and quadruple extortions. While lamenting that "organizations continue to make the same mistakes," Art also acknowledges the challenges of vulnerability management. He offers some interesting insights into ransomware negotiations and provides excellent advice and recommendations on how to proactively thwart such attacks.

To access and download the entire podcast summary with discussion highlights --

https://www.dchatte.com/episode-20-a-deep-dive-into-ransomware-attacks-and-negotiations/

Art Ehuan, Vice President, Palo Alto Networks, and Former FBI Special Agent, discusses at length the unfortunate evolution and escalation of ransomware attacks. He explains how the threat actors have upped their game and are now engaging in double, triple, and quadruple extortions. While lamenting that "organizations continue to make the same mistakes," Art also acknowledges the challenges of vulnerability management. He offers some interesting insights into ransomware negotiations and provides excellent advice and recommendations on how to proactively thwart such attacks.

To access and download the entire podcast summary with discussion highlights --

https://www.dchatte.com/episode-20-a-deep-dive-into-ransomware-attacks-and-negotiations/

 

Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast

Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks.

Connect with Dr. Chatterjee on these platforms:

LinkedIn: https://www.linkedin.com/in/dchatte/

Website: https://dchatte.com/

Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338

Transcript
Introducer:

Welcome to the Cybersecurity Readiness Podcast



Introducer:

Series with Dr. Dave Chatterjee, Dr. Chatterjee is the author of



Cybersecurity Readiness:

A Holistic and High-Performance



Cybersecurity Readiness:

approach. He has been studying cybersecurity for over a decade,



Cybersecurity Readiness:

authored and edited scholarly papers, delivered talks,



Cybersecurity Readiness:

conducted webinars, consulted with companies, and served on a



Cybersecurity Readiness:

cybersecurity SWAT team with Chief Information Security



Cybersecurity Readiness:

officers. Dr. Chatterjee is an Associate Professor of



Cybersecurity Readiness:

Management Information Systems at the Terry College of



Cybersecurity Readiness:

Business, the University of Georgia, and Visiting Professor



Cybersecurity Readiness:

at Duke University's Pratt School of Engineering.



Dr. Dave Chatterjee:

Hello, everyone, I'm delighted to



Dr. Dave Chatterjee:

welcome you to this episode of the Cybersecurity Readiness



Dr. Dave Chatterjee:

Podcast Series. Today, I have the pleasure of talking with Art



Dr. Dave Chatterjee:

Ehuan, Vice President of Palo Alto Networks, Art has extensive



Dr. Dave Chatterjee:

experience in the field of cybersecurity. Having worked



Dr. Dave Chatterjee:

both in the public and private sector to share a few highlights



Dr. Dave Chatterjee:

of his work experience and expertise. As Vice President at



Dr. Dave Chatterjee:

Palo Alto Networks, Art manages federal and international



Dr. Dave Chatterjee:

customer relationships. He provides cybersecurity advisory



Dr. Dave Chatterjee:

services to board of directors, chief information security



Dr. Dave Chatterjee:

officers, chief risk officers and senior management of risk



Dr. Dave Chatterjee:

mitigation. Art has also been retained as a cybersecurity



Dr. Dave Chatterjee:

expert for matters that include Marriott, international, Capital



Dr. Dave Chatterjee:

One, Equifax, Anthem, Sony and others. He has also been



Dr. Dave Chatterjee:

involved in cybersecurity operations in organizations such



Dr. Dave Chatterjee:

as USAA, Cisco Systems, and he has served with the Federal



Dr. Dave Chatterjee:

Bureau of Investigation as a supervisory special agent in



Dr. Dave Chatterjee:

computer crime investigations. Last but not least, Art is a



Dr. Dave Chatterjee:

colleague of mine, at Duke University's Master of



Dr. Dave Chatterjee:

Engineering in cybersecurity program, where he'll be teaching



Dr. Dave Chatterjee:

a class on security, incident response, and resilience. Our



Dr. Dave Chatterjee:

discussion today will focus on ransomware attacks. And I can't



Dr. Dave Chatterjee:

think of a better person than Art to discuss this topic, and



Dr. Dave Chatterjee:

more. So I'm sure we are all excited to hear from him.



Dr. Dave Chatterjee:

Without any further ado, Art, welcome.



Art Ehuan:

Thank you, Dave, appreciate the opportunity to



Art Ehuan:

speak with you and the audience about what what I'm seeing in



Art Ehuan:

the world of ransomware, which unfortunately, has exploded in



Art Ehuan:

the past couple of years. And I anticipate will continue to grow



Art Ehuan:

as the the threats to corporations continues to



Art Ehuan:

increase.



Dr. Dave Chatterjee:

Before we started the recording, you made



Dr. Dave Chatterjee:

the statement that "companies keep making the same mistakes."



Dr. Dave Chatterjee:

Tell us more about it.



Art Ehuan:

Yeah, so you know, some of the basic things, some



Art Ehuan:

of the the hygiene that you would expect to see in



Art Ehuan:

organizations, for whatever reason, sometimes aren't done



Art Ehuan:

right, so I'm specifically I'm going to mention patch



Art Ehuan:

management, right? Because, I mean, attackers have several



Art Ehuan:

ways of getting into an organization, you know, it can



Art Ehuan:

be through a phishing attack, it could be through through, you



Art Ehuan:

know, an attack on credentials. But another way, obviously, is



Art Ehuan:

through vulnerabilities and systems. And if those system



Art Ehuan:

vulnerabilities exist, an attacker can leverage that to



Art Ehuan:

access the network. So that highlights to me the importance



Art Ehuan:

of hygiene around patch management, you know, making



Art Ehuan:

sure that you've got a vulnerability management



Art Ehuan:

program, and that you implement it so that as vulnerabilities



Art Ehuan:

are identified on systems, you're you're patching them in



Art Ehuan:

in a timely fashion. Now, having said that, and having been on a



Art Ehuan:

on the back end of corporations where I'd been CISO or acting



Art Ehuan:

CISO, sometimes it can be difficult, right? Because



Art Ehuan:

there's so many dependencies in in systems that maybe if you do,



Art Ehuan:

you know, put a patch into a system without appropriate



Art Ehuan:

testing, you're potentially going to break something where



Art Ehuan:

your customers are no longer able to access your data. Or you



Art Ehuan:

may create additional vulnerabilities. So you close



Art Ehuan:

one vulnerability but you create additional vulnerabilities



Art Ehuan:

downstream. So I do understand that you need to be careful when



Art Ehuan:

identifying vulnerabilities and conducting patch management, but



Art Ehuan:

there are vulnerabilities, certain vulnerabilities, like



Art Ehuan:

the recent Log4j, that are so critical that you absolutely



Art Ehuan:

have to patch those systems, especially on the perimeter. And



Art Ehuan:

then I've been talking to companies here, since that that



Art Ehuan:

Log4j vulnerability was posted in, you know, to me, it's one of



Art Ehuan:

the largest vulnerabilities I've seen in a very, very, very long



Art Ehuan:

time, just because of the potential for an attacker to



Art Ehuan:

access the corporation with, you know, potentially leaving little



Art Ehuan:

trace evidence, right. So, in my discussions with companies, I



Art Ehuan:

mean, especially the large companies, they were immediately



Art Ehuan:

looking at identifying where that vulnerability existed, and



Art Ehuan:

then trying to patch it without breaking anything, at least at



Art Ehuan:

the perimeter. And then now companies I see are now trying



Art Ehuan:

to go in the back end, because this vulnerability, even if



Art Ehuan:

patched at the at the perimeter, if it exists in your back end



Art Ehuan:

systems, it's still vulnerable. And, you know, one of the things



Art Ehuan:

that I do hear from, from organizations is, I don't



Art Ehuan:

understand what my environment looks like a complex environment



Art Ehuan:

on the backend, or some of these these questions come up, you



Art Ehuan:

know, with customers that, you know, they need help, right,



Art Ehuan:

they need assistance in identifying what the data flow



Art Ehuan:

looks like, what the network looks like. So it isn't easy.



Art Ehuan:

And I I will, I will always agree when, when the CISO says



Art Ehuan:

it's hard, I absolutely agree it's hard. But there are certain



Art Ehuan:

things that in my opinion, patch management, you just have to be



Art Ehuan:

doing it right. Especially, especially critical



Art Ehuan:

vulnerabilities. It's one of the things that we need to put, you



Art Ehuan:

know, those those appropriate controls in place to protect,



Art Ehuan:

you know, when a critical vulnerability is identified.



Dr. Dave Chatterjee:

Fair enough, fair enough. So let's



Dr. Dave Chatterjee:

back up a little bit. For the benefit of our listeners, if you



Dr. Dave Chatterjee:

would explain what ransomware attack is, what's the threat



Dr. Dave Chatterjee:

landscape Like? Who are the threat actors? That would be



Art Ehuan:

Oh, absolutely. Okay. So I'll start with Yeah, what is



Art Ehuan:

very beneficial.



Art Ehuan:

ransomware. Ransomware is is a an attack, that a threat actor



Art Ehuan:

will conduct and that threat actor, usually an organized



Art Ehuan:

crime or some criminal group. And now, I'm not, I won't say



Art Ehuan:

never going to be a nation- state, because you could



Art Ehuan:

potentially have a nation-state masking their activity as a



Art Ehuan:

ransomware attack when they're actually burrowing into your



Art Ehuan:

infrastructure. But a ransomware attack is an attack that is



Art Ehuan:

designed to encrypt systems encrypt data, so you no longer



Art Ehuan:

have access either to the systems or your data. Now,



Art Ehuan:

what's happened in the past, say year or two, is that the threat



Art Ehuan:

actors as they've come to the realization that some companies



Art Ehuan:

are able to recover on their own right, they're able to recover



Art Ehuan:

their systems, because they do a real good backup process of, you



Art Ehuan:

know, real good disaster recovery process, you know, and



Art Ehuan:

thus, are not inclined then to to conduct negotiations with the



Art Ehuan:

threat actor to pay them to get access to their systems, what



Art Ehuan:

the threat actors are now doing is they've upped their game. And



Art Ehuan:

by that, I mean, what they now do is along with encrypting your



Art Ehuan:

systems and your data, they're doing now something called



Art Ehuan:

double extortion. They're also stealing your data before they



Art Ehuan:

encrypt it. And now they're forcing you to negotiate. Even



Art Ehuan:

if you can recover your systems on your own, even if you can



Art Ehuan:

recover your data on your own with your backups and your



Art Ehuan:

disaster recovery business continuity plan, you are still



Art Ehuan:

forced to negotiate a to get an agreement from them that they're



Art Ehuan:

not going to post that, you know, customer data that you



Art Ehuan:

know, protected health information out on the internet,



Art Ehuan:

so and then now they've even increased that tempo, because



Art Ehuan:

now the threat actors are going to triple extortion where



Art Ehuan:

they're encrypting system data, they're stealing data. And



Art Ehuan:

they're launching a denial of service attack on you so that



Art Ehuan:

your businesses no longer able to function. And then we're now



Art Ehuan:

seeing something called quadruple extortion, where



Art Ehuan:

they're doing all three of those, but they're adding the



Art Ehuan:

element that they're not communicating with your



Art Ehuan:

customers whose data they have, and telling them your that your



Art Ehuan:

customers or your patients, hey, we've got your data we breached



Art Ehuan:

you know the organization and we're gonna post this



Art Ehuan:

information to the internet. You might want to talk to you know,



Art Ehuan:

your company that has this, that who, from whom the data we stole



Art Ehuan:

and tell them to do the right thing and pay us, right. So, you



Art Ehuan:

know, now they're putting that pressure on the company, because



Art Ehuan:

now they're notifying the victims as well, that they've



Art Ehuan:

got your data so. So they really, you know, upped their



Art Ehuan:

game in, in a sense, because, you know, they're really forcing



Art Ehuan:

an organization to negotiate and make some kind of payment to get



Art Ehuan:

those assurances that, you know, they're going to stop that



Art Ehuan:

activity. So yeah, the number of matters, I, you know, that we



Art Ehuan:

see now, every year, they're increasing and they continue to



Art Ehuan:

increase. I certainly, in as I look at the future, I certainly



Art Ehuan:

don't see a future where I'm saying, hey, ransomware is going



Art Ehuan:

to come down, there's just so much money to be made, right.



Art Ehuan:

And these threat actors have identified that there's a lot of



Art Ehuan:

money to be made. So it's, it's a very cost effective way to



Art Ehuan:

commit crime and make make money.



Dr. Dave Chatterjee:

I was just reading an article, where it



Dr. Dave Chatterjee:

states that there's a severe increase in ransomware attacks,



Dr. Dave Chatterjee:

that cybersecurity authorities from Australia, the United



Dr. Dave Chatterjee:

Kingdom, United States, have published a joint advisory



Dr. Dave Chatterjee:

warning of an increase in sophisticated high impact



Dr. Dave Chatterjee:

ransomware attacks targeting critical infrastructure



Dr. Dave Chatterjee:

organizations across the world. And that's what concerns me



Dr. Dave Chatterjee:

means you don't want ransomware attack on anyone, individuals or



Dr. Dave Chatterjee:

organizations. But I especially worried about the critical



Dr. Dave Chatterjee:

infrastructure, you know, you were candid enough to say that



Dr. Dave Chatterjee:

it's difficult, it's not an easy task, to be super protected, to



Dr. Dave Chatterjee:

do the kinds of patch management and other things that needs to



Dr. Dave Chatterjee:

be done. But having said that, given the severe consequences of



Dr. Dave Chatterjee:

these attacks, what are you finding out there, both public



Dr. Dave Chatterjee:

sector and private sector? What is the level of preparedness?



Art Ehuan:

Yeah, so I think it's going to depend on an industry



Art Ehuan:

Dave, you know, especially critical infrastructure, you



Art Ehuan:

know, there's more regulation around financial services around



Art Ehuan:

energy. So typically, organizations that fall under



Art Ehuan:

some kind of regulatory regime, typically, you know, are putting



Art Ehuan:

more of an investment in protecting the organization.



Art Ehuan:

Also organizations where there's more Board involvement, more,



Art Ehuan:

you know, governance and oversight, because, you know, in



Art Ehuan:

my opinion, especially with, with publicly traded companies,



Art Ehuan:

you know, they have a Board, for instance, if there's an engaged



Art Ehuan:

Board, that's asking questions of the cybersecurity program on



Art Ehuan:

a regular basis, that's gonna, you know, I think for the C-



Art Ehuan:

level, that shows that, you know, the Board is very



Art Ehuan:

interested in this, we, as the C-level, obviously have to also



Art Ehuan:

support those types of activities and make sure that



Art Ehuan:

they get the appropriate funding, they get the



Art Ehuan:

appropriate resources that are needed. Now, again, there's



Art Ehuan:

always outliers, right. So,and by that, I mean, you know,



Art Ehuan:

companies, you know, they're, they exist, obviously, to, to,



Art Ehuan:

to generate revenue, right? I mean, they, they produce a



Art Ehuan:

product, or they provide a service and for the purpose of



Art Ehuan:

generating revenue. Sometimes, you know, if you're in a



Art Ehuan:

particular industry, and, and, and you're trying to make a



Art Ehuan:

determination, do I, you know, do I put more money into cyber,



Art Ehuan:

or do I put more money into customer satisfaction, you know,



Art Ehuan:

that's sometimes that's a hard one, right? Because you've got



Art Ehuan:

limited dollars, and, and trying to make that decision is



Art Ehuan:

sometimes difficult, right? If you're the CEO, you know, you



Art Ehuan:

want to do the right thing, make sure the company is protected.



Art Ehuan:

But you also want to make sure that your customers are happy



Art Ehuan:

and you're doing everything, you know, possible to, to provide



Art Ehuan:

those either products or services. So, sometimes that's a



Art Ehuan:

very difficult balancing act for, you know, executives, right



Art Ehuan:

to, to have to manage, right, because in a perfect world, they



Art Ehuan:

would, they would have enough funding for everything, but it's



Art Ehuan:

never perfect world and there's always going to be that



Art Ehuan:

push-pull inside of an organization, you know, the



Art Ehuan:

site, really, the cyber organization is going to be



Art Ehuan:

asking for money and resources, you know, and operations is



Art Ehuan:

asking for money and resources and the CEOs, you know, got a



Art Ehuan:

limited budgets to work with and, you know, he's trying to do



Art Ehuan:

the right thing, you know, to maybe, you know, keep both



Art Ehuan:

constituents happy, right. I make sure that I'm protected and



Art Ehuan:

I make sure my, my customers are happy and and it's a It's a



Art Ehuan:

balancing act. And I think that's why it's important, you



Art Ehuan:

know, to have that governance and oversight with with, with



Art Ehuan:

the board, you know, so that they can provide you know that



Art Ehuan:

you know that that top level guidance to the organization.



Dr. Dave Chatterjee:

You know, you talk about governance,



Dr. Dave Chatterjee:

oversight, regulation. It brings to mind Sarbanes Oxley Sox. As



Dr. Dave Chatterjee:

you might know, Sarbanes Oxley was introduced when fraudulent



Dr. Dave Chatterjee:

accounting transactions were taking place. Yep. And there



Dr. Dave Chatterjee:

wasn't that level of top management commitment to ensure



Dr. Dave Chatterjee:

that those kinds of activities didn't happen. So it took



Dr. Dave Chatterjee:

legislation to get senior leadership attention. Yeah. And



Dr. Dave Chatterjee:

it's my hunch that we are going that way, even with cyber, there



Dr. Dave Chatterjee:

are some regulations out there existing laws are being used to



Dr. Dave Chatterjee:

regulate cyber activities or to provide reasonable oversight,



Dr. Dave Chatterjee:

you know, but I almost feel that there's going to be a major



Dr. Dave Chatterjee:

legislation which will come down the pipe, and that's going to



Dr. Dave Chatterjee:

really get everybody's attention, because like you



Dr. Dave Chatterjee:

said, it is a hard balance for the CEO. Yeah, yeah. But then if



Dr. Dave Chatterjee:

you have that regulatory pressure, the regulatory burden,



Dr. Dave Chatterjee:

that would force you to do the right thing when it comes to



Dr. Dave Chatterjee:

cybersecurity competency, cybersecurity due diligence. And



Dr. Dave Chatterjee:

I know, this is easier said than done, it's a great conversation



Dr. Dave Chatterjee:

to have, but for people who are trying to make things happen,



Dr. Dave Chatterjee:

it's a it's a tough ask. Given your experience, you know,



Dr. Dave Chatterjee:

you've been industry you've actively engaged with the senior



Dr. Dave Chatterjee:

leadership, have you seen any best practice out there, or any



Dr. Dave Chatterjee:

exemplars where irrespective of the directors, irrespective of



Dr. Dave Chatterjee:

Board oversight, there is a conscious commitment, it's like,



Dr. Dave Chatterjee:

woven into the organizational culture, that we must create and



Dr. Dave Chatterjee:

sustain a high performance Information Security Culture,



Dr. Dave Chatterjee:

have you seen evidence of that? Oh, absolutely.



Art Ehuan:

Yes, I certainly see it, you know, again, especially



Art Ehuan:

with the large organizations that, you know, have, you know,



Art Ehuan:

have a dedicated program, right. So, it is possible, I will say



Art Ehuan:

that a cybersecurity program is a dynamic thing, right? It's a



Art Ehuan:

living to me, it's a living thing, that that is always



Art Ehuan:

changing as the threat evolves, right, because, as I mentioned



Art Ehuan:

earlier with ransomware, right, you know, as as, as



Art Ehuan:

organizations put up defenses, the threat actors, you know, put



Art Ehuan:

up countermeasures, right to to get around those defenses. So,



Art Ehuan:

cybersecurity can never be static. And and if it's static,



Art Ehuan:

then I, I fear that a company may be is not, you know,



Art Ehuan:

thinking about the, the, you know, the the, how would I say



Art Ehuan:

the evolving nature of cyber threats, and because of the



Art Ehuan:

evolving nature of cyber threats, you've got to have a



Art Ehuan:

dynamic program and to me, a dynamic program, you know, you



Art Ehuan:

would have one, you would have a program that follows a



Art Ehuan:

recognized cybersecurity standard or framework and, and



Art Ehuan:

I'll throw out, I'll throw out like the NIST cybersecurity



Art Ehuan:

framework, right? It's been around since 2014. It's, it's, I



Art Ehuan:

recently saw some statistics that over 50% of large



Art Ehuan:

corporations are adhering to to that framework, right? Because



Art Ehuan:

that framework gives you a baseline right? The NIST



Art Ehuan:

cybersecurity framework is designed to establish a baseline



Art Ehuan:

and then also assist an organization in determining what



Art Ehuan:

is the future state of the cybersecurity program look like?



Art Ehuan:

But what I really like about it is again, it's dynamic in nature



Art Ehuan:

in that you never reach a state where you're completely happy



Art Ehuan:

and I will never be breached because again, we've got to stay



Art Ehuan:

dynamic, and there is NIST, you've got the the ISO 27001 two



Art Ehuan:

series, you've got the the CIS 20. So there's a number of



Art Ehuan:

standards out there but to me, when I'm looking at an



Art Ehuan:

organization, I'm gonna say okay, this organization is, is



Art Ehuan:

on track they're thinking you You know, they're putting that



Art Ehuan:

security mindset. I look to see if they've got Are they are they



Art Ehuan:

mapping to one of these recognized cybersecurity



Art Ehuan:

standards? Now, you brought up the the regulatory regime.



Art Ehuan:

Having worked with having worked with regulators in the past,



Art Ehuan:

right been hired as a kind of an expert advisor to regulators,



Art Ehuan:

when they're when they're conducting an investigation or



Art Ehuan:

analysis of a regulated company. I will tell you, the regulators



Art Ehuan:

are using the NIST CSF as their model to assess companies. And



Art Ehuan:

then even more recently, the US Department of Defense, they,



Art Ehuan:

they actually released a a something called the CMMC, the



Art Ehuan:

Cybersecurity Maturity Models Certification. That is a



Art Ehuan:

requirement for organizations that are doing business with the



Art Ehuan:

US Department of Defense to follow the CMMC. In order for



Art Ehuan:

them to be able to do business with the Department of Defense,



Art Ehuan:

I would anticipate as I look at the the CMMC. As its



Art Ehuan:

effectiveness grows, I potentially would forecast that



Art Ehuan:

other agencies within the United States government, Homeland



Art Ehuan:

Security or Veterans Affairs, I would see other organizations



Art Ehuan:

potentially adopting this similar model where they will



Art Ehuan:

say to organizations, if you're going to do business with us,



Art Ehuan:

you have to go through this, this this accreditation, and get



Art Ehuan:

certified in order to do business with us. So again, that



Art Ehuan:

adds more of that kind of, you know, kind of a regulatory type



Art Ehuan:

type spin for organizations that I would envision would, would



Art Ehuan:

flow down to to to the corporate sector.



Dr. Dave Chatterjee:

You're talking about frameworks, and



Dr. Dave Chatterjee:

there are several out there. And I've had, I've had the



Dr. Dave Chatterjee:

opportunity to review them when I was authoring my book. They're



Dr. Dave Chatterjee:

all great frameworks. Yeah. But what I have found from my work,



Dr. Dave Chatterjee:

is there's a significant variance in how these



Dr. Dave Chatterjee:

organizations follow the framework. How disciplined is



Dr. Dave Chatterjee:

their approach in following in complying with or following



Dr. Dave Chatterjee:

through with the guidelines? You know, often I have seen, it's



Dr. Dave Chatterjee:

like, let's check the box here. Yeah, you're supposed to offer



Dr. Dave Chatterjee:

this kind of training, we have done it, move on, as opposed to



Dr. Dave Chatterjee:

going deeper, and making sure the training is substantive, it



Dr. Dave Chatterjee:

is year round, it is continuous. So that's where I have seen a



Dr. Dave Chatterjee:

difference between having frameworks and the frameworks,



Dr. Dave Chatterjee:

guiding cybersecurity operations, and truly following



Dr. Dave Chatterjee:

the framework in a very disciplined and committed



Dr. Dave Chatterjee:

manner. And there being some oversight to ensure that the



Dr. Dave Chatterjee:

compliance is thorough, the compliance is meticulous, what



Dr. Dave Chatterjee:

have you seen? Dave, I



Art Ehuan:

will agree with you that, that I mean, to me a



Art Ehuan:

framework is is only as good as the the implementation and as



Art Ehuan:

good as the, the following of that framework, right? Because



Art Ehuan:

yeah, so I completely agree with you. I mean, I've seen, I've



Art Ehuan:

seen plenty of organizations that are, you know, that are,



Art Ehuan:

you know, box checking, and they suffer a breach. Because when



Art Ehuan:

you get past the box checking, they're not, you know, they



Art Ehuan:

haven't actually implemented correctly, right. So, so it's



Art Ehuan:

more than just checking the box, if you're just checking a box,



Art Ehuan:

in my opinion, you're not meeting the, you know, maybe



Art Ehuan:

you're meeting the spirit of the framework, but you're not



Art Ehuan:

actually doing what you really need to be doing to ensure the



Art Ehuan:

security of the organization. So, yeah, I mean, when I think



Art Ehuan:

of frameworks, right, so, so PCI, right, that's a framework



Art Ehuan:

for organizations that handle credit card data. I have seen



Art Ehuan:

many, many, a organization that are PCI compliant, they've



Art Ehuan:

checked off the box that have suffered breaches. And us you



Art Ehuan:

know, the questions asked, well, they, they they've been



Art Ehuan:

accredited, you know, by by an assessor and they, you know, all



Art Ehuan:

the boxes are checked off, yet they still suffered the breach.



Art Ehuan:

It's because we didn't do that deeper digging. Unfortunately,



Art Ehuan:

so if, if you're just looking to hey, you know, I'm gonna follow



Art Ehuan:

this and you know, so I can check off the boxes. Maybe in



Art Ehuan:

spirit, you know, you're following the framework, but you



Art Ehuan:

certainly are doing good Cybersecurity, you're you're



Art Ehuan:

not, you know, you're not going deeper than just checking a box.



Art Ehuan:

So I yeah, I, I can't tell you the number of organizations that



Art Ehuan:

I've seen that have checked off the boxes and they still suffer



Art Ehuan:

a breach. And then when you're doing the analysis, you you when



Art Ehuan:

you dig in, it's like, okay, you checked off a box, but you



Art Ehuan:

didn't do these things, you know, these, these, these things



Art Ehuan:

underneath that box that does allow and contributed to the



Art Ehuan:

breach to occur.



Dr. Dave Chatterjee:

Exactly. In fact, talking about PCI



Dr. Dave Chatterjee:

standard, it brings back memories of a major breach that



Dr. Dave Chatterjee:

happened several years ago, I don't want to name the



Dr. Dave Chatterjee:

organization. But there was detailed reports and of the



Dr. Dave Chatterjee:

findings. And one of the very concerning finding was they were



Dr. Dave Chatterjee:

warned by their auditors, that they were not in compliance with



Dr. Dave Chatterjee:

most of the PCI standards. Yeah. And they did nothing about it.



Dr. Dave Chatterjee:

Sure. So I'm sure all kinds of things are happening there. And



Dr. Dave Chatterjee:

it again, goes back to what we started the discussion with.



Dr. Dave Chatterjee:

Like, why are companies making the same mistakes over and over



Dr. Dave Chatterjee:

again, you shared with us the challenges that senior



Dr. Dave Chatterjee:

executives face. But at the same time, there is this reality of



Dr. Dave Chatterjee:

ransomware type attacks that keep getting more sophisticated.



Dr. Dave Chatterjee:

And it's a it's a game that's hard to win. Yeah. So going back



Dr. Dave Chatterjee:

to ransomware attacks. Let's talk a little bit about what



Dr. Dave Chatterjee:

does a ransomware negotiation look like? Not that I'm a fan of



Dr. Dave Chatterjee:

ransomware negotiations. In fact, I think the recommendation



Dr. Dave Chatterjee:

is not to negotiate. But please share with the listeners your



Dr. Dave Chatterjee:

thoughts.



Art Ehuan:

Yeah. So and I will agree with you, you know, I I'm



Art Ehuan:

not a fan of paying a criminal to get access to your systems



Art Ehuan:

and your data. I certainly, you know, don't support it, but



Art Ehuan:

there are occasions where a customer will say I have no



Art Ehuan:

other choice, I, my systems, my backups are encrypted. And you



Art Ehuan:

know, I need my data in healthcare provider, right, you



Art Ehuan:

can't be down. So there's certain industries that



Art Ehuan:

absolutely cannot be down, they've got to be up, you know,



Art Ehuan:

for public safety. And they've got no other recourse. So if



Art Ehuan:

that occurs, then, you know, you you contact the threat actor,



Art Ehuan:

and again, these communications are taking place on the the Dark



Art Ehuan:

Web, right, they give you an address where you can contact



Art Ehuan:

them, they tell you what they're looking for, you know, you you



Art Ehuan:

get an understanding of you know, what kind of payment



Art Ehuan:

they're looking to be made. And you know, it's a, it's literally



Art Ehuan:

a back and forth, you want to have, you want to get a proof



Art Ehuan:

that they really do have the keys, you know, you you provide



Art Ehuan:

them with, with a file that's encrypted, then you know, the



Art Ehuan:

contents of that file they get it they they unencrypt it and



Art Ehuan:

send it back to you so that you know that indeed they do have



Art Ehuan:

the key. You know, and then you're you're you're negotiating



Art Ehuan:

a price, right, that everyone can agree to once that that



Art Ehuan:

agreement is made, you know, payment is made in



Art Ehuan:

cryptocurrency, you know, you name the cryptocurrency and you



Art Ehuan:

know, payments made after you've got the the guarantees, you



Art Ehuan:

know, from if they're if cyber insurance is gonna pay or, you



Art Ehuan:

know, the law firms, the customer, and then you help with



Art Ehuan:

the payment. One of the other things I need to real quickly



Art Ehuan:

bring up as well though is if, if this is going to occur if if



Art Ehuan:

contact with a threat actor is going to take place, at least in



Art Ehuan:

the US, because of the you know, US Treasury requirements, you



Art Ehuan:

know, a checks have to be made. And they're typically made by,



Art Ehuan:

you know, the, the insurance company by the by the law firm,



Art Ehuan:

to see if the the threat actor group is potentially a sanction



Art Ehuan:

group. So, as an example, REvil was the sanction group. So, a in



Art Ehuan:

a in American organization, American corporation could find



Art Ehuan:

themselves in legal jeopardy. For instance, if they were to,



Art Ehuan:

you know, make payment to to one of these sanction groups. So, so



Art Ehuan:

checking, checking the sanction list to make sure it's not a



Art Ehuan:

sanction group is going to be very important. But again, it's



Art Ehuan:

that communication back and forth. Getting assurance that



Art Ehuan:

indeed they have the key, making payment, getting a copy of the



Art Ehuan:

key, analyzing that key to make sure it doesn't contain anything



Art Ehuan:

that potentially is going to be nefarious try it, you want to



Art Ehuan:

make sure that the key in using the key and potentially download



Art Ehuan:

additional payloads and then helping the organization start



Art Ehuan:

unencrypting. One of the things I want to point out that I think



Art Ehuan:

a lot, especially a lot of executives, a lot of, I think



Art Ehuan:

Boards, there's this view up there, okay, this happens, I get



Art Ehuan:

a ransomware attack, we pay and, you know, we get the key. And,



Art Ehuan:

you know, the next day, we're up in, in, in, in back in



Art Ehuan:

operation. You know, unfortunately, that's, uh, I



Art Ehuan:

want to dispel that myth that, you know, you get the key and



Art Ehuan:

you're back in operation, you know, the next day, it typically



Art Ehuan:

is going to take several days, even when you get the key.



Art Ehuan:

Because, you know, you want to make sure that your systems that



Art Ehuan:

you're recovering don't contain any backdoors. In some cases,



Art Ehuan:

organizations are building a greenfield a clean environment



Art Ehuan:

to go into. So it's, it's typically multiple days,



Art Ehuan:

especially larger organization multiple weeks, multiple months,



Art Ehuan:

as you're restoring backed operation. So, so even when



Art Ehuan:

payment is made.



Dr. Dave Chatterjee:

It is it is



Art Ehuan:

not as quick as you know, I'm up and running the



Art Ehuan:

next day, and everything is great. And, you know, I'm back



Art Ehuan:

back to business, it's it's typically an effort, a long term



Art Ehuan:

effort to to really get back to operations.



Dr. Dave Chatterjee:

Good to know, thanks for sharing. So, in



Dr. Dave Chatterjee:

your opinion, what is the best defense against ransomware



Dr. Dave Chatterjee:

attacks? And you've already shared with us that, you know,



Dr. Dave Chatterjee:

patch management is important, but that can be challenging.



Dr. Dave Chatterjee:

What else should companies be doing to, you know, to reduce



Art Ehuan:

Companies encrypting their own data, so that even if



Art Ehuan:

a threat actor gets access to them, they're not able to do



Art Ehuan:

the possibility of such attacks?



Art Ehuan:

anything with it would be would be a great defense, having your



Art Ehuan:

backups in an environment where, you know, it's it's not



Art Ehuan:

connected to the to the network, having backups that are



Art Ehuan:

immutable, so that they can't be changed. You know, one of the



Art Ehuan:

first things that these threat actors do when they get into the



Art Ehuan:

environment literally is where are the backups, they're looking



Art Ehuan:

for the backups, because those are going to be some of the



Art Ehuan:

first systems when they hit you with with a ransomware attack.



Art Ehuan:

They're going after the backups, right? So if you can protect



Art Ehuan:

those backups, it's absolutely, I think, very critical for you



Art Ehuan:

to be able to restore operations on your own, if you can, you



Art Ehuan:

know if you can do that on your own, because your backups aren't



Art Ehuan:

impacted. And like I said, I mean, segmenting the network,



Art Ehuan:

I'm a big fan of segmentation. Again, it's not easy, I'll be



Art Ehuan:

the first ones again, having been, you know, in the CISO



Art Ehuan:

seat, segmentation, especially if you've got a large network,



Art Ehuan:

and you know, you, you've grown it, and it's never really been



Art Ehuan:

properly segmented. It could be a multi year effort, right. But



Art Ehuan:

I'm a big fan of segmentation. I mean, I, I worked with, worked



Art Ehuan:

with a health care organization some time ago that suffered a



Art Ehuan:

ransomware attack. And there were three companies under the



Art Ehuan:

umbrella company, but because of lack of segmentation, instead of



Art Ehuan:

just getting access to one company, they got access to all



Art Ehuan:

three companies within the umbrella, because there was zero



Art Ehuan:

segmentation, so segmentation, you know, you know, a robust



Art Ehuan:

backup plan, where those are'nt acce. And not only that, a



Art Ehuan:

robust recovery plan, right? That's just as important. You



Art Ehuan:

know, testing your recovery is absolutely critical, right?



Art Ehuan:

Because if, again, something bad does happen. Have you even



Art Ehuan:

tested your recovery capability, so that, you know, you can



Art Ehuan:

recover in you know, X amount of time of critical systems, so, so



Art Ehuan:

there are certainly things that we can do. Because I'll be the



Art Ehuan:

first one to tell you that there is no such thing as 100%



Art Ehuan:

guarantee that anybody can make that a company is never going to



Art Ehuan:

suffer a breach, right? Because it's just the environment is so



Art Ehuan:

complex. We've got remote workers, you know, we've got you



Art Ehuan:

know, we've got the cloud and the environment is just so darn



Art Ehuan:

complex. That that is just very difficult for an organization to



Art Ehuan:

say to to their C level or to their Board, hey, I absolutely



Art Ehuan:

100% guarantee we will never suffer a breach. But you can do



Art Ehuan:

things to minimize impact or or even better, make it hard for



Art Ehuan:

for that in that group or that attacker, make it so hard that



Art Ehuan:

you know what, they're just gonna move on to another



Art Ehuan:

company. Right? Because you've made it too hard for them.



Dr. Dave Chatterjee:

I'm so happy that you mentioned about



Dr. Dave Chatterjee:

the importance of having offline backups. Yeah. It kind of



Dr. Dave Chatterjee:

probably sounds a little too simple and trivial. But the way



Dr. Dave Chatterjee:

I look at it is, you know, let's, let's take a personal



Dr. Dave Chatterjee:

example. Our house could get destroyed in a fire. Yeah. So if



Dr. Dave Chatterjee:

you think about the possibility, and then ask the question, what



Dr. Dave Chatterjee:

all would I like, you know, to be protected, I don't want to



Dr. Dave Chatterjee:

lose that stuff to fire. So kind of taking an inventory of your



Dr. Dave Chatterjee:

priority items. Yeah. And then making sure that you've done



Dr. Dave Chatterjee:

everything possible, whereby even in the event of fire,



Dr. Dave Chatterjee:

you're not going to lose them. Yeah. Now, I realize that



Dr. Dave Chatterjee:

there's a scale aspect to it, large organizations, tons of



Dr. Dave Chatterjee:

data, located in all kinds of places, but even then, I think



Dr. Dave Chatterjee:

some of these simple rules and guidelines can work very well,



Dr. Dave Chatterjee:

if there is a concerted effort to prioritize, to identify



Dr. Dave Chatterjee:

what's important, and then closely monitor how they are



Dr. Dave Chatterjee:

being backed up, you know, testing the recovery



Dr. Dave Chatterjee:

capabilities. So even in the event of an attack, they are



Dr. Dave Chatterjee:

minimizing the damage. That warrants a question for you:



Dr. Dave Chatterjee:

have you come across an instance where a company was a victim of



Dr. Dave Chatterjee:

a ransomware attack, and they're like, doesn't matter, thank you



Dr. Dave Chatterjee:

very much. We are we are all backed up, you're good to go?



Dr. Dave Chatterjee:

Oh, yeah, has that happened.



Art Ehuan:

It has happened. I have seen companies that have



Art Ehuan:

have been in that situation where they're going to recover



Art Ehuan:

on their own, they've got good backups, and they don't need to



Art Ehuan:

be, you know, need to communicate with the with the



Art Ehuan:

attacker. But as I mentioned, now, we're starting to see that



Art Ehuan:

double extortion, right, where, where they're taking your data,



Art Ehuan:

so that even if you can restore on your own, you now have to get



Art Ehuan:

in communication with them to get an assurance from them. And



Art Ehuan:

that's all it is, right? It's an assurance from them that if you



Art Ehuan:

pay them, they will not release your data. Now, you, you may



Art Ehuan:

ask, well, they still have your data, can you believe them? If



Art Ehuan:

they say they're not gonna release your data, if you pay



Art Ehuan:

them, you know, for the threat actors, their business model is



Art Ehuan:

that such that, you know, they make an assurance to you because



Art Ehuan:

you've paid that they are not going to release your data,



Art Ehuan:

they're probably not going to release your data, right? You



Art Ehuan:

can't say 100%. But, you know, their community is so small that



Art Ehuan:

if a threat actor group does not follow through on on their



Art Ehuan:

assurance, you know, the word gets out. And then other other



Art Ehuan:

cybersecurity companies say, Oh, this group does, you know, even



Art Ehuan:

if you pay them, they don't, you know, they still post your data,



Art Ehuan:

that that destroys your business model. Right. So, yeah, the way



Art Ehuan:

these folks think is that, you know, if you pay, they're there,



Art Ehuan:

they're gonna follow through with with, with what they've



Art Ehuan:

promised to you. And I'll tell you, I recall having a



Art Ehuan:

conversation with a CIO, one time that he said, you know,



Art Ehuan:

the, the the support that the threat actors were providing and



Art Ehuan:

helping restore, he said, it was better than his own his own



Art Ehuan:

organizations, IT support group, he said, you know, we'd asked



Art Ehuan:

him something, you know, we were having trouble rest,



Art Ehuan:

restoration, and they'd get right back to us. And, you know,



Art Ehuan:

walking us through, he said, I mean, so it is a model design,



Art Ehuan:

at least for the threat actors that if you pay, you know,



Art Ehuan:

they're, they're gonna follow through with what they what they



Art Ehuan:

promised as part of that payment.



Dr. Dave Chatterjee:

But I've also heard that if you pay, you



Dr. Dave Chatterjee:

are in that list, and they know that if you are attacked again,



Dr. Dave Chatterjee:

you will pay again, is that true?



Art Ehuan:

I did have an organization that, that in the



Art Ehuan:

space, I want to say months, was attacked by three different



Art Ehuan:

ransomware groups. They paid the first time and then literally, a



Art Ehuan:

different group comes in the second time. They pay the second



Art Ehuan:

time and then a third group came in the third time before they



Art Ehuan:

were able to then get their environment so that they



Art Ehuan:

couldn't be attacked again. So it happens. It does. It



Art Ehuan:

certainly happens.



Dr. Dave Chatterjee:

Very, very interesting. Concerning but



Dr. Dave Chatterjee:

interesting. You mentioned cryptocurrency, you mentioned



Dr. Dave Chatterjee:

cyber insurance. I have a couple of questions in that area. But



Dr. Dave Chatterjee:

before I go there, we are aware of the Colonial attack, and how



Dr. Dave Chatterjee:

the FBI was able to recover some of the ransom money. Given your



Dr. Dave Chatterjee:

experience with the FBI, why is it so hard to get hold of these



Dr. Dave Chatterjee:

criminals, and, you know, put them away?



Art Ehuan:

Yeah, well, unfortunately, a lot of these



Art Ehuan:

groups are, are out of the reach of American law enforcement, or



Art Ehuan:

or, say Western European law enforcement, a lot of these



Art Ehuan:

groups are in, in countries where we don't have the best



Art Ehuan:

relations with. And, you know, if we indict someone, say the



Art Ehuan:

Bureau, Department of Justice indicted a threat actor, if you



Art Ehuan:

can't get you know them into your your control, in your



Art Ehuan:

custody, then, you know, makes it difficult to, to be able to



Art Ehuan:

to, you know, put these individuals in jail and kind of



Art Ehuan:

show a deterrence. Right now, the deterrence factor,



Art Ehuan:

unfortunately, is very low. Because, you know, it's it's



Art Ehuan:

very difficult to have these individuals arrested.



Dr. Dave Chatterjee:

That's tough. Yeah. So what is your



Dr. Dave Chatterjee:

opinion about this thought that if crypto could be regulated,



Dr. Dave Chatterjee:

that might help mitigate some of these types of attacks? Do you



Dr. Dave Chatterjee:

have any thoughts on that?



Art Ehuan:

Well, in in with crypto being regulated, I mean,



Art Ehuan:

to some extent, it is regulated in the United States, right. So



Art Ehuan:

so there are rules, you know, regulatory standards that have



Art Ehuan:

to be followed in the United States, but how do you pass that



Art Ehuan:

on to other countries, so that they have a better understanding



Art Ehuan:

of who, who's signing up for these accounts, right. Because



Art Ehuan:

if you can, you can, you know, the US we have, you know, the



Art Ehuan:

the know, your customer laws, right, where you have to know,



Art Ehuan:

you have to know who it is who's opening an account, you know,



Art Ehuan:

those, those laws don't necessarily transfer over to



Art Ehuan:

other countries where you, you may be able to sign up over the



Art Ehuan:

internet, and you can, you know, be whoever you want to be. And



Art Ehuan:

it just makes it so much more difficult to, to to identify



Art Ehuan:

these individuals as to who they are. So I think more regulation,



Art Ehuan:

probably will, will help. But it's got to be international,



Art Ehuan:

just can't be the US saying, Hey, we're going to do these



Art Ehuan:

things. Because, I mean, at the end of the day, cybercrime is a



Art Ehuan:

it's a transnational crime, right? It is, you know, and I



Art Ehuan:

look at it, you know, from from my time when I was in the FBI,



Art Ehuan:

so, when I was in the FBI, we used to investigate bank



Art Ehuan:

properties, right, I would go to a bank robbery where someone



Art Ehuan:

would come in, and they'd hold up the bank with a gun, but



Art Ehuan:

they're leaving all kinds of evidence, right, you know,



Art Ehuan:

there's video cameras, there's, you know, DNA, potentially,



Art Ehuan:

you're leaving, you know, you're leaving a lot of physical



Art Ehuan:

evidence, you know, there may be a mark police units driving by



Art Ehuan:

their silent alarms. So, you know, there's a lot of risk with



Art Ehuan:

with a physical bank robbery. To this day, I think the FBI



Art Ehuan:

closure rate on bank robberies, I want to say probably in the,



Art Ehuan:

the 8080 plus percent, right. So if you brought a bank, you're



Art Ehuan:

probably going to get caught arrested and thrown in jail for



Art Ehuan:

a long time. With with cyber, you don't have to be on the US,



Art Ehuan:

you don't have to be in the UK, in France, you don't have to be



Art Ehuan:

anywhere near the country, that you're attacking and conducting



Art Ehuan:

a ransomware, you can be virtually anywhere in the world



Art Ehuan:

conduct that activity. And, again, if the rules are not



Art Ehuan:

consistent across the globe, this is where we run into



Art Ehuan:

problems. So if other countries don't recognize that these type



Art Ehuan:

of criminals, you know, right now they're, say attacking the



Art Ehuan:

United States, or they're attacking the UK, you know, they



Art Ehuan:

could potentially turn on your country and attack you as well.



Art Ehuan:

So I really think we're at the point where where a regime needs



Art Ehuan:

to be put in place, you know, international standards on, on



Art Ehuan:

cooperation on these types of cyber criminals is, I think,



Art Ehuan:

absolutely critical.



Dr. Dave Chatterjee:

Absolutely. I totally agree with you that



Dr. Dave Chatterjee:

there needs to be a lot more cooperation globally. If we want



Dr. Dave Chatterjee:

to have any success. Yes. Dealing with these cyber



Dr. Dave Chatterjee:

criminals, like the examples you gave and if they are operating



Dr. Dave Chatterjee:

from countries where there is very little regulation, they are



Dr. Dave Chatterjee:

not being tracked or they are not being brought to justice.



Dr. Dave Chatterjee:

Yeah, there's there's no reason why they won't continue to



Dr. Dave Chatterjee:

engage in correct kinds of these kinds of activities. So true, so



Dr. Dave Chatterjee:

true. In fact, I also want to take this opportunity to share



Dr. Dave Chatterjee:

with the listeners one of the realities of securing an



Dr. Dave Chatterjee:

organization. Art spoke to that, even in my book based on my



Dr. Dave Chatterjee:

research and my work with companies, you know, I found 17



Dr. Dave Chatterjee:

success factors. And they're associated with three,



Dr. Dave Chatterjee:

high-performance information security cultural traits. And I



Dr. Dave Chatterjee:

call these traits -- commitment, preparedness and discipline. And



Dr. Dave Chatterjee:

each of these traits are associated with factors such as



Dr. Dave Chatterjee:

for commitment, there's Hands-on Top Management, Joint Ownership



Dr. Dave Chatterjee:

& Accountability, Cross-Functional Participation,



Dr. Dave Chatterjee:

and I can go on, I don't want to provide you with the long list.



Dr. Dave Chatterjee:

But the point I'm trying to make here is, it is no easy task to



Dr. Dave Chatterjee:

manage these 17 factors. So it's, it's easy to blame and



Dr. Dave Chatterjee:

maybe get rid of the CISO, and you make a point. And it's a



Dr. Dave Chatterjee:

symbolic reaction. But there are just too many vulnerabilities.



Dr. Dave Chatterjee:

And you have to really cover a lot of ground. And that's all



Dr. Dave Chatterjee:

the more reason why I have been preaching about making



Dr. Dave Chatterjee:

cybersecurity a distinctive competency, the extent to which



Dr. Dave Chatterjee:

top management gives it priority, the chances of



Dr. Dave Chatterjee:

effectively addressing these success factors are a lot higher



Dr. Dave Chatterjee:

than if you just give up and say, oh, you know, what, we'll



Dr. Dave Chatterjee:

deal with with it when it happens. There's too many



Dr. Dave Chatterjee:

vulnerabilities, we don't know where to start. And I've heard



Dr. Dave Chatterjee:

that from many organizations, your thoughts Art?



Art Ehuan:

No, no, you're absolutely right. I mean, so



Art Ehuan:

this, this is more than just a CISO problem. It's, it's a, it's



Art Ehuan:

a corporate problem, right? Because you need the executives,



Art Ehuan:

you need, you need the Board, you need the Executives, you



Art Ehuan:

need the Management, and you need the employees to all be in



Art Ehuan:

unison, in in how do we protect our company? And how do we



Art Ehuan:

protect our company's information? Whether that be,



Art Ehuan:

you know, employee information, customer information, r&d, you



Art Ehuan:

know, it's absolutely crucial that it there's a, there's a, a



Art Ehuan:

unified approach, you know, that is that is, you know, with



Art Ehuan:

oversight from, from the Board with, with concurrence, you



Art Ehuan:

know, from from senior management, with, with middle



Art Ehuan:

management, implementing, and employees obviously, following



Art Ehuan:

that, that, that plan that that's been developed, but to



Art Ehuan:

say, Okay, we just leave it up to the CISO, and, you know, they



Art Ehuan:

need to, they need to fix it. They're just setting up that



Art Ehuan:

poor CISO for failure, it's, it's moved beyond CISO, so it to



Art Ehuan:

move beyond the CIO, it's, it really is a corporate issue that



Art Ehuan:

needs to be addressed at the highest levels of the



Art Ehuan:

organization.



Dr. Dave Chatterjee:

I think you're talking about the board



Dr. Dave Chatterjee:

of directors, yeah. You know, providing oversight, requiring



Dr. Dave Chatterjee:

senior leadership, to provide them with regular updates. And



Dr. Dave Chatterjee:

there might come a time, hopefully, sooner than later,



Dr. Dave Chatterjee:

where the CISO reports directly to the Board. To that extent,



Dr. Dave Chatterjee:

the CISO function can operate as independently as possible. Your



Dr. Dave Chatterjee:

thoughts? Yeah,



Art Ehuan:

I Yeah. So I'm going to tell you, I'm going to always



Art Ehuan:

be of the opinion, the the closer you can get the CISO, to



Art Ehuan:

the CEO or to to the Board, the better that organization is



Art Ehuan:

going to be because nothing is being you know, you're trying to



Art Ehuan:

minimize filtering, right? Because I've seen CISO



Art Ehuan:

organizations buried under under IT or Operations. And, you know,



Art Ehuan:

when that happens, and you know, you've got, you know, you've



Art Ehuan:

got, you know, the personalities involved. You've got operations



Art Ehuan:

or the CIO, that, you know, I got to have, you know, I've got



Art Ehuan:

to have the, the infrastructure, always running anything that's



Art Ehuan:

going to slow it down, potentially, by by subsidiary



Art Ehuan:

organization, you know, you know, not a good thing for me,



Art Ehuan:

if I've got a budget, and I'll have to provide it to the CISO,



Art Ehuan:

so that's a budget away from operations. So I'm a huge fan of



Art Ehuan:

anything that will get that CISO as close to the CEO or the Board



Art Ehuan:

as possible, so that they can have that that that influence in



Art Ehuan:

effect on these very key either executives, or or, or, or board



Art Ehuan:

members, right, so that they understand the risk directly.



Art Ehuan:

It's not being filtered in any way when it's been reported.



Dr. Dave Chatterjee:

Full true, so very true. And I think that



Dr. Dave Chatterjee:

an organization that truly cares about security, it should be a



Dr. Dave Chatterjee:

no brainer for the leadership to do exactly what you are saying



Dr. Dave Chatterjee:

that let the CISO operate as independently as possible. When



Dr. Dave Chatterjee:

I say CISO, I mean the team, and let them directly report whether



Dr. Dave Chatterjee:

it's the audit committee or the board of directors. So there is



Dr. Dave Chatterjee:

some independence to the reporting. And I think that that



Dr. Dave Chatterjee:

would be a reflection of true commitment on the part of the



Dr. Dave Chatterjee:

organization towards cyber diligence, cybersecurity



Dr. Dave Chatterjee:

management. So I wonder why that's not the norm. But, you



Dr. Dave Chatterjee:

know, it's, it's at least, I'm glad we're having this



Dr. Dave Chatterjee:

discussion. Hopefully, folks are listening. Hopefully, some



Dr. Dave Chatterjee:

actions will be will be taken. Yeah.



Art Ehuan:

I don't know if you've seen. There's there's a



Art Ehuan:

bill. I don't know if it's getting much traction. I believe



Art Ehuan:

in the Senate, that will require publicly traded organizations to



Art Ehuan:

have a board member who is knowledgeable on cyber. Again, I



Art Ehuan:

don't know, I don't think it's getting much traction, right.



Art Ehuan:

But I, for me, you know, from what I've seen in the past 25



Art Ehuan:

years of working cyber related crime and working with



Art Ehuan:

organizations and helping them protect themselves. I think that



Art Ehuan:

that has some good viability, right. If you have someone that



Art Ehuan:

understands cyber at the Board level, you know, they can help



Art Ehuan:

in they can help the board and understanding the risk. Because



Art Ehuan:

at the end of the day, right, it's it's about risk and risk,



Art Ehuan:

acceptance. And, and, and understanding how that



Art Ehuan:

potentially would impact an organization.



Dr. Dave Chatterjee:

Absolutely means, of course, it is



Dr. Dave Chatterjee:

desirable, that you have somebody who understands cyber,



Dr. Dave Chatterjee:

you're at a certain level of depth. But I'd also argue that



Dr. Dave Chatterjee:

even if you didn't understand cyber, we all know what's going



Dr. Dave Chatterjee:

on. And I was talking to the CEO of a major corporation. And I



Dr. Dave Chatterjee:

asked him, I said, I keep getting these research reports



Dr. Dave Chatterjee:

that the senior leadership are not very willing to stay up to



Dr. Dave Chatterjee:

date, and undergo cybersecurity training. And he says, I don't



Dr. Dave Chatterjee:

know about other organizations, but in my organization, we



Dr. Dave Chatterjee:

totally believe in continuous training, we are engaged. So I



Dr. Dave Chatterjee:

asked him, I said, So what convincing is required for all



Dr. Dave Chatterjee:

other organizations to do what you all do. And his reaction



Dr. Dave Chatterjee:

was, I don't know why there needs to be any convincing, you



Dr. Dave Chatterjee:

just have to read Wall Street Journal to see the consequences



Dr. Dave Chatterjee:

of these attacks. So if that if that data is not compelling



Dr. Dave Chatterjee:

enough for people to sit up and say, You know what, even if I



Dr. Dave Chatterjee:

don't understand cyber, I'm going to make every effort to



Dr. Dave Chatterjee:

understand as much as I can, or at least engage people and have



Dr. Dave Chatterjee:

regular conversations, so I'm securing my organization. You



Dr. Dave Chatterjee:

know, it's like sending your kids to school. I obviously



Dr. Dave Chatterjee:

don't understand all the subjects the way the teachers do



Dr. Dave Chatterjee:

who teach them. But I want my kid to do well. So I would take



Dr. Dave Chatterjee:

every step as a parent, to provide oversight to provide



Dr. Dave Chatterjee:

guidance to hire tutors, whatever it takes to help the



Dr. Dave Chatterjee:

kid be successful. And I think if that kind of mindset



Dr. Dave Chatterjee:

prevails, we will we would do a lot better.



Art Ehuan:

Yeah, yeah. Yeah. I agree with you.



Dr. Dave Chatterjee:

But I'd like you to wrap it up for us



Dr. Dave Chatterjee:

with some final words. I so appreciate you coming this



Dr. Dave Chatterjee:

afternoon to talk to us. So,



Art Ehuan:

of course, ya know, so, so final word is, I mean, I



Art Ehuan:

get it. It is cybersecurity is hard. If someone says it's easy,



Art Ehuan:

I again, I would raise an eyebrow and ask, you know, how



Art Ehuan:

can you think that, it is difficult. The environments are



Art Ehuan:

complex, the threat actors are getting more and more aggressive



Art Ehuan:

and sophisticated. But there are things we can do, right? We just



Art Ehuan:

can't throw up our hands and say, you know, i i there's no



Art Ehuan:

way I can defend against this. There are things we can do to



Art Ehuan:

better protect organizations. There are there's messaging that



Art Ehuan:

we can do with the C level and the Board to get them more



Art Ehuan:

involved in understanding what the what the threat is. The



Art Ehuan:

threat is to the organization. So I certainly will would never



Art Ehuan:

say there's just nothing we can do. There are things we can do.



Art Ehuan:

And I it's always going to be very important, in my opinion to



Art Ehuan:

have a plan right, have a plan. Put that plan in place and



Art Ehuan:

follow your plan.



Dr. Dave Chatterjee:

Thank you again. Thanks for coming. It's



Dr. Dave Chatterjee:

been a pleasure.



Art Ehuan:

Thank you Dave, appreciated.



Dr. Dave Chatterjee:

A special thanks to Art Ehuan, for his



Dr. Dave Chatterjee:

time and insights. If you liked what you heard, please leave the



Dr. Dave Chatterjee:

podcast a rating and share it with your network. Also



Dr. Dave Chatterjee:

subscribe to the show, so you don't miss any new episodes.



Dr. Dave Chatterjee:

Thank you for listening, and I'll see you in the next



Dr. Dave Chatterjee:

episode.



Introducer:

The information contained in this podcast is for



Introducer:

general guidance only. The discussants assume no



Introducer:

responsibility or liability for any errors or omissions in the



Introducer:

content of this podcast. The information contained in this



Introducer:

podcast is provided on an as-is basis with no guarantee of



Introducer:

completeness, accuracy, usefulness, or timeliness. The



Introducer:

opinions and recommendations expressed in this podcast are



Introducer:

those of the discussants and not of any organization