Welcome to the Cybersecurity Readiness Podcast Site
April 27, 2022

Thinking Like A Hacker

Using compelling stories and metaphors, Ted Harrington, author of Hackable: How To Do Application Security Right, and Executive Partner at Independent Security Evaluators, explains the process of hacking and the importance of being able to think like a hacker. He encourages leaders to get excited about information security investments and look for ways of gaining a competitive edge from those investments.

To access and download the entire podcast summary with discussion highlights --

https://www.dchatte.com/episode-24-thinking-like-a-hacker/

Using compelling stories and metaphors, Ted Harrington, author of Hackable: How To Do Application Security Right, and Executive Partner at Independent Security Evaluators, explains the process of hacking and the importance of being able to think like a hacker. He encourages leaders to get excited about information security investments and look for ways of gaining a competitive edge from those investments.

To access and download the entire podcast summary with discussion highlights --

https://www.dchatte.com/episode-24-thinking-like-a-hacker/

 

Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast

Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks.

Connect with Dr. Chatterjee on these platforms:

LinkedIn: https://www.linkedin.com/in/dchatte/

Website: https://dchatte.com/

Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338

Transcript
Introducer:

Welcome to the Cybersecurity Readiness Podcast



Introducer:

Series with Dr. Dave Chatterjee. Dr. Chatterjee is the author of



Cybersecurity Readiness:

A Holistic and High-Performance



Cybersecurity Readiness:

Approach. He has been studying cybersecurity for over a decade,



Cybersecurity Readiness:

authored and edited scholarly papers, delivered talks,



Cybersecurity Readiness:

conducted webinars, consulted with companies, and served on a



Cybersecurity Readiness:

cybersecurity SWAT team with Chief Information Security



Cybersecurity Readiness:

Officers. Dr. Chatterjee is an Associate Professor of



Cybersecurity Readiness:

Management Information Systems at the Terry College of



Cybersecurity Readiness:

Business, the University of Georgia, and Visiting Professor



Cybersecurity Readiness:

at Duke University's Pratt School of Engineering.



Dr. Dave Chatterjee:

Hello, everyone, I'm delighted to



Dr. Dave Chatterjee:

welcome you to this episode of the Cybersecurity Readiness



Dr. Dave Chatterjee:

Podcast Series. Today, I have the pleasure of talking with Ted



Dr. Dave Chatterjee:

Harrington, Executive Partner at Independent Security Evaluators



Dr. Dave Chatterjee:

and he's also the author of Hackable: How To Do Application



Dr. Dave Chatterjee:

Security Right. His company, made up of ethical hackers was



Dr. Dave Chatterjee:

born out of the Ph. D. Program at the Johns Hopkins University.



Dr. Dave Chatterjee:

They have been doing security assessments and security



Dr. Dave Chatterjee:

consulting for a long time for both large enterprises and



Dr. Dave Chatterjee:

funded startups and everyone in between. Since 2005, they have



Dr. Dave Chatterjee:

been hired by hundreds of companies, and they have helped



Dr. Dave Chatterjee:

discover 10s of 1000s of security vulnerabilities. Their



Dr. Dave Chatterjee:

work has appeared in The New York Times, Wall Street Journal,



Dr. Dave Chatterjee:

Washington Post, USA Today, Financial Times, Wired, and CBS



Dr. Dave Chatterjee:

News on Assignment. Hey, Ted, welcome.



Ted Harrington:

Thanks for having me. Excited to be here.



Dr. Dave Chatterjee:

So let's talk about hacking. For the



Dr. Dave Chatterjee:

benefit of the listeners, provide an overview of hacking



Dr. Dave Chatterjee:

like hacking 101, what is it? What are the many consequences?



Ted Harrington:

Sure, so I like this question a lot, because the



Ted Harrington:

concept of hacking and the concept of hackers is pretty



Ted Harrington:

misunderstood. So maybe we start there, like what is what is



Ted Harrington:

hacking? What is a hacker and a lot of times people talk about



Ted Harrington:

this idea, you know, hackers as if they're bad, right? That the



Ted Harrington:

hackers are malicious, or associated with wrongdoing or



Ted Harrington:

evil or whatever. And that's only partly true, because that's



Ted Harrington:

a certain that is certainly a type of hacker. But hackers, the



Ted Harrington:

term hacker is neutral. It's neither good nor bad. It's a



Ted Harrington:

hacker is someone who is a problem solver. They're



Ted Harrington:

creative. They're someone who looks at the way a system works



Ted Harrington:

and says, you know, can it behave differently than what was



Ted Harrington:

intended to do? Can I create something. So that's really what



Ted Harrington:

hackers are, and then the fork in the road comes to motivation,



Ted Harrington:

right? So if someone is doing this, because they want to



Ted Harrington:

obtain some sort of personal gain, they want to harm others.



Ted Harrington:

That's what attackers would be certainly. But the other forks



Ted Harrington:

of the road are ethical hackers, people who do the same things



Ted Harrington:

use the same tools, the same techniques, still want to find



Ted Harrington:

those issues with how a system works. But they do it because



Ted Harrington:

they want to fix the system, they want to make it better,



Ted Harrington:

they want to improve it. And that's the corner of the world



Ted Harrington:

that I come from, that our people all come from. And both



Ted Harrington:

are hackers. So really fundamentally, that's what



Ted Harrington:

hacking is hacking is looking at something and saying, you know,



Ted Harrington:

can it be differently, and there's this classic TV series



Ted Harrington:

called MacGyver that, you know, maybe younger generations might



Ted Harrington:

not be familiar with. I've never even actually really seen



Ted Harrington:

MacGyver myself. But I'm very familiar with the concept of



Ted Harrington:

MacGyver. And he's, you know, this dude, who would just he



Ted Harrington:

create things out of, he'd take things that were supposed to do



Ted Harrington:

one thing and make it do something else. Like if there



Ted Harrington:

was one episode where he, I think he needed to start a car



Ted Harrington:

or something and he took a paperclip, which the purpose of



Ted Harrington:

a paperclip is to clip together paper. And he used this to like



Ted Harrington:

somehow, you know, ignite the engine in a vehicle. That's a



Ted Harrington:

hacker that's someone who says, you know, things supposed to



Ted Harrington:

work in a certain way, can I make it behave differently, and



Ted Harrington:

then motivation determines whether that's a good thing or a



Ted Harrington:

bad thing.



Dr. Dave Chatterjee:

That's interesting. That's an



Dr. Dave Chatterjee:

interesting way of looking at hacking. I never thought about



Dr. Dave Chatterjee:

it as hackers as problem solvers. But I see from where



Dr. Dave Chatterjee:

you're coming. With the growing expansion of attack surfaces and



Dr. Dave Chatterjee:

evolution of attack vectors. It's hard for organizations to



Dr. Dave Chatterjee:

keep up with the latest hacking methods and techniques. And



Dr. Dave Chatterjee:

that's why companies often hire organizations that are made up



Dr. Dave Chatterjee:

of ethical hackers to help them stay on top of information



Dr. Dave Chatterjee:

security management to the extent possible. So shed some



Dr. Dave Chatterjee:

light on why hackers might be interested in breaching systems



Dr. Dave Chatterjee:

of certain types of organizations over others, if



Dr. Dave Chatterjee:

that's the case, that may not be the case. And related to that,



Dr. Dave Chatterjee:

are any organization types more vulnerable than others? Yeah,



Ted Harrington:

let's tackle those separately, because they



Ted Harrington:

let's



Ted Harrington:

are two slightly different questions. But that can be



Ted Harrington:

conflated. So why would an attacker attack a specific



Ted Harrington:

organization? I think this is a wonderful question. And it goes



Ted Harrington:

to the heart of one of the very common misunderstandings that



Ted Harrington:

people have about attackers. Most people think that this idea



Ted Harrington:

of we've already broken down that there's, you know, hackers



Ted Harrington:

can be good, or hackers can be bad. But even amongst the bad



Ted Harrington:

hackers, they're not all the same thing. But we often talk



Ted Harrington:

about them as if they're all the same thing. And that's actually



Ted Harrington:

not true. So different attacker groups, they're motivated to



Ted Harrington:

achieve different outcomes. So the most common one, almost



Ted Harrington:

everybody talks about hackers as being profit motivated. And that



Ted Harrington:

is indeed a very compelling motivation for many types of



Ted Harrington:

attackers. I mean, basically, anyone who engages in ransomware



Ted Harrington:

profit is the motive. Almost everyone, there's, there's cases



Ted Harrington:

where maybe you use that to hide your other motive, but so



Ted Harrington:

someone who wants to make money that's like organized crime as



Ted Harrington:

an example, they are attacking because they want to make money.



Ted Harrington:

But then you've got groups that are more interested in



Ted Harrington:

notoriety, right. So maybe it's someone who just they want to



Ted Harrington:

prove they can do it, or they want to go to brag about it, or



Ted Harrington:

they want to, yeah, they just want the notoriety associated



Ted Harrington:

with it. That's a different motivation from someone who may



Ted Harrington:

be like anonymous, the hacker collective that fits in the



Ted Harrington:

group of what are called hacktivists, which they attack



Ted Harrington:

organizations in order to make a statement. And then there's



Ted Harrington:

nation states that attack organizations in order to pursue



Ted Harrington:

their geopolitical objectives. And so when we think about



Ted Harrington:

different attackers having different motivations that comes



Ted Harrington:

into play, in terms of how we now think about how we defend,



Ted Harrington:

because we think about, well, what are we trying to protect,



Ted Harrington:

and is what we have something that an attacker could pursue



Ted Harrington:

their specific motivation for. So they want to feel like a lot



Ted Harrington:

of companies, they'll say, Well, I don't have anything valuable,



Ted Harrington:

I don't protect any valuable data. So no one's going to



Ted Harrington:

attack me because I don't have valuable data and no one's gonna



Ted Harrington:

make money off of attacking me. And hopefully, what I just



Ted Harrington:

illustrated makes it clear that that's actually not the case.



Ted Harrington:

You know, you might not have valuable data, but maybe you



Ted Harrington:

have, maybe your organization can be swept up in a botnet.



Ted Harrington:

Your computational power can be used in a broader DDoS type



Ted Harrington:

attack. Maybe your organization has some sort of influential



Ted Harrington:

information on maybe population trends or things that are



Ted Harrington:

happening on a national level that another nation might want



Ted Harrington:

to understand. So we have to understand the attacker, why



Ted Harrington:

they're motivated in order to help ourselves think about what



Ted Harrington:

do we need? Why would someone attack us?



Dr. Dave Chatterjee:

Very true, very true. We hear this phrase



Dr. Dave Chatterjee:

'thinking like a hacker' a lot. The ability to think like a



Dr. Dave Chatterjee:

hacker is considered a best practice in cybersecurity



Dr. Dave Chatterjee:

governance. I'd like to probe a little deeper into it. Can you



Dr. Dave Chatterjee:

shed some light on that?



Ted Harrington:

Yeah, I'm, I'm definitely one of those people



Ted Harrington:

who's out there banging this drum. I say this to anyone who



Ted Harrington:

will listen that Yeah, to defend against an attacker, we need to



Ted Harrington:

think like an attacker. Um, and this this idea of more



Ted Harrington:

generally, you know, think like a hacker, whether that's a you



Ted Harrington:

know, good type of hacker or a bad type Agere. This is



Ted Harrington:

absolutely mission critical for organizations to be able to



Ted Harrington:

secure their what it is, whatever it is, they're trying



Ted Harrington:

to protect the most, they really need to think like, someone who



Ted Harrington:

would attack a system. And that's not very easy actually to



Ted Harrington:

do. And most people aren't wired that way. I often think of this,



Ted Harrington:

like the movie, The Matrix. Maybe this is a little bit of a



Ted Harrington:

spoiler, but the movie has been out for, like 25 years. So if



Ted Harrington:

you haven't seen it yet, that's on you. And then I'm spoiling



Ted Harrington:

it. You know, you find out partway through this movie, that



Ted Harrington:

you know, everyone who's living normal life, like we live normal



Ted Harrington:

life, you know, here on Earth, all of a sudden, you're actually



Ted Harrington:

in a simulation. And when you unplug from the matrix, you



Ted Harrington:

realize you're, you're now living reality, but the reality



Ted Harrington:

is really ugly. You're in this like post apocalyptic world and



Ted Harrington:

it's like everything cold your food is basically like eating



Ted Harrington:

dust. It's, it's a terrible life, but you have freedom. And



Ted Harrington:

I often think of that's what it's like, once you can think



Ted Harrington:

like a hacker is like once you unplug from the matrix, and you



Ted Harrington:

see kind of all the darkness in the world. Hold, there's no



Ted Harrington:

going back. And so it's not for everybody, not everybody should



Ted Harrington:

not think that everybody doesn't have the capability to see the



Ted Harrington:

world that way. And most people probably don't want to see the



Ted Harrington:

world that way. But those of us who are engaged in this as a



Ted Harrington:

profession, or even as a hobby, this is the way that we see it.



Ted Harrington:

And the reason that this is important is, I guess, think of



Ted Harrington:

it like, what's any metaphor, I don't know, think of a sports



Ted Harrington:

metaphor, right? If you're, if you're playing against an



Ted Harrington:

opponent coming up this weekend, how are they going to think



Ted Harrington:

about their plan to try to win the game against you, right, you



Ted Harrington:

have to put yourself in the shoes of your opponent, in order



Ted Harrington:

to be able to understand how will you like what's, what's the



Ted Harrington:

lens through which they see you, and how will you be attacked.



Ted Harrington:

And that's why this idea of thinking like a hacker is



Ted Harrington:

really, really important. Because, again, to use a sports



Ted Harrington:

metaphor, like when when we think as defenders, that sort of



Ted Harrington:

like someone who's, you know, playing basketball, and they're,



Ted Harrington:

they're playing defense on their heels, right. And so anyone



Ted Harrington:

who's played really any ball sports, any team sports knows



Ted Harrington:

that if your weight is on your heels, it's really, really hard



Ted Harrington:

to react to the ball coming at you. And so the advice is, you



Ted Harrington:

always have to be on your toes, you have to be leaning forward,



Ted Harrington:

not leaning backwards. And so when we think like defenders,



Ted Harrington:

we're leaning backwards, we're sort of like waiting for the



Ted Harrington:

world to come to us. But that makes it really hard to react.



Ted Harrington:

Instead, we should be leaning forward, we should be on our



Ted Harrington:

toes. And we should be thinking like, Hey, we're actually on the



Ted Harrington:

offense, not on the defense. And that's what think like a hacker



Ted Harrington:

helps you do.



Dr. Dave Chatterjee:

And so, you know, as you said, that you



Dr. Dave Chatterjee:

don't expect everyone to think like a hacker. Now, maybe the



Dr. Dave Chatterjee:

cybersecurity professionals in the organization, who are paid



Dr. Dave Chatterjee:

to, you know, be proactive, make recommendations on how to secure



Dr. Dave Chatterjee:

the organization, from new attack types, maybe they are the



Dr. Dave Chatterjee:

ones who should be thinking like a hacker. But I'm just curious



Dr. Dave Chatterjee:

to know, your thoughts and perspectives on the other group,



Dr. Dave Chatterjee:

the folks who generally get compromised, they are not very



Dr. Dave Chatterjee:

security savvy, they learn as best they can, what they're told



Dr. Dave Chatterjee:

by the organization. For those folks, obviously, they are not



Dr. Dave Chatterjee:

the type that you'd recommend, think like a hacker. But what



Dr. Dave Chatterjee:

advice do you have for them?



Ted Harrington:

Yeah, so as you can, as you're gonna see,



Ted Harrington:

throughout the crowd, I'm big on metaphors. So let's, let's use



Ted Harrington:

the metaphor of someone who builds skyscrapers, right? So



Ted Harrington:

that particular type of contractor that takes a specific



Ted Harrington:

skill set, developed over a long period of time, you know, how to



Ted Harrington:

build a skyscraper. Now, if someone comes to you and says,



Ted Harrington:

Hey, we've got this other skyscraper over here, and we



Ted Harrington:

need to demo it, we need to demolish it. You know how these



Ted Harrington:

things, you build these things all day? Can you demolish this



Ted Harrington:

one? They'd be like, maybe like, I guess I know the fundamentals



Ted Harrington:

of how it's built. But like, that's not what I do. That's not



Ted Harrington:

my profession. That's not my chosen craft. So what do they



Ted Harrington:

do? They say, Well, why don't we get a demo expert in here to do



Ted Harrington:

the demo, and I'll work with them. And I'll say, you know,



Ted Harrington:

we'll, we'll talk through the mechanics of this building. And,



Ted Harrington:

and that's how we'll have a successful demolition. But



Ted Harrington:

they're two completely different crafts. So the first piece of



Ted Harrington:

advice is, you need to work with somebody, like you're the



Ted Harrington:

builder, you need to work with a breaker, right? So companies who



Ted Harrington:

are out there building, whatever system that you're building, you



Ted Harrington:

definitely want to work with ethical hackers, because they



Ted Harrington:

help you because they bring that expertise, that, as you



Ted Harrington:

correctly noted, isn't necessarily the core part of



Ted Harrington:

what it is that you're doing. It's similar to like any



Ted Harrington:

expertise that you would partner with externally, so companies



Ted Harrington:

all the time will partner with, you know, outside counsel,



Ted Harrington:

outside accountants outside, you know, pick your expertise,



Ted Harrington:

they'll, they'll say, Hey, you're gonna come and sort of be



Ted Harrington:

the surgical strike that does this specific thing that we



Ted Harrington:

don't actually fully staffing out. So that's the first thing



Ted Harrington:

is, you know, work with outside organizations. Second thing is



Ted Harrington:

to, even though that that's what has to happen is you have to



Ted Harrington:

work with outside organizations who specialize in this thing.



Ted Harrington:

You want to also make sure that you understand the principles.



Ted Harrington:

So if we use that, the skyscraper metaphor, the guy who



Ted Harrington:

or the guy or the gal who builds a skyscraper should also know



Ted Harrington:

where the weaknesses are and know and know how it might



Ted Harrington:

crumble if it's not built correctly. Now, that doesn't



Ted Harrington:

mean they're gonna go out and do demo, but they're going to know



Ted Harrington:

like, Hey, this is a, you know, this type of joint stresses in a



Ted Harrington:

in a bad way, we should make sure we don't use that type of



Ted Harrington:

joint. And I'm way oversimplifying the practice of



Ted Harrington:

building a skyscraper for sure. But you know, it's for



Ted Harrington:

illustrative purposes. And so that's the second piece of



Ted Harrington:

advice is make sure you understand the principles so



Ted Harrington:

your work with someone else, but still, you have to make sure



Ted Harrington:

that they understand the principles yourself. And then



Ted Harrington:

the third is this. It's abstract, but it's keep asking



Ted Harrington:

these questions, right? It's your whatever it is that you do



Ted Harrington:

in any profession, your core expertise, you're going to, you



Ted Harrington:

know, that's where the focus of your develop effort developing



Ted Harrington:

yourself is going to be. But there's always going to be these



Ted Harrington:

things on the periphery that like, oh, I should probably know



Ted Harrington:

about that. But maybe I'm not the expert in that. But by



Ted Harrington:

asking the questions of what do I need to know about x? So the



Ted Harrington:

person who's listening to this right now, who builds systems



Ted Harrington:

and says, What do I need to know about security? That question is



Ted Harrington:

so important, it's so powerful, because just by asking it, it



Ted Harrington:

leads you to the type of growth that is necessary, in order to



Ted Harrington:

make sure you understand the principles even though the, the



Ted Harrington:

entity or the person who's going to be responsible for this is



Ted Harrington:

going to be someone else, you can't completely delegate it to



Ted Harrington:

someone else.



Dr. Dave Chatterjee:

I agree. I wholeheartedly agree. In fact,



Dr. Dave Chatterjee:

as you were talking, a thought came to mind. I wish you know,



Dr. Dave Chatterjee:

that. There are more demonstrations, visual



Dr. Dave Chatterjee:

demonstrations, graphical illustrations, and various forms



Dr. Dave Chatterjee:

of presentations made available to the masses, where people get



Dr. Dave Chatterjee:

to see how hackers think, how hackers act. And I realized that



Dr. Dave Chatterjee:

can get very technical, but that's where the skill lies. Can



Dr. Dave Chatterjee:

we present the technical stuff in a non technical way you, you



Dr. Dave Chatterjee:

use metaphors and you, you know, kind of talked about several



Dr. Dave Chatterjee:

movies. So maybe we need more media help here to popularize



Dr. Dave Chatterjee:

thinking like a hacker. So everyone on the street literally



Dr. Dave Chatterjee:

has some sense of what these guys are up to how they are



Dr. Dave Chatterjee:

thinking how they try to attack, not to suggest that this would



Dr. Dave Chatterjee:

make everyone an expert, but at least it whets the appetite, it



Dr. Dave Chatterjee:

gives them a basic understanding. And that would



Dr. Dave Chatterjee:

help the organization to mobilize support from from all



Dr. Dave Chatterjee:

parts of the organization. Thoughts, reactions?



Ted Harrington:

Yeah, well, let me try to illustrate with maybe



Ted Harrington:

a metaphor that most people can relate to. Most people don't



Ted Harrington:

like waiting in line. Right? I think that's just, even though



Ted Harrington:

everyone does wait in line, like people literally spend money and



Ted Harrington:

vacation time to go to places like Disneyland, because they



Ted Harrington:

want to wait in line all day. So they can, you know, wait in line



Ted Harrington:

for an hour to take a three minute ride. Not for me, but



Ted Harrington:

hey, you know, whatever floats your boat, but I think but, but



Ted Harrington:

most people, even though they wait in those lines, they pay to



Ted Harrington:

wait in those lines, they take time off their job to wait in



Ted Harrington:

those lines, people would still say they don't like waiting in



Ted Harrington:

the line. I think that's sort of a universal human condition. No



Ted Harrington:

one, no one is enjoying the line. So let me tell you about a



Ted Harrington:

story that I had involving a line and this is this story



Ted Harrington:

actually is a form of social engineering. But the components



Ted Harrington:

to it describe exactly the process that an attacker would



Ted Harrington:

go through. So if we can imagine a bar, and the bar is going to



Ted Harrington:

be you know, a bar, like a nightclub. This bar represents



Ted Harrington:

our, it represents a, a system that someone is building. So I



Ted Harrington:

this was a few years ago, I wound up going to this, this



Ted Harrington:

bar, and I was meeting up with some friends. And I can't



Ted Harrington:

remember why I needed to go to this specific bar. But I mean,



Ted Harrington:

it was like someone's birthday, but I had to go to this. It



Ted Harrington:

wasn't like, we'll just go to another bar, and there was this



Ted Harrington:

huge line. And then when you you get through this whole long line



Ted Harrington:

takes a half an hour or whatever, then you pay a cover



Ted Harrington:

charge to get in. And I didn't want anything to do with either



Ted Harrington:

of those. I was like I don't want to wait in line and then



Ted Harrington:

pay you know, whatever. 20 bucks just just for the right to now



Ted Harrington:

go in and I'll spend more money. So I did what you know, really



Ted Harrington:

any hacker minded person does the first thing I did was I



Ted Harrington:

assessed the system I looked at how does the system work? Okay,



Ted Harrington:

well, there's a line that gets you in and, and then you pay a



Ted Harrington:

cover when you're in and that grants you access. But I noticed



Ted Harrington:

there's also this other area for a VIP entrance. And that VIP



Ted Harrington:

entrance, you can only there's no line, there's no cover, but



Ted Harrington:

you can only go in if you're on the list. So that's the second



Ted Harrington:

thing I did was I said alright, well, how could the challenge



Ted Harrington:

question was how can I make them believe I'm on the list? I'm not



Ted Harrington:

on the list, but how can I make them believe it? So that's the



Ted Harrington:

second thing that attackers will do, though. They'll essentially



Ted Harrington:

set out a challenge statement for themselves. Like what's the



Ted Harrington:

goal? What am I trying to do? And in this case, I was trying



Ted Harrington:

to get the privileges of someone on the VIP list when I didn't



Ted Harrington:

have those privileges. That's called privilege escalation. So



Ted Harrington:

then the next thing I did was what any attacker Do I, I probed



Ted Harrington:

some I established some assumptions about how the system



Ted Harrington:

worked. And my assumption was, if I can produce the name of



Ted Harrington:

someone on that list, they will assume I'm on the list. So that



Ted Harrington:

was my goal, I needed to produce a name on the list. I did not



Ted Harrington:

know any names. So here's what I did. So I walk right up to the



Ted Harrington:

VIP hostess, and I say, Hi, I'm on the list. Now, again, I just



Ted Harrington:

told you I'm not I'm not listed. She doesn't know this, but I'm



Ted Harrington:

not on the list. So I said, Hi, I'm on the list. So when she



Ted Harrington:

asks me, What My name is telling her my name wasn't going to



Ted Harrington:

help, because I'm not on the list. And guessing is like,



Ted Harrington:

what's the chances? I guess somebody's name, right? Like,



Ted Harrington:

it's so like, why even bother? So I'm not gonna guess. So



Ted Harrington:

instead, I issue what's called a specially crafted input. Now,



Ted Harrington:

this is when an attacker is probing a system to see how it's



Ted Harrington:

going to react. And in this case, a specially crafted input



Ted Harrington:

was I said, Well, I'm with the group, I made an assumption that



Ted Harrington:

the there was going to be a group, and the group would be on



Ted Harrington:

the VIP list. And so when she said which group again, I



Ted Harrington:

didn't, you know, same problems, I didn't know the names of any



Ted Harrington:

group guessing wasn't going to help. So again, I asked, I



Ted Harrington:

issued another specially crafted input, and I said, I'm with the



Ted Harrington:

big group. And I was making an assumption that that would be



Ted Harrington:

something that would be on the list, there would be one group



Ted Harrington:

larger than others. And with that, she looks down at her



Ted Harrington:

clipboard, she flips a couple pages, and she says, Oh, the



Ted Harrington:

Smith party. And I said, Yes, I am with the Smith party. And



Ted Harrington:

with that, I had achieved the goal, I associated myself with a



Ted Harrington:

name on the list, she opens the velvet rope escorts, we passed



Ted Harrington:

the law and pass the cover charge. And, you know, I went



Ted Harrington:

into the bar, I should say, as a sidebar, I am an ethical hacker.



Ted Harrington:

So even though I did not pay the cover charge, I'm more than made



Ted Harrington:

up for it with over tipping my bar staff, everyone, the only



Ted Harrington:

person who lost money that night was probably me, like everyone



Ted Harrington:

made out. But I didn't have to wait in line, which is what I



Ted Harrington:

didn't want to do. But the point of that story, whether you like



Ted Harrington:

going to bars or not, or you've never even been to a bar, we've



Ted Harrington:

all been in situations we don't like waiting in line. And that



Ted Harrington:

story can illustrate in a way that I think everyone can relate



Ted Harrington:

to the process that attackers go through.



Dr. Dave Chatterjee:

Excellent. That's a very, very interesting



Dr. Dave Chatterjee:

and telling story. In fact, that reminds me, this is not so much



Dr. Dave Chatterjee:

about how hackers hack, but how to be on your guard to be on



Dr. Dave Chatterjee:

your defense. And I wasn't that night, where I went to a



Dr. Dave Chatterjee:

restaurant at great city, I won't name it here. And it was a



Dr. Dave Chatterjee:

Halloween, I think, and it was a haunted restaurant. So we were



Dr. Dave Chatterjee:

having dinner there. And the lights were very dim. And you



Dr. Dave Chatterjee:

know, they were trying to create that atmosphere I was in my



Dr. Dave Chatterjee:

family. So we had dinner. And then when the waitress came up



Dr. Dave Chatterjee:

asking for the credit card, I gave it to her without thinking



Dr. Dave Chatterjee:

twice that I should be scanning the card right there. And then I



Dr. Dave Chatterjee:

shouldn't be giving it to somebody. And next moment. Well,



Dr. Dave Chatterjee:

you know, that night, everything went off. Well, we checked out



Dr. Dave Chatterjee:

and we had a good night's rest. Next morning, I was driving my



Dr. Dave Chatterjee:

son for his tennis match. And then I got a call. I was not



Dr. Dave Chatterjee:

planning to take the call. It was an 800 number call. But then



Dr. Dave Chatterjee:

I did. I'm glad I did. It was a Bank of America representatives



Dr. Dave Chatterjee:

asking where I was the previous night. And then he was able to



Dr. Dave Chatterjee:

share some data and facts that told me that my card got hacked.



Dr. Dave Chatterjee:

And it was already being used in the state of California. And I



Dr. Dave Chatterjee:

was on the eastern part of the country. So I knew that somebody



Dr. Dave Chatterjee:

had gotten access to it. So this is an example where even those



Dr. Dave Chatterjee:

of us who are conscious about this phenomenon will play a



Dr. Dave Chatterjee:

role. Even they can get caught napping and they can get



Dr. Dave Chatterjee:

compromised, and which has happened to me not once but



Dr. Dave Chatterjee:

several times. And that's all the more I believe the need for



Dr. Dave Chatterjee:

reiterating reinforcing some fundamental principles, some



Dr. Dave Chatterjee:

guidelines and recommendations. Because I believe that the very



Dr. Dave Chatterjee:

best of people have been, can be or will be breached in the



Dr. Dave Chatterjee:

future. So that is great. Good discussion on that topic.



Dr. Dave Chatterjee:

Switching gears a little bit. Let's talk about security



Dr. Dave Chatterjee:

assessments. It's reasonable to assume that most organizations



Dr. Dave Chatterjee:

are engaging in security assessments. But the more



Dr. Dave Chatterjee:

nuanced question is, are they engaging in the right kinds of



Dr. Dave Chatterjee:

security assessments with methodologies that best align



Dr. Dave Chatterjee:

with their desired outcomes? What are your thoughts?



Ted Harrington:

You are preaching to the choir right



Ted Harrington:

now? That is that is the question in that matter that



Ted Harrington:

absolutely is the question that matters. Wow. So the way you



Ted Harrington:

actually framed the question first was, you know, we're



Ted Harrington:

assuming that most organizations are getting security



Ted Harrington:

assessments. I hope that is true. I guess it should be



Ted Harrington:

stated that that's assuming an organization is something worth



Ted Harrington:

protecting, that is actually an important item to note. So if



Ted Harrington:

you don't have something worth protecting, then like, why would



Ted Harrington:

you invest in protecting it doesn't matter. But assuming you



Ted Harrington:

do, I mean, someone who's listening to a show like this,



Ted Harrington:

you probably do. Right? You wouldn't be investing your time,



Ted Harrington:

in listening to Ted ramble until random metaphors, if you didn't



Ted Harrington:

have something to protect, so we're assuming have something to



Ted Harrington:

protect, you're getting these security assessments done. And



Ted Harrington:

the real problem that I see, I mean, one of the motivations to



Ted Harrington:

want to write a book was because I saw this rampant problem all



Ted Harrington:

over the place, which is that the way that we talk about



Ted Harrington:

security testing, and we I'm talking about collectively, the



Ted Harrington:

security community, but also those who engage with security



Ted Harrington:

community who hire security professionals to do security



Ted Harrington:

testing, we talk about it in very imprecise ways. And it



Ted Harrington:

winds up leading to some really bad outcomes. So what most



Ted Harrington:

people want when they're hiring, security testing? Well, there



Ted Harrington:

are different motivations for why someone would go hire one.



Ted Harrington:

But they're usually something like, well, I need to prove it



Ted Harrington:

to someone else. And I need to actually secure the thing. So



Ted Harrington:

those are, sometimes hopefully, it's both sometimes it's just



Ted Harrington:

one, like, I need to prove this, I don't care what it is, I need



Ted Harrington:

to prove it to someone else that I did a security test. But In



Ted Harrington:

but in the case of, you know, the more progressive companies



Ted Harrington:

definitely, they're actually trying to improve the security



Ted Harrington:

of the system. They're not just going through the motions. But



Ted Harrington:

the problem is, the way we talk about security testing is we use



Ted Harrington:

terms incorrectly all the time. So people often will ask for



Ted Harrington:

penetration testing. That's sort of the term that's become the



Ted Harrington:

catch all. But penetration testing is a very specific type



Ted Harrington:

of thing. But complicating that problem, they're asking for



Ted Harrington:

penetration testing, they're usually sold something else.



Ted Harrington:

Like if you Google that term, right now, almost all the



Ted Harrington:

results you're gonna get, not all of them, but at least three



Ted Harrington:

quarters of them are something else, they're going to be



Ted Harrington:

vulnerability scanning, they're not penetration testing. But



Ted Harrington:

then what makes it even more complicated is that what people



Ted Harrington:

actually need usually isn't actually penetration testing at



Ted Harrington:

all. What they usually need is what's called vulnerability



Ted Harrington:

assessments. And I can definitely I've, of course, I've



Ted Harrington:

metaphors, I can explain the difference between these these



Ted Harrington:

three types. But the point that I want to leave on answering



Ted Harrington:

your question here is that those are three really different



Ted Harrington:

things. They entail different investments of time, and money



Ted Harrington:

and person power, and they deliver different things. So



Ted Harrington:

when people are asking for something, they're getting



Ted Harrington:

something else, and yet they actually needed a third thing



Ted Harrington:

altogether, have we actually achieved the mission? Right?



Ted Harrington:

Have we actually accomplished what we set out to accomplish,



Ted Harrington:

and that is a really big problem.



Dr. Dave Chatterjee:

There are a few things that you've mentioned



Dr. Dave Chatterjee:

more than once now, and I believe it, it's worth



Dr. Dave Chatterjee:

reiterating, re emphasizing, and that is, an organization needs



Dr. Dave Chatterjee:

to know, or needs to have a good understanding of what it wants



Dr. Dave Chatterjee:

to secure. And what are the tools, the methodologies, the



Dr. Dave Chatterjee:

techniques that are out there? Now, one is not expecting an



Dr. Dave Chatterjee:

organization, especially smaller organizations resource



Dr. Dave Chatterjee:

constrained to have the kinds of expertise to make those calls,



Dr. Dave Chatterjee:

but they need to reach out and get help. Again, you know,



Dr. Dave Chatterjee:

trying to follow your example of using a metaphor. It's like,



Dr. Dave Chatterjee:

when you go to a doctor, and or you're, you're thinking of going



Dr. Dave Chatterjee:

to a doctor, because you feel there is an issue. And so you're



Dr. Dave Chatterjee:

doing your best due diligence possible, doing your searches,



Dr. Dave Chatterjee:

you know, talking to people getting advice. So you have a



Dr. Dave Chatterjee:

planning process in place. And it's important, why is it



Dr. Dave Chatterjee:

important because it's your health. And I like to use the



Dr. Dave Chatterjee:

health metaphor, because when it comes to security, that's the



Dr. Dave Chatterjee:

security is the health of the organization. It is I believe



Dr. Dave Chatterjee:

that there is not far where we'll be ranking organizations



Dr. Dave Chatterjee:

on their security health rating. So therefore, developing an



Dr. Dave Chatterjee:

understanding of what the security needs are, and who is



Dr. Dave Chatterjee:

the right person who can provide the help or who are the right



Dr. Dave Chatterjee:

people who can deliver the goods is absolutely mission critical.



Dr. Dave Chatterjee:

So therefore, your points are very well made that to recognize



Dr. Dave Chatterjee:

what kind of help you need from a security standpoint. And that



Dr. Dave Chatterjee:

will immediately help align what you get by way of security



Dr. Dave Chatterjee:

mechanisms, along with your overall organizational goals and



Dr. Dave Chatterjee:

strategies. So I just wanted to re emphasize there anything else



Dr. Dave Chatterjee:

you'd like to add to that?



Ted Harrington:

Well, just that the doctor patient metaphor for



Ted Harrington:

security is so good. And there's so many aspects of that



Ted Harrington:

relationship that we can, you know, tie back to security, and



Ted Harrington:

I'm just deciding whether or not to go down all those different



Ted Harrington:

rabbit holes right now. But I'll definitely tie back to one or



Ted Harrington:

more of them as as we go. But, um, if we want to use the doctor



Ted Harrington:

metaphor, and the context of the question that you're asking



Ted Harrington:

about, like, how do we make sure we're getting the right thing? I



Ted Harrington:

think it's, that's actually, maybe that's a good metaphor for



Ted Harrington:

us to use, because it's like when people go into the doctor's



Ted Harrington:

office, and they're like, Oh, I checked on WebMD, my, you know,



Ted Harrington:

my symptoms or whatever. And so they, they've self diagnosed, so



Ted Harrington:

they go into the doctor, and they're like, I need a, I don't



Ted Harrington:

know, insert jargon, technical term right now. And the doctor



Ted Harrington:

is like, we'll get to that limit. Let me instead, evaluate



Ted Harrington:

your symptoms, see where we're at. And I'll tell you, then, you



Ted Harrington:

know, what we need. But the problem that happens in security



Ted Harrington:

would be like, so doctors, I guess I don't know what I'm



Ted Harrington:

about to say for 100% Certain, because I am not a doctor. But



Ted Harrington:

my understanding is that in medicine, a procedure has a



Ted Harrington:

name. And that's a universally understood procedure. The



Ted Harrington:

problem with what's happening with security. So let's say I



Ted Harrington:

don't know what the technical term would be, let's just say



Ted Harrington:

it's called knee replacement. You know, someone goes in, and



Ted Harrington:

they're like, I think I might, you know, my knees bother me, I



Ted Harrington:

need some help with my knee. And then a doctor is like, you need



Ted Harrington:

a knee replacement. The problem, insecurity would be like, when



Ted Harrington:

one doctor says knee replacement, he means I'm going



Ted Harrington:

to replace your knee, another doctor means I'm going to give



Ted Harrington:

you orange juice. And a third doctor means I'm going to give



Ted Harrington:

you a physical, and you're like, these are all using the same



Ted Harrington:

term to describe really, really different things. And the



Ted Harrington:

patient doesn't know any better to like, because the patient's



Ted Harrington:

going to the expert. That's why this is a real problem. Like if



Ted Harrington:

you went to the doctor, and three different doctors said the



Ted Harrington:

same term, but they meant three different things. You probably



Ted Harrington:

wouldn't go to the doctor anymore. And that's why is such



Ted Harrington:

a significant problem.



Dr. Dave Chatterjee:

Yep, very cool. You know, I, I authored a



Dr. Dave Chatterjee:

book, which, which was published by SAGE last year on



Cybersecurity Readiness:

A Holistic and High-Performance



Cybersecurity Readiness:

Approach. In that book, I, I presented a framework, it's



Cybersecurity Readiness:

called the Commitment, Preparedness and Discipline



Cybersecurity Readiness:

framework that is associated with 17 cybersecurity readiness



Cybersecurity Readiness:

success factors. And I'm not going to go down that list, but



Cybersecurity Readiness:

I wanted your thoughts on some of them, which I have found to



Cybersecurity Readiness:

be very important for an organization to secure



Cybersecurity Readiness:

themselves or get the resources they need to secure themselves.



Cybersecurity Readiness:

And one of those success factors happens to be hands-on top



Cybersecurity Readiness:

management. And it's a challenge out there. In terms of how to



Cybersecurity Readiness:

get top management attention, how to get top management



Cybersecurity Readiness:

actively engaged in cybersecurity planning,



Cybersecurity Readiness:

execution, monitoring. Just curious because you're in the



Cybersecurity Readiness:

field, and you are you and your company are engaging in engaging



Cybersecurity Readiness:

with numerous organizations. What are you seeing out there,



Cybersecurity Readiness:

in terms of top management commitment to information



Cybersecurity Readiness:

security?



Ted Harrington:

Well, it's it's definitely becoming more and



Ted Harrington:

more of a priority for executive leadership. I think you probably



Ted Harrington:

could have any number of security professionals on here



Ted Harrington:

to answer that question that would probably all say, some



Ted Harrington:

version of the same thing, right, which is like, security



Ted Harrington:

is a business problem, not a technical problem. We need to



Ted Harrington:

speak in the language of leaders, which is, you know, in



Ted Harrington:

terms of numbers and outcomes, and all that stuff. And we need



Ted Harrington:

to make sure that we, you know, don't make it technical and all



Ted Harrington:

that. So I would say all those things, too. But instead, what I



Ted Harrington:

want to share is something that I see the most progressive



Ted Harrington:

organizations doing that are the ones who are getting it right.



Ted Harrington:

And they're currently in the minority. They're on if we think



Ted Harrington:

about, you know, a bell curve. They're on the early early



Ted Harrington:

adopter side. And my hope is that eventually we're going to



Ted Harrington:

get the whole world thinking this way. And the way is this



Ted Harrington:

one Most people think about security as avoid a bad thing,



Ted Harrington:

right, let's not get hacked. That is, in fact, a good way to



Ted Harrington:

think about security. But it's incomplete. We also need to



Ted Harrington:

think about not just how do we avoid a bad thing? But how do we



Ted Harrington:

get a good thing? So not just how do we not get hacked? But



Ted Harrington:

how do we gain an advantage. And one of the things that is very,



Ted Harrington:

very obvious to me, as I look at the companies really across



Ted Harrington:

industries across sectors, the ones who do two things, first,



Ted Harrington:

actually secure their systems. And then secondly, in an



Ted Harrington:

authentic and credible way, prove it, they gain this



Ted Harrington:

incredible competitive advantage over their competitors. So if



Ted Harrington:

that's a company, they're competing the way a company



Ted Harrington:

will, you know, for customers and market share. But there's



Ted Harrington:

other ways you can compete, too, whether that's maybe you're a



Ted Harrington:

nonprofit, and you need donors, maybe you're a government, and



Ted Harrington:

you need your political influence, or whatever. people



Ted Harrington:

and companies and organizations, they want to do business with



Ted Harrington:

organizations that are secure, they want trust is the



Ted Harrington:

foundation of so they trust someone, they're going to want



Ted Harrington:

to work with them, or at least if they don't trust them,



Ted Harrington:

they're going to be hesitant to work with them. And so this is



Ted Harrington:

one of the things that I see executives at the more



Ted Harrington:

progressive organizations capturing, they see it, they



Ted Harrington:

look at it, and they're like, if we only think of security as a



Ted Harrington:

bad avoid a bad thing, what we're going to do is we're going



Ted Harrington:

to make some risk based decisions about, look, this is



Ted Harrington:

just a tax on the business. How do we reduce the tax to the



Ted Harrington:

right amount that's not so low that we expose ourselves to huge



Ted Harrington:

risk, but we're not overspending? That's the way



Ted Harrington:

that's the way most people actually think about security,



Ted Harrington:

when it's the idea of avoid a bad thing. But now when you



Ted Harrington:

change the frame, and you say, Well, how do we get a good



Ted Harrington:

thing? How do we get this competitive advantage? Now



Ted Harrington:

you're looking at it as an investment. And you're saying



Ted Harrington:

it's no longer a cost center to reduce? It's an advantage to



Ted Harrington:

optimize? How do we spend in a way that helps us beat the



Ted Harrington:

competition? How do we move faster? How do we get more



Ted Harrington:

enterprises using us than someone else? And I found that



Ted Harrington:

to be the thing that really gets leaders excited, because it's no



Ted Harrington:

longer this, like, this is annoying, I don't want to talk



Ted Harrington:

about this, make make this problem go away. That's the way



Ted Harrington:

most people think about security. Now it is, oh, wait a



Ted Harrington:

minute, there is an untapped opportunity to gain a



Ted Harrington:

competitive edge. No one else is doing it or not enough people



Ted Harrington:

are doing it. Talk to me about that. That's what progressive



Ted Harrington:

organizations are doing right now.



Dr. Dave Chatterjee:

brilliant, absolutely brilliant. I love the



Dr. Dave Chatterjee:

way you put it. One has to look at information security



Dr. Dave Chatterjee:

capability as a distinctive competency. And focusing on



Dr. Dave Chatterjee:

developing the competency, using that competency or leveraging



Dr. Dave Chatterjee:

that competency to achieve a competitive edge is the way to



Dr. Dave Chatterjee:

go. The moment you are thinking of security ah that's one more



Dr. Dave Chatterjee:

thing we have to do, we don't have a choice, that really



Dr. Dave Chatterjee:

doesn't cut it. Rather, taking a very optimistic approach, and



Dr. Dave Chatterjee:

saying -- yes, there is this is a problem. This is a constant



Dr. Dave Chatterjee:

issue that we have to deal with. So let's see, we can convert the



Dr. Dave Chatterjee:

so called problem into an opportunity and be the best we



Dr. Dave Chatterjee:

can be in managing this risk. I love that kind of a mindset,



Dr. Dave Chatterjee:

that kind of approach. And I'm sure people who are listening



Dr. Dave Chatterjee:

are making note of it. I'm sure many, many organizations, many



Dr. Dave Chatterjee:

senior executives approach it that way. So, Ted, a couple of



Dr. Dave Chatterjee:

months ago, probably in a podcast session, a renowned



Dr. Dave Chatterjee:

cybersecurity expert lamented that companies keep making the



Dr. Dave Chatterjee:

same mistakes over and over again. So I asked him, I said,



Dr. Dave Chatterjee:

What kind of mistakes are they making over and over again? And



Dr. Dave Chatterjee:

he talked about vulnerability management, patch management.



Dr. Dave Chatterjee:

And, you know, you being in the business, leading a team of



Dr. Dave Chatterjee:

ethical hackers, I'm sure you see that a lot. What are your



Dr. Dave Chatterjee:

thoughts about what is so difficult or challenging about



Dr. Dave Chatterjee:

patch management, vulnerability management, that to use his



Dr. Dave Chatterjee:

words again, that companies keep making the same mistakes?



Ted Harrington:

Well, I definitely agree with the



Ted Harrington:

problem that companies continue making the same mistakes over



Ted Harrington:

and over again, I would not limit it just to this particular



Ted Harrington:

issue of patch management. I'm a little befuddled myself as to



Ted Harrington:

why patch management continues to be such an issue. And that's



Ted Harrington:

not to diminish how hard it is. It's hard. Patch management is



Ted Harrington:

difficult. What I, for me personally, like if my job was



Ted Harrington:

to be In charge of patch management, I'd be terrible at



Ted Harrington:

it. Because what it requires for patch management are the kinds



Ted Harrington:

of things that like the your brain is wired in a certain way



Ted Harrington:

to excel at that I think the kind of person who's really good



Ted Harrington:

at like, maybe accounting, the kind of person who wants to make



Ted Harrington:

sure that the numbers perfectly zero out and everything's like



Ted Harrington:

exactly an order the way that should be. Patch management is



Ted Harrington:

kinda like that to like you have that absolute overriding drive



Ted Harrington:

for the perfection. But you can take that you combine it with



Ted Harrington:

the fact that patches, sometimes break systems and braking



Ted Harrington:

systems gets in the way of operational uptime, and



Ted Harrington:

operational uptime, and a lot of situations is non negotiable, or



Ted Harrington:

operational downtime is not allowable. So there's all these



Ted Harrington:

complexities to it. But really, I think that what's happening if



Ted Harrington:

we go broader than just patch management, and we say, well,



Ted Harrington:

why do we keep making the same problem, like making the same



Ted Harrington:

mistakes over and over and over again? And I think it's because



Ted Harrington:

we don't necessarily truly understand the problem. And we



Ted Harrington:

don't truly understand the solution. And the we I'm



Ted Harrington:

describing here is the people who have the problem, and



Ted Harrington:

certain corners of the security community who are willing to



Ted Harrington:

present the incorrect solution. We talked about penetration



Ted Harrington:

testing before. And that's a great example of where, you



Ted Harrington:

know, there are people willing to sell companies a penetration



Ted Harrington:

test, that isn't a penetration test, they're willing to do



Ted Harrington:

that. Now, maybe they don't know that there's a difference.



Ted Harrington:

That's negative, that's negligent. Or they do know



Ted Harrington:

there's a difference, and they're misrepresenting it



Ted Harrington:

anyway. That's irresponsible. So whichever it is, is not good.



Ted Harrington:

But the problem is, that's a two sided problem, right? That



Ted Harrington:

companies were building things like we talked about before,



Ted Harrington:

it's not there every moment of every day working on how do you



Ted Harrington:

break things, they're looking to their expert partners to help



Ted Harrington:

them and the expert partner isn't actually presenting the



Ted Harrington:

appropriate solution, those two issues combined become this



Ted Harrington:

like, kind of catastrophic problem.



Dr. Dave Chatterjee:

Yep. True. So here comes my final two



Dr. Dave Chatterjee:

questions. First one is, What lessons do organizations refuse



Dr. Dave Chatterjee:

to learn? Have you come across anything like that? Do you have



Dr. Dave Chatterjee:

any thoughts on that? And I don't mean to stump you. So feel



Dr. Dave Chatterjee:

free to say what's the next one? And I'm happy to throw out the



Dr. Dave Chatterjee:

next one.



Ted Harrington:

No, I like that question. Actually, a lot. I



Ted Harrington:

would the way I would answer that, though, is I don't think



Ted Harrington:

you could say there's a universal, there's not like one



Ted Harrington:

lesson that everybody refuses to learn. But within every



Ted Harrington:

organization, there is at least one lesson that everybody that



Ted Harrington:

that organization refuses to learn. The one that as an



Ted Harrington:

example, that it saddens me actually, I was gonna say it



Ted Harrington:

irritates me or angers me. I was like, what's the right word for



Ted Harrington:

this? But I think it saddens me is the way that sometimes



Ted Harrington:

politics work in large enterprises. I've seen it happen



Ted Harrington:

time and time again, where, you know, one executive will build a



Ted Harrington:

program in a certain way. And that program is succeeding in



Ted Harrington:

some way. And then the next, you know, that executive either gets



Ted Harrington:

promoted or gets poached go somewhere else. And then the



Ted Harrington:

next executive comes in, and the way that exec, that new



Ted Harrington:

executive is going to quote unquote, create their own thing,



Ted Harrington:

right, is going to create their opportunity to get promoted, or



Ted Harrington:

get poached to go somewhere else. They need to do something



Ted Harrington:

unique. They can't just do what's already been done. And so



Ted Harrington:

that, what do they have to do? They have to look at the this



Ted Harrington:

program that's already been built, and say, we're gonna do



Ted Harrington:

it totally differently, because I know a better way. But if it's



Ted Harrington:

already working, why are you tearing it down? And that is



Ted Harrington:

actually a pretty significant problem in corporate America



Ted Harrington:

today, that that sort of political need, which I



Ted Harrington:

actually, I have no problem with someone needing to say, I need



Ted Harrington:

to make my mark on this organization so that I can make



Ted Harrington:

more money and provide more for my family. And like, what's



Ted Harrington:

wrong with that? That's amazing. But unfortunately, the way that



Ted Harrington:

it typically has to play out is by dismantling some other thing



Ted Harrington:

that already worked. And so now you have in these, it's kind of



Ted Harrington:

amazing when you see large enterprises, how inefficient



Ted Harrington:

they can be. Because every few years as there's this turnover,



Ted Harrington:

and you know, executive positions. You You've, you're



Ted Harrington:

kind of starting things all over again. And I mean, how many



Ted Harrington:

people listening right now work in a large enterprise and go



Ted Harrington:

through a reorganization? Like every three or four years,



Ted Harrington:

you're like, I'll just wait this out, because by the time it



Ted Harrington:

actually is implemented, there's going to be a reorg you know.



Dr. Dave Chatterjee:

Yep. So let me give you my answer to the



Dr. Dave Chatterjee:

question I posed to you. So, you know, two things happen, as your



Dr. Dave Chatterjee:

probably aware, it is the medium sized organizations that



Dr. Dave Chatterjee:

generally capitulate after a major cyber attack, they go out



Dr. Dave Chatterjee:

of business, there is data to support that. 60 to 70%, of



Dr. Dave Chatterjee:

small and medium sized enterprises cease to exist,



Dr. Dave Chatterjee:

which is a very rough consequence, probably the most



Dr. Dave Chatterjee:

severe consequence. But then there are large organizations.



Dr. Dave Chatterjee:

And again, I won't take any names here, who, for lack of a



Dr. Dave Chatterjee:

better word, made some very reckless mistakes, that



Dr. Dave Chatterjee:

borderlines gross negligence, and breach has happened. There



Dr. Dave Chatterjee:

were severe consequences. But they get bailed out for a



Dr. Dave Chatterjee:

variety of reasons. And that's where my concern lies. Not that



Dr. Dave Chatterjee:

we're going to solve this problem here, and neither am I



Dr. Dave Chatterjee:

trying for you to suggest what the solution should be. But



Dr. Dave Chatterjee:

that's where my concern is that when these organizations get



Dr. Dave Chatterjee:

bailed out, do they learn the lessons and they or are they do



Dr. Dave Chatterjee:

they make the necessary changes. And these are not symbolic



Dr. Dave Chatterjee:

things that you put out there to impress the media and impress



Dr. Dave Chatterjee:

your investors. But it goes deeper into their processes into



Dr. Dave Chatterjee:

how security is approached by the organization, whether



Dr. Dave Chatterjee:

security is built into their organizational culture. In my



Dr. Dave Chatterjee:

book, I talk about creating and sustaining a high-performance



Dr. Dave Chatterjee:

information security culture, it's hard to do. But it is



Dr. Dave Chatterjee:

definitely something that organizations should, should



Dr. Dave Chatterjee:

strive towards. So that's from where I was coming, when I asked



Dr. Dave Chatterjee:

you that question.



Ted Harrington:

It's hard to say without being on the inside of



Ted Harrington:

every organization, right, whether they've learned their



Ted Harrington:

lesson or not, but you see plenty of cool success stories,



Ted Harrington:

you know, I'm in the aftermath of major breaches, including the



Ted Harrington:

industry around whoever the victim was, you know, the movie



Ted Harrington:

business is a great example. Sony, you know, went through



Ted Harrington:

that really very public. You know, that was a real bummer



Ted Harrington:

that that breach for everyone who not just the people at Sony,



Ted Harrington:

but the people who work with Sony in the movie business is a



Ted Harrington:

it's kind of a small world, everyone kind of knows everyone.



Ted Harrington:

And, you know, there was a lot of a lot of hearts went out for



Ted Harrington:

that. That was a really tough time for a lot of people. But



Ted Harrington:

it's really cool to see in the aftermath, how the security



Ted Harrington:

programs at different studios, got more funding got more



Ted Harrington:

people, they got more sophisticated. And that's a cool



Ted Harrington:

aftermath. I mean, yeah, you don't want a company to go



Ted Harrington:

through what Sony went through. That's, that's terrible. But if



Ted Harrington:

it has to happen, then let's make sure that some really



Ted Harrington:

positive result. And that's, that's definitely what's been



Ted Harrington:

happening. So that was pretty cool. That was pretty cool to



Ted Harrington:

see that.



Dr. Dave Chatterjee:

That's great to hear. I'm glad you



Dr. Dave Chatterjee:

shared that with us. There are I'm sure many, many positive



Dr. Dave Chatterjee:

stories of recovery, and, you know, coming back revitalized



Dr. Dave Chatterjee:

and in ways that has made the organization better. So that's



Dr. Dave Chatterjee:

good to hear. Hey, as much as I would like to keep talking with



Dr. Dave Chatterjee:

you, I've been enjoying this, you know, we are getting to the



Dr. Dave Chatterjee:

end of our time here. So let's try to wrap things up with you



Dr. Dave Chatterjee:

sharing any final takeaways for the audience. Any final thoughts



Dr. Dave Chatterjee:

for the audience?



Ted Harrington:

Yeah, I mean, I definitely always like to end on



Ted Harrington:

a high note. And I feel like the story I just told was, was a



Ted Harrington:

high note. So there we go, you already have your high note. You



Ted Harrington:

know, we're seeing industries react really well in the



Ted Harrington:

aftermath of, of breaches. But I think that I would just leave



Ted Harrington:

people with this fact that the security community is a



Ted Harrington:

passionate one that really is trying to improve things every



Ted Harrington:

day. Ethical hackers included amongst that, and that, to me is



Ted Harrington:

really exciting to live in it and to see it and to those of



Ted Harrington:

you who maybe are wanting to join security, or maybe you are



Ted Harrington:

not in security, but you work with security companies, just



Ted Harrington:

know that there's a really passionate group, let's move



Ted Harrington:

forward. And yeah, I mean, that just we can end on that note,



Ted Harrington:

and if anyone wants to know anything more about, you know,



Ted Harrington:

if any of the ideas we talked about you wanted to ask me



Ted Harrington:

about, personally, you want to follow me on social media, you



Ted Harrington:

want to know more about my book, you you want help with your



Ted Harrington:

security testing program. Just hit me up, I'm easy to find at



Ted Harrington:

Ted harrington.com. And everything you could need to



Ted Harrington:

know is right there.



Dr. Dave Chatterjee:

Fantastic Ted, thank you again for your



Dr. Dave Chatterjee:

time. It's been a pleasure.



Ted Harrington:

Thank you for having me.



Dr. Dave Chatterjee:

A special thanks to Ted Harrington for his



Dr. Dave Chatterjee:

time and insights. If you like what you heard, please leave the



Dr. Dave Chatterjee:

podcast a rating and share it with your network. Also,



Dr. Dave Chatterjee:

subscribe to the show, so you don't miss any new episodes.



Dr. Dave Chatterjee:

Thank you for listening, and I'll see you in the next



Dr. Dave Chatterjee:

episode.



Introducer:

The information contained in this podcast is for



Introducer:

general guidance only. The discussants assume no



Introducer:

responsibility or liability for any errors or omissions in the



Introducer:

content of this podcast. The information contained in this



Introducer:

podcast is provided on an as-is basis with no guarantee of



Introducer:

completeness, accuracy, usefulness, or timeliness. The



Introducer:

opinions and recommendations expressed in this podcast are



Introducer:

those of the discussants and not of any organization.