Check out our companion blog!
Aug. 7, 2023

Blue team stories from the cyber attack trenches

Nothing tells the story like a good story, right?  This week we have Mike Saylor, the CEO of Black Swan, a cybersecurity company.  Boy, has he been in the trenches.  He tells some great stories about responding to cyber attacks. They're great stories and he's a great storyteller.  We also learn about FBI Infragard, a partnership between the FBI and the private sector.  We hope you enjoy the episode.

Mentioned in this episode:

Interview ad

Transcript

Speaker:

this episode is a good one.

 

Speaker:

We've got a cybersecurity expert that has been in the room when people are

 

Speaker:

responding to various cyber attacks.

 

Speaker:

He's got some great stories.

 

Speaker:

I love listening to them and I know you will too.

 

Speaker:

Hope you enjoy it.

 

Speaker:

hi, and welcome to backup.

 

Speaker:

Central's restored all podcast.

 

W. Curtis Preston:

I'm your host, w Curtis Preston, a k a, Mr.

 

W. Curtis Preston:

Backup.

 

W. Curtis Preston:

And I have with me a guy who once again, has astonished me with knowledge

 

W. Curtis Preston:

that why does he know this stuff?

 

W. Curtis Preston:

He's gonna solve my office chair problem.

 

W. Curtis Preston:

Prasanna Malaiyandi how's it going?

 

W. Curtis Preston:

Prasanna,

 

Prasanna Malaiyandi:

I am good, Curtis.

 

Prasanna Malaiyandi:

I'm good.

 

Prasanna Malaiyandi:

So yeah, let's talk about you needing a new office chair.

 

W. Curtis Preston:

so it, it

 

Prasanna Malaiyandi:

show the listeners.

 

Prasanna Malaiyandi:

Just, just squeak.

 

W. Curtis Preston:

Well, let's, yeah.

 

W. Curtis Preston:

So this is, so, you know, in a, in a podcast, my mic is picking

 

W. Curtis Preston:

up my squeaky office chair.

 

W. Curtis Preston:

And so either I need a new office chair or I need to lose a few pounds.

 

W. Curtis Preston:

One or the other, or maybe both.

 

W. Curtis Preston:

But uh, so you brought up what was the, it was Crandall.

 

Prasanna Malaiyandi:

Yep.

 

Prasanna Malaiyandi:

Crandall Furniture.

 

W. Curtis Preston:

Yeah.

 

W. Curtis Preston:

Crel Furniture, which is, they're, they're apparently repurposing,

 

W. Curtis Preston:

uh, you know, all those office chairs that nobody's using anymore.

 

Prasanna Malaiyandi:

Yeah.

 

Prasanna Malaiyandi:

Yeah, they buy chairs.

 

Prasanna Malaiyandi:

They refurbish them with like new foam.

 

Prasanna Malaiyandi:

They fix the lift mechanism.

 

Prasanna Malaiyandi:

Sometimes they replace the arms and then they resell it at a discount.

 

W. Curtis Preston:

Yeah,

 

Prasanna Malaiyandi:

it's crazy how expensive office chairs are.

 

Prasanna Malaiyandi:

Like some of the high-end ones are like a thousand, $1,800.

 

Prasanna Malaiyandi:

Who wants to spend that on a chair?

 

Prasanna Malaiyandi:

Like I get it.

 

Prasanna Malaiyandi:

You spend a lot of time sitting in a chair just like you do, sleeping in a bed.

 

Prasanna Malaiyandi:

But still, it's a good chunk of money to spend when you can go to like

 

Prasanna Malaiyandi:

your local office, supply store and pick up a cheap chair for like $99.

 

W. Curtis Preston:

Yeah, and I don't think this was 99, but

 

W. Curtis Preston:

it wasn't much more than that.

 

W. Curtis Preston:

I don't, I don't have, if, if I had to guess, I probably got it from Costco.

 

W. Curtis Preston:

'cause I get.

 

W. Curtis Preston:

Many other things from Costco.

 

W. Curtis Preston:

Right.

 

W. Curtis Preston:

Um, but yeah,

 

Prasanna Malaiyandi:

I had one of those chairs.

 

Prasanna Malaiyandi:

I had one of those chairs as well, right, where I was like, yeah, it worked well.

 

Prasanna Malaiyandi:

And then I'll, once the pandemic hit and we were working from home, I ended up

 

Prasanna Malaiyandi:

getting some wellness dollars from my employer and use that to get myself a

 

Prasanna Malaiyandi:

nice standing desk and an office chair.

 

W. Curtis Preston:

Yeah.

 

W. Curtis Preston:

Um, so I, I think I got the same wellness money.

 

W. Curtis Preston:

And I spent it on a webcam.

 

W. Curtis Preston:

That's what I did.

 

W. Curtis Preston:

I,

 

Prasanna Malaiyandi:

sorry, this is for my current employer

 

W. Curtis Preston:

Oh, for your current employer?

 

W. Curtis Preston:

Oh, that's right.

 

W. Curtis Preston:

We, because we were at the same employer.

 

W. Curtis Preston:

But you're saying you got wellness money from your, your new employer,

 

W. Curtis Preston:

um, and, uh, which is, you know, just as good as time as any to mention

 

W. Curtis Preston:

that this is an independent podcast.

 

W. Curtis Preston:

We're not representing, uh, you know, any employers or non employers in my case.

 

W. Curtis Preston:

And, um, I.

 

W. Curtis Preston:

You know that, uh, the opinions that you hear are ours.

 

W. Curtis Preston:

And also, uh, be sure to rate us, uh, uh, uh, you know, by, uh,

 

W. Curtis Preston:

going to your favorite podcast.

 

W. Curtis Preston:

You're scrolling down and giving us all the stars and comments.

 

W. Curtis Preston:

We'd love seeing comments from listeners.

 

W. Curtis Preston:

And if you'd like to be a part of the conversation, I could be

 

W. Curtis Preston:

reached at w Curtis Preston at gmail or um, WC Preston on Twitter.

 

W. Curtis Preston:

And also linkedin.com/in/mr.

 

W. Curtis Preston:

Backup.

 

W. Curtis Preston:

That is Mr.

 

W. Curtis Preston:

Backup on LinkedIn and you can find me.

 

W. Curtis Preston:

And, uh, with that we'll turn off to our guest at this moment.

 

W. Curtis Preston:

Uh, he's, uh, specialized in cybersecurity for over 20 years and is a member of

 

W. Curtis Preston:

F B I InfraGard, which is A group that I didn't even know existed.

 

W. Curtis Preston:

But it's a partnership between the F B I and the private sector for the

 

W. Curtis Preston:

protection of US critical infrastructure.

 

W. Curtis Preston:

He's now the c e O of Black Swan, a company that strives to democratize

 

W. Curtis Preston:

enterprise level security services.

 

W. Curtis Preston:

Which one of my first questions is gonna be, what does that mean?

 

W. Curtis Preston:

Welcome to the pod, Mike Sailor.

 

Mike Saylor:

Thank you.

 

Mike Saylor:

Thanks for having me

 

W. Curtis Preston:

so what does that mean?

 

W. Curtis Preston:

So

 

Mike Saylor:

Well, uh,

 

W. Curtis Preston:

on your website that it says you wanted to democratize

 

W. Curtis Preston:

enterprise level security services.

 

Mike Saylor:

Sure.

 

Mike Saylor:

Well, I think in, in, you know, simple explanation is that we're trying to

 

Mike Saylor:

provide, uh, enterprise class services.

 

Mike Saylor:

The, you know what, what the big boys pay for Fortune 50, fortune 100.

 

Mike Saylor:

And make it affordable and scalable and flexible enough for smaller organizations,

 

Mike Saylor:

small, medium sized businesses.

 

Mike Saylor:

Uh, part of our mission is to provide that enterprise class service to

 

Mike Saylor:

what we consider underserved markets.

 

Mike Saylor:

So, uh, education, uh, family offices, uh, credit unions as an example.

 

Mike Saylor:

Um, but also understanding that in each one of those situations you've

 

Mike Saylor:

got a variety of, uh, business sizes.

 

Mike Saylor:

So you've got a five person credit union and you've got a

 

Mike Saylor:

billion dollar credit union.

 

Mike Saylor:

Uh, and they both need, uh, help, uh, understanding and applying, um,

 

Mike Saylor:

cybersecurity controls and, and services.

 

Prasanna Malaiyandi:

So what happens today for those small customers, right?

 

Prasanna Malaiyandi:

Or like the five person credit union, like how do they even

 

Prasanna Malaiyandi:

approach cybersecurity today?

 

Prasanna Malaiyandi:

Or what is their solutions look like?

 

Mike Saylor:

Uh, they usually don't have one.

 

Mike Saylor:

Um, I.

 

Mike Saylor:

And they even have to, uh, in, in a lot of cases, have to outsource their just normal

 

Mike Saylor:

help desk, you know, hardware support.

 

Mike Saylor:

And they're relying on that, you know, that technology expertise to, uh, assist

 

Mike Saylor:

them in cyber to the extent possible.

 

Mike Saylor:

Um, but that's changing.

 

Mike Saylor:

Um, and it, and it has to, uh, a lot of, uh, services and.

 

Mike Saylor:

Protections and controls that any organization today rely

 

Mike Saylor:

on, like, like insurance.

 

Mike Saylor:

Uh, in order to qualify for cybersecurity insurance policies, you have to

 

Mike Saylor:

demonstrate these, you know, kind of, uh, good cyber hygiene practices, uh, whether

 

Mike Saylor:

you do it internally or you outsource it.

 

Mike Saylor:

Uh, and so in order just to even get insurance, uh, you have to, uh, spend

 

Mike Saylor:

some money to check some of these boxes.

 

Mike Saylor:

Um, and they're just, there's, there's not a whole lot of solutions out

 

Mike Saylor:

there options for them to, to go with.

 

W. Curtis Preston:

Interesting.

 

W. Curtis Preston:

Um, and let's talk also a little bit about, uh, F B I in regard.

 

W. Curtis Preston:

'cause like I said, I, I did, I didn't even know this in, I'm, I'm

 

W. Curtis Preston:

really glad to hear that it exists, but I didn't even know it exists.

 

W. Curtis Preston:

Uh, what, what, what does that look like?

 

Mike Saylor:

Sure.

 

Mike Saylor:

Uh, well, so it started in the late nineties.

 

Mike Saylor:

Uh, I think the, the first chapter was, uh, um, in the mid nineties.

 

Mike Saylor:

Um, and the, the idea is, Uh, for every F B I field office, um, there should be

 

Mike Saylor:

an InfraGuard chapter, and the objective of the chapter is to tie the office into

 

Mike Saylor:

the community, thereby, uh, expanding its eyes and ears, uh, but also, um,

 

Mike Saylor:

helping elevate the, uh, intelligence and awareness of the organizations in the

 

Mike Saylor:

community, uh, for the things that the F B I and that community is working on.

 

Mike Saylor:

Uh, so some, some bi-directional, uh, intelligence sharing, which

 

Mike Saylor:

really didn't happen for a long time.

 

Mike Saylor:

It's probably only been in the last five or six years that that's, that's

 

Mike Saylor:

really, uh, become more valuable.

 

Mike Saylor:

Um, prior to that, you, you might get an infra regard notice,

 

Mike Saylor:

uh, a few hours or a day before something comes out on the news.

 

Mike Saylor:

So you really weren't ahead of it too much.

 

Mike Saylor:

Um, but so now there's, there's 45 chapters.

 

Mike Saylor:

Of InfraGard throughout the country.

 

Mike Saylor:

Uh, there's an InfraGard National Alliance that kind of manages

 

Mike Saylor:

all those independent chapters.

 

Mike Saylor:

Um, and the chapters are made up of people from the community,

 

Mike Saylor:

uh, across all sectors.

 

Mike Saylor:

Uh, kind of initially it was all technology people.

 

Mike Saylor:

Uh, so 90, 90 plus percent, uh, membership and InfraGard were people and, you know,

 

Mike Saylor:

CIOs and engineers and help desk people.

 

Mike Saylor:

Uh, but today we have nurses and doctors and farmers and, um, People

 

Mike Saylor:

that work in infrastructure, water dams, uh, federal government, um,

 

Mike Saylor:

agriculture, I mentioned, um, nuclear.

 

Mike Saylor:

Uh, so each critical infrastructure section sector, uh, has an infra regard

 

Mike Saylor:

sector chief, uh, at each chapter.

 

Mike Saylor:

Uh, who is responsible for going out and.

 

Mike Saylor:

Uh, not just recruiting others from that sector, uh, to kind of

 

Mike Saylor:

strengthen the, the mix and dynamics of the chapters, uh, membership.

 

Mike Saylor:

Um, but it's also, uh, both a feeder into the F B I, uh, for intelligence

 

Mike Saylor:

and threats and awareness of what's going on out in the community, uh,

 

Mike Saylor:

but also the FBI's ability to, to, uh, To share with them so that they

 

Mike Saylor:

can do their job better, uh, get ahead of threats, um, be more aware.

 

Mike Saylor:

Uh, so it's been a pretty, pretty effective, um, partnership over the years.

 

Mike Saylor:

Uh, I helped stand up the North Texas chapter in the late nineties, and

 

Mike Saylor:

I've, I've been sector, I'm currently a sector chief over healthcare.

 

Mike Saylor:

I was a sector chief over technology.

 

Mike Saylor:

Initially I was the president of the chapter.

 

Mike Saylor:

Um, and we have a, a pretty strong.

 

Mike Saylor:

Uh, showing, uh, in our company as far as InfraGard goes, our

 

Mike Saylor:

c f O was a, a past president.

 

Mike Saylor:

She's also the past, uh, national regional representative over I think

 

Mike Saylor:

three or four different states.

 

Mike Saylor:

Our c o o was the president of the Houston chapter.

 

Mike Saylor:

He was also a national regional rep for a period of time.

 

Mike Saylor:

Uh, and then everybody in our company pretty much is a member.

 

Mike Saylor:

Um, and there's similar, there's a similar, uh, organization

 

Mike Saylor:

for the Secret Service.

 

Mike Saylor:

They call it.

 

Mike Saylor:

They used to call it the Electronic Crimes Task Force, of which I'm also a member.

 

Mike Saylor:

Uh, and then both of those are kind of related to the, in Texas we have the

 

Mike Saylor:

North Texas Crime Commission and they have subcommittees like cyber crime.

 

Mike Saylor:

And then, uh, the fusion centers that police departments, uh, fun, uh, operate.

 

Mike Saylor:

Um, in north Texas, there's the Collin County Sheriff Fusion Center, uh, from

 

Mike Saylor:

which I'm also a fusion liaison officer.

 

Mike Saylor:

So tons of intelligence sharing, information sharing.

 

Mike Saylor:

Uh, both to support the community, but also naturally with what we do, uh, that

 

Mike Saylor:

feeds really nicely into the value that we can, uh, we can give our clients.

 

Prasanna Malaiyandi:

That's awesome.

 

Prasanna Malaiyandi:

I actually, like you said, Curtis, I had never heard about this and Mike,

 

Prasanna Malaiyandi:

thank you for going into details because that's actually a really cool program.

 

Prasanna Malaiyandi:

Like I didn't realize that the F B I connected in like this in

 

Prasanna Malaiyandi:

sort of a systematic way, right?

 

Prasanna Malaiyandi:

To all these other organizations.

 

Mike Saylor:

Mm-hmm.

 

W. Curtis Preston:

Yeah, we've, we've come a long way since, um,

 

W. Curtis Preston:

the days of the cuckoo's egg, which I'm, I'm assuming you've read a

 

W. Curtis Preston:

Cuckoo's Egg or the c the cuckoo egg.

 

W. Curtis Preston:

I think, you know, because in that story from Cliff Sto back in the

 

W. Curtis Preston:

day when he contacts the F B I about a cyber attack that's happening on

 

W. Curtis Preston:

his infrastructure, They're like, well, did they steal anything?

 

W. Curtis Preston:

Right.

 

W. Curtis Preston:

They didn't, they really weren't aware of the concept of a cybersecurity attack.

 

W. Curtis Preston:

So I, I'm, I'm glad to hear that.

 

W. Curtis Preston:

You know, things have come a long way since that was the

 

W. Curtis Preston:

seventies, so, you know, whatever,

 

Mike Saylor:

And, and on

 

Mike Saylor:

the,

 

W. Curtis Preston:

while since then.

 

Mike Saylor:

Kind of along those lines.

 

Mike Saylor:

Uh, the other benefit of that is, uh, similar to the situation where, you know,

 

Mike Saylor:

there was an event, uh, we always preach.

 

Mike Saylor:

Uh, as far as incident response goes, you've gotta get ahead of that so that

 

Mike Saylor:

on game day, you know what players you can call into the, to, uh, onto the field

 

Mike Saylor:

and uh, you know, who's gonna show up.

 

Mike Saylor:

And so, um, you know, we're very adamant about.

 

Mike Saylor:

Establishing those relationships with law enforcement and subject matter experts

 

Mike Saylor:

and vendors in the community so that when something bad happens, you're not

 

Mike Saylor:

leaving a voicemail, you're not having to figure out the right person to talk to.

 

Mike Saylor:

And so in regard, and the, uh, the Secret Service organizations give you

 

Mike Saylor:

the opportunity to actually go to, they have chapter meetings and a lot of

 

Mike Saylor:

times they're at the, the FBI's field office, which is also kind of cool.

 

Mike Saylor:

Um, and so you get to meet people and exchange business cards and go

 

Mike Saylor:

to coffee and have their cell phone number instead of a mailbox number and.

 

Mike Saylor:

Um, and find the right person to talk to so that you can put 'em in your

 

Mike Saylor:

plan and you know who to call and they already know you, they've met you before.

 

Mike Saylor:

It's not a first date type of situation.

 

Mike Saylor:

So when, when, when things are going bad and the the house is

 

Mike Saylor:

on fire, uh, you know who to call and, um, they know who you are.

 

W. Curtis Preston:

Yeah, I preached the, the same thing, Mike, and,

 

W. Curtis Preston:

and, and so it's, but it sounds like InfraGard is a, is a organization

 

W. Curtis Preston:

that I can contact, go to these meetings that you were talking about.

 

W. Curtis Preston:

That, that it, that it could be that liaison.

 

W. Curtis Preston:

So that I can start to form those relationships.

 

W. Curtis Preston:

'cause you're right, it's like, uh, you know, just reaching out to, to the

 

W. Curtis Preston:

F B I blindly, um, you know, Hey, I'd like to talk to you about a potential

 

W. Curtis Preston:

future event that might happen.

 

W. Curtis Preston:

Right.

 

W. Curtis Preston:

So it sounds like Ingar can be that liaison then.

 

W. Curtis Preston:

I

 

Mike Saylor:

And, and you're right.

 

Mike Saylor:

And they do have, uh, they have, uh, speaker, um, what do they call it?

 

Mike Saylor:

Um, you can, you can sign up to be a speaker, uh, like as a

 

Mike Saylor:

resource, uh, subject matter expert.

 

Mike Saylor:

But then the F b I also has, uh, speakers that can come to your event.

 

Mike Saylor:

And so very often you can pull in that, that law enforcement, uh, perspective

 

Mike Saylor:

to, to your message and your content.

 

Mike Saylor:

And they'll bring their own slides and, you know, whatever data they

 

Mike Saylor:

can, they can share publicly as far as current events and statistics.

 

Mike Saylor:

And it's, it's usually a pretty good, uh, value add, uh, as far as content.

 

Mike Saylor:

And, and sometimes it's a, it's a draw.

 

Mike Saylor:

Uh, you know, people may not want to just come see me talk, but if it's me plus

 

Mike Saylor:

the supervisory special agent over cyber, then all of a sudden it's interesting.

 

Mike Saylor:

Uh, so.

 

Mike Saylor:

Um,

 

Mike Saylor:

yeah,

 

Prasanna Malaiyandi:

for you, Mike.

 

Prasanna Malaiyandi:

Come on.

 

Mike Saylor:

there's a lot of value.

 

Mike Saylor:

There's a lot of value in membership.

 

Mike Saylor:

Um, each chapter has their own dues.

 

Mike Saylor:

Like our, I think our chapter, it's 25 or $50 a year.

 

Mike Saylor:

Uh, but that also pays for, um, you know, food at an event or you get

 

Mike Saylor:

discounts to go into some conference.

 

Mike Saylor:

Uh, so there's a lot of, a lot of kind of cool ecosystem, um, you belong to

 

Mike Saylor:

once, once you, uh, become a member.

 

Prasanna Malaiyandi:

I am surprised this isn't publicized more

 

Mike Saylor:

It's infraguard.org I N F R A G A R d.org.

 

W. Curtis Preston:

Yeah, I'm all over

 

Mike Saylor:

you can sign up online.

 

Mike Saylor:

The, uh, the application process is, is can be kind of long, anywhere

 

Mike Saylor:

from, you know, 45 to 120 days.

 

Mike Saylor:

Uh, they do a cursory background and then each office has to do kind

 

Mike Saylor:

of a vetting, uh, to determine if, uh, You know, membership is for you.

 

Mike Saylor:

Uh, but then, uh, you're invited to kind of a new member session

 

Mike Saylor:

and you get to meet people, the board, uh, other members, uh, F B I.

 

Mike Saylor:

And, and one of the things that I'll mention is, so for every InfraGard

 

Mike Saylor:

chapter there is a full-time F B I agent that is your liaison.

 

Mike Saylor:

And they, so they kind of manage from the F B I side.

 

Mike Saylor:

Everything your chapter's doing, even though your chapter has its

 

Mike Saylor:

own board of directors and event planning and all that stuff, there's

 

Mike Saylor:

always a full-time F b I person.

 

Mike Saylor:

Um, at your event, at your board meeting, um, kind of the liaison

 

Mike Saylor:

for anything you need that the, that the bureau can, can help you with.

 

Prasanna Malaiyandi:

That's awesome.

 

Prasanna Malaiyandi:

Now,

 

W. Curtis Preston:

Go ahead.

 

Prasanna Malaiyandi:

just a follow up, I know you talked about sort of

 

Prasanna Malaiyandi:

establishing those relationships, right?

 

Prasanna Malaiyandi:

With other people who are in the chapter, do they do things like tabletop exercises

 

Prasanna Malaiyandi:

or other things or is that kind of, I.

 

Prasanna Malaiyandi:

Outside the scope of this group.

 

Mike Saylor:

So the, the InfraGard membership, well, and, and different

 

Mike Saylor:

chapters do different things like the Louisiana chapter is there.

 

Mike Saylor:

They're kind of known for, um, uh, anti, you know, maritime

 

Mike Saylor:

anti drone capabilities.

 

Mike Saylor:

So there are people at, in that chapter that are involved in how to

 

Mike Saylor:

protect businesses along the river, uh, from drones and drone strikes and

 

Mike Saylor:

surveillance and all that good stuff.

 

Mike Saylor:

And so they, they do exercises pretty often and they have

 

Mike Saylor:

some really good events.

 

Mike Saylor:

And they're, the Houston chapter's, good New York chapter.

 

Mike Saylor:

Not only do they do, um, Exercises, but they have a podcast, so

 

Mike Saylor:

they, they broadcast things.

 

Mike Saylor:

I, I wanna say it was at least weekly, maybe monthly, but I

 

Mike Saylor:

think it's weekly and they're very well known for their multimedia.

 

Mike Saylor:

Um, and so there, there are different chapters kind of

 

Mike Saylor:

specialize and do their own thing.

 

Mike Saylor:

Um, But then you're also invited to bigger events.

 

Mike Saylor:

Uh, so, um, I know that there's kind of a, uh, a large scale FEMA

 

Mike Saylor:

event, uh, every now and then.

 

Mike Saylor:

And so we're, you know, we're invited to participate in that.

 

Mike Saylor:

But as a chapter, as a community, we don't.

 

Mike Saylor:

The North Texas chapter has not gotten together and said, you know, we could

 

Mike Saylor:

probably add a lot of value if we start to collaborate and, and participate together.

 

Mike Saylor:

Uh, maybe this time we help, you know, this, this company or this

 

Mike Saylor:

set of companies, maybe this, this sector like technology or healthcare.

 

Mike Saylor:

And, you know, next time we focus on something else, I think it's a great idea.

 

Mike Saylor:

But, uh, I, I haven't seen it done, but it's definitely something

 

Mike Saylor:

that they're open to doing.

 

W. Curtis Preston:

Yeah, this is great.

 

W. Curtis Preston:

Yeah, I'm, I, I was just looking at the site and I, I wanna say, so, so, so

 

W. Curtis Preston:

Prasanna, two areas of California where there's like a really big city and then

 

W. Curtis Preston:

a smaller city next to the big city.

 

W. Curtis Preston:

One of these.

 

W. Curtis Preston:

Places has its own San Diego chapter, I'm sorry, San Diego Field

 

W. Curtis Preston:

office of the F B I and therefore a chapter of this organization.

 

W. Curtis Preston:

The other one does not.

 

W. Curtis Preston:

Do you understand what I'm trying to say to you?

 

Prasanna Malaiyandi:

No.

 

W. Curtis Preston:

There is a San Diego.

 

W. Curtis Preston:

There is a San Diego field office.

 

Prasanna Malaiyandi:

Speaker:

There's not a Santa Clara

 

W. Curtis Preston:

There is not a, there is not a E, there's

 

W. Curtis Preston:

not even a Southern Bay Area.

 

W. Curtis Preston:

There is just San Francisco Bay Area field office.

 

W. Curtis Preston:

They, they didn't, they didn't

 

Mike Saylor:

they also have.

 

W. Curtis Preston:

Bay, go ahead.

 

Mike Saylor:

They also have satellite offices and the F B I does.

 

Mike Saylor:

So for example, um, Frisco, Texas is kind of northwest of downtown Dallas,

 

Mike Saylor:

but you know, within 30 minute driving.

 

Mike Saylor:

Uh, so the Dallas F B I headquarters is in downtown Dallas, but they have

 

Mike Saylor:

a satellite office in Frisco and they have a satellite office in Fort Worth.

 

Mike Saylor:

Uh, all of that is considered, uh, under the purview of the Dallas

 

Mike Saylor:

Field Office, and our North Texas chapter goes from Waco to Lubbock and.

 

Mike Saylor:

Abilene, uh, I'm sorry.

 

Mike Saylor:

Um, just east of El Paso all the way out to Shreveport.

 

Mike Saylor:

So technically, like quite literally all of North Texas is part of one chapter.

 

Mike Saylor:

However, we have some of the, uh, members that are out in like the Abilene area

 

Mike Saylor:

as an example, that feel disconnected.

 

Mike Saylor:

Like we can't keep driving to Dallas.

 

Mike Saylor:

Every time you guys have an event, we wanna start our own chapter, uh, and.

 

Mike Saylor:

They got enough support for that, where they did a feasibility study and, uh,

 

Mike Saylor:

and interest and they were going to help them build their own chapter.

 

Mike Saylor:

I'm not sure the status of that, but, uh, that is an option.

 

Mike Saylor:

If, if you find enough interest in membership and you know it's feasible,

 

Mike Saylor:

um, you know, they'll, they're, they're open to starting other chapters.

 

W. Curtis Preston:

well, sadly, there's no one in the South Bay area that

 

W. Curtis Preston:

knows anything about technology or.

 

Prasanna Malaiyandi:

Not at all.

 

Prasanna Malaiyandi:

Yeah.

 

Prasanna Malaiyandi:

Yeah.

 

W. Curtis Preston:

anyway.

 

W. Curtis Preston:

So, well let me just ask you one, one final question about this

 

W. Curtis Preston:

topic and then I wanna move on.

 

W. Curtis Preston:

Um, and that is, there is a debate when, you know, as I've been continuing to

 

W. Curtis Preston:

research incident response, having to do with ransomware, there is a debate as to.

 

W. Curtis Preston:

When or if to contact the F B I, right?

 

W. Curtis Preston:

Or just law enforcement in general, but in the us The F B I W.

 

W. Curtis Preston:

What's your opinion on that?

 

Mike Saylor:

Uh, my opinion is as soon as possible, however, um, You know,

 

Mike Saylor:

it's not always up to, to us and us by us, I mean, you know, technology,

 

Mike Saylor:

leadership, you know, whether you're the CISO or the c I o, unless, unless

 

Mike Saylor:

you're chartered to do so by executive management, uh, I always suggest that

 

Mike Saylor:

whoever the IT leadership is, you know, we're just, we're just putting out a fire.

 

Mike Saylor:

Uh, you know what?

 

Mike Saylor:

Whatever the incident is, we're putting out the fire.

 

Mike Saylor:

So from a technology perspective, our job is to recover.

 

Mike Saylor:

Or from a business perspective, you really need to defer that to your

 

Mike Saylor:

legal counsel or, or your, whoever your executive is or your insurance company.

 

Mike Saylor:

Uh, but your insurance company is gonna say, involve law

 

Mike Saylor:

enforcement as soon as possible.

 

Mike Saylor:

Your legal counsel, whether it's internal or, or, or outside

 

Mike Saylor:

counsel is gonna want to know more.

 

Mike Saylor:

Um, But at, at the end of the day, uh, and I, and I've, I've seen this from,

 

Mike Saylor:

from a lot of different perspectives.

 

Mike Saylor:

'cause I'm also, I also do expert testimony in court.

 

Mike Saylor:

So if this ended up in court, you know, one of the things

 

Mike Saylor:

that that benefits you from.

 

Mike Saylor:

Contacting law enforcement as soon as possible is, is a

 

Mike Saylor:

phrase called due diligence.

 

Mike Saylor:

So when, when we talk about, all right, so you guys screwed up, but how diligent

 

Mike Saylor:

were you in trying to prevent this?

 

Mike Saylor:

How diligent were you in responding to this?

 

Mike Saylor:

And how diligent were you in, in asking for help from everybody that you

 

Mike Saylor:

could possibly ask from for help from?

 

Mike Saylor:

And how open were you in?

 

Mike Saylor:

Um, And understanding and communicating what the problem was.

 

Mike Saylor:

And so if, if in any of those phases, uh, you're perceived as less than

 

Mike Saylor:

diligent, uh, and possibly, um, I.

 

Mike Saylor:

You know, hiding something or, or, or trying to cover something

 

Mike Saylor:

up when it gets to damages.

 

Mike Saylor:

If, if this lawsuit goes to damages, that's where it's gonna come back on you.

 

Mike Saylor:

Uh, 'cause everybody that, that goes through an incident, obviously you're

 

Mike Saylor:

guilty of having gone through an incident.

 

Mike Saylor:

You didn't do enough of something, which is almost impossible.

 

Mike Saylor:

But, you know, when you're in court, it's kind of black and white and you,

 

Mike Saylor:

at the end of the day, the fact is you had a breach, you had an incident,

 

Mike Saylor:

and it, it resulted in these things.

 

Mike Saylor:

Um, all right, so there's.

 

Mike Saylor:

You, you, you get a judgment for that.

 

Mike Saylor:

Alright, well then we go to damages.

 

Mike Saylor:

And some of that's black and white too, California especially, you

 

Mike Saylor:

know, for every record of California citizen, there's, it's defined.

 

Mike Saylor:

But, uh, on top of that, uh, so that's statutory.

 

Mike Saylor:

But then the, the judge can say, you guys were not diligent in

 

Mike Saylor:

protecting, responding, communicating.

 

Mike Saylor:

And, and because of that, I'm going to assess these additional fines.

 

Mike Saylor:

And so, uh, there's a lot to consider.

 

Mike Saylor:

And back to the tabletop exercise, that's when you need to start talking

 

Mike Saylor:

through, this is how this should actually go, and someone's gonna

 

Mike Saylor:

go, when do we call law enforcement?

 

Mike Saylor:

And we should look at the people in the room that would typically have

 

Mike Saylor:

that answer, and let's get that in writing ahead of time, uh, and put

 

Mike Saylor:

that in our plan as, uh, as part of, uh, how we respond to stuff.

 

W. Curtis Preston:

You don't want to be the, the, the, the rogue, uh, incident

 

W. Curtis Preston:

response cyber security person just randomly deciding to call the F B I.

 

W. Curtis Preston:

Uh, this needs to be decided up upfront.

 

Mike Saylor:

now I've been through some incidents, uh, just real quick

 

Mike Saylor:

where, uh, the incident was something illegal and management said, you're

 

Mike Saylor:

not reporting that to anybody.

 

Mike Saylor:

We'll handle it internally, but there are certain cases where

 

Mike Saylor:

you are a mandatory reporter.

 

Mike Saylor:

Having identified certain types of things, um, and it's kind of up to

 

Mike Saylor:

you on how to handle that, but I would suggest, uh, even if management

 

Mike Saylor:

said, don't report it, that's your, your life you're dealing with.

 

Mike Saylor:

If they find out you didn't report it and you knew about it, now you're going to

 

Mike Saylor:

jail regardless of what your boss said.

 

Mike Saylor:

Um, so I would suggest there's ways doing anonymous, uh, reporting and

 

Mike Saylor:

then just capture that activity as evidence that you did report it.

 

Mike Saylor:

Um, So there's, there's a, there's a lot of things to consider when you're, you're

 

Mike Saylor:

responsible for responding to stuff.

 

Mike Saylor:

Uh, and in addition to that, you may have access to things that, that require you as

 

Mike Saylor:

a mandatory reporter for doing something.

 

Prasanna Malaiyandi:

I was interesting you brought that up, Mike.

 

Prasanna Malaiyandi:

I was just reading a, I think on Twitter or read or something like that where

 

Prasanna Malaiyandi:

people were saying like as a programmer, right, if you're asked to do something,

 

Prasanna Malaiyandi:

which doesn't seem right, right, and the company gets caught in the end,

 

Prasanna Malaiyandi:

you're sort of the one responsible because you wrote the code, right?

 

Prasanna Malaiyandi:

You did something when someone told you to do something illegal, potentially.

 

Prasanna Malaiyandi:

Right?

 

Prasanna Malaiyandi:

And it's still your neck on the line.

 

Prasanna Malaiyandi:

Versus like, no one ever really gets like penalized like that for

 

Prasanna Malaiyandi:

saying no to doing something illegal.

 

Prasanna Malaiyandi:

Right.

 

Prasanna Malaiyandi:

And so it applies in various cases, including responding to being

 

Prasanna Malaiyandi:

told to do something illegal.

 

Prasanna Malaiyandi:

Uh, the one thing I did want to ask you, Mike, just going back to the

 

Prasanna Malaiyandi:

question Curtis asked about sort of reporting, how do you feel that

 

Prasanna Malaiyandi:

companies have done in being transparent about cybersecurity incidences?

 

Prasanna Malaiyandi:

I.

 

Mike Saylor:

Well, I think that's a double-edged sword because it could

 

Mike Saylor:

seem like they're not being very transparent when really they just

 

Mike Saylor:

don't have a clue of what's going on.

 

Mike Saylor:

Uh, and, and I think that's the case.

 

Mike Saylor:

The majority of the time we got ransomware.

 

Mike Saylor:

How did it happen?

 

Mike Saylor:

Someone clicked something, I guess, but they really don't know, or that's

 

Mike Saylor:

what they were told, even though that's not maybe really how it happened.

 

Mike Saylor:

So I think understanding and understanding comes from, you know, information.

 

Mike Saylor:

Well, how do we get information?

 

Mike Saylor:

Well, you've gotta have the right technology stack.

 

Mike Saylor:

You've gotta have the right visibility and people and all reporting.

 

Mike Saylor:

And if, if any one of those areas is lacking, Then your ability to

 

Mike Saylor:

really know what happened, uh, is diminished to some degree.

 

Mike Saylor:

So I, I think there's two, there's, there's, there's a couple of perspectives.

 

Mike Saylor:

I'm not just gonna say there's two.

 

Mike Saylor:

There's, there's the one where they just really didn't know what happened in their.

 

Mike Saylor:

They're sharing what they, they know in whatever way they know how.

 

Mike Saylor:

Uh, and a lot of those cases, it's because they tried to address it on their own.

 

Mike Saylor:

They didn't bring in the law enforcement or outside help or

 

Mike Saylor:

professional firm or, or what have you.

 

Mike Saylor:

They just said, we had a problem.

 

Mike Saylor:

We're gonna accept the, you know, the, the fact that it happened and pay

 

Mike Saylor:

our dues or, you know, whatever the consequences are and we'll move on.

 

Mike Saylor:

And, uh, so there's that perspective.

 

Mike Saylor:

The other one is companies that truly.

 

Mike Saylor:

Can't or have decided they can't take the reputational

 

Mike Saylor:

risk of divulging what happened.

 

Mike Saylor:

Uh, some of that might be privacy or contractual.

 

Mike Saylor:

Like you will never tell people that our network was, uh, compromised

 

Mike Saylor:

because that, because we rely on you for these other things.

 

Mike Saylor:

And so clients could be impacted by, by your incident, you know, their,

 

Mike Saylor:

their business or service too.

 

Mike Saylor:

So, uh, depending on how your business functions and how you, how complex it is

 

Mike Saylor:

with, with providing services or data to.

 

Mike Saylor:

To clients or third parties.

 

Mike Saylor:

Uh, you may be limited in what you can say, um, but I think what you're

 

Mike Saylor:

getting at is, yeah, there are definitely companies out there that will deny

 

Mike Saylor:

altogether that there was a comp.

 

Mike Saylor:

I don't, so, you know, some, some bad guys put all of our customer data on

 

Mike Saylor:

the, on the internet and you can see it.

 

Mike Saylor:

They'll, they will still deny to the nth degree that they were not compromised,

 

Mike Saylor:

that they did not get that data from us.

 

Mike Saylor:

And I was actually in a case like that with a telecom company.

 

Mike Saylor:

Uh, the Secret Service called us and said, Actually the F b I called

 

Mike Saylor:

us first and said, we're seeing your client data on the internet.

 

Mike Saylor:

And um, this was in the, the late nineties.

 

Mike Saylor:

Um, we're seeing your customer's data on the internet.

 

Mike Saylor:

And when we started looking into it, they were all of our internet customers.

 

Mike Saylor:

And so we went back to our internet provider and said, it looks like all

 

Mike Saylor:

this data's coming from you, and they denied it Well, Secret Service got

 

Mike Saylor:

involved, uh, due to jurisdiction.

 

Mike Saylor:

It was different states and different things.

 

Mike Saylor:

And so we went, we actually went to that company, uh, onsite with the

 

Mike Saylor:

Secret Service and said, we're here to talk about this, that, and the other.

 

Mike Saylor:

And well, it wasn't us.

 

Mike Saylor:

Uh, it, it didn't come from us.

 

Mike Saylor:

Well, all the data that we were seeing, and it's not just related

 

Mike Saylor:

to you, it's got metadata in it.

 

Mike Saylor:

That said it did come from you.

 

Mike Saylor:

No, it didn't.

 

Mike Saylor:

Well, we're not leaving until we talk to somebody, so they

 

Mike Saylor:

put us in this conference room.

 

Mike Saylor:

And locked us in there.

 

Mike Saylor:

Didn't let us out to go talk to anybody.

 

Mike Saylor:

And we had to, like, someone would come in and say, what do

 

Mike Saylor:

you want to, what do you need?

 

Mike Saylor:

And we would say it.

 

Mike Saylor:

And they would go out and, and look, uh, or, or collect that for us.

 

Mike Saylor:

And, uh, sometime during the day, I asked if I could plug into their, their

 

Mike Saylor:

wall jack and, uh, so I could have internet access to, to check email.

 

Mike Saylor:

And they said, sure.

 

Mike Saylor:

Well, I started running, running a, a network sniffer, uh, capturing network

 

W. Curtis Preston:

you did.

 

Mike Saylor:

And, and back in the day they were using, uh, I C

 

Mike Saylor:

Q, the, the chat, the chat app.

 

Mike Saylor:

And I was capturing in plain text everything they were saying.

 

Mike Saylor:

And it was all about, ha ha, we've got 'em locked in the conference room.

 

Mike Saylor:

They'll give up talking to us at some point and just go home.

 

Mike Saylor:

We're not gonna give 'em anything.

 

Mike Saylor:

Um, Tell Bob that he's safe, you know that his screw up is we're

 

Mike Saylor:

gonna brush it under the rug and all.

 

Mike Saylor:

So I remember this, this little secret service lady, uh, and

 

Mike Saylor:

I say she really was little.

 

Mike Saylor:

She was like five feet tall.

 

Mike Saylor:

Um, her name was Kim.

 

Mike Saylor:

She kicked the conference room door open and it was, it was the door that

 

Mike Saylor:

opened in, but she kicked it out.

 

Mike Saylor:

I mean, she.

 

Mike Saylor:

She knew how to kick a door and she kicked that door and said, I need

 

Mike Saylor:

the executive team in this office right in front of me in the next five

 

Mike Saylor:

minutes where people are going to jail.

 

Mike Saylor:

And she took control.

 

Mike Saylor:

And, and it was probably, uh, maybe later that year, we actually

 

Mike Saylor:

caught the hacker that did that.

 

Mike Saylor:

His name was Matthew Freeze.

 

Mike Saylor:

He, uh, we caught him in Corpus Christi with the Sheriff's Department.

 

Mike Saylor:

Uh, he's in, I think he's still in jail.

 

Mike Saylor:

Um, But I went down to interview Matt Freeze, uh, and uh, thinking

 

Mike Saylor:

I was gonna have a chance to talk to him about how he did it and get

 

Mike Saylor:

the, the, the verbal confirmation that it did come from this company.

 

Mike Saylor:

'cause they're still denying it.

 

Mike Saylor:

And, uh, I was there for nine hours waiting in line of, uh, more important

 

Mike Saylor:

people than me to talk to this guy.

 

Mike Saylor:

He had hacked NASA and Department of Defense and.

 

Mike Saylor:

Library of Congress, all these other people were there to ask him how he

 

Mike Saylor:

did what he did and get his confession.

 

Mike Saylor:

And so I ended up giving my list of questions to a Homeland Security guy.

 

Mike Saylor:

Back then, it wasn't called Homeland Security, it was, uh, uh, ice.

 

Mike Saylor:

Um, and so I got, I got his confession that way.

 

Mike Saylor:

But, uh, I, I'm, I'm not even sure why, how we got, oh, uh, people

 

Mike Saylor:

saying that they weren't hacked.

 

Mike Saylor:

Even though you've got all the evidence points,

 

W. Curtis Preston:

Right, right.

 

W. Curtis Preston:

Well, that's, that's a great story with the, with, with a, with a great climax.

 

W. Curtis Preston:

I love the, the agent kicking down the door.

 

W. Curtis Preston:

Uh, yeah, that must have been something to be there.

 

W. Curtis Preston:

Um, so, so let me, let, let me do a change of tack here.

 

W. Curtis Preston:

So, you know, let's say we're a company, we have done.

 

W. Curtis Preston:

From a, so we, you know, we have, we have an incident response plan, right?

 

W. Curtis Preston:

We, we've, we've decided whether or not we're gonna contact law enforcement.

 

W. Curtis Preston:

We, um, we did all of the things that a cybersecurity company asked

 

W. Curtis Preston:

us to do in terms of prevention and, and, and all of those things.

 

W. Curtis Preston:

Um, what one, one thing I am.

 

W. Curtis Preston:

Interested in is obviously we, we spend a lot of our time with

 

W. Curtis Preston:

talking about ransomware, right?

 

W. Curtis Preston:

And the, and I understand that ransomware really in the end is

 

W. Curtis Preston:

just a payload of a, a much bigger cybersecurity problem, right?

 

W. Curtis Preston:

Um, what I'm seeing a lot is that I, I, I'm reading that now.

 

W. Curtis Preston:

I think it was like more than 90% of what we used to just call ransomware

 

W. Curtis Preston:

attacks are really exfiltration attacks accompanied with ransomware.

 

W. Curtis Preston:

Right.

 

W. Curtis Preston:

Um, and so I, I have a couple of, you know, sort of questions about.

 

W. Curtis Preston:

Uh, starting with, you know, given the way, the way a typical

 

W. Curtis Preston:

ransomware attack happens, right?

 

W. Curtis Preston:

You've got your, the, the initial, um, uh, I forgot what

 

W. Curtis Preston:

actually what the world calls it.

 

W. Curtis Preston:

The, the initial access broker, right?

 

W. Curtis Preston:

You get the initial access broker, then you get somebody that's in there

 

W. Curtis Preston:

and they start probing around, right?

 

W. Curtis Preston:

They start seeing how they can, you know, how they can get around.

 

W. Curtis Preston:

And then my understanding is as soon as they can, they start exfiltrating data.

 

W. Curtis Preston:

So my question is, it is sort of two questions.

 

W. Curtis Preston:

you know, beyond the usual, you know, there are some things, you

 

W. Curtis Preston:

know, there are some things that we know we should all be doing, right?

 

W. Curtis Preston:

You know, in terms of password management and M f A and, um, you

 

W. Curtis Preston:

know, all, all of those you, you know, and, and, and, uh, patch management.

 

W. Curtis Preston:

Um, can you think of some things.

 

W. Curtis Preston:

That a company that wants to take that next step, things that,

 

W. Curtis Preston:

that, that could either stop, um, lateral movement number one.

 

W. Curtis Preston:

And then, and then just as importantly, if not, if not more

 

W. Curtis Preston:

importantly, exfiltration of data.

 

W. Curtis Preston:

That was a really long question.

 

W. Curtis Preston:

Sorry about that.

 

Mike Saylor:

And, and I had so many things I wanted to chime in with that.

 

Mike Saylor:

I've, I've lost some of them, but, uh, I'm, I'm glad you, I'm glad When you

 

Mike Saylor:

said typical ransomware, you didn't go down, they, they clicked on an email.

 

Mike Saylor:

'cause that's not typical anymore.

 

Mike Saylor:

That's, that's statistically the.

 

Mike Saylor:

Probably the higher probability of success, but in a lot of cases

 

Mike Saylor:

it's just that user that gets compromised, not not the whole company.

 

Mike Saylor:

So you're right, typically the, the enterprise, uh, scale attack

 

Mike Saylor:

is, uh, via some either access broker or the ransomware campaign.

 

Mike Saylor:

Uh, has, you know, their own.

 

Mike Saylor:

Uh, squad of pen testers that are finding ways into environments, but you're right.

 

Mike Saylor:

So typically it is access to the environment that then, you know, as

 

Mike Saylor:

far as the phases of attack goes, then they start, uh, the reconnaissance.

 

Mike Saylor:

Uh, to answer your question about, um, how do we, how do we

 

Mike Saylor:

address the exfiltration piece?

 

Mike Saylor:

Um, my favorite response is it depends, and I say that a lot in a lot of

 

Mike Saylor:

different scenarios and, and, Uh, and it's for good reason because it

 

Mike Saylor:

really depends on the organization.

 

Mike Saylor:

And so each company needs to go through an exercise of figuring out what's important

 

Mike Saylor:

to them and where is it because maybe your data's already exfiltrated, it's

 

Mike Saylor:

out in, you know, a cloud somewhere.

 

Mike Saylor:

So I'm not even have to attack your company anymore.

 

Mike Saylor:

I just have to go figure out where your data is and attack that company.

 

Mike Saylor:

Um, and, or maybe it's a partner or whoever, and there's

 

Mike Saylor:

tons of examples of, of.

 

Mike Saylor:

F bad guys.

 

Mike Saylor:

Figuring out where the, where the important stuff is and making best

 

Mike Saylor:

use of their time and resources.

 

Mike Saylor:

So, so it really does depend on the organization, uh, understanding

 

Mike Saylor:

your technology stack, your architecture, your culture.

 

Mike Saylor:

I.

 

Mike Saylor:

Uh, and then obviously where is your stuff?

 

Mike Saylor:

Is it data?

 

Mike Saylor:

Is it a system, is it a service?

 

Mike Saylor:

Uh, because that's what bad guys are gonna figure out when

 

Mike Saylor:

they're doing the reconnaissance.

 

Mike Saylor:

They're looking for, you know, who is this company?

 

Mike Saylor:

'cause in a lot of cases, they don't, they didn't specifically attack you.

 

Mike Saylor:

Uh, they just, they were running some tools and found a vulnerability and

 

Mike Saylor:

they picked at it, and now they've got access to some company's network.

 

Mike Saylor:

So they've gotta figure that out first.

 

Mike Saylor:

Once they figure out who you are, they wanna figure out what you do.

 

Mike Saylor:

Uh, where, where is your important stuff?

 

Mike Saylor:

Including your backups.

 

Mike Saylor:

Uh, and then to some degree, they're also looking for your financials and if they

 

Mike Saylor:

can find a copy of your insurance, uh, policy, all these things, well, all right.

 

Mike Saylor:

So depending on the company, uh, and, and your organization's particular situation,

 

Mike Saylor:

um, there are ways of addressing.

 

Mike Saylor:

Uh, the data exfiltration problem, one of those is, well, let's put our ti

 

Mike Saylor:

put tighter controls around our data.

 

Mike Saylor:

And that includes like data integrity, monitor file integrity monitoring, um,

 

Mike Saylor:

restricted access, network segmentation, firewall rules that throttle, you know,

 

Mike Saylor:

data uploads or alerts of, of doing so.

 

Mike Saylor:

Um, but I did wanna address one, um, one comment you made.

 

Mike Saylor:

How do we prevent this from happening?

 

Mike Saylor:

And I really think.

 

Mike Saylor:

People need to stop thinking about preventing it and start looking at

 

Mike Saylor:

ways of identifying it as soon as possible with either automated or

 

Mike Saylor:

human response as soon as possible.

 

Mike Saylor:

Uh, and then how do we collect all the information we need to make sure

 

Mike Saylor:

that we understand how it happened, what they did, and, and capture

 

Mike Saylor:

what we did to respond to that.

 

Mike Saylor:

And so that's very important, uh, for a lot of different reasons.

 

Mike Saylor:

One, if you put too much, uh, emphasis on prevention, then.

 

Mike Saylor:

A couple of things are gonna happen.

 

Mike Saylor:

One, you've, you've invested a lot of money that could be more appropriately

 

Mike Saylor:

used in identification and response.

 

Mike Saylor:

Uh, two, you're very likely going to become complacent thinking that you've

 

Mike Saylor:

got everything in place you need, and that's not gonna happen to us.

 

Mike Saylor:

And then lastly, a lot of those preventative controls don't do

 

Mike Saylor:

the data collection necessary to figure out how things happened.

 

Mike Saylor:

Um, and, and we get asked a lot.

 

Mike Saylor:

We had this incident and all we need to know is, is there

 

Mike Saylor:

evidence of data exfiltration?

 

Mike Saylor:

Because that's all we have to report.

 

Mike Saylor:

So what we had ransomware, so what we had a breach.

 

Mike Saylor:

If there was no data taken, then we don't have to report it.

 

Mike Saylor:

Okay, great.

 

Mike Saylor:

Well, let's look at your technology stack and, and the things that you have

 

Mike Saylor:

that would've collected that information and they didn't have anything or what

 

Mike Saylor:

they have wasn't configured well.

 

Mike Saylor:

And so we didn't have the information to, to determine whether or not

 

Mike Saylor:

data was exfiltrated to any degree.

 

Mike Saylor:

Uh, so we could see the, the network connections and the sessions, uh,

 

Mike Saylor:

but we couldn't see, uh, the data throughput or, or even what the data was.

 

Prasanna Malaiyandi:

so.

 

Prasanna Malaiyandi:

In that case though, Mike, is it you have to assume worst case, that there

 

Prasanna Malaiyandi:

was personal data or other things that was exfiltrated or is it, I don't

 

Prasanna Malaiyandi:

know what was happened, so I'll just say I don't know or nothing happened.

 

Mike Saylor:

There's a couple of things there too.

 

Mike Saylor:

Uh, so I mean, fundamentally, all of your data should be encrypted as often as it

 

Mike Saylor:

as it can be, uh, at rest in transit.

 

Mike Saylor:

Um, so that if it is exfiltrated, you, you, you were diligent protecting your

 

Mike Saylor:

data so that if it was stolen, there's a small likelihood that it's even usable.

 

Mike Saylor:

Well, not usable within, you know, relatively, you

 

Mike Saylor:

know, 10 years or whatever.

 

Mike Saylor:

Right.

 

Mike Saylor:

Um, so encryption is very important from a diligence perspective.

 

Mike Saylor:

Well then in the absence of evidence that data was exfiltrated, um,

 

Mike Saylor:

and this is something you have to work with your legal counsel on.

 

Mike Saylor:

How do we then word our communication, uh, to employees or clients or even the state

 

Mike Saylor:

or regulatory agency about what happened?

 

Mike Saylor:

And very often it is, uh, stated similar to, uh, no evidence was found to support.

 

Mike Saylor:

Right.

 

Mike Saylor:

So it's not yes or no, it's, we didn't find anything that said it did happen.

 

W. Curtis Preston:

Yeah.

 

W. Curtis Preston:

We've talked about a number of those incidents.

 

Prasanna Malaiyandi:

Yeah.

 

W. Curtis Preston:

We, we have no evidence that that data was stolen.

 

W. Curtis Preston:

That because we had really bad tracking mechanisms that would

 

W. Curtis Preston:

give, that would tell us that data.

 

Mike Saylor:

and it, and it also depends on the threat actors.

 

Mike Saylor:

There are some threat actors that have a, uh, You know, a good

 

Mike Saylor:

reputation if you can have one.

 

Mike Saylor:

Uh, as a, as a threat actor that says, you know, they, they live by their code,

 

Mike Saylor:

and their code is, you know, if we steal your data, uh, you have, let's just say

 

Mike Saylor:

three days to acknowledge that you were breached and then you have, uh, and then

 

Mike Saylor:

we'll, we'll submit to you an offer.

 

Mike Saylor:

Uh, so you ransom note, and if so, first, if you, if you acknowledge that you are,

 

Mike Saylor:

were attacked and you contact us within three days, then we won't put your company

 

Mike Saylor:

on the wall of shame, which is a public indication that you were compromised.

 

Mike Saylor:

And, and people that know us know that we have some or all of your data.

 

Mike Saylor:

So we won't do that, and then we'll give you the ransom note.

 

Mike Saylor:

And if you pay that ransom note, or if we start these negotiations and we get,

 

Mike Saylor:

we go through this process and you pay us, then we promise to, to destroy all

 

Mike Saylor:

your data and, and keep it confidential and we'll even give you good tech

 

Mike Saylor:

support while you're trying to recover.

 

Mike Saylor:

Um, and so I've been through a variety of, of, of those types of incidents, seeing

 

Mike Saylor:

the, the gamut of, uh, bad actors that.

 

Mike Saylor:

Aren't very well organized and don't care, uh, all the way up through

 

Mike Saylor:

the very organized ones that, that operate like a, like a business and

 

Mike Saylor:

they've got good customer support or, you know, as good as it can be.

 

Mike Saylor:

Um, but, um, I will say that, you know, there is a trend towards

 

Mike Saylor:

data exfiltration with ransomware.

 

Mike Saylor:

Uh, there's, there's a still a large um, A large occurrence of ransomware where

 

Mike Saylor:

they don't care about your data, they just wanna make sure you're all locked up.

 

Mike Saylor:

And that's what they're gonna use for leverage to get you to pay.

 

Mike Saylor:

Because there's also the, the on the backside of that, even though threat

 

Mike Saylor:

actors are very risk averse, there's less risk from a, a consequence

 

Mike Saylor:

perspective, a prosecution perspective of just compromising your network

 

Mike Saylor:

and, and encrypting your stuff.

 

Mike Saylor:

Sure, I'll get in trouble.

 

Mike Saylor:

Sure.

 

Mike Saylor:

I'll get jail time and all this stuff, but if I also steal your data,

 

Mike Saylor:

Especially if it's regulatory data, healthcare, p i i, whatever, that's

 

Mike Saylor:

additional charges if I get caught.

 

Mike Saylor:

And so in a lot of cases, similar to the data access brokers, you

 

Mike Saylor:

also have, um, uh, network access brokers in addition to them.

 

Mike Saylor:

You also have the data brokers.

 

Mike Saylor:

So you've got the, and so it's this whole ecosystem.

 

Mike Saylor:

All right, so who do I know?

 

Mike Saylor:

Who, who can I pay to compromise your network?

 

Mike Saylor:

Alright, got that.

 

Mike Saylor:

I have the access.

 

Mike Saylor:

Who can I pay to develop the payload?

 

Mike Saylor:

Alright, got that.

 

Mike Saylor:

So payload's in there, ransomware's running, and now we've got

 

Mike Saylor:

their environment locked up and we've got this data set.

 

Mike Saylor:

I don't want the data set 'cause I don't want to get caught with it.

 

Mike Saylor:

So now I gotta find a data broker that will buy it from me, who knows how

 

Mike Saylor:

then to kinda like diamonds, right?

 

Mike Saylor:

I bought the rod diamonds, I gotta find a diamond cutter and then I

 

Mike Saylor:

gotta find a diamond distributor.

 

Mike Saylor:

And, you know, everybody makes their own cut.

 

Mike Saylor:

Um, so there isn't, there are uh, uh, there's still a large volume of, of

 

Mike Saylor:

attacks where this eco, this whole ecosystem comes into play and, and you're

 

Mike Saylor:

just, Depending on where you, where you catch the attack, you're dealing

 

Mike Saylor:

with different, um, threat actors.

 

W. Curtis Preston:

Yeah, that, that's interesting.

 

W. Curtis Preston:

I wasn't aware.

 

W. Curtis Preston:

Um, you know, it sounds like it's kind of like felony murder, right?

 

W. Curtis Preston:

Where, you know, like, um, it, it makes it worse, right?

 

W. Curtis Preston:

You killed somebody, but you killed somebody in the

 

W. Curtis Preston:

commission of another felony.

 

W. Curtis Preston:

It makes it, it makes it worse.

 

W. Curtis Preston:

Um, the, um, Um, and so like, even if you didn't mean to kill them, right.

 

W. Curtis Preston:

That's my understanding.

 

W. Curtis Preston:

Like even if it, if it would otherwise be considered like accidental homicide

 

W. Curtis Preston:

or whatever, that because you, it happened in the commission of a

 

W. Curtis Preston:

felony, it makes it felony murder.

 

W. Curtis Preston:

Um, that, that is an interesting concept.

 

W. Curtis Preston:

Um, I, I, I, by the way, Mike, even though it sounds like maybe I was saying

 

W. Curtis Preston:

differently, I completely agree with you with sort of the, the assumed breach.

 

W. Curtis Preston:

Concept, right?

 

W. Curtis Preston:

That you need to spend, you need to be just as good if not better, with

 

W. Curtis Preston:

detection and response, uh, and recovery than the prevention aspect, right?

 

W. Curtis Preston:

Um, you know, having said that, there's nothing wrong with, with

 

W. Curtis Preston:

an ounce of prevention, right?

 

W. Curtis Preston:

Um, and that's why, um, I, I just, it, it bothers me.

 

W. Curtis Preston:

Like, on, on one hand we talk about some of the advanced things that you

 

W. Curtis Preston:

could do to, to help, but most people I.

 

W. Curtis Preston:

Um, you know, such as preventing, preventing lateral movement

 

W. Curtis Preston:

between systems that don't need to have lateral movement, right.

 

W. Curtis Preston:

Um, the, there's nothing wrong with that, but you're right, there's a cost and of

 

W. Curtis Preston:

doing it initially, there's a cost of maintaining that and there's a cost of.

 

W. Curtis Preston:

Of, you know, well, cybersecurity is always a pain, right?

 

W. Curtis Preston:

The be the more security you have, the harder it's to do your job.

 

W. Curtis Preston:

Right?

 

W. Curtis Preston:

Unless you're the si the sc the cybersecurity guy.

 

W. Curtis Preston:

Um, the, um, uh, I had a point, I was on my, I was on my way to

 

W. Curtis Preston:

a point and it seems to have,

 

Mike Saylor:

that's why secure, that's why convenience stores are

 

Mike Saylor:

robbed more than security stores.

 

W. Curtis Preston:

I see, I see what you did there.

 

W. Curtis Preston:

Um, the, um, The, uh, let's talk about response and recovery.

 

W. Curtis Preston:

Um, the, which is generally what we end up talking most of our time about here.

 

W. Curtis Preston:

What do you think is, you know, we talked about the things that you

 

W. Curtis Preston:

need to do in advance, establishing a communication with the F B I or other law

 

W. Curtis Preston:

enforcement, um, you know, establishing a relationship with somebody like yourself.

 

W. Curtis Preston:

Um, you know, so, so that you're not, you're not making that conversation the

 

W. Curtis Preston:

first time in the middle of an incident.

 

W. Curtis Preston:

What else do you think people need to do to be ready to respond,

 

W. Curtis Preston:

uh, in, in a cyber attack?

 

Mike Saylor:

Well, I think, uh, ex tabletop exercises are a great way to kind

 

Mike Saylor:

of ferret that out for your organization.

 

Mike Saylor:

Sit down with as many people in your company as you can.

 

Mike Saylor:

I mean, a lot of it departments are like, let's just do it with us first so we don't

 

Mike Saylor:

look stupid in front of everybody else.

 

Mike Saylor:

And that's fine.

 

Mike Saylor:

You know, you know, have a, have your, have your, you

 

Mike Saylor:

know, red, blue or red white.

 

Mike Saylor:

You know, scrimmage game, um, but then involve as many people as possible.

 

Mike Saylor:

And I've seen this be so successful.

 

Mike Saylor:

Um, and, and even involve your insurance broker and your outside counsel and invite

 

Mike Saylor:

the F b I invite the Secret Service, um, have this exercise and, and pick a topic.

 

Mike Saylor:

Um, and whether you do it yourself or, or, you know, look for a moderator.

 

Mike Saylor:

Uh, and there's a lot of good moderators out there.

 

Mike Saylor:

I'm, I, I do these all the time.

 

Mike Saylor:

I'm considered a breach coach.

 

Mike Saylor:

But then there's, there's even cybersecurity law firms that will, uh,

 

Mike Saylor:

will facilitate, uh, a good tabletop.

 

Mike Saylor:

And the idea is, let's pick a topic.

 

Mike Saylor:

Ransomware or intellectual property theft or.

 

Mike Saylor:

Um, our data center gets hit by a plane 'cause we're close to an airport.

 

Mike Saylor:

Whatever it is, pick a topic, invite as many people as you can

 

Mike Saylor:

and walk through the scenario.

 

Mike Saylor:

Um, you know, somebody clicked the link and, and you know, they came to

 

Mike Saylor:

work and their desktop icons are all changed and they can't use anything.

 

Mike Saylor:

Well, and then we got another call and then, alright, well

 

Mike Saylor:

let's start with who do they call?

 

Mike Saylor:

Who does an employee talk?

 

Mike Saylor:

Who is their phone number?

 

Mike Saylor:

Is there an what if email doesn't work?

 

Mike Saylor:

Uh, so who do they call?

 

Mike Saylor:

And then what does that person do?

 

Mike Saylor:

How do we, how do we assess the situation?

 

Mike Saylor:

And which is, you know, kind of phase one of incident response is how do we

 

Mike Saylor:

categorize this event into an incident?

 

Mike Saylor:

Is it a non-event?

 

Mike Saylor:

Is it critical?

 

Mike Saylor:

Uh, and then that then based on your plan, would indicate

 

Mike Saylor:

who else needs to be involved.

 

Mike Saylor:

Once we categorize, once we categorize the, uh, the incident, well then I.

 

Mike Saylor:

Having as many people there as possible is, is valuable two ways.

 

Mike Saylor:

One, maybe you don't know who needs to be in involved.

 

Mike Saylor:

And you can start asking all the attendees, uh, who are the right

 

Mike Saylor:

people, uh, because you know, I sent this email out five months ago and

 

Mike Saylor:

nobody's responded who the right person is, but we're all in the same room.

 

Mike Saylor:

Let's working out.

 

Mike Saylor:

But at the same time, uh, you're gonna get some people going.

 

Mike Saylor:

I.

 

Mike Saylor:

Would've had no idea that's what's involved with doing X, Y,

 

Mike Saylor:

or Z unless I was in this room.

 

Mike Saylor:

And I'll tell you a funny story.

 

Mike Saylor:

We were doing a, a tabletop for a, a company, uh, I think they're in

 

Mike Saylor:

healthcare and part of the scenario was, uh, threat actor used the contact us.

 

Mike Saylor:

Button on their website to say, that's how they said, you

 

Mike Saylor:

know, we have all your data.

 

Mike Saylor:

Call us in three days.

 

Mike Saylor:

Um, and here's the information to do so.

 

Mike Saylor:

And so that was part of the scenario.

 

Mike Saylor:

So I, uh, I asked, well, who's in charge of the website?

 

Mike Saylor:

And there were two people in the audience and they said, we are.

 

Mike Saylor:

And I said, well, what would you do if you got that email?

 

Mike Saylor:

And they said, we'd probably delete it.

 

Mike Saylor:

'cause we wouldn't believe it was true.

 

Mike Saylor:

Well, okay, well maybe you shouldn't delete it anymore.

 

Mike Saylor:

You should, you know, forward that to the security team

 

Mike Saylor:

and let them figure that out.

 

Mike Saylor:

And they said, good.

 

Mike Saylor:

Good call, uh, good policy.

 

Mike Saylor:

So, but there were, there were a lot of people in the audience that said, I'm

 

Mike Saylor:

glad I was here because I would've had no idea that all these moving parts,

 

Mike Saylor:

and this is this level of effort and this stuff would, is necessary for

 

Mike Saylor:

responding to whatever the incident was.

 

Mike Saylor:

Well then, well now it's a good time to ask the insurance broker who's on the call

 

Mike Saylor:

or in the meeting, when do we contact you?

 

Mike Saylor:

And they're gonna say, well, as soon as possible.

 

Mike Saylor:

And, and from, from an employee, uh, company perspective, I think there

 

Mike Saylor:

was a misconception that calling the insurance like as soon as possible

 

Mike Saylor:

is somehow gonna affect your premium.

 

Mike Saylor:

Like, we're gonna pay more because we called you.

 

Mike Saylor:

Um, and that's not the case.

 

Mike Saylor:

They want to be involved as soon as possible to help you make the right

 

Mike Saylor:

decisions because you may be using third parties and buying, you know,

 

Mike Saylor:

going through this, this expense that, uh, may not be reimbursable.

 

Mike Saylor:

You know, you might not be able to get paid back for that

 

Mike Saylor:

if, even if your claim is.

 

Mike Saylor:

Is accepted, but at the same time, the insurance company wants to know

 

Mike Saylor:

about how diligent you're being and they wanna be involved in the process.

 

Mike Saylor:

And that's gonna help you determine or, or hopefully help you, uh,

 

Mike Saylor:

towards getting your claim approved.

 

Mike Saylor:

Um, and then they're gonna be the ones, uh, along with your legal counsel, helping

 

Mike Saylor:

you make the right decisions about how to communicate, uh, situations to third

 

Mike Saylor:

parties and outside, you know, clients and what have you, but also internally.

 

Mike Saylor:

And we walked through this, just adding this real quick.

 

Mike Saylor:

Alright, so you've got this incident.

 

Mike Saylor:

And, and we did this, uh, we did a tabletop with an engineering company and

 

Mike Saylor:

they didn't do anything we suggested.

 

Mike Saylor:

And then like six weeks later, they got hit with ransomware and they

 

Mike Saylor:

were down for two and a half months.

 

Mike Saylor:

But, uh, that's the other important thing about tabletops or, or any type of

 

Mike Saylor:

assessment, you really need to take the remediation seriously, uh, and take action

 

Mike Saylor:

on those things as soon as possible.

 

Mike Saylor:

'cause if, if we found them, bad guys have probably found them too.

 

Mike Saylor:

But one of the things that we found out in a tabletop, or that

 

Mike Saylor:

came to mind was communication.

 

Mike Saylor:

Specifically internally.

 

Mike Saylor:

So this engineering company got hit with ransomware.

 

Mike Saylor:

They were down, nobody could do any work and they couldn't even email people.

 

Mike Saylor:

Alright, so, Do you have a system, uh, that collects

 

Mike Saylor:

personal emails and phone numbers?

 

Mike Saylor:

Do you have a system where people can call in to get status?

 

Mike Saylor:

Like, is it a snow day?

 

Mike Saylor:

Uh, are we off for the day?

 

Mike Saylor:

Uh, is there an incident?

 

Mike Saylor:

When are we gonna hear an update?

 

Mike Saylor:

That kind of stuff.

 

Mike Saylor:

But then do you also have a policy that says, in the event of an

 

Mike Saylor:

incident, you are prohibited from discussing this stuff on social media?

 

Mike Saylor:

Don't put on LinkedIn.

 

Mike Saylor:

Oh, we had an incident today.

 

Mike Saylor:

I got, I guess I got the next two months off.

 

Mike Saylor:

Um, that you're, you've gotta contain that and or at least, uh, uh,

 

Mike Saylor:

define the messaging for that stuff.

 

Mike Saylor:

Get ahead of it.

 

Mike Saylor:

Uh, go ahead and make your templates for internal and external communications.

 

Mike Saylor:

Like, what are we gonna say?

 

Mike Saylor:

Well, you should, uh, plan for that now, uh, instead of wasting time during an

 

Mike Saylor:

incident, you know, trying to figure it out while the house is on fire.

 

Mike Saylor:

Um, so having said all of that, um, you know, incident response

 

Mike Saylor:

exercises are very valuable.

 

Mike Saylor:

Um, And even though you may want to have your own little huddle to figure

 

Mike Saylor:

out, you know, how well are we before we invite the rest of the, the crew,

 

Mike Saylor:

um, you should invite as many people, internal, external, subject matter

 

Mike Saylor:

experts, partners, um, um, as you can, uh, to get everybody, um, playing on

 

Mike Saylor:

the same team, on the same field they show up for at the, at the right time.

 

Mike Saylor:

Um, and they have an idea of what the playbook is.

 

W. Curtis Preston:

Wow.

 

Prasanna Malaiyandi:

Wow, that's, yeah, very detailed.

 

Prasanna Malaiyandi:

And like you mentioned, it's sort of plan ahead of time, right?

 

Prasanna Malaiyandi:

I'm sure there are so many companies where it's like, Hey, ransomware

 

Prasanna Malaiyandi:

hits, or We have an incident.

 

Prasanna Malaiyandi:

It's just IT and the security org that's dealing with this, right?

 

Prasanna Malaiyandi:

But like you mentioned, there's so many other folks involved.

 

Prasanna Malaiyandi:

And just knowing who those people are, especially if you're a large company, you

 

Prasanna Malaiyandi:

don't know, like one department doesn't know who the other department is even.

 

Prasanna Malaiyandi:

Right.

 

Prasanna Malaiyandi:

And having that.

 

Mike Saylor:

We had a situation where for, for four days, we were operating under

 

Mike Saylor:

the un, uh, assumption that they only had a, uh, $3 million cyber insurance policy.

 

Mike Saylor:

So we were restricting, uh, who was involved to restrict

 

Mike Saylor:

the expense and the overhead.

 

Mike Saylor:

Uh, and it wasn't until we were on a, uh, I think it was like 11

 

Mike Saylor:

o'clock at night on a Sunday, we were on a, an update call and we were

 

Mike Saylor:

talking about this $3 million policy.

 

Mike Saylor:

When someone walks, I could see them walk behind the person talking on the

 

Mike Saylor:

camera, and they go, we have 6 million.

 

Mike Saylor:

Like, what?

 

Mike Saylor:

What do you mean?

 

Mike Saylor:

We have two, $3 million policies?

 

Mike Saylor:

And nobody knew that.

 

Mike Saylor:

Nobody else, but this person knew that.

 

Mike Saylor:

And that completely changed.

 

Mike Saylor:

We're like, well, look, we need to start getting more resources in here.

 

Mike Saylor:

You know, call, call the big brand response teams and all.

 

Mike Saylor:

So that really changed the game because that just happened to come out in a

 

Mike Saylor:

meeting without, you know, everybody else being really aware of, uh, Yeah.

 

Mike Saylor:

And the other bad part of that situation, uh, unfortunately, was that,

 

Mike Saylor:

uh, they had $6 million in coverage.

 

Mike Saylor:

But what they didn't also know is that it was a self-funded insurance policy.

 

Prasanna Malaiyandi:

Uh,

 

Mike Saylor:

So they were paying into that over, over time and the

 

Mike Saylor:

insurance company said, we'll cover you, uh, if the day comes, but then

 

Mike Saylor:

you've gotta pay it back pretty much.

 

Mike Saylor:

And so, um, they didn't know that either.

 

Mike Saylor:

So a lot of things

 

Prasanna Malaiyandi:

Raid your

 

Prasanna Malaiyandi:

policy.

 

Prasanna Malaiyandi:

Yeah.

 

W. Curtis Preston:

they found that out.

 

W. Curtis Preston:

Um, well, listen, um, wait, I'm, did I mute myself?

 

W. Curtis Preston:

No.

 

W. Curtis Preston:

There.

 

W. Curtis Preston:

I muted.

 

W. Curtis Preston:

Okay.

 

W. Curtis Preston:

Sorry.

 

W. Curtis Preston:

Um, listen, Mike, we could talk all day.

 

W. Curtis Preston:

I, I, I love the stories by the way.

 

W. Curtis Preston:

I,

 

Prasanna Malaiyandi:

eh.

 

W. Curtis Preston:

you know, you, you know me, Prasanna, I'm, I'm a

 

W. Curtis Preston:

storyteller myself, and I, I think nothing, nothing tells the story

 

W. Curtis Preston:

like a good story, you know, nothing, nothing drills that point home, uh,

 

W. Curtis Preston:

better than a good story, for sure.

 

W. Curtis Preston:

Um, and I, I love hearing.

 

W. Curtis Preston:

From these real incidents, uh, what, you know, what, what I'm hearing?

 

W. Curtis Preston:

So I, I like, you know, the things that I picked up here.

 

W. Curtis Preston:

First off, I like the amount of time we spent on the F B

 

W. Curtis Preston:

I, uh, and for guard program.

 

W. Curtis Preston:

Uh, I definitely wanna look more into that and I think the listeners

 

W. Curtis Preston:

should look more into that.

 

W. Curtis Preston:

And I like this idea, uh, and of, of using them as a way to establish those

 

W. Curtis Preston:

communication channels before an event.

 

W. Curtis Preston:

Um, and I like the idea of, well, you know, we, we, we always promote

 

W. Curtis Preston:

the idea of, of tabletop exercises and, um, you know, in, in my

 

W. Curtis Preston:

world, you know, we call them Dr.

 

W. Curtis Preston:

Dr exercises right back before the, the cyber world was also

 

W. Curtis Preston:

attacking backup systems.

 

W. Curtis Preston:

Um, so I, you know, I think this has been a great conversation, Mike.

 

W. Curtis Preston:

So I want to thank you for coming on.

 

Mike Saylor:

Certainly.

 

W. Curtis Preston:

And, uh, Prasanna once again, as always,

 

W. Curtis Preston:

you with your, with your wisdom.

 

Prasanna Malaiyandi:

Yeah, anytime Curtis, and I hope you'll be ordering a chair

 

Prasanna Malaiyandi:

or at least, or uh, browsing chair soon.

 

Prasanna Malaiyandi:

And Mike, thank you for the info.

 

Prasanna Malaiyandi:

I.

 

Prasanna Malaiyandi:

Yeah.

 

Prasanna Malaiyandi:

It's always fascinating hearing these real life stories because that's something

 

Prasanna Malaiyandi:

that you don't hear about, right?

 

Prasanna Malaiyandi:

What did people experience and what was it like going through?

 

Prasanna Malaiyandi:

It's just like what you read, like reading the Cuckoo's Nest or Cuckoo's Egg, right?

 

Prasanna Malaiyandi:

It's like those are the types of stories that are interesting that

 

Prasanna Malaiyandi:

you learn from, especially new people in this space, like myself, right?

 

Prasanna Malaiyandi:

Where it's like, hey, what really goes on behind the scenes and

 

Prasanna Malaiyandi:

what does it take to recover?

 

Prasanna Malaiyandi:

So thank you for sharing.

 

Mike Saylor:

Certainly.

 

Mike Saylor:

Yeah.

 

Mike Saylor:

I've got stories all day.

 

W. Curtis Preston:

Sounds like

 

Prasanna Malaiyandi:

Speaker:

we'll have you back on.

 

W. Curtis Preston:

Yeah, you and me over beers, Mike, nobody would

 

W. Curtis Preston:

ever get the word in edgewise.

 

W. Curtis Preston:

And once again, I want to thank our listeners, uh, and remember to subscribe