Why it's process, then people, then technology
In this episode of Backup Central's Restore It All podcast, the host welcomes cyber expert Rick Mishka to discuss the three aspects of IT: process, people, and technology. They explore the misconception that a new piece of gear or software is always the solution to every problem, particularly in preventing data exfiltration. Rick also shares insights into his short-form podcast, Cyber Pros, where he covers cybersecurity topics in just nine minutes. Tune in to gain valuable perspectives on backup, DR, and data protection.
Speaker:
Sometimes those of us in technology think that the solution to every
Speaker:
problem is a new piece of gear or a great piece of software.
Speaker:
I've been guilty of this a lot lately when I've been thinking about
Speaker:
how to prevent data exfiltration.
Speaker:
If we could just get the right AI tool in there, we could spot it as
Speaker:
it's happening and shut it down.
Speaker:
This week's guest is a cyber expert who reminded me that I T has three sides.
Speaker:
He thinks the focus should be on process.
Speaker:
Then people then technology.
Speaker:
Hi, I'm w Curtis press an AKA Mr.
Speaker:
Backup.
Speaker:
I've been specializing in backup and Dr for over 30 years.
Speaker:
And I've written four O'Reilly books on the topic like me.
Speaker:
This podcast is dedicated to those of you who are tasked with
Speaker:
the difficult job of backup Dr.
Speaker:
And data protection.
Speaker:
This is backup, centrals, restore it all.
Speaker:
W. Curtis Preston: Hi, and welcome to Backup Central's Restore It All podcast.
Speaker:
I'm your host, W.
Speaker:
Curtis Preston, aka Mr.
Speaker:
Backup, and today I have with me a guy who gave me some really good advice.
Speaker:
It was really good advice up until it wasn't.
Speaker:
Prasanna Malaiyandi How's it going, Prasanna
Prasanna Malaiyandi:
I'm good, Curtis.
Prasanna Malaiyandi:
I'm curious what this good advice is that was good at the time
Prasanna Malaiyandi:
W. Curtis Preston: this silver bullet that you gave me called the FCC complaint
Prasanna Malaiyandi:
Yeah, I'm surprised not a lot of people know about this.
Prasanna Malaiyandi:
if you have an issue with your cell phone provider or your cable company, right?
Prasanna Malaiyandi:
Or internet provider.
Prasanna Malaiyandi:
you call them in, you complain to them, they give you the runaround,
Prasanna Malaiyandi:
and then you spend weeks and weeks, and nothing ever happens.
Prasanna Malaiyandi:
W. Curtis Preston: and you're not anywhere.
Prasanna Malaiyandi:
exactly.
Prasanna Malaiyandi:
And then you have this magic thing called the FCC, where you can actually file
Prasanna Malaiyandi:
a complaint, and say, hey, my billing is off, or my service isn't right, and
Prasanna Malaiyandi:
the provider literally has to respond to you within, I think it's 72 hours.
Prasanna Malaiyandi:
W. Curtis Preston: I had never heard of such a thing.
Prasanna Malaiyandi:
And, and being a person who...
Prasanna Malaiyandi:
Having, worked for the government at a point, I definitely understand
Prasanna Malaiyandi:
the inefficiency of government.
Prasanna Malaiyandi:
So the idea that something could be so efficient was definitely.
Prasanna Malaiyandi:
a surprise.
Prasanna Malaiyandi:
the last time I did this ironically enough, now, as this story comes full
Prasanna Malaiyandi:
circle, I was having problems with Cox as my internet, service provider.
Prasanna Malaiyandi:
I put in an FCC complaint.
Prasanna Malaiyandi:
And in the end, we did figure out the problem.
Prasanna Malaiyandi:
And then I changed to Verizon 5G internet.
Prasanna Malaiyandi:
And everything was fine until it wasn't.
Prasanna Malaiyandi:
And then I decided to use this magic bullet again.
Prasanna Malaiyandi:
I got the call within 72 hours.
Prasanna Malaiyandi:
During the time that they were working on it, it went from being an intermittent
Prasanna Malaiyandi:
problem to being all the time.
Prasanna Malaiyandi:
The official response from Verizon is I will obviously be, Paraphrasing
Prasanna Malaiyandi:
slightly., yeah, you're right.
Prasanna Malaiyandi:
We suck.
Prasanna Malaiyandi:
You should probably get a different ISP.
Prasanna Malaiyandi:
By the way, I'm not just complaining about like low speeds.
Prasanna Malaiyandi:
My internet would just drop.
Prasanna Malaiyandi:
Sometimes in the middle of recording one of these episodes, my internet would just
Prasanna Malaiyandi:
but basically they said the reason your internet is just dropping, it's congestion
Prasanna Malaiyandi:
and you should probably get another ISP.
Prasanna Malaiyandi:
That was their official response.
Prasanna Malaiyandi:
I was.
Prasanna Malaiyandi:
dumbfounded, right?
Prasanna Malaiyandi:
So again, story come full circle, Cox will be back, in six days, they
Prasanna Malaiyandi:
will be installing the fiber version, because I don't have a lot of choices.
Prasanna Malaiyandi:
Our guest today is the host of the cyber pros podcast, a short form
Prasanna Malaiyandi:
podcast, which by the way, it makes it very different from this podcast.
Prasanna Malaiyandi:
A short form podcast that has five questions and nine minutes.
Prasanna Malaiyandi:
He's our second former special forces member and we're excited
Prasanna Malaiyandi:
to have him on the podcast.
Prasanna Malaiyandi:
Welcome to the show, Rick Mischka.
Rick Mischka:
Hello, gents.
Rick Mischka:
W. Curtis Preston: So what do you cover in nine minutes on that podcast
Rick Mischka:
Yeah, you know, in 2020 I got bored and I wanted to build a
Rick Mischka:
cybersecurity network and I want to do it fast and So we had the idea
Rick Mischka:
of doing a short form kind of video podcast that that would be be quick.
Rick Mischka:
We actually thought six minutes could fit in in six questions could fit in nine
Rick Mischka:
minutes, but we were way wrong on that.
Rick Mischka:
So, so we pivoted down to five.
Rick Mischka:
And, and honestly, the first and last question are more, you know, who are you?
Rick Mischka:
What do you do?
Rick Mischka:
And then.
Rick Mischka:
You know, tell us a fun story or typically we ask, you know, what's your
Rick Mischka:
favorite piece of retro technology?
Rick Mischka:
The three middle questions are really the ones that we get kind
Rick Mischka:
of the, the meat of conversation.
Rick Mischka:
And it's, it's, you know, why do you love being a cybersecurity professional?
Rick Mischka:
Why do you think cybersecurity should, or is, or isn't a top concern?
Rick Mischka:
And then just what insights do you want to share?
Rick Mischka:
Whatever they share with us in those five questions, we then
Rick Mischka:
actually do something interesting.
Rick Mischka:
We, we.
Rick Mischka:
We record bonus content afterwards, and we focus that bonus content
Rick Mischka:
on one, education, two, a little bit of marketing, and then three,
Rick Mischka:
we focus on knowledge, right?
Rick Mischka:
Just, just what knowledge do they want to share even more of?
Rick Mischka:
And we typically do that in 30 seconds to three minutes.
Rick Mischka:
And so now...
Rick Mischka:
Our podcast guests get a full week of exposure.
Rick Mischka:
They get the full podcast release.
Rick Mischka:
They get a bunch of bonus contests released around it.
Rick Mischka:
We're able to bring in a lot of people through a number of different doors.
Rick Mischka:
And man, it's, it's just been a lot of fun.
Rick Mischka:
I've been able to connect a lot of people to, to really
Rick Mischka:
just kind of grow the network.
Rick Mischka:
You know, a couple of the podcast guests got together and wrote a book.
Rick Mischka:
A couple of the podcast guests got together and started a company.
Rick Mischka:
So.
Rick Mischka:
Awesome, right?
Rick Mischka:
So been fun.
Rick Mischka:
Yeah.
Rick Mischka:
W. Curtis Preston: I like it I'd like to hear the five questions
Rick Mischka:
So they're the same five questions for everybody
Rick Mischka:
typically, unless we get somebody who's a specialist
Rick Mischka:
in something, so it's who are you and what do you do, right?
Rick Mischka:
That's We'll call that one question.
Rick Mischka:
And then why do you love being a cybersecurity professional?
Rick Mischka:
That question will change if they're a professional in cloud, if data backup, you
Rick Mischka:
know, so if you were on, we would ask you that question a little bit differently.
Rick Mischka:
And then the third question we ask, you know, cybersecurity is a top concern.
Rick Mischka:
Do you believe that's true?
Rick Mischka:
And in, in the industry you're in, how does that, how does that interact?
Rick Mischka:
And then the fourth question is just.
Rick Mischka:
What insight do you want to share?
Rick Mischka:
Here's your, you know, if you've done your job, you have five minutes to talk
Rick Mischka:
and, and about anything you want to talk
Rick Mischka:
and then.
Rick Mischka:
If you're a first time guest, we always ask if, what's your favorite
Rick Mischka:
piece of retro technology is.
Rick Mischka:
Usually I get some, you know, usually I get all sorts of things.
Rick Mischka:
Usually it's, you know, Apple computers, Commodores, things like that.
Rick Mischka:
I had somebody come back and say the, the semi automatic pistol.
Rick Mischka:
And I was like, that's technology.
Rick Mischka:
So here we go.
Rick Mischka:
We're going down to completely different conversation.
Rick Mischka:
And I have to laugh.
Rick Mischka:
I actually useless trivia.
Rick Mischka:
I actually just bought one of my favorite pieces of retro
Rick Mischka:
technology in its new form.
Rick Mischka:
The Motorola Razr.
Rick Mischka:
So I have newest, the newest flip phone version, and it's so cool
Rick Mischka:
because you can actually set it to, show you as if you were using
Rick Mischka:
the original Motorola Razr, it's
Prasanna Malaiyandi:
that is awesome.
Rick Mischka:
Yeah,
Rick Mischka:
W. Curtis Preston: I
Rick Mischka:
had the original Motorola Razr
Rick Mischka:
as did I.
Rick Mischka:
And so it's fun.
Rick Mischka:
I get to be the butt of my own question.
Prasanna Malaiyandi:
What is probably one of the most interesting
Prasanna Malaiyandi:
insights from cybersecurity answers that you've received?
Rick Mischka:
Yeah.
Rick Mischka:
You know, actually I'll start with the one I get the most of.
Rick Mischka:
The most insights I get are the idea that cybersecurity has
Rick Mischka:
to focus on the people, right?
Rick Mischka:
Dozens of different ways that conversation plays out, but that's the most talked
Rick Mischka:
about is, is the people, cybersecurity, burnout, talent acquisition, security
Rick Mischka:
gap, whatever that looks like, and it's, it's quite interesting, but the
Rick Mischka:
most interesting one that I've ever had was actually the use of artificial
Rick Mischka:
intelligence and machine learning as it pertains to cybersecurity.
Rick Mischka:
And biometrics and the insights that they shared were fascinating because their
Rick Mischka:
company had just gotten acquired, was, was putting a bunch of venture capital dollars
Rick Mischka:
into this solution that were actually selling some of the, the solution to.
Rick Mischka:
Tesla, the way you walk up to your car will unlock the car for you
Rick Mischka:
because it knows your gate, along with facial rec and other biometrics.
Rick Mischka:
And it's fascinating.
Rick Mischka:
It was, it was mind blowing what can do.
Rick Mischka:
So
Prasanna Malaiyandi:
it's interesting you bring that up, Rick.
Prasanna Malaiyandi:
So recently my wife and I, we binge watched all the Mission Impossible movies.
Prasanna Malaiyandi:
And there's, I don't know if you remember, but there's a one Mission Impossible
Prasanna Malaiyandi:
where it's like, they have to imitate to be the guy and walk through a secure
Prasanna Malaiyandi:
area where it does a gait analysis.
Prasanna Malaiyandi:
And I was just thinking, I was like, wow, technology it's come.
Prasanna Malaiyandi:
It's like real now.
Prasanna Malaiyandi:
or the other day I was watching Minority Report.
Prasanna Malaiyandi:
It's like all this stuff they're doing.
Prasanna Malaiyandi:
It's that's now become like reality.
Rick Mischka:
You should add the Mission Impossible theme to the start of, of this
Rick Mischka:
podcast
Rick Mischka:
W. Curtis Preston: Yeah I just rewatched that one again to Prasanna and of course
Rick Mischka:
that technology was defeated by uploading a different gate analysis The first time
Rick Mischka:
I saw a computer used to do something that that literally I went wow actually
Rick Mischka:
okay The very first thing I remember seeing a computer do something that made
Rick Mischka:
me do wow was when I was in my teens you could go to a police station in Kissimmee
Rick Mischka:
Florida That's where I was from And you could give them an address and they
Rick Mischka:
could print out turn by turn directions of how to get to there And I remember
Rick Mischka:
going That's the most amazing I've ever seen but the second thing was I was a
Rick Mischka:
consultant at a communications company that was using simulation modeling in
Rick Mischka:
a computer to test their device like to harden their device by like in a
Rick Mischka:
computer hitting it with a softball in a computer dropping that device on the
Rick Mischka:
ground Do you know what that device was
Rick Mischka:
The Nokia phone from back in the day?
Rick Mischka:
W. Curtis Preston: It was the Motorola Razr my friend
Rick Mischka:
Fair, there's the full circle.
Rick Mischka:
W. Curtis Preston: Yeah Yeah I was working at Motorola in Schaumburg Illinois
Prasanna Malaiyandi:
Crazy.
Prasanna Malaiyandi:
W. Curtis Preston: yeah it was amazing to me what they do One of the things I'm
Prasanna Malaiyandi:
very concerned about is data exfiltration cause as a backup and recovery person
Prasanna Malaiyandi:
I can stop a lot of things I can stop a pure ransomware attack by just restoring
Prasanna Malaiyandi:
the data but what I can't stop if the data is exfiltrated there's nothing I
Prasanna Malaiyandi:
can do So the question is so I think that AI and ML are the next thing for
Prasanna Malaiyandi:
basically doing the equivalent of gate analysis on the outgoing traffic for a
Prasanna Malaiyandi:
typical company and then noticing when something is very different and calling
Prasanna Malaiyandi:
it out and stopping it automatically So far I'm not hearing A lot of
Prasanna Malaiyandi:
agreement on that when I talk to folks
Prasanna Malaiyandi:
are you talking mainly Curtis about
Prasanna Malaiyandi:
anomaly detection based on
Prasanna Malaiyandi:
W. Curtis Preston: Yes
Prasanna Malaiyandi:
looking for data exfiltration?
Prasanna Malaiyandi:
Okay.
Prasanna Malaiyandi:
W. Curtis Preston: Yes
Rick Mischka:
Yeah, I mean, I will say, I think people got a little out over their
Rick Mischka:
skis looking at, you know, unsupervised machine learning and trying to train
Rick Mischka:
it to baseline and then anomaly detect.
Rick Mischka:
And you end up with either a lot of false positives or you end up with...
Rick Mischka:
Just a lot of data that the machine learning model is still working on.
Rick Mischka:
And I think the world is seeing kind of, I don't want to call it a
Rick Mischka:
reversion, but an add in to a lot of that unsupervised machine learning
Rick Mischka:
with supervised machine learning.
Rick Mischka:
That's trained on data models of both benign and malicious data
Rick Mischka:
that allows those supervised models to say, okay, here's the 14 or 40
Rick Mischka:
or whatever number you want of.
Rick Mischka:
Threat vectors that we know, right?
Rick Mischka:
EXE files, documents, things like that.
Rick Mischka:
When you have as much data as we have now, you can train these supervised
Rick Mischka:
machine learning models to say, Oh, 98, 99 percent of the time we can catch
Rick Mischka:
something and we don't need anomaly.
Rick Mischka:
And so I think that was the miss for, for me, that's what I'm seeing is people
Rick Mischka:
jump right to unsupervised thinking that anomaly detection was the only way.
Rick Mischka:
And we went from signature known crap to let's figure out what the user is doing
Rick Mischka:
and hope their behavior doesn't change.
Rick Mischka:
And they missed the step.
Rick Mischka:
And I think, you know, good companies, EDR endpoint detection response
Rick Mischka:
vendors, a lot of the new managed detection response solutions that
Rick Mischka:
are bringing in XDR solutions.
Rick Mischka:
have realized that and they can make that model better by adding
Rick Mischka:
in a supervised model as well.
Rick Mischka:
I, I think that's the path we need to get to, to actually
Rick Mischka:
see it be extremely useful, but
Prasanna Malaiyandi:
I think one of the challenges also with anomaly detection
Prasanna Malaiyandi:
is, especially with these unsupervised models, you get so many sort of false
Prasanna Malaiyandi:
positives, where it's hey, the user just did something different, but it's normal.
Prasanna Malaiyandi:
And the model has never seen it before.
Prasanna Malaiyandi:
And of course, it's going to flag something.
Prasanna Malaiyandi:
And as a, as a security engineer trying to go through those logs and figure
Prasanna Malaiyandi:
out, okay, what's a real threat, what is a false positive, that kills so much
Prasanna Malaiyandi:
of your time that what I've heard is a lot of people are like, screw it, it's
Prasanna Malaiyandi:
not worth it, let me just turn it off.
Rick Mischka:
It's true.
Rick Mischka:
And, and, and, you know, I think the other thing that, that people forgot was
Rick Mischka:
They jumped towards the technology and they forgot that there's a whole lot of
Rick Mischka:
process and people that need to be in place for the, for the technology to work.
Rick Mischka:
you know, I know everybody knows the PBT framework.
Rick Mischka:
It's, it's used in almost every technology model ever.
Rick Mischka:
it was actually created in the sixties by a guy by the name of
Rick Mischka:
Harold Levitt as the diamond model.
Rick Mischka:
There was four points to it, but when we do.
Rick Mischka:
An analysis of somebody's cybersecurity posture doesn't matter what machine
Rick Mischka:
learning models doesn't matter what technology they have for us.
Rick Mischka:
The technology is only about 10 percent of the solution that we
Rick Mischka:
present that they should be looking at.
Rick Mischka:
And we talk about, okay.
Rick Mischka:
30 percent is, is, is the people.
Rick Mischka:
Can you provide those?
Rick Mischka:
Do you need people to be outsourced or managed from, you
Rick Mischka:
know, managed service provider?
Rick Mischka:
And then 60 percent of it is, here's your process.
Rick Mischka:
If you have a good process, the technology will work, but most people
Rick Mischka:
just, like you said, turn it on.
Rick Mischka:
All of a sudden they have triple the, the, the alerts and they
Rick Mischka:
don't know how to handle it.
Rick Mischka:
W. Curtis Preston: Yeah it's interesting I think that was a good point about that
Rick Mischka:
people think that technology is just going to solve the problem when in reality Even
Rick Mischka:
if the it was able to detect an anomaly there's still a human being That is going
Rick Mischka:
to have to read that information view that information and respond to that
Rick Mischka:
information because you're not at least I wouldn't think the average person is
Rick Mischka:
not going to automatically start shutting off outgoing communications based on an
Rick Mischka:
anomaly especially if there's so many false positives So there's got to be
Rick Mischka:
that person involved Rick I'd like to ask you about that 30 60 percent that's
Rick Mischka:
it's interesting that you put so much focus on the process like it felt I don't
Rick Mischka:
know if anything I if I was guessing I'd be like 50 50 between the people
Rick Mischka:
and the process thoughts about that
Rick Mischka:
you know, I think, I think we all agree that the technology
Rick Mischka:
is, is just a component, right?
Rick Mischka:
It's, it's supposed to make us better, faster, easier,
Rick Mischka:
whatever they want to look at.
Rick Mischka:
And some would argue that the people side of the house should be, you know, higher
Rick Mischka:
rated, higher percentage of what you do.
Rick Mischka:
In today's world where we automate a lot of things, you can remove a human
Rick Mischka:
for, you know, X number of automations that you do, but I'm going to take it
Rick Mischka:
even further as to why we place such an emphasis on the process side, and
Rick Mischka:
that's everything a company focuses on their business objectives, their
Rick Mischka:
continuity, their resilience, right?
Rick Mischka:
None of those are cyber security based, but all of those have to have
Rick Mischka:
a process in place for people to know.
Rick Mischka:
Hey, that's what my job is.
Rick Mischka:
That's what I'm supposed to be doing to progress this company,
Rick Mischka:
to make more revenue, to drive bottom bottom line goals.
Rick Mischka:
And so.
Rick Mischka:
If you can create great process, you create great culture and you don't
Rick Mischka:
need as many humans because the humans you have are able to just do more.
Prasanna Malaiyandi:
You're being more efficient with what you have rather
Prasanna Malaiyandi:
than trying to add a whole bunch of more people to make up for the lack of process
Rick Mischka:
said it so much better in 12 seconds.
Rick Mischka:
W. Curtis Preston: You should have them on your nine minute podcast Sure
Rick Mischka:
Perfect.
Rick Mischka:
W. Curtis Preston: Rick based on all the people that you've talked to what
Rick Mischka:
do you think are one of the things that we like to ask people is if you were if
Rick Mischka:
you had carte blanche at an environment What are the the top five things that you
Rick Mischka:
think people maybe aren't doing that they should be doing right So we can throw
Rick Mischka:
out the for me the three obvious ones right Good password management MFA And
Rick Mischka:
patch management right So assuming that we're doing those three things what else
Rick Mischka:
do you think companies should be doing
Rick Mischka:
For me, the first one I always tell companies is, is create
Rick Mischka:
an incident response plan that allows you to grow cybersecurity culture.
Rick Mischka:
But that cybersecurity isn't thing that's controlling your business.
Rick Mischka:
I think too many times they're like, well, I'm, I'm beholden to this regulation
Rick Mischka:
or I have this type of data that I have to secure and they, they stop doing
Rick Mischka:
good business to do good cybersecurity.
Rick Mischka:
And I think you you can flip that around.
Rick Mischka:
Quite a bit.
Rick Mischka:
And I think, you know, that that's one of the top ones for me.
Rick Mischka:
The second one, it really focuses on the human side, the people side.
Rick Mischka:
everyone makes the joke, we need cybersecurity
Rick Mischka:
professionals and we want to.
Rick Mischka:
You know, we want somebody who's new to the business, but we need them to have a
Rick Mischka:
CISSP and 14 years of experience, right?
Rick Mischka:
So, entry level position and, and I just, whenever I talk to, you know,
Rick Mischka:
small to mid sized businesses or mid market folks, I explain to them, go find
Rick Mischka:
somebody who's hungry to do the job.
Rick Mischka:
And train them how you want the job done or, or, or paid for their training to
Rick Mischka:
get the job to where they need to be.
Rick Mischka:
And you don't need somebody who has a CISSP.
Rick Mischka:
You don't even need somebody who has a degree.
Rick Mischka:
If you have somebody who's hungry, who's done the certification bootcamps, they're
Rick Mischka:
willing to step in and learn, likely stay with you longer for those reasons.
Rick Mischka:
And I think, you know, even the big enterprise companies are starting
Rick Mischka:
to finally have this moment.
Rick Mischka:
If I go get the college grad.
Rick Mischka:
And I trained him and get him a bunch of certifications in that first year.
Rick Mischka:
He or she is going to stay far longer.
Rick Mischka:
The third thing I would say is you need to understand your
Rick Mischka:
cybersecurity edges, right?
Rick Mischka:
Are you a fully cloud edge?
Rick Mischka:
And do you know what that means, right?
Rick Mischka:
You're using AWS or Azure, but you're also using software as a service applications.
Rick Mischka:
Do you understand the differences?
Rick Mischka:
Do you understand that there's an endpoint edge?
Rick Mischka:
Every user is on an endpoint, so how can you protect your users from
Rick Mischka:
themselves by finding a solution that matches your needs on those endpoints?
Rick Mischka:
And then your network.
Rick Mischka:
Some people don't have a network, and that's okay, right?
Rick Mischka:
They've gone straight, you know, VPN to the internet, call it good.
Rick Mischka:
But understand what those three are, understand how you, how you can cover
Rick Mischka:
those, and that will lead you down a really good cybersecurity journey.
Rick Mischka:
And lastly, Here's my brown nose moment for you guys.
Rick Mischka:
I recommend that everybody understands what actual data backup needs to mean to
Rick Mischka:
them
Rick Mischka:
So if they have an incident, they can recover and not rely on their insurance
Rick Mischka:
company to provide them with investigators and forensics and responders, and
Rick Mischka:
then not pay them anyways, so.
Rick Mischka:
Those are my four.
Rick Mischka:
Those are the four I tend to talk about the most.
Rick Mischka:
W. Curtis Preston: Go
Rick Mischka:
That my
Rick Mischka:
that's
Rick Mischka:
my world cup moment there what do you
Prasanna Malaiyandi:
Oh I like those four ideas or things that people should be
Prasanna Malaiyandi:
considering Rick for the first one when you're talking about the incident response
Prasanna Malaiyandi:
do you find that a lot of companies are woefully prepared they're ostrich with
Prasanna Malaiyandi:
head buried in the sand It's not going to happen to me I don't need to worry
Prasanna Malaiyandi:
about this sort of thing Or do you think that's started to change given all the
Prasanna Malaiyandi:
recent activity around ransomware and data exfiltration and other things like that
Rick Mischka:
I think it's changing.
Rick Mischka:
I don't think, I don't think we're anywhere near where it needs to be.
Rick Mischka:
I believe people are starting to have those moments where, well,
Rick Mischka:
do I have a continuity plan?
Rick Mischka:
Right?
Rick Mischka:
A lot of companies I talked to, they're like, well, we have, we
Rick Mischka:
have a disaster recovery plan.
Rick Mischka:
And I'm like, okay, that's great.
Rick Mischka:
Right?
Rick Mischka:
If, if a hurricane hits you, you know how to fix the problem.
Rick Mischka:
But An incident response plan can encompass your business continuity, your
Rick Mischka:
disaster recovery, and all of your, your security systems planning in one document.
Rick Mischka:
And if it's done correctly, I think what most people say
Rick Mischka:
is, well, we have the plan.
Rick Mischka:
Have you tested it?
Rick Mischka:
Have you played the tabletop?
Rick Mischka:
All right, let's nerd out.
Rick Mischka:
And, and even though you might have never played Dungeons and Dragons, let's go play
Rick Mischka:
the tabletop game with, you know, whatever you want to play, get your entire group
Rick Mischka:
in, and let's see what it looks like.
Rick Mischka:
Usually the point that it fails on is not on the catching of it,
Rick Mischka:
not on the data backing up, right?
Rick Mischka:
Not on, on recovery.
Rick Mischka:
It's, it's on, Communication.
Rick Mischka:
don't follow or have a good communication path, which leads to their cyber
Rick Mischka:
insurance company telling them, Oh, you didn't meet our requirements.
Rick Mischka:
We're not paying you for what you had to do to go recover.
Rick Mischka:
And they also forget about the legal aspect.
Rick Mischka:
You know, they're, they think, Oh, I need an attorney after the
Rick Mischka:
fact to help me understand what my Requirements are to my customers.
Rick Mischka:
If I've given up my customer data or my employees, if I've given
Rick Mischka:
up their data, they don't realize
Rick Mischka:
what was that
Prasanna Malaiyandi:
That's too late though right
Rick Mischka:
it's too late.
Rick Mischka:
And, and what they don't realize is you can actually protect.
Rick Mischka:
and get under that, that, that lawyer umbrella, that cone of
Rick Mischka:
silence, you know, as it were, you can get on that early as you're
Rick Mischka:
creating the incident response plan.
Rick Mischka:
You can have somebody that looks at that plan and says, okay, you now have a,
Rick Mischka:
you know, an attorney client privilege.
Rick Mischka:
You don't have to share some of this information with your insurance company.
Rick Mischka:
You don't have to share this with the general public and here's why.
Rick Mischka:
And so moving the legal and the communication stuff up earlier
Rick Mischka:
in the plan and really hammering it home, the rest of the plan is.
Rick Mischka:
process and technology, right?
Rick Mischka:
Let's be real.
Rick Mischka:
It's, Oh, we found the problem.
Rick Mischka:
We fixed the problem.
Rick Mischka:
So, you know, those are, I think that's the interesting part that people are
Rick Mischka:
starting to finally get this, Hey, wait, there are, there are attorneys,
Rick Mischka:
there are insurance companies out there who are just, you know, available,
Rick Mischka:
but not available at the end.
Rick Mischka:
Let's, let's see how we can move this forward.
Rick Mischka:
W. Curtis Preston: Yeah that would be my I've been pretty consistent with that as
Rick Mischka:
well that basically probably the biggest point of having these discussions up front
Rick Mischka:
with creating that incident response plan and doing those tabletop exercises and by
Rick Mischka:
the way for the record I never played D D But but I like the idea of a tabletop
Rick Mischka:
exercise but I'm just not I'm just not that big of a nerd but I love all the D
Rick Mischka:
nerds but they wouldn't let me play anyway sorry I'm a sad childhood That you're even
Rick Mischka:
excluded from nerdhood but I digress The thing that we talk about this a lot is
Rick Mischka:
this idea of creating those relationships up front Don't have an incident and
Rick Mischka:
then Oh we need to find a cyber security firm We need to find a lawyer We need to
Rick Mischka:
find whatever you need to create those relationships up front because it's like
Rick Mischka:
having a large company in the United States and not having a legal department
Rick Mischka:
I don't know how it is in other parts of the world but we live in such a litigious
Rick Mischka:
society You're going to be sued for something And so you have to have a lawyer
Rick Mischka:
right and of course you have to have a lawyer hopefully so that you have the
Rick Mischka:
right paperwork so that you don't get sued But then you have a lawyer in case you
Rick Mischka:
do get sued You need a cybersecurity team and you need cybersecurity professionals
Rick Mischka:
on your side so that when you get a cyber attack because it is a when not an
Rick Mischka:
if You have those people in your corner right Does that match what you're saying
Rick Mischka:
Spot on.
Rick Mischka:
Yeah.
Rick Mischka:
And it goes back to what we talked about, about that 60 percent process.
Rick Mischka:
If you have an incident response plan, there's your process.
Rick Mischka:
And all you do is go and say, yep, we know this works.
Rick Mischka:
Just follow the process.
Rick Mischka:
So,
Prasanna Malaiyandi:
I like that I also wanted to touch just given our area
Prasanna Malaiyandi:
that we always like to talk about I'm glad that you talked about backup Rick
Prasanna Malaiyandi:
because I feel that a lot of times people forget about it when it comes to sort
Prasanna Malaiyandi:
of incident responses Or even like you said try doing like the tabletop exercise
Prasanna Malaiyandi:
try out the thing right Even for backup It's like how often do people go verify
Prasanna Malaiyandi:
Do their backups work Are they able to recover their data or are they able to
Prasanna Malaiyandi:
test out their disaster recovery plans I think that becomes really important as
Prasanna Malaiyandi:
part of the process Piece and spelling out Yes periodically you do want to test
Prasanna Malaiyandi:
these things to make sure that things are still working because the last
Prasanna Malaiyandi:
thing you want is hey you got attacked Now you need to recover Oops I forgot
Prasanna Malaiyandi:
to do this or oops I forgot to do that And so now your environment's kind of
Prasanna Malaiyandi:
in shambles and you're all scrambling trying to get things back up and running
Rick Mischka:
or they just haven't hardened their backups because
Rick Mischka:
they haven't checked them in, in, you know, three months and
Rick Mischka:
now your backups are just as bad.
Rick Mischka:
what just
Rick Mischka:
X filled.
Rick Mischka:
So hopefully that doesn't happen, but it can.
Rick Mischka:
So
Rick Mischka:
W. Curtis Preston: Yeah The backups are increasingly both a target in terms of
Rick Mischka:
to take them out so that the cyber attack will be more successful and also to use
Rick Mischka:
them as a source for data exfiltration I'm trying to raise the awareness of that
Rick Mischka:
within the cybersecurity world And so if the cyber folks hear anything from me it
Rick Mischka:
should be that somewhere in the corner you talk about that hiring a college
Rick Mischka:
kid and then training them right That's there's also normally a college kid
Rick Mischka:
Maybe not even a college kid That's the person in the corner doing the backups
Rick Mischka:
because it was the only job he could get and he didn't necessarily he's not
Rick Mischka:
that person you were when you said when you were talking about find the person
Rick Mischka:
who has the desire to do this job that's hungry often with the backup the person
Rick Mischka:
was just hungry for a job they weren't hungry necessarily for the site for the
Rick Mischka:
Doing the backups No one is no one's in college going man I really hoped that
Rick Mischka:
somebody hires me as a backup admin
Rick Mischka:
Prasanna Malaiyandi: Except you Mr Backup Except
Rick Mischka:
W. Curtis Preston: no not even I know no this is yeah it's how I got my
Rick Mischka:
job I wanted to be in computers I did want to be in computers and I took
Rick Mischka:
the job as backup person Because that was the job I could get and it got
Rick Mischka:
me into the big bank and and then I just Accidentally never got out of it
Rick Mischka:
So that's how I ended up specializing
Rick Mischka:
in
Prasanna Malaiyandi:
as I say.
Prasanna Malaiyandi:
W. Curtis Preston: Yeah the rest is history yeah I like
Prasanna Malaiyandi:
that I really like this idea, of figuring out where your edges are.
Prasanna Malaiyandi:
Because back in the day, right?
Prasanna Malaiyandi:
The edges were the edge of the building, right?
Prasanna Malaiyandi:
Nobody had computers outside the building.
Prasanna Malaiyandi:
All the computers were inside the building.
Prasanna Malaiyandi:
We had a data center.
Prasanna Malaiyandi:
It was the center of the data, right?
Prasanna Malaiyandi:
That was the way that things were, but now your edges are everywhere, right?
Prasanna Malaiyandi:
there, all this work from home that's going on, and the SaaS and the, the
Prasanna Malaiyandi:
cloud data centers, the PaaS services.
Prasanna Malaiyandi:
You're, you are, I wonder if you don't have a handle on that today,
Prasanna Malaiyandi:
how does one go about, figuring out where their IT department has scrawled
Prasanna Malaiyandi:
to, I can't imagine how you could start doing something like that.
Rick Mischka:
know, I've, I've seen an interesting trend
Rick Mischka:
of companies who have gone.
Rick Mischka:
The way of not having any location, my wife's company actually has done that.
Rick Mischka:
They have no buildings that they pay rent for.
Rick Mischka:
They provide a stipend for every one of their employees to go find a coworking
Rick Mischka:
space, which is, which really cool for them, but now you're on public wifi for
Rick Mischka:
the most part, and they don't have any.
Rick Mischka:
Firewalls, they have no network security.
Rick Mischka:
Everything they, they do is, is, in the cloud, right?
Rick Mischka:
Access is through a SaaS application and they made the intelligent
Rick Mischka:
decision that they didn't need all of this network security they needed
Rick Mischka:
to make sure that their employees were protected on the end points.
Rick Mischka:
Right?
Rick Mischka:
Typically a laptop provided to them or a mobile device.
Rick Mischka:
And then they took it one step further and said, all of our data is in the cloud.
Rick Mischka:
They're accessing everything that's somewhere in the cloud.
Rick Mischka:
We need a security broker.
Rick Mischka:
We need a workload protection solution.
Rick Mischka:
And that's how we're covering our edges.
Rick Mischka:
But there's still people hanging on to, well, I need all three edges.
Rick Mischka:
Do you?
Rick Mischka:
I don't, I don't know, but understand why you think you need that.
Rick Mischka:
The most important edge today is, is wherever your users are accessing
Rick Mischka:
the data, find a way to secure that.
Rick Mischka:
And you've secured a majority of, of.
Rick Mischka:
Now, that doesn't mean you can't still have your users click on something stupid.
Rick Mischka:
you can't train stupidity.
Rick Mischka:
So, it's gonna happen.
Rick Mischka:
But at least if you have protection where they're clicking on it,
Rick Mischka:
hopefully you'll catch it a lot sooner.
Rick Mischka:
or worst case...
Rick Mischka:
You fall back to your data backups who are far more protected from someone like you
Rick Mischka:
or the, or the kid that just wanted a job.
Prasanna Malaiyandi:
Yeah.
Prasanna Malaiyandi:
or, and the other thing is hopefully you can also reduce the blast radius, right?
Prasanna Malaiyandi:
W. Curtis Preston: Yeah.
Prasanna Malaiyandi:
And you've got to do both.
Prasanna Malaiyandi:
You've got to train the users.
Prasanna Malaiyandi:
And then you've got to.
Prasanna Malaiyandi:
Prepare to respond when the users don't do what you trained them to do.
Prasanna Malaiyandi:
I mentioned this a lot on the podcast, but at that bank where I worked, we
Prasanna Malaiyandi:
constantly trained new employees that one of the things that we always told
Prasanna Malaiyandi:
them over and over again is no one in the IT department will ever call
Prasanna Malaiyandi:
you and ask you for your password.
Prasanna Malaiyandi:
And then the next day after their new employee training, we would call
Prasanna Malaiyandi:
them and ask them for their password.
Prasanna Malaiyandi:
And they would give it to us a sadly high percentage of the time.
Prasanna Malaiyandi:
And, people will, and sometimes you'll just access sometimes
Prasanna Malaiyandi:
you'll, it takes a moment Of just not paying attention, right?
Prasanna Malaiyandi:
A little bit too much muscle memory, clicking on something.
Prasanna Malaiyandi:
so even smart people that are trained and normally do the right thing
Prasanna Malaiyandi:
can also click on the wrong thing.
Prasanna Malaiyandi:
I know, I remember doing that once when I thought I was talking to
Prasanna Malaiyandi:
LifeLock because my employer at the time had subscribed us all to LifeLock.
Prasanna Malaiyandi:
it was a spear phishing attack because, it was like they knew
Prasanna Malaiyandi:
that I was using LifeLock.
Prasanna Malaiyandi:
And so they went right after me, or maybe it was just, I don't know if it was just
Prasanna Malaiyandi:
a random phishing attack, but, but I logged into what I thought was my LifeLock
Prasanna Malaiyandi:
account and, it very much was not, and I immediately did all the I needed to do.
Prasanna Malaiyandi:
yeah.
Prasanna Malaiyandi:
I also remember the other story, Curtis, you told, just going
Prasanna Malaiyandi:
back to muscle memory, right?
Prasanna Malaiyandi:
It's, I remember you had a story where, You got an MFA request and
Prasanna Malaiyandi:
you're like, but I don't remember making that MFA request, remember?
Prasanna Malaiyandi:
And were like, yeah, but you actually did do that, right?
Prasanna Malaiyandi:
And it's I think it can go both ways, right?
Prasanna Malaiyandi:
The muscle
Prasanna Malaiyandi:
W. Curtis Preston: yeah, absolutely.
Prasanna Malaiyandi:
I remember that where I got an MFA request and via muscle memory, I was like, yeah.
Prasanna Malaiyandi:
Boom.
Prasanna Malaiyandi:
Boom.
Prasanna Malaiyandi:
And then I was like, wait.
Prasanna Malaiyandi:
what did I just do?
Prasanna Malaiyandi:
What did I just approve?
Prasanna Malaiyandi:
And what it was because I had opened up, Chrome and it had 37 tabs and one
Prasanna Malaiyandi:
of those tabs was authentication via that, the system that was doing an MFA.
Prasanna Malaiyandi:
So I breathe the sigh of relief.
Prasanna Malaiyandi:
I appreciate those four things.
Prasanna Malaiyandi:
see Rick, we probably could have done this podcast in nine minutes,
Prasanna Malaiyandi:
and done just those four things.
Prasanna Malaiyandi:
we should all be like you.
Prasanna Malaiyandi:
I appreciate brevity where I find it.
Prasanna Malaiyandi:
but no one ever finds it on this podcast.
Prasanna Malaiyandi:
so thanks.
Prasanna Malaiyandi:
Thanks a lot, Rick, for coming on and talking about, one
Prasanna Malaiyandi:
of our favorite subjects.
Rick Mischka:
thank you guys for having me.
Rick Mischka:
This was so much fun.
Rick Mischka:
W. Curtis Preston: And, thanks Prasanna for reminding me of that sad
Rick Mischka:
moment in, in my personal history.
Prasanna Malaiyandi:
Anytime, Curtis.
Prasanna Malaiyandi:
I always try to bring you down.
Prasanna Malaiyandi:
And Rick, it was as well
Prasanna Malaiyandi:
W. Curtis Preston: All right.
Prasanna Malaiyandi:
Thanks again to our listeners.
Prasanna Malaiyandi:
we'd be nothing without you.
Prasanna Malaiyandi:
Be sure to subscribe on, wherever you listen to the podcast so
Prasanna Malaiyandi:
that you can restore it all.