エピソード

  • Security Gets Serious Episode 004: Richard Greenberg on AI, Ethics and Learning from Failure
    2024/07/24

    In this episode of Security Gets Serious, host Ben Carr sits down with Richard Greenberg (CISSP), President of ISSA-LA, a well-known cybersecurity leader and evangelist, former CISO, advisor and speaker.

    Ben and Richard dive into the buzz around how AI is being used to both enhance cybersecurity defenses and as a tool for cyber attackers, then they examine the potential for bias in AI models as it becomes more integrated into security systems.

    They also look at what ethical concerns arise regarding bias in AI algorithms, and how organizations ensure their AI-driven security measures are fair, effective and unbiased.

    Ben then asks Richard about his thoughts on to what extent is it ethical for organizations to monitor their employees' activities to ensure security, and what guardrails should be in place to protect employee privacy.

    The of course we have to dig into some of the latest ransomware trends, and what steps can organizations take to protect themselves – like engaging with ethical hackers for penetration testing, and how organizations ensure that these practices are conducted responsibly and ethically.

    Ben and Richard also delve into whether Zero Trust is really working or if it is just another security strategy that puts too much focus on a concept and not the execution, and cloud security challenges and how organizations can mitigate risks.

    Lastly, they discuss the culture of security and learning from failure – namely how security failures can lead to significant improvements in an organization's security practices and why we need to do to a better job in fostering an environment where failures are seen as learning opportunities.
    Richard brings over 30 years of management experience and has been a strategic and thought leader in IT and Information Security as a CISO, Director of Surveillance and Information Systems, Chief of Security Operations, Director of IT, and Project Manager for various companies and agencies in the private and public sectors.

    Be sure to check out Richard’s spot on Will Ferrell’s Ron Burgundy Podcast – it's a riot.

    Your Host, Ben Carr, Halcyon Chief security and Trust Officer: Carr is a Security & Risk Executive and recognized thought leader with more than 25 years of results driven experience in developing and executing security strategies. Carr has served in global leadership roles at advanced technology, high risk, and rapid growth companies such as Ericsson (Cradlepoint), Qualys, Aristocrat, Tenable, Visa and Nokia. Ben has served as a member of the Board of Directors for organizations such as IT-ISAC and NTXPKUA. He is an advisor for Noname Security and Syn Ventures and has previously served on Advisory boards for Living Security, TruStar, Mimecast, Qualys, and Accuvant.

    続きを読む 一部表示
    1 時間 12 分
  • Last Month in Security 005: Shady Vendor Ethics and Ransomware Targets Chokepoints
    2024/07/24

    The other week, the UK has its own Change Healthcare level attack where medical procedures were canceled at multiple London hospitals for weeks on end, and a critical emergency declared following a ransomware operation that disrupted pathology services provider Synnovis.

    As well, CDK Global fell prey to a ransomware attack that led to a massive disruption in the US auto sales market and impacted hundreds of dealers to the tune of tens of millions in lost sales.

    Point: The Change Healthcare attack revealed a financial chokepoint in the US healthcare system that impacted hundreds of providers and their patients, while the Synnovis attack similarly disrupted care at dozens of hospitals in the UK, and the CDK attack demonstrated how attacks on SaaS providers can similarly be a chokepoint.

    Are we starting to see attackers consciously targeting these chokepoints? If not planned, are they taking notes for future targeting where - much like supply chain attacks – attacking one compromises many?

    And of course, we all agree that it’s never a good idea to pile on after an attack by blaming the victims, but sometimes it’s like, “come on?”

    Last year CISA alerted nearly 2,000 organizations about vulnerabilities that could be exploited in ransomware attacks, yet only about half took any action on the alerts. We already know that ransomware operators are adept at taking advantage of unpatched vulnerabilities and misconfigurations and are automating these aspects of their attack progressions – so why is patching not a priority?

    There are only two reasons for an organization having failed to patch in a timely manner: they could patch but didn’t, or they wanted to patch but couldn’t. How much blame should we put on victim orgs if they are not doing all they can to help themselves?

    Last but not least, we dive into the exposure of what is being referred to as the “Gili Ra’anan Model,” where CyberStarts – an Israeli investment VC – ran a CISO rewards program where they can “earn points” worth tens of thousands of dollars for “recommending and purchasing” vendors who happen to be in the CyberStarts’ portfolio of companies.

    While there is nothing wrong with a CISO benefiting monetarily for lending their time and expertise to the evaluation of vendor offerings, the program gave the appearance of financially incentivizing CISOs to choose products that would earn them cash versus better protect their organizations, For reference, the CyberStarts portfolio has 22 companies whose combined value is $35 billion, and five of these companies are unicorns (including Wiz who just got bought by Google for $23 billion), and the portfolio companies have raised $1.8 billion in recent months.

    Principal investor Gili Ra'anan, for whom the “model” is named, showed an internal rate of return of more than 100%, which is a very unusual figure even for the best funds in the world. So how much did this program influence the valuations, funding raises, stock prices, and subsequent acquisition of these portfolio companies? Are programs like this ethical, or can they be run in a more ethical manner?

    The guys dig in...

    ‍About Our Guest:

    Richard Greenberg, CISSP, President of ISSA-LA, is a well-known Cyber Security Leader and Evangelist, CISO, Advisor, and speaker with over 30 years of management experience. Richard has been a CISO, Director of Surveillance and Information Systems, Chief of Security Operations, Director of IT, and Project Manager for various companies and agencies in the private and public sectors.

    Your Hosts:

    Anthony M. Freed, Halcyon Director of Research and Communications
    Ben Carr, Halcyon Advisory CISO

    続きを読む 一部表示
    49 分
  • Last Month in Security 004: DBIR 2024 and How Vulnerability Exploits Rule
    2024/07/24

    In this edition of the Halcyon video/podcast series Last Month in Security, host Anthony M. Freed and panelists Ben Carr and Ryan Golden fly solo and dig into the impact that vulnerability exploits are having on the threat landscape.

    The latest Verizon DBIR is out, and the Halcyon team was excited to make our debut as contributors to the report, which was more focused on pathways to breaches - the ways attackers got into networks than prior reports.

    Verizon Threat Research Advisory Center (VTRAC) looked at 30,458 incidents of which 10,626 were confirmed data breaches - the highest ever. And vulnerability exploitation was back big time with a 180% increase from the previous year.

    The surge was mostly driven by MOVEit exploit leveraged by Cl0p to compromise thousands of organizations in just a matter of weeks - likely through automation – with the end result most often being extortion via ransomware.

    We made mention that Memorial weekend is the anniversary of the MOVEit campaign, where it is estimated that as many as 8,000 organizations were targeted over the last year.

    The report also revealed that about one-third of all breaches involved ransomware or data extortion. More specifically, 9% of breaches involved straight data extortion while 23% included the detonation of ransomware payloads.

    Data exfiltration, ransomware payloads and subsequent extortion attempts were the number one attacker actions observed, while stolen credentials, phishing, privilege abuse etc. were much lower in frequency. Verizon also notes this “ramstortion” trend remains a top threat across 92% of industries.

    Then we dug into the latest Power Rankings: Ransomware Malicious Quartile report which aligned with many of the DBIR findings – namely how automation of vulnerability exploits in Q1-2024 led to campaigns by ransomware groups leveraging misconfigured MSSQL servers, TeamViewer flaws, Fortra GoAnywhere (again), Citrix NetScaler (still), and even vulnerable Python libraries.

    We also discussed how the data exfiltration issue may be bigger problem than ransomware payload, leading to further extortion opportunities for the attackers as well as a drastic increase on potential regulatory and liability for victim organizations, putting the C-level and BoDs at risk like never before.

    Of note in the Ransomware MQ Q1-2024 report was the demise of BlackCat/ALPHV, which dropped out of the Frontrunners quadrant, while a new RaaS emerged dubbed RanomHub who is on the rise and very well may be a rebrand of BlackCat/ALPHV.

    Other notable movements include LockBit slipping out of the top spot after reigning for quite some time following the identification of a 31-year-old Russian national named Dmitry Yuryevich Khoroshev as the developer and admin for the LockBit RaaS platform and a takedown of the LockBit leaks site and attack infrastructure.

    Yet, despite all the LEO actions against these two formerly top-ranking groups, we noted that the attacks leveraging the LockBit payloads continue to be reported in addition to the possible rebrand of BlackCat/ALPHV, calling into question whether the criminal justice system is enough to combat these prolific groups.

    Hosts:

    Anthony M. Freed, Halcyon Director of Research and Communications

    Ben Carr, Halcyon Chief Information Security Officer (CISO)

    Ryan Golden, Halcyon Chief Marketing Officer (CMO)

    続きを読む 一部表示
    1 時間 7 分
  • Security Gets Serious Episode 003: Jon Miller on Building Security Startups
    2024/07/24

    The security market has exploded in recent years as we have seen words like hacker” and “cyber” go from being obscure terms to part of the everyday vernacular of end-users everywhere.

    So, what does it take to build a successful security startup? What hurdles do founders face and how do they overcome them to disrupt the market and advance the tradecraft of the security sector?

    In this episode of Security Gets Serious, host Ben Carr sits down with Halcyon co-founder and CEO Jon Miller who first led critical teams at several well-known security vendors, then rose to the ranks of CEO to found and shepherd several more to success in a very competitive market.

    Miller discusses everything from how his understanding of the evolving ransomware threat landscape shaped his experience as a cybersecurity entrepreneur, to the most alarming trends in ransomware attacks and their impact on businesses and individuals.

    Miller also discusses his unique perspective in building defensive security solutions based on his extensive experience in building offensive tools for the U.S. government, and how understanding good offense is critical to mounting a good defense.

    Miller has spent 25+ years working in the cybersecurity industry. Prior to co-founding Halcyon, Miller was the CEO & Co-founder of Boldend, a next-generation defense contractor focused on building offensive tools for the US Government.

    Before his work at Boldend, Miller held the title of Chief Research Officer of Cylance (now Blackberry) where he focused on malware and product efficacy.

    And prior to Cylance, he was employee number 70 at Accuvant (now Optiv) where he helped build and lead the largest technical consultancy at the time Accuvant LABS, working with over 95% of the Fortune 500 as an offensive security expert.

    Your Host, Ben Carr, Halcyon Advisory CISO: Carr is a Security & Risk Executive and recognized thought leader with more than 25 years of results driven experience in developing and executing security strategies. Carr has served in global leadership roles at advanced technology, high risk, and rapid growth companies such as Ericsson (Cradlepoint), Qualys, Aristocrat, Tenable, Visa and Nokia. Ben has served as a member of the Board of Directors for organizations such as IT-ISAC and NTXPKUA. He is an advisor for Noname Security and Syn Ventures and has previously served on Advisory boards for Living Security, TruStar, Mimecast, Qualys, and Accuvant. ‍

    続きを読む 一部表示
    54 分
  • Last Month in Security 003: Takedowns, Change Healthcare Updates and Proxy Attacks
    2024/07/24

    In this edition of the Halcyon video/podcast series Last Month in Security, host Anthony M. Freed and panelists Ben Carr and Ryan Golden are joined by Halcyon CEO John Miller to continue our examination of the recent Change Healthcare attack that crippled healthcare payment processes across the country.

    We also delve into recent takedowns of two of the most prolific ransomware gangs – LockBit and BlackCat/ALPHV - and whether law enforcement actions will have any lasting effect on the onslaught of attacks.

    And we touch on the dual nature of some of today’s ransomware attacks that serve a geopolitical strategy and offer plausible deniability for adversarial nations in addition to a revenue stream for criminal actors.

    Parent company UnitedHealth Group estimates the cost of remediating the February ransomware attack Q1-2024 is $872 million, and said it expects the attack on Change Healthcare will cost $1.6 billion.

    Those numbers are insane. But oh good, here comes the government to the rescue?
    Senator Mark Warner (D-VA) has proposed legislation dubbed the Health Care Cybersecurity Improvement Act, that would require some healthcare providers and technology vendors to implement minimum cybersecurity standards.

    Meanwhile, DHS published healthcare-specific Cybersecurity Performance Goals, and HHS is planning two regulatory changes that will implement cybersecurity standards for Medicare and Medicaid participation by way of updated HIPAA data security rules after more than 152M people were impacted in the attack.

    And to make things more complicated, RansomHub – who may be a rebrand of BlackCat/ALPHV – is claiming to be in possession of data stolen from Change Healthcare and is further extorting the company.

    But we did have some major takedowns by law enforcement against LockBit and BlackCat/ALPHV that may have contributed to a notable decline in attacks in the first quarter of 2024.

    Yet, even after these actions, LockBit attacked Trans-Northern Pipelines, Prudential Financial, and LoanDepot (to name a few), and BlackCat/ALPHV hit Change Healthcare months after law enforcement takedown attempt, calling into question whether law enforcement alone is the right path for dealing with ransomware attacks.

    There is mounting evidence that some of these ransomware operators may be acting as proxies for adversarial nations like Russia and China. The dual nature of a subset of ransomware attacks conveniently provides these nations with plausible deniability.

    There is evidence of overlap between cybercrime and APT operations including shared attack infrastructure and tooling between cybercriminals and nation-state operators, and Chainalysis found that 74% of all revenue from ransomware attacks in 2021 went to attackers in Russia.
    So why are Western nations afraid to call out the blatant connection between cybercriminal and nation-state operations? Do we need to invoke something like Executive Order 13224 where we designate some ransomware attacks as nation-state sponsored terrorism?

    ‍About Our Guest:

    Jon Miller is the CEO and Co-founder of Halcyon and has spent 25+ years working in the cybersecurity industry. Prior to Halcyon, Miller was the CEO & Co-founder of Boldend, a next-generation defense contractor focused on building offensive tools for the US Government.
    Before his work at Boldend, Miller held the title of Chief Research Officer of Cylance (now Blackberry) where he focused on malware and product efficacy. Prior to Cylance, Miller was employee number 70 at Accuvant (now Optiv) where he helped build and lead the largest technical consultancy at the time Accuvant LABS, working with over 95% of the Fortune 500 as an offensive security expert.
    Your Hosts:

    Anthony M. Freed, Halcyon Director of Research and Communications

    Ben Carr, Halcyon Advisory CISO

    Ryan Golden, Halcyon Chief Marketing O

    続きを読む 一部表示
    49 分
  • Security Gets Serious Episode 002: Ryan Permeh on AI-Driven Security
    2024/07/24

    Experts disagree as to whether AI is the game changer for humanity as promised or will spell the end of us all – it just depends on who you ask. AI/ML have been in use in security solutions for some time, and it hasn’t killed anyone yet (mostly).

    But are there still ethical considerations that arise when applying AI/ML in cybersecurity? Yes, because in a world increasingly reliant on AI/ML-powered solutions for cybersecurity, we still need to ensure there is transparency and accountability for those who develop the algorithms
    that run our detection engines.

    In this episode of Security Gets Serious with Ben Carr, host Ben Carr sits down with a pioneer in the application of AI/ML in solving security challenges, Ryan Permeh, partner at technology investment group Syn Ventures (https://www.synventures.com/).

    Permeh has been a leader in security innovation for several decades and has a storied career in both offensive and defensive security, helping pioneer the use of AI/ML to detect and defeat novel threats.

    He discovered and was the primary analyst investigating the “Code Red” computer worm and contributed to many other analyses of significant threats over his career.

    Permeh was Co-Founder and former Chief Scientist at Cylance (acquired by Blackberry $1.4b in 2020) and led development of the architecture behind Cylance’s mathematical engine and groundbreaking approach to security that disrupted the industry and introduced Next-Generation
    Antivirus (NGAV).

    Prior to co-founding Cylance, he served as Chief Scientist for over two decades at McAfee, focusing on technology strategy. Prior to that, Permeh was a Distinguished Engineer at eEye Digital Security where he focused on building security assessment tools.

    Permeh has published numerous articles, papers and books, and is a frequent speaker at conferences around the world on the topics of security, privacy, AI/ML, and entrepreneurship.

    His research has led to numerous innovations in both offensive and defensive security technology, and he has more than 20 patents in the security and data science fields.

    -

    Your Host: Ben Carr, Halcyon Advisory CISO

    続きを読む 一部表示
    55 分
  • Security Gets Serious Episode 001: Ben Carr on CISO Challenges
    2024/07/24

    Welcome to the inaugural episode of "Security Gets Serious," where we delve into the world of cybersecurity with industry experts. In Episode 001, our host Ben Carr, shares invaluable insights into the challenges faced by CISOs in today's digital landscape.

    As organizations navigate increasingly complex cyber threats, understanding the role of a CISO is crucial. Ben Carr provides a firsthand account of the strategic decisions, risk management strategies, and technological advancements necessary to safeguard sensitive data and mitigate cyber risks effectively.

    Tune in now to gain expert knowledge and actionable strategies from Ben Carr and stay tuned for more episodes of "Security Gets Serious." Don't forget to like, share, and subscribe for future updates on cybersecurity insights and best practices.

    続きを読む 一部表示
    37 分
  • Last Month in Security Episode 002: Change Healthcare Attack Raises Stakes
    2024/07/24

    Welcome to our new series "Last Month in Security", where we bring you the latest insights and updates from the frontlines of cyber defense. In this episode, we delve into the key events and trends that shaped the past month in cyber security.

    From major data breaches to emerging threats, we provide a comprehensive overview of the challenges faced by individuals and organizations in today's digital landscape. Our expert analysis offers valuable perspectives on the evolving tactics of cybercriminals and the strategies employed by defenders to stay ahead of the curve.

    Join us as we explore the latest advancements in cyber defense technologies and discuss proactive measures to enhance your digital security posture. Whether you're a seasoned IT professional or a concerned citizen looking to safeguard your online presence, this video has something for everyone.

    Stay informed, stay vigilant, and together, let's fortify our digital frontier against emerging threats. Watch now and empower yourself with the knowledge needed to navigate the complexities of cyber security.

    続きを読む 一部表示
    49 分