A (57:24)
All right, here we go. I don't know if you guys know this. Like, obviously this is going to be a drink, but, like, this is what. This is what's happening in the. In the. The North Sea. Over there by uk, we got Sean Connery manning the helm of a Russian sub, talking about send one ping only, please. This is a scene from Red October, a phenomenal adaptation of a Tom Clancy book, I'm pretty sure. Anyways, TLDR, it is borderline hilarious to me that in 2026, we can have a Russian submarine off the coast of the UK doing shenanigans. And it's like, like, essentially. Essentially, the UK took like, a stick and they're like, go on, get, get. You go on and get out of here. Go, get out. And, like, just like, kind of like snapped, like, switched the submarine, and the submarine was like, oh, no, I'm gonna go, like, what are we doing? This is like international country on country action. They're literally in a covert forward operating position doing something off the coast. And, like, it's just like those crazy Russians. Go on, get out of here. We'll see you next time. What are we doing? How are we doing this? Like, Russia. I mean, China floats a hot air balloon over the, the northwest of the US and everybody's like. And then like a Russian subs off the coast of the. Taking crazy pills here. All right, I am glad that the, the Russian sub kind of went away somewhere. Dude, this is. I'll just say this really quickly. Remember the OSI stack, right? A lot of times we want to focus on the network layer, the transport layer. Ooh, very technical. I'm gonna, I'm gonna, you know, basically I'm gonna do a TCP SYN flood. Ooh, so hot. So hot right now. That Hansel. So hot right now. My guy. If I drop an anchor on your Ethernet cable, again, I'm being super generic and, and oversimplifying. But like if I cut, if I cut the cable going to your house, you don't have Internet. I don't need some next level hack to do a denial of service. I can just cut the line. The physical layer is part of the stack and if it doesn't exist, it doesn't exist. So if Russia is going to go dink around with some undersea cables, fine. You could argue that they might be trying to tap the cables to get a confidentiality compromise, but in reality, let's be real, right? Like, most traffic is encrypted. So like you could just do an availability attack, but why would you do some elegant hack when you could literally just take a, like a chop saw and be like, all right, all right, here we go. Computer, play, play. Sky scroller scrollers. All right, guys. Wow, look at us. It's 9 o'. Clock. 9:02. We did the thing. It looks like our first time or mission 12 or whatever wasn't here. I tried to ping them earlier in the show and they weren't there. They must have. They. They reached between their legs and pulled the eject thing and spun out like Maverick and Goose. That's fine, guys. This was episode 1109 of your Simply Cyber Daily Cyber Threat Brief podcast. I was your host, Dr. Gerald Ozer. I hope you got value. We do this every single weekday morning at 8am Shout out to Steph Clues, the Simply Cyber Squad member of the week. She's crushing it. You're crushing it. Happy birthday again to Micah for everybody. Don't go anywhere if you don't want to, because we are about to do Cyber Career hotline. Let me show you this. Guys, I've got you covered. Come hang out with me. You got questions, I got answers. Let me. Listen. Guys, just let it wash over you. You drop Your questions in chat. I'll answer them term. This is Cyber Career Hotline. Don't go anywhere. We'll be right back. All right, what's up, Cyber Career Hotline? I am your host, Jerry. Hopefully you enjoy that. It's the beginning of what's going to be this Cyber Career Hotline thing. Shout out to Kimberly can fix it. Who made that graphic? That's what's up, guys. Welcome to Cyber Career Hotline. This is Simply Cyber's AMA format. It is presented by Simply Cyber Academy. Simply Cyber Academy is an amazing online school where you can get GRC training. Compliments of me, I wrote the curriculum around the GRC or some of it. Right. There's other instructors like Stephen, Michael and others who have done it. Also pen, pen, pen. Testing Education with Ryan Yeager, Tyler Ramsby and others. Daniel Lowry's in there. Guys. Here's how to do it. If you have a question, put it in chat with a queue. I will do everything in my power to answer it. As I said, this is Cyber Career Hotline. Lol. Thank you so much, Kimberly. I can't get enough of that. All right, first question coming off the pile here, Sean Sailors. I'm not even reading in advance. What do companies do for secure laptops, phones, when traveling to countries that are known to put spyware onto devices? Now, I haven't dealt with that too much. What I will say is if anyone in chat has dealt with this, let me know. I will say that you can. You can, you can do a couple things, right? Depends on what your bag is. One, you could issue a. You could issue a laptop just for traveling to dangerous countries, and that laptop is used just for that. And then when you return, they wipe the machine. Secondly, you could use thin clients, like right now in Azure, it's quite popular to have like a virtual desktop. And then you use a quote unquote, thin client, which is like basically a stupid laptop that connects in, and then you have your instance there. They can't really install spyware up there because it's Azure controlled. Right. Also, you could put permissions on the laptop so you're not allowed to install software. And there's no amount of the country forcing you to give them admin access that you can help with because you don't have admin access to the box. As far as your phone, same thing. Issuing a. A burner phone for people going out is another, you know, kind of popular technique, basically using risk avoidance. Sean Saylors to take a GRC term using risk avoidance by not taking the laptop and the phone into that theater and taking burner items into that theater. All right, guys, hold on. A bunch of questions coming in. This is phenomenal. Let me go ahead and flag these with a little. Let me flag these. You know, how can I learn more about clear text? I don't know what that means. Soul shine. Clear text. I mean, for what it's worth, clear text is basically just unencrypted text, right? So if you have an insecure protocol like FTP or HTTP, you can look at the data payloads in the network packets and see what the data is. That. That's clear text. All right? Find the true. TJ says MDM on those. International ones are good. What are you getting your claw training from? So. Oh, sorry. I'm sorry. I'm so sorry. I just went to itch my ear, and I ripped my ear plug out of my ear. Sorry. That. That was bad on a couple. That was bad on a couple levels. Sorry. Okay, so the question is, where are you getting your training from? Hey, chuck SAP with 10 gifted subs. Did we just become best friends? Yep. Thank you, Chuck SAP. Guys, you want to know really quickly? I know Chuck SAP doesn't like the limelight, but I just got to tell you guys, Chuck SAP is. I love myself some Chuck SAP. He's such a nice guy. If you haven't worked with Chuck SAP or you haven't connected with him in at a bsides or anything, Chuck, are you going to any bsides in the next. You know, whenever? I. I don't want to dox you. I just want to bring. I want to bring attention to this. This guy's so great. I love this guy. Literally. I've known Chuck SAP for years. This guy right here. I'm gonna drop a link in chat. You want an easy follow for a great person in our community, follow him. Boom. That guy right there. Chuck SAP. Such a great guy. All right, As I was saying, where are you getting your training from? So I'm doing it right here. This is the official anthropic training. Who asked this? Ray. Ray. This is the official anthropic training. Okay, so, Ray, I'll drop a link. Ray. And you can see here I am trying to be deliberate. I'm not signed in, so you can't see my progress. But hold on. I. I will tell you guys. What I am doing is I am taking, like. Like, legit notes, right? Like, I'm taking legit notes, and I will be sharing all these notes with the community if you guys want see here's the thing. I don't know, I don't know if you guys want my notes and want my, my thoughts on this stuff. I'm still, I gotta get a better system on figuring out what people want me to make content on. I know Misty, I'd said they want the vulnerability management analyst class. I'm aware of that. But yeah, for me personally I'm doing this, this training right here. Not just the quad 101, I'm doing all of these. Okay. I, I like Claude Co work. I think Claude Co works phenomenal to me. It makes sense to take the anthropic training from anthropic. Okay. Also, also bonus today at the beginning of the show I played jokingly the Karn death rattle. This guy right here. I played boys to men. So hard to say goodbye. I'm going to be not fully wiping this Mac mini, but I'm going to obliterate open claw from it, change the permissions on it, make it so I can remote into it from my workstation over here and I'm building a Claude Co work obsidian build and then I'm going to start actually just taking my notes instead of on notebook. I'm going to take them in the obsidian and start building out that. So stay tuned for that. All right. Continuing to look through chat here, Michael, do you think the red team still can ruse pursue after what Clyde Mythis can do? Yeah, yeah. I mean here's the thing. One, one reality is. Well first of all a red team, specifically red team is not designed to just break into things. A red team is designed to emulate a very specific threat actor. So as long as they're threat actors out there, there will be red teams to emulate. Now you might say, well, Claude Mythos can emulate a red team. I don't know, can they? Like maybe. But a lot of times you are looking for very specific kind of attacks and see how they work. So I don't think pen testing is going to go away. I do, I do think that a lot, a lot of like lower hanging fruit, easier things to discover, best practices that are not implemented will be captured by AI and handled. I, I've told you guys this before. If you wanted to get a CVE under your name, if you want a CVE associated with you, you better get your button gear. Because once AI goes full mainstream, all those CBEs that are super easy, AI is going to scoop them all up and you're not going to get them. Now you could get a hard one, but plus remember AI I mean real pen testers and red teams are about like kind of cobbling things together, nuances, stuff like that. So Tyler Ramsey has a video on this. I don't think it fully eliminates it, but yeah, Claude Meathos is a thing. Crocketer Tubs. I gotta go Crockett Mara. Because the song's called Crockett's Revenge and I like Crockett. All right. Yeah. Netbooks, that was a thing. We talked about netbooks for a minute. I had one of those. I had an Asus escol for someone early in their career. How would you compare external versus internal IT audit in terms of long term growth, skills, future proofing, I mean, I guess. S. Cole07 I mean they are similar and you can treat them both as similar. Like if you treat an internal audit like you're on an external audit, you can kind of get those same best practices. I think external audit's better only because you are, you know, you're, you're doing logistical coordination. You're learning how to speak more clearly. You'll be talking to technical people, you'll be talking to non technical people. You'll be doing debriefs of, you know, the client or management. So handling client operations, multiple clients versus one. Right. So that's my thoughts on that. But the skills of actually doing the audit, those are the same, right? Like internal or extra? Like. I, I guess my point is if you're doing this csf, it's NIST csf, right. An internal audit is identical to an external audit on the actual. Sit down and ask them the questions. It's just they work at the same company as you. Continuing to look through chat. All right, we are at 9:15, scrolling. How can someone's IP address from their email. How can I get someone's IP address from their email header? I don't think you can. I don't think you can get someone's IP address in their email header. The email header would have the their mail server IP address, right? Like, like Google Mail or whatever. If you, if you did want to get someone's IP address from an email, then you could. I'm not suggesting you do this. Soul shine. I'm not suggesting anyone do this, but hypothetically you could include a send them an email, but have an asset in the email that needs to be served to them and then when they reach out to grab the asset, their IP address will be revealed. Then again, not suggesting that's how you do it, but that's how you would do it. Continue to look all Right. Okay. Continue to look through chat. Guys, I, I, we family went on a trip this weekend. We may or may not move. Very cool stuff. All right. I'm also going to take GRC engineering training through anecdotes. All right, let's, I'm contin, I'm scrolling through chat right now. So can Claude Mythos impulse a specific apt. I don't know. I don't know enough about Claude Mythos. If anyone's done research on Claude Mythos, let me know. All right, continuing to look through chat. How did your collab go with Tanya Janka? Thank you, Kathy Chambers. So for those who don't know, Tanya Janka wrote a book, a new book she's got coming out. She is, she hacks purple. Very popular on the appsec scene. We, Tanya and I did a two hour live stream on Friday about her chapter one. It was fine. It was fine. It was very, I guess I'll just say this, Kathy and chat. Like as somebody like myself who is super organized and super, like, structured, the, the, the stream didn't have a structure. Like there was no, there was no clear expectation of what we were doing. We were just kind of like jumping around in the book and stuff in the chapter and talking about things. So it was, it was, it was a Tanya Janka production, not me production. So I was just a guest talent. I think it was fine. We had some good turnout. I know several Simply Cyber Community members were there and got value. Steve Young was there. DJ B SEC was there. I, I don't know if it delivered value on her marketing her book, I guess. Yeah, exactly. Kishan Infosec says you can email them. A tracking pixel. Exactly. That's how you get those IP addresses. Where does a guy get a suit like you have asking for a friend? A suit like I have? What suit are you talking about? Steve Young. I haven't worn a suit. When's the last time I wore a suit? My brother in law's wedding. Although, guys, hey, really quickly. I will be wearing a suit this Thursday. I will be wearing a suit this Thursday, which is wild because then I have to wear it to go teach the Citadel students on Thursday. I'm doing like a, I'm doing a thing on Thursday in Charleston. Devin Grady is going to be there. But I gotta wear a suit. I gotta look, I gotta look the part, y'. All. But anyways, if you want to get a suit. Steve Young. I don't even know where I got my last suit. I will. Oh, oh, oh, oh, oh, I see, I see. I'm. See? I'm such a donkey. I'm such a donkey. Okay, I get it. Steve is asking about this suit. I'm sorry. Look at me, trying to just answer questions to the best of my ability. Completely aloof to the jokes. Yeah, no, I got this down in Miami. We took down a cigarette boat. Drug cartel bust, huge. Got a little bonus from the boss. Went out and bought this hot tweed suit. Matches the Lambo. Let's see. Continue to look through chat. It's 919. This is good. Anytime I'm doing this, I think of rogue cyber. Is rogue cyber in chat still? He's got. He's got a really high energy, like, AMA thing. Foreign. I'm. I'm moderating a panel of three healthcare executives about how to implement AI governance and get adoption from clinical care teams in modern healthcare. A cto, a cfo, and I. I think a cio. And I'm. I'm. I'm. I'm manning the control panel. All right. Hey, we're caught up on chat. Phenomenal, guys. Hey, if you got questions, put them in chat. Marcus Kyler's got one. Let's see what Marcus wants to ask. I want to spend my 5 to 9 studying GRC, but my 9 to 5 dictates I spend that time studying differ. How do you level up for the job you want when the job you have monopolizes all of your outside study time? Ah, great question, Marcus Kyler. So I'm just gonna shoot from the hip, okay? Not to be confused with riding low on the hip on a train bound for glory. Marcus Kyler. What I would say here is take advantage of any and all overlaps between differ and grc. What do I mean by that? Well, let me just go to the old, trusty NIST850. Marcus, what kind of without. If you can tell me, what kind of information security framework is your organization using? Because if you're doing differ, Right, look at this. Check. This is what I would do. All right, so I. I've just googled NIST 853, digital forensics. And just so everybody knows, NIST 853 is a security control catalog presented by the National Institute of Standards and Technology around all the controls that you could implement to reduce risk for your organization. Okay? Now look at the ones that map to forensics. Au family, au 2, au 6, au 10. This is around retention generation and protection of all audit logs. Marcus, if you're doing digital forensics, you know how valuable logs are. In fact, if you don't have logs. It's the very first thing you do when you get into an environment with an active incident going on. Okay, so there's the AU controls for your GRC push ir. I mean this is right nail on the head procedures, procedures, how to detect, how to analyze, how to handle, how to do evidence collection and handling, media protection around sanitization, disposal, forensics imaging and secure storage of those forensics images, the system and information integrity family detecting unauthorized changes and malicious code. All right, now why do I say all that? As you're doing your digital forensic stuff, Marcus, you can be documenting as a GRC person how these controls align with the work that you and your team are doing in digital forensics. And then hopefully you like partner with the information security office, the GRC people, the CISO to provide greater context for their SSP or for whatever documentation they have around how they are implementing those. And if you're doing digital forensics for a client, right like say you're MSSP or whatever, you're a mandiant, you get deployed, you can provide additional structure around, you know these, these particular elements of your digital forensics workflows to be more valuable for the client and for you to demonstrate GRC practices. Plus this will get you some exposure to GRC controls, GRC documentation. Also from a GRC perspective when you're doing debriefs with the client, right from a risk management perspective you can obviously say here's what happened, here's what we know. But then if, if you're allowed to Marcus, offer them some suggestions on hey, if you'd like to reduce your risk from attacks like this in the future, here are some recommendations you may want to consider Multifactor. You may want to consider net, you know Citrix gateways or, or you know, network segmentation, privileged access management, maybe even offer if again if you can to do awareness training to the client like so if your external differ offer to do awareness training to the workforce of that client. Assuming that your employer allows you to do that would directly relate to whatever the incident was in reducing the like social engineering, right like giving education and doing just in time training to prevent that risk from being exploited or realized. Again if it's internal Marcus Kyler, you should definitely be able to educate but but do awareness training that's directly related to whatever the incident was. So look the, the TLDR final thing on this is yes if your 9 to 5 is all differ look for those overlapping opportunities. All right, continuing to look through chat. Fun question by the way. Oh Dwight's got their Simply Cybercon ticket. If you didn't know Simply Cyber if you didn't know Simply Cybercon is coming November 8th and 9th. We've got a great program built for you. Myself and the team have developed an amazing program. It's going to be at the Folly Beach Tides. It's going to be in November so it's going to be pretty quiet there. We're going to take it over. Very Deadwood esque. We're going to take over. We've got a hotel block. We're going to do talks in the morning, workshops in the day, and party and activities in the evening. I also want to point out really quickly that I think we got a workshop that might be sponsored. So dude, I'm so excited for Simply Cybercon this year. This will be our third or fourth year doing it. We've got a lot of lessons learned from previous years and I am so excited about bringing the program that we've built for you. The reason I just winced is I have a ankle injury that I refuse to stop running to allow to heal and it hurts. A Warham says question Currently we only get app owners assign acceptable use policies and want to move to getting all users included in access reviews. What's the best method and how extensive should acceptable use policies be? I mean honestly dude, acceptable use policies at scale across an entire organization, I feel like that's pretty standard. Like basically before you grant somebody a corporate user account they should agree to acceptable use. Like do you allow your end users to go to porn sites and gamble on pokerstars.net during work? Probably not. Do you allow them to install mimikats on their endpoint? Probably not. So my, my I would say getting all users to agree to an acceptable use policy should be trivial. Like, like I'd almost argue to management like give me a reason why we shouldn't tell them the policies for using their work account and then for access reviews. Yeah, that's just standard practice put in detections. So the best method I would say is just do it. It's. It's to me it's industry best practice. You got to make sure the policy is right though right? I continuing to look through chat Roswell UK who sometimes doesn't ask real questions how do we risk assess GI that changes its own permissions? Is NIST already obsolete? Yeah, I mean so I would argue that you need to make sure the permissions of agentic AI doesn't allow it to change its own permissions. I would, I would, I would curb that problem right there, I would have it request permission changes. And as far as NIST being obsolete for non human identities, I don't know. I haven't reviewed the NIST documentation on non human identities. I will say that NIST is very thorough and deliberate and what it's what makes NIST so great. They will do public calls for requests, public workshops to make sure that that those NIST documents are solid so they don't move at, they don't move at the speed of AI and business. So it may be obsolete, but I doubt it. I it may not just be as impactful. All right, so Marcus Kyler said primarily nesso Marcus, hopefully what what I suggested helps you if you can let me know in chat if it was helpful or if it was not helpful. Attackers are now hunting enterprise build variables. What what's one defensive habit that prevents a developer from being a corporate leak entry point? I mean most developer. Dude, most end users, I don't care if they work in as a developer or they're an accountant. Most of them don't want to do bad for the company. Most of them just want to do their job and get done. So I think one defensive habit. I'll give you two. One's administrative, one's technical. I would just educate them on like show them LastPass, show them SolarWinds, show them multiple instances of developers getting compromised. And don't say this is you just say hey listen, criminals are targeting you. You are a target. Right? Make them feel individually seen and you will elevate their their internal perception of how serious this risk is. And then as far as like next steps, I mean obviously like conditional access would be great on those accounts. Phil Staff by the way, Phil Stafford's my guest on Simply Cyber Firesides this Thursday. Super pumped about that. Mike oh, Michigan 2512. First timer. Welcome to the party pal. He says he's critical in cyber awareness and education. What should I focus on? Wow. Okay, so I guess if it were me Mishik, I would educ I would focus on two things. One, I feel like in the OTICS space you have a lot of people who don't see the value. By the way, we're at 9:30 so the question please. I can't get to many more questions. I I would focus on the integration of IT and OT and like educating the people who are touching those and making them aware of the risks there. Okay. So you can allow those engineers to put in segmentation or these choke points or detections if they're SOC analysts and stuff like, that a lot of OTICS infrastructure has, like. I don't want to call them like longshoremen, but, like, people who are engineers that, like, don't care about it or OT or think about these things. So you just. You have to make it digestible, and you have to make any education that you send to them. And when I say digestible, I mean, like, make one point. Don't try to boil the ocean with them. Make one point, but then make it very relevant to them. This is what I'll say to Mishik and everybody. Listen, I know you want people to come to you and help, and you're the best thing ever. And, like, they should understand what you're saying if you want to be great at cyber security awareness education. And by the way, great means that you're beh. You're modifying other people's behavior, which sounds dystopian, but at the end of the day, it's not. It's. You're helping people make better decisions or not make mistakes. You're modifying their default behavior through education. If you want to be great at that, you have to put in 98% of the effort. You have to go where they are. You have to use the language they use. You have to make it digestible, like a single point. You have to have empathy for them. Right? They're the ones who are pulling the levers and clicking on the things. Right? If you say, meet me halfway. No, my guy, there's no value. There's no incentive. There's no motivation for that person to meet you halfway. If you go 98% of the way and you're like, all I need is five minutes of your time, that is a reasonable ask for that person. That's the biggest way to get, you know, impactful awareness training. Oh, wow. Okay, so DJ B offered up a tip earlier. I think this was for Marcus Kyler. And of course, this is me not adapting to the AI age. DJ B says put NIST853 in a quad and then ask it to show you the overlaps from GRC and differ and then give you a study sheet. Okay, I'm gonna. Because of time I now we've activated the lightning round, which I think I need a sound effect for. All right, here we go. I'm looking for questions. I'm going to ask question quickly. Naval blockade of Iran. Sorry, we're seeing retaliatory claims. How do GRC players prepare for cyber warfare? I mean, do all the things. It's just you haven't increased you should this is. This should not change the way that you're operating day to day. This is why we have to stay current on industry and news, because your threat model changes and that's what's up. So more detections in place. Okay. Continuing to look through chat. I'm just trying to clear out the questions now. Isn't E Discovery a decent link between GRC and privacy and differ. Sure, yeah. EDiscovery would be like more of a legal thing for sure. That's 100% a link. Definitely appreciate you pointing that out. ISACA AI risk cert coming out this month. Thoughts on AIGRC Certs? I. I'm interested in looking at that. I mean, Comptia and Isaca are both businesses that make tons of money off Certs. AI is so hot right now that Hansel's so hot right now. So I'm not super surprised about this. I will say, based on my experience, I have several Comptia Certs or I have. They've expired. I have several ISACA Certs. They've expired. I have several ISC2 certs that I think have expired, minus CISP. I keep that one for nostalgia, the Isaka one. On balance, I bet you it's very good. I might. I might go get it. Just to go get it. Maybe I can convince Isaka to give me like a free voucher or something and then I can tell you guys about it. All right. Continu to look through chat. Questions, questions. I. I gotta get out of here, though. If you're trying to get a job where they've never had a dedicated security person might be more valuable through a PowerPoint over Zoom. Yeah, for sure. I mean, you're suggesting here that you're able to get on a call with them, which is essentially like an interview. A resume is like they read it asynchronously. So, Crystal. Yeah, if you can do a PowerPoint, I. I would even go further than that. I mean, if you can make it like a sexy PowerPoint with like animations and all sorts of things. Maybe, you know, use obs or whatever. Yeah, go, go. Get after it. All right, All right, guys, we are caught up. Guys. I want to say thank you very much. I hope you enjoyed the stream. I certainly did. Let me see if I can find again, this was Cyber Career Hotline where we answer all your questions. Guys, thank you so very much. I'm going to keep working here. You keep on crushing it. Shout out to all who ask questions, all who showed up, all who helped and shout out to Steph Clewis. As our Simply Cyber Community Member of the Week. I'm Jerry from Simply Cyber. Y' all have a great day. And until tomorrow at 8:00am Eastern Time, when we wind it back and do it again, stay secure, Sa.