A (57:03)
All right, so this is wild. I have never seen this before. Okay, so I worked at a, you know, big four consulting firm for federal it. Okay. Normally, I mean, Deloitte just did this the other day. Deloitte was in the news for delivering a AI slop report to the tune of like 400 grand to some, to some client. It doesn't matter. Like Deloitte, they didn't say Tom Pine, you know, delivered an AI slop. It's always kind of like, it's always business to business type stuff. The US Justice Department's going after this dude specifically, so that's awfully. Awfully nefarious. Now I'm sure he doesn't work at Accenture anymore. I gotta tell you guys, honestly, getting NIST moderate baseline, fed ramp high. And I don't know what these DoD level 4 and 5 are, but I assume that they're kind of commensurate with NIST 853, moderate baseline. It's not easy. And a lot of authorizing officials, a lot of authorizing officials will accept that certain security controls are not implemented. So, like, this is the work. I don't know if this guy was trying to hit the easy button from Chantilly, Virginia and just be like, ah, just do the best you can and we'll say it's secure or what. But dude, $30 million and this guy might go to jail. I hope that extra boat was worth it. Hilmer. Oh, what kind of things? Here we go. Let's see what his actual abuse was. Right. Hilmer knew the platform had not implemented required security controls related to access, IR and continuous monitoring, auditing, logging, monitoring, alerting, not managed environments, not monitored, not governed, not secured. Oh, didn't have an and okay, so this jack wagon. So there's a thing called an SSP or system security plan, and it's basically like the bible of a system's security implementation. It's like you go to the SSP first to see like, what, how any control is implemented. This guy basically speed run an SSP that would be perfect and then didn't implement any of them, which is completely ridiculous. Numerous voices from inside the company said that he shouldn't do this and from outside consultants. So, all right, let's see. I just want to know where the. I got to tell you a couple things after this. Oh, this is a woman. I made a mistake. I guess Chris Hillmer is a woman, dude. All right, so here's the deal. Listen, don't fall into this mistake, all right? As a professional. Listen, seriously, don't fall into this mistake ever. Do not. Like, sometimes you may not want to admit to your bosses that things aren't going as well as you had suggested. But what you can't do is lie. Because what ends up happening in security is it starts compounding because you tell them, oh, we have these things in place. And then everybody starts looking at the next thing. Because logically, if you have A, B and C done, the logical thing is, let's do D and F. Well, if you don't have A, B and C done, and you say A, B and C are done, and then you start marching towards D And F, guess what? You're going to have to start lying about D and F when those don't get implemented. The fact that this dude, the fact, or this lady, excuse me, did all of this over the course of years and every, and people in the company and outside the company knew that she was lying. It blows my mind, dude. Normally people who choose this path do it in secrecy and then they get in over their head and they don't know how to get out beyond just continuing to make it worse. If I had to guess, this person is going to, you know, be, you know, held accountable, dragged out in front of the public square so everybody can see made an example. You're not going to get your 30 million back, though. That's the thing. It's not like this person took the 30 million for a fake job, like a contractor telling you that they're gonna put a shower in and they, they just leave. So, you know, I could see them trying to sue Accenture. I don't know, I just don't, I just don't see how the United States is going to get any, any compensation from this person for a, for, if anything, they should sue Accenture and then have Accenture have like, improper controls. Because the thing is for this person to be everybody in their company, to know that they were lying and then to not do anything, that's pretty crappy governance if I'm not mistaken. Hold on, let me check, let me check. My H, My split V broke. Okay, I, I, I forgot where I was going with that ridiculousness. All right, holler, holler, everybody. Don't go. Well, hold on. All right, don't go anywhere because we're gonna do Jawjacking. But really, I don't want to do jawjacking very long. I feel not great. And I just wanna, I'll switch over to Jawjacking. I'll say hi to everybody and then I'll say bye to everybody. No Jawjacking today. I need to get some more tea, guys. Today was episode 1024, the Megabyte episode for Simply Cyber's daily cyber threat brief. We had a bunch of first timers in here. Modern Rogue Benji, I think it was, or Ben and DC Big Richie. All about good times, guys. If you got value from the show, hit the like button or the subscribe button. My 13 year old told me that I need to tell people to hit subscribe. Subscribe. But either way, I just hope you come back. I hope you come back and have a good time. I'm Jerry from Simply Cyber, wishing you all the very best this beautiful Monday morning. Go crush it. Till next time, stay secure. Ever wonder what it takes to break into cyber security? Join us every weekday for Jawjacking, where industry experts answer your question. Burning questions about the cyber security field. Live, unfiltered, and totally free. Let's level up together. It's time for some jawjacking. All right, what's up, everybody? Welcome to the party. I'm Jerry Guy, your host for the next two minutes as we do a speedrun. Jawjacking. I just didn't want to miss a jaw jacking segment, but I hope everyone had a good show. I certainly did. Looking forward to it. Remember, this is my final week of the year. DJ B SEC will be running the show for a couple days next week. And then Daniel Lowry will be taking us through the start of the new year. We do have. Jesus. I just realized, like, I was definitely pushing now that I'm kind of like, off the daily cyber threat brief. I'm like, oh, I need to chill. I just want to point out this, this Friday, it's basically the last thing I'll do before I leave for the year. State Of Simply Cyber 2025 Q4. We'll briefly look back at 2025. Some wins, some accomplishments, things that we're doing. But more important, looking at 2026 and what you can expect from. From the channel and from the community, from the media group, from the academy. We got some big things cooking for you guys. We are planning on doing the show tomorrow. Yes. Brute. Big Richie with the first question. I'll answer Big Richie's question since Big Richie's a first timer. All right, hold on one second. My toes are cold. Give me a second. Big Richie, I gotta find your question so I can bring it up on stream, bro. Okay. Big Richie says I come from the world of analytics and software engineering. Just passed SEC plus last month looking for a job. Yeah. So the two things that you need to do, number one, you need to develop practical skills. Big Richie, like, SEC plus is fine, but, like, you need practical skills as well. And then you need to make sure that your resume highlights those demonstrable practical skills. Also, you need to network being here with the community. It's an excellent, excellent first step. I would recommend trying to learn some stuff and then document them in, like, a blog or some type of, like, ground zero place that you control. Right. So, like, if you create a blog or GitHub repo or something like that, you can post about it on LinkedIn, but reference back to your main site. That you control. Relationships are incredibly valuable, believe me. Cryptogrozes how does a new grad use their knowledge from cyber to earn? How does a new grad use their knowledge from cyber to earn while trying to upskill? Don't fully understand the question. Cryptic roses. But what I will say is one of the benefits, double edged sword of cyber security is that you're never, you're never not learning, right? If you're, if you find yourself working in cyber and like you're not developing, you, you're doing it wrong. With all due respect, right, you should either be upskilling at work like looking at the person next to you who's like, you know, if you're tier one sock analyst, look at tier two sock analysts and you know, ask them like oh hey, like can I shadow you? What are you doing? Can you explain this to me? I heard threat hunting, I heard detection engineering. Show me what that is. Being here, you know, go like again like say you're not, say you're a GRC person. Well, it doesn't hurt to go download a free like, like a try hack me account and like learn that way like you can upskill yourself, right? When you say knowledge from cyber to earn, I mean get a job, right? I mean that's the easiest way to earn. So I guess I wouldn't say like don't let, don't focus so much on upskilling that you're not going to take a job or whatever to do it. You should be upskilling as part of your job and your employer should be supporting that. Tom Lavin here. Hey Tom. Hope everything's well up there. That, that football game last night or yesterday, huh? Am I right? That was a, that was a humdinger. Tom says what are your tips or, or references for world class tabletop exercises? You know, I gotta tell you, Black Hills Information securities Backdoors and breaches is a phenomenal way to do a tabletop exercise. Now the, the one thing, the one I guess knock, the one knock about back doors and breaches. If, if you, if I needed to knock it is that by virtue of its format, it's on a table and it's small and people are actively engaged. Like a board game. Well, if you're going to do a tabletop exercise with like 30 people or the executives are there and it's there and the insurance companies there and all that, you can't have them all huddle around a table, right? It's just not going to happen. So I would use backdoors and Breaches if you can, more for the IT team and maybe bring in some app owners and stuff like that. If you're going to do a world class tabletop exercise with like the executives or the larger group, carve out a day. Make a rule at the beginning that, you know, you'll. There'll be time for your phones every one hour or something like that. Kind of put it in. You have to get leadership's buy in on this one before you make it, but like some type of embargo on mobile devices so they're not tempted to be distracted. Have a solid. Have a solid scenario. I mean, if you want, you could just use ransomware, but then have injects where you can have the executives break off and talk about like what is their PR response going to be or are they going to make the payment and have the IT people break off and talk about recovering from backups or vulnerable like closing the vulnerability that was exploited and then having get back together. Don't just try to treat one scenario, one, one line and then, and then hope everyone stays informed or stays engaged because they won't. Thank you, carly. All right. Cyber risk. Witch. Adopted cat. Black domestic, short hair. Needs a cyber name. Anyone's got some? Alfie. That's funny. Bruising axes. Alfie. Oh. So Cryptic Roses. I mean, doesn't have a job yet. I mean, I would just continue like scaling up. Here's the thing. You have to. If no one knows what you're doing, no one's going to know what you're doing. I know that sounds so obvious, but it's a reality. So what you have to do is upscale, but then document it. Right. And share it. Talk to other people. Yeah, Real Kyle. Kyle says take another job and keep learning. Absolutely. I mean, if you got bills to pay, you got pills to pay. I mean, not that like I'm saying, oh, do what I did, but like, I mean, I literally like carried bricks for, you know, four months or something until I got my first job. Oh, how to get money for resources. Dude, Cryptic roses. There is an unbelievable amount of free. There's an unbelievable amount of free out there. I hate, I hate to. I'm not trying to poo poo you or anything, but like, I have multiple videos. I gave a keynote talk at Wild west hack infest 2 years ago about living in the golden age of access to free cyber security education. The. The trade off is that you have to, you have to collate and organize it yourself. Okay, Toasty Pops is here. Hey, Toasty Pops. Good to see you. It's been a minute. Hope you're well. Tough break about Patrick Mahomes. Although he is. He is running the Tom Brady playbook, so, I mean, you kind of could have expected him to get injured. Same injury, too. Same, same. You know, eight years in, same injury. All right. The Patriots do have an easy schedule. All right. All right, guys, I am tired and cold and want to get another hot tea. I also have to investigate my split V because it looks like it broke. Sorry to cut jawjacking short, guys. I know. Easy does it. The problem is I. I feel like a jerk. The whole reason I started the YouTube channel is because people were asking me questions, and I. I felt like a jerk telling him I didn't have time for them, so. But let me get out of here. Thank you all so very much. We'll be back tomorrow at 8am I'm Jerry from Simply Cyber. Until next time, stay secure.