A (49:37)
All right, now we get to the fun part. We get to the parts where I get to actually sit here, listen to your or read your questions, answer questions, find out what's going on in your life, see if we can help you out. Let me see here. Got chat up. Let me see if I can find something that's some decent music. I'll do some stream beats. See down at the bottom, do some. Oh, this kind of. This kind of sounds like I was gonna talk about. All right, so I'm gonna. I'm gonna come out of the gate real hot because I want to know who is following, who's following this and who is excited for this. Who watches Stranger Things and it was ready for like my kids are screaming and yelling. They're ready for it to be Christmas at seven o' clock here. Everybody's wanting Stranger Things on right now. We've become huge fans of Stranger Things. Went through and watched the whole thing. We watched when it first came out. We watched the first season. Amazing. And then it kind of fell off and we didn't really watch this. I think we started the second season and didn't watch. But then we went back through and watched the whole thing again and man, we're. We're already ready for strange things to come out. So wondering who. Who out there. Who in our simply cyber community is just as excited as I am to find out what in the world is gonna happen. All these it. And I mean, I'm. I'm sitting here watching Tick Tocks and all these other things about the theories of what can happen or what's gonna happen. Code Brew. Yeah, you feel. So see, we did the same thing. We fell off after season two. Right. Go back and watch it now. Go back and watch it and go through. Man, it got so good. When. When you find a good show, start watching it. And then you get. I'm. What I don't like is that I think they're gonna drop one a week or. Or something like that. Because the last one that they're gonna drop is gonna be on New Year's Day, which is the. Which is going to be January 1st. Just so they could say that as a 2026. It went into 2026, which is crazy to me. Yeah, we all want. Sounds like a lot of people fell off after season two it. Which I'm glad I went back and watched it. I think my kids were like, oh, Stranger Things. The. The last thing is coming out. I'm like, man, that's still on. And then my wife and I and my daughter went and sat there and watched it. My son was watching it. I mean, so we're all. Now we're all just sitting here waiting. And what's funny is you see all these different memes of Stranger Things and people saying, was it Christmasy? You know, it's showing the video of Christmas Eve of, you know, somebody running and it says Christmas or Christmas Day at 7 o', clock, leaving the. Leaving the family's house to make it back to my couch for Stranger Things. Pretty funny. All right, we've got a question. It looks like it's right up my alley. Do you have any experience as a network engineer in an environment that uses industrial control systems? If so, are your recommendations for what are your recommendations for security? So, yes, the answer to this is yes and no. I worked in oil and gas for like seven or eight years. I remember how long it was, but I worked in a plan environment. Now, my experience with the plant environment is a little bit different than what we hear about ISC and OT stuff. So when it came to the IT infrastructure, the networking switches, routers and so forth, all. All of the IT infrastructure, I was part of that. When it came to the OT infrastructure that was completely separate and it was actually run by. They had specified or specific engineers in the plant that ran that stuff. So it was basically two separate networks. And we didn't touch their stuff and they didn't touch our stuff. Now, they did pull us in if they had issues with specific IT things to help them, you know, figure things out. But when it came to the OT side, they were the experts when it came to the OT side, and they did all that. When it comes to securing. When you say securing the environment, that environment should be 100% separate from the IT environment, number one. Number two, it should not touch anything that can hit the Internet. Your HID devices, all of those things should be completely separate. Now, saying that and knowing how things work on the inside, it doesn't always work that way. Right? Because guess who needs computers on the IT side? Your operators, the people that are sitting in the plant that are doing that. So they need to have connectivity to that side. Right. Sometimes there's a little bit of a leak over, but for 99.9999 of that stuff, it should not be touching. If you want it to be secure, and you want to know that it's secure as possible, it cannot touch the side that touches the Internet. And if for some crazy reason it has to, then you've got to have multiple safeguards in place. So you're gonna put firewalls, you're gonna vlan. You're gonna. You're gonna make it hard as hell to get from one side to the other. You can make it possible to get from one side to the other, but it would be hard as hell to get from one side to the other. Because what you don't want is somebody getting into your IT environment and being able to laterally move over into your OT environment. That would screw stuff up big time. Is Stranger Things like the X Men? No, not at all. I wouldn't say it is Stranger Things is. I don't want to say anything about Stranger Things, because if you haven't watched it, I say go watch it. It's a best way to describe it. And those are watching. Will know is. And I am not a Magic of the Gathering or a DND person at all. But that's basically. The story starts with dnd, and it's kind of. It's kids playing dnd, and the story goes out from there. It's. It's very interesting how the Duffer brothers did all of this. It's a great show. Yeah. Binge. Watch that. Oh, Tech Grunt. I think you and me both, man. I think everybody. I think everybody out there is trying to figure out what. What is. How's Max gonna fit into this? How's Max gonna fit into this? Is all right. Is it good to have GRC skills when you're starting a consultant business? Depends on what your consulting business is. If you're just doing network topology and computer stuff. Not really. If you're doing a cyber security consulting business, then 100%. 100%. You should have some type of GRC in there. You need to have some understanding of governance, risk and compliance, depending on what you're doing for as the consultant. Right. If you're going in and you're. You're going to explain to people why they should be doing a specific. Or having specific security protocols in place, then yes, you need to have an understanding of that. 100. You do. Yeah. I did it get. It did get dark, but that was a. That's when it started getting really good. Yes. There are some ICS guys that have done talks on this channel. Not only that have talks, but they actually have. In fact, let me, Let me pull this up. They actually have stuff you can go and watch. There should be playlists in here. There you go. Current state of. Oh, so Jerry talked to Rob Lee. That was three years ago. But you see simply, simply, Simply ice. What happened? Oh, there we go. I don't know what happened. My mic, like, went away. You see Simply Cyber or simply cis. Cis. Simply ICS Cyber. So they have, There are. They're actually videos in here that have that on there. So. Yeah, you can go watch those. That's pretty funny. Strangely, there will be no Friday panel. There will be no Friday show this week. No. So, yeah, with Cobra Kai, they did that. They're not doing that with Stranger Things. From what I understand, this is going to be like a once a week type of thing so they can get them. And if y' all haven't heard, I don't want to, like, spoil anything, but if you haven't heard, I think the last four episodes. So there's four episodes are gonna be coming out. The last episode is like two hours or two and a half hours long. Each episode that's coming out is basically a movie. Yeah. Then that's kind of why I went back to where it was like, just depends on what. What the. This, this right here angular is talking about race conditions and race vulnerabilities, especially when it comes to the NTP server. Yes, I, I get that. I see that. It was just crazy that they were running and screaming and yelling and trying to restart everything over for like, milliseconds. The fact that the, the fact that in the story, the guy's like, hey, let's shut everything down. Well, guess what happens if you shut it all down. Then nobody had. Then NTP is completely down, and now you're trying to re. Reassess of what the. Where the time is. See, management wants to access. Oh, well, So I get what Bruising Hacks is saying there. This is where VPN would come in place and this is where you would have, like I said, behind a firewall, behind a vlan, behind this, behind to that. Like you make it hard to get in. Like I could, I could even see setting up like a VPN that gets you into the, the company network now that VPNs in place, maybe even setting up another VPN internally to get into that to try and like you, you've got to put. This is going to be like security. You're going to have different levels upon levels upon levels when it comes to this. Because when it comes to operational, depending on what you're doing. And I'm sitting here thinking of where I was at and what I was doing because of the things that are out in these plants versus manufacturing. Manufacturing is different. Oil and gas and plants like that are completely different. Especially when it comes to OT stuff because we're talking about highly toxic chemicals and those that don't live. I mean I'm in Houston. So when it comes to plants and fires and explosions, we've seen a lot. I'm sure people remember a couple years back BP blew up. Like when those plants blow up, people die. And if you have the ability, if somebody has the ability to get into it from the outside and just change one thing then now your blow off valve isn't closing or isn't opening in your, your flare is now not burning what it should be burning. And you got back. I mean there so many different things. Like you can even go back to what happened in Florida with the salinity stuff where they dumped the salt in the, in the water. Remember what was going on. Somebody had, they had like remote desktop opened up to the world on the machine. Like what the hell? Then remote desktop in place on a machine at a plant that had the ability to change the salinity of the water that was going to the neighborhoods or whatever it was. I don't remember the full story, but it was, it's like crazy. Luckily they had stuff in place where they saw what happened and they were able to fix it in, you know, quickly. But still. Yeah, people talking about, yeah, it's interesting. So like I said, I am not a D and D person. A match of the Gathering. Like never played any of those games at all. Probably will still never play those games. But it is cool how they take a board game and it's kind of, it seems like they kind of made the, the whole thing about that or not necessarily about that, but it's been incorporated in which is, which is really cool. See now the reason you're not into it is because you haven't watched it. Space talkers. You need to start watching it and you'd be good. So Soul Shine. AI it cloud. I don't like. What's the question? That's not, that's not necessarily a question on what you're asking. Give me a little bit more so we can dive into it. Is Jerry's class the money maker? Not that I know of. Unless you're talking about like taking Jerry's GRC class. Is that gonna. Gonna. Taking any class, taking any boot camp, getting any certification is not going to make you money. It's going to show everybody in the industry that you're pushing, that you're learning, that you're wanting to move and grow, which in turn brings in the money. But it's. It's not going to. That in itself is not going to get you money. Reading through these comments on here. Disney Doom, Kraken. It's on Disney. What's on Disney? Oh, are you talking. Wait, are you talking about, like, Percy or something like that? Or. Like we're going through no vpn? Yeah. In fact, here, let me. VPN open to the world. Let's. Since I brought it up, Is in 2001. Okay, here we go. On Friday, February 2001, a hacker initiated an attack on the Florida water treatment. Sodium hydroxide. That's what it was. So from 100 parts per million to 1100 and 1 or 11100 parts per million. The attack occurred about 15 miles. Yeah. So see, this was. This is one of those that came to. It was big when it happened. It was real big because it's like, oh, the ICS got, you know, how did they get into the ICS system? Then come to find out it's because they had team viewer, or I think it was Team Viewer. They had something on that was open and they were able to get into. Into it. So somebody was able to break in and change it. Luckily, they found it in time that it didn't necessarily cause too much issues, but that once again brought OT back to the forefront of why do we have OT systems on the Internet? Why are we, why are we allowing things like this to happen? People? It's not something that we should be doing. I don't know what no VPN is. We got a question of no vpn. Let's see. They dropped a trailer for it on Netflix. Shows Max and Hollywood. Yeah, We could sit here and talk about this all the time. Space tacos. Come on, man, you can do it. Be one of the Cool kids. Hey, this is a, a great like angular. This is, this is spot on. And it's not even that like we, we're still like that. We're still building stuff and it's not necessarily worrying about vulnerabilities. We're doing that with applications. Everybody's going out and vibe coding applications and just throwing stuff out there. And yes, you can have Claude, you can have chat GPT, you can have these AI instances create your application and have it run through NIST and have it run through CIS and make sure that it's SOC2 compliant and go through all this stuff. But that doesn't mean that it's not going to have any vulnerabilities at all in it. There's no such thing as not being vulnerable. Something will, something's going to happen. And I think Jerry talked about this last week. There was a story last week where he's talking about, you know, you, you yourself, your application can be as secure as possible, but if you're pulling in libraries from somewhere else, guess what, that library may be fine today, but maybe somebody pushes something to that library and you update the library. Now the library is vulnerable and you don't even know that it's vulnerable. And three years down the line you haven't updated that library because you've just been using it. And now all of a sudden that vulnerability hits and you don't even remember that that's part of your application. That's where you have to have SBoM, right? You have to have software bill of materials in place to know, hey, you know this, this library has now got this vulnerability. Do we even use this library anymore? Like React to Shell. Do we even use React? Is this something that we need to be worried about? Yes. No, That was a follow up question. Was that the VPN stuff? Stuff? Are you asking what a VPN is? Let me know Soul Shine, like give me a little bit more. Going through a whole bunch of different things on here. I'm not sure what it is you're, you're asking as a followup to what I said, the vpn. You're asking what a VPN is or why we would put a VPN in place. Oh. Yeah, I don't think it was art. I think I said rdp, but I think it was Team Viewer that they had in place and somebody got into the Team Viewer, which look, Team Viewer is amazing. It's great. But Team Viewer has things on there, has security in place on it. You can put passwords on there. You can also put two Factor authentication on there and only allow specific people to connect to it. That's. There are ways to lock this stuff down, make all these tools work, but you should also be locking them down so when they. They become less vulnerable. Nothing is ever zero vulnerability. But I said this multiple times before. This is like. You drive your car to the mall. Who else going to the mall? Does anybody know what a mall is? Now, these days, you're driving your car to the mall. You park in the parking lot with a whole bunch of cars. But when you get out, you leave your windows down, your doors opening, your keys in. There's a whole bunch of vulnerabilities there, right? What do you do? You get in. When you park your car, you roll your windows up shut. You know, put your T tops on. T tops. One of the 80s. Put your T tops on. You put your target top on. Whatever. You put your top up in the car, you lock it up, turn your alarm on. You put a. What is it? What was that? Steering wheel club. You put a boot on there. Like, you do everything you can to make sure that when a thief comes, that they look at your car and they go, holy crap, I don't want to deal with that. I'm gonna move on to the next one, because the next one I can break the window and then get in. Where? If I break the window on this car now I got to take the stupid club off. Now I gotta unboot it. Now I gotta do this. That doesn't mean that they can't do that. They could. If they want to spend the time to do it, they can do anything. You just make it harder for them. But realize if you make it harder for the adversary, sometimes we're making it harder for our employees. And that's where the yin and yang come, right? That's where. How much security do we put in place versus how much do we actually have in place that allows them to continue to do their job without being. Without having issues throughout the day? Peer pressure doesn't work. We'll see about that. And this. This right here is a thousand percent. Compliance is not security. And we have already talked about this. I know. Within the last couple of weeks, Jerry's brought up the. The image of the gate. Like, there's a gate on the walkway, but there's no fence next to the gate. So. Oh, yeah, you're compliant because you have a gate in the walkway. But I could just walk right around it, right? Just because you're compliant doesn't mean you're secure. Doesn't mean that you're doing everything perfect, Right, Saying, hey, I've got MFA in place. But your MFA is just text messaging. It's better than nothing. And it makes you quote, unquote compliant, but it's not a. It's not necessarily secure. And nowadays we're getting to the point to where MFA through like applications, through like Google Authenticator or Microsoft Authenticator is becoming one of those that they can bypass. With all the token stuff that we've got out there now, it's becoming more along the lines of we got to get past keys in place, we need facial recognition. Like, we're going to get to the point. This is, this is my hot take. I think we're going to get to the point where to do anything, you're going to have to have your face scanned. You're going to have to have something in place that 100% says that it's you. Because just having a phone that says it's me doesn't necessarily see. If I was a threat actor, I'd be introducing. Well, so as a. You're not necessarily introducing the vulnerabilities. You're finding the vulnerabilities that are in the older protocols. So you're, you're searching through those protocols because as a threat actor, you're not updating those protocols to create the vulnerabilities. Now what you can do is find those and then pull them down and find out. Find vulnerabilities in there, quote, unquote, pen tested or something along those lines. I like how twin gate. I can make biometric identifications a requirement for my devices. Oh, let me look at that twin gate. Let me see this. It's time to ditch your vpn. How twin gate works. Put this. I'm. Put this on screen. Zero. Trust some money to look at this. Looks pretty cool. Foreign. What do we got here? We got a long question. Since it's the holiday shopping season, how many people have to deal with porch pirates? How have you taken steps to prevent their shenanigans? Fake package glitter bomb. Oh, man, if I, if I could build a glitter bomb, I would. But in. I'm gonna like knock on all wood where I'm at. We have not had porch pirates. My seagulls all over the place. To me it's crazy because they're sitting there monitoring what's going on, what's being sent to you. All right, we are at 8:18. We got about 10 minutes left. Unless we don't have any other questions, which I know we did finish early. My boomstick boy. This is my boomstick. Let's see. Yeah. Now that's funny. They just put it at the end of the driveway, which is two miles down the road. Elliot Matisse must be. He lives out in the middle of the country where nobody can see him. The only way to get into his house is by helicopter over the top of his moat. He's trying to figure out why his packages aren't showing up on his door. Pocket. Pixies in the house. Good morning. The. The first time I saw this, like, when that guy got ticked off and he finally built that. That's hilarious. Was hilarious. Some of them are getting a little crazy now, though, what they're putting in there. Let's see. What does it say? I have a storm door on the regular door. Since I work from home, I keep the door open. Oh, for the dogs. So one thing I did see which was interesting, and some of you may have this, some not. You have the. Like, the little boxes you can put in your. Put at your front door and basically bolt them down so they can put those packages in. And then only you have a key to open the. Open it to get the packages out and so forth. I saw a video of a FedEx person coming up with a package and literally just chunking it out the front door. I think it was a postal service came in, actually walked up and dropped it by the front door. But this guy had this massive. Almost like a Rubbermaid or something that basically all of the packages should fit in this thing. And it locks when they put it. What, Put the package in there, but none of them were doing it. And then the UPS guy comes up and he's like, what in the world is going on? Why are we not. And he grabs the FedEx package. He's like, fedex, you can be better. You can. You can be. You can be better when it comes to. To this. And put this stuff in. And he takes all the packages. The UPS guy takes all the packages, puts them in there to make sure that nothing gets stolen. That is going above and beyond. Let's see what we got here. Yeah, Some of these packages, they. They're awesome when they, like, throw glitter everywhere, blah, blah, blah. But I've seen some that explode like ex. Basically a color bomb. But it's a big. It's big enough to blow up the whole box, which, like, if somebody's hand was on there, like, it could do some damage. All right, here we go, William. What do we got here? I've been interning at a small medium siiz. MSP I feel like every day I do more and more for them and would like to stay another semester. I'm asking a Pay change from 16 to 18. Is it realistic? I mean, we say you're doing more and more. If they're giving you more jobs to do, I don't see why you couldn't stay or why you couldn't ask for a raise. I don't know what the business is like. You'd have to know more as employees. Everybody wants to make more money at the end of the end. Of course, everybody at the end of the year always goes, I need my bonus, I want my raise, I want all of this. But what a lot of us don't realize and don't on the business side is that you have to take a lot. The, the business itself has to take a lot into consideration. Right. Hopefully everybody in here knows the most expensive thing for a business is the employee. Right? The employees are what cost the business the most when it comes to payments or, you know, your salary, your benefits and so forth. That's what cost the business the most. Number one right now, when we're seeing a lot of people struggling to get jobs in this industry and being able to work and so forth, can you go ask for a raise? You can. I'm not saying don't I. 100. I mean, if, if you feel like you deserve it, then yeah, you have the. Have the discussion be like, hey, look, I've been doing more and more and more. I've been given more responsibilities. Shouldn't I get a little bit more on the side there? Like, give me, give me a couple bucks. It's not unreasonable to ask for that now. Doesn't mean that you should expect it. You need to weigh the good and the bad with this one. Right? Because if you're an intern there and you want to stay there and they like you, the experience that you may get and the things that you're doing may be worth more to you now than that $2 in. In my opinion. So that doesn't mean don't go ask for it. No. What's the saying you do? You boo. Just sit back for a minute and think about, you know, am I getting the experience that I'm getting? Is it actually worth more than $2 an hour right now? Because once that internship is over, and that may be one of the things is maybe when the intern internship's over, you're hired on directly there. Maybe that's a. If you like this msp, maybe that's something you Talk to them about of like, hey, once this internship is over, is there a possibility that I can continue. Continue on here as an employee, not just an intern? That's a good question. I like it. I'm reading through here. Seems like we're still talking about packages and blowing stuff up. Well, I'm in Houston. Yeah. So what's that have to do with anything? Super soakers. Pirates aren't known for their brightness. Well, that's. I think the. So with this. Pirates aren't known for their brightness. I wouldn't steal anything if I were so to me, the fact that it happened once where this stuff blew up. Right. And the glitter bomb went all over proves the innovation that we have as individuals and ways we can go about it. And you would think to the thief. You know what? I think the thief is looking at this, like, hey, this box could be worth $800. Or it might be a glitter bomb. Which one am I going to deal with? Like, if it's a glitter bomb, I will move to the next house. I think they look at it like that because they're in. In all reality, there's no repercussions. Although I don't know if y' all seen. They've apparently. So the engineer that's been doing this, he had the first glitter bomb, and I don't know what version he's on. It's like version 4 or something like that, but he's actually hooking up cell phones to them now that send back the information. Right. So it's like it's recording what's going on and sends the information and then lets you. Lets him know where the. Where it's at. That's how he's getting all the videos. Pretty interesting. Smart dude. What's your favorite to a tool that you own? Not sure what that. What that's asking. 2A. 2FA. Give me a little bit more on that. What's a 2A tool. I think about three minutes left, and then I'm gonna go have some fun. Go do some. I might try and do some shopping today. We'll see. Everybody's getting a kick out of porch pirates. So let's. Let's discuss. Or let's. Let's review here Real, real quick here. Second Amendment. Oh, what's my favorite second amendment tool that I own? My brain. I'm in Texas. So when it comes to second amendment, you can figure that one out yourself. The mug wand. So we've talked about stranger things. We've talked about glitter bombs. We've answered a Couple of questions. We had some good questions. I answered a couple of questions. Tomorrow, does everybody want me to like, I. I think I might build out my. My set to actually show like be Christmassy instead of like the red and blue. Have my Christmas stuff on there. I may do that later today. Been alone, depending on how things happen. We'll see. Hey, you know what, Marcus? It's not just a first amendment tool. It's also a second amendment tool. If he. If you know how to use it. It's not just speech, man. Not just speech. Oh, now that Marcusia is here. So how about those lions yesterday? All right, guys, it's 8:30. I'm gonna bug out. I will see everybody tomorrow. Hopefully we've got some more. Hopefully got better topics to talk about when it comes to cyber security. And you know what? I think I will go through my feed and make sure that we've got some stuff in here because it does look like they kind of picked and choose which look over the weekend. It's usually like that. There's not a lot of stuff on there. I just wanted to throw that on out there. But yeah, I'll make sure we've got true cyber stories tomorrow, not just stuff. If CISO doesn't come through with. With some of the bigger ones that I foresee as being bigger, then we'll make sure that we've got some in here that we can talk about and discuss. But let's see, where's my stuff for now though, I'm gonna bug out. I'm gonna go hang out with the family, do some stuff. I've got the week off. Try to relax, recuperate, refresh. Hopefully everybody else does the same and I will see you guys tomorrow. Until then, everybody see where. Make sure I got the right outro. I'm gonna start hitting outros and it's gonna be like. That's an intro. That's it. All right, we'll do this one. All right, Everybody, that was December 22nd. Today was December 22nd, 2025. That was the daily cyber threat brief for today with some jawjacking in place. Had some fun doing it. I will see you guys tomorrow, 8:00am Eastern, 7:00pm Central Time, where time doesn't stand still. And I'll see you guys tomorrow. Everybody stay safe, stay secure. Bye.