A (65:14)
All right, everybody, really quick. This is a follow up from earlier in the week. Shiny Hunters, remember, they are the youngs who do vishing mostly to get access. They log into your environment, they don't break in. Cargurus did not pay the ransom and they went ahead and dumped the information online. That's it. Okay, Car gurus will very likely send you a. Let's see what got leaked. Email, IP name, physical address, some finance information, etc. All right, you can go ahead and download this if you want. I'm not saying you should or shouldn't, but it's there. And expect to get a letter in the mail from car gurus or the law firm representing the car gurus with your one year of identity theft Protection again, guys, when, when, when a story like this happens, we, me and you, tech grunt, we are the victims. Okay? Car gurus, like car gurus is only impacted if we stop using them as customers. I don't know. Is this going to make you stop using car gurus? I don't know. Probably not. Right? So car gurus takes this L and keeps on trucking. And we are the victims. All right. Yay. All right, that's going to do it for today's daily Cyber threat Brief. I know I'm a few minutes over if you stuck with me past the 9am drop dead date. Thank you very much again, genuinely appreciate all of you. Thank you for being here today. Thanks for making this community rich, robust, engaging, safe and supportive. I definitely enjoyed it. Thank you all so very much. Don't go anywhere because we're going to do jawjack. Any 30 minute AMA where I will try to mentor at scale, answer any and all questions that you have. I'm Jerry from Simply Cyber. See you tomorrow at 8am Eastern Time. Ever wonder what it takes to break into cyber security? Join us every weekday for Jawjacking, where industry experts answer your burning questions about the cyber security field live, unfiltered and totally free. Let's level up together. It's time for some Jawjacking. What's cracking everybody? Welcome to Jawjack and I'm your host, Jerry Guy. All about good times and got two thumbs, almost two complete thumbs at this point. All the kind words for everybody in chat saying that they enjoyed the daily cyber threat brief with that nerd, Dr. Gerald Ozier. It's an absolute pleasure. I gotta tell you guys, I am so grateful, appreciative and definitely recognize how fortunate I am that I get to do this every single day and be here and, and engage with you. It's just, what a blessing. I'm not a religious person, but I can recognize a blessing. And my man. This is unbelievable. So if you got questions in chat, drop them with a Q in the front. I will answer any and all that I possibly can up until 9:30. I've got a ton of work to do. We're going to Zero Trust World next week. I know James McQuiggin who's in chat's going to be there. Kathy Chambers. Kimberly can fix it. I'm just gonna throw it out there. I will be bringing a Commander deck to Zero Trust World. In case there's anyone there that wants to play magic, I will be bringing a vampire deck. So for the, for the magic contingent in chat, I won't be bringing my oppressive Azorius deck. I get crap on. I get crap from people because I build a deck that works. All right, so I'll be bringing a vampire deck. Come at me, brah. All right, let's get our questions rolling. I want to say good morning to Mercedes Cabrera. Good morning. Good morning to you, Mercedes. All right, let's look at the chat. Hey, Rhonda Rummerfield's here. Good to see you, rhonda. All right, BW5542 is in the chat. Shadow Brokers. Thanks, Kyle. Kyle on that Eternal Blue story. Tech Grunt making Monty Python jokes. S. Cole07 Good to see you. Doom Kraken always appreciate you. Jesse Johnson, the cosmic cowboy getting up early for the show. James the Quiggin likes Jerry guy. Very cool. Continuing to look through chat. Here we go. There are many AI models out, says the rarest heart. In your opinion, which AI model protects data best? If so, which one do you personally use? Okay, so really quick, as far as protecting your data goes, the only way, I mean, it's not necessarily a model, it's local LLM versus cloud based LLM. So if you're using Claude code or Claude, right. Opus 4, 6, sonnet, it doesn't matter. If you're putting things into Claude and hitting enter, you're sending that data to Anthropic's servers. Only if you roll your own local LLM can you ensure that the data never leaves. Right. If I was going to use a local LLM. Let me show you really quickly what you can do. This is going to be a quick little tutorial. I should make a short about this again. People think my shorts are AI, which kills me. But check this out. Shout out to John V. Who turned me on to this. You can go to Olama, go to the models in the top left and you can look at the different models. Now I want to call your attention to this right here. The, the 24B. You'll see 35B, 122B. These are billion, like number of parameters. Right? So the bigger the number 122 billion parameters, the more effective the model is effect essentially. But you don't need a huge model because I'm not going to be asking my AI about quantum physics or about like cardiac surgery. I'm asking it to like write me a to do list. Okay, so a smaller model is going to be easier to run locally. Personally, people like Minstrel, Ministral, Quen, and then there's a Kimmy one that is also Quite popular. There's Deep Seek. Also be mindful. This one is for like vision based language models. So you have to look at these. I'll drop a link in chat. Roll your own. I will tell you all. Also really quick, if you've been following me, I have Claude code. I have Open Claw. In fact this machine back here is Open Claw. I get, for some reason I gave it like a 75 inch monitor but. I, my, my work laptop I recently replaced. Okay, so I needed my, my laptop. I take on the road. I'm going to rsa, I'm going to Zero Trust World, I'm going to Black Hat. I needed a new computer that can handle, handle all this. Okay, so I'm in the middle of decommissioning my original laptop and I usually take two weeks. If I can go two weeks without accessing the laptop, that means I'm done with it, right? There isn't something I forgot about. I'm going to wipe it and then I'm going to install probably the Ministral LLM locally and make that the brain for Open Claw. So stay tuned. But that's, that's how you protect data. That's the only way to do it. Unless you do data sanitization before you put it into some of these cloud based models. Thanks for the question. Also you can talk to Phil Stafford and John V in chat. They are the are simply Cyber Community AI residents. SPIRAL said. And make sure you put a Q in front of it so I can see it quickly. Would Sock two and IT auditing be a good starting point for an accountant who wants to get into cyber? Would it also be good to pick up more technical skills? So Spiral, if you're an accountant, yes, IT auditing and, and specifically GRC governance risk compliance. That is where you're going to get your most, I guess, transferable skill set. Technical skills. Yeah, you definitely need to get some technical skills. Of course, the onboarding to GRC for a tech perspective is more forgiving than say pen tester or SOC analyst. Spiral, if you want an inspiring story and someone to talk to, go. Well, first of all, spiral, go to Simply Cyber's Discord server. Okay, so go to Simply Cyber IO Discord. I just put that in chat. Okay. And then look for Steve McMichael. Steven Michael is a very active simply Cyber Community member. He's a friend of mine as well. And here he is right here on the right. Steve. Steve is it was an accountant and went into cyber security. So like your story, Spiral Steve is like literally the person that has done exactly what you're wanting to do. So I would strongly encourage you to go on to Discord and then at cpa, to cyber security. I think that's his handle, Steve mcm Michael. And ask him what's up. Okay. That's going to be your number one best practice. There you go. All right, let's keep going. Jerry's going to the cons as three vampire Leat. Yep. Thank you, Shamira Gonzalez. Don't let them bully you. Hell, yeah. They're just mad. They hate it because they ain't it. And you know what? Honestly, Shimeria, I gotta tell you, I'm a Patriots fan, okay? New England Patriots, like, way to go, Pats. I know you lost in the super bowl, but we're back. I lived for 20 years of people hating me because of the Patriots. So them hating on my, you know, my magic decks, my oppressive magic decks, doesn't hurt me. If you had to break into cyber in 2026, what would your road map be, Papa Bear 8160? Well, Papa Bear, there's a slight trick to that question, because where are you starting, right? Whenever you're doing a roadmap, right, you have a destination, but everybody's got a starting point, right? So where are you starting from? Are you already working in it? Are you working in a non IT related field? Have you had a career? Or are you just getting out of college? Are you transferring from the military? So, unfortunately, Papa Bear, the starting point is difficult. You said if I had to break into cybersecurity, so I was a software engineer, and then I got into cybersecurity. If I was going to get into cybersecurity right now, what I would do, I mean, the roadmap is kind of multipronged. Number one, I'd start immediately, kind of getting wide on personal brand. Steve McMichael is a great example of this. He has a GitHub repository. He's making GRC tools, He's making content. He has gotten active in the Simply Cyber Discord server. He and I have become friends. He's not looking for a job, but, you know, I know what he can do. And if he was looking for a job, I would be mindful of that. He's delivering value into the community by, you know, answering questions and stuff like that. He's picking up skills by learning AI and. And, you know, making GRC tooling a bit easier, doing GRC engineering. So I know that's kind of a broad stroke, Papa Bear, on how to do It. But basically, here's what I would do. All right, let's get like, very granular. Number one, I would prioritize getting my security plus because unfortunately that's a thing that, you know, adds a lot of value as far as marketability goes. Number two, I would set up a personal website, jerry ozer.com or whatever, and then I would have a blog there that I try to contribute to regularly. I would have a link to my GitHub. If I'm going to be doing GitHub stuff, I would be working on some, some, you know, tooling or whatever. I would then share that on LinkedIn with some regularity, always with a focus of delivering value to the reader. If you read any of my LinkedIn content, you'll see that I'm trying to educate, I'm trying to deliver value. I'm not just, I'm not just posting for the sake of telling people stuff. Even I get, I, I get sponsored. Some of my posts on LinkedIn are sponsored, meaning I get paid to post on LinkedIn and when I work with the, the businesses that are paying me to post on LinkedIn, I tell them right up front, if you want to work with me on a LinkedIn sponsored post, that's fine. But I will be delivering value. I'm not just going to be a billboard. In fact, I actually had to turn a deal down recently because they literally just wanted me to copy and paste like their marketing stuff on my LinkedIn. I'm like, no, like I, I appreciate wanting to do business with me, but like, I'm gonna have to decline this money because this is not, this doesn't deliver any value to anyone. Like you're basically renting. I might as well put one of those, you know, those, those signs that. Or like I could stand out in front of LinkedIn and Spin1 of those arrows and point, you know, point to the business. So anyways, hopefully that answers your question. Papa Bear, do me a favor. Chat back in chat. Like message in chat. Does this answer your question or is this. Did I not answer your question? Soul Shine. Can I build a program on my flipper to block flock cameras when I drive by them? Possibly. I don't think so, no. Because the camera itself is, is. It's like a webcam, right? All the Flipper zero is going to do is you could disrupt radio signals. Maybe I don't understand how the flock cameras work, but if there is a camera looking at you, it's looking at you. Like it's not, it's not using radio waves to look at you. And once you drive by, it's going to see you, right? And then maybe you're disrupting its ability to communicate. But as soon as you drive by, it's going to pick back up where it was and broadcast your information wherever. So I don't think that Flipper zero is going to impact flock cameras. Hey, Triple D. Mary, good to see you. Mary, I always appreciate seeing your, your LinkedIn post there. You always seem like you're having such a nice time with family and friends. Shane, what do you think are the biggest differences between Cyber and the DoD versus civilian preparing to jump back into the real world? All right, so for those who don't know, I did spend quite a bit of time working for the Marine Corps and the Navy a little bit Veterans affairs, which is not necessarily DoD, but it's a lot of DoD people in there. Most of my experience with DoD is the Marine Corps. So the biggest difference, I would say, is speed. Well, it depends on how, how big an organization in the civilian world you're going to be doing. And when you say civilian, do you mean as a civilian working in the DoD Federal Government? Because that, that term civilian does mean something very specific. So I'll try to answer the question in multiple factors. When you work for the federal government versus working in the private sector, you get paid a lot more money in the private sector than the federal government. You get a lot more training dollars in the federal government than you do in private sector. You can move faster in the private sector because there's a lot less regulation and requirements. You technically can cut corners in the private sector that you can't do. The speed of everything in federal government is wicked slow. DOD is like the largest employer in the world and it moves at the speed of the largest employer in the world. So you can't get a lot done private sector, you can move a lot faster. If you have a small team, a small business tech startup or something, you can move blistering fast. Those are kind of the main differences. All right. All right. So people are commenting in chat about the different models. Brown Coyote says Quinn is good. James Quiggin likes Olama a Gemma. I'm not even familiar that one. Ellipsis says is volume management course still being worked on? I haven't. Yeah. I mean, here's the deal. Ellipsis. I know people make fun of me for having challenges at delegation. I am super busy and I wish I could work on it, but I don't know. I. I don't know how to answer this question, like, technically it is in progress. I would not say it's off the stove. It is on the back burner. Yeah, I'm sorry. Ellipsis. All I have left to do is literally, I talked to Nessus and I got the licenses. All I have to do is film the labs. That's it. It's just hard. Like, listen, I mean, not to belly ache to all y', all, but like, just to put it in perspective, like on Tuesday and Thursday I do the stream and, and then I teach. I don't even get to work. Like I can't get to work on Tuesdays and Thursdays until like 12:30 or 1. Okay. And then I, I have a hard stop. I, I had a hard stop at five, but that's blown out. The last week or two, I've been working till six, which is like, I don't like that. I hate that because it's taken away from my family. Monday, Wednesday and Friday, I don't get to work until 9:30, which is, you know, basically in a few minutes. Let me check my calendar. I might even have a meeting. Yeah, I mean, and then I just have meetings all day today. So like working on the course, it's hard. I'm sorry. I know a lot of people want this. I feel like I'm letting this community down by not getting the vulnerability management course done. I even paid someone to help me work on it. They did their job wonderfully and even that did not progress it. So the question has come up for. Oh, actually even I feel like kind of like a failure because of this. I also want to remind everybody, if you did not know, just so everybody knows really quickly. Yesterday we did the Simply Cyber Skills stream with Tim Papa, talking about working through ransomware negotiations and how to leverage emotion on the threat actor in order to like control the situation. I want to remind everybody that tomorrow we are actually running Simply Cyber Academy Workshop. Okay? So hands on ransomware negotiation. You will be working through practical exercises on doing a ransomware negotiation. If you work in IR or you work in GRC and you haven't had to deal with a ransomware negotiation, but you'd like to get some like, cycles, some time in the seat. This is a workshop for you. Okay, I'll drop a link to this in chat. I do want to tell everybody the skill streams are free, right? We do one a month. The skill streams are free, the workshops are paid and they're, they're. I mean it's 99 for like two, two or three hours. I think it's two hours, this one. So you're. It's paid, but you're getting value for your money. And it's tried. I tried to price them reasonably, but also, you know, I have to pay the trainer to come train, right? Like, they're not coming for free. So the reason I bring this up is one to promote it and tell you guys about it in case you want to attend the workshop and check it out. But also kind of like the vulnerability management course, I'm trying to do this, but if there isn't a interest in the workshops, then I'm gonna stop doing them. Because frankly, between you and me, I'm losing quite a bit of money running the workshops. Like, I pay like a 200 bucks a month for Zoom, and the workshops are generating $0 a month at this time. So from a business perspective, it doesn't make sense. So I'm trying to learn. But this vulnerability management course, I'm sorry that it's not been moved forward. This Ben Ban field. This question's come up for me recently, and I was curious how you would explain it to a new security person. How do you describe the difference between technical controls and NIST controls? What? Okay. Okay. So I guess what the first thing I would denote is like NIST controls are NIST 853. Right. So for a new person, I guess I would say the first thing you need to understand is that technical controls are a subset of NIST controls. Technical controls and NIST controls aren't two different things. NIST controls have administrative controls, technical controls, and physical controls. So NIST controls are inclusive of all controls that you could possibly implement to reduce risk for your organization and protect your data, protect your apps, hide your wife, hide your kids. Right. Technical controls are controls that you implement on systems that are typically, you know, configurations that are, you know, basically always on or always off or whatever. Right. So a technical control would be like a password. A technical control would be like a firewall preventing access. A technical control would be like, you know, not being able to access files on a server until you authenticate to it. A technical control would be like having backups that you can restore from. Okay. A NIST control is. It's. It is a collection of controls that include technical controls. I don't know how to make that any more clear. Now, if you said the difference between technical and administrative controls, those are two mutually exclusive things. Hopefully that helps Ben Banfield find the true says. I've seen a request for vulneragement analyst master class. I'm sure it's on the radar. I just can't find it. Yeah, I know. Not a question. But what's helped me is using CHAT GBD to help create gut. Gut get up projects when you can hone those skills. Thank you, Alex. Nicole says, for someone who doesn't have an A plus SERP but has a SEC plus certified, would it be good idea to get a help desk job first? Okay, so first of all, Alex, great question. What I would say is you don't need the A plus cert, but it is useful to learn the knowledge that would be required to get the A plus cert. Secondly, help desk is a great first job. It is a great first job. You want to drink from a fire hose? Help desk is great. You can cut your teeth on all sorts of real problems and challenges that end users are having. You can also, you know, obviously start getting into like identity and access management because you're going to be doing like MFA enrollments, password resets, MDM deployments, stuff like that. So you can get cyber adjacent. All right, hold on. Quick question. For AI workloads in aws, should cloud security engineers deeply understand ML model security or is it focusing on infrastructure controls sufficient? So I would say infrastructure controls is sufficient. You don't need to understand ML model security. I mean, you, you should be careful. The thing is, infrastructure controls aren't going to stop prompt injection. Right? Prompt injection is just going to happen regardless of that. So I would be mindful of that. Yeah, I mean, I think controlling access to the model and to the interface of it is. Is probably more important. Rich 464. Are people getting confused by your shorts? Are they confusing authentic with agentic? Oh, my shorts. Yeah, I don't know, man. I don't know. Like, I don't know what to tell you. Like here, like, I'll just show you guys. Oh, crap. Hey, two Cyber Chick starts in just a minute. Here, look. This black and white one right here, people think is AI. It's not like. I'm sorry, I just put a black and white filter on. I'm trying some different stuff. All right. Hey, really quickly, we got a two Cyber Chicks season premiere. It's just starting. Where is it, bruh? So we can boogie over there. I'm gonna speed run. Hey, listen, really quickly, two Cyber Chicks is premiering right now. So we can go over there. I will say this, it's premiering right now. Let me drop a link in chat. If you dropped a question in chat, what I will tell you is do not leave the chat. Okay, Pop the chat out or whatever. Hold on. My God. Open a new tab. Go to the two cyber chicks for raid. But I will, I'll spend five minutes going through, and I will text answer everyone's question because I, I, I want to. I feel bad. So let's do a little sc. Raid. So I'm gonna end the stream, but the chat will still work, so I will answer your questions. Okay, thank you all so very much. I hope you have a wonderful day. Again, I will answer the questions in chat after the stream ends. It's still an active chat. Be well, everybody, and until next time, stay secure. Have a great day.