A (60:02)
All right, lieutenant general is a three star general. There's probably, you know, a handful of those in the world as, as you know, in the army. So obviously a very high ranking position. And we're talking about spying on foreign powers. Now, I don't know why this is. They're talking about this. I feel like we've been doing this since the cold. I mean spying on foreign adversaries is like, that's what we do. That's what first world powers do. They spy on other first world powers. All right. FISA gives spy agencies broad authority to collect comms from US tech firms to hunt for national security threats living overseas, but also scoops up an unknown amount of Americans comms without a warrant. Yes. So the tricky thing with this is it can lead to spying on US citizens, which is not something that anybody likes at all. So anyways, the deal here is they're discussing whether or not to continue, is my understanding, continue spying on foreign adversaries, which I think, honestly I think it's critical for, I don't want to say the success, but for the maintenance of maintaining national security. The problem is obviously that anytime, anytime you introduce spying capabilities, it's just a technology that can be weaponized, Right? I say, I've said it a million times, right. A handgun can protect you or it can be used to commit a A felony. Right. It's all in the attitude. So spying on adversaries, it's great. Oh yeah, look, we, we found out that, you know, Nicholas Cage is. Or Nicholas Cage. We found out that, yeah, Nicholas Cage in the Lord of War, like gun smuggling or whatever it's going to be. He's going to be at this place at this time because we use spying tools to find out, oh, it looks like Russia is going to invade Ukraine. Let's, let's move things, right? Like that kind of spin on why it's okay. No one's going to argue with. Right. You can find child predators, right? Oh, this is great. But then you can use that same capability to find and discover things that are not okay. Right? Like we see this all the time with like local law enforcement. Right? Oh, my ex wife has started dating again. We'll find out what this guy's all about. Or I'm really into this woman and she's like rebuffed my advances, so I'm gonna spy on her. You know what I mean? Like, it's, it's, it's not, it's, it's, it's all in the hands of the, of the person. So to me, like you, what you need is you need oversight. Make sure the people who are using the tools are being held accountable by those who are kind of at least somewhat independent of the outcome of those tools. All right. All right, let's keep. I think that's it. Oh, 9:05. I went a little over. All right, that's going to do it for today's show. But don't go anywhere because we got Jawjacking coming up. Jaw Jack and. Oh yeah, I do want to call everybody's attention to two things. One, I released a video over the weekend. I've been releasing videos on Sunday at 4:00pm Eastern Time. 4:00pm I'd love for you to go check this out. This is a paid promotion, but I was paid to make this video. But it's, it's, it's all about this free GitHub application that is incredibly powerful. So if you want to do data masking, data redaction, tokenization, basically data level security, synthetic data generation. If you want to do any of that and you have not been able to because of budget, usually tokenization and stuff is reserved for like Equifax or Oracle or Fortune 100 companies. This company Protegrity released a, like a, an AI developer edition and I made this whole video about it. I show you how to install it. This. Hey, for all Those who dunk on me for being GRC and not technical. This video is a technical video. I show you how to spin up Docker, pull down the Protegrity AI Developer edition, and then use it on data sets. And then I explain how you can use it at work today to be a superhero at work. So go ahead, please, check that out. All right? Plus, I have really enjoyed making these videos, guys. I've really enjoyed making produced videos again. Yeah, look at this sick thumbnail. All right, guys, please go check that out. Otherwise, don't go anywhere. Cuz me and 9/10 of my hand are gonna go to Jawjacking. I'm Jerry, your chat. Till next time. Stay secure. Hold on. Ever wonder what it takes to break into cyber security? Join us every weekday for Jawjacking, where industry experts answer your burning questions about the cyber security field live, unfiltered, and totally free. Let's level up together. It's time for some jawjacking foreign. Hey, what's up, everybody? How are you? I'm Jerry Guy, your host. I don't know if we have any first timers in here. I don't know if we have any first timers in here, but if you're a first timer, welcome to the party, pal. Welcome to the party, pal. My name is Jerry Guy. I'm your host for the next 30 minutes, and basically, I'm all about good times. If that nerd, Dr. Gerald Ozier, is all about business, the Jerry guy is all about good times. I'm the party in the back. I am the mullet of the haircut. Welcome to the party. I am going to answer all your questions as best I can. Drop them in chat, put a Q in the front, and I will do everything I can to get you sorted out as quickly as possible. Marcus Cantor. Welcome to the party, pal. Zach Hill. Welcome to the party, pal. I love it. Can we welcome Marcus Cantor? Seems like a legitimate first timer. There we go. I am nervous to take off this bandage. Hey, you know what we're going to do? I think I can do this. Ladies and gentlemen, you always want to stick around for yes. You always want to stick around for Jawjacking, because you never know what you're going to get. You know what I'm going to give right now? Five gifted subs. Jerry. Guys. Throwing gifted subs. If you got a. If you got a gifted sub in here, pick it up, throw it down, rub it, spin it, shake it, whatever. Mr. The Hulk. Mr. The Hulk. First timer. Welcome to the party. Mr. Hulk. Looks like Galaxy and Six. Got one of these things. Ernet. 100, Yetzi. All right, guys, how much snow did you get? We got three fifths of one inch. My kids loved it, though. Steve Young. So thank you for asking. Let me see if I can get chat going here, bro. All right, here we go. Put your questions in chat with a queue and I will put them on screen. Dude, my thumb is starting to hurt. I will tell you, I. I was in a lot of pain last night, so I did medicate like an adult. Nathan, Allison, how would you bring up the need for pen testing in an organization that works in the OST space on the grid? Oh, Nathan, Allison, great question. There is two things that I would do. Number one. Well, three things I would do. Okay, Number one, there have been numerous stories of OT cyber attacks. Just Russia attacks. Ukraine takes out their electrical grid. Russia tried attacking Poland like two weeks ago to take out their power grid. What else? Volt Typhoon. Look up Volt Typhoon, China, next level, attacking energy companies. I don't know what, what space and OT you're on, but basically you've got numerous examples of cyber attacks and the impact. So what I would do is I would, I would, you know, get a collection of those things together. Okay? Number two, You can just educate on the value of a pen test. Like, so the two things I'm talking about right now is where you're going to put together a proposal and justify it. Hey, here is the value of a pen test. Here is the risk of getting compromised and not having access to these things. Also kind of a low key, sleepy power move that I would do, okay? And you have to choose your own adventure. But this is what I would do. I would start seeding this with your, with your management, okay? So don't just come out and be like, we need a pen test. What I would do is I personally, I like doing, I like doing weekly quick hit cyber awareness training, right? So, like, one interesting thing, like, here's what MFA is, here's what a password vault is. Hey, like, here's whatever, right? So what I would start doing is sending like my one message. I would make it around OT compromises and I would just say, hey, you know, like, hey, everybody. Like, you know, Russia attacked Poland's OT recently, and Poland was able to defend it. But this just reminds us that we need to be vigilant, See something, say something, right? Like just kind of like make it more common as far as, like, awareness goes, right? Because if by doing that, when you go talk to management and ask him for some Money for a pen test. They, like, you're not dumping a whole bunch of, like, case study on them. They're already been seated. They already think it's a problem. They already know this is an issue. Right. That's just kind of a. That's a long play. Space tacos. Hey, Jerry, what were you going to share with us in Jawjack? I was super intrigued to hear. Only I can't remember what it was about. Me too. Space Tacos. I forget. Damn it. Sorry. Space Tacos. If anyone remembers what I was teasing at the beginning of the show, and I said, let's do it at Jawjacking, please remind me. Code Brew is usually pretty good about remembering those things. No, you don't get to see the flesh wound. It's pretty gross, dude. Oh, what's Wednesday gonna be? I think this was what it was. Space Tacos. So here's what I was thinking for Wednesday. So it. I'm slowly moving away from copyrighted music. All right, so Daft Punk around the World is obviously copyrighted. And Simple Minds, don't you forget about Me, which we played at the mid roll today. I. I've got a soft spot for that song, so sometimes I slip and play it. But here's what I was thinking for Wednesday. You tell me. This is probably going to get me in trouble as well. Okay, hold on. I'm. I'm pulling something up. All right, you tell me all. So what I was thinking was Wednesdays would be like. Wednesdays would be like, I love the 80s, 1983. Basically, I will pick something, you know, per episode and bring it up. Like, you know, I like. I guess. What. What would be like, I love the 80s, 1983, right? And then. Hold on one second. And then it would be like, I don't like Garbage Pail Kids. Right? I'm trying to type with one hand, like Garbage Pail Kids. I'd be like, I love the 80s Garbage Pail Kids. This. I remember these things, dude. I would, like, go to the flea market and buy these. My older brother had them first. They're awesome. And this is basically like a counterculture to Cabbage Patch Kids, which was another thing. They were gross. Little boys loved the crap out of how gross they were. And I collected these things and they were stickers. So I'd stick them on things. This was Garbage Pail Kids. The year was 1983. So I'm thinking about, you know, Wednesday turning into, like, I love the 80s Wednesday. So what do you got? I mean, you guys let me know. We could beta Test it for a minute and then we can all vibe whether or not we had it. You youngs can either call us Unk, or you can say, oh, yeah, like that's. That made a comeback. That's a thing now, since it seems like the Gen Z kids like appropriating our things from the 80s and 90s. So let me know what you guys think. Jerry took a gummy. I did not take a gummy. I did not. I, I, I, I, I don't, I don't do gummies. Cryptogr says thoughts on companies asking for 3k to be an online school for 5 Azure certs. Come on. Come up as an AD and attended a webinar where a company was guaranteeing interviews. I mean, for what it's worth, I mean, those Azure cert exams are a couple hundred bucks a piece of if you get five, that's a thousand. So maybe you're paying them two grand for training. All the training for Azure is free. Microsoft does it for free. As far as guaranteeing interviews, honestly, that to me is a red flag. People ask me all the time, like, oh, is your GRC Analyst masterclass getting a job? And I'll tell you, people have gotten a job from my GRC Analyst masterclass. Many people have gotten jobs from it. But I will never promise you a job because I just can't. You could be, you could be a total, like, like nobody here is, but, like, you could be a total jerk, right? You could be a wicked jerk, and you could have the greatest resume. But, like, what am I supposed to do? Like, I can't guarantee you a job because you're, you're, you're difficult to be around, right? So I can't, I don't know, man. Guaranteeing interviews? That seems a little sus with anything. Any, any of these boot camps or trainings or guarantees. All I would say is find someone independently who has taken this and ask them what their experience is. Like, do not, do not ask the company to give you a testimonial. I run a comp. I run a simply Cyber academy. I get testimonials all the time. If someone said this, this education sucked, like, I'm not gonna put it on the front of my website and be like, look, see what one student said? We're terrible right now. I like to think that we're pretty good anyways. But my point is, you have to get an independent testimonial. Pocket Pixie. How do I set up an individual pen testing on a small machine? Simple. Get. Yeah, well, it Depends on what you want to do. But you can get. I mean it depends on what you're trying to test it for. Like are you saying you're trying to pen test a small machine or you're trying to turn a small machine into a pen testing rig? Because if you're going to just pen test one computer, I mean you could just run a vulnerability scanner on, look at it, right. For misconfigurations, that's what I would do. If you're talking about turning a machine into a pen testing machine, you can do that. I mean you could buy like a beefy raspberry PI and use that. You could just buy. They sell like go to Hak5. They sell implants that you can just plug in. It's pre built and everything with a web admin console and all that. Alpha Sierra says for the question earlier about how do I convince my OT bosses to get a pen test? Yeah. The cost of punishment is 15 years of pen test. Okay, looking through chat right now, if you have a question, put it in chat with a Q and I will answer it. Please tell us more about the flesh wound. Random skills. Yeah. So basically I cut my thumb yesterday and I was holding a piece of chicken and I was using a blade to cut it into strips and I just went right over my thumb. I basically took out. I didn't cut the nail but like, basically, you know, I don't know how else to explain it. When it's. When it stops bleeding, I can show you. I mean it's probably stop bleeding right now, but it's pretty nasty going in there. And there's no, there was no stitches. You couldn't put a stitch on it because I literally like cut the part of my thumb off. But it was like, you know, I don't know, it's about the size of like a good palm callus. All right. Sisa can do a pen test for free. There you go. See? All right. Pocket Pixie says I could just make my own music. Ah, I don't know. Is VH1 gone? Someone will have to let me know. Dude, that series was awesome. Zima? No, no, zima was like 95. I remember sneaking some Zimas, you know, to my friends. My friends would drink underage. Not me. I was a hall monitor. No, I wasn't. Jerry guy wasn't a hall monitor. Dr. Gerald was nerd. If I send you my research paper I wrote on cyber attacks and their history, would you read it? I mean, you can send it. I can't guarantee it. Just because you could send it Soul Shine. I will definitely take a look at it. I mean, if it, like, I just have to work it into my schedule. I will tell you something kind of funny. Someone took my dissertation and put it into Google Notebook LLM and made a podcast out of it. It's kind of funny the. The podcast host starting. Starting with the podcast, they talk about how they're like, you know, you would think information security and healthcare is an incredibly dry topic. Talking about my research. All right, continuing to look through chat. Stays. Tacos. Nailed it. 80s and 90s had the best music and best tech. Okay, all right, let's go. A lot of people loving the. The new Wednesday idea. Glad people are down with that. All right, let's see. I'm looking through chat right now. Zach Morrison. It's good to see you, Zach. It's been a minute at defcon. Since it's a hacker con, have you ever seen GRC people there? Oh, yeah, yeah. Tons of GRC people at defcon. I mean, it. We don't get our own room. You know, GRC isn't kicking it, but yeah, I mean, a lot of like, I mean, CISOs are GRC and it's not uncommon for, you know, information security leaders to go to defcon. I mean, one of the best ways to be effective at your job is to be up on what is current, and, you know, that's what's up. Chicken was really good. A Japanese crime lord. No, I did watch it. I did get sucked into a YouTube hole. I felt like Justin Gold sent it to me on, like, the eight levels of Yakuza membership, by the way. Hey, really quickly, just a public service announcement for everyone. If Justin Gold dms you a YouTube link or a Reddit link, caution, caution clicking on it. You will lose 45 minutes of your life. That guy's got a pension for rabbit hole Herring. Thoughts on skills someone should study with the eventual immersion of AI within cyber. Yes, John, great question. I mean, for me, I mean, obviously you want to continue to study the fundamental. Right, you should understand I T and stuff like that, but you should understand, like, AI fundamentals. And Phil Stafford's in chat right now. He could definitely talk about this too. But, like, AI is getting immersed and integrated all over the place, right? So understanding what an LLM is. Understanding how AI uses probabilistic reasoning to decide what's going on. I actually heard a really interesting. Talk the other day this past weekend, and it was talking about how AI is trained on everything, right? And it chooses the most Probable thing, which is what, why AI is average. Like AI is fast, right? It does things quickly and it does it kind of well. But like as far as like software developer goes, it's a, it's a mediocre software developer because it's probabilistically hitting the middle of the bell curve. Right? Very interesting. So I mean I, I would do that. I would also John, I would learn some of these like N8N kind of AI automation tools and integrations. And also again the timing of this is unbelievable. But another thing I would talk about really quickly is. This video right here. I literally released this video yesterday. This is, this video is like smoking hot. Still on basically using this GitHub repo for data level security. And you can see here, right, like look, that's, that's redaction right there. What else we got up here? Okay, so this is tokenization and why am I bringing this up again? You can watch this video right now. I would actually love it if you watched it because one, it'll help me and two, it'll help you. So it's a win for everybody. But John, data level security is vital. We just saw the deputy director at CISA put a bunch of sensitive data into chat GPT. Boo boo, boo to you sir. If you had done tokenization you could get all the benefit of sticking something in AI and the reasoning and the findings and the insights while not exposing your sensitive data to compromise. The second you put your sensitive data into an AI tool, you might as well put it on your front lawn and waited for someone to come by and throw it in the back of their pickup truck. So as far as like using AI and, and cyber and skills and stuff like that, I, I would say learning how to introduce data level security is also pretty important. Good thing I made a video for it. Okay, hold on. All right, continuing to look through chat, what operating system will you suggest using between Linux or Windows for someone who's getting into cyber security? Depends what you want to do in cyber security. A lot of productivity apps are, are cloud based now so you can use Linux it. I mean if you want to get comfortable running around on the command line, Linux is good. I mean Windows has PowerShell now. A lot of businesses use Windows operating system is their main. So like you're not really going to go wrong one way or the other. The reality is in 2026 Linux is like very supported. Now back in, like back in the late 90s, like if you were going to run Linux, you were doing it like you were doing it to prove a point like, I don't need your gui, right? Nowadays Linux is super well supported. There's tons of drivers, software is being made for it all over the place. So I don't know, like it's. You can even use Windows and then use Windows subsystem Linux and have a Linux distro on your machine. I don't know if Justin Gold's making fun of me because I said Windows has PowerShell. Now. I. I know they've had PowerShell for a minute. What I'm saying is you can learn scripting and stuff on. On Windows, okay? Plus, by the way, when I, when I was young, PowerShell wasn't on Windows, okay, I was running Windows 95. Okay, Jerry, the donut you ate earlier, was it a Boston cream? No. Dennis Keefe. I hate filled donuts. Boston cream. Might as well be Boston sour cream. Get out of here with that. I. It was a brioche glazed donut. I swear to God, if I, if I went to a. If I was starving. This is going to sound ridiculous, but it's true. If I was starving and then I like walked into a breakfast spread and all they had was like, filled donuts, I guess I would die of starvation. I'm not eating any of these donuts with any of the fillings in it. The last thing I want to do is bite into something, have it splooge on my face. Get out of here. No hard pass. I'll just take an extra coffee. Did the podcast. Thank the midnight too. Lol. Jenny. All right, just so everybody knows, I'm getting dunked on for saying PowerShell's been around for a minute. Whatever. All right, continuing to look through chat here. Oh, cool. John's getting the master class question from. Oh, closing this window. See ya. All right, thanks. Mods are dropping things in chat. Nalana4909, can you share a pro tip to convince a business leader to put compensating controls at the least when there is a heavy pushback because of convenience. Convenience? Yeah. I mean, all you can really do is. What I would do is be like, all right, you know, like, kind of like let them. It's like having, you know, having them have it but then own the problem. So what I would say to them is like, hey, listen, we really. Well, two things. One, if the control that you're trying to put in, they don't want like, MFA or whatever, I would just make kind of a big production around documenting that accepted risk. Like, all right, like, you can't just Be like, okay, I guess we won't do mfa, like, hey, all right, we're gonna capture this in a risk register because the likelihood of us having a data compromise, a data breach of cyber attack is, is significantly higher by not having this control in place. So I'm going to go ahead and document this in a memoir, point out that we're accepting the risk because you've made the decision to accept that risk. And I'm going to go ahead and send that just for our, our records. We, we absolutely don't need this control in place. We, we should. But I understand, business leader, what you're saying here. So we're just going to document it. That way. If there's ever an issue or whatever, when the lawyers get involved, we'll have this documented that we, we were aware of it. We weren't being negligent. It's just that we had made the decision. Or better yet, you had made the decision to accept that risk. So it's no problem, right? Some variation of that. Basically make that person own the risk. A lot of people will push back because who cares? Whatever. Diffusion of responsibility. No, no, no, no, no. You have decided that that's what's happening here. You're telling me no, we're not doing this. So you're wearing the big boy pants. Go ahead, big boy. Sign this memo. All right, guys, it's 9:33. I gotta keep this to 30 minutes. Gotta go change my bandage. All right, guys, I do want to say thank you all so very much. Great questions. If we did not get to your question, please come back tomorrow at 9:00am Eastern Time and we can make it another go of it. But I, I do have to keep this to 30 minutes for today. I'm Jerry from Simply Cyber. Oh, hold on one second. I think I got one more announcement. But wait, one more thing. Just give me a second. I think I have a, like kind of a low key big announcement. Today's February 2nd. Yeah, yeah. So check this out. Just a little fun, little fun thing. Also today at noon. Oh my God. Hold on. My thumb is like starting to low key throb here. At noon. Today. At noon. Today, first episode of the Security Return. This is a brand new podcast on a brand new YouTube channel. And guess who's. Guess who it stars? I'll give you one hint. His name is Tyler Ramsby. And me. So this is Cairo Sex official, you know, YouTube slash podcast. It's a project Tyler and I did alongside Kathy Chambers. There you can see. There's that beautiful man and there's me. So if you're interested in that, go check it out. It's called the Security Return. And basically, if you're wondering what the hell the Security Return does for you, it is. This podcast series is deliberately designed for one thing and one thing only. To give you all the tools you need to be able to convince your management that getting pen tests is a good idea. Breaks it all down super easy. First video drops today at noon. So if you're interested, go check that out. All right, so we got a video from yesterday, a video, a new thing today. All the things. I'm Jerry from Simply Cyber. I do want to say thank you all so very much for being here. I appreciate all the kindness and well wishes for my thumb injury. Be well, everybody. Share with a friend. And until next time, stay secure. Thank you. Mods. All the mods. Just lovely, lovely group of people helping out. Rhonda. I'll connect with you, get you your prize. Till next time.