A (61:25)
Yeah, 100%. I really quick update on the Starbucks story. James and Quiggin reporting that the Starbucks portal did have MFA and the threat actors were able to steal that session token. Two things there. One, congratulations Starbucks, you're doing it correctly. Number two, you know, public service announcement reminder to everybody that MFA is not bulletproof. It doesn't stop everything. And that is today is the more, you know, squad members you can go ahead and drop that emote. All right, listen, we're a couple minutes over. I do want to get the jawjacking, but this is, this is a real story, guys. This is actually compounding several things all at once. Salt Typhoon is an incredibly sophisticated, incredibly effective Chinese based, nation state sponsored threat actor. This Isn't xenophobia. This is just reality. This is what's up. They are hyper effective and they have compromised telecommunications businesses of like major telecoms in the United States and other kind of western philosophy countries. Now what does that mean, Jerry? Like my cell phone still works? My Internet works? Yeah, yeah, yeah, that's fine. Okay, two things. One, if all the traffic, all the communication is passing through these telecommunications provider, it's kind of like having your finger on the nerve center for all communications, right? So you could have integrity concerns, you could have confidentiality concerns, number one. Number two, guess what? And by the way, I'm not suggesting this is going to happen. I'm just hypothetically throwing this out there. Okay? If you wanted to cause mass chaos, if you wanted to partner as part of some type of coordinated attack or effort, one of the first things that would be really, really powerful is, is to knock out all communications of the target. Go look at when Russia invaded Ukraine. There's a reason that Elon had to fly Starlink over Ukraine to give him Internet service because Russia took out the Internet to begin the assault on Ukraine way back in 2022. So if salt typhoon is all up in the business and they have one major lever they can pull down to shut it down like John Taffer and Bar Rescue, wouldn't that be nice? Again, I'm not saying that that's what they're doing. I'm just saying think about it. Now the problem is every single day we do the show, there's like data breach, data breach, data breach, Starbucks data breach, bank of Canada data breach, Telus communication data. So everybody just kind of equates the same level of impact, regardless of organization, regardless of threat actor, regardless of everything. People are becoming numb to it. And it's 100 true. It's a day that ends in. Yeah. The problem is, and it doesn't help that the United States is like doing all this crazy stuff right now from a federal perspective with Iran and Venezuela and Ecuador and all these freaking things. But, but, but there's so much going on, it's like, it's like straight up total chaos. So something like this, where these moves are happening, they get lost in the noise, right? That like, it's like the, it's like the churn of the propellers behind the boat, it's just all mixed up. And it's very difficult to grab that one thread that's like a higher priority and pull it out and make sure policymakers, legal, people, representatives, officials are able to see that one very important thread. And Call attention to it. Because we're humans, man. We can only focus on so many things at once. And unfortunately, right now, the current climate of everything, there's a lot to go on. All right, all right. Check it out now. All right. Wow, what an hour. That was a fast hour. All right, I want to say quick shout out to all you. Thank you so much for taking checking the show out. We're a few minutes over. Somebody call Nick Barker and apologize. I want to say shout out to the first timers. Nick. Nick Dixon, who signed up as a squad member. Love it. And Adidi. And we had another first timer and I'm sorry, I forgot who it was. If you were here for the first time, this was pretty much a standard episode. So if you like what you saw, number one, come back tomorrow, 8:00am Eastern Time, every weekday morning. And number two, bring a friend. We love doing this. We love helping people. It's all about good times up here in the Simply Cyber community. Don't go anywhere because. Jesus, I told you I threw a caboose on the value train. We're double caboosing it. There's unheard of. This is unprecedented. Nobody's talked about the double caboose since 1971. Right during the Philadelphia incident. We're double caboosing it from 9am to 9:30. I'm gonna do a different show and I'm going to answer all your questions. So if you have any questions about career cyber industry tools, techniques, tips, people, ics, ot, Mike Holcomb, Adrian Enterprise Security Weekly. Whatever it is, I'm going to do the best I can to answer it because that's what I'm all about. Support, inclusion, empowerment. Thank you so much for coming. Don't go anywhere. I will handle the transition. I'm Jerry from Simply Cyber. Until next time, stay secure. Ever wonder what it takes to break into cyber security? Join us every weekday for Jawjacking, where industry experts answer your burning questions. Questions about the cyber security field. Live, unfiltered and totally free. Let's level up together. It's time for some Jawjacking. All right, what's cracking, everybody? I am Jerry Guy. As you can tell by the glasses, I'm cool coming into Jawjacking. Jawjacking is a 30 minute AMA show program, whatever you want to call it, where I answer questions to the best of my ability. Many of you might be coming directly from the Daily Cyber Threat Brief hosted by that nerd, Dr. Gerald Dozier. Oh, this cyber security framework. I'll fight people for cyber resiliency. Shut up, nerd. We're all about good times up in here. Drop your questions in chat with a queue, and I will answer them. Looks like we got one coming already. Hot off the griddle from Space Tacos. Hey, Jerry, when will Team SC have the chance to finally meet the Aunt Dorothea you so frequently speak of? I don't know. I don't know. Aunt Dorothea is up in Massachusetts. She doesn't travel that much. But I do love my Aunt Dorothea. I. I'm gonna send her a clip. She is just. You want to talk about a person who just gives and gives and gives of herself? She is an angel walking the earth. I love myself some Aunt Dorothea. All right. A lot of people talking nerds. I saw Cyber Risk Witch. Looks like she adopted a puppy somewhere. In chat, I saw that double caboose. Also the name of Jerry's tram stamp. Oh, my God, that's so funny. Yes, yes. So I did just as a. To close the loop on that. Lower back tattoos became very popular in mainstream society around the year 1999. Like, the summer of 99 is where that tattoo became popular. In the fall of 1998, during wrestling season or 1997, I, like, lied about my age to get a tattoo. 97. I wrestled. And you would wear singlets, right? But when you weren't actively wrestling, you would take the top of the singlet and peel it down so you would just basically be wearing shorts. And I was like, you know, all the rest, like, we were, like, kind of shredded. Now, granted, I weighed, like, 119 pounds, but I was a shredded 119. And the cool thing is your lower back tattoo would. Would rest right above where the singlet peeled down. So it was badass. So a lot of us on the team had those tattoos. And you know what? Those guys are still walking around on the earth with a lower tattoo. Could never have predicted that that tattoo would take off in the direction it did. So, yeah, James McQuiggin, you don't know that. I have two tattoos, and I actually want to get a sleeve done. I've been talking about that for too long. I should just go do it. All right, if you got questions, put them in chat. I know we have a special lot. Aditi says, what is about dd? You'll have to be more. You'll have to put more context to your question, because I don't know what what is about is asking, but I will answer your question. All right. Hey, Jerry, how about just a pretty pre recorded message from Auntia the next time you visit the fam okay, maybe I'll do that at J. Mutu. First timer in chat. Welcome to the party in 26. What does it. What does work look like for someone in grc? All right, so great question. If you guys don't know grc, governance, risk and compliance is considered an, you know, a. An area within cyber security that's blowing up. All right, so when we talk about roles in cyber security, there's blue team roles, SOC analysts, incident responders, digital forensics. A lot of people think of that. They're the operations people watching the wire. Then there's red team, pen testing. They break into stuff. Okay? Those are operations. GRC is the interface for the business. GRC stands for governance, risk and compliance. And what we do in grc, and I'm a big GRC dork, is we look at. We basically interface with the business. So the. The simplest way to put this is the business is required to comply with certain things. Hipaa, pci, whatever, right? Gdpr. You are making sure that whatever we're doing on the cyber side is work in it is compliant with whatever regulations. That's number one. Number two is governance. And this is where you're working with the business to educate them and help them understand, like, how do we work here? And a GRC person has to serve the business, not tell the business how it's going to be. So what's the tone of the business? How is what's important for cyber? And then risk is the most important part. This is where you get paid straight cash, homie. Great cash, homie. Risk is. Listen, there is. I made a reference earlier in the show about like, going for a walk in the park. Say you have dogs. J MUTU I don't know. Let's say you have dogs and you want to go for a walk in the park, right? You're gonna bring bug spray. You're gonna bring, you know, a water dish so the dogs don't get thirsty or whatever. You're gonna do things to prepare to have a good experience and be able to execute the mission of going for a walk in the park. Okay? So you can do that many ways, right? You could bring a Yeti cooler with like 6, 000 bottles of water in it. You could bring one Nalgene bottle. You could have a camel backpack, right? There's many ways to bring water. The Yeti cooler with 6,000 bottles cost $10,000, right? The camel backpack is 100 bucks. The little water bottle is five bucks, right? Well, maybe the camel backpack is all you need. The analogy model is not enough. So you allocate a little budget for the camel backpack. So basically you're only going to get so much budget. So how do you choose where to spend that money, what controls to do, which controls give you the biggest risk reduction? Okay, so that's, that's what risk is and that's why we interface with the business. Of course we do a lot of speaking, a lot of educating, interfacing with the human side of the business. So what does work look like for someone in grc? Now that I've laid this out, a typical GRC person, number one, you won't get called into incidents. So that's the best part. If you work 9 to 5, you're working 9 to 5 now you might have to go on travel for audits, go to like facilities, go to site locations. Some of you know this, I know J Mutu knows this. Like I used to have to travel for like six weeks a year to go to Antarctica, go to New Zealand, Chile and all these other things. Like you're not going to go on Monday, 9 to 5, go to Chile and then fly back. Right? Like it's. So for the most part though, it's nine to five, no big deal. Number two, work in grc, you're doing a lot of communicating. So like dude, I'm telling you right now, one of the biggest things you can do to be effective in GRC is being able to communicate effectively. And this means like speaking to executives at the executive level, talking about finances, talking in short bursts, right? Like they don't want a huge diatribe. Talking to technical people. I know grc, you don't have to be super technical. But if you're talking to an engineer, explaining what they need to do and you aren't technical, the engineer is just gonna, it's gonna sound like the teacher and Charlie Brown. Like they're not gonna listen to you. So you have to be able to speak technically and then end users, right? If you're talking about next level zero day hacks and end user is going to turn off, right? Aunt Dorotheas of the world aren't going to hear you. So you got to be able to communicate effectively. So final way to answer this, what does work look like for someone in GRC? You work 9 to 5, you're typically building a cyber program. You're going through audit cycles. So like every six months, maybe you're auditing, maybe you're interfacing with third parties who are coming in to do auditing, you're writing policy, you're enforcing the policy, you are running tabletop exercises, you're going to sites, you're sitting in the finance teams meeting for the first five minutes and educating them on a cyber attack. And also you are staying current on the top cyber news stories of the day. This is why I do the daily Cyber Threat Brief. It's not like, oh, look at me, like, literally, I would do this if I didn't have a podcast. Because it's so important to stay current @j mutu. Let me know in chat. Please reply. I'll look. Please reply and let me know if that answers your question. All right. James McQuiggin, you have a tattoo. Yes, I do. Nick Dixon, first timer. Welcome to the party. Jerry, Love the show. In your professional GRC experience, have you used FAIR or anything similar to quantify? I'm familiar with fair. Yeah. So I have not used fair. I've studied fair. FAIR is the. It's an acronym. It's one I don't know because it's like one of those ones that everybody just says fair. But let me show you this. It stands for Factor Analysis of Information Risk. It's by the FAIR Institute. I, I know people have used this. Steve Cardinal has used this. Fair is great. Fair is great. So normally thank you, Nick Dixon for the question. If you can study FAIR and implement it, it's awesome. Here's what I would tell you about FAIR and any risk assessment based framework. In my opinion, if your business has like nothing, nothing in place, right? Like you're or you're very immature from a program secure program SEC security program maturity, right. Then FAIR is like killing a mosquito with a cannon. Like you should just first get the big things. You don't need a FAIR analysis to know you should put MFA in place. You don't need a FAIR analysis to know that you should have either managed detection and response like an outsourced SoC or that you should have an in house SoC and P and people in logs going to the SoC, right? It's when you get to like the maturity level. 1 of 5, 2 of 5. Where a risk assessment methodology makes a lot of sense in FAIR is phenomenal. You do have to go get trained in it, by the way. I don't know about other quantified ones. I will say when you study like cissp, you will learn the ALE Risk Assessment Methodology. Annualized Lost expectancy. To me, to me, this ale, again, this is like a, it's probably a question on a CISSP in my opinion, okay. Talking about, you know, loss expectancy and Percentages and stuff. Okay, here's my thing. I never signed up for this. I never subscribed to this. And this might be a, like a spicy hot. Take the. The ale. Annual loss expectancy. That is a framework and a formula that doesn't map to cybersecurity. Explain to me, work with me on this one. Just as a quick example, what is the annual loss expectancy of losing email for 48 hours? You can't, you can't quantify that. You can say, oh, if like, this manufacturing line goes down and it makes $100 a day, and when it's down for five days, we lost $500. Yeah, you can do that. Tell me how much if we lose access to email. You can't. It doesn't really work that way. So to me, like, fair is good. The basic ones are not good. And if you have a comment in chat. GRC pros, we have the GRC Mafia here. By the way, if you're a squad member and you identify as GRC Mafia member, go ahead and drop that squad emote in chat. Next question. All right. I thought you're getting your sleeve done in Simply Cybercon. I know. Well, maybe we're talking about maybe having a tattoo. I said simply Cyber 2026. I think Mrs. Ozier doesn't think I'm gonna get the tattoo done, but I'm going to. It's happening. Legrat calls me Professor Tramstaff. Okay, let's see. Do you know LinkedIn wasn't streaming again? Oh, my God. No, I didn't know. Dude. LinkedIn, dude. There's been some talks at the. In the Simply Cyber office around moving to Riverside Studio Restream. You are getting close to being yeeted. All right, let's see. Scrolling chat. Put a queue in front of it. D verse is trying to move into grc. Get in here. Plenty of room. If you are trying to target grc, I would recommend. Unless you're going to try to move internally at an organization, I would recommend looking into CMMC readiness roles. Cmmc Charlie Michael. Michael Charlie. In the United States. Jerry G. CTI Resources after Wade Wells course. For someone wanting to transition from sock to cti, oh, man, that's a good one. Foreign. I'm kind of blanking on CTI resources, honestly. I mean, it's not really a resource, but like getting familiar with Miter attack framework, getting threat feeds. Like Alien Vault has like a free threat feed you can get into. Basically kind of like get like fill the tub up and get in the water. Like instead of Studying how water is wet. Like fill the tub up and get into it. Meaning subscribe to these threat intelligence feeds. Let it wash over you. Get familiar with Dan Reardon. Is taxi and sticks still being used? Like get familiar with those things and then I would even, I would start reading if you can like, like threat intelligence reports as they become available. Being able to write threat intelligence reports would be valuable. You know who's another one? It's. There's a, there's a simply cyber community member called CTI J who's all, you know, all up in this and he would be a great resource as well. So those are my thoughts on cti. Going from sock to CTI is a very real transition path, right? Like going from GRC to cti. It's possible you can matrix from any role to any role in cyber, But SOC to CTI is definitely a, a well established path. Rich464 I'm from Canada. We had two of those breaches from major companies across the board. Cyber and IT jobs have been cut back like crazy. Any top tips? Talking to leadership about the major gap. Well, anytime you're going to talk to leadership, rich, talk straight cash, homie. Straight cash, homie. You know, and here's the thing. I like to, I like to modify behavior with honey instead of vinegar. Meaning instead of being like, hey guys, like you know, we've look, we're gonna get hit because you guys aren't taking this seriously. You could be like, hey, like just want to call your attention to, you know, like this Telus community telecommunications hack. It cost them $65 million, right? Because of the, the Shiny Hunters ransom is $65 million. So I mean you have a number. You could say, hey, this company suffered a data breach, potentially $65 million. And chances are the threat actor, it didn't say it in the story. It was like a nothing story. Remember Rich? But it. Shiny Hunters is known for doing vishing. What? Okay, so this is going to be like a level 7 or hold on. This is like a level 60 Paladin World of Warcraft move. Okay, I didn't play World of Warcraft, so if that didn't make sense, here's what I would do. Okay? And again, I don't lie. So this is true what I'm about to say, but it is very much taking advantage of a lot of things. Shiny Hunters definitely hit that Canadian telecommunication company. Shiny Hunters definitely asked for $65 million. Shiny Hunters definitely has TTPS. Now the story did not say that they used vishing. It didn't say it. But what I would do is I would go look through Shiny Hunters ttps. I would find a TTP that is related to an area that you, Rich, would like to get addressed at your organization. So, like, let's say you don't have mfa, for example, right? Well, if one of Shiny Hunter's things is logging into compromise credentials, which. Which it is, then you could say, hey, listen, this. This Canadian company suffered a upwards of 65 million dollar cyber attack because they were con. Their. Their security was similar to our security. So it could have been us. And the threat, the criminal would have been successful. Now, I don't want us to lose $65 million. What I would propose is, you know, for $200,000 or $80,000 or whatever, we could implement this control that would prev. Like if the same attack happened to us, it would be unsuccessful. Right? Or maybe you want to hedge that a little bit and say if the same attack happened to us, the likelihood that we would be a victim is very low. Right? Always leave a little room there. And honestly, with mfa, chances are you already have it in place. It's not a financial expense, it's a. It's a time and human resource expense. Great question, Rich. Hopefully that answers your question. All right, continuing to scan chat. I got five more minutes of ama. Holy crap. Tom Landrin out of Buffalo passed the PMPT yesterday. Hell yeah, dude. Way to go, Tom. Love myself some Tom. He was at Simply cybercon. Tom, I hope you can come on down to simply CyberCon 2026, which, by the way, if you guys didn't know, since I'm awful at marketing. Simply CyberCon 2026 is up. You can register. We already got people registering. You can book your hotel room. We're doing it two days. It's at Folly beach this year. Much more of like a retreat type event. We got talks, workshops, panels, activities. Whoo. It's gonna be spicy. All right, let's keep cooking. All right, cool. At J. Mutu saying thanks, Jerry. That was really helpful. Love it. All right, let's continue. How to measure anything in cyber risk. Yes, I actually, I have read that book, David Hoffman, and it is good. So I. I agree with David Hoffman on that one. Legrat's maturity level. Seven of nine legs cyber program goes to 11. Drink. All right, low pro is here. Good to have you. Better late than never. Continuing to look through chat. Remember, I'll be at RSA next week in San Francisco doing the show live from a hotel or an Airbnb. Sierra Montgomery says if an attacker steals cloud creds. What controls can stop them from moving laterally across the environment? Well, there's a bunch of different ones you can do network segmentation, you know, basically preventing the endpoint they've compromised from being able to see into other areas. You can use least privilege. So maybe they're not able to use those creds to kind of like access any other resources. Those are like protection controls. Sierra. From a detection control, you can have conditional access, which is like Azure Active directory or Entra ID has conditional access, which means, yeah, the creds work. But you can't log in between 6pm and 6am right Eastern time, for example. Or you're only allowed to log in from the United States, or you're only allowed to log in from this IP address. I mean, so multi factor authentication for sure too, right? If they have cloud creds and they, they try to log in but they don't have the second factor, that would slow that down as well. Yeah, I think those are, those controls are the ones that come immediately to mind. What top of beginner friendly projects would you suggest to get into Sock analyst or blue team? A DTR first timer. Beginner friendly projects. So number one, you can stand. Okay, so, all right, so here's the number one. Okay, this is beginner friendly. I think it would cost like 50 bucks, but I love this one. I'll give you a free one and. And I'll give you a paid one. My God, bro. All right, check this out. This is Eric Capuano and Whitney Champions site or landing page or whatever. They offer a course. Where is it? All right, so hold on. This, this is tough. I haven't gone to the website in a minute here. Okay, so you want to be a sock analyst. Okay, a dt. You want to be a sock analyst, Right, Perfect. This course right here, I'm gonna drop a link to it. Okay, there's Eric and Whitney right there. This is the course you want. Okay, this one right here, I'm gonna drop a link. 50 bucks. This is easily the, the best 50 bucks you could spend. Okay, check this out. A DT. Why can't I tag you? All right, well, so you want to be a sock analyst. Check this out. Why is this good? This is good because one, you stand up a vulnerable Windows machine. Two, you stand up an EDR platform called Lima Charlie on another machine. Three, you actually run attacks. See, they work. Then you do detection engineering. You configure attack detections in a sim. Then you rerun the attacks and see them get detected. You literally do sock analyst work. Like advanced tier 2, tier 3 sock analyst work. It's phenomenal. Eric and Whitney, they run the CTF at the blue team village at defcon or they have in the past. Eric and Whitney are. You want to talk about people who exhibit the Simply Cyber core values of support, inclusion, empowerment. Eric and Whitney, all day long, they, they. They like live and breathe, all that stuff. I love it. Eric Capuana was my first guest on Simply Cyber, you know, way back in the day when he was well established. And I. I was not. I'm gonna drop a link to this guy right here. This is him on LinkedIn. Huge fan. If you want, please connect with him. This would be. I'm gonna pin this on chat. This would definitely be like, if you're interested in anything blue, red, blue team, differ, sock analyst, whatever. Eric Capuano must follow. And he's not gonna send you a bunch of crap. Okay? He's not. He's not like that. He's legit. Okay, Aditi, I hope that helps you. All right, we're at 9:31. Let me speed run the rest of these questions. Twitch is a platform. I can't do Twitch. The problem, tj, is Twitch. Like, you have to be all in in Twitch in the way that it works. Or you can't. Or you can't. And I just can't. Okay, so continuing to scrub chat here. All right. Hey, by the way, Sierra Montgomery, others, Tom, Code Brew. I see Phil Stafford. I see a lot of you answering questions and providing guidance to questions in chat. Thank you. Thank you, all of you. I try to answer all I can, but, you know, obviously it's much more valuable when more people are offering good answers. Just want to say finding your page has been insightful, informative, and very helpful. T Strong. Let's go, dude. I hope you have a great day. All right, is anyone else going to rsa? I will be there. I think you were asking the general chat. Nick Dixon, if you were brand new to grc, what NIST pubs or any other frameworks would you start with? What projects do you do show potential employers you can do the job. Great question. And because it's grc, I'm going to give it a little bit of extra Number one, Nick Dixon. I don't know if you're an industry plant or not, but when you're talking this special publications. Oh, be still my heart. I. I'm not going to get it tattooed, but I heart NIST across my knuckles. So you want to get familiar with the SP 800 series. Oh, my God. Hold on one second. For real. We're talking this. Give me one. Hold on. Oh, yes. Oh. 837. 53. 30. Oh. Oh, my God. Did it get hot in here? Is it just me, everybody? Wow. All right, so listen, Nick, Nest 837 is definitely number one. You want to get two 800. Oh, my God. Bruh. 837. Start here. Risk management framework. Then 853 would be the next one. And that's the security control catalog. Start with those two and you'll be off and running. And then just. Honestly, just spend. Like, pour yourself a nice glass of pinot noir, open this web page, put it on the tv, and just have yourself a Friday night. Oh. All right, let's continue answering the questions. I. I really got to get going, though, because I gotta go. I want to go spend some time in the house with family. Oh, a clop tattoo. All right, looks like we're all caught up, guys. This has been absolutely delightful, spending my the Monday morning with you. To all of you who answered, thank you very much. Shout out to bowtie security, our simply cyber squad member of the week or simply cyber community member of the week. Everybody will be back at 8:00am Eastern Time tomorrow morning, Tuesday, March 17th, for episode 1089. You guys are awesome. Yes. Shout out to Nadine. That is right, Sierra. Guys, keep killing it. I'm Jerry from simply cyber. Until next time, stay secure. See ya.