Transcript
A (0:00)
Foreign.
B (0:03)
Ellis for the Risky Business podcast. Today we're talking with Mark Orlando, who is the field CTO for Push Security. For those who don't know, Push is basically like EDR for your browser. They sit in the browser and they look for all kinds of badness. They've got the ability to block and report and do you know, all of the incredible kind of visibility of the badness that's going on within the browser, which, you know, is shaping up to be one of the modern battlegrounds for, for cyber defenders. So fantastic product and it's really great to talk to you today, Mark, I think kicking off like we've had a couple of conversations in the past with some of your peers, but I think it's the first time chatting with you, so welcome.
A (0:43)
Thank you. Thrilled to be here. Thanks for having me.
B (0:45)
Absolutely. Tell us a bit about yourself. What are you doing with Push?
A (0:48)
Yeah, so as the field cto, it's mainly my job to make sure that customers get value out of Push, principally as a detection and response tool. So my background is in detection, response and security operations. So it's my job to make sure that the product is meeting the needs of our customers for all of those use cases and that they're getting a lot of value out of it.
B (1:13)
Yeah. And I guess as part of that, you know, the role of a field CTO is seeing what's happening on the coal face and passing that back to the business, but also, you know, educating, I guess, the market around the actual problems that Push is here to solve and the actual problems that they might be dealing with. We're talking a little bit before the show about some of the kind of more outdated, I guess, ways of thinking about how attack and defense works in this sort of day and age and where the browser fits into that. Do you want to double click into some of that?
A (1:44)
Absolutely. So, you know, one of the reasons that I joined Push is that as a longtime defender, you know, somebody who's, who's worked in and around security operations for a long time, I've come to feel like browser is not only kind of a big blind spot for security teams, but also increasingly a contested area, as we're seeing in a lot of these really high profile breaches where you've got in browser threats like credential phishing and account takeover and click fix style attacks. These things are prolific, very successful. And so, yeah, I think that one of the issues that I see and how I spend a lot of my time is that a lot of defenders are not really up to speed on, you know, what in browser threats mean for detection and response and how maybe some of the mental models that they use to build out operating procedures and playbooks and in fact, some of their tool set, they're starting to show their age a little bit and they don't quite cover some of these newer kinds of threats and how some of these attacks work. So I think we've got a little bit of work to do around, as you said, some education, maybe updating some of those mental models and kind of the way we approach detection and response.
