Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:12)
Welcome to threatvector, the Palo Alto Networks podcast, where we discuss pressing cybersecurity threats and resilience and uncover insights into the latest industry trends. I'm your host, David Moulton, senior director of thought leadership for unit 42.
A (0:25)
One is have intelligence drive your operations. Really understand what's going out there, who the adversary is. You know that's out there. Again from that, use that to drive your operations on where you're focusing on in. In your SoC, whether that be TVM or your SIM and soar work or whatever. And then finally, game plan. Put all that into play through tabletop exercises. Get that muscle memory, you know, so that when, when you do get attack, you will. You're not going through the fog of war in those first 24 hours. You, you know, you have that muscle memory. You know how to react, you know how you're going to respond to that, and you'll be much more effective.
B (1:29)
Today I'm speaking with Keith Milarsky, Chief Global ambassad for Q Intel. Keith spent over 20 years as a special agent with the FBI, where he led groundbreaking cybercrime investigations, including operations that dismantled the Game Over Zeus botnet and the infamous Dark Market forum. Now, at Q Intel, he helps organizations translate intelligence into proactive defense. And today we're going to be talking about how the SoC can evolve by learning from the underground and why thinking like the adversary is more important than ever. Keith, welcome to Threat Vector. I'm really excited to have you here today and hopefully on our third try, now that the tech is working and the record button is there, we're going to make an incredible podcast.
A (2:18)
David, I am excited to be here, and I think it's going to be a lot of fun.
B (2:22)
So talk to me a little bit about your journey from the underground cybercrime investigations to now global security evangelism.
A (2:29)
Yeah, so I had a very unique start. You know, I started at the FBI in 1998. I started out working Russian counterintelligence back then in counterintelligence. And I got to work some really cool cases, like the Robert Hanson investigation, bugging at the State Department. And then I worked 9, 11 as well at the Pentagon. And like around 2004, my wife, we were living in Washington, D.C. at the time. And I don't know if you've ever lived there, but the traffic is horrible, horrible. And my wife jokingly said, I'm giving you five years to get us out of D.C. or we're getting divorced, jokingly. So I started looking for jobs, and a position came open in this new, small little unit, a cyber unit in Pittsburgh at a place called the National Cyber Forensic and Training alliance, or the ncfta. And this was a cyber unit to work with private industry. So I had some technical background that I had learned at the FBI, and I applied and got it, and it was just me and another agent. So I started working with industry and started looking at the dark markets and, you know, the cyber underground. So I work with the industry, and we crafted a legend for me to work undercover. And I worked undercover for a couple of years, and I'm sure we'll talk about that a little bit more in depth as we. Yeah. In our conversation. But then my cover got blown after a couple years, so my undercover days were numbered and done. And so then I went over to the Pittsburgh field office and led the most amazing cyber group I've ever seen in my entire life over there. I was very fortunate to have just some thoroughbreds and some rock stars there, and we were able to work some great cases. And I had a great U.S. attorney's office with Dave Hickon there. And we brought the very first nation state indictment against Chinese Nation state actors, Apt 1, which we could talk about that as well as we go forward, I'm sure some stories. And then we brought some big botnet cases down, like Game Over Zeus and things like that. And then in 2018, I got my 20 years in at the FBI, so it was eligible for retirement. So it was time to move on to greener postures in private industry. So I was fortunate to get a position at Ernst and Young. In the last couple years, I led their Cyber Threat Management Group. So it was interesting now to be able to then see the different perspective of what Fortune 100 companies were interested in and how they viewed cyber compared to what we looked at cyber and the FBI. So a nice bridge between the two.
