Transcript
A (0:01)
Welcome to to the Point Cybersecurity Podcast. Each week, join Jonathan Neffer and Rachel Lyon to explore the latest in global cybersecurity news, trending topics and cyber industry initiatives impacting businesses, governments and our way of life. Now, let's get to the Point. Hello everyone. Welcome to this week's episode of to the Point Podcast. I'm Rachel Lyon, here with my co host, Jon Neffer. Hi John.
B (0:31)
Happy New Year, Rachel.
A (0:32)
I know, right? Happy New Year. I can't believe it's here. And you know what? I have to say I'm really excited for today's conversation because we've never dug into this topic. If you can imagine, in my many, many years here, we've never really dug into hospitality. So I'm super excited for what we're going to cover today. And also a real world incident and talking through that and it feels very. I can't wait. I feel like it's a movie about to unfold. So without further ado, let's introduce our guest today. Jason Casey is Chief Executive Officer and one of the founders of Beyond Identity where he steers efforts to eliminate passwords and build a secure chain of trust. He previously served as the company's Chief Technology Officer, bringing hands on engineering leadership to scale secure identity platforms. He also balances industry leadership with policy and security scholarship as a visiting fellow at the National Security Institute, GMU Antonin Scalia Law School and a CSIS Advanced Cyber Studies fellow. Please also welcome Josh Johansson. He is the Director of IT at Brent Hospitality Group where he leads technology strategy and support for a portfolio of hotels operating across the U.S. he focuses on secure low friction systems that keep teams productive and guest service running smoothly. Thanks for joining us today, Jason and.
C (1:54)
Josh, thanks for having us.
D (1:56)
Thanks for having us.
B (1:57)
So Josh, I want to kick this right off with digging right into the meat of this. Right. So you know, I think we're here to talk a bit about a cyber attack that you uncovered. I'm hoping you can maybe start telling us by what was your initial impressions, what was detected, that you knew something was going on and, and how did it unfold.
C (2:22)
Yeah, I think in hospitality, the people that we hire to run our hotels and to take care of our guests and to sell our product. We're looking for those folks that can really build relationship and are warm, accommodating, pretty much everything that a cyber attacker would love to see in a person. You know, they want to make things as easy as possible. And when it comes to the way our we sell our hotels, oftentimes we get. We work with travel agents or travel brokers, and there's sometimes commission payments that are paid back for groups and things like that. So it's not unlikely for us to get invoices from lots of different agencies. And there's various mechanisms that we use to kind of balance that out and make those payments. However, once in a while, you know, systems fail, something slips through the cracks, and a manual invoice has to be sent out. Unfortunately, that's also a huge vector of attack for us when it comes to phishing campaigns. Folks will send out, they look just remarkably good invoice notices, and then they attach them behind a wall where you need to log in to view it. They claim it's, you know, it's in OneDrive or use your Microsoft credentials. And we had recently rolled out Beyond Identity primarily to fight this because we do phishing training, and we do all of this quarterly and annual tests and training to be PCI compliant. However, we know that our folks are just trying to get the job done and they're trying to make sure that our vendors are paid and our guests are taken care of. And so when they're faced with something like that, you know, they feel a little bit panicked because they need to get this pa. And the GM had reached out to me and they said, hey, I need to get into this invoice because I need to pay whatever travel agency it is for this invoice, but I need my password to log into it. I said, well, you don't have a password anymore. She said, well, no. I put in my email and it's popped up. I have the Microsoft login screen and it says password. I'm like, that's a phishing attempt. You can just delete it and ignore it. If it was valid, Beyond Identity would have kicked in and allowed you to view it, but you can just back out and just delete it. She was really sure that it was. She forwarded it over to me so I could take a look at it, and sure enough, it was a phishing email. They're very prevalent. We have lots of systems to try and stop them. But now the thing that we've noticed in the past few years is they're no longer trying to obfuscate their email address or try to spoof it. And so spoof protection doesn't work anymore. And they'll blatantly just spell out whatever email address it was. And so that lets people think, like, oh, well, made it through everything, so it must be good. But having Beyond Identity in place with that device bound passkey is really the thing that stopped that phishing attempt or that harvest credential attack. And I wish I could say that that's the only time that that happens, but the reality is we're getting more and more of those calls. When the first time it happened, I'm like, wow, I really made the right decision by engaging beyond identity. This was really cool that it stopped it, but now I'm like, wow, it continues to bring value because I get this call probably quarterly about somebody who needs to get into something and it's asking for a password and they haven't equated that connection yet.
