TABLE OF CONTENTS
Press & Interviews
Ayman Elsawah is a keynote speaker, podcast host, author, and practitioner. He’s worked with some brand name companies and takes a HUMAN approach towards security.
Speaking Topics
I’ve been in the security industry for 18 years and in technology altogether for 22 years. I’ve seen a lot. I’ve worked in almost every private sector industry, including Media, Financial, Healthcare, SaaS, and more.
Below is a list of topics I’m passionate about
- 🚀 Minimum Viable Security at Startups. Going from Zero to One.
- 🏗️ Building Security Culture - Going beyond security awareness training
- 💾 Technical Topics
- Identity and Access Management - SSO, RBAC, ABAC, and more
- Zero Trust (I’ve been screaming from rooftops about this for 5 years now!)
- AWS Cloud Security
- SaaS Security and how it’s a HARD problem
- Operational and IT Security - MDMs, Endpoint security, Shadow IT, and SaaS Security
- 🪜 Anything Career
- How to get into the industry from nowhere
- Transitioning into the industry from a technical role
- Hiring Talent
- Hiring CISO’s
- Org structure, failures and successes
- 🚒 Incident Response
- 🧠 Mental Health in Infosec
- The care and feeding of security people
- Burnout, why it happens and solutions
- The intersection of Neuroscience, Empathy, and Infosec
- Here is an example: https://www.youtube.com/watch?v=cTKkAfVoCSQ
- 🔥Hot Takes on startup security and security management
- Why we’re doing it all wrong
- Checkbox security vs REAL Security
- The lack of diversity in security (in thought and/or everything else)
- The token security hire
- Curmudgeon Security and how it’s failed us over the years
Speaking TopicsThe Imperial Security Bureau w/Blake WilliamsHacker Valley: Building a vCISO BusinessCyber Ranch PodcastvCISO ChroniclesSC Media InterviewTribe Of Hackers: Blue TeamNo BS Cybersecurity Interview by James FarrowTranscript: No BS Cybersecurity Interview James Farrow & Ayman ElsawahRSA: How Do You Protect Data on Endpoints | Cybersecurity on the Street | InterviewsRSA: How do you protect your remote employees? | Cybersecurity on the Street | InterviewsInterviewsHow Internet Safety Experts Protect Their Kids Online by CyberFareedahWebinarsHow to Ace SOC 2 for SaaS Scale UpsWizer: What You Need To Know About Restoring From A BackupWizer: What is Phishing Simulation and should you phish your own employees?
The Imperial Security Bureau w/Blake Williams
This was a super fun interview with Blake Williams
Hacker Valley: Building a vCISO Business
Cyber Ranch Podcast
Had an awesome conversation with amazing Allan Alford on the Cyber Ranch Podcast!
vCISO Chronicles
Was invited by the excellent Caroline McCaffery from ClearOPS.
SC Media Interview
I was interviewed and asked what makes a good cloud SIEM. At the time, most SIEMs were not cloud ready.
Tribe Of Hackers: Blue Team
I had the honor of contributing to this excellent book and provide my input from real world experience helping startups in the SaaS space.
No BS Cybersecurity Interview by James Farrow
Transcript: No BS Cybersecurity Interview James Farrow & Ayman Elsawah
RSA: How Do You Protect Data on Endpoints | Cybersecurity on the Street | Interviews
RSA: How do you protect your remote employees? | Cybersecurity on the Street | Interviews
Interviews
How Internet Safety Experts Protect Their Kids Online by CyberFareedah
Webinars
How to Ace SOC 2 for SaaS Scale Ups
Hosted by Sprinto, I was asked to give a talk regarding my experience helping companies with their SOC 2.
Wizer: What You Need To Know About Restoring From A Backup
MC’s by Brian Haugli, I was invited to talk about the importance of restoring your backups.
Wizer: What is Phishing Simulation and should you phish your own employees?
A great discussion where I share my thoughts on conducting phishing tests or not on your employees.
Guests:
- Shayla Tretwell
- Doug Meyer
- Alexander Stein
- Chris Roberts
- Ayman Elsawah
- Gabriel Friedlander
Transcript (auto-generated)
0:04
all right we're up we're running we're good to go um 2021 hey this is actually how did you think
0:10
about this is actually the first one for 2021 or is it no second one first one i have no flip include 2021 started welcome to another weisser
0:18
webinar um this one's going to be an interesting one because we are going to have a long
0:24
conversation about to fish or not to fish um we're going to look at it from the tech standpoint the human standpoint the
0:29
psychology stand by the neural standpoint and all sorts of other things um
0:34
as always uh sponsored by our uh the folks over at weiser and gabrielle is actually joining us for
0:40
this one as well so that'll be kind of fun and for those of you that are listening in and hanging out and watching our ugly
0:46
mugs on screen um we will be keeping an eye on the questions uh we will be having conversations with everybody so
0:52
feel free to ask away and with that i'm gonna shut the heck up and i'm going to let everybody introduce
0:58
themselves ladies first please if you wouldn't mind
1:03
sure my name is shayla tretwell i'm the executive director of governance risking compliance at ucs federal
1:10
i also own a uh security awareness company not training awareness company
1:15
named sincia and um what's interesting about me is that not only do i have an infosec background very used to anything that
1:21
does with the second line of defense whether it's uh integrated risk management things of that nature training and awareness but i
1:27
also my organizational psychologist so the human element is the most important element for me
1:32
and uh that's how i'll be approaching this little talk that we're having today awesome thank you and appreciate it doug
1:39
europe sir well hello um doug meyer director of information security and data governance
1:46
at gordon reese llp we're a nationwide law firm in the united states
1:51
i manage the information security program and um in its many aspects including our
1:57
fishing awareness program and that's part of what we do
2:02
did we let a lawyer in i'm not a lawyer i don't play with tv
2:11
i am an europe sir hi i'm ayman elsewhere founder and chief vcso at cloud security
2:17
labs i help startups get their security programs leveled up and in place and so
2:25
uh happy to be here awesome thank you alexander sir you're up hi i'm alexander stein i'm
2:33
an expert in human decision making and behavior and the founder of dulles advisors so we
2:39
advise ceos boards and senior management teams in organizational issues but with
2:47
complex psychological underpinnings and i am a trained licensed and accredited
2:54
psychoanalyst so i joined shayla here on team human and i'm always emphasizing
3:00
the psychological elements of why people do or do not do what we expect them to
3:06
awesome thank you gabriel sir last but definitely not least hi i'm gabby ceo and founder of wiser
3:15
so this webinar is a result of us advisor working on rebuilding our
3:22
phishing simulation and chris we've been working hard on new templates and we had a lot of
3:27
very interesting discussions so we wanted to share some of our um
3:34
things we spoke about with everyone else because there's a lot to consider when thinking about
3:41
phishing so i'm really really excited about this webinar cool
3:48
well we might as well leap into it with both feet let's be honest i mean the first question that we chucked up on the
3:54
on the website might just be the first one that we actually go through so fishing is is this a good thing or is it
4:02
not necessarily a good thing and then we can explore the yeses and why's and here's and those and all those kinds of
4:07
things um i'm actually going to start with amen if you don't mind sir and then we'll go yeah i'm putting you
4:13
on the hot spot first because you've got the human stuff and we've got two other humans and the rest of us are basically apparently a bunch of legal folks in a bunch of geeks
4:21
yeah yeah like you know i have a lot to say on this on this topic uh so yeah you know my my approach is
4:28
uh you know if you're going to do a phishing campaign uh don't set your employees up for
4:34
failure right so we all know that you know the big justification that people say
4:39
why they should do it is oh well the attackers do it well yeah that's true the attackers do do it um and so are you preparing them if an
4:46
attacker does do a fishing campaign um you know do you do do you have them
4:52
um do they know what buttons to press to report a fish do they know where to
4:57
uh send uh you know is there a security ad or is there a phishing at email for them to notify people of a
5:03
phishing you know a campaign things like that um so if you're gonna send the phishing campaign
5:09
uh you know they need to be prepared on what to do and then of course definitely stay away from like certain
5:15
topics i've seen some failures myself firsthand uh of of people sending bonus emails
5:22
during you know end of year and people got people's feelings are hurt and and i would recommend using a lot of
5:29
empathy uh and emotional intelligence in your you know uh because sometimes i mean you gotta
5:37
put yourself in their feet right uh and i'll defer to the psychologist for for for that but you know like using a
5:43
good amount of emotional intelligence and empathy and um uh just
5:49
compassion for them uh you know at the end of the day you're trying to educate them and have them do better and you're not
5:55
trying to like get get them and bait them out there and my minute is over
6:01
jay go for it okay so um this is actually a very interesting
6:06
question and get asked all the time and i actually am a fan of fishing your employees um however i will say with the caveat if
6:13
you're going to do it you have to do it right um if we're going to use fishing as an awareness activity
6:19
that i believe very strongly that you should do it we all understand that fishing is still uh the number one way
6:24
that our adversaries are actually getting to our various networks so therefore it's something that we should be worried
6:29
about however if we use it as a red tv activity i don't agree with that don't red team
6:36
to people and then punish them afterwards um so especially when it comes into building um
6:41
punitive uh repercussions for those who do end up falling victim to phishing
6:47
simulations and things of that nature i i want organizations to really think about that it's not something that i
6:53
encourage however i have worked with organizations and i've built three programs for people who could potentially even
6:59
lose their job after clicking on a phishing simulation however i put a lot of onus back on the
7:04
security team because we have to ask ourselves the question have we done everything possible to ensure that our people know what's right
7:10
and what's wrong because i have worked with a lot of douchebags that turn around and say you know what i know it's a fishy email i'm
7:15
gonna click it anyhow um because i work on the security team that's that's not cool so you kind of do
7:21
need to be punished for that kind of stuff but at the same time when we're looking at holistic enterprise-wide fishing
7:27
programs i think it's a good thing but don't even touch it if you're not going to invest the people time or effort into
7:32
doing it the right way that seems to be a common theme and it's
7:38
something i definitely didn't want to dig into i'm actually looking through gabrielle put a post out about this last week and
7:44
uh i'm i'm hoping phil is floating around here somewhere because i want to have a conversation with him about it
7:49
i'm actually gonna i'll i'm in your camp but i will play devil's hand about a couple of times in a minute first before
7:55
we get devil's advocate stuff alexander if you don't want to go for it i want to see where your thoughts are on this too so
8:02
um the webinar is teed up by its title uh a great lead in here
8:09
to look at what prince hamlet might have to say about cyber security and fishing right
8:15
so what comes next in that famous soliloquy wave to be or not to be uh to dream for chance to dream
8:22
um there's the rub uh must give us pause so he's not just being risk averse
8:28
and he's not just indecisive i would say in this context he's talking about consequences and
8:34
specifically the unintended consequences and you know to the points that are being made if you're going to implement
8:41
any kind of tool which a test a phishing test is you have to know what is your purpose
8:47
and what are the outcomes and how can you manage what those outcomes may be
8:52
the other thing that i'll say in this brief introduction is that it's critical uh to make a
8:59
a distinction between situational awareness which is typically what cyber security teams are thinking about
9:06
and self-awareness which is really the operative um human function psychological function
9:14
uh or mechanism that's at play in terms of what people are doing and what they're
9:19
aware of or not aware of doing and the phishing test itself does almost nothing
9:25
to assess or address self-awareness and that's a missing link here in the
9:31
whole system got it i actually um gabrielle and i had
9:38
this conversation about uh about hamlet gabrielle i gabrielle asked me to edit
9:43
the original title and topic for this one so we had those you know to be or not to be one i put a post out and actually i ended up
9:49
doing a techie version of like the next half a dozen lines of the saloon as well one day i actually want to go through
9:54
that whole damn soliloquy and geek it out just for fun games but that'll be one evening when i'm trying to avoid doing work on other
10:00
things all right so we've got the question i was looking forward to that came
10:06
in from doug i'll hit you in a sec but i'm gonna hit you with this one we got the question that came in on this one bad guys aren't nice
10:14
bad folks don't care about your emotions they don't give a fine fudge bar as to
10:20
whether you are aren't going to get the bonus at the end of the year godaddy being the perfect example on that one
10:25
we'll hit that one a little bit they don't give a damn about whether the cat died the dog died
10:31
or anything else their job is simply to get you to click the down button no matter how and no
10:38
matter what they use and what mechanism they used to do it in doing so how close do we
10:46
have to get to that line to try to educate how do we how do we balance this this is a it's a
10:51
really tough one doesn't want to throw this at you it still goes back to the to to fish or not to fish but how close
10:58
to that line do we have to get um and then how much education do we do before we get to that line and can we
11:03
get to the line all those other good things go for itself yeah well first response is we have to
11:09
do a lot of education when we're rolling out or continuing a fishing program to be respectful
11:16
to our employees and i think part of what i'm hearing so far is based
11:22
on an assumption at leastly somewhat that fishing programs are 100 effective
11:28
and i have yet to see proof of that yes they do in reduce the risk but and here's my point
11:34
security is a business as a ciso that's my point of view we have to show value and it's really tough to show
11:42
value of when you're trying to quantify risk avoidance so risks avoided we can try to quantify it but it's
11:48
really tough i think the trade-off um unfortunately for having a very
11:54
effective fishing program like you're talking about chris we really you know take on the role of the bad guy in the
11:59
pursuit of making the business safer the the unfortunate result is that we
12:05
end up alienating our employees i often say this people my attorneys and
12:10
staff at my firm do not come to work to be phished they come to work to
12:15
make money for the business to settle court cases they don't cut and they also don't come to work to do two factor they
12:20
don't come to work to have to have their passwords reset on a rotation basis we do a lot to sort of chafe at the
12:28
um our perspective as security pros and i think we've got to look at that too
12:33
and that's one reason why um perspective of us generally is not great is one reason why
12:39
our tenure usually is only from 18 to 24 months in any particular organization
12:46
here's a thought on this one i'm actually gonna so let me counter on this one you i i would agree ish
12:53
10 years ago 15 years ago it really was it was everything fell on our shoulders no two
12:58
ways about it you know the security the passwords the identity access and everything else then some bugger came up with these
13:04
stupid things called telephones that have all the functionality of a small computer that can do
13:09
absolutely everything and we handed them out like candy we still hand them out like candy and we've done it without any warning
13:16
sites we've done it without any education and we've done it in the assumption that
13:21
the poor users might go i know exactly how to use this and i know how to keep myself safe online
13:29
the challenge i feel today is security is everybody's responsibility you're right your legal team come to
13:35
come to work to to get the [ __ ] done to do it but as part of that they have to be responsible and respectful of their clients data
13:41
which means they have to understand how to protect it more effectively especially in this day and age and that
13:46
means understanding to 2f and everything else it also understands it also to me means that they have to
13:52
understand they're a target let's be perfectly honest you've got people like me who are advocating
13:57
stop attacking healthcare systems stop attacking all and go attack the lawyers don't beat the crap out of the lawyers
14:02
because the lawyers have got more information the lawyers have got these treasure troves of tons of data that quite
14:08
honestly is an adversary i'd love to get my hands on um and so to me every single person
14:15
inside that organization has to understand there are targets and how do we convey that effectively and that's
14:23
part of the whole awareness as well as the bigger thing about security as well um gabrielle i'm a third of you and then
14:28
we're going to do a bit of a robbery fun thing we got a bunch of questions coming so gabrielle go for him so look you know criminals
14:34
have no mercy right like they can go far and beyond like even the examples that i will give
14:40
now you know and we just can't they will probably always have the upper hand because they have no mercy you know they
14:46
can send us extortion emails you know i don't i can't imagine doing that to employees
14:53
so we can't actually stimulate we need to do one of those we we've got
14:58
to please please let me put a sex torsion a sex torsion one together just for shits and giggles i want to see how
15:04
it is you know made by chris and you know yeah
15:09
but uh but here is the thing you know like we probably have our red lines to all of
15:16
us and what eventually happens in many cases is that we train employees to detect a
15:23
specific vendor's phishing templates and they're very good at it you know you can see that employees oh there's a
15:28
phishing simulation right now running they can spot that they know how to distinguish the simulation than the real
15:34
thing because the real thing is like more you know it's higher level than
15:40
what we can do sometimes as vendors you know chris we worked hard writing those templates and we were
15:45
ruling out we had some nasty ideas and we were playing around with them but we just couldn't yes we can we know how
15:53
to write those templates but there is a point where we say you know this is too far it was actually
15:59
very very very hard and i think we succeeded it was very hard to come up with phishing templates
16:05
that will still get people to click but are not you know won't harm people on a personal
16:11
level because that's where i think the red line is um and and we i know that you know what
16:17
my time is run up uh i have more to say but i'll say it you know we will circle back through
16:23
everybody there's some really good questions all right so let me let's take a step back let's take a step back from this for a
16:28
second we know we we know well we hope that in the most parts people do
16:35
the fishing campaigns for education but why else are we doing these damn things are we using it for metrics
16:44
are we doing it for anything are we doing it to justify our existence are we doing it to justify the bad guys are continuing to attack us are we doing it
16:50
just for the pleasure of abusing the hell out of the users why are we doing doing this
16:56
why do we continue to do this alexander i'm throwing this one at you first sir if you don't mind
17:01
uh i wish that i could speak for the reasons why they do it maybe then i would have more influence
17:07
over changing the course of things it does seem to me that by and large the the test
17:14
is to see what people don't know uh rather than to understand what they do
17:22
know and then to help them build on what they can know better to mitigate the risks and make fewer
17:29
mistakes so you know just to circle back uh to one element that we passed over a
17:36
few minutes ago when you talked about how the attackers are not interested in people's emotions
17:42
so i i think the refinement that i would add to that that connects to what we're talking about here
17:47
is that uh attackers don't care about people's emotions but they're only
17:54
focused actually on people's emotions that is the centerpiece of social
18:00
engineering is manipulation of course those emotions that is what a stressor event is
18:05
and that's why it works and so part of the trick here is for organizations to help all of
18:11
their users and their workforce understand more about how they respond emotionally rather than
18:18
continuing to disconnect emotions and cognition as if you know we all have cognitive
18:24
mastery and if you learn what you need to know and not do then that's the end of the problem it's
18:29
actually only a piece of the situation yeah that makes sense anybody want to
18:35
follow on from this i'm throwing this one open to anybody that wants to hit this one i want to
18:40
look at one why do we do this go for it the easiest why that i can think of just because i live in this world is because
18:47
people told us that we have to um well but i'm just being so serious so
18:53
from from a compliance perspective i don't care what you have to adhere to from a regulatory perspective or any
18:59
prescribed framework awareness and training is going to be included so a lot of times we do stuff
19:04
just because people say that we have to and people think it looks cool and that's the honest that got through
19:10
god i hate it but you're so [ __ ] right on this you're so right and this is what pisses me off okay to that exact point
19:16
if i teach you if i take you aside once a year and say don't click [ __ ] don't send [ __ ] here's three examples
19:23
you'll remember it for a few days until craziness happens again and then and then we're screwed and then it's
19:29
useless you've got the tick in the audit box and the compliance box congratulations you can feel good about yourself
19:34
but that's it it's worse than useless it's that false sense of security and
19:40
this is you know again that's why i love hanging out with gabrielle on the team it's the whole continual shenanigans of like okay let's
19:46
continue to educate and help people all right eamon you're going to hit on something of this one yeah i mean you know there's a there's a
19:53
couple of things so one sometimes your boss expects you to do it so you know you say you knew cso
20:01
and and your boss might uh be the ceo or cfo whoever may be and
20:07
uh they expect you to to do it like hey why haven't you done any phishing campaigns and you're going to tell them well we shouldn't be doing
20:13
so there's that's one but two i think you know there's a big lack of data a metrics
20:19
that we have in security overall in general uh we we struggle with like measuring
20:25
things and so doing a phishing campaign helps us measure something it might not be the
20:31
right thing uh it might not be the you know the thing but like we are we are there's a drought of of
20:37
data in in our just day-to-day stuff so you know uh it it's tough
20:45
it's tough so i think that's why to touch upon why we do things you know we're just grasping for things
20:51
now if we uh were a little more wiser we'd understand that the main goal is to
20:57
educate people so hopefully you've done the education before you've done the fishing campaign and heck
21:02
you know if you've done a good job maybe you'll warn them hey then in this quarter we're going to do a fishing campaign and you don't need to fish them every
21:08
quarter i think i think that's like just kind of that's wild like once a year
21:13
maybe depending on the culture again it comes back to culture i wrote a whole article about this
21:18
and one of the things was understand the culture of your organization are you a bank or are you like scrappy startup or you
21:26
know or someone in the middle so you know just understanding your culture will help a lot talk what you got on this one
21:34
sir i'd say understanding your culture is very key for any security program in any
21:41
organization um so piggyback on him his comment there and i
21:47
i do believe that you know most fishing um simulations that are running these days are fairly sophisticated that they're
21:53
generating the reporting that you can provide upwards and outwards showing that you're reducing in some measure uh the fish prone
22:01
uh amongst you and you can do that by hypodirectory groups and such and so i
22:08
mean we can show that it is effective my point is is it is the value proposition there
22:14
there's so many things that we have to do as security organizations um uh time and resources is required
22:21
to maintain an effective phishing program over time so i mean we
22:27
look at the balance of things um spending 50 percent of our time on our 20 of our time on a fishing
22:33
simulation program means that we're not spending that time with something that's also going to protect and defend
22:40
the company against adversaries i leave with this comment too is sort of like this nagging question
22:45
that's been in my mind is when somebody says do you fish your employees
22:52
it's almost like they're saying are you still kicking your dog i mean there is no good answer right i mean because if
22:57
you say there is a good answer but if you say yes then you're in a defensive position of saying well the reason why we um alienate our
23:04
employees on purpose is because good reason good reason but if you if you say no and this is what i'm
23:10
wondering about you say no can you also say the reason we don't is because we have more effective
23:15
strategies we utilize our phishing and email gateway effectively we utilize
23:21
in-context messaging to provide alerts um we recognize when
23:26
somebody is getting an email from somebody they haven't gotten before or where there's one letter off
23:32
in a in a to addre a from address i i just wonder like i don't know the
23:38
answer to this question of whether we should fish or not but i do know that the feeling i get when somebody asks me do you fish
23:44
your own employees is not a great one so i think you know what we seem to be hearing a lot and this is this
23:50
this is actually that's a really really good point uh there's a really nice message from candice on here which and
23:56
she's an advocate for the fishing and i totally get i totally understand that she's like look we've taken our vulnerable employees those that
24:04
continue to click from four to twenty percent down to four percent great love it totally awesome
24:09
but that's still four percent if i send out a thousand messages 40 people are going to click that is now
24:16
40 front doors that i can walk straight through if that is your soul
24:21
or that is your primary defense you're screwed you might as well just pack up shop now and just hand me the keys to
24:26
the front door because unless you assume that somebody is always going to click something unless
24:32
you assume that the big hairy nasty ass thing is already inside your organization and you still sit in there with that
24:38
primitive this is this whole thing and we've had these conversations before about this well i've got my perimeter i'm going to defend it no you don't
24:43
notice this freaking thing these days doesn't exist have a nice day i'm already on the inside how are you
24:50
going to know so for me it's less it's about the fishing stuff and it's much more about the education to me this is
24:57
the stuff that gabriel and al i mean we've been battling back and forth because he's right we put some nasty ass
25:03
phishing messages together and he's like can't use those you know i don't nasty [ __ ] i will tell you that
25:08
you're kid i'll do my research and i'll tell you that your kid's got problems at school and you need to download this report i'm
25:14
going to tell you your significant others in hospital before i give a damn your click ship as far as i'm concerned
25:20
and that's not the example i want you to learn i want you to ask more questions which means i want to educate you first a lot um
25:27
yeah it's just how does it add to this yeah go for it also about the goal like you said you know like the
25:33
four percent is the goal to get to zero if yes at what cost is you know ruining
25:38
the company culture so there's also an roi at the end of the day for you know for trying to achieve that
25:45
target we just have to put realistic goals for ourselves like people will if you know some people will
25:52
click doesn't matter how much we teach just like their car accidents you know like we cannot rule out car accidents in this world
25:58
like totally just can't can i just happen right there quickly
26:04
totally this is where i struggle because a lot of times
26:09
um well there's a couple of things one from a risk perspective when you're mitigating any risk you're
26:14
never going to hit zero that's the end of it you're always going to have a percentage of people that are either going to get in or click
26:20
or do something so we can't mitigate the risk away um the second thing is from a phishing
26:26
perspective we focus so much on the click rate i don't care about the click rate um i
26:33
personally care about our resiliency rate because the more education that i can
26:38
put out there that's the reason why i say you have to build the program the right way that means i have more people reporting
26:45
something suspicious that i have people reporting that they click something or not reporting at all
26:51
um therefore if my resiliency rate can be higher i have a more protected environment holistically so when i am
26:58
doing a fishing simulation the one metric that i'm looking at the most is how many people are reporting
27:03
that something is weird to make sure our stock know to go look into it so i i like that goes back to the whole metrics
27:09
conversation where am i looking at metrics i'm looking at kpis and from an executive lens
27:14
i think the executives want to understand how resilient their organization actually is so if you're going to do
27:20
that then my next question is how often do you do it i'm actually reading through some of the questions in here and you know eamon you said
27:26
once a quarter or maybe too much but i've got people in here that are saying hey we do fishing every week we're cycling through people we're
27:32
fishing every week and that's that's a ton i mean that literally is keeping everybody on their toes
27:37
so let me ask this question first question to everybody here if i said hey we're running a fishing campaign we're going to run it every single week
27:44
too much not enough give me uh anybody can say this way too much way
27:50
too much you're not keeping them on their toes but you're serially traumatizing and
27:55
and and essentially their cognitive capacity is going to plummet uh right so because if if you ignore if
28:04
you normalize uh incursions like that basically you're bullying
28:10
your workforce and they're not gonna they're not gonna think better or respond better because they're going
28:17
to acclimatize themselves to the normalization of a horror show interesting
28:24
how many people does that team have that they're doing security fishing i mean are they do they have everything
28:30
else in place mfa and uh non-admin access on all their laptops and
28:36
you know you know how big is this team
28:41
i'm asking him now and i actually would agree completely with uh dr stein over here uh every week
28:49
is too much um i would actually recommend monthly if you're going to do something like
28:54
that we do understand that i believe you have to encounter something at least 12 times before it becomes a habit so
29:00
you have to do it frequently enough that it becomes habit-forming for them to do the behavior that you want to but i'm a big proponent of
29:06
positive psychology and within the positive psychology model there's a such thing called flow and with flow in that model the the
29:13
goal is to balance anxiety and boredom if i fish someone too much
29:19
they get too used to it they become bored and they're not going to pay attention if i don't fish enough and then have
29:24
like some type of repercussion if you get caught you cause anxiety and you don't want that in your organization so you
29:29
actually want something in the middle that keeps people in that flow of being cognitively aware
29:35
at the same time it doesn't disrupt their work so it it it changes based off of the culture
29:41
of the organization back to doug's point um but once you understand the culture of the organization
29:46
um you can't define what that actually is for you do me a quick favor because i i was bashing a quick answer back how many
29:52
times because i i've got a really i've actually got a powerpoint slide that goes into like how many times we have to
29:58
nicely beat people over the head before it sinks in what was that number that you said i totally missed i believe
30:04
i believe that you look at researchers between seven to 12 times yes okay all right i just want to make sure that
30:09
what i've written down was what you say because it's yeah and that's which is to me is fascinating
30:14
for the people that like do fishing like once a year i'm like so it's gonna take seven to ten years for you people to figure this [ __ ] out
30:20
if you're lucky and if they retain you from the past seven years yeah you've sunk you've failed why bother
30:25
all right amen you're about you are all ready to talk all right but i think doug
30:31
wanted to say something well i'll just go in really quick um the
30:36
four percent that uh you mentioned chris that you just can't get you know you can go for the lady or
30:42
whoever was running a fishing program they got them 24 that four percent uh could be much more
30:48
dangerous uh could be just as equivalently dangerous as 20 to 20 percent depending on who it is in the company if it's a
30:53
managing partner or if it's a chief marketing officer so that's the
30:58
danger of the numbers that we show and i'm not to say that fishing programs aren't effective they are
31:05
um it's been proven but is the cost in terms of alienation and it worth
31:12
the effort and also one last thing
31:17
the greatest risk we face in terms of external um social engineering isn't through a
31:22
phishing email isn't through an attachment or a macro or a dubious earl it's somebody doing
31:29
their research and sending an email pretending to be somebody else or somebody they know or
31:34
somebody they work with and there's not and it can be from a legitimate email address so there's no phishing
31:41
simulation program that's going to train you on that and that what we're doing
31:47
and what we're planning on doing is making our most vulnerable and most high profile targets very cognizant of the
31:54
fact that um as a law firm we have a roster and it's out there on the internet that people are looking at you and they're
32:00
thinking of ways to manipulate your social network to get to you and it won't come through
32:06
an attachment or a on a dicey hurl so that's perfect because that leads
32:12
into this hang on set got real this is perfect because it leads into this it's back to that question we've always
32:17
done trust but verify bollocks no more of that stuff verify and then
32:23
maybe i'll think about trusting you you know we had one gabrielle you pointed this one at you when the ceo
32:29
you know sends you the message hey i need 20 gift cards get on with it do it right now god damn it i need it this very minute or else
32:36
call the ceo i'm going to hello go for it i just want to add to you know i had
32:41
this idea i don't know how to actually make it a product but i had the idea that you know we also need to check just
32:48
the processes so if something legitimate is happening let's say the ceo asks the cfo to transfer funds a legit
32:56
transaction not like a bogus one can we somehow check that the actual cfo
33:02
follow the process and call to verify with the ceo for example like can we verify that the processes that we
33:08
have are working with and that i don't know how to do that but that's something that i think you know
33:14
we need to just make sure that the processes are working so i think that's a good one so
33:21
basically my perspective let's talk about the operational part right uh you mentioned perimeter but there's
33:27
also the concept of zero trust so and and culture so all this can tie together so for example
33:34
uh first of all a lot of people are getting phished all the time anyway okay so there's enough phishing emails
33:41
coming in actual phishing emails so one are they reporting properly so in in um
33:49
do they know which button to press there's actually a button in in g suite and or workspaces and 365 where you can report
33:55
a fish and that's going to help uh the uh the the providers to prevent more of
34:01
these emails right uh do you have dkim and spf set up properly right
34:06
uh 365 has a spear phishing category you can put executives in this category
34:13
and they'll have extra protection are you doing that like do all these things first right and
34:18
and set up the infrastructure uh so that we can reduce the number of phishing attacks to begin with
34:25
um and you know i saw one organization set up a slack bot said if someone reports a fish it was
34:30
just like there's a bot that would actually walk them through a process that's awesome right
34:36
um you know you could also search if someone does report it then you can search all all these other inboxes and remove uh
34:44
these things right so do you have all these processes in place to remove nasty emails from people's inboxes but
34:51
then on the other side if your organization is like hey give
34:56
everybody admin and whatever and you are struggling to reduce your attack surface you're like
35:04
well you know i'm gonna have to do some fishing and so see you know and prove i'm just kind of being devil's
35:10
advocate here and prove uh that one fish email i can get and this is a red team party you know chris
35:17
i'm appealing to you you know and you're trying to make the case we need to have less admins we need to have less admins
35:23
on their laptop all that kind of stuff and you're getting pushback while you need to prove somehow that
35:28
you know you can do it maybe even just do a full you know do a red team say i'm going to do a red team i need to get green light for this and
35:36
prove to you you know so no i so i get this and this is where this day and age a lot of us have said
35:43
okay let's let's play dungeons and dragons for business let's sit down do some tabletop exercises right you know
35:49
again if we take candice had an amazing thing on this look i've i've taken it from 20 down to 4 if i know that alexander's
35:56
organization that's got 100 people in there i know four people are going to click so let's toss a point figure out which
36:01
four people have clicked in my tabletop exercise of d d and go okay those four people clicked
36:06
i have access i own their computers what can i get to the nice thing about that is it's not an
36:12
adversarial discussion i haven't embarrassed any one of alexander's four people
36:18
all i've done is i've i've basically gone through and said here's here's what we think is this and as long as both parties come to the
36:23
table willing to have those discussions it's that it's faster quick and simple or easier less hassle and also less
36:29
confrontational um and we still end up with the same discussion points um
36:34
okay so here's another idea okay yep here's i take a step back on this one for a second so there's been a bunch of
36:40
questions on here doug i'm gonna hit you first because i'm just gonna hit you first there's a bunch of questions on here where people have
36:46
said okay look you know we've got people that continue to click they continue to do this what the hell do we do about them i'm
36:53
just going to leave it right there what do we do about him yeah well i think you um um
37:00
cordon them off and for a second tier or third tier of remedial
37:05
training can i taser them yeah
37:12
go for a share you're wanting to say something gabriella hit you afterwards i promise i shouldn't have laughed about tasering
37:18
people i'm getting better no i i think that the thing about it
37:24
that's so interesting if you have people that keep clicking that's when your uh training awareness team really needs
37:30
to kick in whether they need additional training if they need a webinar where they're going to have to
37:36
sit there in attendance or if you can activate another control you can stop them from having access to the internet
37:41
they have to do they can't have any external internet access until they've earned their trust back
37:46
um you can do a lot of things but if you see someone who habitually clicks that's a danger to your organization and
37:53
that person is the danger and you need to make sure um they're they're taking it seriously
37:59
and uh put some controls in place to make sure they get the education they need
38:05
alexander give me some thoughts from your side as well and eamon i'm going to hit you up as well if you don't mind yeah so um have to go back to care
38:14
and emotions so you know one of the first things you need to determine for the person who's just
38:20
chronically clicking is why what are you thinking what are you not thinking about you you know you
38:26
can't just you know cuff somebody's hands behind their back and expect that they're going to stop clicking they're just going to
38:33
use another part of their body because there's something else driving that behavior and
38:38
you know one of the issues here is that just there's this enormous divergence that occurs that drives a kind of
38:46
institutional mindset that overlooks the complexity of
38:51
human decision making and i understand that you know trying to solve problems at scale means that you can't
38:57
necessarily put you know every person's mind on the couch so to speak to understand
39:02
why they do or don't do everything you have to be able to capture everyone uh as a group but still there's this
39:09
aspirationalism at play in which um sort of the zero failure
39:15
point pivots on if we do this it's like a silver bullet exercise if we get people to not do this
39:21
everything will be great but the problem with that is you're never going to do that to shea's earlier point you cannot get risk to zero and so
39:30
the system needs to accommodate the reality of who people are and how they behave
39:35
and how they think and that has to include tremendous variability it cannot be homogenous
39:42
and that means that you know whatever is happening that's causing
39:47
four people out of 100 to click you need to start by understanding what's going on for those four people
39:52
and then extrapolate that back out to 100. yeah i i would say yeah i would say
40:01
more on the y just like dr stein said um you know put your product manager hat on
40:07
and gabriel you might appreciate this you know put your you know be problem oriented not so solution oriented
40:13
find out what the problem is schedule a zoom call with that person why not like get on and and take that
40:20
extra mile like you know a lot of times security folks sit behind their email sit behind their you know we
40:27
want to avoid the ivory tower you know whatever it is like you know if you if if your
40:32
employees think the security team live in iowa tower then you have an issue you have a cultural issue and you should
40:38
you need to even not think about fishing campaigns you need to you need to step back and and and get you know talk to the people
40:43
so um you know go the extra mile be have those better bedside manners right like just
40:50
just be that better person kick up that empathy and and find out
40:55
why i mean maybe they're having a bad day i i don't know i don't know why you know and if you have to then we could talk
41:02
about controls but but you know find out more about the problem before you go to the solution i think the controls is an interesting
41:08
one hang on a second then gabrielle i'm going to hit you because i'm going to assume we've all run into
41:13
some folks in the c-suite who think they're above fishing we think they shouldn't be part of it or somebody manufacturing who's like oh i
41:20
don't even need this all i do is get my hands greasy and mess around with machinery why do i need to worry about this [ __ ]
41:25
and so that's great and i love you which is where your lack of trust and i'm going to build a couple of extra little controls around you so that when
41:31
your ass does get it handy to it it doesn't take the rest of the company down with it
41:36
yeah that's unfortunate sometimes all we can do gabrielle go for it so let's call employees people for a
41:43
second because on a personal level personal level
41:49
people get scammed some people are scammable just by nature they are
41:55
repeatable victims we see that with roman scams and we see that it depends because of this why people
42:02
are addicted to love people are addicted to gambling different things some people are not
42:07
curable unfortunately seriously like some people or or it's too much to invest
42:13
in in order to actually so you either take the thing that makes that thing happen like the
42:20
internet you put those controls or maybe they are not fit for that specific role but
42:26
we cannot like going back to this zero thing we not everyone is fixable um and we
42:32
will always have that percentage and we just see that again and again with you know um regular people scam
42:39
you know like it's it's the same thing at the end of the day it's the same emotions that people are addicted to
42:49
and i think at that point back to the doctor to share and everybody it gets to a point where it's like okay i'll do what i can to educate you i'll
42:55
do what i can to lower the risk and if i can't then i'm basically gonna if i still want to retain you there is a big if in there definitely if
43:01
i still want to retain you then i have to build a set of controls around you so that when you fail it doesn't take everything else down with
43:07
it all right who was about to talk i apologize i kind of missed who was doug was it you or did i miss somebody else yeah i'd call it yeah it was me
43:16
um so hear me now um we take a an apologetic approach to our fishing
43:22
simulation campaign internally um we're out there saying look we know this is what you didn't come to work
43:28
you can come to work to do this but here's the risk and here's the benefits and we also
43:34
end it with anybody can be phished so if you happen to click on a link
43:39
we're not going to shame you we're not going to guilt you we're going to probably reset your password um if it was a real fish click
43:47
and if not and we might advise that you go to one of our free opt-in training games to learn about
43:53
the various kinds of fishing that are out there but taking is taking pains really to be
43:59
as apologetic about it as possible to put yourself take yourself out of the ivory tower
44:04
that eamonn mentioned and to sort of develop some com you know um
44:10
amongst the employees some awareness that we aren't the ivory tower bad guys we're just trying to protect the company
44:16
um and that that message of no shame is really important um because i get it um you know in the
44:23
hallway or in a message that hey that was a setup that was a speed trap that was a gotcha
44:28
and our response is not too bad this is going to happen again our response is yeah i know
44:35
sorry anybody can be fished thanks for taking the train the extra training we appreciate it
44:41
so here's one thing and i love that but i'm going to add to that which is i honestly don't give a [ __ ] about the
44:46
company i care about you the human if i can help you learn if i can help
44:52
you protect yourself if i can help you educate yourself to look after you the kids the grandparents
44:58
the parents the friends and the relatives that bleeds through to the company so for me it's humanizing even more again
45:04
i'll i'll give gabrielle some kudos on this one because that's why i love doing the stuff that we do which is it's kind of
45:10
fun because it's all about human it's not about i'm gonna protect the company if i educate you the person you
45:15
will inherently you might step up and think more ask more questions in our digital realm you know you
45:23
figured out as a kid to look left and look right when you cross the street now i'm trying to educate you to do
45:28
exactly the same in the digital realm that's all i really want you to do you know and it's and how do we do that
45:35
more effectively that's that's really what it comes down to um and there's a bunch of questions um
45:42
oh where do we want to go with this where do we want to go with this there's so many questions what do i'm actually going to throw open to each
45:48
one of you just for the minute while i run through some more of these questions we we have a ton of questions um alexander go for it first and then we'll
45:55
so i actually just wanted to piggyback on what you were saying and underscore how important it is when you can add individual
46:03
self-awareness that does propagate out uh not just to the ecosystem in the
46:08
organization but to the individual pods and essays like going back to
46:14
teaching kids to look left and right before they cross the street it's not just about alerting them to the fact that there are dangers uh
46:22
but it's about how you stay safe it's not just about warding off bad things it's about how do you move
46:27
forward in your life in a healthy way and you know that that is something that's going to carry over
46:34
to all kinds of good decision making and good judgment not just you know don't click here and
46:40
don't click there and to this i would add in response to your question how do we go about that
46:46
the incredible value of incorporating just as a normal matter of
46:52
course multi-disciplinary teams in organizations you know one of the problems that i see time and again
46:59
i expect shea can can back me up on this is that you know these are decisions that
47:06
are being made at the enterprise level by business people and technologists
47:11
who have at best maybe a lay understanding of superficial psychology it's
47:18
enormously thick and complex there are just so many different things that you have to consider and it really
47:25
would be you know the reverse analogy would be my coming in and telling a technologist
47:30
this is what you need to do with your hardware or you know this is the policy that you need to do to develop control i would be so far
47:37
over my skis you should just push me over and this is what i encounter all the time
47:42
in organizations where there are people in positions of authority and influence making determinative
47:50
policy decisions about things that relate to what they think is going to be the consequence of the
47:56
solution and they actually have almost no idea what they're talking about and that that's a good area to
48:02
start changing things
48:10
well i think along those lines um fishing simulation programs have a perception problem
48:15
generally speaking i'm not not all but some do many do and i think the solution lies in
48:22
starting to shift focus to empower instead of shaming the employee instead of gotcha the employee to empowering the
48:29
employee and developing a healthy curiosity in the employee about phishing
48:34
security awareness give them the tools to here and there jump in and do a one to two minute sort
48:42
of uh self-education on the benefits of being highly security aware of being
48:49
highly aware of risk while online of the the the the bad actors out there
48:54
who are who are targeting us because we have an email address at our company and i think if we put the back in the
49:01
hand if we put it more back in the hands of the employee to be self-motivated um we will improve
49:07
the overall perception of these programs here's a question and this i'll ask this
49:13
to to everybody is this because fishing came out of our side of the
49:18
world it came out of the red team side of the world it came out because it was an effective tool to use to get into a company i mean
49:25
we'd be sitting there beating up against the web server and that's like that screw let's just go up against the human it's more fun
49:30
um is that because it first started out as a tool basically of abuse and it was born out
49:38
of the fact that it was used to abuse people and unfortunately that mentality is carried on no
49:43
people don't see it as a tool for education and for help they see it because they remember from 20 years ago when they did get their ass
49:50
handed because the big hairy thing decided to basically walk in through their computer i wonder if that's a big part of it as
49:55
well i mean i mean the fact is that 90 up to 90
50:00
according to some some vendors out there uh of attacks are from fishing so it's just
50:07
happening now right so you can be conservative and say 60 or 70 or 80 but that's my two cents on
50:14
that the other 10 is coming from solarwinds i think the uh the other issue um this
50:20
is what's interesting about fishing specifically uh as an attack mechanism not only did
50:25
it come out of that cyber world which is fairly new we're going to keep seeing that
50:31
it's like what 30 40 50 not 50 years old yet you know what i mean so like so it came
50:37
out of that world that world needs ownership of something um additionally this is a business
50:42
problem because companies are losing upwards to 1.5 billion dollars a year holistically over fishing attacks
50:49
so when you have those two things coupled together and then you start thinking about people nobody cares about people people
50:56
they care about money so um it kind of desensitizes um the way that we approach this thing
51:03
and um i do want to pick you back up on something that alexander said earlier um talking about the person coming first
51:11
any campaign that i run any type of infosec or cybersec campaign that i run
51:17
the first one that i do in any organization is about telling people that they matter the most and i don't even talk about the
51:23
company at all i talk about ways to protect their network at home
51:28
or um what emails to look out for when you're at home because what you'll find is that people
51:34
start having habits in their everyday life at home um when they're dealing with their family or
51:39
their children and things of that nature they're more likely to bring it back into the workplace so
51:44
if we could start attacking this issue that way by coupling appropriate awareness campaigns with it
51:51
what's interesting is that it sticks with people more and you'll probably get more people receptive to it suddenly
51:56
being not so much of a retinal activity but a true awareness activity because i just protected your child or just protected
52:03
your you know parent from not taking a billion dollars from the prince of mesopotamia or something like that
52:11
that's a great question in here i [ __ ] love it um huge call out to um hughes color to
52:17
enjoy so what do you do if you do actually have a department that handles finances for nigerian princes
52:23
and i'm just like yes all right so there's a really good one in here um we talked a little bit about
52:30
kids and crossing the streets and all this kind of stuff anastasia edwards asked the question what do we think about fishing programs
52:37
in schools for training students um where's our heads on this one do we agree on
52:42
this when do we not agree on on this one and do we think it's a good idea um i'm going to save my thoughts for the
52:47
end gabrielle i'm throwing this one at you for a second and then we'll wander around everybody else
52:52
so i want to share something that you know we do and i think it also can apply to
52:58
schools because this is something that i was actually thinking about implementing in schools so we have something called the fishing game
53:04
so unlike fishing simulation where you know we basically attack the people a fishing
53:10
game everybody has to participate they have 10 emails half of them or
53:16
a certain amount are phishing emails others are not and people need and they know this game
53:22
they know that they have to identify the the fishing ones and hardly no one gets 100 so even though
53:28
they are aware that this is you know some of them are fishing templates almost everyone fails at least you know
53:35
one or two or three or even more in this game so for me the you know i love this game
53:41
because first of all everybody participates and it's not like a phishing simulation where maybe just 15
53:46
open the email in general but implementing something like this with kids i think is much more educational
53:53
than starting to attack the kids at school that to me sounds a little bit you know
53:59
um yeah too much but if we do gamify it i think there's a lot of value
54:06
because it's still not easy even though you know some of them are you know legit and some of them are not
54:12
it's still not easy to detect them yeah i mean i remember ages ago we said
54:18
then did the gunning for grandma stuff so we're still building that that'll be totally cool um all right uh
54:25
anybody want to add on to that one on the kids one anybody want to catch up so one of the things that i like about
54:32
the idea of that so far as it's done you know thoughtfully uh and sensitively uh is that
54:40
as with you know learning to cross the street and look both ways and whatnot you're really talking about personal
54:45
safety you know with children especially in digital they've natives uh really the greater threat there is
54:51
things like you know cyber bullying or some other kind of hostility against the child's person
54:58
uh not to an institution right so so the child is going to be learning something about her or himself about
55:04
self-care which is incredibly important just as a developmental tool and process um
55:11
the other thing is to focus on education itself so one of the things that i've done
55:16
in my work with organizations doing cyber security programs and awareness training programs is to bring in ideas from
55:25
child development and education to understand you know what are the ways
55:30
what are the techniques in which teachers can engage disengaged students or children who are recalcitrant or aren't
55:37
interested in learning or seem to be obstructionist to the curriculum or something like that
55:42
and there are a lot of well-traveled pathways there they don't need to be reinvented by infosec personnel with regard to how to
55:50
help people learn or how to help people become interested in something that they might
55:55
feel opposed to right so starting to bring this into the school system is a natural part
56:00
of a curriculum we'll have an roi you know 10 years from now that will be
56:06
you know exponentially tremendous so you hit a really good point which
56:11
hang on two seconds you hit a really really good point which i think is you know this is why i love having all of you on here this isn't an infosec
56:19
problem these questions these comments these thoughts have been asked over the centuries we've had to look after
56:25
ourselves as humans all we're now doing is translating that into a digital world so it shouldn't just be an
56:31
infrastructure somebody said hey hr should own it and i'm like actually no we should collaborate with hr and legal and
56:38
compliance this isn't ours this is everybody's go for amen yeah so um you know some of the things
56:46
i've come to discover about myself like so i i've come to like educational psychology uh lately and
56:52
in in in some of the work that i do uh helping others like get into security on
56:58
in the podcast that i do um i've come to learn about neuroscience educational psychology and i've and even in the work
57:03
what i do with my clients i've come to learn that as a security practitioner you are an education
57:09
uh professional whether you like it or not your job is oftentimes to educate people
57:15
because you know i'll get pushback on like say why should i do devsecops or devops or why should i automate
57:21
things like okay so let's you know let's let's walk through that so
57:27
it's amazing what gabriel and dr stein said uh you know let's i mean i would i would say let's
57:33
take that education approach that we would take as to a kid and use it on our people
57:39
employees as well right create a safe space for them to ask that question
57:44
um you know it's care to safe space for them to ask that question uh hand hold them but really focus on
57:51
the education and um you know it you're gonna win you know at the end of the day if you
57:57
take that approach all right so we are running up against the top of the hour um i just had i
58:02
actually just answered somebody um who yeah i know we just went really quickly somebody's like we need to do
58:08
this again so i'm actually gonna extend an invite to everybody here i would love if everybody's up for it to get this
58:14
group together again at some point probably in the not too distant future gabrielle and i'll work it out because we've got a couple already but
58:21
this has been like stupidly fantastic i i loved all the conversations um i'm gonna
58:26
shut up and just if everybody would love to give a closing statement that would be perfect um again ladies first please
58:32
i think my closing savings as we're at that top of the hour i i want to make sure people don't skimp
58:38
out on the training and awareness programs um it's easy to make that someone's quarter of their job but don't do that
58:44
uh because you have to market security you got to make people feed into it and believe it
58:49
so be comfortable marketing security to your company um through fishing programs and even more um and think outside the box where
58:55
you're doing it so that's just my statement
59:01
well doug okay yeah i totally agree with what shea just said
59:06
and also um your point earlier about phishing simulation programs being
59:12
kind of checkbox compliance and people got them in place but they're not really looking at them critically
59:18
a lot of advances have been made recently in the last few years in terms of what phishing email spam and email gateways can do
59:25
what office 365 can do to sort of like be the front line of defense to bend off those uh phishing attacks
59:32
especially aimed at key employees and we can do we can leverage in message of learning to give people a
59:37
context like hey this may not be who it purports to be um
59:43
so i think that's one thing that we need to leverage is the technology itself and then secondarily
59:48
what gabe mentioned the schools yeah let's let's make let's gamify and let's take
59:54
advantage of people's competitive nature especially kids so that when they arrive at the workplace they're very well informed very wise and
1:00:01
very savvy about what is and isn't a legitimate email um the the attack vector is going to stay
1:00:08
there it's going to get more sophisticated you've already seen how much more sophisticated it is so our challenge is
1:00:14
to keep that security awareness program in place ratchet it up um in terms of like uh countering the
1:00:21
sophistication of the attacks out there and to not let go of that you know perspective that we've talked about here
1:00:26
of like we're here to help we're not here to shame we're not here to guilt and we're all in this together
1:00:32
cool hey man you're up sir i think we said enough we said a lot so
1:00:38
my only two cents would be watch this webinar again before you do a phishing campaign big time and the hundreds of bloody
1:00:45
questions that came in that we're going to try and hit offline as well freaking awesome stuff uh doctor europe
1:00:50
nexo i would just remind people that cyber security is a human issue that involves
1:00:56
technology not the other way around and take it back to prince hamlet
1:01:02
in answer to the question to be or not to be i would say unequivocally to be and therefore please look both
1:01:08
ways before you cross the street awesome love it gabriel elsa you get to wrap it up
1:01:14
yeah well you know i'm still uh on my way to this vision where um security or online safety
1:01:22
is a basic life skill i think we did a little bit more today as well this is why we're doing this webinars
1:01:28
this is why we're doing wiser um so we'll this is recorded um
1:01:34
we'll be writing um an abstract of this as well and we will post it
1:01:39
tomorrow so i learned a lot of new things today so i really enjoyed this conversation
1:01:45
um with all of you cool and i'll echo the same comments um hugely appreciative thank you very
1:01:51
very much everybody thank you for the time and thank you for the amazing comments thanks to everybody in the audience
1:01:56
freaking brilliant this this has been a fantastic one love you guys all stay safe stay healthy all those kind of good things please
1:02:02
and take care we will do this again thank you bye everybody