We guarantee listening to our show would have done absolutely nothing to prevent the Capital One breach. We’ve consulted our lawyers and we feel confident about making that claim. It’s all coming up on this week’s episode of CISO/Security Vendor Relationship Podcast.

This episode was recorded in the ExtraHop booth during Black Hat 2019. It is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our sponsored guest this week is Tom Stitt (@BlinkerBilly), sr. director, product marketing – security, ExtraHop.

(left to right) Tom Stitt, sr. director, product marketing – security, ExtraHop, David Spark, producer, CISO Series, Mike Johnson, co-host, CISO Series

Thanks to this week’s podcast sponsor ExtraHop

Unlike security solutions that focus on signature- and rule-based detection, ExtraHop Reveal(x) helps you rise above the noise of alerts with complete east-west visibility and machine learning for real-time detection of known and unknown threats, plus guided investigations for rapid response. Find and address real threats faster with ExtraHop.

Got feedback? Join the conversation on LinkedIn.

On this week’s episode

Why is everyone talking about this now?

I have noticed an either disturbing or coincidental trend. Every year, just before either RSA or Black Hat conferences, there is some massive breach. This year it was Capital One. In the past we’ve had Ashley Madison, Target, Marriott – all within a few months of the shows. I know I know I know that CISOs absolutely hate being sold on FUD (fear, uncertainty, and doubt), but all conferences are affected by industry relevant news. You simply can’t avoid it. Capital One was brought up multiple times during the Black Hat conference. We discuss the do’s and don’ts of bringing up the most recent breach at a huge trade show.

We don’t have much time. What’s your decision?

On LinkedIn, you asked “When your risk and threat models all agree that this feature/product/decision is of low concern but your gut tells you otherwise, what do you do?” It appears most people said go with your gut to which Richard Seiersen of Soluble pointed out that guts are models too. What happens when you’re faced with such a scenario and what causes the tools and threat models to be so off your gut?

“What’s Worse?!”

We’ve got a split decision and a really fun scenario.

Please, Enough. No, More.

Today’s topic is “network behavior analysis.” In the world of anomaly detection, what have Mike and Tom heard enough about and what would you like to hear a lot more?

It’s been two weeks. Time to change your password again. How many times have we all bumped up against this wall – intended to help keep us secure, but extremely annoying when you have things do do? The battle for password security has been a long and arduous one, moving and evolving, sometimes ahead of, but more often lagging behind the activities of the hackers and bad guys, whose limitless resources seek out every possible weakness.

Challenge questions and strings of letters, numbers and characters might soon be coming to the end of their functional life, as security companies start to roll out biometric and behavioral security protocols in their place. Paired with increased access to data and artificial intelligence, it will become easier for organizations to contemplate a switch from basic strings of words to something more esoteric – a retinal scan paired with an extensive ergonomic behavior database for every individual.

These things are not new to the consumer marketplace of course. Apple iPhones are one of many devices that can be unlocked by a fingerprint, and credit card companies and web applications routinely call out unusual login behaviors.

But the new secret sauce in all of this is the availability of huge amounts of data in real time, which can be used to analyze a much larger set of behavioral activity, not simply an unusually timed login. This can then be managed by an Identity-as-a-service (IDaaS) company that would take over the administration, upkeep and security of its clients using the as-a-service model.

A retinal scan paired with a secure knowledge of which hand you carry your coffee in and where you bought it might very soon replace the old chestnut challenge of your mother’s maiden name. That one should stay safe with Mom.

Check out lots more cloud security tips sponsored by OpenVPN, provider of next-gen secure and scalable communication software. OpenVPN Access Server keeps your company’s data safe with end-to-end encryption, secure remote access, and extension for your centralized UTM.

And now, a listener drops some serious knowledge

On LinkedIn, Ian Murphy of LMNTRIX put together an incredibly funny presentation with great graphics entitled the BS Cybersecurity Awards which included such impressive glass statuettes like the “It’ll Never Happen to Us” Award and the “Cash Burner” Award. In general, they were awards for all the bad repeated behavior we see from vendors and users in cybersecurity. What are the awards that are not given out that we’d actually like to see?