Russian Cyberwar - podcast episode cover

Russian Cyberwar

Feb 24, 202242 min
--:--
--:--
Listen in podcast apps:

Episode description

Support the showCall 877-468-2721 or visit https://petronellatech.com

Please visit YouTube and LinkedIn and be sure to like and subscribe!

Support the show

NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

Support the Show

Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

Transcript

Craig

Go ahead. Okay.

Erin2

So you're the director of channel sales. Is that right? Ted.

Track 2

Yes. Yes, sir. Okay. I just want to make sure I

Erin2

had that

Track 2

right.

Erin2

All right, so we'll go ahead and start. So welcome to the PTG podcast.

Track 2

Today it is

Erin2

myself, Erin. And we have Craig

Track 2

and Blake.

Erin2

We also

Track 2

have as a

Erin2

special

Track 2

guest Ted Sanchez from blue shift. He's the director of channel sales at Blueshift

Erin2

cyber security.

Track 2

And today

Erin2

we're going to

Track 2

discuss. The increased.

Erin2

Threat of cyber warfare

Track 2

after. Now that there's a

Erin2

war over there

Track 2

in Europe with Russia. And. Discuss steps that you can take to. Limit your exposure. To that.

Erin2

So Ted, do you want to give us a little bit of your background?

Track 2

I'm working a blue shift. I'm the director of channel sales and you shift. Basically market's a cyber security solution that provides an extra layer of protection. We have a managed 24 7 SOC. We alert. Customers have anything we see any threats or we blocked them. And then we quickly informed the point of contact if any. I'll go a little deeper. So this is Craig. Threats that need to be remediated that have been blocked.

So I actually found blue shift and PSIGEN when I was doing some research around ransomware and we wanted to have this podcast today because of the huge uptick in ransomware. From an adversary like Russia, and there's obviously threats that come from other adversaries as well. But there's the point is that There's a huge uptick right now. And. We went through a proof of concept with the blue shift X. DR technology. And we're very impressed and that vetted the solution.

Deployed at our our own environment, as well as our customers, because it's just such a powerful layer. Of detection. All at the network layer it can find lateral movement. And malware that may exist us on the network. Even if it was dormant and just became alive. Or if it's a new threat that came through either a phishing email or any other type of attack vector, but the point is that. If you have a unpatched system, if that was an exploit. And it came through.

The technology has what's called monitoring and blocking capability that integrate seamlessly with the security operation center or the SOC that. Is manned by cybersecurity experts, 24 7. That's looking at the data in real time. 24 7. To look for unusual activity and things like that before escalation can attack. And in the event that at three in the morning, when most people are sleeping the SOC detect something, they can block it then. And. When you get. To the office, they can then alert you.

And you can then. If there's any patches that need to apply or whatnot, then that can be done. But the point is it's a very powerful, proactive, Layer. In this defense against cyber war. That's what we wanted to go deeper into today. Yeah, so. hopefully that's a good overview so far. Yeah, that's a great. Oh, I was just going to say that's a great overview, Craig. And we really appreciate having you as a partner. And the fact that you guys are using our solution as well.

And you basically, we shipped you a cyber threat sensor. And basically I know that you guys are stalling within 10 minutes. And what basically that product does, is it. Does data packet level inspections and logging. So we inspect every packet. And moves in and out of your network. And then we applied multiple layers of layers, never security to it, including threat intelligence and intrusion detection and prevention, deception that were not. And a lot of other securities. Yeah, absolutely.

I think the big thing though, The game changer here that a lot of listeners. May or may not realize is that. They probably have a firewall. They probably have antivirus. But this is a very powerful, fairly new technology that they may or may not know exists and where it fits in their network. Topology.

And that's where I think that the proof of concept or POC methodology that we came up with together is very powerful because, listeners, if they work for a corporation or if they have a small business or even if they are at home and they're working. If they want to increase their cybersecurity. Maturity level. And get a new perspective and look through a different lens. This proof of concept. It's super powerful because it puts a sensor at the network layer.

And gives you visibility that you may not have had before. And like I was saying, you can see the, the sockets is analyzing these threats in real time, seeing the end user or the person. That is Manning doesn't have to be a cybersecurity expert. They leveraged the SOC team to do those efforts for them and on their behalf. As it's artificial intelligence and machine learning and algorithms, detect these anomalies, it blocks it.

Doesn't just tell you, Hey, look, you might have something suspicious. It actually blocks it and stops it. Yes. Until further investigation. And I think that's really the game changer there because there's a lot of stuff. That will detect, but there's not a lot of stuff that will actually stop dead in its tracks. And that's what I like most about it. I love the solution. I definitely don't think that, companies need to only have that.

Obviously they need to have other, training and other cyber security layers in place, but it's certainly a very powerful layer. And I think that as these ransomware. Attacks increase from adversaries. I think it's going to be an essential component. Of a company. And like I said, even. Worker working at home to protect themselves and protect the company that they work for. It's going to be a central in their cybersecurity stack.

Yup. Yup. And also Craig, we also paired a managed SIM, as you recall to the platform which collects logs from any device, whether it's in the cloud. The network, the server, the end point, you name it. And we upload these logs through the threat sensor there, and we can triangulate against it. So if we see something suspicious going on at the packet layer, we can go in and inspect the logs and. On a particular endpoint or server to do an investigation. Yeah, that's a good point.

A lot of people may not know what a SEM is. But basically it's a very powerful tool that aggregates those logs together just as Ted said. So a lot of the equipment or the network maybe you guys use Cisco firewall or Cisco SIS log. Services, but th these, all these appliances, they log everything, they log what's going in. What's going out. But a lot of people have really never looked at those logs.

Obviously cyber security experts have and do, but I would say that it's very rare that a, I would speculate when I say this, it's very rare that a business owner has ever seen raw log output from. Some type of network appliance, like a firewall or router. So what's powerful about the blue shift technology. The XDR. In particular, is that. It is that managed SIM and aggregator of all the logs from all your stuff, all your network equipment. And your stack.

And then picking it apart, making sense of it and having the sensor, Use it's artificial intelligence and algorithms, and then bring it up to the human level too. So if there's some suspicion there. A cybersecurity expert looks at it. And like Ted said, Maps it back.

Erin2

And I think. too, That, the reason that this is so important that we're talking about this today. In the wake of what is happening. Over in Russia. Is that. Working in cybersecurity. One thing that we have noticed is that. A lot of the companies in the DIB, their cybersecurity is just

Track 2

not

Erin2

up to par

Track 2

right now.

Erin2

And to think that there's not the potential threat. Of an attack, a cyber attack. Is really pretty naive. And the thing that is so great about. Blue shift is even if they do have eyes on you, if they are in your computer somehow. They're going to be able to. See it because of the activity that's going on. They're going to look at that raw data. They're going to analyze it. They're going to be like, something suspicious here. So that along with some other. Layers, like you said, Craig.

But especially with this, that can really help. Not just the business, but national security in general.

Track 2

Yes, I think I think one of the powerful things too, is that. You have to assume the worst. Sadly assume that you're infected. Assume you have malware on your network. But you don't know that it's really there. When you have a technology like this, that gives you that depth and visibility. It's very powerful and eye opening. Cause there's some businesses and some especially medical clinics and hospitals. They don't have the ability to patch every little thing and.

Their digital x-ray machine or their MRI machine or whatever. Medical device may not work with the latest. And greatest. So it's really essential to have a layer of technology. Or layers, the XDR and the SOC watching. Things 24 7, because quite frankly, most companies, they don't have the. The manpower or the expertise to be doing those functions. So it's not only is it cheaper to outsource it? It's just mostly, oftentimes not efficient to bring that in house.

And like I said, it gives that visibility. So even if the client. does our proof of concept. They may think that they're clean and that there's nothing there. It's usually a very eyeopening experience. After 30 days. Of looking at all of the findings of what what comes up through this lens and. I like I said, I, yeah, I think that it's very powerful. I think it sheds light on. Maybe some people are almost too comfortable and think that their situation's better than it really is.

And I think that it provides the supporting evidence that, Hey look, yeah. There, there could be malware on your network. And unless you employ technologies like this and you start tracking it all. How else would, that's my take on it. Yeah. Yep. And I just wanted to add one more thing and Craig, and then our CTO. Always brings up during. It. Webinars and discussions is the dwell time. Is the impetus behind any attack that you ever heard about? Basically. Any ransom attack lately.

Just the news and the attackers are out there. And what does it get? It put a hole into your network. They are there for a long time being very quiet. And that is the dwell time. And this time between the initial compromise and the time that they are detected. And so I will, your compromise basically you'll either get ransomed or the hi, we'll let you know that some of your servers are being used in a specific away on an attack, but yeah, it's a dwell time there.

They may be in your network, just hiding. But, but yeah, that's uh, that's a good point. The other thing that I thought was interesting too, on one of the proof of concepts that we did looking at the report, is it. It will actually show. Data packets and traffic to other countries. So like maybe you're a small business and. Maybe your business is generally a local to wherever you are within a certain radius or something like that, but maybe your businesses.

And international, maybe you have no ties to China or something like that. So finding traffic, going to China, for example, if that's the what's found in the logs, that could be a problem, right?

Erin2

Yeah.

Track 2

If you're an insurance company or you're only doing business within a radius of your state, and you start seeing traffic going to Russia, Ukraine, China, or. Other countries. That's alarming. You need to figure out what's going on and the dwell time example is a great one because when target and Michael's and home Depot, when they were all hacked, that average dwell time was two years.

Erin2

Wow.

Track 2

Two years. Could you imagine hackers watching everything with key loggers and capturing every keystroke and every email, every password, every bank website, everywhere you've gone for two years and the amount and volume of data that they were, would be able to exfiltrate. And you would never know unless you had technology like this.

Erin2

Yeah. Yeah. And that's the thing it's that? I feel like. Right now, especially in the DIB. I don't know. There's something that Putin said that was really ominous. Yeah, Basically. Okay. You, if you guys. Retaliate then I'm going to retaliate even bigger and it. That's not exactly. What's not a quote, but it's essentially what he said. And that just got my wheels turning, okay. I'm sure we have eyes in Russia. In Russian networks and computers too, but.

I was like, maybe, if you just look at the colonial pipeline, That was just a small, a small little. Interruption, but it caused a lot of ham. Havoc. And. It just makes me, it just makes me wonder. You know what sort of. What are they going to do? What are they going to do next? And. And Craig and I were talking about this it, if you have the right. The cybersecurity. Practices in place then. That's It's A moot point.

So if you have something like blue shift, Watching and reacting and you have something like, keystroke encrypter. Or a file encrypter. Even if they do, if they have infilled. Infiltrated. Your system. They're they're not really going to be

Track 2

able to get as much

Erin2

information off of it. That's the thing is that it's there's. You just never know. Sometimes. They can, they. They can get in there completely undetected. But if you have certain measures in place, then it will minimize the impact. That has.

Track 2

That makes sense. And that's where I was going with the layered approach. So blue shift. Not only do they have XDR and SOC, but they also have Cigent plus at the data level, which encrypts the data. And puts protections on the data. They have a patented. Solid state drive or SSD solution that gives even more enhanced protections at the data level with multi-factor at the file level. So if an adversary were. We're to get at. The data would be scrambled. It would be encrypted.

But by having multiple layers, like XDR. 24 7 cybersecurity operation center. Encrypted data, multifactor data. Or multi-factor security and authentication at the data level. Proper training security awareness training. Which I've talked about many times. That's so important at the human level.

To make sure that you're aware of these latest threats to go through the penetration tests, to go through the assessments, the security risk assessments to know where you are, know where your gaps are, know where your vulnerabilities are. No, how to, how and where to focus. All of this is all part of a cybersecurity maturity model. And it's so important more now than it ever has been. And you mentioned the DIB or the defense industrial base. Largely is our consist of our supply chain.

I would just say, like I said before, assumed the worst, assume that the entire supply chain. I'm speculating of course, but assume that the entire supply chain. Has Russian malware in it. And that they're able to get at this stuff if we can. Cut the head off of it and put technology. And layers in place. We can not only stop it in real time, but then make sure that it doesn't get in there again. Yeah. I just, I thank you for bringing that up.

Craig about our charging plus and yet provides controls that allows us to lock down access to any sensitive files when we detect a potential threat or When the data leaves your end point and goes to the cloud or your. You email it to a trusted user. We protect those files with both encryption and multi-factor authentication. Which are both super powerful layers. To ensure that only the eyes that are supposed to be on it can stay on it. And nowadays I think those are yeah.

That was from guidance's initiative last year. Multi-factor authentication, Yep. Yep. Yup. What else? Aaron or Blake? What do you think what's your perspective? We definitely need secure ourselves. I. I I think the certainty, the unknown. As of right now, it seems like everybody's doing things in retaliation. Everybody's got to take measures. To secure themselves, especially with uncertainty.

And I'm not just doing this out of like fear monitoring, I think, now would be the time to reassess the security situation. Within your network and within your business. And it's not really incredibly expensive to do it's cheaper than having. A breach or a vulnerability happened.

Erin2

The whole reason

Track 2

That CMMC

Erin2

came to be. Is because of things like this and threats like this. And it's just so important in our. We're just. We're. We're not up to snuff. Right now. I mean. our supply chain art, like

Track 2

the DIB

Erin2

has just not. Protected like it needs to be, and It's don't know, it's one of those things. This is what we get when we

Track 2

talk to customers anyway, They don't realize just how important it is until it's too late. And, you know right

Erin2

now,

Track 2

Going to war with Russia, the time is past. It

Erin2

needs. Cyber security needs to be.

Track 2

A

Erin2

priority or we could be in big trouble.

Track 2

That's just it. Like I was saying before, With assuming the works right. I don't think it's we could be. I think we are. I think this should be the alarm call to look. The writing's on the wall. Where the supply chain. The business landscape in general. It's too easy pickings. It's not enough is being done. And if you don't think that, and I'm not trying to scare people, I'm just being real. That's just

Erin2

the truth.

Track 2

truth of the situation. I'm not, I don't want to be the one that says lucky, try. Just try to use scare tactics. That's not what I'm doing. I'm I. I mean that the third party evidence is everywhere. This is, there should be the wake up call for businesses and consumers to take cyber into their own hands. To adopt and embrace these technologies. To better train themselves. But above that, do the drills, do the testing.

Like I said, the security risk assessments, the pen test, all that stuff that you've probably never gone through. People did take this as a warning sign and EXACTLY. Yep. Yep. Which is alarming that they're not. Being serious. They think that they're. They feel that they, what they have in place, their antivirus, their firewalls is enough, but man, the hackers can get through. That's what, that's why I think the proof of concept methodology so powerful.

I think that when you prove it and you show them, look. Here's what your antivirus and your firewall mist. Here's how. If you go through a ransomware simulation, And we show how the threats can spread and how the files get locked up. And, if you don't go through those security risk assessments and those pen tests and those exercises in those drills. And I know it's not convenient and I know that it's not free. And I know all this stuff costs money, but this stuff. Interested to essential.

We brought up a great point, Craig, I think when you dropped off, I was going to interject, I think a lot of maybe a lot of customers think that an extra layer of protection and monitor. And managed stock 24, 7, 365 is expensive, but it's not, basically, as we have affordable solution, but I'm not going to go into the pricing because I'm gonna let you do that, but. I think they would be surprised. We've had. Partners that, we're quoting competitors and we came in at less than half the price.

Yeah. And that's a good point to underscore. People. Businesses consumers, they have this Belief that all of this stuff is so expensive. I just did a presentation for cybersecurity for North Carolina state university. For senior citizens because senior citizens are such high targets for cyber attacks. And a lot of the content and tips that I gave them and they were very happy with the presentation. A lot of them didn't cost any money. You know that multifactor authentication.

With websites that you frequent like Facebook or where, your bank. That doesn't cost any money. It's all about knowledge and configuration. But. Your data. And I don't know if you've ever seen that movie about Cambridge Analytica and how many data points that big data and companies like Facebook collect on people. That data is valuable. And it's profiling of people and hackers want it.

They want your data, they want your identity, and they want to leverage that for oftentimes criminal activity, extortion, ransomware. And there are things that a lot of things that can be done. To make people much more secure. I think once you hit a business level, though, obviously the stakes are higher right now. You've got probably employees that work for you. You've got. Payroll. And if you have what's called, No interruption at the business continuity layer.

Then now you've got a problem where. The bigger your company is the more of an impact that is. So if you got 10 people and nobody could work. For an hour, that's pretty painful at the salary level, but what if you got a hundred people? And nobody, now it's instead of hours, it's minutes, every minute is costing lots of money. So if you don't put in. These enhancements and you don't do the drills. You don't do the testing. Then it's just a matter of time.

And with the current landscape threat landscape happening right now. It's all real it's happening right now as we speak. And if you don't have the. The technology to detect and block this stuff. But you're good at get infected and it's going to be expensive. And the cleanup is so much more than what it would be to put in some of these inexpensive solutions. Yep. I agree. I agree. We have customers that, basically, they renew and they don't want. Us to leave them.

Liam. They believe with their solution. Right away. It's like that extra layer of protection. So we haven't. Then our customer basis growing with our partners. It's like you guys. Yeah that, that's what I was saying about the proof of concept. I think that's a very powerful way. To show a. A perspective buyer that might be. Skeptical. Supporting evidence and, A mountain of supporting evidence that look, Here's where you are now. Here's what you're doing. Here's your visibility.

And here's what you're missing. Here's how you fix it and it's not that expensive to fix it. And I think. It's also value the. At the end of the POC, we provide them with the POC report in our findings and stuff, which, I think it's. We fight, not just from there. Network, but also from the agents that we allow. You install it. And computers so we could get information there too. And,

Erin2

Ted, one thing that you brought up is something that I've also thought about a little bit. uh, With blue shift. So basically I feel like people businesses. They think that the solution to they have in place, Like McAfee or some sort of antivirus. I think one of the problems is they think that. That product does what your product does. So they they are under the belief that, okay I have the software downloaded. So nobody's going to get to me. Basically.

Track 2

They call you letting you know, Hey, we blocked something. And informed you. You know what I mean? I've had friends that have used McAfee on their personal computers and then they got, they thought they were protected. Like you just said, Erin, and then also be very, no, it, there. Computer's off. And they don't want to go in and pay the $2,500 to clean it up at at best buy. And it's just crazy.

Erin2

So what's the, if you could explain to people like the difference between what you guys do. And McAfee. is.

Track 2

Virus you. And we're much more than that. We're a 24 hour. We still believe you need the antivirus. Yeah, they do. They do a great job, but we basically are providing a managed. 24 hours sock. To detect anything that might've passed your end to buyers or firewall.

Erin2

Right.

Track 2

Yeah. And

Erin2

the problem too is one of

Track 2

That we, everybody that we support has an antivirus and firewall. And we're not telling you to get rid of your antivirus firewall. We believe that there. Great solutions. Everybody wants to. Add an extra layer, just, And feel. They could sleep at night knowing that their network is being monitored 24 7.

Erin2

And how exactly are those viruses, malware? How are they able to sneak by? Would

Track 2

you

Erin2

say.

Track 2

Oh, my God. Many different ways, fishing. If someone clicks on something or, or they get an email and they click on it and then also they're like, okay, what happened? That's what happened? And they just move on. But, somehow they just, or they visited a a. A website or, and somehow there's something there that, got into their system. But, I think the, these ransom. Guys, these. These attackers, they're getting more and more sophisticated. With you. How they're penetrating getting into networks.

It's just, they leave a computer open or a server open or something like that, god, there's just so many different ways they're getting through. Yeah. And I think that the thing to point out too, is that. The XDR solution specifically, is that the network layer. And I've RS is at the software layer on the end point. So there are different. Different technologies, different layers. That's why they're both needed the firewall. Obviously it's policing, what's going in and out of the network.

But the XDR appliance is looking at the traffic at the packet level. And analyzing that at the Sam level. The Mo the log aggregator. And then the humans, the cybersecurity experts at the SOC. Our analyzing that when it gets elevated from the algorithms. That needs further inspection, cancer screening, they use AI and machine learning to scan for markers. Because of the falling lift data. Because AI is really good at large amounts of volume and. Using algorithms.

And then when it escalates to a certain level or a threshold, that's when the humans or the doctors in this. Example, come in and inspect. So that's similar at the SOC level there. And then, moving on to the Sergeant plus with the encrypted data. Like when when I make recommendations to folks. In the cloud, if you're going to store data like for backup, for example, ransomware. The bad actors. They know that most people are really bad with backup.

They're really bad with making sure their data is backed up. And the company. Or the people don't want to go through the testing exercises to make sure that their data. Is usable and is able to be restored. Not only is it able to be restored, but how fast, how long does it take to restore it? Because, like I said before, if you're a large company, And you have an outage from ransomware or whatever the threat is.

Your recovery time, objective or RTO your time that it takes you to recover from infection. That's important too. So that now. How good is your backup defenses? How good is your restore? Do you have any kind of business continuity layers that can run the company while this is happening? Or is everybody just looking at each other? So these things, a lot of people, these are conversations and questions that. A lot of people don't.

Sit around the table and discuss until there's a huge red hot problem. Most people don't want to do things proactively, but these are powerful layers. That compliment each other and they're essential layers. And the more layers you put in place, the better. And the more systems you put in place and redundancies, the better. I like zero trust technology. It, I don't trust one vendor to backup my data. I back it up in multiple places. I use it leverage. Blue shift on our security.

But I think that's really the key here is layers more layers. And we, and what we have with our plant permits, Craig is we do intrusion detection and prevention, which means we, like you said, we expect every packet that goes in and out of your network. And we look for any kind of signatures of malware, ransomware, or any other kind of cyber threats. And. We also do threat intelligence, which means we block. Any device that tries to communicate with over.

500 million indicators of compromise and we load those indicators. I've compromise on our sensors every one hour. We also do deception with our platform. We try to trick those bad guys into 80 and our. Any pots. Both external to the network and internal to the network. And if anyone hits our booby traps, they get blocked immediately. So it's a very sophisticated. Lapse, whether we do yeah. Yeah, very powerful.

Erin2

I think that's another thing too. I guess maybe what point I was trying to get to in. And you guys

Track 2

touched on it, but when

Erin2

you ask something with. Just antivirus. You have to. The antivirus

Track 2

is always keeping up. It's

Erin2

up to the hackers

Track 2

to get increasingly sophisticated.

Erin2

And when they do Then. The antivirus has to keep up. But I think

Track 2

one of the things that

Erin2

I thought

Track 2

was really cool about blue shift is that.

Erin2

It's just not the case there. You guys are

Track 2

actively watching it. You've got, Different algorithms that learn from.

Erin2

Whatever

Track 2

you guys have picked up on before. So it's just this huge kind of database.

Erin2

And it's.

Track 2

It seems like it's Updating in real time. Is that pretty accurate?

Erin2

What do you say?

Track 2

As opposed to keeping up. It's a good word. We're uploading new indicators of a compromise every hour on our sensors and stuff. But yeah, but yes. W I just think we have a very powerful tool and we're always adding, advance. Balancing it adding more of these You know what. That's definitely up in our platform. And we're, constantly. Updating it. Trust. Yeah, I think that's the point.

I think it's continuously advancing and every day, every hour, every minute it gets the algorithms get stronger and better. More data in. Better outputs. More advancements to the honeypots more advancements to the protections and the detections. Yeah. It's never a one and done, cyber security is always continuous effort. Yeah, exactly. We do have that network behavior risk monitoring, which we, when we do Aaron was moving to leading to.

With the algorithms that go in and weigh different types of traffic. Where the traffic is going and how is it happening and what exploit tents are happening and that working. We give you a risk score. To the customer. Yeah, which is what we gave in the reports. So they could see.

Erin2

Right. I think also another thing

Track 2

too. Point out if somebody

Erin2

does get

Track 2

a. A POC.

Erin2

The proof of

Track 2

concept, Sometimes like one month, your risk might not be as high as other months. Necessarily. And I think that.

Erin2

I don't know. I feel like that's important to

Track 2

you. So just because

Erin2

One 30

Track 2

day. The

Erin2

span is not

Track 2

necessarily a high risk. It doesn't mean that tomorrow it won't be. Another thing that we also have for Craig, as you recall, is our vulnerability scanning. And. What re we're interested in knowing women. Attacker can see from the network that is exploitable. And like remote execution, foster credentials, these types of things, and the scanning piece shows what's vulnerable in the network. And we provide this kind of, scan report. Every 30 days. Yeah, no. And And we also do it.

For agent-based robo detection analysis. Through our managed SIM platform. So it's you. It's a very powerful. Time for that. We have. Yeah. And it's multilayered too, which is what's what makes it so powerful. Yeah, I know. We had a POC and we provided a. A Walnut bowl T report to the customer. And I couldn't believe it. It was he printed it out. And I go, ah, you printed 700 pages and.

Erin2

Wow.

Track 2

He wasn't sure if his company is CEO is gonna, buy, but they did buy and I go. Could you imagine I need seven. He saw it so invaluable the report. Oh, I bet. I recently we did a pen test for a bank. And the report. That we did. Was, I think it was 10 or 15 gigs. I had to give it to Blake to deliver.

Erin2

Yeah.

Track 2

It's ridiculous. How, and that was just one angle, one lens. So yeah, I get it. I can see how the volume definitely adds up. And that's the thing too, and that's where I was going with the artificial intelligence side of it. If you get seven, 700 pages or whatever. You're not going to read you're human. You're not, it's going to take you forever to read 700 pages, right? So you need to have. And leverage advanced technologies like AI and ML, to be able to distill that for you. Nope.

Erin2

I think that's also something else

Track 2

that's important to

Erin2

point out. Is that just because.

Track 2

you get a.

Erin2

What the

Track 2

SIM or

Erin2

the SOC. I get the

Track 2

terminology mixed up. I apologize. But.

Erin2

You Even if you have the raw data. If you try to do everything, in-house, it's going to be really

Track 2

expensive as opposed to

Erin2

yeah. I How much would that

Track 2

cost to have a cybersecurity expert that does nothing but monitor your network all day. And then interpret

Erin2

that.

Track 2

About $150,000 a year and that's Minimum. That's actually. Think about it, $150,000, or you want to get the cyber threats? Cyber threat experts and they're in high demand. Oh, Shortage. Yeah. First of all, I got to find one sexy. If you can find one, since there is a shortage. You're probably not going to get one for 150 grand. And if you do. They don't have very much or any experience they're coming right out of school. It's kinda like why not just outsource it at a fraction of the cost?

And get experts that are doing this day in and day out.

Erin2

And then on top of that, like if you only have one

Track 2

person and it's only 150,000, let's say you only pay them

Erin2

150,000. But they still have to go

Track 2

on vacation. Like there.

Erin2

It's not a whole team. They're not robots,

Track 2

So it's going to be nearly impossible. To replicate

Erin2

that.

Track 2

Out of. At the same cost, basically. Yeah. Exactly. And these companies that have these it managers there it, management, they're not trained. They're not, they're sitting 24 7, they're over there trying to. Make sure someone's computer is working connected to the printer, like that certain there they're never at their desk, you try calling. I'm just wrong with yours. So basically you let that, let us be your, sobriety. It's security. Yeah. Yeah. Just

Erin2

let be the eyes on the network. It, just, to me, it just

Track 2

makes sense. If.

Erin2

Obviously, I don't

Track 2

own a business, but if I did, I would definitely have you guys.

Erin2

It

Track 2

just it's you.

Erin2

know, It's It's not

Track 2

cheap necessarily, but comparatively it is.

Erin2

And it's, You guys just do a

Track 2

great job. On it too.

Erin2

It just, to me, it doesn't make any sense. Otherwise. I don't know. I feel it's crazy to learn about you guys and then not Miu.

Track 2

But I really do what you

Erin2

guys

Track 2

do. Yeah. We've had customers that also they come back three or four months. I go, Hey, we want to go now. With our solution. I go, wow. Okay. You sure? I think something might've happened.

Erin2

Huh.

Track 2

And But anyway. Yeah. But they weren't able to hire a

Erin2

They thought was good. or There's so many

Track 2

different things that could go on. Exactly. All right. So the point is get your proof of concept in place.

Erin2

Yes Yesterday.

Track 2

Yeah, sign up. Reach out to us. Call or click. And we'll get you set up. We've got a great partnership with blue shift. Got exclusive pricing. So definitely, reach out to us and we'll get that set up for you. And that proof of concept is very inexpensive. I It does cost some money cause we have to send some engineers out, set up the centers and things like that. So there is some engineering time. But, it's very inexpensive and it's so eye opening of an experience to go through.

So definitely get started on that as soon as possible, especially with the current landscape.

Erin2

Yeah, exactly. And I don't think that It's anything

Track 2

to

Erin2

try to scare anybody.

Track 2

That's the thing is that.

Erin2

Could you're missing

Track 2

a, see how this

Erin2

business a scare tactic? No, it's

Track 2

not.

Erin2

We have the CMMC for.

Track 2

And HIPAA,

Erin2

like there's a reason that these things are in place and people

Track 2

just.

Erin2

Aren't doing it. And

Track 2

it's weird. We're just like we're sitting ducks.

Erin2

Our dev

Track 2

is just, it's a sitting duck and it's scary. I find

Erin2

it a scary and

Track 2

I hope that people. Do the right thing. I think that what's even more scary. So obviously we talked about the dip and defense industrial base and supply chain. But what's even more scary to me is healthcare. Yes because healthcare. And obviously HIPAA compliance, which I'm an expert in. Healthcare. They can't patch as easily or as well. That's why I was giving examples earlier about connecting to medical device equipment. Oh, yeah. Patch very easily.

Your vulnerabilities are through the roof and you absolutely have to have technology like this. At all the layers we described in place. Because you're at such a higher risk. And if an adversary. They know this and that's why attacks on hospitals and things like that. But this is what it becomes even more real, right? Because now you got people that can't get medical care or that are in the hospital that don't have any more care. And then people die.

There, there are people that have died because of ransomware attacks. And hospitals and, that's just really sad. That should not happen. Healthcare. Absolutely. Almost everything's at risk, but even healthcare I think is more so because of those reasons.

Erin2

Yeah, that's a good

Track 2

point. Very good point. Anyway with that. I just want to say. Craig and. Blake and Aaron, thank you so much. We really invent. Your invaluable part for us. Helping us. Do you get the word out about our solution and. And thank you so much. Yeah, you're welcome. Thanks for being a great partner and taking the time out of your data. To join us today. I know this was short notice and we no worries.

Put this on last minute, but I felt like it was like our responsibility and our duty to get this message out there as soon as possible, because. Before this,

Erin2

Yep.

Track 2

And I just wanted to just add that every single ransom attack that's happened. Everyone had a firewall and antivirus. I just want to add that, yeah. And sadly. I'm just jumping off that some of the folks that had certain kinds of firewalls, like Affordanet for example, There is flaws that is how, and we've done forensics on this. That is how some ransomware victims got compromised. It was through the firmware of their firewall because the firewall firmware was out of date.

Wow. And then Aaron, I also wanted to add one thing you asked about, there's, these hackers that will focus on one company and they are just there all day trying to figure out how to get in. Which is scary, yeah. It's really scary. If you think about it, most adversaries. Have Inexpensive or less expensive employment. Rates right. So I might get. More inexpensive workers, more bodies, more humans. To pound away at this stuff. So it's. It's just the masses that are just constantly hammering.

And most businesses don't have, like I said, the visibility. Or the capability or the defenses. To number one, see the risks, but also to stop and mitigate it. So they're neither. They should know that, Hey, there's someone that's been through. That's trying to get drew, And it's going to be matter of time. Yeah. And then once they're in. They're quiet. Yeah, that's right.

Erin2

And if you don't have a solution like blue shift, and you just, there's no way to know.

Track 2

Yeah, exactly. There you go. Thank you. Yup.

Erin2

That's why we, but we believe in you guys.

Track 2

Thank you so much.

Erin2

Yeah.

Track 2

I'm here for you 24 7.

Erin2

You are edited is always available. crazy.

Track 2

And then we appreciate it.

Erin2

Are you sure there's not like four of you running around Ted.

Track 2

We're trying to find, we're trying to find four more chats. I think they figured out how to clone himself in the lab. Anyway, thank you so much.

Erin2

Yeah.

Track 2

You're welcome. I got to go to all right. Thanks.

Erin2

hi, bye everyone.

Track 2

All right. Bye.

Transcript source: Provided by creator in RSS feed: download file