[00:00]
Nick Selby
You know, they're never a cop when you need them, but.
[00:01]
Nick Selby
But if there is, they didn't understand what to do with the breach.
[00:04]
Nick Selby
And that was like, well, how hard could it be?
[00:06]
Nick Selby
I asked, and then I found out.
[00:08]
Nick Selby
So I went to the police academy, worked doing.
[00:12]
Nick Selby
Doing cyber investigations.
[00:13]
Nick Selby
I mean, I started in patrol and do it like, But.
[00:15]
Nick Selby
And then in 2018, I went to the NYPD, where I was the director of their cyber intelligence and investigations for the Intelligence Bureau.
[00:26]
Viktor Petersson
Welcome back to another episode of Nerding out with Viktor today.
[00:29]
Viktor Petersson
Today I'm joined by Nick Selby.
[00:30]
Viktor Petersson
Welcome, Nick.
[00:32]
Nick Selby
Hey, thanks a lot, you.
[00:33]
Viktor Petersson
I got to know you through mutual fund Chris Swan, who's been on a previous episode that you've done some work with before.
[00:38]
Viktor Petersson
And most recently, I bumped into you at 44CON, where you gave the keynote speech, and I was so.
[00:45]
Viktor Petersson
Yeah, I was so impressed by your talk there, because I actually, like, this would be a great podcast episode.
[00:50]
Viktor Petersson
There's so many nuggets of wisdom in that episode that I kind of wanted to, like, take that and turn that into an episode and chat more about that.
[00:58]
Viktor Petersson
So.
[00:58]
Viktor Petersson
But before we dive into that, you have a fascinating backstory, and I'll just give people kind of backstory of like, who's Nick and what do they know?
[01:07]
Viktor Petersson
Before we dive into the nitty gritty details of the lovely nerdiness.
[01:15]
Nick Selby
World's weirdest resume.
[01:18]
Nick Selby
I started out, weirdly enough, doing sound, and I worked in television and resumed recording, and then I got into the.
[01:30]
Nick Selby
To the.
[01:31]
Nick Selby
Really into the security field and in physical security and then into cybersecurity in the late 90s.
[01:38]
Nick Selby
In 2004, I established the Information Security practice at 451 Research, which is now S and P Global Intelligence.
[01:47]
Nick Selby
And I went out on my own 2009 as a consultant.
[01:51]
Nick Selby
And then I quickly gravitated to incident response because there's no politics incident response.
[01:57]
Nick Selby
It's like it's either it's popped or it's not.
[02:00]
Nick Selby
And that was quite good.
[02:04]
Nick Selby
I got into law enforcement in 2010 mainly because I was doing incident response, and I could never find there's never a cop when you need them, but if there is, they didn't understand what to do with a breach.
[02:15]
Nick Selby
And that was like, well, how hard could it be?
[02:17]
Nick Selby
I asked, and then I found out.
[02:19]
Nick Selby
So I went to the police academy, worked doing cyber investigations.
[02:23]
Nick Selby
I mean, I started in patrol and do it.
[02:26]
Nick Selby
And then in 2018, I went to the NYPD, where I was the director of their cyber intelligence and investigations for the Intelligence Bureau.
[02:35]
Nick Selby
Soon after that I was in Paxos and did a stinted trail of bits.
[02:42]
Nick Selby
Worked with Evertas, which is crypto insurance.
[02:45]
Nick Selby
And then a bunch of us who were doing professional services at Evertas spun it out.
[02:50]
Viktor Petersson
Very cool.
[02:51]
Viktor Petersson
Epsd before we dive into kind of like where I think we spend the most of the talk today around AI I'm really curious about what you kind of alluded to before, which about your stint at NYPD and kind of working in law enforcement.
[03:05]
Viktor Petersson
And that must have been a bit, it must have been an interesting journey.
[03:10]
Viktor Petersson
Of course.
[03:11]
Viktor Petersson
So like how shocking was that shift from work in private sector to go into I guess state owned, state operated where bigger resources but also a lot of bureaucracy and yeah, walk me through like that transition for you.
[03:30]
Nick Selby
You know, I was really lucky because I was able to keep one foot in both camps for a long time.
[03:35]
Nick Selby
So for several years I was just, you know, part time doing stuff.
[03:38]
Nick Selby
Then I, then I was more into like organized retail crime investigations and things like that.
[03:46]
Nick Selby
And then the NYPD obviously was full time.
[03:48]
Nick Selby
Then I went back after I left that into part time again.
[03:51]
Nick Selby
The, the shock, actually it wasn't all that shocking.
[03:59]
Nick Selby
The really, the thing that's the biggest difference is you just sort of said resources, there are none.
[04:07]
Nick Selby
And nobody wants to vote for a tax increase to get the cops better computers.
[04:11]
Nick Selby
And if you take a look at like I crack up when I see a cop show and they're doing computer stuff.
[04:17]
Nick Selby
I mean a law enforcement computer is a, you know, is a nine year old laptop with a black screen and white, all capital letters.
[04:25]
Nick Selby
And it's like, it's literally reverse compatible to simple telex over radio.
[04:33]
Nick Selby
And I listened to a lot of assumptions that people make about the kinds of things even at the NYPD and the Intelligence Bureau, which is, it is very well funded, but still the toys don't really exist.
[04:47]
Nick Selby
And I don't get to see the kind of things that, that people think I get to see.
[04:53]
Nick Selby
But what I also found was really interesting.
[04:58]
Nick Selby
New operational requirements.
[05:01]
Nick Selby
We can never throw anything out ever.
[05:04]
Nick Selby
You have to document absolutely everything.
[05:06]
Nick Selby
You have to write.
[05:07]
Nick Selby
Everything is a report.
[05:08]
Nick Selby
Everything, every report is public record.
[05:10]
Nick Selby
Everything you do is public record.
[05:13]
Nick Selby
And you know, I was an early proponent of body cams on all officers.
[05:17]
Nick Selby
I did for a number of years with Professor Peter Moskos from John Jay College of Criminal Justice.
[05:22]
Nick Selby
We did a thing called Quality Policing, a podcast where we would just Go through things that happened during the week and talk about, you know, was this proper?
[05:32]
Nick Selby
Did they, are they protecting people or are they abusing their authority?
[05:36]
Nick Selby
Was that a legitimate use of force?
[05:39]
Nick Selby
And questions like that.
[05:40]
Viktor Petersson
I guess you, you must have had an interesting vantage point because I mean particular in the rise of chat control in eu that's transpiring right now with all these.
[05:52]
Viktor Petersson
You see the polarized view of law enforcement wants access to everything and there is no privacy whatsoever.
[06:01]
Viktor Petersson
How has working coming from tech where people tend to be more privacy oriented coming into the police world where yes, I guess it's completely polarized, where you basically, you want for good reason, often have full access to data.
[06:17]
Nick Selby
Right?
[06:17]
Viktor Petersson
How has that shaped you?
[06:18]
Viktor Petersson
Because that must have been like completely polarized, right?
[06:25]
Nick Selby
The one, the one order I, the one order that I actually refused and my boss was kind of like, I'm not sure you get to refuse.
[06:33]
Nick Selby
I'm like, well, I just did was it was around the FBI position on encryption backdoors.
[06:41]
Nick Selby
And I thought it was manifestly dumb and unworkable.
[06:46]
Nick Selby
And I got the real feel.
[06:48]
Nick Selby
Look, I can understand there is an argument and especially because.
[06:53]
Nick Selby
And now I'm on the board of a charity that does anti human trafficking and we help law enforcement locate traffic children and rescue them.
[07:06]
Nick Selby
And you know, there are very few things that I think are not good tools to use for that.
[07:14]
Nick Selby
And the privacy part of me is like, well, you know that's really not true.
[07:19]
Nick Selby
When government gets grabby especially, yeah, chat control, like putting in things that are looking through and breaking encryption, I am dead set against it.
[07:28]
Nick Selby
And I, and I always have been.
[07:29]
Nick Selby
This is a consistent position for me.
[07:32]
Nick Selby
I'm not against, I'm not against body cameras.
[07:34]
Nick Selby
As I said, I am absolutely against throwing away.
[07:37]
Nick Selby
A lot of people are like, well, you know, you should throw away the video after you use it.
[07:40]
Nick Selby
Really.
[07:41]
Nick Selby
I know of a lot of people who have been sprung from US prisons 30 years on because a piece of DNA evidence was discovered that, you know, that was exculpatory.
[07:51]
Nick Selby
What evidence should we throw away?
[07:53]
Nick Selby
Like, there's inculpatory and exculpatory evidence and it's on video.
[07:57]
Nick Selby
You want me to throw that away?
[07:58]
Nick Selby
What else should we throw away?
[07:59]
Nick Selby
The answer is it's dumb, right?
[08:00]
Nick Selby
But like I, I support, for example, automated number plate readers.
[08:07]
Nick Selby
I understand that's controversial.
[08:08]
Nick Selby
I understand the privacy concerns about flock cameras and things like that with decent controls.
[08:15]
Nick Selby
I think that we can reasonable people can find a middle ground.
[08:21]
Nick Selby
It's very difficult when the public and the police don't share the kind of trust that you would want them to, to, to share.
[08:27]
Nick Selby
And that's, you know, that's on both of those.
[08:30]
Viktor Petersson
Like there was a news today that ring is kind of moving into the same domain as Flock.
[08:35]
Viktor Petersson
Right.
[08:36]
Viktor Petersson
And yeah, I'm so familiar with like that's so that law enforcement can essentially access private cameras.
[08:41]
Viktor Petersson
All right.
[08:42]
Viktor Petersson
And I, I think the biggest criticism there is that the.
[08:47]
Viktor Petersson
We hear from people in the tech world is yeah, it's great when there is a level of like opt in and a level of like you access that you can access data from this dating point in time for this particular reason.
[08:59]
Viktor Petersson
But the problem is when you have like the palantir of the world who just consumes everything and then just like you don't.
[09:06]
Viktor Petersson
If you're.
[09:07]
Viktor Petersson
You, like you lose completely control.
[09:08]
Viktor Petersson
And it might be fine for the current government if you agree with that state or the government, but what about the next way after.
[09:16]
Viktor Petersson
Right.
[09:17]
Nick Selby
Yeah, yeah.
[09:19]
Nick Selby
And, and I think the other problem that happens is there's a, there's a sort of bundling and conflation of these different technologies.
[09:27]
Nick Selby
Right.
[09:28]
Nick Selby
So we can talk about.
[09:30]
Nick Selby
And then there's.
[09:31]
Nick Selby
There are, there are in fact double standards.
[09:33]
Nick Selby
I'm, I'm not a big Palantir fan, but yeah, it will gather a lot of things and synthesize a lot of data and do visualizations.
[09:40]
Nick Selby
And so I don't think it holds a candle to ChatGPT and I don't think it holds a candle to some of the things that we voluntarily do.
[09:47]
Nick Selby
I don't know of any individual law enforcement surveillance technology that could even come to 5% of the pervasive surveillance of meta, you know, and, but on the other hand, when you see procedural errors.
[10:07]
Nick Selby
I was having a chat the other day with somebody in, who works on the privacy side against law enforcement on these things and you know, go back years and some of the things, you know, I know that if I've got photo, a facial recognition hit and it says right on it, like this is not probable cause to arrest.
[10:28]
Nick Selby
Right.
[10:29]
Nick Selby
Is it in fact reasonable suspicion to have a chat?
[10:33]
Nick Selby
Yeah, I think it is.
[10:36]
Nick Selby
If we find that the procedures are not being followed and I'm using that as an opportunity to go and talk to somebody and sort of use it as a pretext to arrest Them.
[10:45]
Nick Selby
I think that's just completely wrong.
[10:47]
Nick Selby
But I also think that having worked on, you know, child sexual abuse, material investigations, Internet crimes against children, sometimes I want to know exactly where that guy is right now, and I want to find him.
[11:00]
Nick Selby
And so things do have to be balanced, and we have to have individual conversations that are greater than talking points that are.
[11:08]
Nick Selby
That are willing to dive into the fact that a lot of these things are dual use.
[11:11]
Nick Selby
And, yeah, there's a good side and a bad side.
[11:13]
Nick Selby
How can we find.
[11:15]
Nick Selby
How can we find systems to.
[11:17]
Nick Selby
To hold people accountable and.
[11:19]
Nick Selby
And truly measure what people are doing?
[11:21]
Nick Selby
Not what they could.
[11:22]
Nick Selby
What they're.
[11:23]
Nick Selby
What they're actually.
[11:23]
Viktor Petersson
I mean, there's no doubt that I think the vast majority of people would be absolutely.
[11:29]
Viktor Petersson
For arresting these people, 100% right.
[11:33]
Viktor Petersson
I don't think that's controversial whatsoever.
[11:34]
Viktor Petersson
The controversial part is, like, the creep of that.
[11:38]
Viktor Petersson
Like the blast radius of that.
[11:41]
Viktor Petersson
And that's the tricky part.
[11:42]
Viktor Petersson
Yeah.
[11:44]
Nick Selby
I was in a. I was at a conference.
[11:46]
Nick Selby
This is probably, I don't know, eight or 10 years ago.
[11:49]
Nick Selby
And it was myself and somebody from the Brennan center, and were talking about automated number plate readers.
[11:57]
Nick Selby
And somebody in the back said, well, you know, I said, well, how is that different from me just sitting on the street writing down your license plate and then running it?
[12:06]
Nick Selby
And he said, look, if you're doing that, I understand that.
[12:08]
Nick Selby
That, you know, there's no expectation of privacy on the street.
[12:13]
Nick Selby
But when you're doing 3,000aminute now, suddenly there's a chilling effect on association.
[12:18]
Nick Selby
And I'm against that.
[12:19]
Nick Selby
I'm like, well, you know, that's a really great point.
[12:20]
Nick Selby
And at the other end of that continuum, this very morning, and it was true, that very morning, were searching for a guy who was wanted for a bunch of child sexual abuse material.
[12:32]
Nick Selby
And the US Marshals Fugitive Task Force was helping, and they used number plate technology.
[12:37]
Nick Selby
They found the guy in a motel about 40 miles south of the city, and they arrested him.
[12:41]
Nick Selby
So he was in jail at that very moment.
[12:43]
Viktor Petersson
Right.
[12:43]
Nick Selby
That's the other end of the continuum.
[12:44]
Nick Selby
Somewhere in the middle, we've got to find controls, and nothing's all evil and nothing's all good.
[12:50]
Viktor Petersson
We could probably spend the entire episode speaking about this because it's something that I'm very interested in diving into.
[12:55]
Viktor Petersson
I don't want to derail the conversation.
[12:56]
Viktor Petersson
We actually had pipeline for today's show, and maybe that's a future episode.
[13:00]
Viktor Petersson
What I really want to talk about.
[13:02]
Viktor Petersson
Today is kind of like the keynote you gave at 44con, but by the way, shout out to Adrian and the people at 44con.
[13:07]
Viktor Petersson
Fantastic conference.
[13:08]
Viktor Petersson
If you haven't been.
[13:10]
Viktor Petersson
Oh yeah, I was really interested what you talked about there because one of the big talking points you had at the conference in the keynote was around the Drift and the Sales Loft story.
[13:22]
Viktor Petersson
Right.
[13:23]
Viktor Petersson
For, for people not familiar to it.
[13:24]
Viktor Petersson
Maybe we can recap that real quick because I think there are so many lessons to learn from that story right.
[13:29]
Viktor Petersson
In the era of AI.
[13:30]
Viktor Petersson
So if you mind recapping like what happened and kind of like, yeah, diving a bit into that.
[13:39]
Nick Selby
Drift.
[13:39]
Nick Selby
Drift is one of those chatbots that goes on websites and pops up and you know, offers you the ability to, you know, hey, do you want to talk to somebody in sales?
[13:47]
Nick Selby
I can, I can get your calendar, you know, answer a few questions.
[13:49]
Nick Selby
Where, where's your company?
[13:51]
Nick Selby
How big is your company?
[13:51]
Nick Selby
That kind of thing.
[13:52]
Nick Selby
Okay, we've got the right account executive.
[13:54]
Nick Selby
They're free Tuesday at 12.
[13:55]
Nick Selby
Do you want to do it?
[13:56]
Nick Selby
Click the thing.
[13:57]
Nick Selby
And now you've got a calendar invite.
[13:59]
Nick Selby
And, and that is valuable.
[14:01]
Nick Selby
One of our customers said that they got more high intent leads from that than from any other channel.
[14:10]
Nick Selby
Now that's super powerful.
[14:12]
Nick Selby
Right.
[14:15]
Nick Selby
When you think about that, what do you need to connect to that?
[14:19]
Nick Selby
It's a little bit surprising then that when.
[14:22]
Nick Selby
So Drift is owned by a company called Sales Loft.
[14:24]
Nick Selby
Salesloft has a couple of these AI tool kinds of things and they got hit and they had pure cyber breach.
[14:36]
Nick Selby
From what we can tell from the company's public statements, just a pure cyber breach.
[14:40]
Nick Selby
It was, you know, it was some insufficient authentication and access control.
[14:44]
Nick Selby
Looks like they didn't have two factor or it's unclear whether there was universal or required two factor.
[14:50]
Nick Selby
There was, there was clearly.
[14:51]
Nick Selby
And we can only infer because their communications weren't that great.
[14:55]
Nick Selby
They were, they were a little bit vague.
[14:56]
Nick Selby
But we can infer from things that they said that hard coded secrets in their source code repositories.
[15:02]
Nick Selby
We can infer from what they said that they had customer credentials in production servers, perhaps not in secrets management, perhaps.
[15:10]
Nick Selby
Right.
[15:10]
Nick Selby
We don't know really.
[15:12]
Nick Selby
But, but the blast radius of users of Drift turned out to be pretty big because, you know, you'd think just having a thing to check the calendar, it would just be, it would be probably talking to, you know, your Google or your Microsoft calendar, but in fact it was also, it was hooked into Salesforce Cloud.
[15:31]
Nick Selby
It was hooked into a number of different data repositories to get context, right?
[15:35]
Nick Selby
Have we seen this person before?
[15:37]
Nick Selby
Do we have a relationship with them?
[15:38]
Nick Selby
Who did we talk to last time?
[15:40]
Nick Selby
Are there any open cases?
[15:41]
Nick Selby
So they had access to that.
[15:44]
Nick Selby
And the more we looked, the more we found that there were tentacles into this and providing information into this AI tool from all over.
[15:54]
Nick Selby
And the last thing is that in a lot of companies there were more than 700, maybe even more than 750 companies got hit by this.
[16:03]
Nick Selby
A lot of the big guys got hit.
[16:05]
Nick Selby
Cloudflare got hit.
[16:07]
Nick Selby
A lot of people did and they wrote about it.
[16:08]
Nick Selby
But for the mid sized companies and the smaller companies who might not have considered the implementation and monitoring and data loss prevention and other tools that they could use, this was a pretty big surprise because they were like, wow, this is a great tool.
[16:24]
Nick Selby
It does a really good thing.
[16:25]
Nick Selby
Let's just take their advice and hook it up to everything.
[16:27]
Viktor Petersson
But yeah, your take on this horse is so important.
[16:33]
Viktor Petersson
Which is like the second you sprinkle a over something we kind of throw all the common wisdom and learnings we've had over the last 20 years or 40 years.
[16:45]
Viktor Petersson
As far as security goes, it just out the windows like well AI will solve it.
[16:49]
Viktor Petersson
So therefore like security doesn't matter.
[16:51]
Viktor Petersson
Right.
[16:53]
Viktor Petersson
And I think that's, that was, it's so interesting here, right, because a lot of this is already a solved problem, right?
[16:59]
Viktor Petersson
We don't really like there's nothing, if you think about an AI agent, there's nothing really new there in terms of security.
[17:06]
Viktor Petersson
The attack vector might be slightly different, but how it access data and access controls and all those things, those are solved problems.
[17:13]
Viktor Petersson
We've already solved those long time ago.
[17:15]
Viktor Petersson
Right, But I'm curious about how you think about that.
[17:17]
Viktor Petersson
Like when you are going into companies today and working with companies like how are you advising them to kind of like think about these AI tools that oftentimes there is top level board mandate to like, oh, we have to sprinkle AI over everything because AI otherwise we gotta lose out and whatnot.
[17:37]
Viktor Petersson
Right.
[17:37]
Viktor Petersson
But in terms of like threat modeling and all those things that kind of are part of common best practices, how do you engage that when, how are you advising your clients when you work with them to kind of think about these things to kind of, well, to bring them back into the real world and not like magic fairy dust of AI?
[18:00]
Nick Selby
Well, all right, so but yes, but we have to begin in the real world, right?
[18:04]
Nick Selby
So if I have a widget company and I've got some competitors, the chance that one my competitors is not using AI is increasingly low.
[18:14]
Nick Selby
Right?
[18:15]
Nick Selby
If they are using AI and they are getting the kind of results, remember I said you have more high intent leads than any other channel.
[18:21]
Nick Selby
So there are certain things that AI is doing that in fact is increasing velocity, increasing sales volume, increasing pipeline.
[18:28]
Nick Selby
And once your customer, your competitor is doing it, there is, I mean real pressure from your board of directors, from your investors.
[18:36]
Nick Selby
So that is the real world.
[18:38]
Nick Selby
And, and it's true that a lot of times the senior executives, the chief executive might not be entirely familiar with what the benefits are, but they know of some and the ones that they know of are enough to get them really saying AI the everything.
[18:53]
Nick Selby
Right?
[18:53]
Nick Selby
So that is, that's real world and it's important also Wendy Nader says that she likes to call it software because when you say AI, it tends to enchant and in source all people.
[19:04]
Nick Selby
And like so as soon as you say those letters, people believe that it's doing magical things.
[19:11]
Nick Selby
I'm going to say that one of the really hard problems that I've had by the way, I don't really see a lot of sort of AI secure.
[19:21]
Nick Selby
A lot of the, the stuff that people talk about with AI security is really kind of, it's, it's advanced stuff.
[19:31]
Nick Selby
And you know, I'm not suggesting, I'm not pooing it at all.
[19:33]
Nick Selby
But what I'm saying is most companies are looking to understand how do I do this safely?
[19:41]
Nick Selby
They're starting kind of on the back foot because they're really not clear.
[19:45]
Nick Selby
They hear that it's open air, it's anthropic.
[19:47]
Nick Selby
These are very big companies with hundreds of millions of dollars in funding that makes it sound like every other enterprise software company and it's not.
[19:55]
Nick Selby
But, but it sounds like that, right?
[19:57]
Nick Selby
And so they kind of look at this as an enterprise software purchase and it's very difficult for them to find, it's really easy to find you people who tell you why you should do it.
[20:09]
Nick Selby
Very few people to tell you how to do it safely.
[20:11]
Nick Selby
So the governance is becoming really very important.
[20:15]
Nick Selby
What, what we're now recommending for people is like write down your business goals and the anti goals, like what do you want this thing to do and what do you not want it to do?
[20:24]
Nick Selby
Let's make sure that actually, you know, the kind of AI that you're talking about is the right thing to do.
[20:30]
Nick Selby
But like write down these goals and see and see how, how are you going to measure its success?
[20:35]
Nick Selby
How are you going to know if it's working?
[20:37]
Nick Selby
And in some cases, like the sales pipeline chatbot, it's really easy.
[20:40]
Nick Selby
In another one, like, hey, let's turn over some of our customer support to this thing and it'll answer the most commonly asked questions.
[20:47]
Nick Selby
And you might not know it, but everybody's getting angry.
[20:49]
Nick Selby
Or it might make things up, right?
[20:51]
Nick Selby
Or it might tell people things that you don't want it to tell them so that it's a little trickier.
[20:58]
Nick Selby
The next thing is documenting and sitting down with legal security operations it the people who are running these systems and thinking about like what data is necessary for this thing.
[21:14]
Nick Selby
We can talk about least privilege all the time, right?
[21:16]
Nick Selby
But how do we know what data is really necessary?
[21:20]
Nick Selby
And how do you make the risk reward decisions?
[21:23]
Nick Selby
Because remember, when you bring this in, there's a few things that can happen with AI, and this is not anti AI.
[21:30]
Nick Selby
This is just like you could have an AI failure like I was just mentioning, right?
[21:35]
Nick Selby
You could, you could have poor information, you could have like inaccurate information that causes losses.
[21:42]
Nick Selby
You could have one of those crazy bots that goes nuts and starts being racist.
[21:46]
Nick Selby
And right, there's AI failure.
[21:48]
Nick Selby
But the cyber security is rock solid.
[21:50]
Nick Selby
You could have the opposite where the cybersecurity is a disaster and the AI stuff just works as way it's advertised.
[21:56]
Nick Selby
You could have both, right?
[21:58]
Nick Selby
You could have both benign and both malicious.
[22:00]
Nick Selby
So there's a lot to really think about.
[22:03]
Nick Selby
It comes to me when we talk to clients.
[22:05]
Nick Selby
It comes down to blast radius.
[22:07]
Nick Selby
What systems will it talk through?
[22:11]
Nick Selby
What data does it have access to?
[22:13]
Nick Selby
What happens when things go wrong?
[22:16]
Nick Selby
How do we know that it's doing what it's supposed to be doing?
[22:19]
Nick Selby
How do we know that if we put into place compensating controls to mitigate risks like data loss prevention or even just, you know, hey, there's a high volume download out of here that we haven't seen.
[22:31]
Nick Selby
Does that really work?
[22:32]
Nick Selby
How do we test that and make sure that it really works?
[22:35]
Nick Selby
We saw some failures during the Drift sales loft where some DLP systems didn't actually pick up.
[22:42]
Nick Selby
It was clear.
[22:43]
Nick Selby
The company even said, yeah, we should have caught that.
[22:44]
Nick Selby
We didn't.
[22:45]
Nick Selby
There was, there was something wrong.
[22:46]
Viktor Petersson
I mean the scenario there, like I think you mentioned, you talk about the One of the common ways people install these applications was just give themselves first admin.
[22:55]
Viktor Petersson
Right.
[22:55]
Viktor Petersson
And they just like, cool, yeah.
[22:57]
Viktor Petersson
What could go wrong?
[23:00]
Viktor Petersson
So like, yes, I think let's not lose track of like least privilege positions.
[23:07]
Viktor Petersson
Right.
[23:07]
Viktor Petersson
Like those things seem to be like.
[23:09]
Viktor Petersson
Because I could have mitigated quite a lot of this.
[23:11]
Viktor Petersson
Right.
[23:11]
Viktor Petersson
As well from the get go.
[23:13]
Viktor Petersson
Right.
[23:13]
Viktor Petersson
And because what you could do as admin is obviously very different, but then you could do as a read only user for like a subset of the data.
[23:24]
Nick Selby
And, but again something like that like read only is really interesting because if you take a look at what was happening.
[23:31]
Nick Selby
So the sales loft drift thing was actually a nation state or like a sophisticated actor attack coming through and for the sole purpose of stealing credentials to get further access.
[23:44]
Nick Selby
Right.
[23:44]
Nick Selby
It was a true supply chain attack.
[23:46]
Nick Selby
And on the way they were just downloading all the data out of connected Salesforce and Google and other implementations.
[23:54]
Nick Selby
Read only didn't help you at all because that's all they were doing.
[23:57]
Nick Selby
They were only reading even more rogue actor.
[23:59]
Viktor Petersson
They could have wiped all your Salesforce data in the process.
[24:05]
Nick Selby
Absolutely, absolutely.
[24:07]
Nick Selby
And a lot of times what we've talked to people and we're like, you know, don't.
[24:11]
Nick Selby
You might have escaped you.
[24:12]
Nick Selby
It might not have actually caused the leak of anything that you care about.
[24:15]
Nick Selby
Understand that was attacker's choice.
[24:18]
Viktor Petersson
Right.
[24:18]
Nick Selby
You didn't do anything that prevented them and had they asked for it, they would have gotten it based on the level of extraordinary access that they had.
[24:27]
Nick Selby
So yeah, limiting what it's connected to how it's connected.
[24:30]
Nick Selby
The, the circumstances of it putting things on.
[24:33]
Nick Selby
We love Obsidian security, like being able to say, hey, there's a lot more coming out of there, especially if you can get it on both sides.
[24:41]
Nick Selby
Right.
[24:41]
Nick Selby
It's asking for something, it's getting something that is anomalous.
[24:44]
Nick Selby
Let's.
[24:45]
Nick Selby
Let's look at that.
[24:46]
Nick Selby
Let's alarm on that that's kind.
[24:48]
Viktor Petersson
Of important to like MCPS and the things around those.
[24:52]
Viktor Petersson
I think that's kind of tangential here, but like how the run the joke is the S in MCP sense of security.
[25:01]
Viktor Petersson
Right?
[25:02]
Viktor Petersson
Yeah, that was great.
[25:05]
Viktor Petersson
Tools like that, like what.
[25:06]
Viktor Petersson
What have you seen with regards to that?
[25:08]
Viktor Petersson
Like ease of use.
[25:09]
Viktor Petersson
Great.
[25:09]
Viktor Petersson
But at what cost?
[25:15]
Nick Selby
It's kind of the same thing.
[25:16]
Nick Selby
Although I think that it's a little scary that people are more likely to trust the stuff that their engineers build internally because they can follow the bouncing ball and see where it went.
[25:26]
Nick Selby
And so we have seen a bunch of mcp like server, like people forget.
[25:30]
Nick Selby
Yeah, the MCP stuff is great and it's connecting these things and wow, look at that.
[25:33]
Nick Selby
It's wicked cool.
[25:34]
Nick Selby
And it's a server.
[25:37]
Nick Selby
And when you forget things like SSO and when you like basic core security stuff, that's when people get in trouble there.
[25:47]
Nick Selby
One of our clients was suggesting because they're, they have a lot of this stuff and they were like, you know, we should actually take a look at, have a better way to look at the traffic, both directions.
[25:57]
Nick Selby
Maybe we should make an MCP gateway that we could monitor.
[26:01]
Nick Selby
I like that.
[26:02]
Nick Selby
Right.
[26:02]
Nick Selby
Like thinking about ways that you can keep tabs on things just the way you keep tabs on other things within your organization.
[26:10]
Nick Selby
Like, just because it's AI doesn't mean that it's either safe or correct.
[26:16]
Viktor Petersson
Talk a bit about red teaming and AI in general.
[26:19]
Viktor Petersson
I'm curious, like, you've gone down this rabbit hole a bit, right?
[26:22]
Nick Selby
Oh yeah.
[26:23]
Viktor Petersson
Even redefining like a bit of a safety revisionism, I think you called it right.
[26:29]
Viktor Petersson
In terms of.
[26:31]
Nick Selby
All right, I didn't call it that.
[26:33]
Nick Selby
That was, that was Heidi Khalif and the AI Now Institute.
[26:37]
Nick Selby
But, but I agree with it totally.
[26:38]
Nick Selby
And if you.
[26:40]
Nick Selby
And we talk at 4.4con, there was a lot of people talking about different ways of tricking AI systems to give you stuff that the AI system want, that the maker doesn't want you to do.
[26:51]
Nick Selby
Unfortunately, the way the, the, the AI companies.
[26:56]
Nick Selby
And there's a paper on this, I hope you'll link to it.
[26:59]
Nick Selby
And there has been this change of what the words mean.
[27:07]
Nick Selby
And the best one is red teaming.
[27:09]
Nick Selby
Right.
[27:09]
Nick Selby
It's like we think of red teaming in the information security world as, you know, you get a bunch of people together and you, you shake something until you break it and then you show them how.
[27:16]
Nick Selby
And then the blue team fixes it.
[27:18]
Nick Selby
Right.
[27:18]
Nick Selby
Or that's doing both really.
[27:21]
Nick Selby
With AI, it's like, let's run a bunch of tests to make sure that this thing won't tell you how to make an ied.
[27:27]
Nick Selby
And it sounds like.
[27:28]
Nick Selby
And when they talk about vulnerabilities, when they talk about safety, they're using it in completely different contexts.
[27:35]
Nick Selby
I talked about this at 4.4con, where I asked Claude the Anthropic LLM, right.
[27:40]
Nick Selby
I asked it to talk to me about red teaming in the anthropic context.
[27:44]
Nick Selby
And it said, well, I really don't know anything about that.
[27:46]
Nick Selby
I'm like, wait a minute, what?
[27:48]
Nick Selby
And it sent me to their documentation and in their document.
[27:52]
Nick Selby
Exactly.
[27:52]
Nick Selby
All of this stuff.
[27:53]
Nick Selby
Right.
[27:53]
Nick Selby
And even if you get through all of the security stuff.
[27:56]
Nick Selby
So like what.
[27:56]
Nick Selby
I guess the main thing that we're warning people is don't let the words.
[28:00]
Nick Selby
Don't, don't just hear the words and assume that you know what the words mean.
[28:04]
Nick Selby
Really understand the context of how the words are being used.
[28:06]
Nick Selby
And then when, once you start looking at the real results and you've metaphor mapped it out so you understand what we're talking about.
[28:17]
Nick Selby
The other danger that we've seen is that, yeah, health and safety in this AI context really is the kind of the same thing.
[28:26]
Nick Selby
Is it going to go on racist screens?
[28:28]
Nick Selby
Is it going to try to convince you to kill yourself?
[28:31]
Nick Selby
Right.
[28:33]
Nick Selby
A lawyer who is looking at this from a procurement standpoint might think that when they see some words like health and safety that they're thinking about product liability and sort of standard terms that are used describe the way the things that lawyers are looking for.
[28:49]
Nick Selby
So again, we have to metaphor map on the legal side as well.
[28:53]
Viktor Petersson
And I think, yeah.
[28:54]
Nick Selby
Take nothing for granted here is really.
[28:55]
Viktor Petersson
That these safeguards are not to perfect, protect your data, they are to protect their models.
[29:02]
Nick Selby
Right.
[29:03]
Viktor Petersson
And I think that's the big thing to drive home here.
[29:06]
Nick Selby
And that.
[29:07]
Nick Selby
Well, the data inside their models and.
[29:09]
Nick Selby
Yeah, yes.
[29:11]
Nick Selby
It doesn't mean what you think it means.
[29:14]
Nick Selby
And I think it's so.
[29:15]
Viktor Petersson
Important to emphasize that because when you read, particularly you read the security notes, that it's not about you, it's about them.
[29:23]
Viktor Petersson
It's about them preventing PR disasters and preventing their models to be leaked against their competitors.
[29:30]
Nick Selby
Right.
[29:34]
Nick Selby
And I think that there's a lot of that when we hear people talking about AI security, first of all, they're talking about people who leverage AI to conduct better attacks.
[29:43]
Nick Selby
That's important that we understand that.
[29:45]
Nick Selby
And that's a really important field of study that I'm completely uninvolved with.
[29:49]
Nick Selby
And then there's the people who are saying, how could somebody steal our stuff?
[29:53]
Nick Selby
How could somebody subvert what it is that we do?
[29:55]
Nick Selby
On the, on the AI side, again, totally separate.
[29:58]
Nick Selby
I'm, I am mainly focusing on just.
[30:00]
Nick Selby
All right, with all that stuff going on, how does the average CEO, the average non technical or somewhat technical CEO who's getting pressure to do this, what are the Things that they need to think about when they're trying to implement this and at least limit or understand the downside so that they can experience better upside that you drove home.
[30:21]
Viktor Petersson
I think which is important as well, is simply find a language, right?
[30:25]
Viktor Petersson
And when you speak into these higher level decision makers that are presumably not from Tech.
[30:31]
Viktor Petersson
Org or even a CISO who might not be that technical because they are more from the policy side than the technical side, like driving home and simplifying the language is very paramount in terms of making sure you get your point across rather than acronym laden whiteboarding about.
[30:51]
Nick Selby
Oh yeah, I mean, I think one of the things threat models really help like formal threat models and risk mapping.
[31:00]
Nick Selby
And I understand that some in the threat model world don't really put too much faith in risk mapping.
[31:07]
Nick Selby
It's really, it's good visual, it helps executives understand kind of the, you know, traffic light or T shirt size of what it is that we're talking about.
[31:16]
Nick Selby
But when you are, when you are talking about identifying the threats that are tied to the implementation of a certain tool, certain piece of software that you're integrating into your systems and data, suddenly a lot of kind of theoretical stuff really comes into focus.
[31:36]
Nick Selby
We were doing one and I really liked this where it's a company that's very aggressively AI forward.
[31:42]
Nick Selby
They, they really are pushing people to find better use cases.
[31:46]
Nick Selby
And the question, there were questions around certain things that they wanted to integrate.
[31:53]
Nick Selby
And once we started going through the threats and we started going through the cost of the, of a mistake in this field, right?
[32:02]
Nick Selby
Like if you get this wrong, here's what could happen very quickly.
[32:06]
Nick Selby
And the senior executives were like okay, wait, what was the use case again?
[32:11]
Nick Selby
Why did we want to do this?
[32:13]
Nick Selby
Like, and we brought them like, and we did a really, I think fair job of saying look, it's really cool what your people want to do.
[32:21]
Nick Selby
I can understand it.
[32:22]
Nick Selby
But because of all those risks being identified and because they were high or very high, they actually started to split the difference and ask for, for mitigations.
[32:33]
Nick Selby
I am a real proponent by the way.
[32:34]
Nick Selby
If you're using chat, GPT Enterprise, they have the OpenAI compliance API and it's very, very powerful.
[32:47]
Nick Selby
But, but you can in fact go in only, it's only for enterprise customers, but you can actually write a tool to go in and take a look inside.
[32:55]
Nick Selby
You could force it to change data retention.
[32:58]
Nick Selby
You can ask it for certain Types of data, certain kinds of uploads.
[33:03]
Nick Selby
You can look for patterns within the data.
[33:06]
Nick Selby
It's a really great way to test other things or to just reduce your risk of stuff that you're keeping in there.
[33:14]
Nick Selby
And again, once you've done the threat model, that should inform where you might consider mitigations that could at least act as compensating controls, at least as early warning systems that something is wrong.
[33:26]
Viktor Petersson
It's a, is a concept that I think most people in TechCard are familiar with.
[33:29]
Viktor Petersson
But when you going in there like you want to do like a rudimentary, so imagine our listeners want to do like a rudimentary threat modeling off of some service they write about.
[33:38]
Viktor Petersson
They have some, they have some buy ins from some stakeholder.
[33:40]
Viktor Petersson
They want to deploy something.
[33:42]
Viktor Petersson
How do you go about, like, how do you decide like the first like few hours of a threat modeling?
[33:46]
Viktor Petersson
Like if you want to have like a really rudimentary trep modeling model, Is there any methodology you follow?
[33:51]
Viktor Petersson
How do you go about doing these threat models?
[33:57]
Nick Selby
You know, it's funny because Adam Szostak just, he made it so easy and we actually sent several of our folks to Adam's classes in Barcelona.
[34:06]
Nick Selby
And I really like that, you know, what are we working on?
[34:08]
Nick Selby
What can go wrong?
[34:09]
Nick Selby
How do we know if we did a good job like these?
[34:11]
Nick Selby
The really basic questions when you think about, it's like what is this thing connected to and what happens if that goes wrong?
[34:20]
Nick Selby
Right?
[34:20]
Nick Selby
What can go wrong?
[34:21]
Nick Selby
What are some of the things using the stride framework?
[34:25]
Nick Selby
What are some of the ways that people could do spoofing?
[34:27]
Nick Selby
What are some of the ways that people could gain access in a way that's not intended.
[34:33]
Nick Selby
And then as you think about those things, asking the team to come up with proposed mitigations along with, and I find this really important proposed mitigations and statements about the requirements to maintain those mitigations over the course of the lifetime of this thing, right?
[34:53]
Nick Selby
Because it's not like you fix it now and then it's done.
[34:55]
Nick Selby
It's, you really have to have teams looking at these things regularly and making sure that your mitigations are still working.
[35:01]
Nick Selby
Right?
[35:01]
Nick Selby
So, so there has to be ownership.
[35:03]
Viktor Petersson
And that's obviously of that.
[35:05]
Viktor Petersson
If you come from the startup world, it's very different than if you were in enterprise.
[35:09]
Viktor Petersson
We have earmarked security teams that can like dedicate all your efforts to just doing red teaming, blue teaming or whatever it might be.
[35:16]
Viktor Petersson
Right.
[35:16]
Viktor Petersson
But something like, I think it's important.
[35:19]
Nick Selby
To like yeah, I'VE never worked there, by the way.
[35:23]
Nick Selby
Like, I've never found that company.
[35:26]
Viktor Petersson
Whereas, whereas in Saraplan, even if you have a few hundred people, they rarely have an earmarked department for just doing this.
[35:37]
Viktor Petersson
Right?
[35:38]
Viktor Petersson
So.
[35:40]
Nick Selby
Right.
[35:40]
Nick Selby
And oh, by the way, that's why the ownership is so important.
[35:43]
Nick Selby
Right?
[35:43]
Nick Selby
Because most of the time security actually doesn't own the assets that they're trying to help defend.
[35:49]
Nick Selby
Right.
[35:49]
Nick Selby
That they need to beg, borrow and steal.
[35:52]
Nick Selby
But if they're not very explicit about the things, you know, security shouldn't be accepting risk on behalf of the business.
[35:59]
Nick Selby
They should be, they should be articulating what the risk is, proposing mitigations, but then also proposing ways to make it very clear, okay, the business wants you to do this.
[36:10]
Nick Selby
The business is saying that this is how you mitigate it.
[36:12]
Nick Selby
We think that this is the right team to do that.
[36:15]
Nick Selby
We're not telling you how to do it, we're just saying they are.
[36:17]
Nick Selby
We will audit it when they're done.
[36:19]
Nick Selby
We will create the security requirements before they start.
[36:22]
Nick Selby
But, but this isn't on the information security team because we can't make those changes.
[36:28]
Nick Selby
Right.
[36:28]
Nick Selby
And so being really explicit about that.
[36:30]
Viktor Petersson
This is so much bigger, right?
[36:31]
Viktor Petersson
Because I mean, I, to me, security is not a job function, it's a culture function.
[36:38]
Nick Selby
Right.
[36:38]
Viktor Petersson
Security must be like, it must be drawn at every level.
[36:42]
Viktor Petersson
I mean, it's not like it's not one person's responsibility to do security because that's a surefire way to fire fail at security.
[36:50]
Viktor Petersson
Right?
[36:51]
Nick Selby
And yeah, yes, by the way, there are many others.
[36:56]
Nick Selby
But yes, that is one good one, surefire.
[37:01]
Viktor Petersson
One of the things, one of my pet peeves or one of my issues I have in the industry is an over index on compliance frameworks like SoC2 and ISO.
[37:11]
Viktor Petersson
Right.
[37:11]
Viktor Petersson
And yeah, it's just like, oh God, yes.
[37:15]
Viktor Petersson
I'm sure we've both seen so many spectacular failures when it comes to common sense security conducted by companies that have all these badges, right.
[37:24]
Viktor Petersson
And they're like, cool.
[37:26]
Viktor Petersson
How did this happen?
[37:27]
Viktor Petersson
Oh, well, it happened because most of these frameworks are documentation exercises, not actually really cultural changes in the complex.
[37:34]
Nick Selby
Right.
[37:37]
Nick Selby
I mean, documentation is important.
[37:41]
Nick Selby
But yeah, no, and we agree, like, it's just that it's not everything.
[37:46]
Nick Selby
And it is very possible to get a SoC2.
[37:50]
Nick Selby
And with Judicious setting of scope and depth, you can end up putting lipstick on a pig.
[38:00]
Nick Selby
You really can.
[38:01]
Nick Selby
I mean, I do think that part of the Problem is the way, the way we conduct third party risk is still, you know, not very good.
[38:11]
Nick Selby
And based on the spreadsheet rodeo and it's been like that for years.
[38:16]
Nick Selby
We now that we start to see.
[38:19]
Nick Selby
What I really like is the trust centers that we're starting to see with vendors like Vanta Security, Pal.
[38:24]
Nick Selby
Like vendors who are giving better visibility into.
[38:28]
Nick Selby
Right?
[38:28]
Nick Selby
Here's our documentation, you can download it.
[38:30]
Nick Selby
Here's our policies, you can download that.
[38:32]
Nick Selby
Here's a real time look at what our company is doing right now.
[38:35]
Nick Selby
If you take a look at the trust center for Sublime Security, right.
[38:38]
Nick Selby
I think it's Trust, Sublime Security and it's really nice because you can start to get a sense of what it is that they're saying that they have, which is great because now you can ask the questions that are left out without having just to look at a spreadsheet.
[38:51]
Viktor Petersson
I wrote a blog post a few weeks ago about.
[38:54]
Viktor Petersson
So in screen the amount of company we do signage.
[38:57]
Viktor Petersson
Right.
[38:57]
Viktor Petersson
And, and my, the op ed piece there was about signage players being completely out of scope.
[39:05]
Viktor Petersson
So like all these guys are they are SOC2, ISO competitor compliant competitors.
[39:11]
Viktor Petersson
But then you actually start to poke a bit on that and it's like wait, you're running an EL Android device and you're still compliant and this is when you realize like wait, this is.
[39:23]
Viktor Petersson
Well that's where you realize it's out of scope.
[39:24]
Viktor Petersson
Right?
[39:27]
Nick Selby
SoC2 is.
[39:28]
Nick Selby
SoC2 is basically judging you against your own policies.
[39:31]
Nick Selby
Right.
[39:31]
Nick Selby
And so you can have a dumb policy and if you're compliant, you're good.
[39:35]
Viktor Petersson
It's really IoT.
[39:38]
Viktor Petersson
It doesn't actually include IoT devices.
[39:40]
Nick Selby
Right.
[39:41]
Viktor Petersson
So you could be like an IoT vendor.
[39:42]
Viktor Petersson
And this thing, the thing that you sell is not in scope for the compliance framework.
[39:48]
Nick Selby
Yeah, right.
[39:50]
Nick Selby
You're talking about your corporate network is very nice and serenely secure.
[39:54]
Nick Selby
Right.
[39:54]
Nick Selby
But, but this thing that we just sold you that you.
[39:58]
Viktor Petersson
Know, why are we indexing so much on like security tick box.
[40:02]
Viktor Petersson
But actually it's a culture thing inside the company.
[40:05]
Viktor Petersson
Do we actually care about this stuff?
[40:07]
Viktor Petersson
Right.
[40:07]
Viktor Petersson
And with me that's so important.
[40:08]
Viktor Petersson
Important.
[40:09]
Viktor Petersson
Right.
[40:12]
Viktor Petersson
Yeah.
[40:13]
Nick Selby
But I'm sorry, I just want to add one thing.
[40:14]
Nick Selby
Like you can tell the companies that really care about this.
[40:19]
Nick Selby
I mean when you run across them.
[40:21]
Nick Selby
I just, I just mentioned Sublime, by the way.
[40:23]
Nick Selby
I should mention I, I never ever get referral fees.
[40:26]
Nick Selby
I'm not like, I'm not.
[40:27]
Nick Selby
I, I've mentioned a couple of product names I, I've never get referral fees.
[40:32]
Nick Selby
It's something that I've never done.
[40:34]
Nick Selby
So when I say it's just because I think it's good when you talk to a company that's truly squared away and you take a look at what it is that they do.
[40:44]
Nick Selby
The risks are, the risks are there.
[40:46]
Nick Selby
The impact of the risk is still as high as it would be.
[40:49]
Nick Selby
Right.
[40:49]
Nick Selby
But the likelihood is just continually reduced based on the program that they have.
[40:56]
Nick Selby
And it becomes easier to see once you've asked the right questions, not just give me your sock too.
[41:02]
Viktor Petersson
You are an American who relocated to Europe.
[41:04]
Viktor Petersson
So now that you are based in Europe, you are probably been a lot more exposed to cra, which is on the horizon.
[41:12]
Viktor Petersson
Speaking about holding vendors kind of accountable to what they're actually selling, what's your take on this?
[41:21]
Viktor Petersson
How do you see this shaping the industry?
[41:26]
Nick Selby
I think it's always really hard to do when you've got well intentioned regulators or industry bosses, bodies that are trying to force a cultural change, force a business change.
[41:38]
Nick Selby
Right.
[41:38]
Nick Selby
And the kind of resentment that is, I always.
[41:43]
Nick Selby
Well, the resentment that comes across because it's seen as yet another one of these dumb frameworks that cost me money and time.
[41:51]
Nick Selby
It doesn't give me any business value at all.
[41:53]
Viktor Petersson
Right.
[41:53]
Nick Selby
And I'm going to sort of do the least and the least possible to get through.
[41:59]
Nick Selby
Years and years ago, Josh Corman was saying that like it was expected to be the ceiling, but it's the floor.
[42:05]
Nick Selby
Or sorry, it was supposed to be the floor, now it's the ceiling.
[42:08]
Nick Selby
Yeah, thanks.
[42:11]
Nick Selby
And so all of.
[42:12]
Nick Selby
I think that we're going in the right direction.
[42:15]
Nick Selby
It's just we've got to find the right incentive mix to make it so that people understand that this is better.
[42:22]
Nick Selby
Gent, there's a number of different articles out there right now about this very thing and Chris Swan just did a very good webinar about this.
[42:33]
Viktor Petersson
For me, this really comes down to that security is a market failure.
[42:39]
Viktor Petersson
There is.
[42:40]
Viktor Petersson
If you, if you think about it, there is absolutely no incentive from a commercial perspective for a vendor to care about security because generally speaking that will not help their business.
[42:51]
Viktor Petersson
Right.
[42:51]
Viktor Petersson
So this is why we saw regulation in California for Iot many years ago coming through.
[42:57]
Viktor Petersson
Right.
[42:57]
Viktor Petersson
But generally speaking, I'm not a fan of heavy handed regulation.
[43:02]
Viktor Petersson
However, I'm a big fan of maybe there are issues with cra, but the gist of cra, I'm a big fan of, because without this it will never change.
[43:13]
Nick Selby
Yeah, we need change.
[43:18]
Nick Selby
I mean even I think GDPR drives many people crazy on the consumer and on the producer side it's just, it's very complex and there's so many ways to go wrong and when you get wrong it's just really a beating.
[43:32]
Nick Selby
And if you look at all the goals of it was incredibly laudable.
[43:35]
Nick Selby
It is, it's really around the human right of controlling your data.
[43:41]
Nick Selby
How do you do that correctly out of the gate?
[43:43]
Nick Selby
You know, what is it, six years in, eight years in?
[43:46]
Nick Selby
It's, they're not doing so badly.
[43:48]
Nick Selby
If we could reduce some of the.
[43:49]
Viktor Petersson
If we could only remove the cookie.
[43:50]
Nick Selby
Cuts, some of the, remove the cookie.
[43:52]
Viktor Petersson
Butter, then we repeat a good law.
[43:57]
Nick Selby
Yeah, well, it's not even the cookie banners.
[43:59]
Nick Selby
It's like, you know, I do like, for example, I like the idea that you've got a set number of hours once you determine that you've got a data breach to figure it out and let people know that they could be in danger.
[44:11]
Nick Selby
I like that.
[44:12]
Nick Selby
I've never heard of them not extending, you know, if you go to the commissions and say like hey, we just had a breach, we're trying to get our arms around this, we're not going to have it done.
[44:22]
Nick Selby
I'll, you know, I will update you in 24 hours about what our progress is.
[44:26]
Nick Selby
We're going to do this as fast as possible.
[44:28]
Nick Selby
They're like, yeah, that's fine, that's consistent.
[44:31]
Nick Selby
And so I kind of, I wish it could be simplified.
[44:35]
Nick Selby
And I mean the fast tracked a little bit because it's also by the way, ask a lawyer and a business person and an operations technology person to sit there and talk about is X PII covered by gdpr.
[44:49]
Nick Selby
You'll get five different answers and then they'll start arguing because it's just, it's really hard.
[44:57]
Viktor Petersson
Right?
[44:58]
Nick Selby
There you go.
[45:00]
Nick Selby
An obfuscated IP address.
[45:01]
Nick Selby
Well, what's the business use case?
[45:03]
Nick Selby
Oh God.
[45:03]
Nick Selby
All right.
[45:04]
Viktor Petersson
I mean for me there are some good things.
[45:09]
Viktor Petersson
We all see how, what the dot when the dust settles, how CRA will help us.
[45:15]
Viktor Petersson
But I mean for me there's a big focus on SBOMs in CRA.
[45:19]
Viktor Petersson
Right.
[45:19]
Viktor Petersson
And that's one of the things that I am a big proponent of.
[45:23]
Viktor Petersson
Not because I think SBOMs are exciting per se, but they're a litmus test if you know what you're doing as a Supply chain provider.
[45:33]
Nick Selby
I mean I'm so happy that you say that because yes it is.
[45:37]
Nick Selby
And it's funny because like when I ask for an SBOM and it's not often but when I'll, when I say to a vendor like I need to see your SBoM, we've just started negotiating at that moment because the time it takes you to turn around and give it to me is something that I notice and it is very clear the people who can push a button and say here versus oh, okay, I'm going to get back to you after I have five stand ups and get all the different teams together and you know, we're going to cobble it together and Maybe see if GitHub can help us out.
[46:03]
Viktor Petersson
It's not even like yeah, we all know that people have been spawn well for a while.
[46:07]
Viktor Petersson
We like the quality will vary but the fact that you can at least generate something tell volume to your supply chain.
[46:16]
Viktor Petersson
Because if you cannot, that should be a very big red flag.
[46:22]
Nick Selby
I mean.
[46:25]
Nick Selby
And, and we're having conversations about this around sell side and buy side due diligence.
[46:33]
Nick Selby
It always surprises me that this doesn't come up like it seems to be sort of tacked on to the end of.
[46:38]
Viktor Petersson
Yeah.
[46:39]
Nick Selby
Of due diligence conversations.
[46:40]
Nick Selby
Right.
[46:40]
Nick Selby
But there's a lot of rich, it's a target rich environment to go into a company that wants to be acquired and start looking at the way they do things and how much will it cost to do this in the same way.
[46:57]
Nick Selby
And it's a very important thing.
[47:01]
Nick Selby
I can't, I can't say that it's taken off and, and we see much more of that.
[47:06]
Nick Selby
I really can't in terms of, in you know, acquisition due diligence.
[47:10]
Nick Selby
But I mean I know it's like.
[47:12]
Viktor Petersson
A pretty bin in acquisition discussions where Aspen's been part of that question.
[47:16]
Viktor Petersson
So that it is happening, right?
[47:18]
Viktor Petersson
Yeah.
[47:19]
Nick Selby
Oh yeah.
[47:23]
Nick Selby
I was actually speaking a little bit beyond S bomb.
[47:26]
Nick Selby
Like and especially when you start getting into like what's your secret sauce?
[47:30]
Nick Selby
What's the, what's the thing that you do that's most important?
[47:34]
Nick Selby
Like let's dig into how you are delivering that and let's you know, walk me through your entire CI.
[47:41]
Nick Selby
Those kinds of questions are really quite excited about.
[47:44]
Viktor Petersson
Getting more and more excited about this is on the procurement side and using SBoMS for the procurement side of things in terms of like Third party management platforms been around for ages.
[47:55]
Viktor Petersson
And anybody who had the unfortunate luck to sit and work with any of them know that they are a pain in the ass to work with.
[48:03]
Viktor Petersson
All of the one you've exposed work with and they're essentially glorified Google forms.
[48:08]
Viktor Petersson
Right?
[48:09]
Viktor Petersson
Most of them.
[48:10]
Viktor Petersson
And nice of this stuff.
[48:13]
Viktor Petersson
Well, not a lot of it could probably be automated with just S boms, which is kind of a big part of it at least.
[48:22]
Nick Selby
Yeah, you're reminding me of this is orthogonal to that.
[48:26]
Nick Selby
But, but one of the biggest things that I am a proponent of, every CISO I know has suffered from this, including me, third party risk management inside an organization, you know, there's kind of a predictable life cycle.
[48:42]
Nick Selby
It's like somebody wants to get something.
[48:44]
Nick Selby
They get, you know, Gartner reports and in flight magazines and they, you know, they make their list of five and then they come down to a list of three.
[48:52]
Nick Selby
Then they get to the part of a list of two and they want to do a bake off.
[48:55]
Nick Selby
And at that point is when people start to get a little bit serious about it.
[48:59]
Nick Selby
And by the time the security team is read into this, the decision's really already been made.
[49:06]
Nick Selby
The business decision of this is the tool that we want has really already been made without the benefit of that for the procurement side.
[49:13]
Nick Selby
So I think that that's key.
[49:14]
Nick Selby
And also on the like, if you are talking to your customer and your customer is sending you that spreadsheet from hell, this is the biggest burden I think, to, to CISOs.
[49:29]
Nick Selby
You typically get a spreadsheet with, you know, 80 to 300 questions and probably 30% of them are actually hardcore information security questions.
[49:39]
Nick Selby
And a lot of them are engineering questions, operations questions, SRE questions.
[49:43]
Nick Selby
They're, they're, how do you put stuff together?
[49:45]
Nick Selby
But most companies throw this at the CISO organization because, oh, it's security.
[49:51]
Nick Selby
There's stuff in there about firewalls, so it must be you.
[49:53]
Nick Selby
And so you end up with your team spending, you know, all this time getting training and getting experience and then they become spreadsheet jockeys.
[50:03]
Nick Selby
And if you do the analysis of the pipeline that they're unlocking and the kind of the work that goes into it, they're spending an awful lot of their time doing that.
[50:14]
Nick Selby
I have encouraged CISOs to bump that out to the sales organization.
[50:19]
Nick Selby
That's a sales process, that's a sales supporting thing.
[50:23]
Viktor Petersson
It's not information compliance tool now called Valve and actually one of the cool thing they do and one of the reasons why we got really kind of hooked on it was they obviously how all your compliance documents so your SOC2 ISO fed like or whatever it may be, right.
[50:38]
Viktor Petersson
So they have all those documents but then they have a really cool thing which is like when you get that dump of three hour questions they have a tool that allows to enter the question, answer the question based on your documents.
[50:52]
Nick Selby
I've heard this threatened before by other vendors and they've never actually shown me it working.
[50:57]
Nick Selby
If you know of it, if Valve is doing it, I am.
[51:00]
Nick Selby
Yet let me know.
[51:00]
Nick Selby
I want to check it out because.
[51:01]
Viktor Petersson
Because we're still in the process of migrating to them.
[51:07]
Viktor Petersson
Yes that's from our.
[51:08]
Viktor Petersson
Like they cannot do this.
[51:10]
Nick Selby
Yeah, Vanta cannot do this.
[51:13]
Nick Selby
But what Vanta can do is make it super simple for again I'm not, I don't get any money from Vanta.
[51:18]
Nick Selby
But, but Vanta and Vanta like things right?
[51:21]
Nick Selby
You know, suck stuff out of Osquery, put it into a database, mix it up with the questions that it's supposed to be tied to.
[51:26]
Nick Selby
Give it to somebody.
[51:27]
Nick Selby
Right.
[51:27]
Nick Selby
They're really cool.
[51:30]
Nick Selby
If you've, if you've got that your trust center can take care of all of the sort of low level customers here.
[51:37]
Nick Selby
All the answers to your questions that are reasonably asked are right there.
[51:40]
Nick Selby
If you're, most of the time during audit that's when it's really valuable.
[51:44]
Nick Selby
Instead of having to run around begging people please sir, may I have a screenshot?
[51:47]
Nick Selby
You just give your auditors, don't give me the login and they can go and check the information that they want.
[51:53]
Nick Selby
Yes, screenshots.
[51:55]
Viktor Petersson
Yeah because that kid so like faked.
[51:59]
Viktor Petersson
Yeah.
[52:00]
Nick Selby
I'm holding up today's newspaper and here's the like but like, and the, the one thing that I really thought was cool in the Vanta Trust center is that if you go out of compliance it's not going to turn the thing red, it's just going to take it off.
[52:12]
Nick Selby
It's just going to take it off the list until you fix it.
[52:15]
Nick Selby
Now you'll get a message on the back end but customers coming in, they won't see that, you know, all of your machines are running EDR and like they won't see that.
[52:23]
Nick Selby
It'll just be.
[52:24]
Nick Selby
And then they have to ask it.
[52:25]
Nick Selby
So you have a good incentive to get it fixed fast.
[52:27]
Nick Selby
Otherwise you're going to have to be answering those questions.
[52:29]
Viktor Petersson
I mean the security sensors, they are becoming the norm and I don't think it's a bad thing.
[52:32]
Viktor Petersson
I think it's actually the putting that as a sales tool is actually really powerful.
[52:36]
Viktor Petersson
And I, I think we are at a pivotal moment in the software industry where we are start to see the right questions being asked and that was not the case.
[52:45]
Viktor Petersson
Maybe it was the case for the more sophisticated enterprise buyers, but now it's like moving its way into the mid market and even lower than that.
[52:53]
Viktor Petersson
I think that's a really good change.
[52:58]
Nick Selby
But, and it's something that you said, right?
[52:59]
Nick Selby
It's like you're buying an IoT device.
[53:02]
Nick Selby
Security is this big mystery and it really shouldn't be.
[53:06]
Nick Selby
Right.
[53:06]
Nick Selby
Security should be an expectation.
[53:08]
Nick Selby
If, if you believe that security should be an expectation, then these trust centers that we're talking about and that ability for a customer to see exactly what's inside the tin, they're super important and they are sales functions and they should be intimately integrated with the sales overlaying.
[53:26]
Viktor Petersson
Lifestyle security as a culture that spans sales and engineering.
[53:31]
Nick Selby
Right?
[53:34]
Nick Selby
And if you can show that like, look, we do care about it.
[53:37]
Nick Selby
Here's, here's how much we care about it.
[53:39]
Nick Selby
We knew that you'd ask that and here's the answers in plain English with color coding.
[53:45]
Nick Selby
And I mean that is, I think that's a real advance and now we just have to make it more ubiquitous.
[53:51]
Viktor Petersson
Nick, we're almost running out of time here.
[53:53]
Viktor Petersson
Before we wrap up today, I do want all your time limits today and is there anything you want to shout out about things where people learn more about you or things you are excited about that you want to share with the viewers before you wrap up today?
[54:08]
Nick Selby
I mean, you and I have talked a little bit about security, communications, breach communications and we work closely with Melanie Ansign and I just love the way she frames the world.
[54:20]
Nick Selby
And recently we've had a couple of, let's just say less than overly disclosing posts about things when you don't disclose the details of how something happened.
[54:37]
Nick Selby
Right.
[54:37]
Nick Selby
And I think you and I talked about this like there is a big difference for me as a user of your product to know that you know a rogue privileged insider who was very upset about something, you know, stole some credentials and did something.
[54:50]
Nick Selby
Right.
[54:50]
Nick Selby
It's not a great look, but at least that's a little bit different in terms of how I'm thinking of whether this truly affects Me.
[54:57]
Nick Selby
Then there were all these vulnerabilities and total strangers came in over the public Internet and popped them open and stole everything that they had.
[55:04]
Nick Selby
And then they went on and knocked out.
[55:06]
Nick Selby
Right.
[55:06]
Nick Selby
So now what if you're not telling me exactly how these people got in, exactly the scope of the damage, exactly what they did.
[55:13]
Nick Selby
Like, don't just say they took secrets.
[55:15]
Nick Selby
Why were there.
[55:16]
Nick Selby
Yet there were hard coded secrets in our source code that we hadn't done.
[55:19]
Nick Selby
Part of our incident response is that we are fixing them.
[55:22]
Nick Selby
We've hired these people.
[55:23]
Nick Selby
We're using, you know, truffle hog.
[55:25]
Nick Selby
And like you get the chance to say it.
[55:27]
Nick Selby
When you don't do that, then people are forced to go elsewhere for their information about you.
[55:35]
Nick Selby
And we've seen this.
[55:36]
Nick Selby
I was mentioning Salesloft and their disclosure, right.
[55:39]
Nick Selby
The, the Cloudflare disclosure about the Sales Loft breach was better and more helpful to me as a user than the Salesloft site itself.
[55:51]
Nick Selby
And so suddenly they have abdicated and let somebody else take control of their incident.
[55:58]
Nick Selby
That's not where you want to be as a company.
[56:02]
Nick Selby
You want to be helping your customers.
[56:03]
Nick Selby
And so we really recommend strongly that you consider when your lawyer says.
[56:10]
Nick Selby
We only say the very minimum.
[56:12]
Nick Selby
Right.
[56:12]
Nick Selby
If you're, if all you're worrying about is being sued, you're going to get sued anyway and all this stuff is going to come out in discovery.
[56:18]
Nick Selby
But if you put it forth in the name of being helpful to your customer so that they can defend themselves against something that you had happen to you.
[56:26]
Viktor Petersson
Yeah.
[56:26]
Nick Selby
Now they look at you as a partner.
[56:29]
Nick Selby
So I think that's, that's really important.
[56:31]
Viktor Petersson
The same thing called Cloudflare certainly do.
[56:34]
Viktor Petersson
Sales Loft probably didn't.
[56:37]
Viktor Petersson
So.
[56:39]
Nick Selby
Yeah, probably right.
[56:41]
Viktor Petersson
Thank you so much for coming on the show, Nick.
[56:43]
Viktor Petersson
Really appreciate it.
[56:44]
Viktor Petersson
And maybe back for a second episode at some point in the future.
[56:49]
Nick Selby
Thanks so much, Victor.
[56:50]
Nick Selby
I really appreciate it.
[56:50]
Nick Selby
It was a lot of fun.