0:00
and hello everybody you're very welcome to a new episode of redefining cyber security here on
0:05
ITSP magazine I'm Sean Martin your host and if you listen to the show you know I get to talk to
0:12
all kinds of cool people about cool topics and never a dull moment in cyber of course and to me it
0:19
always seems it boils down to telling a story whether you're telling a story to your team as a
0:25
seesaw trying to inspire them and empower them and to enable them or you're telling the story
0:30
upwards as a sock analyst to the seesaw or the seesaw up to executive leadership team it's about
0:38
telling that story with and without numbers with and without data with and without pictures but
0:44
in a way that connects and hopefully the idea that I believe is to drive some action right
0:50
any budget change how you look for you threat hunts change how we build products and deliver
0:57
services to our customers always about taking action and as the show is inspired to do by me
1:04
hopefully is due in a way that the business does it safely and protects the revenue and market
1:09
growth that it generates so with all that said I'm thrilled to have good friend Josh Mason on how
1:15
are you Josh you Sean I'm doing great it's good to see you my friend yeah and it was a nice
1:23
treat continue in New York City to be sides oh yeah yeah it was it was a good good event we spent
1:31
quite a bit of time hanging out together and meeting people and chatting with people and and
1:36
Huxley books on a Huxley Barbie puts on a good good event there for sure oh yeah agreed thanks
1:41
for letting me basically take it your whole day and that's one you didn't you didn't take my
1:48
whole day we enjoyed the day together and yeah it was fun Chris around saying hi to folks and
1:53
and here I'm what was going on and I was the the inspiration to have a chat and connected to
1:59
storytelling yeah one of the other things we got to talk about is speaking security with a
2:04
business accent I kind of like how you spend that there we we talk about language
2:10
of security to the business or language business language and security and trying to make
2:14
that connection but I like the accent because it it's the same thing it's just connecting and yeah I
2:22
don't know I want to get your perspective I can have some ideas but before we get into it though Josh
2:27
maybe a few words about what you've been up to and what you're working on these days yeah so right
2:33
now my my day job is lighting federal sales at act where we sell pen testing and I'm on the federal
2:42
sales team so to the federal government pen testing its scale supplementing in house penetration
2:50
teams but I'm always busy doing a lot of other things it looks like you have pointed out I run
2:58
and on profit new village where it's I call it the tutorial version of defcon or the on ramp of
3:06
defcon and we had our our first year this past August and that went swimmingly and had a meeting
3:13
last night we're already prepping for the submission which we won't be submitting until February but
3:21
we already have our ideas put together of what we want to do for this next year and yeah
3:28
but I've got a an Air Force pilot and several for a background and grabbed an MBA along
3:35
the way and then finally got into cyber and so I I look at things and think about things a lot
3:40
different than a lot of other folks that I work with what I've learned yep yep which is
3:47
which is really cool and I mean you're you're a busy guy I know you're you're at a lot of
3:52
conferences you have a lot of conversations with folks and you give back tremendously to the
3:58
community which I'm sure people appreciate to where the beneficiaries of the work do you do
4:04
yeah so all the good stuff you do for for the the community tell me tell me Josh what
4:12
you have a book that's that you put together kind of tell us what that's about and kind of the
4:17
catalyst for why you decided to write the book yeah I was giving some talks this past spring
4:25
and kind of things that I've learned from translating my what I've learned in from being a pilot
4:36
to some takeaways that I think a lot of cyber security folks can can utilize upwards communication
4:43
things along those lines and I I've recently identified that I'm autistic and for me a manual
4:52
that tells me how to do things is quite helpful and so in working with other people a book like
5:00
Dell Carnegie's how to win friends and influence people and then books like the Phoenix Project
5:06
and the goal which show how do we tie in the work that we're doing in one department with the Phoenix
5:13
Project in IT and then cyber security how do we tie that into what marketing and finance and operations
5:21
are doing ends up creating a everyone hates the word synergy because it's not the 90s anymore but it
5:28
does it creates this holistic everyone's trying to meet the mission mindset and that's what I'm
5:37
used to from the Air Force didn't matter where you went on base if you knew it was a a base where
5:45
you've got planes that fly in the end everyone knows that they're part of that mission of moving
5:52
things or you know planes getting off the ground even if they're a guard at the gate they've got
5:59
a thing to do but part of their job is getting things off the ground so I had been giving talks
6:06
along those lines of if you want to have your penetration test results your your report have some
6:14
impact knowing that I was going to a conference with a bunch of penetration testers I decided to
6:20
Dell Carnegie principal speaking in terms of the other person's interest pen testers speak of
6:26
pen testing if you want your results to be useful and be taken and utilized rather than having the
6:33
same results year after year after year can we frame things in our executive summary so that
6:40
they make sense about the business because the vulnerability is themselves and how you write those
6:46
up I'm sure they're going to be useful for the engineer who will work on them and they'll be
6:52
technically sound so that if they get to a Dell ops person they'll be able to fix it however
6:58
are they going to get prioritized are they going to get budgeted are those things going to matter
7:03
and how we write the report can help the team who is paying for and receives that report and
7:12
if they can then take that and pass it along so that it becomes effective on its own we as there
7:20
you know the pen tester can be part of that process and using that framing for the overall idea
7:29
for those talks kind of was the catalyst because at the end of the talk I presented a lot of these books
7:35
a lot of these ideas a lot of the concepts of how do we frame things and put them in those terms
7:41
and they said well this is great I've got some good notes but what else do I do and that
7:49
kicked my brain into gear and I went I guess I need to write the book and so I went home and I did
7:57
that I just just like that well I have the notes which is yeah what I guess that it's an
8:07
interesting good good point and that you have the knowledge right it's not just going and digging
8:13
up a bunch of stuff and pulling it together you have you have the knowledge and the experience and
8:18
and have had these conversations on these presentations I'm sure speaking with folks after you
8:23
present they validate some of your thinking they they probably share some of their own stories
8:28
which connects you to their business to confirm that what you're saying actually can translate and
8:35
fit into an organization's program so tell me so you when you're giving the example of pen testers
8:44
and pen testing and and that is the book it's not specific to pen tests right no so so who's it
8:53
for kind of give me the structure of what's in there and what people can find yeah I really liked
9:01
the way the goal and the Phoenix project and the unicorn project were written in that they share
9:07
principles without being boring they are not textbooks they're fiction they're literature there's
9:15
a story and a plot and a character and I went I that is not my strength but I do have my undergrad
9:25
in humanities and it's 2025 so with a you know $20 a month editor to help me out with this dialogue
9:36
stinks please help me make it better page by page by page actually made a pretty decent story
9:43
of a sizo at a company who realizes that their team is ineffective in communicating with one
9:50
another is ineffective with communicating upwards and outwards and shares principles with both the
9:59
team with colleagues with the board and then eventually outward as ironically I don't want to give
10:06
up the plot as as their career grows and they face new challenges taking it beyond their organization
10:14
realizing that they get to grow as a leader as well so multiple learning points there if you've
10:21
read deal Carnegie a lot of the point and you've put those things into practice a lot of it is going
10:28
to look very familiar if you've studied for an MBA a lot of the things are going to look very familiar
10:35
but the context for it might seem obvious and yet everyone that I've spoken to that's in a
10:45
leadership position that I've presented it to they go wow this I want to make my organization look
10:52
like this and that's one of those things that really makes me smile to hear I love that and without
11:01
giving away too much are there attributes or actions or other elements of security operations
11:13
programs say that you highlight changes so don't I don't want to give away the secrets but are there
11:21
yeah there are things that that you helped say yeah to your point if you if you write your
11:27
documents this way or if you build your your program this way if you hold your meetings this I
11:32
don't know how I'm making stuff up here but what are some of the things that you highlight
11:37
those areas for your potential improvement there's a little bit of tactical level presenting
11:46
some tactical ideas for options but nothing is you should do it this way it's we could do it this
11:56
way this way this way this way and we should choose it based off of what are we trying to achieve
12:02
as an organization both as our security organization but the security organization isn't an
12:11
ends in itself sorry throw on some philosophy because that's my my minor from undergrad
12:20
that's you Jay I know yeah so I was a safety officer as my first additional duty as a co-pilot
12:29
once they were cool you can land the plane you can take off the plane you can do all the things
12:33
that you're supposed to do as a co-pilot and now you need a job to do in the office because everyone's
12:39
got to have a job job to do when they're not flying which actually makes up 90% of your week so
12:45
I went to a safety school and I studied aircraft crashes miss apps it was a bit of crying a lot of
12:51
listening to black box tapes and seeing recreations of the crashes and knowing actually some of the
13:00
people involved and then going out to sites and seeing how an investigation would occur and knowing
13:07
how to manage a the whole process from a soup to nuts and then going back and being in charge
13:13
of a safety program for our unit and anything from a guy writing his motorcycle home from work one
13:20
day takes a curve wide and shatters his ankle and has a ground miss app that I have to file
13:29
because that counts under safety to bird strikes which happened way too often usually with no
13:36
issue but there's always the eagle over Arizona that goes into an engine and now we have to
13:43
it was a mess then he got to somehow get a new engine to some random airfield in Arizona and you
13:50
don't think that that's going to be a big issue but birds and engines is not a good thing
13:54
plants can end up in the Hudson and so with that while your mindset is on the worst case scenarios
14:03
that's not what you focus on all the time you do the work so that then everyone can focus on the
14:09
mission so it was never oh hey don't forget don't don't hit any birds instead it was we all know
14:17
that there is bird migration season and birds fly often at dusk and dawn and at these altitudes and
14:26
there's a lot of mission mitigation to take into it affect and you if you fly close to other
14:35
planes you fly close to the ground where you fly faster or slower in bad weather all these things
14:42
are less safe sometimes you have to accept safety for the mission or risk for the mission but
14:49
you're aware of it and then you make the mission happen and in the end flying becomes one of the
14:57
safest things it is the safest form of mass transportation and in the Air Force it is fairly safe
15:04
in the big scheme of things so in that same sense now take that to security
15:12
there is the mindset of don't get breached don't don't let your someone get your passwords don't let
15:18
someone get into the system and oh no we can't possibly have this be the situation we can't
15:26
possibly let this be the rules we couldn't possibly have that software or wait on this patch
15:32
because of the risk it's like well no that's not the case we now please inform us of the risk
15:40
let us know what the risk is let's be aware of the risk and let's not make the risk let's not
15:48
fear action thinking that we're all going to crash and die because otherwise we would never
15:54
do what we do so in that same sense excellent now we know now let's do the mission
16:00
and that's if we can frame things in those mindset and then now understand cool if we're going to
16:08
do this that in the other four of the business okay we want this to be the priority okay then let
16:15
me help if market share if this quarter we are we're coming up on Thanksgiving and Christmas if
16:23
it we're a retailer I'm pretty sure the big focus is going to be making sure that the website stays
16:29
up that shipping goes out that payment information is able to go through if I work in security for
16:37
a company that's a retailer then my focus is going to be on making sure that I provide all those
16:44
things to the organization as number one because I know that's what their focus is and so how can we
16:51
as security in the organization make sure that those are available for the rest of the organization
16:58
and yes we'll also make sure that we don't get breached but where's our biggest risk and what are
17:03
we most concerned about right now yep yeah I mean you know the birds are there he got he got to
17:11
got to be prepared so how in telling your story of analyzing incidents and
17:22
and funny I just use that word I was gonna say crashes but I use incidents because it sounds like
17:27
more than just crashes how because not not everybody who's flying gets to do what you did there
17:35
yeah but you brought back that understanding in a way that helps the team understand what you saw
17:43
and heard and watched and analyzed and and take that to help them not think about it all the time
17:52
but be understand and be ready for what might happen and I'm just trying to think connecting to
18:00
security things I know we spend a lot of time looking at kill chains and building playbooks for
18:05
response and and running pen tests looking for weaknesses where some of the stuff of a bird hits
18:12
here it's gonna do this bird hits there it's gonna do that but do we do a good enough job
18:19
doing the the postpartum of breaches and we don't we don't really share that information much right
18:26
so it's really hard to look look back at and say here you're the most here the 10 most common
18:33
ways companies are getting breached through fishing rents or whatever it is and and here's how
18:39
they responded and and here's what we can learn from that that's that's our risk that's what we
18:43
have to know and it's live and breathe and feel right it's tricky with aviation obviously the
18:54
FAA got put in charge of all of that and the NTSB National Transportation Safety Board and
19:04
back in before the the biggest crash biggest airline crash in history was in 1977
19:11
to Gujigapa in the Azores two seven forty sevens ran into each other on the runway because of
19:17
one couldn't see the other one and the run air traffic control cleared one well another was still
19:23
on the runway crossing and since then a lot has gone in to stop and it's like that from happening
19:30
again now that was hundreds of you know individuals lives we in security in cyber security we
19:42
have big issues crowd strike affected a lot of people solar winds affected a lot of people
19:48
i'm thinking back to some of the biggest worms and malware that stretch across the globe affected
19:54
a lot of people however the body count is one of those things that overall governments haven't
20:03
gotten to the point where they've decided okay we need to really strictly have something watching
20:09
over this and managing it there are things in place as a FBI things along those lines so in the
20:15
end what you end up with is we have some organizations like MITRE Verizon
20:24
Mandient who collect or the incidents that they're tracking the incidents that they manage the
20:30
incidents that they know about and put out trend reports and those are very helpful overall to
20:37
the rest of us and then there's the the blogs and the cyber threat intel that's available
20:46
openly and then paid for and that's also helpful and in the end i think that we do have quite a
20:53
lot of that information that we can work with if someone if an organization is willing to
21:02
open their eyes and look for it it's there so yeah i think we do do a pretty decent job of it
21:08
i would agree that we have we have a lot of data to review and analyze and ingest and
21:17
and take into our program i'm wondering are we are we making the most of that though and then
21:26
yeah i don't know maybe i don't know if it's the the creators of the content and the
21:31
research that i wonder they yes it's there but is there is there enough done to actually
21:39
create a safety team if you will in certain security using that data or they isn't on their
21:45
shoulders to do what you did and then bring it in to the organization it i think it comes down
21:53
a lot to individual responsibility in the organization and i think in the United States at least
22:03
there's going to always be that sense of it is out there and available forcing organizations to
22:14
utilize it i don't think we'll be taken well i couldn't imagine it being a very
22:22
popular motion i mean even things that are are popular right now aren't popular right now
22:30
you know what i mean facing this past month so it's i would love to see things like that seem
22:39
obvious like that put in place i just i think it is going to continue to come down to the to us
22:46
helping to educate and lead our colleagues to understand and then educate and raise others in
22:55
the industry and in the community to have that mindset and in that way we might be able to make
23:01
that change better than hoping that something happens from above yeah yeah i'm always hopeful that
23:11
that we we find that path to to do more and do better and make that connection i want to
23:18
as we begin to wrap here i saw post the other day and i commented on it it was not a cyber security
23:23
post i don't even think it was a technology post it was a just a general be a good person
23:32
in the business post and it was it was really about
23:35
i'll i'll include a link to it off the dig it up again but basically the the author she said
23:43
i spent so much time making sure i was extremely accurate and always right in my
23:53
driving of things with my team that i ultimately alienated my team and those around me so
24:04
i was always right but it didn't matter because i couldn't couldn't get anybody listen to me because
24:10
i was focused on being right and i i i bring that up because in near the description of your book you
24:16
says your security professional are tired of being technically right but strategically ignored
24:22
and i think it comes back to two things right the story what do you you speed spilling the the
24:30
feeds and speeds and numbers and and and digits or letters or are you focused on
24:38
telling the story that impacts the business and are you doing it in a way that it isn't
24:44
look how smart i am but in a way that says i'm generally concerned with the business so
24:52
you're given the the post that i saw about focusing on being accurate all time and kind of losing
24:58
losing the connection and the relationships how does that relate back to the book and what you're
25:02
trying to say there yeah that's it's very poignant can often because we focus so much on the
25:10
technical lose the force for the trees and people but that's not the secure thing to do or that
25:19
doesn't fit what the model says or that isn't the best practice and that might be true
25:28
but it also again comes down to that isn't necessarily our decision to make unless it's our company
25:36
unless you're the CEO you're the buck doesn't stop with you and so yeah but there's i recently saw
25:44
a real a short at tiktok i don't know i probably want to cross several of them it was in response to
25:50
one if if you're paralyzed by it actually paralyzed in an action by focusing too much on trying
26:01
to make the right choice you're stuck in a fighter flight mindset and the follow on to that
26:10
was and that was from a psychologist or a sociologist and i think too often that's accurate
26:17
for cyber security well what what is the right thing to do it's like well there might not be a
26:22
right thing to do there might just be a best thing to do and the best thing to do is going to be
26:27
based off of what is the mission yep it's funny i was just going to say the right choice may not be
26:34
the best choice and the best choice might not be the right choice and that they can all be true at
26:38
the same time the the fun response to that was we'll reference back to the first iron man movie
26:46
in which Tony Stark he's building out the mark two in his mansion in you know in Malibu the
26:55
mark one he built in the cave so he could escape and you know one flight got him out of there
27:01
you know he survived the cave got away from the captors the mark two was able to you know fly
27:09
and he takes it and he it is not finished it is a prototype that he you know can fly
27:18
and his systems as AI says okay you shouldn't do this cool you flew good job now you should land
27:25
and he goes okay excellent great let's go up into the air and he flies over LA and he goes up to
27:31
58,000 feet or 85,000 something like that he goes up into basically space and he freezes up
27:38
because the suit's not made for it and then he finds out okay the suit is not made for that
27:45
and it ends up being the pivotal piece that sorry if i'm ruining a 20 year old movie for you
27:52
it ends up being the pivotal piece that that's how he wins in the end beating you know the other guy
27:58
is because he ran before he walked he decided i need to do this thing before i sit and figure out
28:06
what it would be all the perfect stuff before i get on the spreadsheet figure out all the specs
28:10
and features build it get to a certain point MVP go fly it try it see what features stink or
28:18
are good and then iterate and sometimes we just need to do that dev ops is happy to do that
28:25
but security we're oh no we can't possibly do that we have to have it all figured out
28:30
well takes nothing from dev ops know that you can have a 2.0 and a 2.1 yeah yeah yeah that interesting
28:41
point i didn't i don't know the movie for sorry for those who might judge me for that but anyway
28:46
as you're describing that i'm just thinking if you're if you're entering that space against the foe
28:54
and you figured out that the suits the issue and the and the foe didn't
28:59
and you can survive in that environment and the foe can't that that i don't know if that's the
29:04
story or not but that makes me think about security if you can create an environment where you know
29:09
what it takes to survive in there and the the bad actor doesn't know it and they can't
29:18
maybe maybe that's a maybe that's a strategy i don't know what that means but anyway
29:21
you just think across my mind and i have just the way of saying things that come to my head
29:26
my head anyway so there you go yeah in the in the movie you know he's got this suit
29:33
and he ends up fighting another guy with a very similar suit except the other guy's suit is
29:39
well-engineered for battle and beat him up pretty badly making a lot of mehem all over la and
29:46
he finally realizes you know what i'm not gonna win this against one-on-one so he takes off
29:52
and he's in you know the 2.1 version and he's going up and up and up and up and up and up and
29:59
he finally asks so what did you all do to deal with the icing and the other guy says what icing
30:06
and the other guy freezes up and he doesn't and that's how he wins the battle
30:12
there he goes and yeah is there a perfect analog i i don't know but it's we can't let the
30:19
the takeaway should be that inaction for perfection's sake isn't going to get us anywhere
30:26
i love it well josh i mean we can we could take this all kinds of different ways kind of like we did
30:33
we were hanging out in New York in New York and besides
30:36
just chatting and then shooting the breeze and always good to see you my friend we're going to leave
30:41
it here the book is speak security with a business asset how to communicate cyber security concepts
30:47
clearly he's friction with stakeholders and influence decisions sounds like a good book my friend
30:52
i will say thank you for for sending me my copy i hope to grab that soon when i get back to where
30:58
you sent it and while i have a good read of it i would encourage everybody else to to do the same
31:04
grab a copy sounds like a good team book for teams to read together and and maybe there's
31:10
some activities or workshops teams can do do after after they read certain parts of this all
31:16
include links to the the books of people and grab that obviously you're linked in so people
31:21
connect with you so thanks again josh congratulations on the on the book thanks shun take
31:26
other and thanks everybody for listening and watching this episode of redefining cyber security
31:32
here on itsp magazine please stay tuned subscribe share with your friends and enemies and
31:37
we have a story you want to share about how you run your program and how you're seeing some
31:42
benefits let me know love to have you on the show and i'll say everybody on the next one