Quality Plus Consulting - Breakfast Bytes

Quality Plus Consulting - Breakfast Bytes header image 1
January 24, 2022  

Attestation, scoring, evaluation, and business process in achieving improved cybersecurity posture and compliance

Joy Beland joins Felicia to discuss:

  • What Edwards Performance Solutions is doing in the CMMC training space
  • Joy's team created the CMMC assessor textbook
  • Many orgs have cybersecurity insurance enforcement for the first time ever
  • Joy's extremely wise metaphor and perspective on cybersecurity insurance (15 mins)
  • Transfer of risk and economic destruction
  • DMARC, DKIM, SPF tuning
  • What tools exist to help the SMB market with attestation, and establishing patterns of due care and due diligence?
  • IS policies and processes are required as part of the proof mechanism
  • Mechanisms to actually evaluate risk so that business leaders can make effective decisions
  • Control planes for infrastructure

Joy's sage advice: "Know what the crown jewels are."

Learn to identify wasteful practices with Gemba walks.

https://www.creativesafetysupply.com/content/PPC/gemba/index.html

CMMC 2.0 scoping analysis

https://www.linkedin.com/feed/update/urn:li:activity:6889627454466469888/

Future Feed for CMMC orgs

https://futurefeed.co/

https://qpcsecurity.podbean.com/e/the-real-reason-you-cannot-afford-to-have-a-cybersecurity-incident/

 

Special guest:

Joy Beland, a CMMC Provisional Assessor and CMMC Provisional Instructor, who works with Edwards Performance Solutions as a Senior Cybersecurity Consultant.  Joy owned an MSP for twenty-one years in Los Angeles.  She has a CISM and Security+ certification.

December 31, 2021  

Integrated IT risk management - part 2

Identity theft via insecure credit APIs
Integrated IT risk management part 2

December 3, 2021  

Assessments and Integrated IT Risk Management - Part 1

  • Problems with and limitations in many assessments
  • Many assessment report results from automated tools can be incomplete, incorrect, or pretzel talk
  • What realistic expectations should you have from a paid and unpaid assessment
  • There are certain security baselines simply so your organization can be insurable.
  • There are certain security baselines in order for your organization to be serviceable by an IT service provider.
  • Small organizations can easily find themselves spending $50,000 that they don't have in order to recover from a cybersecurity event.
  • It's not just about money. Are you sure that you can get access to all the personnel in order to get your organization back up and running in the designated time?
  • You need to mitigate risk proactively in order to make sure the cybersecurity event never happens.
  • Do not evaluate your risk based upon what you think the value of your data is. Evaluate your risk based upon whether or not you want to stay in business.
October 28, 2021  

Technical Debt - a whole new perspective

10/28/2021

Cyber Matt Lee joins Felicia on Breakfast Bytes to talk about massive issues with technical debt.

Senior Director of Security and Compliance at Pax8.

You have to start with the right definitions. It’s not patch management, it is vulnerability management. You have to ZOOM in. Is your TPM up to date? Is your firmware up to date? Drivers, configurations, remove unpatchable software. Are you still susceptible to spectre and meltdown? What about SMB1, PowerShell 2.0, LLMNR, etc.? “That doesn’t have a patch, and you have to get rid of it.”

Where there is technical debt with a software code base, on a 5-year journey, you need to move to different software because the software vendors are literally incapable of updating the code base of their software. They are not actually doing the work to update the software. Their paradigms for software development lifecycle and codebase are crippling them from being able to correct issues.

Matt recommends finding SaaS platforms that suck over premise applications that suck because at least you are in the shared responsibility model.

Modern dev sec op practices are what is needed. You can build software that has a good paradigm.

We still acknowledge that there are issues with resources in the cloud as well unless an organization is willing to accept the risk of data sovereignty and the third-party risk of being disconnected from their services and data. Being disconnected from your data or being disconnected from your application because the SaaS vendor disagrees with your business model even though what you are doing is legal, this needs to be regulated out of existence. SaaS vendors are playing God.

And some things are just not cost effective in the cloud or are financially unobtainable in a SaaS format. Are you comfortable with the government accessing your data through backdoors? This is a very personal decision to each organization and individual.

15:30 mins - Matt talks about paradigm challenges that impede the ability to ever create bug free software. True SaaS should be able to iterate an outcome regardless of the hardware and OS that is accessing the system, so the software vendor does not have to plan for all the variables in their testing. This allows them to have a CICD development pipeline for their software.

Get to the nugget of what is required. An information security officer can get to what is really the intent of what the compliance requirements are asking for and translate that into what is required to fulfill that and protect the organization. Interpretation is required because too frequently the questions asked or requirements specified are not as specific or accurate as what is required.

26 mins – Vendor software development and vulnerability disclosure programs. The vendors need to tie revenue lost to the vulnerabilities. Software vendors are often setup for failure. Monolithic apps start at the top and run to the bottom of the code. Better models are where apps have microservices and each microservice can be corrected individually without a massive ordeal. A different software codebase paradigm allows for sprint teams to correct software bugs easier.

28 mins – There is no real effective possible way for many of these software vendors to fix their apps.

30 mins - It is in the C-Suite and the board to fix this. You are either going to die at the hands of threat actors, in an escalating war that we cannot win. Or you are going to start having practices that understand that this is a football game. There is no one right way to run a football play, but you cannot play with 9 players. You have no defensibility in your actions if you put only 9 players on the field when 11 are required. There are requirements and boundaries to any strategy or solution. If you don’t do the things you need to do, you don’t have defensibility.

If you are already fighting with all this massive technical debt, you are not going to ever win.

Go to tryhackme.com and find out how easy the threat actor side of this is.

 

https://tryhackme.com/

September 25, 2021  

Avoid cybersecurity insurance fraud

How to avoid cybersecurity insurance fraud. If this happens to you, your claim will be denied and you will likely be uninsurable in the future including by other insurance providers.

You have to be working with an extremely operationally mature ITSP with ISOs on staff or you probably will not be able to navigate this complexity.

September 13, 2021  

Why converged NOC and SOC are so critical to security efficacy

Joining Felicia is Rui Lopes, Senior Technical Evangelist at WatchGuard Technologies. Rui was with Panda Security prior to the WatchGuard acquisition and has spent many years merging the technical with customer enablement at a level rarely seen. His efforts at WatchGuard are projects, partner support, and overall customer enablement of using the endpoint protection technology effectively.

When I listened to an interview with Fortinet's CISO regarding converged NOC/SOC, I had to reach to Rui to formalize several conversations we have had over the last 1+ years because we both have seen the need for this strategy for a very long time. 

At QPC, we have been doing converged NOC/SOC since around 2009.

Listen in to hear our breakdown about why this is such a critical strategy in today's threat landscape.

_________________________________________________________________

Read the rest of this entry »

September 7, 2021  

Act now so your emails will still be deliverable

NDAA 2021 legislation is forcing a gaps closure in SPF, DKIM, and DMARC.

This stuff is really complicated. Get some seriously competent help. I don't think most ITSPs (IT service providers) have enough experience in managing this especially in light of the inclusions of marketing automation platforms on root domains.

You cannot be driving a hole with a 20 lb sledgehammer through your email ingress filtration policies in order to accommodate for incompetently configured sender framework on behalf of your senders.

It's time to push back on their incompetence. Get your VISO involved and get policies in place such as ones that IT will not be requested to put holes in security in order to accommodate senders with bad email systems. Instead, letters will go to bad senders to tell them to get their house in order.

You need to get your own house in order in order to make sure that your emails are deliverable. Cybersecurity insurance providers are assessing this information as part of your risk profile.

Salesforce Email Service Used for Phishing Campaign | eSecurityPlanet

For more information on this topic: Email Deliverability- The Titanic Problem Headed Your Way

August 31, 2021  

Gaps in EDR/EPP paradigms and what to do about them

Excellent and invigorating discussion on the gaps in EDR/EPP and what to do about them with Maxime Lamothe-Brassard, founder of LimaCharlie.io and Refraction Point.

LimaCharlie

  • avoiding tool proliferation
  • avoiding the jedi mind trick of EPP
  • identify gaps in a lot of EDR/EPPs
  • challenges with outsourced SOC
  • supply chain risk in toolset vendors
  • paradigms around security tools and training
August 16, 2021  

Kaseya VSA breach analysis

Why the breach happened and what people could have done to prevent it.

What Kaseya could have done differently.

How to manage supply chain risk when your software vendor is not.

Smart vendors use the experts in their customer base.

People really need to have a major paradigm shift and look seriously at an RMM as being nearly the same as a nuclear launch code.

Kaseya VSA Limited Disclosure | DIVD CSIRT

 

August 5, 2021  

Parsing out the risk issues associated with cloud technologies

Improper use of cloud and the problems caused by improper pre-planning and risk assessment of improper use of cloud.

Kim Nielsen, founder and President of Computer Technologies, Inc. cti-mi.com joins Felicia to discuss dangers and risk of improper use of cloud hosted technologies.

Business risk vs security risk, must have an exit plan. Dangers of subscriptions.

 

Huge databases don't belong in the cloud because it is not more secure.

https://www.infosecurity-magazine.com/news/over-60-million-americans

Podbean App

Play this podcast on Podbean App