Episode Transcript
WEBVTT
1
00:00:03.799 --> 00:00:07.679
Alright, alright, we're back in
Atlanta at the global podcast studios, uh,
2
00:00:07.679 --> 00:00:09.560
and we've got a great show here
for you. Today. We're talking
3
00:00:09.599 --> 00:00:15.080
all things cybersecurity, but today's topic
is very timely. It's not just security
4
00:00:15.160 --> 00:00:19.160
in the school system, but it's
Cybersecurity, and we're all we've all heard
5
00:00:19.160 --> 00:00:24.120
the headlines about cybersecurity attacks and businesses
and in the retail specter. But we're
6
00:00:24.160 --> 00:00:28.320
gonna talk about Um Education Systems and
we have the expert, the Guru,
7
00:00:28.440 --> 00:00:32.119
the man, the dude, the
doeskis man of Cybersecurity, live in our
8
00:00:32.119 --> 00:00:35.399
studio. Dwayne, Mr Dwayne Harart, welcome to the show. I'm trying
9
00:00:35.399 --> 00:00:39.320
to stop laughing. I just saw
you. It's gonna be video. Yeah,
10
00:00:39.600 --> 00:00:41.920
you can pull you can. You
can make that happen with a podcast.
11
00:00:42.000 --> 00:00:45.719
Yeah, speaking of videos. So, Um, you've been Um,
12
00:00:45.799 --> 00:00:49.280
you've been doing all things in terms
of your book. Is Is, you
13
00:00:49.320 --> 00:00:52.960
know, on the rise and it's
gotten lots of sales in that category.
14
00:00:53.359 --> 00:00:57.359
Your Youtube channel has always been,
Um, very prominent, but you've started
15
00:00:57.399 --> 00:01:00.119
doing live stream on youtube now.
Right. How's that been going for you?
16
00:01:00.079 --> 00:01:03.719
I want to be a TV star, so you're working your way there.
17
00:01:04.519 --> 00:01:11.359
So these live screens are going well
because they're designed to focus on happing
18
00:01:11.400 --> 00:01:15.879
people channel their careers and in the
sober security market. You know much of
19
00:01:17.000 --> 00:01:21.959
the conversations that we have about some
of these solutions and some of the challenges
20
00:01:22.000 --> 00:01:26.879
and issues and sober security with the
technologies. You and I take care of
21
00:01:26.879 --> 00:01:32.920
those through the podcasts. You you
know U Cybecurity, Gurule. Yeah,
22
00:01:33.040 --> 00:01:34.959
I'M gonna write the chapter in your
book. I can't write a whole book
23
00:01:34.959 --> 00:01:38.719
about it, but yeah, all
write from the from the user experience.
24
00:01:38.799 --> 00:01:42.760
And Yeah, yeah, yeah,
I got a name for that. All
25
00:01:42.840 --> 00:01:48.519
right, I got his serious name
for that. Yop Dusty, dusty hackles
26
00:01:48.560 --> 00:01:53.799
hat fit. Oh, I like
that. Yeah, because there's adjestable hat
27
00:01:53.840 --> 00:01:57.159
size. Get a customer one.
Um, you got my wheel spending.
28
00:01:57.200 --> 00:02:00.159
But we gotta stay focused here.
Yeah, so we got limited out of
29
00:02:00.200 --> 00:02:02.040
time. Let's talk about as I
mentioned at the top of the show,
30
00:02:02.439 --> 00:02:07.239
this is about cybersecurity and, Um, the hackers, as you mentioned,
31
00:02:07.319 --> 00:02:12.319
in the school system. So,
UM, talk to us about Um,
32
00:02:12.360 --> 00:02:15.919
you know in the last couple of
years what's been on the shortlist. Well,
33
00:02:15.879 --> 00:02:21.919
so let's look at it from the
high level. What does colleges offer
34
00:02:22.680 --> 00:02:30.680
to the community education. How is
education now taking advantage of? It's through
35
00:02:30.719 --> 00:02:38.439
online assets, it's through sitting at
home with your computers, because now we're
36
00:02:38.520 --> 00:02:44.960
in this age where we're in post
covid and most colleges, and a lot
37
00:02:44.960 --> 00:02:52.400
of colleges really Um, transition to
more online, Um, how can I
38
00:02:52.479 --> 00:02:59.479
say online type of services offered,
and now what happens is that they're seeing
39
00:02:59.520 --> 00:03:02.439
that believe with these online services we
can attract more students, you know,
40
00:03:02.520 --> 00:03:07.439
because everybody wants to go to school
from home. So, with that said,
41
00:03:07.520 --> 00:03:14.280
underneath all of the all of the
changes are is a serious, serious,
42
00:03:14.280 --> 00:03:20.159
serious situation, and it's called cybersecurity. And, you know, I
43
00:03:20.599 --> 00:03:25.759
just want to say that it's a
serious concern because because we're dealing with information
44
00:03:25.960 --> 00:03:30.280
and we're dealing with data and we're
dealing with someone that is located in a
45
00:03:30.360 --> 00:03:37.520
remote location and logging onto a server
that is probably located five hundred miles away,
46
00:03:37.759 --> 00:03:40.039
and in between that, we don't
know who is, you know,
47
00:03:40.240 --> 00:03:46.639
standing there or sitting somewhere with the
laptop trying to intercept, ready to attack.
48
00:03:46.960 --> 00:03:52.120
Yes, Um, so you mentioned, uh, stats and some numbers.
49
00:03:52.199 --> 00:03:53.759
Let me give you some stats from
a recent article here, such uh,
50
00:03:53.800 --> 00:03:58.159
since the onset of the covid nineteen
pandemic, both schools have returned to
51
00:03:58.199 --> 00:04:01.879
a fully integrated Um in person learning
environment, but for a lot of the
52
00:04:01.960 --> 00:04:06.319
damaging effects from those last couple of
years, while we were all kind of,
53
00:04:08.199 --> 00:04:12.199
you know, being sent home and
so forth. Um. Sixties seven,
54
00:04:12.240 --> 00:04:16.480
according to this article, sixties seven
separate ransom attacks impacted almost a thousand
55
00:04:16.920 --> 00:04:21.160
schools and colleges, putting at risk
personal data of almost a million students.
56
00:04:23.199 --> 00:04:28.519
Um. That's pretty some scary statistics, right, it is scary, it
57
00:04:28.560 --> 00:04:33.480
is is facts, facts, but
but you know, what I would like
58
00:04:33.519 --> 00:04:42.800
to say is that that one of
my talking points for Cybersecurity is that let's
59
00:04:42.839 --> 00:04:46.439
just for a minute, move away
the type of organization or agency that,
60
00:04:47.639 --> 00:04:50.240
you know, we are dealing with. Let's just say if it's not a
61
00:04:50.319 --> 00:04:55.839
school, and let's just look at
Cyber Cybersecurity, you know, for what
62
00:04:56.000 --> 00:05:00.199
cybersecurity is all about. Let's just
look at cybersecurity only. And if we
63
00:05:00.279 --> 00:05:02.600
do that, there are certain standards
that need to be followed. But you
64
00:05:02.639 --> 00:05:08.439
have to but you have to institute
those standards across the different platforms. You
65
00:05:08.480 --> 00:05:15.759
know, those different platforms, platforms
are colleges, banks, hospitals, Um,
66
00:05:15.759 --> 00:05:20.120
maybe, maybe, maybe, your
maybe, your utility plans. All
67
00:05:20.199 --> 00:05:26.560
Right, so the foundation to cybersecurity
should always be in place, but how
68
00:05:26.639 --> 00:05:30.160
you use them, based on the
technology that you have in place at these
69
00:05:30.160 --> 00:05:34.600
different platforms, makes it different.
Somewhere you fail or you succeed. Now,
70
00:05:34.959 --> 00:05:41.319
now with colleges, see it's unique
because you have a training environment and
71
00:05:41.399 --> 00:05:46.040
you have portals and you have online
assets, and not all the students that
72
00:05:46.079 --> 00:05:53.519
are going through these program are working
in technology. Maybe only probably, I
73
00:05:53.519 --> 00:05:59.120
would say if about ten to fifteen. Pretend of the students are studying technology,
74
00:05:59.480 --> 00:06:02.800
so that other students are either studying
business or some type of liberal arts
75
00:06:02.839 --> 00:06:09.879
and Liberal Arts and Um, social
and Um, you know, the basic
76
00:06:09.959 --> 00:06:14.519
mass reading and so forth, but
the technology space. Right. So they're
77
00:06:14.519 --> 00:06:18.160
not in the technology space. So
what? So what has to happen is
78
00:06:18.199 --> 00:06:23.879
that that I always state this,
is that the cybersecuity mindset works in the
79
00:06:24.199 --> 00:06:30.519
millions of domains and what individual will
have to do is to learn that the
80
00:06:30.639 --> 00:06:38.680
standard to making cybersecurity operate is to
invoke a thinking process and and see that
81
00:06:38.720 --> 00:06:43.319
thinking process is saying that, hey, we are in a school system,
82
00:06:43.519 --> 00:06:46.600
but their standards. We need to
follow like everybody else follow, because what
83
00:06:46.680 --> 00:06:53.040
I hate the most about the cybersecurity
industry is that there's there's always a conversation
84
00:06:53.160 --> 00:07:00.279
about which industry has hit the most. All industries are to set the and
85
00:07:00.279 --> 00:07:04.639
and the most important industry is your
industry, whenever you're in so no offense.
86
00:07:04.680 --> 00:07:09.079
But like if another industry, the
retail sector, and if you're not
87
00:07:09.120 --> 00:07:12.560
in that space, it doesn't concern
you. But if you're in the school
88
00:07:12.600 --> 00:07:15.720
system and you're responsible for kids,
whether they're, you know, middle school,
89
00:07:15.800 --> 00:07:19.160
because now computers are being issued to, you know, elementary schools,
90
00:07:19.199 --> 00:07:21.839
we just think, not just high
schools. Right, let me ask you
91
00:07:21.879 --> 00:07:26.279
this question. Who Do you think
is more susceptible, uh, in terms
92
00:07:26.279 --> 00:07:30.040
of UH, cybersecurity in within the
school system? The High School or the
93
00:07:30.079 --> 00:07:32.839
College? I'll give him my viewpoint
on see if you subscribe to it or
94
00:07:32.879 --> 00:07:36.920
not. Right. So, I
think potentially you could, you know,
95
00:07:38.040 --> 00:07:41.079
argue both sides of this. But
but on one hand, the college,
96
00:07:41.319 --> 00:07:45.399
because they're more independent, there's no
parents overlooking and they're more likely to kind
97
00:07:45.399 --> 00:07:50.480
of use their their school quote computer
for other applications besides what, besides homework,
98
00:07:50.519 --> 00:07:54.399
where they should be using it for. Right so they're more and and
99
00:07:54.439 --> 00:07:57.720
again they're in a different mindset.
They're not as mature now the high school
100
00:07:57.800 --> 00:08:01.240
kids, in theory their parents.
If they're, you know, we'll talk
101
00:08:01.279 --> 00:08:05.600
about this later, if they're instructed
by the school system, the dudes and
102
00:08:05.639 --> 00:08:09.240
don't to the computer, they're being
potentially more monitored. Right. So which
103
00:08:09.439 --> 00:08:13.720
is safer or which is which one
do you subscribe to when? But I
104
00:08:13.759 --> 00:08:18.920
have two different things talk about.
One is digital parenting, digital parents,
105
00:08:20.000 --> 00:08:24.680
and focused on the younger group of
students. The second thing that I like
106
00:08:24.759 --> 00:08:31.439
to focus on is that WHO has
assets to the most data? Okay,
107
00:08:31.560 --> 00:08:33.919
that's a good point. Okay.
So so when we look at this scenario,
108
00:08:35.799 --> 00:08:39.200
the youth don't have assets too much
data as the college students do,
109
00:08:39.600 --> 00:08:43.000
because college students have asked this to
a lot of data, and it's personal
110
00:08:43.080 --> 00:08:48.679
data. For the colleges Um you
know, they have to put their social
111
00:08:48.679 --> 00:08:54.799
security numbers online and a couple of
informational things have to be shared and you're
112
00:08:54.840 --> 00:08:58.639
dealing with other people email addresses.
You know, it's a couple of things
113
00:08:58.679 --> 00:09:03.480
that call and to that area of
data or protection. But college students have
114
00:09:03.960 --> 00:09:07.000
as ss the more data and you
know, the more assets, you have
115
00:09:07.159 --> 00:09:13.720
to data and that's the more need
of cybersecurity. That that I subscribed to.
116
00:09:13.759 --> 00:09:16.639
That that makes sense, um.
So what do you think? Figure
117
00:09:16.679 --> 00:09:22.799
has changed, uh, in the
last couple of years related to you know,
118
00:09:22.840 --> 00:09:28.240
it used to be all homeworkers done
with a book and not much technology
119
00:09:28.320 --> 00:09:31.360
was involved. The only technology was
more the record keeping of the school system,
120
00:09:31.480 --> 00:09:37.559
right, but now that we're opening
the floodgates to everybody giving access to
121
00:09:37.639 --> 00:09:43.200
that Um, where are some potential, you know, challenges and order some
122
00:09:43.879 --> 00:09:48.799
solutions to that Um? I'm pretty
much like a look at it from three
123
00:09:48.879 --> 00:09:54.320
levels. You know. The first
level is that we have remote assets.
124
00:09:54.879 --> 00:10:03.360
Okay, most people now are using
on line Um Portals to gain information to
125
00:10:03.440 --> 00:10:07.840
the college classes or whatever. Right. So you think about the number of
126
00:10:07.840 --> 00:10:13.240
people that use remote assets. Fifty
years ago, everybody was in the classroom,
127
00:10:13.480 --> 00:10:20.039
right, okay. So when it
comes to data, people now do
128
00:10:20.240 --> 00:10:24.480
not go into the closet and pull
that shoebox out right and see what they
129
00:10:24.480 --> 00:10:28.720
were in down on the sheet of
paper. All that information is saved on
130
00:10:28.759 --> 00:10:35.120
a service somewhere and these colleges are
saving information even from nine, maybe ten
131
00:10:35.200 --> 00:10:37.519
years ago, when someone used to
go to the College of pret much.
132
00:10:37.919 --> 00:10:43.279
You know, was was a student
there. That information is still saved in
133
00:10:43.360 --> 00:10:50.399
every politory exactly. So when when
it was a paper trail, I mean,
134
00:10:50.799 --> 00:10:54.720
you know, it's a paper trail
and it was locked up somewhere.
135
00:10:54.799 --> 00:10:58.240
Now that third level Um that,
I think, had changed over time.
136
00:11:00.240 --> 00:11:05.279
It is that is that we are
in an age now where where people feel
137
00:11:05.360 --> 00:11:13.320
more comfortable working from home and working
remotely. So their mindset has shifted from
138
00:11:13.440 --> 00:11:16.399
the presence of the office to the
presence of being at home. And the
139
00:11:16.519 --> 00:11:20.960
midst of all of this we always
like to say, okay, what type
140
00:11:20.000 --> 00:11:24.840
of mindset needs to be in place, because you're not in the office anymore.
141
00:11:24.639 --> 00:11:31.399
You know, you can't take your
laptop and open up the window unless
142
00:11:31.399 --> 00:11:35.320
you're on a PC using windows.
Yeah, you can't do that right.
143
00:11:35.200 --> 00:11:41.039
Um. So, in terms of
uh, you know, cyber attacks,
144
00:11:41.440 --> 00:11:48.159
ransom now in the article they mentioned
that there were Um rentsomware attacks, but
145
00:11:48.200 --> 00:11:52.279
I don't know. We've heard some
stats about businesses being, you know,
146
00:11:52.399 --> 00:11:56.879
held hostage with are right, but
is there any indications that school systems have
147
00:11:56.960 --> 00:12:03.120
been susceptible to that as well?
Know what I would say yes, because
148
00:12:03.639 --> 00:12:09.919
I would never ever try to downplay
or short change cyber security. Right,
149
00:12:11.159 --> 00:12:16.039
ransomware, it can happen anywhere.
And if you think about college students,
150
00:12:16.960 --> 00:12:20.639
and let's just, let's just,
let's just look at the mindset of a
151
00:12:20.679 --> 00:12:24.000
college students. I need to do
my homework. Good luck on that one.
152
00:12:24.159 --> 00:12:28.759
Okay, I need to do my
homework. And they log onto that
153
00:12:28.799 --> 00:12:33.840
computer and they realized that there's a
ransomware attack, but they have to give
154
00:12:33.919 --> 00:12:41.080
up, okay, because they can't
get to the portal. So if they
155
00:12:41.159 --> 00:12:43.240
buy into that and give up the
twenty five dollars, then they can get
156
00:12:43.240 --> 00:12:48.799
their class work done. Now that
opens Bandora's box. Next time it's fifty
157
00:12:48.200 --> 00:12:52.639
right. Yes, yes, it's
fifty right, but you would think about
158
00:12:52.639 --> 00:12:56.799
the number of students that are pretty
much under that system. You know,
159
00:12:56.840 --> 00:13:03.360
it can be very, very smaller
thing. As to arounsomwhere goes to a
160
00:13:03.440 --> 00:13:07.679
college and locks down its servers,
whole university, Whole University, and you
161
00:13:07.720 --> 00:13:15.080
have ten thousand students there that cannot
obtain information for their classes and students.
162
00:13:15.200 --> 00:13:18.039
Okay, well, since I can't
start the class, then you know,
163
00:13:18.039 --> 00:13:20.320
I want my money back. Okay, because they don't spend them money.
164
00:13:20.480 --> 00:13:24.480
You know, to start the class
and the illness was on the university to
165
00:13:24.679 --> 00:13:28.759
Uh to protect. Right, yeah, yeah, and and uh, we
166
00:13:28.840 --> 00:13:31.279
think about, you know, access
to the data, but as simple as
167
00:13:31.320 --> 00:13:35.519
their email, because most college kids
are issued a email tied to the university.
168
00:13:35.639 --> 00:13:39.720
Yes, right, and Um,
so, I mean are there like,
169
00:13:41.159 --> 00:13:46.919
you know, recommendations putting contingency Um
options in play? So you should
170
00:13:46.960 --> 00:13:50.679
have redundant uh servers with all that
same data, but not not, not
171
00:13:50.840 --> 00:13:54.960
tied together and Um, you know, on a daily basis. Whatever do
172
00:13:56.039 --> 00:14:00.480
they kind of you know, uh
clone that to another Erver? I mean,
173
00:14:00.480 --> 00:14:05.399
what are some real world applications to
kind of UH get one step ahead
174
00:14:05.399 --> 00:14:09.639
of the hackers? Okay, I'm
gonna bring up a term. It's called
175
00:14:09.720 --> 00:14:18.279
PTCA policy. Training and continuous monitor
policy means that the college has a policy
176
00:14:18.320 --> 00:14:22.799
out that's that's strong, that states
how is you're going to treat the university
177
00:14:24.039 --> 00:14:31.720
systems. All right, twoars.
You have to train people on those particular
178
00:14:31.759 --> 00:14:37.360
standards. Um Me honestly. Three
ISS you have to have a continuous monitoring
179
00:14:37.399 --> 00:14:41.320
programming place where you have eyes and
ears constantly ongoing and watching what is really
180
00:14:41.360 --> 00:14:46.840
going on, because I don't know
if a lot of colleges have a security
181
00:14:46.840 --> 00:14:52.159
operational center that that like, monitors
the online portals. Most of these security
182
00:14:52.159 --> 00:15:01.639
operational centers are pretty much concerned about
trying to manage the internal systems that the
183
00:15:01.679 --> 00:15:07.440
college on or like all the professors
use and the D M uses, you
184
00:15:07.440 --> 00:15:11.360
know, for the professional use,
not the student news. So the question
185
00:15:11.399 --> 00:15:16.799
goes, is that all these colleges
really monitoring the students, because if you
186
00:15:16.840 --> 00:15:24.320
think about a major college that actually
has ten thousand students that are remote,
187
00:15:26.159 --> 00:15:31.039
all right, yeah, okay,
and you have ten thousand possible different scenarios,
188
00:15:31.120 --> 00:15:35.120
right. So so you have to
really think about the way that you
189
00:15:35.200 --> 00:15:39.519
protect their data. And you know, part of it is that most colleges
190
00:15:39.639 --> 00:15:46.480
are probably using a VPN tunnel so
that their students can log on. Um,
191
00:15:46.519 --> 00:15:48.399
you know, that's that's kind of
the way I think it. I
192
00:15:48.480 --> 00:15:54.159
think it may work, but it
still goes back to PTC. PTC will
193
00:15:54.240 --> 00:16:00.320
save you. Okay, policy training
and your continuous monitoring and your teams.
194
00:16:00.399 --> 00:16:03.480
Marninton is is kind of going into
the question that you pose. Is that
195
00:16:03.720 --> 00:16:08.200
what type of software, applications and
all the technologies that you have in place
196
00:16:10.360 --> 00:16:14.960
and making sure that they are operating. Yeah, you could kind of encapsulate
197
00:16:15.000 --> 00:16:17.600
that. What's your protocol? Right, you have to have a playbook,
198
00:16:18.120 --> 00:16:21.960
Um, just like you have a
curriculum for your class throughout the year,
199
00:16:22.279 --> 00:16:26.720
you need to have written down in
writing a plan. Here's what we're doing
200
00:16:26.720 --> 00:16:29.320
on a daily basis, monthly,
quarterly, to kind of check in.
201
00:16:29.759 --> 00:16:33.000
But also, and then the training
is to educate, Um, the professors,
202
00:16:33.360 --> 00:16:37.879
the students, the staff and so
forth. So much like you've talked
203
00:16:37.879 --> 00:16:41.200
about the military application and in business, everybody should have that. You know
204
00:16:41.360 --> 00:16:47.360
that where that hackers hat have that
mindset right throughout. So you know,
205
00:16:47.679 --> 00:16:51.360
you talked about in the last episode
about the military and being the first line
206
00:16:51.360 --> 00:16:55.799
of defense. Right, so that
should be implemented at the university and the
207
00:16:55.879 --> 00:17:00.000
high school level as well. Right. And resources equals is obersecurity mindset.
208
00:17:00.120 --> 00:17:04.720
Yeah, and security equals equals security
in your system. Is Best you can
209
00:17:04.720 --> 00:17:08.480
do. There's no there's no magic
pill whatever. Right, but if you're
210
00:17:08.480 --> 00:17:12.319
not taking proactive steps on it and
don't have a process in place, just
211
00:17:12.359 --> 00:17:15.359
like in business, you can't just
like wing it. Right, wow,
212
00:17:17.519 --> 00:17:22.200
you saw a MICO sobersecurity expert over
there. Don't make my head too big
213
00:17:22.240 --> 00:17:26.799
here or whatever. Yeah, but
no, it's a fascinating it's a very
214
00:17:26.119 --> 00:17:30.359
uh, it's UH. We were
talking about an article before. You know,
215
00:17:30.599 --> 00:17:36.839
UM, every business it's somewhere in
their psyche, right, what if?
216
00:17:37.680 --> 00:17:40.240
Right, and you can't, you
know, being ostrogen, have your
217
00:17:40.240 --> 00:17:42.119
head in the sand at the same
time. You gotta do other stuff.
218
00:17:42.119 --> 00:17:45.480
You've gotta live in the real world, right, but you gotta understand there's
219
00:17:45.519 --> 00:17:51.160
people, hackers living in the hackers
world. There you go, hackers world.
220
00:17:51.720 --> 00:17:56.000
What else? The term that is
you throughout the military and it states
221
00:17:56.039 --> 00:18:00.480
that that that if you are ready, then you're always ready. Yeah,
222
00:18:00.799 --> 00:18:06.839
okay. That is that proactive mindset. That's proactive defense. That's part of
223
00:18:06.880 --> 00:18:12.440
the human fall waull theory. That
is having that thinking process in place where
224
00:18:12.440 --> 00:18:19.119
you constantly engaged into cybersecurity, because
cybersecurity is ongoing. So if cybersecurity is
225
00:18:19.400 --> 00:18:26.319
ongoing, then it only makes it
smarter if normal people are ongoing as well
226
00:18:26.400 --> 00:18:30.640
too. So so it's really kind
of kind of makes it easy, right.
227
00:18:32.440 --> 00:18:34.720
It's kind of like, uh,
in business terms, it's like you
228
00:18:34.720 --> 00:18:41.519
don't rely your entire finances, just
your C P A or the finance department.
229
00:18:41.160 --> 00:18:45.279
Everybody within the organization should be monitoring. HOW ARE WE SPENDING MONEY?
230
00:18:45.359 --> 00:18:48.680
Right? ARE WE WASTING MONEY?
and Um, and a red flag should
231
00:18:48.720 --> 00:18:52.720
appear if the statements aren't driving right. But you don't have to rely on
232
00:18:52.319 --> 00:18:56.519
the annual review of your statement.
You know, you should be monitoring just
233
00:18:56.519 --> 00:18:59.920
like your personal bank account. You
know, I gotta call. Yesterday I
234
00:19:00.160 --> 00:19:03.680
was doing, uh, some withdrawals
and the bank uh called and said,
235
00:19:03.720 --> 00:19:07.839
hey, there's been some suspicious activity
and they actually locked down my account until
236
00:19:07.839 --> 00:19:12.559
it was verified by me. Right. So transpose that into our topic today
237
00:19:12.599 --> 00:19:15.680
about cybersecuity in the school system.
One last question. We're running out of
238
00:19:15.680 --> 00:19:19.079
time here, but, Um,
one last question, kind of on topic,
239
00:19:19.079 --> 00:19:26.400
but a little different angle to this. Um, are you is cybersecurity
240
00:19:26.400 --> 00:19:29.759
being taught, you know, at
the college level in terms of, you
241
00:19:29.799 --> 00:19:33.119
know, a career, and has
that built into some of the curriculum?
242
00:19:33.200 --> 00:19:37.799
Do you feel, Um, at
this point? Well, cybersecurity is taught
243
00:19:37.839 --> 00:19:42.240
as a field, but within you
think universities have a designated uh, not
244
00:19:42.359 --> 00:19:47.559
a degree in that space? Right, but Um, is that a course
245
00:19:47.640 --> 00:19:49.680
that people can take cybersecurity one on
one kind of thing? Right, you're
246
00:19:49.680 --> 00:19:56.279
talking like a user awareness course.
Okay, I believe most colleges do have
247
00:19:56.440 --> 00:20:02.720
it and place and and I think
it should be in place prior to any
248
00:20:02.759 --> 00:20:07.279
students Um using any of the college
services. You know, a user awareness
249
00:20:07.279 --> 00:20:12.000
core should actually be in places where
most organizations make sure the interviewers go through
250
00:20:12.039 --> 00:20:18.119
that one hour training on like user
awareness seat and I should be almost like
251
00:20:18.119 --> 00:20:21.559
a test, right, and it
Wass some I'm sure some high schools,
252
00:20:21.559 --> 00:20:23.519
middle schools, colleges are probably already
doing this. If not, you know,
253
00:20:23.599 --> 00:20:27.519
just the Aha moment would be like, we're not actually even issuing you
254
00:20:27.519 --> 00:20:33.599
your computer or your email address until
you've passed this test. Right. So
255
00:20:33.640 --> 00:20:36.400
you can train them, but what
are they retaining? Right, they can
256
00:20:36.440 --> 00:20:41.200
sit through an hour, but it's
basically it's like your driver's license, right,
257
00:20:41.400 --> 00:20:45.160
you can study for the license,
but you don't get handed that license
258
00:20:45.319 --> 00:20:48.880
until you pass the driving test.
So well, well, you know what,
259
00:20:49.119 --> 00:20:55.519
when it comes to training and people, people, people will have a
260
00:20:55.599 --> 00:21:02.799
lapse. So that's where the and
the raise PTC and they see at the
261
00:21:02.920 --> 00:21:04.880
end, which is your continuous Martine, comes in place. This is where
262
00:21:04.880 --> 00:21:07.359
the eyes and ears are monitoring,
you know, the people that have been
263
00:21:07.359 --> 00:21:11.640
trained. Okay, now, now
you're trained. Now we trust you,
264
00:21:11.680 --> 00:21:15.079
but you know what, you know, we're still gonna keep our eyes and
265
00:21:15.319 --> 00:21:17.799
ears on you. It's like your
famous presidents. At one time trust,
266
00:21:17.880 --> 00:21:21.680
but verified. That's right, right, that's that's right. Zero Trust,
267
00:21:22.720 --> 00:21:29.359
you know, you know, with
zero proven guilty until you know, the
268
00:21:29.440 --> 00:21:33.960
traditional ways was to trust, trust, with verified. But as announcing we
269
00:21:33.039 --> 00:21:37.319
moved to a zero trust architect out
here means that you don't trust at all.
270
00:21:37.440 --> 00:21:41.559
So, you know, once our
organization moves to that level, I
271
00:21:41.599 --> 00:21:45.960
think there'll be a whole lot safe, because with zero trust, Um,
272
00:21:47.000 --> 00:21:51.279
you know, like you have a
lot of security zones in place, so
273
00:21:51.319 --> 00:21:56.240
you're really being authenticated and verified at
so many levels, whereas, whereas the
274
00:21:56.279 --> 00:22:00.559
traditional method means that once you good
assets and it was good to go.
275
00:22:02.160 --> 00:22:06.559
But now with zero trust, no, we still need to do verifile with
276
00:22:06.720 --> 00:22:11.119
checks as you progress, do the
system and you use these applications. Speaking
277
00:22:11.160 --> 00:22:15.559
of good to go, we gotta
go, all right. Yeah, it's
278
00:22:15.559 --> 00:22:19.000
the end of this this magical hour
here. Yeah. So, Duanne,
279
00:22:19.039 --> 00:22:22.960
has been a pleasure once again to
have you in our Lanto podcast studios here
280
00:22:22.000 --> 00:22:27.039
on the global podcast studios network and
rich castnover here. Just adding my two
281
00:22:27.039 --> 00:22:30.279
cents and my two cents are now
I'll put to probably probably a nickel at
282
00:22:30.359 --> 00:22:37.519
this point. Right my educational cybersecurity, you have enough to go out nice.
283
00:22:37.599 --> 00:22:41.640
Well, you definitely have the similar
dollar in this on this topic and
284
00:22:41.680 --> 00:22:45.440
subject matter. And speaking of that
Um again, check out DWAYNE HART DOT
285
00:22:45.440 --> 00:22:51.400
COM. Everything we've talked about on
the PODCAST, his book is available there,
286
00:22:51.839 --> 00:22:55.039
links to his youtube for the live
stream, so forth and so on.
287
00:22:55.160 --> 00:22:59.240
So rather than giving all kinds of
social media handles and websites and Domaine
288
00:22:59.519 --> 00:23:03.440
dwayne right dot com. You'll check
it out. Everything is there and we
289
00:23:03.519 --> 00:23:07.079
look forward to having me back in
the studio and your upcoming podcast a series.
290
00:23:07.559 --> 00:23:12.880
Okay, take care and again we'll
see you next time right here with
291
00:23:12.960 --> 00:23:15.319
Dwayne and rich. I don't know
if that's the name of a show,
292
00:23:15.359 --> 00:23:17.599
but we'll be here.