Cybersecurity Mindset

September 20, 2021 00:30:47
Cybersecurity Mindset
Chief of Cybersecurity
Cybersecurity Mindset

Sep 20 2021 | 00:30:47

/

Hosted By

Dewayne Hart

Show Notes

This podcast session brings into existence of how having a cybersecurity mindset resolves industry problems by being cyber-focused. It provides a chance for listeners to see how their engagement and thinking process is either successful or failing best-security practices. Information relating to the inclusive culture, risk-based-thinking, hackers mindset, and situational awareness are highlighted.

View Full Transcript

Episode Transcript

WEBVTT 1 00:00:01.919 --> 00:00:07.190 Welcome to the chief of Cyber Security Podcast, where we discuss relevant information concerning 2 00:00:07.190 --> 00:00:12.710 the cyber security workforce, Business Development and best practices made possible by see miss 3 00:00:13.070 --> 00:00:17.789 learn more at seems Donet I. for a list of authorized publications, visit 4 00:00:17.870 --> 00:00:23.660 Dwayne hardcom. And now here's your host, Dwayne heart. I continue this 5 00:00:23.780 --> 00:00:28.620 episode of the Chief of Sobagecunity podcast that I like to ask everybody of question. 6 00:00:29.539 --> 00:00:32.740 Do you have a soverage cudy mindset? All right, are you really 7 00:00:32.780 --> 00:00:36.969 thinking about soyber security or is this that you're walking around say, Oh, 8 00:00:37.289 --> 00:00:42.810 I hope that I'm protected. Do you know? Know, the mindset used 9 00:00:42.810 --> 00:00:48.130 by people can make a difference in in successive favor, and that's no different 10 00:00:48.570 --> 00:00:54.600 with the oyper secuity feel because if you don't have a sobergecuity mindset, you 11 00:00:54.759 --> 00:00:59.359 cannot channel your way through this industry and you cannot figure out how those bad 12 00:00:59.439 --> 00:01:03.709 guys are working. All right. So, and this podcast session we're going 13 00:01:03.750 --> 00:01:08.510 to focus on this oppe cybersecurity mindset. All right, and we really want 14 00:01:08.549 --> 00:01:15.629 to focus on that because because I think is important to have a sobage cuitty 15 00:01:15.709 --> 00:01:21.579 mindset when you engage technology. Now, this is just not for business owners, 16 00:01:22.180 --> 00:01:26.859 just not for the facebook users. It's for everybody. What is you 17 00:01:27.060 --> 00:01:32.019 soybage cuty mindset? Okay, and do you have a soverage kitty mindset? 18 00:01:32.140 --> 00:01:36.930 So after this podcast session, I want you to sit back and think. 19 00:01:37.650 --> 00:01:42.890 Do I really have a soverage cuty mindset based on everything that I spoken about? 20 00:01:42.890 --> 00:01:47.799 Okay, so let's just talk about something here. So let's see what 21 00:01:47.840 --> 00:01:51.920 we're going to talk about today. All right. Well, we going to 22 00:01:52.000 --> 00:01:56.319 have to have a practical definition of cyber security mindset, because you can go 23 00:01:56.439 --> 00:01:59.840 to Google and you can type in many, many characters, you can go 24 00:01:59.959 --> 00:02:04.030 to facebook, you can pick up a book, but does it really tell 25 00:02:04.030 --> 00:02:07.549 you what the Cyberg kid of mindset is all about? I'm pretty sure most 26 00:02:07.590 --> 00:02:10.870 people understand mindset right, which is the mentality, you know, to think 27 00:02:10.909 --> 00:02:15.020 of certain way. All right. Now, there are certain components that go 28 00:02:15.340 --> 00:02:19.620 along with the Cyberge cuity mindset, all right, and we're going to look 29 00:02:19.659 --> 00:02:25.379 at those components that make up the Cyberge cuty mindset and really also to try 30 00:02:25.419 --> 00:02:34.729 to bridge this into real life occurrencies, incidents and things that you face on 31 00:02:34.810 --> 00:02:39.449 the daily basis, because we cannot have separation from sybage cuty mindset and what 32 00:02:39.610 --> 00:02:44.560 you do on a daily basis. Now I got something else to tell you 33 00:02:44.719 --> 00:02:49.159 too, and this is a little secret and you can tell all your friends 34 00:02:49.199 --> 00:02:53.319 about it as well too, when this podcast session is at the end. 35 00:02:53.639 --> 00:02:57.599 I got a surprise that I'm going to tell you, and I really want 36 00:02:57.639 --> 00:03:00.830 you to stay with me for this podcast sets because when you hear the surprise 37 00:03:00.909 --> 00:03:05.310 at the end, right, you're going to be ready. You you're going 38 00:03:05.310 --> 00:03:08.349 to be mentally armed to combat cyber security. Now, that's one of the 39 00:03:10.069 --> 00:03:15.379 familiar topics are always like to say, is that cybergecurity makes you mentally armed. 40 00:03:15.580 --> 00:03:22.060 All right, mentally arm means that that you have the knowledge to go 41 00:03:22.259 --> 00:03:29.169 out there and to engage soyperecurity yourself. All right, I remember when I 42 00:03:29.289 --> 00:03:34.409 first started this industry what type of mindset that I have. You know, 43 00:03:34.490 --> 00:03:38.129 I came out of the military, so I was always prompt, ready to 44 00:03:38.210 --> 00:03:42.159 go. If I saw something wrong, I spoke about it. That was 45 00:03:42.319 --> 00:03:47.599 part of that cyber security mindset, all right. Now, something else is 46 00:03:47.719 --> 00:03:53.319 that we want to really try to define what sybergecuity mindset it's all about. 47 00:03:53.639 --> 00:03:57.389 All right, so I could go pick up western Western dictionary and I can 48 00:03:57.430 --> 00:04:00.069 read out of Webst ditionary and I can tell you what cyber security is and 49 00:04:00.110 --> 00:04:04.469 I can see what mindset is all about, but then listener still may be 50 00:04:04.550 --> 00:04:09.310 kind of loss so what I am going to do is to break it down 51 00:04:09.389 --> 00:04:14.259 for you. So let's think about this for a minute. The cybercurity mindset 52 00:04:15.259 --> 00:04:20.420 is it is nothing more than the mentality required to engage cyber security. All 53 00:04:20.459 --> 00:04:25.410 right, so you can think about this as a thinking process. All right, 54 00:04:25.850 --> 00:04:30.970 how do you get from point a to point Z when you engage cybersecurity? 55 00:04:30.329 --> 00:04:35.009 All right, part of that if you got to practice good cyber behavior. 56 00:04:35.449 --> 00:04:41.079 Now, what is behavior? Okay, it is it. It is 57 00:04:42.240 --> 00:04:46.600 really looking at cyber security and seeing what's right and wrong and being able to 58 00:04:46.720 --> 00:04:49.839 address it. Some of the other elements to is that you got to have 59 00:04:49.959 --> 00:04:55.350 a cyber focus attitude. All right, so you walk, talked and you 60 00:04:55.550 --> 00:04:59.990 breathe cybersecurity. All right, when you walk, talk and breathe Cybersecurity, 61 00:05:00.389 --> 00:05:04.110 that's when you had that mentality and you understand how is supposed to operating. 62 00:05:04.910 --> 00:05:09.180 All right. One of the other factors to and I'm going to use this 63 00:05:09.300 --> 00:05:14.860 as a as a person's example, right, you have to have a security 64 00:05:14.899 --> 00:05:17.779 engine. If you think about a car, right, if you put enough 65 00:05:17.819 --> 00:05:21.569 gas in your car, right, and if you have a key and you 66 00:05:23.050 --> 00:05:27.649 and you turn D eniction on, all right, that car is going to 67 00:05:27.769 --> 00:05:30.529 come on and you're going to be able to drive for a long distance. 68 00:05:30.050 --> 00:05:36.439 Well, if you're motivated to to engage into Cybersecurity, which is your gas, 69 00:05:38.560 --> 00:05:42.879 your security engine will operate all right. And when you look at your 70 00:05:44.040 --> 00:05:49.990 security engine, it is really being involved with cybersecurity. And one of the 71 00:05:50.029 --> 00:05:55.949 last piece is that you think holistically about things. So that means that you 72 00:05:56.110 --> 00:06:00.790 looking at soyber security from three hundred and sixty degrees. All right, so 73 00:06:00.910 --> 00:06:03.899 you're looking at all the elements and putting together and coming up with the best 74 00:06:03.939 --> 00:06:09.660 practices. All right, this is one of the most important pieces right here, 75 00:06:10.180 --> 00:06:16.459 as to think holistic about the way you do sobersecurity, because cybersecurity mindset, 76 00:06:16.819 --> 00:06:23.089 it's definitely, definitely has, has a crown connection to real world issues. 77 00:06:23.490 --> 00:06:28.329 Okay, so let's talk about those. One of those is that the 78 00:06:29.050 --> 00:06:35.759 responsibility chain. Right, who is responsible for sobersecurity? And most organizations the 79 00:06:35.879 --> 00:06:40.560 CIS, so is the gatekeeper, he is the one that has the key 80 00:06:40.639 --> 00:06:44.079 to the gate. All right, and blame is going to be put on 81 00:06:44.160 --> 00:06:46.350 the CI so so for everything. All Right, poor guy, all right, 82 00:06:48.069 --> 00:06:53.389 he's going to get the blame for everything. All right, because he's 83 00:06:53.430 --> 00:06:57.750 a sober security guy. All right. But but people that work below him, 84 00:06:57.910 --> 00:07:01.100 they also have a responsibility as well too. But but in this world 85 00:07:01.139 --> 00:07:04.300 as obscurity, you know, there's always the shifting a blame. Okay, 86 00:07:04.740 --> 00:07:10.860 when you shift blame, okay, so that means that you're not taking responsibility. 87 00:07:10.899 --> 00:07:14.699 This is one of the main problems with Obersecurity Day. All right, 88 00:07:15.139 --> 00:07:17.730 when you are in that mindset, you've dispel that. You put you to 89 00:07:17.810 --> 00:07:24.009 the side. Also to there are people, process and tools that go along 90 00:07:24.649 --> 00:07:30.000 with this real world issues here. Okay, people are the ones that that 91 00:07:30.160 --> 00:07:34.199 as she uses sobergecuity. Okay, processes is good from point a to B. 92 00:07:34.800 --> 00:07:39.959 Tools are pretty much, if you think of a software package that you 93 00:07:40.079 --> 00:07:44.350 can use to to manage sober security. Because if you are a security aneris 94 00:07:44.389 --> 00:07:46.910 out there somewhere, because you know about arc site, because you know about 95 00:07:46.910 --> 00:07:51.269 splunk, you know about tenable nexus and all the different software tools. Right, 96 00:07:53.069 --> 00:07:57.149 if you don't use them the right way, they are meanless. All 97 00:07:57.149 --> 00:08:00.899 right. So so you have to have a sobage cuty mindset, because if 98 00:08:00.980 --> 00:08:05.100 you look at at a threat log that tells you that that someone should not 99 00:08:05.180 --> 00:08:09.980 have assets to the system and you know that they should not have assets to 100 00:08:09.060 --> 00:08:15.209 the system and you sitting back watching facebook and you're not engaged on that, 101 00:08:15.610 --> 00:08:20.050 your Soberg security mindset is by four low. You are at negative one, 102 00:08:20.129 --> 00:08:24.209 at the bottom. All right. Some of the other factors is that proactive 103 00:08:24.250 --> 00:08:30.519 versus reactive. Right, and this modern world of technology, we always want 104 00:08:30.560 --> 00:08:35.960 to be proactive about the way we have a business, because being reacted means 105 00:08:35.000 --> 00:08:39.080 that you got to play catch up at the end. So when you have 106 00:08:39.240 --> 00:08:41.909 that soberagecuity mindset, what you're going to be doing is you're going to be 107 00:08:43.149 --> 00:08:48.149 proactive about things. If you look at a lot of incidents that have happened 108 00:08:48.149 --> 00:08:50.389 over the past couple of years, if you can only look back and say, 109 00:08:50.429 --> 00:08:56.139 okay, only if they were proactive at taking care of business, all 110 00:08:56.179 --> 00:09:01.259 right, all right. So part of the element is that you have to 111 00:09:01.419 --> 00:09:09.210 be proactive more so than reactive, because reactive is when you have an emergency 112 00:09:09.450 --> 00:09:13.049 in place. Now we don't want to be an emergency mode all the time. 113 00:09:13.370 --> 00:09:18.370 All right, some of the other factors. Is that a confused state. 114 00:09:18.690 --> 00:09:22.289 If you notice that when something happens, people, people are kind of 115 00:09:22.409 --> 00:09:28.639 not in a standard state, because he's working in a confused state. So 116 00:09:28.759 --> 00:09:31.840 what they so what disvererge Cety of mindset does? It actually allows people to 117 00:09:31.960 --> 00:09:37.480 have a standard to work by. Okay, so you can resolve problems. 118 00:09:37.120 --> 00:09:43.029 All right now, these are the connection to real world issues, but also 119 00:09:43.149 --> 00:09:48.830 to there are major, major components of the soverage cuitty mindset, major components, 120 00:09:50.149 --> 00:09:52.139 and I and I really want you to stay with me now, because 121 00:09:52.139 --> 00:09:56.779 if you're going to get a couple of coffee now, I would like for 122 00:09:56.940 --> 00:10:01.419 you to at least sit down here and stay with me for a second, 123 00:10:01.460 --> 00:10:05.419 because these are the major components that make up to soverage cutty mindset. So 124 00:10:05.500 --> 00:10:11.169 so let's talk about these components, all right. So, so let's talk 125 00:10:11.210 --> 00:10:13.769 about one of the main ones, which is the inclusive culture. When we 126 00:10:13.889 --> 00:10:18.850 take about the includes a culture, right, we are talking about at buying 127 00:10:18.929 --> 00:10:24.679 process, okay, we are talking about and Organization of people that have bought 128 00:10:24.759 --> 00:10:30.799 into cybersecurity. What you notice is that there's an image being followed. All 129 00:10:30.799 --> 00:10:37.230 right, everybody is on the same page. People are having a certain language 130 00:10:37.269 --> 00:10:41.309 that they use. All right, when you have an inclusive culture, that 131 00:10:41.509 --> 00:10:46.710 courtures built for that organization. If you think about the government and the way 132 00:10:46.750 --> 00:10:52.779 that they practice cybersecurity, that's a different culture. If you go to Bank 133 00:10:52.860 --> 00:10:56.740 of America because they are protecting financial information, that's a different culture and people 134 00:10:56.779 --> 00:11:01.820 have to be a part of that courture. Part of that culture is to 135 00:11:01.899 --> 00:11:05.330 have a growth mindset, is to realize that because you have not had a 136 00:11:05.450 --> 00:11:09.409 cybersecurity incident, that does not mean that you're safe. All right, and 137 00:11:09.730 --> 00:11:13.210 and if you believe you're safe, see that's called a fixed mindset. All 138 00:11:13.250 --> 00:11:18.759 right. So part of that effort is to have a growth mindset and knowing 139 00:11:18.879 --> 00:11:22.120 that although we don't see problems, you know what, we still need to 140 00:11:22.200 --> 00:11:26.759 grow because you have to be vigil one of the other factors to change. 141 00:11:26.799 --> 00:11:31.080 Change is always going to happen because you have to embrace change, because cybersecurity 142 00:11:31.240 --> 00:11:35.590 is a change in industry. Okay, because today you're doing good and it's 143 00:11:35.629 --> 00:11:39.190 Friday afternoon and you're happy and you're going to go to Miami, you're going 144 00:11:39.190 --> 00:11:43.669 to have a really good time, but Monday morning when you come back, 145 00:11:43.629 --> 00:11:50.259 you got to pull your out okay. So you got to embrace change and 146 00:11:50.580 --> 00:11:54.259 part of that is to have a buying structure. I always talk about a 147 00:11:54.340 --> 00:12:00.620 buying structure because people have to buy into cyber security and be sold. And 148 00:12:00.779 --> 00:12:05.610 if you are upper manage management of an organization, that's probably one of the 149 00:12:05.730 --> 00:12:09.610 hardest challenges that you ever going to have is to go have a buy instruction, 150 00:12:09.009 --> 00:12:13.490 all right, for your people. One of the other fact factor to 151 00:12:13.570 --> 00:12:18.840 a training, because when you bill training, it should model the organization. 152 00:12:18.879 --> 00:12:22.960 All right. I know a lot of time when we do cyber awareness training, 153 00:12:22.039 --> 00:12:26.639 you know, we see the little cartoon characters, you know, and 154 00:12:26.799 --> 00:12:30.950 you hit the button and you keep hitting the button and it's the same training 155 00:12:31.110 --> 00:12:35.269 over and over again. I've always thought that video game should be used to 156 00:12:35.269 --> 00:12:39.629 give training. Make it more real world, make it, make it functional 157 00:12:41.149 --> 00:12:45.740 for people, all right, because people want to be a part of something 158 00:12:45.779 --> 00:12:52.059 that good. Make it more relatable. All right, I'll I just have 159 00:12:52.299 --> 00:12:56.299 my own pet peas about training. I just think it should be fun. 160 00:12:56.980 --> 00:13:01.250 I just think that if it's one of those factors where you can have people 161 00:13:01.450 --> 00:13:05.730 to get involved with it and it could be fun. More so fun now 162 00:13:05.769 --> 00:13:13.120 now, outside of the inclusive culture, all right when you build that includes 163 00:13:13.159 --> 00:13:16.120 a courture. All right. What you're going to get out of that is 164 00:13:16.200 --> 00:13:20.720 that people situational awareness is going to be high. All right. For All 165 00:13:20.799 --> 00:13:24.600 you military people that are listening to me, I know you heard of situational 166 00:13:24.720 --> 00:13:28.909 aware this before. If you was on a naval ship in the middle of 167 00:13:28.950 --> 00:13:33.990 the ocean, situation awareness was in front of you for combat warfare. All 168 00:13:33.029 --> 00:13:37.590 right, and that's what cyber securitiou is about, combat warfare. All right, 169 00:13:39.629 --> 00:13:46.259 situation awareness is is really really thinking about where you are, and normally 170 00:13:46.340 --> 00:13:50.659 something is wrong. Now the key fact is that you have to understand the 171 00:13:50.740 --> 00:13:56.129 environment. Okay. Now that goes back to the inclusive culture. Is that 172 00:13:56.250 --> 00:14:03.049 when you understand the environment, like you know how a typical type of environment 173 00:14:03.090 --> 00:14:05.210 operates, right, and you can engage on that. Let's just say, 174 00:14:05.289 --> 00:14:09.320 for instance, right, everybody in here probably had an Arncle that was a 175 00:14:09.399 --> 00:14:16.480 mechanic, right, and he probably worked on cards and and if you went 176 00:14:16.559 --> 00:14:22.720 out in the backyard and if he turned on his favorite Cadillac, he would 177 00:14:22.759 --> 00:14:26.990 come back and tell you and say she has a problem. You go wet 178 00:14:26.029 --> 00:14:31.029 because he knows how that engine sound. Right. The same concept for cyber 179 00:14:31.070 --> 00:14:35.029 security. If you part of that environmental knowledge. You know how it operates 180 00:14:35.389 --> 00:14:39.860 because you know how the environment operates, because you know the IP address scheme, 181 00:14:41.299 --> 00:14:46.820 because you know how certain applications operating. Right. So, so if 182 00:14:46.860 --> 00:14:52.659 you have that situation awareness, then you can make things happen. I remember 183 00:14:52.779 --> 00:14:56.129 my first engagement into situation wharing. This was was been on the naval ship. 184 00:14:58.690 --> 00:15:01.929 You know, my primary mission was to search aircrafts and try to engage 185 00:15:01.970 --> 00:15:05.610 out crafts, and I remember when the captain was standing behind me and he 186 00:15:05.690 --> 00:15:09.600 said, chief heart, who is that a cure frontal to the left or 187 00:15:09.639 --> 00:15:13.559 there? I like, well, sir, that's a Pthree, and I 188 00:15:13.679 --> 00:15:18.080 had to give him information and I knew it was a pthree because because I 189 00:15:18.159 --> 00:15:20.549 had certain sensors that I could look at. Now, part of the cyber 190 00:15:20.629 --> 00:15:24.830 is part part of the situation whearing this is to have a cyber sense, 191 00:15:26.110 --> 00:15:28.549 okay, a cyberth sense, and saying that I know this is wrong. 192 00:15:30.070 --> 00:15:33.309 All right, think about this. When you leave your house, you know 193 00:15:33.710 --> 00:15:39.659 how your furniture is arranged, you know what are the lights are turned off 194 00:15:39.340 --> 00:15:43.019 and you know whether the TV is off to right. So if you come 195 00:15:43.100 --> 00:15:46.700 back home and you know this your TV is on and you see McDonald's on 196 00:15:46.779 --> 00:15:50.809 the table and nobody else has a key to your house. That's your situation 197 00:15:50.889 --> 00:15:54.370 where the ship rise up. Is something wrong, and that's his part of 198 00:15:54.529 --> 00:16:00.250 your environment, part of your environmental knowledge. All right, but you have 199 00:16:00.450 --> 00:16:03.559 to trust your cyber senses, though, and you build upon your cyber senses, 200 00:16:03.960 --> 00:16:08.360 because if you're working in out and you're working in Cyprus and cyber when 201 00:16:08.399 --> 00:16:15.159 you come on board and you see something wrong, maybe a vulnerability right that 202 00:16:15.320 --> 00:16:18.830 you never seen before, you have to investiget. I remember times when there 203 00:16:18.870 --> 00:16:22.070 were rolled devices on the network and people just got medicine. Oh well, 204 00:16:22.149 --> 00:16:25.590 that's not part of the net with what you need to investigate it. What 205 00:16:25.830 --> 00:16:30.350 is it? All right, I was a early guy working as an HBSS 206 00:16:30.389 --> 00:16:36.179 analyst for you people that that are in the dald space. You know about 207 00:16:36.220 --> 00:16:40.620 epararkers creator, you know those long nights, a midnight to aid in the 208 00:16:40.659 --> 00:16:45.340 morning, standing a watch. I was there watching a lot of things and 209 00:16:45.460 --> 00:16:48.210 I remember I used to see things that were out of order, like rogue 210 00:16:48.250 --> 00:16:51.129 devices and so forth, and I have to make all of those reports. 211 00:16:52.009 --> 00:16:53.929 All right. Some of the other fact that that you want to think about 212 00:16:53.929 --> 00:16:59.169 to when it comes to situation where in this is information sharing. Okay, 213 00:16:59.769 --> 00:17:06.000 information sharing. This very, very important. Okay, because because we're information 214 00:17:06.079 --> 00:17:10.160 sharing, all right, because you need to know who, what and why 215 00:17:10.319 --> 00:17:14.400 and went to share data with, because if you don't, you could increase 216 00:17:14.519 --> 00:17:18.710 risk. All right. So, speaking a risk, let's just talk about 217 00:17:18.789 --> 00:17:22.269 risk space thinking. You know, it's getting far now. For you cyber 218 00:17:22.349 --> 00:17:26.670 security folks out there. You know what risk space thinking is all about. 219 00:17:26.670 --> 00:17:33.259 All right, because in the normal type of environment we are always compliance focus, 220 00:17:33.900 --> 00:17:37.339 but if you focus on risk, you are looking at the entire picture. 221 00:17:37.779 --> 00:17:41.779 Okay, this is where the three hundred and sixty degrees of security visibility 222 00:17:41.940 --> 00:17:47.410 comes comes to play into surface, because with risks, right, we want 223 00:17:47.450 --> 00:17:52.210 to look at the entire picture. We are thinking about holistic defense. All 224 00:17:52.250 --> 00:17:56.289 right, some of the elements that go along with risks. Always like to 225 00:17:56.849 --> 00:18:00.599 give this a knowledgy here. Let's say, for instance, if you had 226 00:18:00.640 --> 00:18:06.279 a hundred checks, right, and if the organization say that if we get 227 00:18:06.440 --> 00:18:10.160 ninety of these right, we get a ninety percent and that's how benchmark all 228 00:18:10.160 --> 00:18:12.829 right. So so you do your compliant checks and you get a ninety and 229 00:18:12.910 --> 00:18:18.190 you pass it. Should you stop there, all right, should you stop, 230 00:18:18.269 --> 00:18:22.710 get some coffee, go to McDonald's and say, who excresses Ow it? 231 00:18:22.029 --> 00:18:25.829 Well, guess what? Discretion still are you still got a ten percent 232 00:18:25.910 --> 00:18:27.660 factor there. So you have to look at the entire picture, and this 233 00:18:27.900 --> 00:18:32.259 is where risk space thinking comes to play a key role. Now, it's 234 00:18:32.339 --> 00:18:36.099 nothing wrong about compliance, because it gives us a benchmark to go follow, 235 00:18:36.619 --> 00:18:41.569 but what we have to do is to think about risk. We we have 236 00:18:41.690 --> 00:18:45.009 to look at the entire picture, a scoping of thing. Okay, some 237 00:18:45.170 --> 00:18:52.250 of the other factors that goes along with risk, spake snaking is your response, 238 00:18:52.609 --> 00:18:56.079 which is your responsible actions and ownership. Right. This is where shifting 239 00:18:56.160 --> 00:19:02.240 the blame comes to play a key role here, right, because when you 240 00:19:02.480 --> 00:19:07.000 take response disability for cyber security, and you see risk, it's not a 241 00:19:07.119 --> 00:19:11.670 bad thing because, because if you don't know what's on your environment, then 242 00:19:11.710 --> 00:19:15.869 you can't protect yourself. So if you find the risk, it's an opportunity 243 00:19:15.309 --> 00:19:18.950 to go take advantage of things, because what you don't want to have is 244 00:19:19.069 --> 00:19:22.549 to have an environment what you so reactive all the time, all right, 245 00:19:23.190 --> 00:19:26.940 because you want to be proactive. All right. So so if you have 246 00:19:27.220 --> 00:19:33.059 that risk space thinking, you are always thinking about. Okay, I know 247 00:19:33.380 --> 00:19:36.660 that we got a ninety percent, but I need to take it further. 248 00:19:37.059 --> 00:19:41.130 All right, when you have risk space thinking, all right, you are 249 00:19:41.130 --> 00:19:45.369 always in that growth mindset category. All right, you know, you're trying 250 00:19:45.410 --> 00:19:48.930 to grow and you're trying to get better. All right, proactives have been 251 00:19:48.049 --> 00:19:52.849 reacting measures, right, you know what. You want to be proactive about 252 00:19:52.849 --> 00:19:56.640 things. All right, this is what risk space thinkings is all about. 253 00:19:56.400 --> 00:20:00.319 All right. Now, I know, for instance, that that if you 254 00:20:00.440 --> 00:20:06.000 are in this sobogscuted world and if you have our ever have done a security 255 00:20:06.319 --> 00:20:11.190 assessment before, this is what wrist space thinking comes to play a key role. 256 00:20:11.750 --> 00:20:18.349 Now, I realized that if organization fails their security assessment test, that 257 00:20:18.990 --> 00:20:22.700 that the clients may get a little worried, or if they fell an audit. 258 00:20:22.339 --> 00:20:25.940 And this is what risk space thinking is come to play a key roll, 259 00:20:26.019 --> 00:20:30.779 because risk can be created by people too, by by not giving the 260 00:20:30.779 --> 00:20:37.049 right information, by taking reports and falsify them. I'm not I'm not here 261 00:20:37.089 --> 00:20:40.089 to make a statement and to say what you can and cannot do. I'm 262 00:20:40.170 --> 00:20:44.210 just speaking the facts. All right, risk space thinking is very, very 263 00:20:44.329 --> 00:20:48.089 important because, because you have to have an understanding of risk, so you 264 00:20:48.170 --> 00:20:52.319 know where you are headed at all. Right now. Now, if you 265 00:20:52.400 --> 00:20:57.839 understand risk, one of the things that can happen is that that you can 266 00:20:57.920 --> 00:21:04.630 move into an area what you can transform your mindset. Transforming the mindset is 267 00:21:04.710 --> 00:21:07.829 very a very important see now, see, you know. Now it's getting 268 00:21:07.869 --> 00:21:11.230 good. Now it's getting really good. Okay, because when you transform your 269 00:21:11.269 --> 00:21:15.710 mindset, some of those always that you have to a cybersecurity is gone. 270 00:21:17.269 --> 00:21:22.940 All right, because in this day's right we are involved with digital modetization. 271 00:21:22.380 --> 00:21:26.819 When you go through digital modemization, it a transformation, it is changing the 272 00:21:26.900 --> 00:21:32.859 way we do business. Part of those elements that ashually go with transforming the 273 00:21:32.930 --> 00:21:38.210 mindset is to go realize that you need to look at security from three hundred 274 00:21:38.289 --> 00:21:42.730 and sixty degrees. All I want to make a statement here in the statement 275 00:21:42.930 --> 00:21:48.359 is that there's a direct link and connection with everything that I'm talking about, 276 00:21:48.359 --> 00:21:51.960 because when I first started, I said that there's elements that actually make up 277 00:21:51.960 --> 00:21:55.599 to cyberscrate mindset, because it's a process. And now, as you see, 278 00:21:56.119 --> 00:22:00.279 when I spoke about the inclusive courtsial situation, where in this wrist base 279 00:22:00.359 --> 00:22:04.549 thinking, and now I transform and start to talk about transforming the mindset. 280 00:22:04.710 --> 00:22:10.470 Now you see what all the distance working. Okay, because digital modization is 281 00:22:10.509 --> 00:22:15.069 about making things better, and part of that digital modetization is to go and 282 00:22:15.109 --> 00:22:18.099 look at your people and, you know, to make sure that people are 283 00:22:18.140 --> 00:22:22.180 properly trained. Because if you have an organization out there, let's say, 284 00:22:22.180 --> 00:22:29.940 for instance, if you have a bunch of your employees that are probably a 285 00:22:30.250 --> 00:22:33.609 security plus, Short, short five, which is which is good. But 286 00:22:33.730 --> 00:22:37.210 imagine if you can take the organization and have everybody is to get to see 287 00:22:37.250 --> 00:22:42.369 I ssp. All right, this is where the value proposition mentality comes to 288 00:22:42.450 --> 00:22:45.880 play, key roll, because if you a business owner or if you are 289 00:22:45.920 --> 00:22:53.319 a candidate that is working in at the value proposition mentality is very high. 290 00:22:53.599 --> 00:23:00.829 It's very good, because what happens is that that you bring more capabilities, 291 00:23:00.589 --> 00:23:04.269 not so much to your company and not so much from the company to the 292 00:23:04.390 --> 00:23:08.269 clients, but you bring it to yourself. Just just imagine this, right, 293 00:23:10.109 --> 00:23:15.859 if it was a company out there only only and only had maybe six 294 00:23:15.940 --> 00:23:21.460 or seven different type of cyber security capabilities, and, let's say instant, 295 00:23:21.819 --> 00:23:25.819 I of if they wanted to expand those to twelve and thirteen different type of 296 00:23:26.140 --> 00:23:30.329 capabilities right. A part of that is having that workforce in place, and 297 00:23:30.609 --> 00:23:34.250 so they hire people that got background in cloud, people that got got background 298 00:23:34.329 --> 00:23:37.049 in different, different areas of cyber security, and you know, they have 299 00:23:37.130 --> 00:23:42.000 all these certifications. So what that means that that your capabilities rises up. 300 00:23:42.480 --> 00:23:48.559 Now, once your capabilities increase, now you are better service to your clients. 301 00:23:48.839 --> 00:23:52.960 And if you are better service to your client now, what happens here 302 00:23:52.039 --> 00:23:55.829 is that you become a high value asset. And if you are high a 303 00:23:56.069 --> 00:23:59.869 asset, that's where the money start flow. They would not let you go. 304 00:24:00.470 --> 00:24:06.630 Now. This is part transforming the mindset is to increase your capability profile. 305 00:24:07.230 --> 00:24:12.940 And it works whether you are a steward and sobagecurity. What are Your 306 00:24:14.019 --> 00:24:18.500 Business or what are you just as a client to that kind of wants to 307 00:24:18.539 --> 00:24:23.369 look at this and want your vendors to have better capabilities. You know, 308 00:24:23.450 --> 00:24:30.609 it's well too. Part of this element to when you when you transform the 309 00:24:30.650 --> 00:24:33.809 mindset is that you're going to be wearing the hackers hat, all right, 310 00:24:34.289 --> 00:24:38.440 so so so when you wear that hackers hat and so you're thinking like a 311 00:24:38.480 --> 00:24:42.480 hacker. All right, so you're going to place your employers in a place 312 00:24:42.920 --> 00:24:48.240 where everybody thinks like a hacking. Now now I'm talking on the ethical side, 313 00:24:48.640 --> 00:24:52.069 because there is the unethical hacking as well too. But see, we 314 00:24:52.150 --> 00:24:56.750 talking ethical, right. And if you can place your people to think like 315 00:24:56.829 --> 00:25:03.069 a hacker, you can a always and always and always operate. And what 316 00:25:03.230 --> 00:25:07.900 I call the sober security mode of operation. Now the cybersecurity mode of operation 317 00:25:07.140 --> 00:25:15.700 is has talk about ongoing practice and looking at cybersecurity from a continuous monitor point. 318 00:25:17.299 --> 00:25:21.450 Part of that is to make sure that you have that adaptive mindset. 319 00:25:22.130 --> 00:25:27.890 So let's talk about the adaptive mindset. The adapted mindset is really really looking 320 00:25:27.970 --> 00:25:33.769 at residence. Okay, knowing that when you deal with Cybersecurity, you know 321 00:25:33.849 --> 00:25:38.279 that always going to be changes. Okay, you can go one day and 322 00:25:38.400 --> 00:25:42.839 you got a system that is working fine, but then fifteen or twenty minutes 323 00:25:42.880 --> 00:25:47.759 later there's a problem with the system. All right, and this is what 324 00:25:47.960 --> 00:25:52.470 that adapted mindset comes to play a key role because you become resilient, because 325 00:25:52.509 --> 00:25:57.309 you realize that that you need to put things back in place. But having 326 00:25:57.349 --> 00:26:03.710 that adaptive mindset goes back to being proactive and what you do with cybersecurity. 327 00:26:03.190 --> 00:26:08.180 Okay. Now, now, part of that too is to go and to 328 00:26:08.299 --> 00:26:18.690 also think about think about continuous monitor yeah, because we can. We continuous 329 00:26:18.730 --> 00:26:23.809 monitor. You always engage and always looking at side security and seeing sin exactly 330 00:26:25.049 --> 00:26:30.529 where you can go. All right. Now now let's talk about the industry 331 00:26:30.609 --> 00:26:33.799 usage. All Right, here's here's the way. You take this oberscate of 332 00:26:33.839 --> 00:26:37.240 mindset and use it in the industry and make it very simple. Oh, 333 00:26:37.440 --> 00:26:41.920 simple. Did I say simple? Yeah, just I did say simple. 334 00:26:41.359 --> 00:26:45.960 Simple means that you want to keep security simple. You don't want to make 335 00:26:45.000 --> 00:26:51.470 it hard, because security shouldn't should not be hard. Now it becomes hard 336 00:26:51.589 --> 00:26:55.390 because there is no order process. There is no process, all right, 337 00:26:55.829 --> 00:27:00.029 because people are at hot now. Ad Hoc means that that you're running and 338 00:27:00.150 --> 00:27:03.900 you're not going from a to be to C. Right, you did, 339 00:27:03.059 --> 00:27:06.619 you know. You try to jump from A to Z, but that's a 340 00:27:06.700 --> 00:27:08.700 process, all right. So when you add hoc, you know you just 341 00:27:08.779 --> 00:27:12.859 trying to patch things and fix things and put it together, but eventually that 342 00:27:14.460 --> 00:27:18.809 fault would come back again. So what the soberscuated mindset does is focus on 343 00:27:18.930 --> 00:27:22.529 try to keep security simple. All right, and it can be simple. 344 00:27:23.369 --> 00:27:30.119 Part of that is because you will ressolve disc connections and I state. That's 345 00:27:30.160 --> 00:27:37.079 because there's a lot of disconnections and sober security, all right, and when 346 00:27:37.160 --> 00:27:41.079 you have those disc connections, then where you can't get things right. So 347 00:27:41.200 --> 00:27:45.750 you always going to be trying to fight from the rear and, you know, 348 00:27:45.950 --> 00:27:48.509 to take things, you know, the wrong way. All right. 349 00:27:48.910 --> 00:27:52.390 One of this, one of the things I like to say is that the 350 00:27:52.509 --> 00:28:00.420 soyberscruatey mindset is also using use in industries out there, and I've seen a 351 00:28:00.460 --> 00:28:07.660 lot of people that actually use cybersecurity for the best of the works, because 352 00:28:07.700 --> 00:28:11.819 it helped resolve solutions, because that's the end state of the soyberscated mindset really, 353 00:28:12.609 --> 00:28:18.410 is to help bizarre solutions, because there's problems out there. But if 354 00:28:18.450 --> 00:28:21.730 you have that mindset in place, then you can channel from point a to 355 00:28:21.809 --> 00:28:23.890 point CE. I'm going to keep repeating that, point a to point Z, 356 00:28:25.049 --> 00:28:30.319 because it's a process, all right. Now, now I also like 357 00:28:30.480 --> 00:28:37.319 to say that when you think about the cyberscrty mindset, it's it just really 358 00:28:37.359 --> 00:28:42.829 really works, all right, and it works because because it's a thinking model, 359 00:28:44.349 --> 00:28:48.869 right, and there are many, many other pieces to the syberscuatey mindset. 360 00:28:49.190 --> 00:28:53.029 And and I'm going to talk about your big surprise. All Right, 361 00:28:53.630 --> 00:29:00.460 January, the twenty Tewcod of two thousand and twenty two, the first ever 362 00:29:00.579 --> 00:29:04.380 release of my first book called the sobrage good in mindset of virtual and transformation 363 00:29:04.539 --> 00:29:07.859 thinking mode will be released. I want to save that to the end, 364 00:29:07.940 --> 00:29:11.690 so I let everybody know, because what I have went over today it just 365 00:29:11.809 --> 00:29:15.690 a small piece of what the book is about. All right, and this 366 00:29:15.890 --> 00:29:19.650 much more information in the book, because the book is for everyone. I 367 00:29:19.730 --> 00:29:22.890 don't care if you'll ceias. Oh, I don't care, if you are 368 00:29:22.890 --> 00:29:26.640 a regular reader, if your journalist, if you are a radio station host, 369 00:29:27.200 --> 00:29:32.519 whatever the book is, the book is right for you. And January 370 00:29:32.519 --> 00:29:36.720 ready, the first ever release of a cyber secuit of mindset will be out 371 00:29:36.759 --> 00:29:38.509 in print and I can't wait for it to come out because I'm going to 372 00:29:38.589 --> 00:29:42.789 have some podcast sessions and I'm going to have have have some invites on this 373 00:29:42.869 --> 00:29:48.069 show. And I tell you what, it really really works, because because 374 00:29:48.150 --> 00:29:52.500 one of the things that that you get out of the cyber security mindset is 375 00:29:52.619 --> 00:30:00.539 that you can see why safeguard privacy and and information share and operate together. 376 00:30:00.579 --> 00:30:04.660 All right, because that is very important right there, because that is a 377 00:30:04.740 --> 00:30:11.089 very, very key element to the cybersecurity all right, and guess what? 378 00:30:11.690 --> 00:30:18.170 All right, and episode three we're going to be talking about that. You've 379 00:30:18.170 --> 00:30:22.359 been listening to the chief of Cyber Security Podcast, where you have gained relevant 380 00:30:22.400 --> 00:30:26.640 knowledge to enhance your cyber security mindset. Be Sure to visit dwayne heartscom to 381 00:30:26.720 --> 00:30:33.680 learn more about authored publications, show notes and discover more information concerning cyber security. 382 -->

Other Episodes

Episode

August 29, 2022 00:26:21
Episode Cover

Supply Chain Management and Cybersecurity

Supply chain management (SCM) is the active management of supply chain activities to maximize customer value and achieve sustainable competitive advantage. It represents a...

Listen

Episode

May 09, 2022 00:30:03
Episode Cover

Interview with Dewayne Hart about the "Cybersecurity Mindset."

This podcast is the first in a series of Global Podcast Studios hosted a one-on-one conversation to learn more about the Cybersecurity Mindset's direction...

Listen

Episode

October 25, 2021 00:27:45
Episode Cover

What is Wrong With Your Vulnerability Management Program?

Vulnerable organizations may have varying security risks when their Vulnerability Management program lacks maturity and effectiveness. This podcast session aligns the operational standards required...

Listen