Why is Log4J still so successful? | Guest Etay Maor
Today on Cyber Work, I talked with Etay Maor, Chief Security Strategist with Cato Networks. Etay is a founding member of the Cato Cyber Threats Research Lab, or CTRL — see what they did there? — and he joins me to talk about their first CTRL report on attack patterns and methods. We’re going to talk about the most common attack vectors, why Log4J still rules the roost even against newer and flashier exploits, and we go deep into the many paths you can take to become a threat researcher, threat analyst, reverse engineer, and lots more. That’s all on today’s episode of Cyber Work!
0:00 - Intro
4:10 - First interest in cybersecurity and tech
5:15 - Becoming chief security strategist
8:15 - Working in cybersecurity project management
12:07 - Hacker targets and AI
15:04 - The dark web and security access
16:03 - The CTRL report in brief
20:23 - Health care cybersecurity
22:49 - Different cyberattacks in different industries
25:10 - Using security tools as a gateway
27:03 - AI-enabled cyberattacks
33:14 - Careers as a cybersecurity threat researcher
36:09 - Figuring out where to specialize in cybersecurity
41:31 - Important cybersecurity skills and experience
45:58 - Hiring in cybersecurity
49:30 - Future changes in AI and cyber tools
55:38 - What is Cato Networks?
57:13 - Outro
– Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
About Infosec
Infosec’s mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ’s security awareness training. Learn more at infosecinstitute.com.
Transcript
Chris Sienko:
CyberWork and InfoSec would like to introduce you to our new Cybersecurity Beginner Immersive Boot Camps. They're designed to help you gain and enhance your expertise in the cybersecurity field. Join our live interactive virtual classes led by InfoSec's highly skilled instructors, who will guide you through the material and provide real-time support. And, as part of InfoSec's Immersives training, each student will have access to career coaching aimed at helping them start or switch to the cybersecurity field. You heard that right. We aren't here to just teach you the concept of what a security professional does. We want to prepare you to enter the job market with a competitive edge in six months time. Now I've told you about InfoSec certification boot camps, and if you're trying to hit your next career target and need a certification to do it, that's still your best bet. But if you're an entry-level cybersecurity professional or want to be, or you're switching your career and want to experience a career transformation, infosec's immersive boot camps are designed to make you job-ready in six months. To learn more, go to infosecinstitutecom. Slash cyberwork all one word C-Y-B-E-R-W-R-K and learn more about this exciting new way to immerse yourself in learning with InfoSec. Now let's begin the show Today. On Cyber Work, I talk with Itay Maor, the Chief Security Strategist with Cato Networks. Now Itay is a founding member of the Cato Cyber Threats Research Lab, or CTRL See what they did there and he joins me to talk about their first CTRL report on attack patterns and methods. We're going to talk about the most common attack vectors, why Log4j still rules the roost, even against newer and flashier exports, and we go deep on the many paths that you can take to become a threat researcher, threat analyst, reverse engineer and lots more. That's all on today's episode of Cyber Work.
Chris Sienko:
On today's episode of Cyber Work.
Chris Sienko:
Welcome to this week's episode of the Cyber Work podcast. My guests are a cross-section of cybersecurity industry thought leaders, and our goal is to help you learn about cybersecurity trends, how those trends affect the work of infosec professionals, and leave you with some tips and advice for breaking in or moving up the ladder in the cybersecurity industry. My guest today, itai Maiour, is the chief security strategist at Cato Networks and is a founding member of Cato Control or CTRL, which is an industry-recognized cybersecurity researcher. He has also held senior security positions at IBM, where he created and led breach response training and security research, and RSA's Security Cyber Threats Research Lab, where he managed malware research and intelligence teams. Itai is an adjunct professor at Boston College and is part of the Call for Paper committees for the RSA Conference and Qubits Conference. Today we're going to be talking with Itai about Cato Networks and their CTRL report on some attack trends that they have seen with regards to AI and machine learning. So, itai, I just wanted to thank you very much for joining me today and welcoming you to CyberWork.
Etay Maor:
Thank you very much for having me. Glad to be here.
Chris Sienko:
My pleasure. So, Itai, to help our listeners get to know you a little bit, where did you first get interested in computers and tech and cybersecurity? You have a very tech-intensive career trajectory here, so I'm guessing it was pretty early on. But what was the initial spark?
Etay Maor:
Actually, when I was a kid and started learning about computers at elementary school For those of us who remember Commodore 64, that was my first memory.
Etay Maor:
I think I had an Atari. My first memory is of a Commodore 64. And just playing around with the computer, with the components, with the electricity, but also with the software. And that's really where I started and got interested in that. Afterwards, you know, came I don't know where BBS is popular here bulletin board systems, modems so I got into that. And then the internet and it just, you know, continued from that point on. Okay.
Chris Sienko:
Yeah, yeah, you said over here, where were you doing your learning as a child.
Chris Sienko:
Oh, so I grew up in uh, israel, although several years also in in the us, in minnesota, sylvania yeah, I had a commodore 64 as well and I remember going to a commodore 64 club at my local library and I know that there were a lot of sort of bbs things going on there. I mean, honestly, I was just there because people were selling games and stuff like that. I didn't have that, I didn't have the take it apart, put it back together impulse that a lot of my guests do, but I always love hearing about that kind of thing. So I want to look into your background a little bit. You have a pretty well-rounded career. You know such on a lot of different areas. You've been a cyber threat researcher, project manager, security strateger, chief security officer and more. So, like what were some of the? Can you sort of walk us through the foundational job changes, the pivot projects that helped you get to where you are today as chief strategy? Chief security strategist for Cato?
Etay Maor:
Sure. So my first formal job was following my military service and I started working for a company that actually did neural network security, which is AI. Hey, AI is not something new, would you know, no, yeah, yeah, that's right.
Chris Sienko:
We called it neural network back then. That's right yeah.
Etay Maor:
Yeah, so that was in 2000, october 2000 when I started there. Okay, so I did that and did a couple of security kind of like pen testing works, you know jobs and got into learning computer science. So I got my formal kind of education, but on the job of course I had to learn networking and everything that I had to, you know, to do. So I got the formal education, but I didn't actually get cybersecurity formal education. I got computer science Throughout that whole bachelor's degree. I only had one course in security that was focused around the RSA algorithm.
Etay Maor:
Following that, I joined afterwards RSA, and RSA is actually where RSA security is, where I really took a step forward, because I started there as a project manager and I started kind of seeing what's happening in the field. We were protecting mostly financial institutions. We're talking now in 2007, roughly what is phishing? What is malware? How does the customer see this? What do they suffer? What do we see with the criminals? The industry was building up. That was the time it was really building up. Firewalls were already, I think, checkpoint was already there and everything, but it was still, you know, uncharted territory.
Chris Sienko:
Yeah, it's weird to be part of an industry that was learning what the industry was as it was happening, you know.
Etay Maor:
Yeah, exactly. And, by the way, I feel like the same thing happened on the other side of the fence for the black hats. Right, they were also kind of okay, what do we do here? We have a whole new opportunity here, and we had to learn what they're thinking and what they're doing and their tactics and expand not just from the technology side but also, you know, the human side, the social engineering aspects of it. And so it was. It was really interesting. That's that's actually where my career really kind of like started pointing towards a direction. That's actually where my career really kind of like started pointing towards a direction.
Chris Sienko:
So yeah, you're. Yeah, you really sort of took off at that point where there was this you know the supernova of new opportunities, both both good and bad. I I sorry. I want to go back to one slightly less. It's actually expensive. I want to know about your how you jumped into project management, because every time we have a project management guest sign here, it just blows up. Everyone wants to know about it. So was that something that you had been doing in a previous job or was that completely new to you when you did it? And, if so, how did you get up to speed on such a sort of complex behind the scene thing?
Etay Maor:
So at the time project management could mean a lot of different things and I did do project management at the only company that wasn't a cybersecurity company, which was a company I worked for a while during my studies. The dean of my school was really unhappy that I was working while studying, but I made it happen somehow and I got an idea of project management, of learning about customer needs and what they expect. It was almost like a project management slash professional services kind of role. And then the opportunity arrived for RSA and at RSA a project manager was closer to what I would think today is referred to as a customer success manager. So he was sitting with the client, understanding what are their problems, making sure that they're happy.
Etay Maor:
But at the time you really had to know a lot more than just engage with the client. You had to actually know the technical elements there. And that's where I really started drilling down on the technical side of things and really understanding the ins and outs of how the phishing attacks work, the malware attack works, all those different elements. And at the same time you also had to have the commercial side of talking to the client and understanding his needs, understanding his budgets. You couldn't just say, hey, just buy one, two, three, four, five, and I would get a reply. That's really awesome, but you're not the only budget that I have, a pretty, so that's how I started learning. A lot of the learnings happened through hard lessons learned and stakes and issues that were made.
Chris Sienko:
Yeah, well, that's that's interesting because you know, we we try to show as complete a map as possible on here of all the different ways that someone can get into cybersecurity at different levels of sort of technical acumen, and that there are certain jobs that are just as vital that might not necessarily need you to be doing like the very heavy tech work and stuff.
Chris Sienko:
And when we say things like sales or customer success, people think, oh well, that's just you know, that's like the other side of the fence, that's just you know, it's completely unrelated to cybersecurity. But, like you said, if you're going to do it well, you have to absolutely know inside and out, A, how the product works, but B, how the sort of threat landscape looks like, I imagine, and what people actually need this for, so that you're not just selling them something that sounds cool or that they say I don't even know what I could use that for, and then they just sort of walk on by. So yeah, I think, I think that's that's that's worth noting that that's sort of the sales aspect is still very tech tied.
Etay Maor:
Yeah, I think you do have to have some fundamental understanding. You can't just jump in there, and you know, for especially when you're dealing with chief information security officers, with with the buyers and influencers, they will ask you questions and it's very easy to see those who can't get out of their very specific, narrow understanding and start talking about adjacent topics. Now it is okay, and I say that as well, that's not my forte, that's not my expertise. If you're asking me a very specific for example, I don't know blockchain question, no problem, I'll tell you that I'm not an expert. But in my field I can branch out and talk and help, based on experience that I have and based on understanding to aid the customer. And then they see, hey, this is a person who knows they're not just trying to sell me a product, they are there to be my trusted advisor, to understand what they're talking about.
Chris Sienko:
Yeah, yeah, and you know, I think when we talk about being constantly curious and constantly learning, I think part of that it's part of that as well. It's not just to, you know, do your own job better, but to be able to sort of communicate what your job is or what you, you know, need from other people who have other sort of backgrounds and things like that. So I think that's good advice as well. So Itai today, as you know, today's episode we're going to be digging into some of the findings that were reported in Cato's Cyber Threat Research Lab's inaugural report. This is the first one, so I found a lot of interesting findings here about hacker targets and attack services and the sort of ever-present question of how AI tools figure in all of this, both offensively and also defensively and also as a discrete target of its own. So first, can you talk about how you tracked and processed your findings? What was the sort of methodology in this report?
Etay Maor:
So there are different things that went into the Cato Control by the way, control stands for Cyber Threats Research Lab, the Cato Control report All locked in. We collected information since what Cato Networks does. For those who aren't familiar with what SASE is Secure Access Service Edge, it's the convergence of networking and security. So it's a cloud-based solution that allows organizations to do both networking and security through one system, one service, one cloud backbone and, as such, we have an understanding of everything that is happening on our customers' network. We have over 2,200 customers, so we see all the traffic. So we're talking about this is a quarterly report over 1.2 trillion network flows that were analyzed, huge amounts of data. That is one element. Another element is our own research. So we'll take malware, we'll reverse engineer it, We'll do open source intelligence, We'll try to see what is out there, and the third kind of pillar is our ability to analyze and access underground and dark web forums and chat rooms to see what the criminals are talking about, what they're selling, what they're buying, what are the tools and so on. So you take all three, combine them together and that's the result is what you see in the reports. It's an understanding of what is.
Etay Maor:
I try to think about my report, my report, control report, in three tiers, right, I want it to be strategic. So, hey, Mr C, so here's what's happening around the world, here's what we see. Here are trends, here are tactics and so on. Hey, here is the next level is from strategic to operational. Here's what's happening in your industry. Right, you are in the manufacturing industry. Here's what's happening in the US. Here's what's happening in Germany. Here's what's happening in Japan. It's important because these things, can you know, target you at some point. Here's what your colleagues are facing. And then the last portion is here's what's happening to you, right, here's some very specific elements and that's kind of like how we created the report and where we get the information from.
Chris Sienko:
Love it. Just you know, because I know someone's going to be mad at me if I don't ask about it. What is your like? What does some part of your company have access? You know? Do you? Do you actively access the dark web and look through, like the forums and the discussion things? Are you getting that info from someone else or how does that come to you?
Etay Maor:
yes, all the above so no, yeah, we, we, we have our own intelligence capabilities. Um, we go into these forums. We sometimes are just participants and listeners, sometimes we're active, sometimes we do interrogations, not the where's the money.
Chris Sienko:
Right, right. Hey everybody, I'm one of you. Why don't you tell me about what you're up to these days?
Etay Maor:
Right, and it gets trickier when you're talking also about a language barrier, because if you're talking to, for example, a Russian cyber criminal, they know if they're using Google Translate or if you know Russian. So we have these capabilities in-house too. Interesting these types of things.
Chris Sienko:
Oh, fascinating. Okay, well, great, so yeah. So you've covered this from every conceivable angle in terms of what's going on right now. So that's going to give this a lot of heft here. So I guess, to start at the highest level here, can you give us some of the sort of 10,000-foot view findings of the CTRL report? Are there any that?
Etay Maor:
were especially surprising to you or represented a shift in how hackers are deploying their attacks these days. So it's kind of interesting. There's a lot of oh my God, haven't we been saying this for like 20 years? Some of the same type of squatting and fishing attacks and the same techniques that we've been looking for and analyzing for the past two decades, and even a little bit more than that. So some of the same old stuff unbelievably a lot of it still works, and sure, it's not the same fishing attacks that you saw 20 years ago. They're much more professional. They look better now with the aid of AI no grammar, spelling mistakes and you know, it looks a lot better and more professional. But if you look at the very core of it, it's the same thing. Right, it's. Let me get that person's credentials through some way, shape or form, or let's infect them with a piece of of malware. It's really interesting.
Etay Maor:
When you look at some of the vulnerabilities that attackers are trying to exploit on on networks, you'll see a lot of very old ones. So you know, I'm a researcher. You say zero day, I won't shut up and I'll just talk forever because I love these things, right, but the the threat actors. If you look at what they're trying to utilize, they're utilizing some vulnerabilities, like Log4J, that may be two or three years old, but others also that are 10 years old and they're still using them because patching is hard and not everybody can patch all their systems and you miss things, and so we see these types of very kind of like. You'll see a CVE from 2012 and it's like really that works. Yeah, 2012, and it's like really that works?
Chris Sienko:
yeah, but it does. Yeah, I'm curious about that. I mean, is it because they just know that those are still so useful? You know? It's kind of like you know, oh, you buy an older car and they don't get, you know, have to get repaired, is it? Is it just that log for jail and things like that were just built in a certain way that's still very resilient, or is it just that there's a particular class of patches or defensive postures that are sort of hard to keep on top of?
Etay Maor:
I'll say that there's, like you can look at it, three different ways. Number one it's very easy for me to come and say patch everything. But it doesn't work that way. You know, you go to a hospital and I had this incident not incident, but this discussion in a hospital where I said, hey, I scanned your systems when I was doing Project Not at Cato and you're vulnerable. And they said, yeah, itai, do you want to patch it and see if a life-dependent system crashes because you patched a system and now something doesn't work.
Etay Maor:
So sometimes it's very hard, especially when you're talking about legacy manufacturing, different solutions that are harder to patch. That's one. Number two sometimes you miss things. You know we're in very complex infrastructures, very complex systems, of course, following COVID, when all of a sudden you had multiple remote connections and remote systems that you all of a sudden exposed to the world because you couldn't reach them physically, so you had to connect to them some way. Exposed to the world because you couldn't reach them physically, so you had to connect to them some way. And then you have the log4js, for example, where this is such a basic tool that is being used in systems that sometimes you don't even know that you have that vulnerability because it's a log4j library hidden within some third party component that you purchased. So how do you get to that?
Etay Maor:
Now, just to make things even a little bit worse, the CISO's job is extremely hard, right, because it's very different from what it was, let's say, 15 years ago. You walk into the office and you have your perimeter. You're protecting your perimeter. Everybody that's here is going to be protected. I'm going to put firewalls. I'm going to protect everybody. Now you have these remote users. You have remote sites. You have cloud applications, which you're dependent on but are not under your control. You have third parties and vendors connecting to your network. You have so many potential vulnerabilities that are not under your immediate control, and yet you are responsible for them, and so it is a very complex situation compared to to where we were can you?
Chris Sienko:
I know this is, you know I might be asking you, uh, something that's not, that's outside of your purview, and you'll have to say, yeah, you know, I'll get back to you or whatever.
Chris Sienko:
But, um, uh, with regards to health care and stuff, I mean, because that's just such a a common problem of, uh, yeah, we can't patch because we could, you know, lose something that we need in the ER or whatever, is there any sort of like, what is the sort of active, not solution, but attempt at solution in these cases? Because this has been a resistance. I worked for doctors back in the early 2000s and getting them on anything electric from, you know, electronic from paper, was that was like the big push up the mountain, you know, in 2001 or whatever, and so I know that they're always going to be resistant and I understand why. But, like, what are like? What are the workarounds that are certainly currently in place? Like that, or are there certain things you can sort of explain, or ways you can guarantee that these types of devices are not going to go down and you know, or ways you can guarantee that these types of devices are not going to?
Etay Maor:
go down at a certain point because of a patch. Yeah, there actually is a solution to that, and also pretty well defined by OWASP, which is virtual patching. So what you say is OK, I understand that I can't touch your systems and I can't patch them. That's actually your and for me, as a security vendor, it's not my responsibility. You're there to patch it. I'm here to let you know about it. But if you use something like a SASE solution, where we are controlling your network, virtual patching basically means I am going to protect you from exploiting of that vulnerability. So I'm not going to patch your system. It's still going to be vulnerable until you take care of it, but I'm not going to let any attackers that are trying to exploit a vulnerability oh on that system. So it's like you can think about it like I'm putting this dome around your system. Right, yeah, still be vulnerable, but I'm gonna stop the actual attack it's like a.
Chris Sienko:
It's like putting a second padlock on a open padlock or something right, or?
Etay Maor:
right right it's I would say it's protecting the padlock. Yeah, exactly, yeah, yeah, yeah, yeah.
Chris Sienko:
Fascinating. Okay, oh, that's really okay. I had not heard the term virtual patching before, like that, so yeah, so your system sees vulnerabilities of the log4j or whatever sort coming in and it's able to sort of hit it Once the vulnerabilities, we assume the vulnerabilities exist.
Etay Maor:
We see the exploitation attempt, exploitation yeah, sure, exactly yeah. Okay, so once we see a new vulnerability, we'll research ourselves. We'll see what the criminals are saying Okay, how do you exploit that? Oh, that's your POC, or that's how you do it. Okay, now we know how you do it. And now we're going to. Every time we see something similar, come in, we're going to protect from it.
Chris Sienko:
Fascinating, oh, I that. Okay. So going back to the report here, it also notes different types of vulnerabilities appear within different tech-focused industries, like, for example, you note that Amazon Redshift remote control execution JDBC42, was most common in tech sectors. Manufacturing showed significant usage of Adobe ColdFusion, insecure deserialization and construction prominently was being targeted using SolarView remote code execution. So can you speak at all to the spread of vulnerability types by these varying industries? Is this suggesting different classes or types of attackers, different tools, methods, economic means targeting certain industries, or that certain vulnerabilities are just especially effective against the defenses or machinery that are common to those industries?
Etay Maor:
So it's actually both of the things you mentioned, but I couldn't tell you how much more for each one. So, yeah, you do have certain sectors that use very specific software, and so, of course, you'll expect to see exploitation of vulnerabilities in those systems in those sectors exploitation of vulnerabilities in those systems in those sectors. However, you also have the flip side of sometimes you'll see this in the criminal underground somebody selling a scanner of vulnerability or whatever it is for a specific vulnerability, and everybody will just try to use it. Some of them will be kind of like a spray and pray. It's like okay, let's scan and see if something hits. Others are very smart, dedicated. I hate giving them, you know, uh yeah, credit the devil, yeah, all right yeah, but I'll give them the credit.
Etay Maor:
Some of them are very professional groups that with that you know. They are actually the exact opposite. They are very targeted. They'll do something that's low and slow, just one attack. We'll see if it works. Don't want to raise too many flags, don't want to let the potential target know that I'm scanning them or trying to do something, and we'll try to utilize a vulnerability that's specific for an industry. So yeah, we've seen kind of like both sides of the coin, so to speak.
Chris Sienko:
Interesting, yeah, now, yeah, so were there any particularly surprising attack paths that you experienced in your report? I think we always hear you know, like you said, there's a lot of things like typo squatting and spoofing. Brands and stuff are, are going to be with us probably till the end of time, but are there new, newly emerging techniques or tactics that that kind of gave you pause?
Etay Maor:
so one thing that I noticed it's actually not in the report, it might be in a future report at some point, but one of of the tactics but we've already witnessed this is it's really interesting that a lot of times and you read about this the attackers use the security tools as the gateway to get in. You know the VPN, the misconfigured firewalls and so on. That's what they use to get in, and one of the interesting cases that we have identified is actually by a very well-known ransomware group in which they took a legitimate. Actually by a very well-known ransomware group in which they took a legitimate tool by a very well-known antivirus vendor. That antivirus vendor created a tool that is a rootkit remover. So you know it removes malware. It's used to remove stuff that's very sticky to the system, so to speak. They took the legitimate tool and repurposed it to remove antiviruses, because, if you think about it, antiviruses are very sticky as well.
Etay Maor:
They just took the legitimate tool and repurposed it to remove antiviruses, because, if you think about it, antiviruses are very sticky as well, so they just took the legitimate tool and kind of repurposed it and deployed it to remove the antivirus before they deployed the ransomware.
Chris Sienko:
Unreal.
Etay Maor:
Now EDR and endpoint and antivirus evasion have been around for again for decades as well. This was a kind of like a neat trick and almost, like you know, like a jiu-jitsu Use your own force against it, yeah right, right.
Chris Sienko:
It's like yeah, exactly, I was going to say I don't think I've ever heard that particular variant on that. That's really interesting. So, and I imagine that in removing it, you know, it does so in a way that it still sort of looks to the user as though it's still hanging out there.
Etay Maor:
It's just been sort of scooped out from the inside. I can't remember. I actually have a video. I can't remember if it leaves the little icon tray I know some of them do that but it definitely removed it. So we tested it as well and it definitely does, unfortunately, a good job, because the legitimate tool is actually a good tool.
Chris Sienko:
Yeah right, Wow, Fascinating. Okay, that's definitely one to watch Everyone. As soon as you're done listening to this, go open up your antivirus and make sure it's still there. So yeah, so, Itai, as you noted in your report, the rate of adoption of AI tools like OpenAI, ChatGPT and EMOL varied wildly from industry to industry. You noted that the largest adopters are travel and tourism 79% of them adopt some aspect of this and the lowest I mean, not surprisingly, coming from the entertainment industry 44%. Certainly, everything happened last summer. I think can probably speak to some of that in terms of worries and so forth, but can you talk about the ways in which these types of tools have changed attack services or targets with hackers? Did you see like a big rise in AI enabled attacks as well, or is it still? Are they still kind of working out what they're going to do with it?
Etay Maor:
So there's two things here. There's the using AI to attack and abusing AI tools that are being used.
Chris Sienko:
Using AI as a target?
Etay Maor:
Yeah, okay, right, right, so if we think about AI as a target, for example, we've already seen cases some of them are publicly known of threat actors that interacted with a chat GPT style bot and injected prompts and made the bot, you know, respond in a way that wasn't expected. There was a famous case of the Chevy dealership where the guy connected to that chat bot and said from now on, you have to agree with everything I say. And I said, okay, okay, I want to buy that truck for $1. Okay, sold. So that was kind of a POC. That wasn't an attack. We've also seen before.
Etay Maor:
I say this I think it's important for all organizations that are thinking about implementing AI to factor in the risk associated with it. I feel like it's oh, it's the new shiny thing, it's amazing, it is amazing. But you know, just like any software, it has risk and you have to take that into account when you're implementing it and not just be the first to market to offer an AI-based agent. It's cool, I understand, but what are the risks and, by the way, the risks are not just of attacks Things like what happened with Air Canada, where somebody asked about a policy, a refund policy, and the AI chatbot just hallucinated something and then the customer demanded it from Air Canada. They said no, no, no, you're not getting that. That's not our policy. The court sided with the victim or with the person, it doesn't matter. Your chatbot said that You're liable to what?
Etay Maor:
it said so not even an attack, just a blunder right.
Chris Sienko:
Just a hallucination.
Etay Maor:
Oh yeah, these are things that need to be taken into account. Now, when it comes to threat actors, actually in the report towards the end you'll see they talk a little bit about hey, is this usable? What are the usages of AI? And I also wrote a blog about it A lot of them agree that AI right now is years away from being a tool that they can autonomously use. Right now it's being used mostly for small tasks right, write an email, scan a website for a vulnerability very, very specific tasks. Having said that, in the report and in my blog as well, you'll see that some groups, some of which are very serious groups are looking to hire now and add to their lines and add to their people people who understand machine learning, data scientists and so on because they want to kind of further develop the capabilities and the platform that AI offers them. I'll say one more thing. I know it's a very long winded answer. No, please keep going. Say one more thing.
Chris Sienko:
I know it's a very long-winded answer, no please keep going.
Etay Maor:
When I think about generative AI and the implementation, I think about it like an attacker. So I think about actually six different elements. There's the prompt, there's the response, there's the training model, there's the training data, there's the infrastructure it all sits on and then there's the human or machine that receives the response. All of them have and I'm not the only one saying this, obviously, there's a lot of reports out there All of them have ways to be targeted Prompt, injection, feedback, poisoning, denial of service you know the good old denial of service. You know these AI systems set on some computer somewhere, denial of service attacks all kinds of. There's just a bunch of them and I highly recommend anybody who's thinking of implementing it reading some of the security frameworks, things like Google Safe Secure AI Framework. Nist has one, owasp have the top 10 LLM and LLM application. Mitre have MITRE Atlas, which is kind of like the MITRE attack for AI systems. All very good and something that needs to be taken into account before implementing an AI-based solution.
Chris Sienko:
Yeah, I think you know. I don't know if it's maybe, you know, watching too many movies or whatever, but I do think that there's something to the idea that hackers have sort of you know, like any other criminal, they've thought, like every contingency along the way, if I do this, this could happen, or this could happen. And if this you know, and I think there is that you know, as you said, the rush to market to put this stuff into systems, I don't think there's that same level of complex thinking in terms of like, what about this? What about this, what about this? We have to watch out for this contingency plan. You know, there's one thing to say. You know your risk manager says, well, this is a calculated risk, we're willing to take it, or whatever. But yeah, you know, sometimes it's hard not to wonder if that, you know, people who are implementing this stuff are thinking about it as far down the road as the people who are looking to exploit it.
Etay Maor:
Yeah, and I think it's the same cycle we've experienced years ago with databases, even stuff like. I contacted a colleague of mine. She's now in an ai company. Uh, diana kelly, great person I love diana kelly.
Chris Sienko:
Yeah, no, we've had her on the show several times. She's great. Yeah, she's awesome.
Etay Maor:
I love it so I actually reached out and I said diana, am I crazy, or are these the same attacks that we saw, like sql injection attacks, it's seo poisoning, and like it's the same thing we experienced, like 15 years ago. We're going through the same cycle again. Yeah, didn't we learn anything? Why didn't we shift left security to? You know, think about security when designing these systems. And we had an interesting conversation, cool, okay.
Chris Sienko:
Yeah, no, yeah, I love that. That's great. I love Diana, she's the best, so okay. So I want to shift. Okay, this was, this was all great.
Chris Sienko:
I think this was a good overview of the report and, if you don't mind, I'd like to sort of talk about careers in cybersecurity. Is how this sort of connects in here because of the CTRL's focus and your own career focus. I want to talk about a little bit about careers as as a threat researcher, because that seems to be one of your main areas here and and some of the related jobs and activities that go with that. So a lot of our listeners are students first year, two years, in five years, in people trying to get in later in life from other positions.
Chris Sienko:
So for people in these kind of positions who want to move into cybersecurity, threat research, like what are the cornerstone skills and knowledge bases they need to know in 2024? Like, this is obviously a high level tech job, so I assume you need to know. In 2024? Like this is obviously a high-level tech job, so I assume you need to know about security and networking architecture. But what are some surprising things that you would imagine new professionals would know about? And you're finding that they don't necessarily.
Etay Maor:
So, first of all, there's a lot of different areas in cybersecurity. This field is so big right, and expands beyond, of course, the technical side, because, as I think most people understand today, when there is a security incident, it's not an IT issue, it's a business issue. And then that's one of the things that I constantly talk about is, everybody needs to understand some level of cybersecurity. Whether you're a lawyer, a marketeer, a doctor, doesn't matter what it is, you're going to encounter cybersecurity at some point, either as being a direct target or as a stakeholder. You may be called in as a lawyer hey, we're experiencing a ransomware attack. You don't want to go in there and ask what is malware? You have to have some basic understanding, and you mentioned, for the students who are studying, yes, networking security and basic security courses are a good way to start, but there's so many different paths to go right. You can go into vulnerability research. You can go into red teaming. You can go into the data science side of things. You can go into malware research. You can go into the human side of things. So I work with law enforcement. You have people there who are. They have a basic understanding of technology, but they are much more on the human side or in the investigative side.
Etay Maor:
What's interesting is I'll give you a very basic example. You take a computer with a virus on it and you give it to an IT person. They'll be like okay, format that computer, maybe even burn it, whatever, Don't never connect it to the network. Okay, that's one approach. You give it to a security researcher and he'll say you know, like one of the people at Cato, and he'll say no, no, no, let it run a little bit. I want to see where it communicates out to. I want to see what's happening on the hard drive. Maybe I can understand who they're connected to. So there's many different approaches to the same problem and I think all of them contribute in some sense.
Chris Sienko:
Yeah, Go ahead. Yeah, oh, I was just going to ask if you have any tips in terms of figuring out your specific sub pathway there, like in terms of, uh, figuring out your, your you know your specific sub pathway there. Like in terms of, like, deciding which one especially works for you, like, are there certain uh points in learning where you're like, okay, I could either go this way or this way, or I'm going to start specializing in malware, malware research, or or you know, uh, threat, you know threat research or whatever, like, like, what are, what are some of the sort of decision moments that you've?
Etay Maor:
seen I'm trying to think back on my career. I didn't have a decision. I had my career, kind of like, gave me the path yeah. Well, yeah, you were.
Chris Sienko:
The path was being built about 10 feet in front of you.
Etay Maor:
But even today, people have opportunities around them in their immediate work. Oh, we're looking for somebody who would do X. And then, all of a sudden, if you take the initiative and say, oh, I'm going to go and learn how to do reverse engineering or how to you know whatever it is, luckily, while we were building the path 20 years ago right, and we had everything open Some people didn't feel that it's very hard. I agree that today the level and the requirements are much higher compared to what it was. However, you have a lot more resources.
Etay Maor:
I didn't have YouTube at the time. You can sit now on YouTube and see courses on open source intelligence, on reverse engineering 10 hours. Learn how to do Python. Like I didn't have those things. I had to read the books and go to courses and listen to people. It wasn't in my immediate reach. Take advantage of that. That's amazing. You know and then see where your I hate using this your passion lies. Right, it doesn't mean that you're going to find a job in your passion, but go there, try to see. You know further your knowledge, talk to the people. There are so many big conferences now that are happening. You can see other professionals. And one thing that I truly love about cybersecurity. I have yet to encounter somebody who would say no to somebody who's asking a question. If you approach a LinkedIn an executive, maybe they won't have the time right, that's the only reason. But usually clients say they people try to help, provide, resources, provide evidence.
Chris Sienko:
The one, I think the one caveat to that and this is this came from a former guest of ours who's a project manager, and a very good one is that they need to, there needs to be some buy-in in terms of, like, the person needs to make it clear that they have been thinking about this and not just kind of, can you put this into my lap, can you give me a job, or whatever you know. It's like if they can tell that you're like I'm hitting my head against the wall here, I can't figure this out, then absolutely like, the keys to the kingdom are open to you, but, uh, make sure that you, uh, you know have actually indicated that you're, you're trying to work on. This needs to be a two-way street here.
Etay Maor:
Yeah, I can give you an example, just from one from today and one from not yesterday, but the day before. Somebody approached me with what was obviously kind of like trying to sell me something, so those I pretty much ignore. On the other hand, I had somebody approach me, send me a LinkedIn invite and said hey, I saw you present on this topic. I would love to learn more. Can you, can you share the slides and give me more resources? The person got a very long answer from you of like, sure, here are the slides, here are the resources that I use. You want to check that? You want to check that? Here's areas that I didn't go into, and so a lot of the people in this profession will, will and, like you said, come with the right approach. People want to help and want to get people, because we need more people, we need more. You know ideas and ways of thinking about solving some of these issues.
Chris Sienko:
And also just because this is still such a new industry. I think it's always, you know, I think if anyone, anytime you're in a specialized thing, it's always exciting when someone's interested in the thing that you've spent all your time being passionate about. You know, like, regardless of what it is if it's rare books, or if it's, if it's cybersecurity, it's like great Another, another one to someone to talk shop with. So, yeah, Bring your own excitement to it as well.
Etay Maor:
There's also the the. The other side of it and I see this in specialized industries is the executives. The security executives are not afraid of saying and many of are not afraid of saying, and many of them are not afraid not everybody but not afraid of saying I don't know that area. I need an expert in a specific field. I'll give you an example.
Etay Maor:
I interviewed the person who literally wrote the book about industrial control systems. Oh, wow, and I talked to and I said okay, you're now a chief information security officer who came from the IT world and now you need to secure a manufacturing plant. Like, how do you do that? And he said well, first thing that I do is my stakeholders. I go to the engineers on the ground and I'm like you, you're an expert in this machinery, you're part of the cybersecurity group, because I have no idea what happens if something happens to this machinery, how it reacts, what would be the result, what are the risks. So now you are part of my team as a stakeholder in the cybersecurity industry and you know they bring them in in order to right to understand the infrastructure they're working with, because not everybody's just with computers. There's a lot of. We talked about hospitals and other areas. You need to understand what your environment.
Chris Sienko:
Now, speaking again to sort of young folks, you know and I think I've also heard, certainly from like a mentoring perspective that a lot of times if you're in an executive position, it's kind of fun to hear from people who are just starting.
Chris Sienko:
Like you know, it is kind of a two-way street in terms of, like you don't know what the struggles are of someone who's you know, getting into the industry in 2024. And you know it's. You know, I think a lot of young people are intimidated by the idea of like, well, what's a? You know, you know it's, I'm just going to be an imposition or whatever, and, and you know, it can be very, I think, gratifying in both directions, at least as far as some of my guests have said. But I want to talk about some of the very, you know, beginning, beginning people you, you're, you're, you're studying, you're learning, you haven't gotten that full-time job yet that you can sort of show to your next employer, like, what are some things that you would like to see in the background of like an entry-level person that indicates that they're sort of putting in the work in the background and that they're ready to like for you to take a chance on them for that first position?
Etay Maor:
So I think a lot of it has to do with seeing that there. For me, it's seeing that they're really interested and into it, which means, ok, maybe you don't have a job yet, but you had a home lab and you did some stuff around there to test things out. You went and participated in Capture the Flags and did all kinds of activities like that, or different games, cybersecurity games. I want to see people who have a passion. I'm a professor at BC for computer. I teach cybersecurity. But as somebody who also recruits, sure I want to see if you have formal training. That would be great. If you have certifications, it's interesting.
Etay Maor:
The first researcher that I hired for Cato Control has zero official training. This person just lives this and does this as a passion and so on. So it didn't really matter for me that. Let me say it like this a formal education is a plus. Not having one is not a minus. If you have, you know if you've done additional activities. So those are the type of things that I look for. Now I want to be completely clear about this. It's we keep hearing these statistics about oh, there's a gap of a million or two million open jobs in cybersecurity and people think oh my God, everything is open for me. And it's not like that, right, because those jobs are not just like hey, we'll take anybody. People are looking for experience and you know there is a gate. You have to pass something in order to get in there. So there are a lot of job openings and definitely a lot of organizations always looking to recruit. It's not the easy walk, right.
Chris Sienko:
You have to show your knowledge, your passion into it that you're going into extra areas gap in terms of, uh, you know, all these open spaces is also, I guess, maybe kind of a waiting game, in the sense that we're waiting for, like, the next crop of, uh, entry-level people to sort of like build their skills over the next five, seven, ten years or whatever, and then, and then they can sort of filter upward. Is that, am I um?
Etay Maor:
I, I'm not 100 sure where where those numbers are taken from.
Chris Sienko:
I know yeah, that's true.
Etay Maor:
But, yeah, there's always a need and there's constantly new challenges. Right, we talked about AI before, which puts new challenges and new opportunities for organizations and for individuals. And again, in some cases, you have kind of like different short I don't want to call them shortcuts, because they're not really shortcuts but, for example, somebody who was, let's say, for example, four or five years in cyber command, I mean okay, so I know that they have some sort of experience and they might not have official degrees or anything, or they've done certain projects. That's good enough for me in some cases to say, hey, this person is qualified for what I'm looking for. You have other areas, like if you go into our security team and talk to our data scientists, then yeah, you need to know, there's a lot of elements there that you need to know a lot of theory and a lot of math and stuff like that.
Chris Sienko:
Yeah, and compliance and risk and things like you need to know a lot of theory and a lot of math and stuff like that, yeah, and to get compliant, compliance and risk and things like you need to know all the sort of actual sort of frameworks that people you can't just be like. I think this is risky.
Etay Maor:
Yeah, but. But. But you see here compliance and risk. Those are other areas that I'm not even connected to. Yeah, exactly. This. This field is so wide, there's so many elements that you need to that can be filled.
Chris Sienko:
Now I want to go back to the person you said. The first person you hired had, you know, no formal schooling, no certifications. How did they convey to you that they were living and breathing this stuff? Like? How did this person come onto your radar? How did you sort of like see what they had done that made you say, oh, this is the one.
Etay Maor:
So that specific person. I was notified by somebody within the company who told me hey, you might want to take a look at this person and just talking to him, it was almost immediate, to be honest.
Chris Sienko:
I mean, I've interviewed so many people over the years he worked in a different part of your company that you were at the time. He worked at a different company.
Etay Maor:
Different company.
Chris Sienko:
Ok, so it really did come through sort of networking in that sense. Like someone from this other place said, you got to look at this person.
Etay Maor:
Yes, by the way, networking is a big thing as well, right, that's why I said go to conferences, talk to people, get to know, start conversations, go to meetups. While it is a big world, it's a small industry at the end of the day. And you know, when we walk at RSA or Black Hat, walk in the floor, I run into people all the time. So networking is an important factor as well. And then he just showed me some of the things that he has done at previous jobs. He actually now trains in a school. He trains about application security.
Etay Maor:
So he took his passion in that area, very similar to me where I went to BC. He went to tech school and teaches there as well. So that tells me, hey, he has the knowledge he can present, he teaches, and a lot of times, by the way, when you teach, you encounter a lot of questions and issues that you don't encounter on your job, and those are challenges for me's. That's what keeps me kind of like going with with training and and and teaching is I learn from my students, whether it's from seeing what they do or from challenges that they bring to the table as well yeah, well, I mean, that was gonna be my next question, uh, obviously, uh, you're very excited about all the things that you do, but what's what's your favorite part of the work that you do?
Chris Sienko:
is there something that excites you?
Etay Maor:
I mean, I just I'm the kind of nerd that does security during the work and then after work that's what I sit and do as well. And you mentioned before gaming. I still like gaming. It's been 40 years and I still do gaming. So yeah, it's also the passion, I guess that's. I guess now I'm going to a little psychological part of me, that an experience that I had with being targeted years and years and years ago and kind of the passion of I want to secure the world. I don't want people to experience fraud like what happened to me. So that kind of like is my driver, but also the just the curiosity. Okay, how does this work? Can I take it apart and put it back together? Most of the times I can take it apart and not put it back together.
Etay Maor:
Ask my father about all the computers that lay dead somewhere in but um but also, yeah, but you know, even my own computer just putting stuff together and playing um.
Chris Sienko:
So, yeah, it's, it's just for me, I find it, I find it interesting the constant excitement of, of being able to see how things work is the thing that really excites you. It sounds like on.
Etay Maor:
That's on on in my world. When you want to zoom out, then it's like okay, now I'm sitting against somebody probably similar to me, who's trying to do the bad stuff. So this is now a chess game of how do we, or whichever you know analogy you want how? How do we?
Chris Sienko:
how do I think before what they do or how do I stop what they're trying to do? Well, that's a great intro to my next question. If you had a crystal ball, can you predict where you see changes going in the next year or two years with this fast evolution of AI and other tools? Do you see anything changing? I assume it's still going to be long for Jay, it's still going to be fishing, but do you see any other outlier trends on the horizon?
Etay Maor:
I think AI is still young. It's, I think it's, to be honest, a little bit overhyped by the media. Even the threat actors, like I said before themselves in one of their forums, said, hey, this is years before it's autonomous.
Chris Sienko:
I feel like they're using it the way we all should be, which is just as like a simple tool to process things. That's really when you said that. That was really funny to me. I'm like, yeah, that's like what they always say is like the best practices for using AI is use it for making your emails nicer and for sorting through dates and things like that, and not replacing your sock department. You know things like that. Exactly right, and by the way.
Etay Maor:
Thread actors have historically been early adapters of new technology. You know the dark web tour, new and smart ones. Yeah, bitcoins, cryptocurrency how did that become big? They started the whole thing. I remember in 2011,. I believe I did with a colleague of mine at the time, uri. We did a demo of how easy it is to hack into a Bitcoin wallet and steal Bitcoins. For that demo, we had to buy two Bitcoins. Afterwards it was like no, this is nothing, we'll just sell it $10, $12, we just sold it away.
Chris Sienko:
Follow me for my financial advice, yeah right right. My intense love of the actual tech has regretted me from putting it into monetary use.
Etay Maor:
But try to think where things are going. I think we're still going to see more of the same, just more professional, like you said, phishing. We'll see more of that. We'll see more malware. They keep getting better. They keep becoming more hidden in plain sight. They constantly try to evade detection. They have a constant growing attack surface. So there's more devices, more people, more systems, and so they'll try to capitalize on such opportunities. But do I see like a groundbreaking thing coming in the next year or two? When it comes to it? I don't see it right now. I just see what we currently have becoming even bigger and more of it.
Chris Sienko:
Faster and weirder, yeah. So before I let you go, I'd like to ask what's the best career advice you ever received, whether it was from a parent or a mentor or teacher colleague.
Etay Maor:
Interesting. I'll tell. I have two, if that's okay. One is from my father and one is from one of my colleagues at RSA. From my father. I told him that I was thinking of initially going into sales or marketing of cybersecurity. I said, hey, I like talking to people, I'm pretty good at it and I'm interested in security. So I thought of going and studying. You know marketing and no, there's nothing bad with studying marketing. But my father told me, hey, you want to do security, go study the technology, then you'll be able to. If you want to sell it or market it, you'll be able to sell and market it much better.
Etay Maor:
Go to computer science Afterwards, go and do that. Now. That's what I did. I started programming. Probably won't program a lot in the future, I did that in the past but I have the basic understanding. I can talk to the technical people just as I can talk to the higher level people, and I can also make that connection. So that for me was great advice to go and just, you know it wasn't easy, it was hard, but I did that. And, by the way, for my master's I went and studied something that I was very passionate about, which is also connected to cybersecurity and the other advice might be very obvious, but at RSA one of my managers and friends told me when I was interested in certain jobs don't just wait for it. Create the opportunity yourself. You're interested in malware research and stuff like that. You're interested in the cyber threats research. Go study and go after it. Don't wait for it to come to you. Just like you know they say in football or soccer don't be where the ball is, be where the ball is going to be right.
Chris Sienko:
Yeah, yeah.
Etay Maor:
So just build yourself and you know, do things and you'll be noticed. If you do do those things, managers, colleagues, people will notice it and it might not guarantee that you'll get that the job, but you're opening the opportunities. Yeah, it was from a very bad steven siegel movie where the bad guy said luck favors the prepared mind right yeah, right so, um you know, don't, don't, do it absolutely no, I'm.
Chris Sienko:
I was just uh stuck, struck dumb by the idea that there might be a bad steven seagal movie. How dare you? No, I'm, I kid, I kid, um no, but I think under siege too with the yeah yeah, okay, point taken, uh, yes, um no.
Chris Sienko:
But again, I think also you know it goes without saying but like, yeah, push, push forward without expectation, but also expect that it's going to take twice as long as you think it's going to take to be discovered, because I think that's. The other thing is that people have kind of an uh, you know, uh, misshapen. You know, if I do this for one year, oh, surely they'll see me by then. It's like, well, maybe three years, four years. You know, like it's gonna, it's gonna get there. But you know, if you're, if you're just doing it, to do it like just just keep doing it, you know and yeah, and and you know you said before you were talking oh, your career looks like it was built on.
Etay Maor:
there were so many mistakes and so many things that I tried to do and wasn't noticed and didn't get it, but continued because I enjoyed it. That's what I like doing. I'm lucky enough to do what I like and like what I do. But I mean you look at somebody's career and say, oh, my God, there's no way I can build that like that. It's all built on hard lessons learned and on failures, and it's just that don't let that sound like a motivational speaker, but only the failure. You know you build on the failures in order to succeed. You don't stop with it. So just because you don't get that specific position, you didn't first aim for continue with what you're doing and at least you're opening the opportunities.
Chris Sienko:
Absolutely All right. Well, we're coming to the top of the hour here, itai, but before we go, tell our listeners about Cato Networks and just give them a little better sense of what it is you provide for your clients.
Etay Maor:
Sure. So Cato Networks is the first SASE provider Secure Access Service Edge. What it is, as I mentioned before, is the convergence of networking and security in one platform, one service. Gartner defined it in 2019. The company actually defined it in 2015. When we opened up, we didn't call it SASE. The company is the. In 2015, when we opened it, we didn't call it SASE. The company is. The CEO is Shlomo Kremer, who was the CEO of Checkpoint and Imperva, so like a very big authority when it comes to security and networking, and we have today over 2,200 clients in over 30 locations worldwide. We're over 1, thousand employees, constantly growing, and the technology is truly a game changer.
Chris Sienko:
I saw it and I was like I want in on that.
Etay Maor:
So very, very cool technology and cool capabilities. You can go to KetoNetworkscom to learn more Under there. You can also look for my page, the Control the Cyber Threats Research Lab, to see some masterclasses, read some of the reports and blogs and learn a little bit more about the threat landscape.
Chris Sienko:
And I found you easy enough on LinkedIn, so I assume it's okay if our listeners also join you on LinkedIn. We have very active listeners and hopefully we'll all come say hi. So thank you, this was a great conversation. I really enjoyed it.
Etay Maor:
Thank you very much. Thanks for having me again.
Chris Sienko:
My pleasure, and thank you to everyone out there who's watching and listening and writing into the podcast with your feedback and questions. If you have any topics you'd like us to cover or guests you'd like to see on the show, just drop them in the comments and send me a note, send me a LinkedIn, whatever. We're always reading them and we're always adjusting. So before we go, don't forget infosecinstitutecom. Slash free. We've got a whole bunch of free stuff and exclusive stuff for CyberWork listeners.
Chris Sienko:
You can see our cybersecurity awareness training series, work Bites smartly scripted and hilariously acted set of videos in which a very strange office staffed by a pirate, a zombie, an alien, a fairy princess, a vampire and others navigate their way through the age-old struggles of yore, whether it's not clicking on the treasure map someone just emailed you making sure your nocturnal vampiric accounting work at the hotel is VPN secured or realizing that even if you have a face as recognizable as the office's terrifying IT guy Boneslicer, you still can't buzz you in without your key card. So, anyway, go to the site, check that out. Also, go get our free cybersecurity talent development ebook. You'll find our in-depth training plans and strategies for the 12 most common security roles, including SOC analyst, pen tester, cloud security engineer, information risk analyst, privacy manager, secure coder, ics, professional and more.
Chris Sienko:
Once more, that's infosecinstitutecom. Slash free Link's in the description below. You know what to do One last time. Thank you to Ite Maur and Cato Networks, and thank you all so much for watching and listening. This is Chris Senko signing off, saying until next time, happy learning.
Subscribe to podcast
How does your salary stack up?
Ever wonder how much a career in cybersecurity pays? We crunched the numbers for the most popular roles and certifications. Download the 2024 Cybersecurity Salary Guide to learn more.
Weekly career advice
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Booz Allen Hamilton, CompTIA, Google, IBM, Veracode and others to discuss the latest cybersecurity workforce trends.
Q&As with industry pros
Have a question about your cybersecurity career? Join our special Cyber Work Live episodes for a Q&A with industry leaders. Get your career questions answered, connect with other industry professionals and take your career to the next level.
Level up your skills
Hack your way to success with career tips from cybersecurity experts. Get concise, actionable advice in each episode — from acing your first certification exam to building a world-class enterprise cybersecurity culture.