Threat Hunting Offsets the Technology Gaps


We're not get my start. I would say to take back to a military law enforcement days. So physical security of course close protection Details so i've been in the space probably since seventeen in some form or fashion security I transitioned into cyberspace. Actually in early. Two thousand Working class i was part of the first development team of launching windows two thousand Iky server l2tp vpn server I was there at the fortunate. I guess you could call it Experience with bill gates and launching that in february of two thousand and the sony centre. It was the first appliance based vpn service powered by windows. And then i working for class. That time i also help build out the first cloud based vpn. Your cloud firewall service. Powered by chastised at the time was nortel cosign so that dates me a little bit And then building out. What was the first. Mp l. s. environment building out using twenty five forty seven would universe building out that the virtual router typist and so insecurity for a long time transitioned into more of a layer seven environment layer for like they're know with level three and building out the an mssp practice with inside a service provider will relaunch diaz Real so as part of the two thousand fourteen. Ntp attack with using Yola rod wears away to combat the two thousand fourteen biggest dos attack at that time Building out also Various types of security environments from secure email to secure access tumbling so In in building out the first Threatened telling as a service Taking intelligence encouraging that intelligence and turning it back and enriching that in empowering and into people sims decline sim so Been into space for quite some time and done everything from being on the keyboard to you're developing and strategizing and bring it to market some of the most robust and i would say sophisticated security services that south today and still active today when you look back on some of those earlier days you know thinking back to something like the launch of like you're saying windows two thousand two mean can give us some insights as to the evolution that you've you've experienced the growth in the the sophistication and capabilities of these tools. Mean when you think about the evolution of this i it's it's it's my body linked to see how we have evolved so much From the tumbling type activities more cloud base sas environments you no longer. Are we required ito to to actually launch a client on your device when we're using software as a way to connect using example as a celsius recently about a year and a half ago. I built out a appliance based service at allow us to run your ssl connections and using open vpn to a source gateway and then out to the cloud and basically all in two zero touch provisioning to say so to to evolve from having someone manually. You'll help you set up your tunnels establish tunnels you know. Establish appreciate keys. And connections that these major to automatically enabling that is just it's crazy to see how we've involved in. It's actually quite you know exciting to see where we're going to go because of covid. Nineteen right kobe. Nineteen has taught us so much that the next evolution of cybersecurity. And you know this would call borderless You'll environment is is going to drive us to more cloud around monitoring the compliance configuration changes things that we did not do in the past that we're going to be obligated to do in the future. Yeah i mean that's a really interesting point how we i mean I suppose it could be looked at as a as an upside. This push this You know we we pushing this outside of our comfort zones into new areas. While i mean you have to. Nail henrik conference on. Cybersecurity has never been Comfort right it's always been complex. It's always been hard to. Let's just call it like it is wanted to communicate to people to help you understand the value of it and three and i think the foremost is actually enabling it right because too often what i've learned over my years as a people it's still a compelling event meaning that a unless something happens to me i don't worry about it and it's so much like law enforcement is it's a lot around activities you know. Let's just take a home environment if the house around the street got broken into prior to that happening. You didn't do anything but now that it got close to home. What are you going to do. you're going to either. Go get a big dog. You're gonna put cameras up. You can put an alarm system. The problem we have today is that we're reactive versus proactive and cybersecurity has been that way for last year. I would say ten years of not fifteen years as very reactive and we're still reactive today. Even though we're being pushed outside of our comfort zone i mean. Think about kobe. Nineteen it was reactive right. We had to move quickly to To accommodate a remote workforce bauer coming back and doing what trying to figure out what holds that. I open to enable that from that reactive aspects. so it's a very interesting you'll bell curve that. I see that goes on where we're going up and down up and down and it's it's hard to keep out in front really is

Coming up next