Jason Haddix Profile picture
Oct 2 10 tweets 3 min read Twitter logo Read on Twitter
🧙‍♀️ CISO Story Time

This is not exaggeration.

I have a good friend. He's a CISO of a multinational organization in the technology sector. We talk often.

Market trends, sales, and business regulations had the business decide to open an facility in China.

a 🧵 👇
👩‍🏭 Construction was commissioned and completed within 4 years for the new site.

Everything was going pretty well. They had finished HVAC, and most furnishing.

Under suggestion from a CISO friend in a CISO Slack we are in, he commissions a bug sweep of the new office.
🐝🐞🐛 The bug sweep found 6 listening devices. Several in electrical, some in HVAC.

I'm not an *expert* in corporate espionage so I don't know if these were short or long range.

He never told me exact cost, but I know the team he flew in to do the sweeps was not cheap.
After removal, he felt relatively safe.

Staff began to come in and work, the rest of the furnishings were done. Operations were going well.

For extra safety, he commissioned the bug sweep service again, one month after they were up and running.
The team found an additional 7 listening devices. In signage, conference tables, and hardware.

We talked at length about his threat scenario on phone calls. We brainstormed a plan that included a lot of risk due to corporate espionage.
In addition, since this was somewhat recently, new regulations like MLPS 2.0 gave the ability for local authorities to audit and take control of the site at-will.

We chatted and design the infrastructure and services with "kill switches" in case.
To meet auditing standards, a separate network is maintained where relevant logs are copied, but the network is isolated. It has its OWN CONFERENCE ROOM.

No one uses this network or room, except when auditors come.

In some cases he PRINTS audit information for them.
There's no golden rules here. Many we have talked to say this is just part of business in China.

My calls with him are some of the most interesting CISO discussions I've been a part of.
I'm sure there's a lot of intricacies and additional planning running a cutting edge tech company warrants in this situation...

Not many CISOs I know get exposed to this though. I thought the story might be useful to at least one person.

We just out here trying to our best 🤓

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Jason Haddix

Jason Haddix Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @Jhaddix

Apr 25
More AI in cybersecurity thoughts:

1️⃣ Walking the RSA floor I am reminded of how disparate the telemetry is for hybrid organizations.

In order for AI to make the difference we want it to, we need that telemetry to be standardized.

👇🏼🧵
2️⃣ There’s a some focus on consumer level AI assisting standard
products, but not as much as I thought there’d be.

Some of these security products will need to be moving faster to adapt. Right now it’s just the top tiers.
3️⃣ Using general consumer level AI, for a lot of things security does, will be “good enough” but companies with their own large sec databases to train on will have tremendous opportunity.
Read 6 tweets
Apr 25
Random thoughts from my offensive security mindset:

I’m at the RSA keynote.

Obviously, AI and Data to feed AIs are the top topic for this cybersecurity audience.

Like I’ve said, defense will gain a giant boon in the consumer AI golden age.

But.. adversaries will pivot.

🧵👇🏼
Adversaries will begin staged attacks.

One intrusion to gather data and recon which will be burned by an AI defense, then another to accomplish their objectives in under a few minutes. Too fast for even ai aided operations to make defense decisions.
Generative AI aided fuzzing will lead to more binary and web exploits.

Both defense and offense will benefit from this.
Read 6 tweets
Mar 31
🤖 WebSecGPT - Your AI security buddy

Hacking an API or JS framework?

Don't have a swagger file or struggling to understand the app?

Wanna quickly identify all js sinks?

Meet WebSecGPT

(a thread ) 👇
I created a chatGPT 4 master prompt that focuses on web analysis and security testing (private for now, not that hard to do).

I then fed it my target app (a .js file).

You can do this by using chatgptsplitter.com
♦️ General ♦️

♦️ What can you tell me about the application? Include context, frameworks, libraries, and technologies it uses.

♦️ What can you tell me about the API calls or routes in this app?
Read 10 tweets
Mar 29
(Sorry I meant to post all of these this AM)

Want some fun video content to help you stay up to date on AI?

Check out @fireship_dev

👾 Why AI kinda sucks:

👾 ChatGPT4 Plugins Buff:

👾 AI Music with MusicLM and Riffusion

Read 4 tweets
Mar 9
📣 Stealth and supercharging your offensive security testing using:

🔥 Axiom 🔥

by @pry0cc & @0xtavian

Resources and musings on this epic framework.

👇a thread👇
So I wont lie, I slept on Axiom by for quite a while. I don’t really know why…

☢️ I know @pry0cc (Ben) personally, he’s epic.
☢️ I love the ideas in the framework.
☢️ I know bug hunters who use their own frameworks similarly as their advantage in the bug bounty scene.
🤦‍♂️ But for some reason, I think the infrastructure cost and the setup intimidated me.

But I can say now that I am 100% a believer.

Installation was a breeze:

github.com/pry0cc/axiom/w…

The cost of a fleet is nominal and it offers so many benefits.
Read 25 tweets
Mar 3
💪 Code Literacy is a Super Power for Hackers 💪

(and Security Literacy is a super power for devs)

Knowing how vulnerabilities are mitigated makes you a 10x engineer (sec or dev)

Check out this thread for some of my fav

🔥FREE🔥

resources. ⬇️

(Also send me more!)
📣 1st off, if you're a 🛠️Hacker🛠️ or security person:

☢️ You don't need to be a dev. You just need to understand the concepts of mitigating common vulnerabilities. Bonus points for knowing frameworks that eliminate them entirely
📣 2nd, if you're a 🛠️Dev🛠️ :

☢️ You don't need to be a hacker. You just need to understand the concepts of exploiting common vulnerabilities. then you use some of these resources to help mitigate them.
Read 14 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(