I have a good friend. He's a CISO of a multinational organization in the technology sector. We talk often.
Market trends, sales, and business regulations had the business decide to open an facility in China.
a 🧵 👇
👩🏭 Construction was commissioned and completed within 4 years for the new site.
Everything was going pretty well. They had finished HVAC, and most furnishing.
Under suggestion from a CISO friend in a CISO Slack we are in, he commissions a bug sweep of the new office.
🐝🐞🐛 The bug sweep found 6 listening devices. Several in electrical, some in HVAC.
I'm not an *expert* in corporate espionage so I don't know if these were short or long range.
He never told me exact cost, but I know the team he flew in to do the sweeps was not cheap.
After removal, he felt relatively safe.
Staff began to come in and work, the rest of the furnishings were done. Operations were going well.
For extra safety, he commissioned the bug sweep service again, one month after they were up and running.
The team found an additional 7 listening devices. In signage, conference tables, and hardware.
We talked at length about his threat scenario on phone calls. We brainstormed a plan that included a lot of risk due to corporate espionage.
In addition, since this was somewhat recently, new regulations like MLPS 2.0 gave the ability for local authorities to audit and take control of the site at-will.
We chatted and design the infrastructure and services with "kill switches" in case.
To meet auditing standards, a separate network is maintained where relevant logs are copied, but the network is isolated. It has its OWN CONFERENCE ROOM.
No one uses this network or room, except when auditors come.
In some cases he PRINTS audit information for them.
There's no golden rules here. Many we have talked to say this is just part of business in China.
My calls with him are some of the most interesting CISO discussions I've been a part of.
I'm sure there's a lot of intricacies and additional planning running a cutting edge tech company warrants in this situation...
Not many CISOs I know get exposed to this though. I thought the story might be useful to at least one person.
1️⃣ Walking the RSA floor I am reminded of how disparate the telemetry is for hybrid organizations.
In order for AI to make the difference we want it to, we need that telemetry to be standardized.
👇🏼🧵
2️⃣ There’s a some focus on consumer level AI assisting standard
products, but not as much as I thought there’d be.
Some of these security products will need to be moving faster to adapt. Right now it’s just the top tiers.
3️⃣ Using general consumer level AI, for a lot of things security does, will be “good enough” but companies with their own large sec databases to train on will have tremendous opportunity.
Random thoughts from my offensive security mindset:
I’m at the RSA keynote.
Obviously, AI and Data to feed AIs are the top topic for this cybersecurity audience.
Like I’ve said, defense will gain a giant boon in the consumer AI golden age.
But.. adversaries will pivot.
🧵👇🏼
Adversaries will begin staged attacks.
One intrusion to gather data and recon which will be burned by an AI defense, then another to accomplish their objectives in under a few minutes. Too fast for even ai aided operations to make defense decisions.
Generative AI aided fuzzing will lead to more binary and web exploits.
So I wont lie, I slept on Axiom by for quite a while. I don’t really know why…
☢️ I know @pry0cc (Ben) personally, he’s epic.
☢️ I love the ideas in the framework.
☢️ I know bug hunters who use their own frameworks similarly as their advantage in the bug bounty scene.
🤦♂️ But for some reason, I think the infrastructure cost and the setup intimidated me.
Knowing how vulnerabilities are mitigated makes you a 10x engineer (sec or dev)
Check out this thread for some of my fav
🔥FREE🔥
resources. ⬇️
(Also send me more!)
📣 1st off, if you're a 🛠️Hacker🛠️ or security person:
☢️ You don't need to be a dev. You just need to understand the concepts of mitigating common vulnerabilities. Bonus points for knowing frameworks that eliminate them entirely
📣 2nd, if you're a 🛠️Dev🛠️ :
☢️ You don't need to be a hacker. You just need to understand the concepts of exploiting common vulnerabilities. then you use some of these resources to help mitigate them.