Cybersecurity Conversations with the C-Suite and Board

Cybersecurity Conversations with the C-Suite and Board

Released Monday, 10th March 2025
Good episode? Give it some love!
Cybersecurity Conversations with the C-Suite and Board

Cybersecurity Conversations with the C-Suite and Board

Cybersecurity Conversations with the C-Suite and Board

Cybersecurity Conversations with the C-Suite and Board

Monday, 10th March 2025
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:01

AI there's a huge race going on

0:04

as to who's going to meet the

0:06

new technological frontier who's going to be

0:08

able to lead there and there's going

0:10

to be huge ramifications for all of

0:12

our economies around the world and there

0:14

is a rush to acquire any semblance

0:17

of advantage from corporate espionage

0:19

standpoint so there's countries

0:21

and individual groups that are

0:23

targeting the theft of this technology

0:26

space in particular. Welcome

0:38

to another episode of Mandiance Defenders

0:40

Advantage podcast. I'm your host, Luke

0:43

McNamara. Today, I have the pleasure

0:45

of being joined by Emrin Ahmed,

0:47

the senior partner and Canadian head

0:50

of technology, and Canadian co-head of

0:52

cybersecurity and data privacy at Norton

0:54

Rose Fulbright. Emrin, how are you doing today?

0:56

I'm doing well, Luke. Thanks for having

0:59

me. I'm looking forward to this conversation

1:01

we're going to have. As am I, and I think

1:03

to kind of... provide some background prior

1:05

to I guess when we get into

1:07

to what we're going to discuss today,

1:10

maybe talk a little bit about your

1:12

role and how you engage with customers

1:14

and your clients at Norton Rose Fulbright.

1:16

Yeah, no for sure. I actually did

1:19

a great intro there for for me.

1:21

I head up our technology law practice

1:23

and just for your listeners. About 20

1:25

years ago when I started practicing law,

1:28

I was primarily focused on technology work.

1:30

So this was your traditional commercial contracting

1:32

of technology agreements. So think of large

1:34

outsourcing agreements. cloud computing agreements, you know,

1:36

those kind of things. And that morphed

1:39

over time about 15 years ago to

1:41

more privacy work and then cyber. So

1:43

the work I started doing here at

1:45

the firm and even at my prior

1:47

firm was really on what we call

1:49

incident response, which I'm sure we'll talk

1:51

about a bit more in detail, really

1:54

helping clients, you know, focusing on dealing

1:56

with breaches and making sure that they're

1:58

either. responding it to effectively or as

2:00

prepared as they can be before an

2:02

incident occurs to respond to it effectively.

2:04

So in my role at the firm.

2:07

Head up our tech group for sure

2:09

as we still do the technology contracting

2:11

piece I talked about, but also a

2:13

big chunk of the work is helping

2:15

clients be ready and responding in real

2:17

time. I co-chair the group for cyber

2:20

with my very good partner John Castle

2:22

who's based in Calgary. I myself split

2:24

my time between our Toronto and Montreal

2:26

office and supported by a fantastic group

2:28

of lawyers here in Canada and globally.

2:30

What are some of the typical roles

2:33

you're engaging with either on the preparatory

2:35

side or during a breach response? The

2:37

sort of roles on the other side

2:39

of the customer. Yeah, no, it's a

2:41

great question. I mean, on the pre-breach

2:43

side, it's more, I'll say, it is

2:45

much more relaxed in some respects because

2:47

you're not dealing with an active threat.

2:50

You can work with a client to do

2:52

what we call tabletop exercises, which is basically

2:54

running through a hypothetical scenario and seeing how

2:56

they respond. They can be as basic or

2:58

as complex as the organization would like to

3:00

test it out at level. That makes sense

3:03

to them. We do a lot of contract

3:05

reviews for them to make sure that they

3:07

understand what their legal obligations are in the

3:09

event of a breach, but also more importantly,

3:11

what should they be putting in? before they

3:14

sign an agreement with a third-party vendor

3:16

who may be holding or touching their

3:18

data or their systems. We do a

3:21

lot of work, especially post SEC rules

3:23

on disclosure requirements on cyber oversight and

3:25

governance, work with the boards. What is

3:28

their fiduciary obligation? We often sit as

3:30

ongoing advisors, which I know also a

3:32

mandian does quite a bit in terms

3:35

of tracking KPIs, seeing what they're doing,

3:37

how can they improve because the threat

3:39

is always evolving. So that's... at a

3:41

very high level on the pre-breach side

3:44

of things and like I said it's less

3:46

stressful in some respect because you're preparing for

3:48

the worst case but you're not dealing with

3:50

the worst case at that point necessarily. The

3:52

second piece is the response side the IR

3:54

part the incident responsible component that one is

3:57

pretty intense you know I often talk to

3:59

some younger lawyers or people who want

4:01

to develop a career in cyber

4:03

security. And I often say it's

4:06

like the adrenaline sport portion of

4:08

our practice, clients call typically late

4:10

at night before a weekend or

4:13

a long weekend, porting back that,

4:15

you know, their systems are down,

4:18

they're dealing with a crisis. And

4:20

at that point, it's not just

4:22

all hands on deck, but certainly

4:25

forensics, you may have Christ's communication,

4:27

you may have ransom negotiations, experts

4:29

coming in. So it really is

4:32

pulling the A team together to

4:34

respond to that incident like in

4:36

real time very quickly with extremely

4:38

compressed timelines. Last point on that,

4:40

which is I find it stimulating

4:42

from an intellectual and legal perspective.

4:44

Some people find it a bit

4:46

too stressful, is you are in

4:48

the trenches with the client literally

4:50

talking to their CEO talking to

4:52

their board talking to their general

4:54

counsel on on strategy with very

4:56

imperfect information and it makes it

4:58

for a much more challenging environment

5:00

to give advice in but one which ultimately

5:03

if you if you have experience and you've

5:05

done this a lot of times is very

5:07

satisfying and rewarding for when the client has

5:09

passed through that crisis. And you kind

5:11

of hinted at this a little bit

5:13

already but where, you know, for a

5:15

law firm like Norton Rose Fulbright, would

5:18

you be engaging with an incident response

5:20

other sort of consulting provider like Mandient?

5:22

How do you work with us, you

5:24

know, either of the preparatory side or

5:26

those breach response stage? So I sort of

5:28

alluded to this and it's a great question you

5:30

ask, look, you know, when it comes to cyber,

5:32

it is a team sport and it's not just

5:35

a nice. you know, expression to use in

5:37

these situations, it really is. Because what

5:39

we have in these situations, either during

5:41

a live incident or preparatory site, and

5:44

I'll get into the specifics of what

5:46

we do with the team at Mandian,

5:48

you're pulling this A team together, like

5:50

I said, quickly, and each member of

5:53

that A team, A has an expertise

5:55

and B has a role to play

5:57

within that overall response. So, super important.

5:59

to have the right folks doing the right

6:01

thing. Like for example, we work

6:03

with Mandian on crises, especially on instant

6:06

responses regularly, and they're going to be

6:08

in there to contain the incident, make

6:10

sure that we're restoring appropriately, i.e. as

6:13

securely as possible, and then doing the

6:15

forensic investigation. And literally we are... hand

6:17

in glove working together. We are there

6:20

because I need to be able to

6:22

give real-time advice to the CEO or

6:24

the general counsel based on where Mandian

6:27

may be in their investigation what they're

6:29

finding. I need to talk to the

6:31

Combs people as to what we can

6:33

or cannot say based on what facts we're

6:36

discovering on the ground and so on. So

6:38

very much a partnership kind of

6:40

relationship, not just with Mandian certainly,

6:42

but also with those other... other

6:44

team members I mentioned like Combs

6:46

or for example legal or other

6:48

folks within the organization. So we

6:50

do a ton of that work

6:52

with the with the mandian team

6:54

on the instant response but on

6:56

the pre-breed side again we

6:59

are lawyers our team is

7:01

there to advise on legal

7:03

issues talk about strategy obviously

7:05

minimize risk for the organization.

7:07

Well I mean I'm pretty

7:09

technical so is our team

7:11

but we're not forensic investigators

7:14

investigators. We're not threat intelligence

7:16

gatherers. you guys have that tool or those

7:18

tools available to you to be able to

7:20

feed that to us. So on the pre-breed

7:22

side when we're designing scenarios for example for

7:25

tabletop exercises, now we could do one on

7:27

legal and that's super helpful and plays a

7:29

role, but we could also do one which

7:31

plays a role which involves the information security

7:34

team and for that the scenario has to

7:36

have a technical drill component which is then

7:38

coupled with legal and coupled with the board,

7:41

coupled with comms and a variety of other

7:43

things. So you guys play a very critical

7:45

role even on that's scenario planning on

7:47

the pre-breat side of things as well.

7:49

So one of the things I'm really

7:51

excited to pick your brain around is

7:54

some of the conversations that you've been

7:56

having with your clients over the last

7:58

year and especially in those sorts of

8:00

c-sweet roles at the board level, I'm

8:03

curious to know what are the sorts

8:05

of conversations you've been having, what are

8:07

the things that are top of mind

8:10

for them when it comes to cybersecurity?

8:12

There's always a lot that is continuously

8:14

coming out, either in the news, through,

8:16

you know, private Intel feeds in terms

8:19

of emerging threats, ongoing constant threats. So

8:21

either from a threat perspective or just

8:23

generally areas of kind of cyber risk.

8:25

This is a very very broad question,

8:28

but what are the things that you

8:30

find your most often having in terms

8:32

of topics of conversation? It's a great

8:35

question because I go to conferences, I'm

8:37

sure you do as well, you hear

8:39

about some of the emerging threats, and

8:41

what's interesting is when it comes to

8:44

cyber, every 12 months, 18 months, there's

8:46

a new angle to something that we've

8:48

been dealing with because these hackers, they're

8:51

not static, they're dynamic, so for every

8:53

move that's made. there's a counter move

8:55

and a counter move and then another

8:57

counter move. So we always have to

9:00

adapt and I think that's one of

9:02

the challenges of cyber security is to

9:04

constantly be evolving. So I think there's

9:06

a few things. Some of these may

9:09

be sort of table stakes but others

9:11

which are now emerging which are a

9:13

bit different that I hadn't seen in

9:16

the past and just for your audience

9:18

so they're aware in a prior life

9:20

I did have quite a bit of

9:22

exposure in our national security agency here

9:25

up in Canada and have been typically

9:27

very hawkish in terms of cyber threats

9:29

from a foreign state perspective. What I

9:31

have often seen over the years is

9:34

countries who cannot necessarily fight a typical

9:36

kinetic war like a military war on

9:38

the ground effectively because there's disparity will

9:41

often leverage. cyber as a leveling field.

9:43

So these are happening in the shadows.

9:45

We as typical citizens don't see it

9:47

every single day, but there's a lot

9:50

of things happening in the background that

9:52

I'm sure the Mandian team tracks regularly.

9:54

I know they feed us some Intel

9:57

as well, and we track in terms

9:59

of clients who are in various industries.

10:01

So what's new is. Two things, maybe

10:03

three. One, I've seen a lot more

10:06

activity by state-sponsored threat actors to target

10:08

critical infrastructures, much more than in the

10:10

past, where the vast majority of the

10:12

breaches we had seen for years and

10:15

years was primarily motivated by financial gain.

10:17

We're now seeing some that are focused

10:19

on strictly geopolitical motivations. And candidly, not

10:22

to scare your audience, we live in

10:24

a dangerous world. And cyber is a

10:26

tool to attack and cause harm to

10:28

countries. You know, they target critical infrastructure

10:31

like oil and gas, energy, financial services,

10:33

health care, to be able to make

10:35

a point, not so much because they

10:37

actually want to make financial gains out

10:40

of that attack. The second thing I

10:42

have seen a huge uptick on. And

10:44

it's quite timely because it's very much

10:47

focused on corporate espionage with AI. AI,

10:49

there's a huge race going on as

10:51

to who's going to meet that new

10:53

technological frontier, who's going to be able

10:56

to lead there, and there's going to

10:58

be huge ramifications for all of our

11:00

economies around the world. And there is

11:03

a rush to acquire any semblance of

11:05

advantage from corporate espionage standpoint. So there's

11:07

countries and individual groups that are targeting.

11:09

the theft of this technology space in

11:12

particular. And then the third thing, probably

11:14

a bit more on a lighter note,

11:16

not as scary, is boards are very

11:18

alive to cyber risks. They've seen what's

11:21

been going on both from litigation and

11:23

you hear about the hearings at Congress

11:25

and so on when a major breach

11:28

occurs. They want to make sure, and

11:30

they're more involved, that the cyber risk

11:32

posture is within an acceptable standard for

11:34

their organization. So there's a bit more

11:37

involvement than what we had seen in

11:39

previous years, a lot of board education,

11:41

a lot of understanding of what KPIs

11:43

are being tracked and how and why.

11:46

Really a big focus on industry regulatory

11:48

compliance, and that also includes SEC requirements,

11:50

the Securities Exchange Commission requirements. on board

11:53

oversight and what they may be judged

11:55

on down the road. So I'd say

11:57

those would be the three. Geopolitical risks

11:59

relate to cyber, corporate espionage being the

12:02

second, and the third would be a

12:04

real focus by the boards and cyber

12:06

risk oversight management. Kind of on that

12:09

one point of cyber risk oversight management.

12:11

And you mentioned kind of education and

12:13

educating the board. How do you think

12:15

about that process of? Communicating threats, educating

12:18

the board, what do you find to

12:20

be most useful? Because these are individuals

12:22

where maybe cyber is not their day

12:24

job and this is not something where

12:27

necessarily they're trying to become an expert

12:29

in. And if you're just maybe a

12:31

casual reader of what is going on

12:34

in the news, it may be overwhelming.

12:36

It may be difficult to say, okay,

12:38

what are the categories of cyber risk

12:40

I need to prioritize? So how do

12:43

you think about approaching that area of

12:45

kind of educating? that maybe you really

12:47

need to get smart on. You know,

12:49

one of the things I've enjoyed over

12:52

the years when talking to boards is

12:54

they're so diverse and so smart, like

12:56

they have experience which is really relevant

12:59

for their board position. And a lot

13:01

of these board members are not coming

13:03

at it just from a pure cybersecurity

13:05

standpoint. They're looking at it from a

13:08

broader enterprise risk management. pick any company,

13:10

whatever industry they may be in, they

13:12

may be saying, well, okay, I am

13:15

concerned about cyber for sure because we

13:17

have technological dependencies on X, Y, or

13:19

Z. But I'm also concerned about reputational

13:21

harm. I'm concerned about an M&A deal

13:24

we're going to be doing the next

13:26

little while and the impact a cyber

13:28

attack could have on that and so

13:30

on. So they have a pretty holistic

13:33

view. What they need and what they

13:35

want to see from management and from

13:37

their advisorsisers. take this threat intelligence information

13:40

and current landscape and tell me for

13:42

my organization specifically what are the risks

13:44

A and then B what are the

13:46

mitigation strategies we need to do and

13:49

put in place And in some cases,

13:51

you know, they're pretty straightforward. In other

13:53

cases, there's some difficult decisions to make

13:55

like on budget, on resource, on hiring,

13:58

even on when you acquire a company,

14:00

you know, what is the risk from

14:02

a cyber threat landscape perspective? Do we

14:05

delay or phase in the integration of

14:07

the two companies over time because of

14:09

X, Y, or Z reasons? So it

14:11

can be really challenging, but what they're

14:14

looking for is give me the lay

14:16

of the land today. and then tell

14:18

me how I can mitigate it, and

14:21

then I will make the decision as

14:23

a board or as a group, you

14:25

know, as a risk committee, if it's

14:27

allocated to the sub-risk committee as to

14:30

how we do that. The other thing

14:32

they're very interested in is ongoing education.

14:34

This is across any company, but most

14:36

boards will have a continuing education program

14:39

they have to go through during the

14:41

year. The number one and two areas

14:43

that they're interested in are cyber risk

14:46

and AI risk. risk but also opportunities

14:48

at the same time. Cyber we often

14:50

see more as a risk you know

14:52

because it can bring down operations or

14:55

it can have a financial impact can

14:57

lead to litigation but when it comes

14:59

to AI in particular I know sort

15:01

of slightly off topic yes there's the

15:04

risk of AI you know if it

15:06

goes wrong if we have biases and

15:08

data sets you know how could that

15:11

hurt our reputation but what are the

15:13

opportunities for the company or the organization

15:15

to utilize AI for increased productivity and

15:17

so on and so forth. So I

15:20

think the boards look at it from

15:22

a risk perspective primarily and looking for

15:24

their advisors not to just come and

15:26

scare them about what the risks are,

15:29

but how do they fix it? Diving

15:31

a little bit deeper into one particular

15:33

problem, I think it's been very difficult

15:36

to have a conversation around cyber threats

15:38

without touching on ransomware. Certainly it's been

15:40

something that has dominated a lot of

15:42

the conversations that we have with customers,

15:45

certainly at least the last four or

15:47

five years. When you think about that

15:49

category of disruptive threats, where there's a

15:52

potential impact to continuity of operations in

15:54

the business, you know, you're a manufacturing

15:56

company and you can't ship out or

15:58

receive orders, for example, it seems who

16:01

have really shaped how a lot of

16:03

organizations, and maybe it's industry specific to

16:05

an extent, but it's shaped how organizations

16:07

think about cyber threat, when you think

16:10

about that category of threat, what are

16:12

some of the ways that you're seeing, maybe

16:14

at the C-sweet level or at the

16:16

risk committee level, organizations thinking about

16:18

either preparing for or even how

16:21

we would respond to that category of

16:23

threat? So what's interesting is, look,

16:25

over the last few years, there's

16:27

been an evolution. Before it was

16:29

a question of being informed at the

16:31

board level what the risks are and

16:34

making sure nothing got through, you know,

16:36

it's only that one time a hacker

16:38

has to be successful to cause significant

16:41

harm, there's been a real shift towards

16:43

let's emphasize building resiliency within the organization.

16:45

And the way I define resilience is probably not

16:47

the most technical way of looking at it

16:50

as being punched in the gut and being

16:52

able to get back up as quickly as

16:54

you can as an organization. So if a

16:56

hacker comes in and shuts down your operations,

16:58

how quickly can you get back up and

17:00

running? And I often give this example. So

17:02

I teach a course on cybersecurity. I've been

17:04

teaching it for about eight or nine years

17:06

now. at the Faculty of Law here in

17:08

Toronto at the University of Toronto. And

17:10

one of the first things I do

17:13

in the class I teach is I

17:15

ask students to take their laptop or

17:17

their iPad, spend 15 minutes, go online,

17:19

find any breach. And there's no

17:21

jurisdiction restriction, there's no time

17:23

restriction, find the two or

17:25

three worst managed breaches in

17:27

their opinion. And then we come

17:29

back as a group and we talk

17:32

about it. And what's interesting is

17:34

there's always three things that come up.

17:36

So one is. Wow, you know, Professor Amad,

17:38

they were down for a really long time.

17:40

So you asked them the question, why do

17:42

you say that? You know, wouldn't they be

17:44

down in any event if they got hacked?

17:46

The sure answer was, look, we get a

17:48

day, a couple of days, maybe a week.

17:51

We don't understand how somebody can be down

17:53

multiple weeks or months. And the impression

17:56

these students had was the longer

17:58

you're down, the less prepared. you

18:00

may have been in terms of disaster

18:02

recovery or business continuity. The second thing

18:04

they came back with in terms of,

18:06

you know, why they felt these were

18:09

not well-managed breaches was the communication was

18:11

really bad. Either they didn't communicate at

18:13

all. They communicated very slowly or even

18:15

worse, they had to correct communication they

18:17

had already issued, which is never a

18:20

good sign. And the reason that didn't...

18:22

sit well with people was it seemed

18:24

like the organization that was a victim

18:26

of this attack didn't have control over

18:29

the situation. The third thing and the

18:31

last thing that's probably relevant and I

18:33

put less weight on this but it's

18:35

still from an optics perspective something to

18:37

think about is there's so many breaches

18:40

going on around the world but there

18:42

are very few of them a small

18:44

portion believe it or not that are

18:46

actively investigated or where litigation ensues or

18:48

there is a regulatory formal investigation that

18:51

commences. And the perception was, well, if

18:53

you have a lot of litigation and

18:55

you have a lot of regulatory investigations,

18:57

maybe there's a fire where we see

18:59

this smoke. And like I said, I

19:02

put less weight on that because that's

19:04

an optics and a perception and each

19:06

thing is case by case, but you

19:08

take those three things together, those standouts,

19:11

what we're talking to these boards in

19:13

terms of what they should be thinking

19:15

about, the goal is not to be

19:17

perfect. But the goal is to have

19:19

the resiliency within the organization so you

19:22

can be up and running quickly so

19:24

that you are communicating and are in

19:26

control of the communication piece and if

19:28

you can avoid it or even if

19:30

you are investigated that you can be

19:33

successful in demonstrating at the end day

19:35

that you acted reasonably and as efficiently

19:37

and quickly as possible. And when you

19:39

think about how this category of extortion

19:41

threats have evolved. and the fact that

19:44

we're seeing more data theft and the

19:46

sort of public leaking these name and

19:48

shame sites these data leak sites associated

19:50

often with ransomware brands ransomware threat actors

19:53

has that changed how organizations view this

19:55

risk because now you're no longer just

19:57

thinking about having to consider the impact

19:59

to your operations and getting back up

20:01

and running, but also, you know, is

20:04

there potentially more regulatory or privacy exposure

20:06

from this this category of extortion now?

20:08

Certainly from a legal perspective, I mean,

20:10

look, if data is being dumped on

20:12

the dark web because the hacker stole

20:15

it, you automatically, there will be a

20:17

trigger in some respects in terms of

20:19

privacy notifications or other types of communication

20:21

they need to put out to business

20:23

partners. Again, it all depends on the

20:26

sensitivity and the type of information impacted.

20:28

I'm sort of of two minds and

20:30

it depends on which camp you find

20:32

yourself in a given situation. There's one

20:35

camp, especially a lot of folks that

20:37

I talk to in the communication side

20:39

of things that may say, look, you

20:41

know, there's so many breaches happening in

20:43

Moran that people are being desensitized to

20:46

a certain, you know, to a certain

20:48

level, that you get a notice once

20:50

in your lifetime, you'll probably be very

20:52

concerned, but if you get 20 of

20:54

them over a two-year period, you'll just

20:57

get desensitizeditized. I'm not sure about that

20:59

I think it's one way of looking

21:01

at it. The other one is you

21:03

are not going to be judged by

21:05

the fact you had a breach, it's

21:08

how you respond to the breach. So

21:10

there is some value in having a

21:12

really robust communications program ready to go.

21:14

You don't have to open kimono from

21:16

A to Z, but certainly you want

21:19

to be able to communicate relevant facts

21:21

and be there for that stakeholder, that

21:23

would be a customer or a shareholder

21:25

or the market or the media, whoever

21:28

that stakeholders are, you've got to be

21:30

there and be able to support them

21:32

through that process. Do you think there's

21:34

any certain categories of cyber risk that

21:36

in your conversations now you think maybe

21:39

you're being underappreciated to the extent to

21:41

which they present actual risk? I mean

21:43

you touched on for example earlier the

21:45

threats posed by nation state actors and

21:47

that sort of category of cyber espionage

21:50

where you know maybe you're a pharmaceutical

21:52

company, your IP is stolen in a

21:54

breach, you don't see immediate impact to

21:56

your operations, you know your systems are

21:58

still up and running, there's no... extortion,

22:01

ransom fee that you have to pay

22:03

to get data back. But maybe ultimately

22:05

that has an impact because a rival

22:07

product comes on the market somewhere that

22:10

you do business. So are there categories

22:12

like maybe that one in particular, but

22:14

other areas where just there's not as

22:16

much attention to the extent that there

22:18

should be on an area of cyber

22:21

risk? Yeah, let me let me actually

22:23

pick up on that one and then

22:25

I'll share another one, which is probably

22:27

a bit less exciting, but one which

22:29

is much more common. But I think

22:32

when we look at corporate espionage, which

22:34

is something I personally feel, this is

22:36

my Imran Amad personal view on this

22:38

piece, it is underappreciated and it's a

22:40

clear and present risk every single day.

22:43

You know, looking at it from a

22:45

North American perspective, just Canada, US for

22:47

example. The level of innovation and R&D

22:49

dollars spent in innovation is huge. You

22:52

spend years and years and years, you

22:54

know, as either as a startup, a

22:56

scale up, a large enterprise, pumping money,

22:58

hiring experts, investing in education and so

23:00

on of your existing staff and on

23:03

a. moments attack you could lose that

23:05

technology and there's some well-documented cases in

23:07

terms of telecommunication company equipment that may

23:09

have been compromised something in the nuclear

23:11

area that construction of nuclear plans that

23:14

may have been compromised years ago and

23:16

a variety of others where companies that

23:18

were at the bleeding edge of technology

23:20

had to basically disappear or scale down

23:22

because they lost that critical R&D and

23:25

that showed up somewhere else in the

23:27

world at less expensive cost and at

23:29

an advantage for that competitor. So that

23:31

is something we absolutely have to do.

23:34

I'll give you an example. During the

23:36

pandemic, you may recall the first half,

23:38

regrettably of the pandemic, there was no

23:40

vaccine. And there was a huge rush

23:42

in the pharma space to develop a

23:45

vaccine and a ton of resources were

23:47

being poured into it. But when you

23:49

look at the broader pharma ecosystem, certainly

23:51

you have the pharma companies, but you

23:53

also have clinical trial companies. as you've

23:56

got research facilities at universities and other

23:58

places, we had seen a significant uptick

24:00

in terms of targeted attacks by states,

24:02

sometimes by groups, looking to acquire that

24:04

specific Intel, that R&D, that IP intellectual

24:07

property. And how did we find it?

24:09

Because when folks like Mandy and where

24:11

our forensic investigators, they would basically look

24:13

at the breadcrumbs and see, well, these

24:15

were the directories they were going through.

24:18

These were the commands they were looking

24:20

for. Here are the folders they may

24:22

have searched, and it doesn't take a

24:24

lot of effort to figure out that

24:27

these folks, the hackers, were trying to

24:29

get information about the development of a

24:31

vaccine. And you can go down the

24:33

list. I mentioned AI being one area

24:35

where there's a lot of investment going

24:38

on. That's a key area where we

24:40

saw and we continue to see cyber

24:42

attacks happening for corporate espionage purposes. The

24:44

goal there is not to create a

24:46

lot of havoc or even be noticed.

24:49

The goal is to go in, watch,

24:51

and take what may be relevant for

24:53

that hacker person or group who's doing

24:55

it. So much more difficult. to track

24:57

in some respects and much more difficult

25:00

candidly to ascertain what was taken and

25:02

to what extent that loss is going

25:04

to impact the bottom line. The other

25:06

example That you asked about you, you

25:09

know, what where what is under appreciated?

25:11

You're going to laugh about this, but

25:13

it's the old classic business email compromise

25:15

for your audience members who are less

25:17

familiar with it Imagine being at work,

25:20

you have a corporate email address and

25:22

you get a fishing email perhaps that

25:24

looks, you know, really legitimate you click

25:26

through it Doesn't go anywhere and you

25:28

just assume maybe it's a bad link

25:31

or maybe your computer is not connected

25:33

properly. It's at work. So maybe that's

25:35

what happened here you'll wait for the

25:37

next alert Meanwhile on the back end

25:39

your MFA multi-factor token has been compromised

25:42

somehow or somehow the access has been

25:44

obtained by the hacker and what they

25:46

typically want to do is some kind

25:48

of financial fraud. They want to transfer

25:51

for the funds to another bank account

25:53

that they potentially control or have access

25:55

to and so on. I'm grossly simplifying

25:57

the BEC financial fraud piece, but that's

25:59

what we're looking at. So here's the

26:02

funny and interesting part in terms of

26:04

how quote unquote that has evolved is

26:06

the use of AI in the deep

26:08

fake piece. The often given advice was

26:10

if you're going to transfer funds to

26:13

a new bank account, make sure you

26:15

do an analog check, you know, call

26:17

the person on the other side. if

26:19

you can do a video conference even

26:21

better, so on and so forth. But

26:24

now with the use of AI and

26:26

deep fakes, you can recreate a lot

26:28

of stuff by capturing people's images and

26:30

voices, which is readily available these days

26:33

in many ways, and do those transfers.

26:35

Now the reason I say it's... underrated

26:37

as a risk is twofold. One, you

26:39

know, we often think multi-factor authentication is

26:41

going to resolve everything. And unfortunately, there

26:44

are ways to get around it, as

26:46

you know, and I'm sure many of

26:48

your audience members know, so they can

26:50

get around MFAs, like having nothing in

26:52

place. But the second piece is the

26:55

cost, the infrastructure to do this kind

26:57

of financial fraud is extremely low. Hence

26:59

the quantity of these attacks are significant

27:01

compared to a ransomware attack which may

27:03

require more of an infrastructure you need

27:06

to have, believe it or not, some

27:08

kind of drive or data centers where

27:10

you can keep the data that you

27:12

steal. You need to have a supply

27:14

chain, you know, one who compromised credentials

27:17

all the way down to the chain

27:19

to the negotiator. You have to be

27:21

able to mix the currencies, the crypto

27:23

currency that you're obtaining through these global

27:26

mixers and then move them to accounts

27:28

and then turn them into fee ads.

27:30

So there's a whole machine behind that

27:32

That takes time and that can be

27:34

brought down. But the BEC, it's not

27:37

too difficult to take advantage of that

27:39

and there's big money involved. So I'd

27:41

say those would be the two, the

27:43

corporate espionage piece and Shirley the second

27:45

one, which is the good old business

27:48

email compromise, if you want to call

27:50

it that. Yeah, on that, the business

27:52

email compromise, we put out a blog,

27:54

actually, some of our... pen testers, red

27:56

teamers, engaged and sort of proved, you

27:59

know, or showcase ways you could use

28:01

voice spoofing and phishing, email, you know,

28:03

voice-based phishing to compromise an organization. And

28:05

they did, you know, just as you

28:08

noted, being able to train a model

28:10

with recordings of, so you have an

28:12

executive who's on the news all the

28:14

time, right? And there's plenty of public

28:16

recordings of that, and then being able

28:19

to kind of spoof their voice. So

28:21

I think there's an interesting, certainly, and

28:23

there's been, you know, several news stories

28:25

where either audio or visual deep fakes

28:27

have been leveraged in, you know, business

28:30

emocompromised like incidents. I think there's an

28:32

interesting question around to what extent will

28:34

threat actors adopt, you know, what might

28:36

at least right now be more complex

28:38

ways to carry out that activity. as

28:41

you know, like the simple email-based method

28:43

of business email compromise is still very

28:45

effective and still makes up the most

28:47

of what is kind of going on

28:50

in that space. And there's this interesting,

28:52

I think, question around how we anticipate

28:54

a certain technology might be employed by

28:56

threat actors and how they might actually

28:58

use it. But the other piece I

29:01

think is also really interesting that you

29:03

touched on is the lowering of barriers

29:05

to entry, because I don't think that

29:07

the cyber crime ecosystem is ever static.

29:09

always the potential globally for new actors

29:12

to enter that space. And I think

29:14

as you see some of these as

29:16

a service like components to the ecosystem,

29:18

whether it's web skimming or tools to

29:20

do business email compromise more efficiently, it

29:23

is an interesting question around how will

29:25

that change the environment? Will we see

29:27

more threat actors doing things? And will

29:29

more threat actors have the ability to

29:32

leverage techniques that in the past only

29:34

more skilled threat actors would do? I

29:36

agree with you. I think if I

29:38

to be a guessing or a betting

29:40

person, I think the barriers to entry

29:43

have materially decreased and it will continue

29:45

to be that way. One of the

29:47

interesting part I was watching a great

29:49

documentary on the BBC the other day

29:51

and they were talking about this whole,

29:54

why did Chad GPT take off the

29:56

way it did when it was released

29:58

almost two years ago? Well it did

30:00

because the interface was so easy. And

30:02

one of the commentators said, you know,

30:05

back maybe five, six, seven, eight years

30:07

ago, we were telling a lot of

30:09

young folks, you got to do coding.

30:11

Well coding is not necessarily what you

30:13

need to do now is to get

30:16

access to the most complicated and sophisticated

30:18

tools that are out there. So a

30:20

lot more questions come to mind in

30:22

terms of what would be the barrier

30:25

to entry. If you've got a computer

30:27

and a keyboard and a couple of

30:29

basic tools which are readily available, arguably

30:31

you have all you need to do

30:33

some harm if you have malicious intent.

30:36

So we've covered a lot of ground

30:38

here and maybe tying this all together.

30:40

What are some of the kind of

30:42

areas of maybe their opportunities around board

30:44

education, engagement with C-suites, getting them more

30:47

involved in preparatory steps, things like tabletop

30:49

exercises, things like that that you're excited

30:51

about this year, or also just areas

30:53

of maybe risk that people should be

30:55

considering, you know, we're recording this in

30:58

early February. What's kind of your outlook

31:00

on the cyber risk landscape there? So

31:02

a couple of positive things, because I

31:04

know we're probably coming to the end

31:07

of our conversation, so I want to

31:09

leave on a positive note instead of

31:11

just being doom and gloom. But always

31:13

when we can. It's always good. In

31:15

cyber free and on a positive note.

31:18

Well, a couple of good trends that

31:20

are happening, which I think worth mentioning.

31:22

One, if you go back, and I'm

31:24

sure you remember this. 10 years ago,

31:26

trying to get attention of the board

31:29

on cyber was not as easy as

31:31

we think it is now. But the

31:33

boards now are very very alive to

31:35

this. Leadership teams are very alive and

31:37

not just alive about the risk, but

31:40

they're alive to the fact they have

31:42

to invest in being prepared for it.

31:44

So that is a good place to

31:46

be to have these conversations. I think

31:49

the other thing that's a positive is

31:51

just talking about the examples earlier about

31:53

tabletop exercises. You know, a lot of

31:55

clients have already done these. They've done

31:57

sort of the... initial tabletop 101 or

32:00

2.0. But now what they're looking for

32:02

is, okay, let's stretch, let's go and

32:04

see how far we can take this,

32:06

let's challenge ourselves a bit more, the

32:08

folks who are there in our organization,

32:11

that it be the CFO or the

32:13

CFO or the compliance officer, the CSO,

32:15

or go down the list of who

32:17

would be typically on an instant response

32:19

team. They want to push the limit

32:22

to see how far they can go

32:24

with a difficult scenario and make the

32:26

best possible decision. So we're seeing more

32:28

complexity being built into these tabletops, which

32:31

candidly are hard to put together because

32:33

it requires a lot of coordination between

32:35

the technical folks, certainly the governance folks,

32:37

in some cases, we have board members

32:40

who attend not to participate, but as

32:42

observers. Obviously, there's a lot of preparation

32:44

and role definition that has to happen

32:47

in those situations, but I'm seeing a

32:49

lot more. sophistication. The joke I often

32:51

share with our team here at Norman

32:53

Rose is it's a bit like Star

32:56

Trek. I don't know if you remember

32:58

that show with with Captain Kirk, the

33:00

the old one, and the story goes

33:03

something like this. Captain Kirk was a

33:05

cadet in the academy and he would

33:07

to pass the officer test you need

33:10

to do this Kobayashi Maroo test where

33:12

you're given Bad and worse options. And

33:14

in the story, Captain Kirk basically changes

33:16

the algorithm to basically make it such

33:18

that he wins, which is not the

33:20

outcome Star Fleet wants in that scenario.

33:22

The reason I tell the story is

33:25

because what they're trying to test in

33:27

that actual real scenario, not the one

33:29

that Captain Kirk changed, was how would

33:31

you respond to a high stress lose-lose

33:33

scenario? And often in a cyber crisis,

33:35

you're dealing with bad and worse options.

33:37

So the goal here is not so

33:39

much to get... the right answer. The

33:41

goal is to see do you have

33:43

the muscle memory, the reflex, to be

33:46

able to do certain things in a

33:48

quick compressed timeline. And I think when

33:50

you do those really complex tabletop, that's

33:53

what I'm seeing boards, certainly leadership teams,

33:55

information security teams, asking for in terms

33:57

of their tabletops. So that's very positive.

34:00

In terms of risks for 2025, it's

34:02

a bit hard to say. Everything that

34:04

I have seen in roughly about a

34:06

month or so, we're into the year,

34:08

plus what I've read and the conversations

34:10

I've had with folks at Mandient or

34:12

elsewhere, we've seen a slight decrease at

34:15

the beginning of the year in terms

34:17

of the traditional ransomware attacks, but they

34:19

haven't gone away. And there's an expectation

34:21

it's going to increase. This is a

34:23

risk that's not going to go away.

34:25

So how do you adapt to it?

34:28

is something that comes up a lot.

34:30

And last point you and I just

34:32

touched on this prior to this last

34:34

point, which was the use of deep

34:36

fakes in very basic cyber attacks like

34:38

wire transfers. We're seeing a lot more

34:40

sophistication in that, you know, the the

34:43

email that looks like a legitimate email

34:45

coming from an e-commerce business you do

34:47

business with or a message coming from

34:49

your cell phone service provider. And what

34:51

they can do with these AI tools

34:53

now is collect a ton of information.

34:56

So if I was a hacker pre-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-

34:58

I would have to go and say,

35:00

okay, well, let me target Imran. Let's

35:02

go on his LinkedIn, let's go on

35:04

his Facebook, let's go figure out what's

35:06

on Norton Rose's website about him, try

35:09

to put it together, then I craft

35:11

an email that would look legit, and

35:13

then send it off. Now with AI,

35:15

you can do is have that all

35:17

that information scraped, put into a database,

35:19

and hit hundreds of Imran, that you

35:21

could do the most, you know, connoisseur

35:24

of people out there who would have

35:26

picked this up otherwise. Well, a lot

35:28

to think about. We got the positive

35:30

outlook and then also the thing to

35:32

be watching from a risk perspective, fitting

35:34

them both and there at the end.

35:37

But Imran thanks for your time and

35:39

sharing your insights. This has been an

35:41

excellent conversation. I think hopefully will kind

35:43

of frame certainly a lot of the

35:45

ways that I'm thinking about this year

35:47

and engaging with some of our customers.

35:49

So thank you for your time today.

35:52

Thanks for having me. It was a

35:54

great conversation. Hope we can do it

35:56

again soon. Okay.

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features