& cplSiteName &
Comments
You must login to participate in this chat. Please login.

Hi @Anna.Telia thanks for tuning in to the recording!

Blogger

Good examples and easy to follow, thanks for the lecture!

Light Beer

Poll question answer: I believe quite well.

Light Beer

Omg 2.3 zetabytes annual run rate of IP traffic ahead?!..

Light Beer

Very catchy presentation and not boring:)

Light Beer

Hello, listening from Sweden, sunny day here!

Light Beer

Excellent Ray Watson, as always

Light Beer

Very Nice Ray!  A good refersher! 

Light Beer

Great Job Ray! Very well done.

Light Beer

Hope to have you teaching us how to build up more awareness of the security threat again!

Light Beer

Awesome Presentation!

 

Light Beer

Thank you! Centralized Orchestration will help in security control.

Light Beer

I think more understanding on how to prevent threat is required.

 

Light Beer

Listening to the achived lecture from California.

 

Light Beer

Hi from New York

Light Beer

thanks, the fact that these are archived for future refernece is fantastic. 

Light Beer

very informative and interesting

Light Beer

will predictive anaylitics play a role

Light Beer

moderatly well

Light Beer

2.3 zetabytes! wow

Light Beer

thanks for archive

Light Beer

tampa 85f sunny

Light Beer

Still Atlanta.  Beautiful.

Light Beer

Kanata Ottawa

nice and sunny

Light Beer

Thanks everyone for tuning in and a huge thanks to @Ray for the excellent lecture! I'll see you all on the chat boards on Wednesday for Big Data Analytics Meets Customer Experience Management with Juan Gorricho, Disney.

Blogger

Awesome Presentation

Light Beer

Great presentation, thanks

 

Light Beer

Great presentation!

Light Beer

Thanks @Ray and @Kelsey for a great lecture today. It was really informative and I learned so much in such a short time. I definitely need to listen to this one again.

Lightning

Thanks Ray for some of those insights! 

Light Sabre

QQ: If IT administrators cant limit BYOD, how could they possibly limit BYOF(itBit)  ?  Answer:  therein lies the huge problem.   I dont necessarily think we have to ban thse devices, but we definitely need to know when they are on the network and what (if anything) they are doing.   Especially in PCI-DSS or HIPAA typ environments.   Remeber, Target was breached because of an air conditioner.   

Light Beer

@maryam "JohnGordon I would hope they have any ethical commitment if they don't understand their legal obligations as a former employee. ":

The ethical bargain between employer and employee may be considered by the dismissed employee to have been breached by the employer when the replaced employee is forced to train the cheaper imported replacement.

Light Beer

QQ:  Why can't the e-mail system (MS-Outlook) run these executables in a virtual machine (similar to the Java VM)? Better yet, the filtering system could disable the link. 

Answer:  That concept is called (broadbly speaking) "sandboxing".  It is one of the things that apple IOS devices do to protect their data.    Google's Chrome browser also see sandboxing which is one of the reasons it is often considered more secure than your typical Internet Explorer with outdated-flash installed.   I think Microsoft is doing much better than they used to do regarding security, but then again they had a long ways to go.    

Light Beer

JohnGordon I would hope they have any ethical commitment if they don't understand their legal obligations as a former employee. 

Light Beer

@Ray Q: 

Why can't the e-mail system (MS-Outlook) run these executables in a virtual machine (similar to the Java VM)? Better yet, the filtering system could disable the link.

Blogger

don't tell the IPv6rs tho

Lightning

@maryam: That is, replace employees can secretly compromise the IT systems of former employers in revenge, by selling the info about those systems.

Light Beer

QQ:  Is it really necessary for all sensors to have an addressable IP address?    Answer: no, it is absolutely not.   In fact, I would *prefer* if my devices wrere not addressable.   Unfortunately alot of the IoT vendors disagree with me.     Ironically, IPv6 may be a partial answer to alot of these things, but lets check back in 2050 and see if anyone is using IPv6 by then :-)

 

 

Light Beer

JohnGordon sad but hopefully uncommon

Light Beer

@[email protected] "John Gordon I hope that the security pros have a sense of ethical behavior like law enforcement so I can only hope the don't cross over to the darker side.": Can happen when IT employees get replaced by cheaper imported talent.

Light Beer

One of the really interesting pieces pieces about the Target breach is the vector that intruders used in the chain.  It was actually one of their HVAC (air conditioner!) vendors who had credentials thazt allwoe an entry,  and then this entry was exploited via two zero-days, and eventually the malware was planted on their Point of Sale systems.   We cannot trust anything on our network to be unmmonitored.  HVAC systems are now a threat!

 

Light Beer

Upskill U students leave our judgements at the door...especially when it comes to capitalization

Lightning

We won't hold it against you if you capitalize Internet @Ray

Lightning

Great information

Light Beer

John Gordon I hope that the security pros have a sense of ethical behavior like law enforcement so I can only hope the don't cross over to the darker side.

Light Beer

More about compass direction:    Generally speaking, "east-west" traffic refers to traffic within or between data centers -- i.e. server to server traffic. "North-south" traffic is client to server traffic, between the data center and the rest of the network (usually via the Internet*  ).

I believe the terms originated with  the way Visio network diagrams are typically drawn, with servers or access switches spread out horizontally, and external connections at the top or bottom.      

* Yes, I still captialize the word "Internet."  I know we aren't supposed to anymore, but I will continue to do so until you take away my shift key.  

 

Light Beer

Thanks for tuning in @Joe and for the great IoT question!

Blogger

Thanks for this great show, Ray & Kelsey.

Light Sabre

@Ray: 

Is it really necessary for all sensors to have an addressable IP address?

Blogger

@Ray: Q: 

slide 3: what is "delivery chain" as an attack vector?

Blogger

@Ray Q: 

Compass stuff is new to me and I would appreciate Ray revisiting North/South East/West threats a little bit more.

Blogger

I wonder how many IT security employees join the other side (the hackers) because of corporate policies towards employees? I'll bet that's a huge hole in security.

Light Beer

Have a great weekend everyone --see you on the boards soon!

Light Beer

QQ: How do employment and compensation practices in IT affect vulnerability of corporate systems?    Anser:  This one is a bit nuanced.  Most companies consider their salary and compensation information to be some of the most valuable they have.   But then when you ask them, point blank, are those files being stored unencrpyted anywhere, they do not know.  The other complication to the HR question is about maintaining and protecting levels of access.  As Snowden taught us oh too well, have "super administrators" can be dangerous.  SO I don't really have a direct answer abot this except to say <1> please protect your HR data with encrpyion <b> please monitor and protect employee levels of access.  

 

Light Beer

looks like security world should also look more and more on the medical field, how some of the communicable diseases have been addressed!

Light Sabre

Thanks for tuning in @maryam! 

Blogger

Thanks to everyone on the Board and Kelsey for the great exchanges.

Light Beer

@Ray another question: How do employment and compensation practices in IT affect vulnerability of corporate systems?

Blogger

Thank you, Kasey and Ray, all audience for sharing

Light Sabre

Enjoyed this topic and well presented

Light Beer

great, thanks

Light Beer

It has been an excellent session, thanks Ray

Light Beer

Looking forward to hearing more from Ray on the chat board!

Lightning

@Ray Q: 

will the hackers also be using sophisticated analytics to plan the next punching threat vector?

Blogger

Thank you..

 

Light Beer

thank you, this was a good one

Light Beer

great session , thank you

 

Light Beer

Thank you, Ray

Light Beer

Thank you very much Ray! Very engaging presetation today. I hope to see you back here again in the future.

Light Sabre

Thanks for all your insight Ray you did an awesome job of explaining the issues!

Light Beer

Thanks Upskill, for selecting such a great topic

Blogger

Great Lecture , Ray

Light Beer

Secure every point.

Light Beer

Thanks for the copious information, Ray W.

Light Beer

Secure all the things!

Light Sabre

Hi Ray, how does an IT administrator legislate for what fitbit you can and can't bring into the office. Very difficult, surely?

Light Sabre

Great answer thanks Ray!

Blogger

If I could modify my last post, I'd ask, "Could "normal behavior" disguise a threat?" 

Light Beer

I get calls from not even Microsoft but Windows!!!! Come on at least do your research

Light Beer

Good question @georgiacougar....I was wondering that too. PS good to see you here on Upskill u!

Lightning

Ray is part of the issue that there is still a skill shortage in security and level of experience?

Light Beer

poor grandmas, they get a bad rap but I totally know what he's talking about!

Lightning

I get those calls from "Microsoft" all the time!

Light Beer

How did the nursing indestry attempt to solve the alarm fatuge problem

Light Beer

Security skills will be big requirement for future networks

 

Blogger

@Maryam I need to look up smart pillows. I'm intriqued now.

Lightning

Does SDN/NFV make networks more secure or less secure ?

 

Blogger

What is an example of "normal behavior"? And, is it possible that a "normal behavior" could still be a threat? Is that when something like signature-based solutions could help?   

Light Beer

combination of both

Light Beer

yes, very interesting

 

Light Beer
TeleWRTRLiz my pillow is decidedly not smart no tech in my pillow. what does it do?

 

Light Beer

kudos to the chat board today! You guys are really rockin' this class!

Lightning

Are you suggesting - enterprises need to have this capability in-house or subscribe to a service? Secondly, should there be some standardization of the type of data that needs to be provided?

Lightning

will the hackers also be using sophisticated analytics to plan the next punching threat vector?

Light Sabre

Combination of both for me.

Light Beer

Coming up on Q&A...get your questions for Ray in!

Blogger

Bayesian statistics (use past results to fine tune the results)

Light Beer

Alarm fatigue - so common across industries

Light Sabre

Alarm overload, analytics for the analytics...

Light Beer

smart pillows?!

Lightning

Combination of both

 

Light Beer

@Michelle human error will always be that tricky problem to solve!

Blogger

combination of both

Light Sabre

Michelle the issue is that smart tvs are often used to avoid the charges from cable companies. Without connectivity you are married to the cable company.

Light Beer

Combination of both

Light Sabre

@ANOTHER QUESTION FOR RAY: So in terms of these hypervisor security issues, what's your take on hypervisor and container alternatives, like unikernels, SR-IOV, INtel's DPDK, etc.?  Are we seeing an evolution -- or even extinction -- of the traditional vSwitch?

Light Sabre

Poll response: Combination

Light Sabre

combination of both, more so the latter 

Light Beer

Re-skilling workforce for sure - technology is catching up, people still make silly mistakes

Light Sabre

Combination of both (threats are coming at us so fast)

Light Beer

combination of both

Light Beer

reskill #1, tools #2

Light Beer

Combination of Both

Lightning

combination of both

Light Beer

combination of both

 

Light Beer

better firewalls

Light Beer

Combination of both

Light Beer

combination of both

 

Light Beer

Combo of both.

Light Beer

@michelle that's scary. I had no idea

 

Lightning
@anon-yes linux and ios vulnerabilities are definitely top dollar now
Lightning

Smart TVs are often left unpatched once newer models are available in market. I don't even connect mine to the network anymore because it's no longer getting security updates from the vendor. So sad.

Light Sabre

I have not seen anyone marketing any security products for the unique issue of smart tvs

Light Beer

@Joe aww - sad story. Poor kid :(

Light Sabre

larman so true no security at all for smart tv!

Light Beer

Hi Ray. If IT administrators realized they couldn't prevent Bring your Own Device (BYOD) why should they be any better able to stand in the way of Bring Your Own Fitibit?

Light Sabre

(And worse, it was one of those with all the pop ups that made it difficult to get out of.)

Light Sabre

and now new problem-smart tv

Light Beer

@Michelle: True story: Many years ago, a relative of mine -- young kid -- was interested in old video games (Atari, NES, etc.) and finding online emulated versions of them.  So this innocent 12-year-old, instead of using a search engine, just typed in "oldgames.com."  It was an adult website.  :/

Light Sabre

Is it really necessary for all sensors have to have an addressable IP address?

Lightning

and having control over us-users?

Light Beer

Us, but maybe not all of us in this chat room.

Light Sabre

Joe I agree companies need to educate their users about security on their porducts how many people still don't have security on thier phones?

Light Beer

privacy is no more

Light Beer

Billions of attack vectors ready for plucking

Light Sabre

QUESTION:  Ray mentioned Linux vulnerabilities.  I have not been as concerned about security on Mac and Linux machines.  Should I start to become more concerned?

Light Beer

Thanks for addressing my question, Ray!  (And, as you can see, it's "Light Sabre.)  ;)

Light Sabre

I have wondered about these systems - thanks for helping me realize my fears were warranted.

Light Sabre

It is clear that security cannot be left upto the users (history is a good teacher) so it is the "responsibilty" of the service/hardware/software provider to burn in the security.

Light Beer

slide 3: what is "delivery chain" as a attack vector?

Light Sabre

Speaking of "these devices shipping in an unsecure way," at a cybersecurity panel at a recent conference I attended, attacks on the supply chain to infiltrate IoT devices were discussed in depth.  And then the discussion becomes about (1) securing the physical supply chain and (2) training people at all points in the supply chain/transaction to be able to detect if something looks wrong.

Light Sabre

If Network Connectivity (wireless, wired)is the medium through accessing the Central Cloud Systems, should that not be the portion that requires the best security ?

Light Beer

QUESTION:  Compass stuff is new to me and I would appreciate Ray revisiting North/South East/West threats a little bit more.

Light Beer

light beer? what kind of name is it??  vodka sounds better

Light Beer

not very well

Light Sabre
@joe-good points on iot.my preferred method are defense in depth and making sure all your systems are patched across the board.
Lightning

@klogan: Indeed, I don't like to get too specific in these chats about the details of my security.  ;)

Light Sabre

(It could also be industrial IoT...) :)

Light Sabre
moderately well I guess
Light Beer

ONLY BUY THE DUMB THINGS, yeah?

Light Sabre

I think very well, but they would not admit if every Tom, Dick, and Harry out there were looking through our files....

Light Beer

Moderately well

Light Beer

not sure, but moderately to very well

Light Beer

I am not drinking beer:)

Light Beer

they do not

 

Light Beer

very well

 

Light Beer

Not very well

Light Beer

not very well

 

Lightning

not extensively used yet

Light Beer

We have locks on our front door?

 

Light Beer

fairly well

Light Beer

Moderately Well

Lightning

Not sure, actually.

Light Sabre

Not very well. (Not at all)

Light Beer

Moderately well

Light Beer

Moderately well

 

Light Beer

moderately well

 

Light Beer

VERY WELL.

 

Light Beer

Not very well.

Light Beer

Not very well

 

Light Beer

not very well

 

Light Beer

SURVEY QUESTION ANSWER: Moderately well.

Light Beer

not very well

Light Beer

Not Very Well

Light Beer

We're headed into the abyss

Light Sabre

Ray what type of internal monitoring have you seen work?

Light Beer

As a parent who has cleaned viruses out of her kids computers, I can attest to the amount of viruses deliverd along with gaming stuff.

Light Beer

Great question @John!

Blogger

CORRECTION: How do employment and compensation practices in IT affect vulnerability of corporate systems?

Light Beer

good point prosecution is key but it would involve worldwide cooperation.

Light Beer

Wow!!!! That sort of ROI is what Wall Street chases.

Light Beer

QUESTION: How does employment and compensation practices in IT affect vulnerability of corporate systems?

Light Beer

Game apps are especially an issue for kids when they download updates...still get through some security software.

Light Beer

Exploit as a service

Light Sabre

@owner71552 ... ironic isn't it...only one computer.

Lightning

and that's only half of the world.....what will networks look like 20 years from now? 

Lightning

Good to see you here @sawad !

Blogger

all it takes is one big computer to wrech havok on our systems

Light Beer

I use outlook and I still get many phisihng atempts and attempts to get me to open files. The issue is still rampant unfortunately. Even my mobile devices sometimes get attempted attacks with good software protection software....

Light Beer

Kanata Ottawa

Light Beer

Wow 4.1 Billion Internet users!

Blogger

@larman sometimes the quality of your broadband connection can impact the audio

Lightning

Howdy 'n g'day

Light Beer

now is much better

Light Beer

Start thinking about what questions you want to ask Ray...coming up on time for our first listener question

Blogger

@John agreed!! If only the brain power were used for good.

Light Sabre

double sound and echo during presentation

Light Beer

When I see the skills deployed in hacks, it makes me wonder how there could be a skills-shortage in IT.

Light Beer

@Joe pretty much yes, but spelling and domain extensions differ. 

Light Sabre

@Michelle yes agreed. My kids schools regularly teach kids about cyber security now.

Lightning

@Michelle: There is, pretty much, isn't there?  ;)

Light Sabre

@Kelsey Ziser,   It will be really hot this afternoon here in San Antonio,

Light Beer

(In fact, modern ransomware is typically programmed to detect virtualized environments -- and refuse to install if it so detects that it is on a virtualized instance, lest it be quarantined and safely reverse engineered.)

Light Sabre

Teaching kids how to use search and avoiding this kind of attack is so important. Kids tend to think there is a website for everything they might want to learn about...

Light Sabre

@gnean: Great point.  Virtualization tools like sandboxes are terrific ways for protecting against ransomware and other malware.

Light Sabre

Macros are still a common vector? Surprising.

Light Sabre

Why can't the e-mail system (MS-Outlook) run these executables in a virtual machine (similar to the Java VM)? Better yet, the filtering system could disable the link.

Light Beer

audio is clear for me

 

Light Beer

Fun with exploit naming

Light Sabre

Kanata Ottawa Good noon, clear and nice

Light Beer

The audio is cutting out periodically

Light Beer

Greetings....hot and cloudy in Guayaquil, Ecuador...

Light Beer

No hacker here! Just warm sunshine in NJ

Light Beer

QUESTION FOR RAY: As a lot of our sessions here at UU have focused on IoT, what do you recommend/prefer/etc. in terms of threat-modeling techniques/threat-rating systems where IoT-enabling networks are concerned?

Light Sabre

Was rainy in Orlando, clearing up a bit. But, looks like it could rain later on.

Light Beer

@jay good one....ha!

Lightning

Good afternoon all!

Light Beer
We need defense in depth
Lightning

@pcorona bet it's hot in San Antonio!

Blogger

any hackers on the chat board??? we need your company today :)

 

Light Sabre

There are sooo many data breaches happening right.this.minute (probably).

Light Sabre

Warm in Sidney

Light Beer

(Volume is varying.)

Light Beer

Greetings all!

Light Sabre

Listening from San Antonio, TX.

 

Light Beer

Greetings All ... from lin in The O.C.

Light Beer

Cloudy in Cincy

Light Beer

On slide 5, it says no system is invulnerable. For enough money, I think you could get near-invulnerability.

Light Beer

Me too, @dgreenhill!

Blogger

The portcullis on the second slide looks ominous.

Light Beer

whew! glad there is no death by powerpoint!

Lightning

Hot and muggy in North Carolina too!

Blogger

Listening from Boston, as usual.

Light Sabre

@John probably, yes. ; )

Lightning

A beautiful day in Northern Virginia after big t-storms last night.

Light Beer
Good afternoon.
Light Beer

Jellico KY.  Hot and muggy

Light Beer

@TeleWRTRLiz: I'm out of beer. (Just as well.)

Light Beer

Dallas is hot and getting hotter!

 

Light Beer

greay day in Piscataway

 

Light Beer

Mt Pleasant MI

sunny and 81

Light Beer

Listening in from the Northwest Pacific (British Columbia, Canada) where it is 59F and sunny.

Light Beer

Tlalnepantla, Estado de México, warm

Light Sabre

milford, ct (80s)

Light Beer

Ottawa, Canada. Sunny :-)

Light Beer

beautiful day in Chicago!

Lightning

weather nice in NJ

 

 

 

Light Beer

Southern CA,  sunny and warm today

Light Beer

hello everybody

 

Light Beer

Test Question Answer: Poconos, Pennsylvania, overcast, threatening to rain.

Light Beer

Minneapolis,  Sunny and warm.

Light Beer

São Paulo, Brasil

Sunny, warm

Light Beer

Amsterdam, cloudy

 

Light Beer

@John it's....bring your own beer!

Lightning
Good afternoon.
Light Beer

joining from Bangalore! seems todays talk will unravel many a security hole :)

Light Sabre

Let's get started.

Light Beer

good to be here

Light Beer
hi. me too why light me likes the heavy stout
Light Beer

We're getting beer? (LOL)

Light Beer

Hello Everyone

 

Light Beer

@owner tagline depends on how often you comment

Blogger
Good afternoon.
Light Beer

Not sure why my tag line says light beer?

Light Beer

Wow! Forty-three pages!

Light Beer

Link is there!

Light Beer

Oh, Now i see it.  Its right above the commet box.

Light Beer

See - Presentation: Big Data...above the chat

Blogger

I do not see the link for the slides.

Light Beer

Good to see you on the chat @gaarmet and @owner!

Blogger

Good afternoon everybody, nice to e-be here again and ready to learn

Light Sabre

good to be here

Light Beer

Hey everyone! Go ahead and download the slides from the link under "Special Educational Materials."

Blogger

Good to see you here @larman!

Blogger

We can absolutely discuss preventative analysis, gneangodav8v .  You are 100% correct, prevention is much better than reaction.  

 

Light Beer

@Ashu in just a few minutes at 1pm!

Blogger

Great to be here with all of you!  I hope I learn lots today.

Light Beer
Are we ready to go live?
Lightning

Yes, Happy Friday

Light Beer

Happy Friday!

Light Beer

It looks like the analytics that will be discussed today is "what happened" and not what might happen. I think in the case of network security what is needed is predictive analytics. It is too late to find out that the network has been compromised.

Light Beer

@kelsey: turkey sandwich with mustard and a slice of pickle plus potato chips

 

Lightning

@gnean TGIF to you too!

Blogger

What are you having @TeleWRTRLiz? I had a veggie medley :)

Blogger

A happy Friday to to everyone.

Light Beer

Hi All! Just getting my lunch for the lunch & learn today. 

Lightning

Welcome, @Ray, we're looking forward to your presentation at 1pm!

Blogger

Hello all!!   Hope everyone is enjoying their Friday !  

 

Light Beer

Good afternoon!

Light Beer

Hi @Bryan, @dfperson and @mjackson! We'll be going live in just under 50 minutes!

Blogger

Slides downloaded. Looking forward to the presentation.

Light Beer

Hi @kurieal and @mng! Glad to see you'll be joining us this afternoon!

Blogger

Greetings and salutations all!

Light Beer

Good to see so many of you on the chat boards already! We'll get started in just a few hours...it's sure to be a great course with Ray, I'm looking forward to it!

Blogger

gonna be a good time

Light Beer

looking forward to this

Light Beer

Hello to all :) 

Light Beer

Great to be here!

Light Beer

Looking forward...

Light Beer

Hi @wendy and @owner! Glad you'll be tuning in tomorrow!

Blogger

looking forward to this

Light Beer

@gaarmet, @ashu, @bbobo, @mng, @georgia welcome, it's good to see you all on the chat! Looking forward to a great course tomorrow...start thinking about what questions you have for Ray. 

Blogger

Greetings and salutations all!

Light Beer

Hello everyone!

 

Light Beer

Big Data Analysis has a massive role to play in network Security and especially the Distributed Architecture Space now.

We are unable to measure& monitor the extent of the real level of Damage these attacks can affect our systems effectively enough!

Lightning

I´m sorry Kelsey with "s". I have learned a lot all the time and I´d like all of us could collaborate for the next gen network arising

Light Sabre

Hi! Kelcey, I am ready again for tomorrow´s class. Best greetings

Light Sabre

be there or be square.

Light Beer

I'm looking forward to tomorrow's session!

Light Sabre

Looking forward to hearing from Ray about how analytics can strengthen security measures.

Blogger


Featured Video
Upcoming Live Events
September 17-19, 2019, Dallas, Texas
October 1-2, 2019, New Orleans, Louisiana
October 10, 2019, New York, New York
October 22, 2019, Los Angeles, CA
November 5, 2019, London, England
November 7, 2019, London, UK
November 14, 2019, Maritim Hotel, Berlin
December 3-5, 2019, Vienna, Austria
December 3, 2019, New York, New York
March 16-18, 2020, Embassy Suites, Denver, Colorado
May 18-20, 2020, Irving Convention Center, Dallas, TX
All Upcoming Live Events