<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Andrew Hay</title>
	<atom:link href="https://www.andrewhay.ca/feed" rel="self" type="application/rss+xml"/>
	<link>https://www.andrewhay.ca</link>
	<description>security stuff</description>
	<lastBuildDate>Tue, 10 Dec 2024 17:40:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item>
		<title>Andrew Hay’s 2025 Cybersecurity Predictions</title>
		<link>https://www.andrewhay.ca/archives/3823</link>
					<comments>https://www.andrewhay.ca/archives/3823#respond</comments>
		
		<dc:creator><![CDATA[Andrew Hay]]></dc:creator>
		<pubDate>Tue, 10 Dec 2024 17:40:48 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.andrewhay.ca/?p=3823</guid>

					<description><![CDATA[As we approach 2025, the ever-evolving landscape of cybersecurity continues to challenge professionals and organizations alike. Based on observed trends and emerging technologies, here are my predictions for the coming year.]]></description>
										<content:encoded><![CDATA[<p>As we approach 2025, the ever-evolving landscape of cybersecurity continues to challenge professionals and organizations alike. Based on observed trends and emerging technologies, here are my predictions for the coming year.</p>
<h3><strong>AI-Powered Threats and Defenses</strong></h3>
<p>The ubiquity of artificial intelligence in cybersecurity is inevitable. In 2025, adversaries will use AI more effectively to bypass traditional defences. Expect sophisticated AI-based malware capable of learning and adapting in real-time. Conversely, defenders will increasingly rely on AI-driven solutions for threat detection, anomaly detection, and automated response systems. The race between offence and defence will be more about algorithmic sophistication than ever before.</p>
<h3><strong>Quantum Computing&#8217;s Shadow Looms</strong></h3>
<p>While practical quantum computers remain a few years away, 2025 will bring heightened anxiety about &#8220;quantum supremacy&#8221; breaking current encryption standards. Preparations for a post-quantum cryptography era will accelerate, with enterprises prioritizing migrating to quantum-resistant algorithms to safeguard sensitive data.</p>
<h3><strong>Ransomware Reaches New Heights</strong></h3>
<p>Ransomware operators will target critical infrastructure, healthcare, and small-to-medium businesses at an unprecedented scale. As payments via cryptocurrencies grow harder to track due to improved privacy tools, law enforcement agencies will face mounting challenges in pursuing perpetrators. Collaborative global efforts to dismantle ransomware syndicates and the complexity of attacks will increase.</p>
<h3><strong>Zero Trust Goes Mainstream</strong></h3>
<p>The mantra &#8220;trust no one, verify everything&#8221; will dominate organizational strategies in 2025. Zero-trust architecture will evolve beyond network security to encompass cloud workloads, supply chains, and even individual devices. Expect vendors to release more integrated solutions to streamline Zero-trust adoption, responding to a market hungry for robust, easy-to-deploy frameworks.</p>
<h3><strong>5G and IoT as Vulnerability Catalysts</strong></h3>
<p>The proliferation of 5G will dramatically increase the number of connected devices, leading to a new wave of vulnerabilities. In 2025, securing IoT ecosystems will be a top priority, as poorly designed IoT devices become an attractive attack vector for botnets and espionage campaigns. Regulatory bodies will push for stricter IoT security standards globally.</p>
<h3><strong>Human-Centric Cybersecurity</strong></h3>
<p>Recognizing that humans remain the weakest link in cybersecurity, 2025 will see renewed user education and awareness efforts. Organizations will invest in personalized training programs using gamification and AI-driven risk assessments to reinforce secure behaviours. At the same time, social engineering attacks will grow more nuanced, targeting emotional and psychological vulnerabilities.</p>
<h3><strong>Privacy Wars Intensify</strong></h3>
<p>With more countries introducing stringent data privacy regulations akin to GDPR, multinational organizations will grapple with compliance complexity. Emerging technologies such as privacy-preserving computation and decentralized identity systems will gain traction, promising to reconcile security and privacy in innovative ways.</p>
<h3><strong>Cybersecurity as a Boardroom Priority</strong></h3>
<p>In 2025, cybersecurity will no longer be just an IT issue; it will firmly hold its place in boardroom discussions. Expect increased budgets for cybersecurity initiatives, more frequent simulations of cyber incidents at the C-suite level, and greater accountability for breaches as boards recognize the direct impact on brand reputation and regulatory compliance.</p>
<h3><strong>Evolving Threat Landscapes</strong></h3>
<p>The motives behind cyber incidents will diversify further, from politically motivated cyberattacks to financially driven exploits. Nation-states will continue to leverage cyber tools for geopolitical influence, while hacktivists will focus on disrupting industries that fail to address pressing social issues like climate change and inequality.</p>
<h3><strong>Collaborative Security Ecosystems</strong></h3>
<p>Finally, 2025 will be the year of shared responsibility. Organizations will lean heavily on collective intelligence, shared threat databases, and industry-specific partnerships to bolster defences. Cybersecurity will become a cooperative endeavour, transcending organizational and national boundaries.</p>
<p><strong>Closing Thoughts</strong></p>
<p>2025 promises to be a year of transformation in cybersecurity, marked by rapid technological advancements and the growing sophistication of cyber threats. Staying ahead will require adaptability, collaboration, and an unyielding commitment to innovation. As always, the best defence is a well-informed community—stay vigilant and stay prepared.</p>
<p>I’d love to hear your thoughts and predictions—what challenges or innovations do you anticipate in 2025? Let’s discuss it!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.andrewhay.ca/archives/3823/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Jupyter Notebook for crt.sh Queries</title>
		<link>https://www.andrewhay.ca/archives/3812</link>
					<comments>https://www.andrewhay.ca/archives/3812#respond</comments>
		
		<dc:creator><![CDATA[Andrew Hay]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 01:21:37 +0000</pubDate>
				<category><![CDATA[Security Research]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[andrew hay]]></category>
		<category><![CDATA[crt.sh]]></category>
		<category><![CDATA[CrtShcrape]]></category>
		<category><![CDATA[github]]></category>
		<category><![CDATA[osint]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tool]]></category>
		<guid isPermaLink="false">https://www.andrewhay.ca/?p=3812</guid>

					<description><![CDATA[I created a Jupyter Notebook to query the crt.sh website, dump the results into a pandas data frame, and then printing out the unique list of results to the screen for OSINT investigations.]]></description>
										<content:encoded><![CDATA[<p>Hey All,</p>
<p>Long time no blog. During a recent OSINT investigation, I found that I needed to pull all domains found from my query on <a href="https://crt.sh/">crt.sh</a>. The problem I had, however, was that the results weren&#8217;t all that usable without a lot of copying, pasting, and cleaning.</p>
<p>To address this problem, and to save time in the future, I created a <a href="https://github.com/andrewsmhay/CrtShcrape/blob/main/CrtShcrape.ipynb">Jupyter Notebook</a> to programmatically query the crt.sh website, dump the results into a <a href="https://pandas.pydata.org/">pandas</a> data frame (<em>thinking that I&#8217;ll want to further enrich the data at a later date</em>), and then printing out the unique list of results to the screen.</p>
<p>The code is written in <a href="https://www.python.org/download/releases/3.0/">Python 3</a>, and relies on <a href="https://pypi.org/project/beautifulsoup4/">BeautifulSoup4</a>, <a href="https://pandas.pydata.org/">Pandas</a>, and <a href="https://numpy.org/">NumPy</a>.</p>
<p>I&#8217;m calling it <a href="https://github.com/andrewsmhay/CrtShcrape/blob/main/CrtShcrape.ipynb">CrtShcrape</a> (pronounced <em>cert-shcrape</em>) and you can download it from my GitHub here: <a href="https://github.com/andrewsmhay/CrtShcrape">https://github.com/andrewsmhay/CrtShcrape</a>.</p>
<p>Hopefully, you can get some use from it. Until next time!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.andrewhay.ca/archives/3812/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tornados, Necessity, and the Evolution of Mitigating Controls</title>
		<link>https://www.andrewhay.ca/archives/3775</link>
					<comments>https://www.andrewhay.ca/archives/3775#respond</comments>
		
		<dc:creator><![CDATA[Andrew Hay]]></dc:creator>
		<pubDate>Mon, 02 Dec 2019 13:57:26 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[controls]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[mitigating controls]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.andrewhay.ca/?p=3775</guid>

					<description><![CDATA[According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes into contact with the ground. Tornado intensity is measured by the enhanced Fujita (EF) scale from 0 through 5, based on the amount [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes into contact with the ground. Tornado intensity is measured by the enhanced Fujita (EF) scale from 0 through 5, based on the amount and type of wind damage to a wide variety of structures ranging from trees to shopping malls.</p>



<p>The United States experiences more tornadoes than any other country in the world, especially in those states East of the Rocky Mountains. As a child, I always found myself wondering why people didn’t just move if they knew they were at risk of getting hit by a tornado. Of course, at the time, I had no sense of money, career, or family obligation to know that some people didn’t have the means to relocate. Without having a way to escape the danger, these people had to adapt their lifestyles to account for the unpredictable, and potentially devastating, weather.</p>



<p>This data alone makes me reconsider moving to an area constantly stricken by tornadoes.</p>



<ul class="wp-block-list">
<li>In an average year, about 1,000 tornadoes are reported across the United States, according to NOAA.</li>
<li>The 2017 total was the highest since 2011, when there were 1,691 tornadoes, including two spring events that resulted in more than USD 14 billion in losses when they occurred.<a href="#_ftn1">[1]</a></li>
<li>According to NOAA, there were 10 direct fatalities from tornadoes in 2018, compared with 35 in 2017.</li>
<li>The most &#8220;extreme&#8221; tornado in recorded history (an F5) was the Tri-State Tornado, which spread through parts of Missouri, Illinois and Indiana on 18 March 1925.<a href="#_ftn2">[2]</a></li>
<li>The deadliest tornado in world history was the <a href="https://en.wikipedia.org/wiki/Daulatpur%E2%80%93Saturia_tornado">Daulatpur–Saturia tornado in Bangladesh</a> on 26 April 1989, which killed approximately 1,300 people and left more than 80,000 people homeless.<a href="#_ftn3">[3]</a></li>
<li>The most extensive tornado outbreak on record, the 2011 Super Outbreak, resulted in 360 tornadoes, 324 tornadic fatalities and cost upwards of USD 11 billion in damages.</li>
<li>Cordell, KS was hit by tornadoes three years in a row, on the same day, May 20th, disproving the myth that a tornado only strikes the same place once.</li>
</ul>



<p>Yet, there are people who want to help us better understand tornados, so that we can better prepare for them. In 1887, the first book on tornadoes was written by <a href="https://en.wikipedia.org/wiki/John_Park_Finley">John Park Finley</a>, a US Army Signal Service officer and pioneer in the field of tornado research. Finley’s book introduced the concept of a “tornado cave” that instructed readers to “get into it with your family and your treasures before the storm reaches you.” Furthermore, the book showed readers the plans for building their own “<a href="https://books.google.com/books?id=ZigzAQAAMAAJ&amp;dq=inauthor%3A%22John%20Park%20Finley%22&amp;pg=PA51#v=onepage&amp;q&amp;f=false">prize tornado cave</a>” throughout several pages. The instructions included <a href="https://books.google.com/books?id=ZigzAQAAMAAJ&amp;dq=inauthor%3A%22John%20Park%20Finley%22&amp;pg=PA52#v=onepage&amp;q&amp;f=false">detailed</a> <a href="https://books.google.com/books?id=ZigzAQAAMAAJ&amp;dq=inauthor%3A%22John%20Park%20Finley%22&amp;pg=PA54#v=onepage&amp;q&amp;f=false">architectural</a> <a href="https://books.google.com/books?id=ZigzAQAAMAAJ&amp;dq=inauthor%3A%22John%20Park%20Finley%22&amp;pg=PA56#v=onepage&amp;q&amp;f=false">diagrams</a> and even <a href="https://books.google.com/books?id=ZigzAQAAMAAJ&amp;dq=inauthor%3A%22John%20Park%20Finley%22&amp;pg=PA61#v=onepage&amp;q&amp;f=false">cost breakdowns for labor and materials</a> &#8211; <em>roughly USD 300 dollars, in case you were wondering</em>.</p>
<p>While it was a revolutionary book containing many breakthrough ideas, it contained a few ideas which have since been proven false. One <a href="https://books.google.com/books?id=ZigzAQAAMAAJ&amp;dq=inauthor%3A%22John%20Park%20Finley%22&amp;pg=PA44#v=onepage&amp;q&amp;f=false">example</a> that Finley wrote, “a tornado travels from southwest to northeast,” and, “if it is going to the right of you, run to the left” and vice versa. Based on his research at the time, this may have been accurate. Further research shows that tornadoes do not always travel from southwest to northeast.</p>
<p>While Finley was in the middle of his tornado research, the U.S. Army Signal Service banned the word “tornado” because they were concerned that word would cause panic. So, for more than half of a century, the weather reports ignored the word “tornado” and used the euphemisms &#8211; <em>more on that later</em>. <a href="https://www.metafilter.com/99904/John-Finley-19th-century-tornado-researcher">One of Finley&#8217;s supporters</a>, Edward S. Holden, tried to implement a tornado warning system using telegraph poles. But it was overshadowed by a report by Henry A. Hazen, a civilian employee of the corps, who deemed that because tornadoes were &#8220;exceedingly rare&#8221; and very localized, it was impossible to pinpoint forecasts.</p>
<p>From 1887 up until 1950, American weathermen were <a href="https://www.thevintagenews.com/2016/02/22/up-until-1940s-american-weathermen-were-forbidden-to-use-the-word-tornado-in-the-weather-forecast-2/">strictly forbidden</a> to use the word “tornado” in the weather report. Back then, when science was still struggling to find a proper scientific explanation, they were considered a dark and mysterious force. In addition to upholding the &#8220;tornado&#8221; ban for decades, the Weather Bureau (which assumed jurisdiction from the Signal Corps in 1890) remained skeptical of the value and accuracy of tornado forecasts. It took until 1943 for experimental warning systems to be implemented; a public outcry in 1952 (after a severe outbreak that killed over 200 people) finally helped form the U.S. tornado research and forecasts.</p>
<p>Over the years, the <a href="https://en.wikipedia.org/wiki/Storm_cellar">storm cellar</a> became the standard underground bunker design to protect the occupants from violent severe weather, such as tornadoes. The average storm cellar for a single-family was built close enough to the home to allow instant access in an emergency, but not so close that the house could tumble on the door during a storm, trapping the occupants inside. This was also the reason the main door on most storm cellars were mounted at an angle rather than perpendicular with the ground. An angled door allowed for debris to blow up and over the door, or sand to slide off, without blocking it, and the angle also reduced the force necessary to open the door if rubble had piled up on top.</p>
<p>In 1950, Congress simultaneously launched a system of nuclear bomb shelters and disaster relief for victims of natural disasters. It was then that the families living in tornado alley realized that these bomb shelters could serve a double purpose.</p>
<p>Research into improving buildings for resisting extreme winds began with the 1970 tornado in Lubbock, Texas. Twenty-six people were killed and about 1/3 of the city of 160,000 people was heavily damaged or destroyed. Texas Tech researchers <a href="https://www.youtube.com/watch?v=lU5TuCdM-fU">produced a comprehensive documentary</a> of building damage, the first of its kind. The concept of the above-ground storm shelter was presented in Civil Engineering magazine in 1974 by Texas Tech faculty member Dr. Ernst Kiesling and by Graduate Student David Goolsby. Intermittent development continued as available personnel and funding permitted.</p>
<p>As time passed, people started to ease up on their worry of being bombed, but the threat of tornadoes remained as common as the changing seasons. Since then, storm cellars or storm shelters have become a necessary part of life in many parts of the United States, and most people who do not own one are in search of one to go to during tornado season.</p>
<p>The total devastation of a small subdivision outside of Jarrell, TX in 1997 received national attention and news coverage, as did the widespread devastation of the Oklahoma City area on 3 May 1999. Many regional and local television companies and newspapers subsequently featured the above-ground storm shelter concept after severe storms struck this area.</p>
<p>Personnel of the Federal Emergency Management Agency (FEMA) observed the high level of interest in storm shelters among the public and published a prescriptive design booklet entitled, <a href="https://www.fema.gov/fema-p-320-taking-shelter-storm-building-safe-room-your-home-or-small-business">Taking Shelter from the Storm</a>. The first edition was published in October 1998, the Second Edition in August 1999. After the events in Oklahoma City, FEMA and the state of Oklahoma put in place incentives for building storm shelters in houses that were being built or rebuilt after the tornado.</p>
<p>It wasn’t until June 2008 that a standard for the design and construction of storm shelters was approved.</p>
<p>In facing a life-threatening issue, we humans researched the problem, assessed the risk, and created mitigating controls to make the dangers of living in a tornado-rich environment tolerable. As time progressed, our ideas for mitigating controls spread to the masses and required additional research, guidance and eventually certification and accreditation to ensure the safety of its users.</p>
<p>Be safe out there and remember the <a href="https://www.youtube.com/watch?v=RQD7Fzid1xI">words of comedian Ron White</a>: “It’s not <em>that</em> the wind is blowing. It’s <em>what</em> the wind is blowing.”</p>


<hr class="wp-block-separator" />


<p><a href="#_ftnref1">[1]</a> https://www.iii.org/fact-statistic/facts-statistics-tornadoes-and-thunderstorms</p>



<p><a href="#_ftnref2">[2]</a> https://en.wikipedia.org/wiki/Tri-State_Tornado</p>



<p><a href="#_ftnref3">[3]</a> https://en.wikipedia.org/wiki/Daulatpur%E2%80%93Saturia_tornado</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.andrewhay.ca/archives/3775/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Do You Suffer From Breach Optimism Bias?</title>
		<link>https://www.andrewhay.ca/archives/3705</link>
					<comments>https://www.andrewhay.ca/archives/3705#respond</comments>
		
		<dc:creator><![CDATA[Andrew Hay]]></dc:creator>
		<pubDate>Thu, 27 Sep 2018 14:36:31 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[optimism]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.andrewhay.ca/?p=3705</guid>

					<description><![CDATA[Optimism bias is the belief that each of us is more likely to experience good outcomes and less likely to experience bad outcomes. How prevalent is this in the cybersecurity industry? If you're a salty security professional like me, you already know the answer.]]></description>
										<content:encoded><![CDATA[<p>If you&#8217;ve been in the information security field for at least a year, you&#8217;ve undoubtedly heard your organization defend the lack of investment in, change to or optimization of a cybersecurity policy, mitigating control or organizational belief. This &#8220;It hasn&#8217;t happened to us so it likely won&#8217;t happen&#8221; mentality is called optimism bias, and it&#8217;s an issue in our field that predates the field itself.</p>
<p><a href="https://www.forbes.com/sites/andrewhayeurope/2018/09/27/do-you-suffer-from-breach-optimism-bias/#31f734786669">Read my full article over at Forbes.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.andrewhay.ca/archives/3705/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Insurance Occurrence Assurance?</title>
		<link>https://www.andrewhay.ca/archives/3698</link>
					<comments>https://www.andrewhay.ca/archives/3698#respond</comments>
		
		<dc:creator><![CDATA[Andrew Hay]]></dc:creator>
		<pubDate>Thu, 26 Jul 2018 16:07:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[ciso]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security program]]></category>
		<guid isPermaLink="false">https://www.andrewhay.ca/?p=3698</guid>

					<description><![CDATA[The best way to maintain a defensible security posture is to have an information security program that is current, robust, and measurable. An effective information security program will provide far more protection for the operational state of your organization than cyber security insurance alone. To put it another way, insurance is a <i>reactive</i> measure whereas an effective security program is a <i>proactive</i> measure.]]></description>
										<content:encoded><![CDATA[<p>You may have seen <a href="https://krebsonsecurity.com/2018/07/hackers-breached-virginia-bank-twice-in-eight-months-stole-2-4m/">my friend Brian Krebs’ post</a> regarding the lawsuit filed last month in the Western District of Virginia after $2.4 million was stolen from <a href="https://nbbank.com/">The National Bank of Blacksburg</a> from two separate breaches over an eight-month period. Though the breaches are concerning, the real story is that the financial institution suing its insurance provider for refusing to fully cover the losses.</p>
<p>From the article:</p>
<blockquote><p>In <a href="https://krebsonsecurity.com/wp-content/uploads/2018/07/1-main.pdf">its lawsuit</a> (PDF), National Bank says it had an insurance policy with <a href="https://www.everestre.com/">Everest National Insurance Company</a> for two types of coverage or “riders” to protect it against cybercrime losses. The first was a “computer and electronic crime” (C&amp;E) rider that had a single loss limit liability of $8 million, with a $125,000 deductible.</p>
<div>
<p>The second was a “debit card rider” which provided coverage for losses which result directly from the use of lost, stolen or altered debit cards or counterfeit cards. That policy has a single loss limit of liability of $50,000, with a $25,000 deductible and an aggregate limit of $250,000.</p>
<p>According to the lawsuit, in June 2018 Everest determined both the 2016 and 2017 breaches were covered exclusively by the debit card rider, and not the $8 million C&amp;E rider. The insurance company said the bank could not recover lost funds under the C&amp;E rider because of two “exclusions” in that rider which spell out circumstances under which the insurer will not provide reimbursement.</p>
</div>
</blockquote>
<p>Cyber security insurance is still in its infancy and issues with claims that could potentially span multiple policies and riders will continue to happen &#8211; think of the stories of health insurance claims being denied for pre-existing conditions and other loopholes. This, unfortunately, is the nature of insurance. Legal precedent, litigation, and insurance claim issues aside, your organization needs to understand that cyber security insurance is but one tool to reduce the financial impact on your organization when faced with a breach.</p>
<p><strong>Cyber security insurance cannot and should not, however, be viewed as your primary means of defending against an attack.</strong></p>
<p>The best way to maintain a defensible security posture is to have an information security program that is current, robust, and measurable. An effective information security program will provide far more protection for the operational state of your organization than cyber security insurance alone. To put it another way, insurance is a <i>reactive</i> measure whereas an effective security program is a <i>proactive</i> measure.</p>
<p>If you were in a fight, would you want to wait and see what happens after a punch is thrown to the bridge of your nose? Perhaps you would like to train to dodge or block that punch instead? Something to think about.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.andrewhay.ca/archives/3698/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Free SANS Webinar: I Before R Except After IOC</title>
		<link>https://www.andrewhay.ca/archives/3694</link>
					<comments>https://www.andrewhay.ca/archives/3694#respond</comments>
		
		<dc:creator><![CDATA[Andrew Hay]]></dc:creator>
		<pubDate>Tue, 24 Jul 2018 15:01:48 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.andrewhay.ca/?p=3694</guid>

					<description><![CDATA[Join Andrew Hay on Wednesday, July 25th, 2018 at 10:30 AM EDT (14:30:00 UTC) for an exciting free SANS Institute Webinar entitled “I” Before “R” Except After IOC. Using actual investigations and research, this session will help attendees better understand the true value of an individual IOC, how to quantify and utilize your collected indicators, and what constitutes an actual incident.]]></description>
										<content:encoded><![CDATA[<p>Join Andrew Hay on Wednesday, July 25th, 2018 at 10:30 AM EDT (14:30:00 UTC) for an exciting free <a href="https://www.sans.org/" target="_blank" rel="noopener">SANS Institute</a> Webinar entitled <a href="https://www.sans.org/webcasts/ioc-108100" target="_blank" rel="noopener">“I” Before “R” Except After IOC</a>. Using actual investigations and research, this session will help attendees better understand the true value of an individual IOC, how to quantify and utilize your collected indicators, and what constitutes an actual incident.</p>
<p><strong>Overview</strong><br />
Just because the security industry touts indicators of compromise (IOCs) as much needed intelligence in the war on attackers, the fact is that not every IOC is valuable enough to trigger an incident response (IR) activity. All too often our provided indicators contain information of varying quality including expired attribution, dubious origin, and incomplete details. So how many IOCs are needed before you can confidently declare an incident? After this session, the attendee will:</p>
<ul class="leo">
<li>Know how to quickly determine the value of an IOC,</li>
<li>Understand when more information is needed (and from what source), and</li>
<li>Make intelligent decisions on whether or not an incident should be declared.</li>
</ul>
<p>Register to attend the webinar here: <a href="https://www.sans.org/webcasts/108100" target="_blank" rel="noopener">https://www.sans.org/webcasts/108100</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.andrewhay.ca/archives/3694/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Interviewed on RSAC TV</title>
		<link>https://www.andrewhay.ca/archives/3357</link>
					<comments>https://www.andrewhay.ca/archives/3357#respond</comments>
		
		<dc:creator><![CDATA[Andrew Hay]]></dc:creator>
		<pubDate>Mon, 30 Apr 2018 22:40:06 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://www.andrewhay.ca/?p=3357</guid>

					<description><![CDATA[I had the pleasure of being interviewed by Eleanor Dallaway, Editor and Publisher – Infosecurity Magazine, on RSA Conference Television (RSAC TV) last week at the annual RSA Security Conference. In the interview, we spoke of what I had observed on the show floor, the state of the security industry, and I describe my perfect customer in [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I had the pleasure of being interviewed by Eleanor Dallaway, Editor and Publisher – Infosecurity Magazine, on RSA Conference Television (RSAC TV) last week at the annual RSA Security Conference.</p>
<p><iframe src="https://www.youtube.com/embed/J6bmUV01_6Q" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p>In the interview, we spoke of what I had observed on the show floor, the state of the security industry, and I describe my perfect customer in information security.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.andrewhay.ca/archives/3357/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security Beyond The Perimeter</title>
		<link>https://www.andrewhay.ca/archives/3351</link>
					<comments>https://www.andrewhay.ca/archives/3351#respond</comments>
		
		<dc:creator><![CDATA[Andrew Hay]]></dc:creator>
		<pubDate>Wed, 10 Jan 2018 16:21:50 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://www.andrewhay.ca/?p=3351</guid>

					<description><![CDATA[Whether we like it or not, the way we architect, utilize, and secure the networks and systems under our control has changed. When servers were safely tucked away behind corporate firewalls and perimeter-deployed intrusion prevention controls, organizations became complacent and dependent on their host security. Unfortunately, inadequately architected security controls that rely solely on broad [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Whether we like it or not, the way we architect, utilize, and secure the networks and systems under our control has changed. When servers were safely tucked away behind corporate firewalls and perimeter-deployed intrusion prevention controls, organizations became complacent and dependent on their host security. Unfortunately, inadequately architected security controls that rely solely on broad network-based protection can make the migration of an organization’s systems to private, public, and hybrid cloud hosting even more exposed to attackers than they were before.</p>
<p>Everyone has heard the “defense in depth” analogy relating security to a medieval castle with controlled access to different locations of the castle and a defensive moat around the perimeter. This “hard outside” and “soft inside” model was designed to make it as difficult as possible to get past the perimeter. However, once inside the walls, the trusted individual had elevated access to resources within the network.</p>
<p>Unsurprisingly, the medieval defense analogy has lost much of its relevance in a world where systems and users move effortlessly from within the confines of a walled corporation, to a local coffee shop, and perhaps even to a different country as part of normal business operations.</p>
<p>Securing the next generation of hosting platforms requires a new approach that not every organization is ready for. Some industry analyst firms promote the idea of a “cloud first strategy” for all technology deployments. Though not a bad idea, per se, this doesn’t mean that forklifting your entire architecture into cloud or containerized environments should be your number one priority – especially if you’re being forced to choose between a new architecture and the traditional security controls that you depend upon.</p>
<p>Thankfully, technology has evolved to allow for more seamless security in environments that need to span traditional datacenters, virtualization, and cloud environments. This has allowed organizations to grow their capabilities without the need to choose between having security and having new technology stacks.</p>
<p>So how do we, as security professionals and business owners, decide what mitigating controls should be deployed to future-proof our security? It’s actually much easier than it sounds. To learn more about how to perform security beyond the perimeter please read my full post on <a href="https://www.juniper.net/us/en/dm/security-beyond-the-perimeter/">https://www.juniper.net/us/en/dm/security-beyond-the-perimeter/</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.andrewhay.ca/archives/3351/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Hay CFP Management Method – Part 2</title>
		<link>https://www.andrewhay.ca/archives/3332</link>
					<comments>https://www.andrewhay.ca/archives/3332#comments</comments>
		
		<dc:creator><![CDATA[Andrew Hay]]></dc:creator>
		<pubDate>Mon, 20 Nov 2017 21:14:40 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">http://www.andrewhay.ca/?p=3332</guid>

					<description><![CDATA[I’ve had a lot of positive feedback from my first post which explained how to create the Trello board to track your Call For Paper (CFP) due dates, submissions, and results. In this post, I’ll explain how to create the cards and populate them with the required data to better manage your CFP pipeline. To start your first [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I’ve had a lot of positive feedback from my <a href="http://leocybersecurity.com/hay-cfp-management-method/">first post</a> which explained how to create the Trello board to track your Call For Paper (CFP) due dates, submissions, and results. In this post, I’ll explain how to create the cards and populate them with the required data to better manage your CFP pipeline.</p>
<p>To start your first card click the &#8216;Add a card…’ link in the CFP Open <a href="https://en.wikipedia.org/wiki/Swim_lane">swim lane</a>.<br />
<a href="http://leocybersecurity.com/wp-content/uploads/2017/11/fig1.png"><img fetchpriority="high" decoding="async" class="aligncenter size-large wp-image-1845" src="http://leocybersecurity.com/wp-content/uploads/2017/11/fig1-1024x477.png" alt="" width="474" height="221" /></a></p>
<p>Type in the name of the conference and select the ‘Add’ button.<br />
<a href="http://leocybersecurity.com/wp-content/uploads/2017/11/fig2.png"><img decoding="async" class="aligncenter size-large wp-image-1846" src="http://leocybersecurity.com/wp-content/uploads/2017/11/fig2-1024x466.png" alt="" width="474" height="216" /></a></p>
<p>Once the card is added, click the pencil icon to add more context.<br />
<a href="http://leocybersecurity.com/wp-content/uploads/2017/11/fig3.png"><img decoding="async" class="aligncenter size-large wp-image-1847" src="http://leocybersecurity.com/wp-content/uploads/2017/11/fig3-1024x581.png" alt="" width="474" height="269" /></a></p>
<p>Within the card, place the location of the conference in the ‘Add a more detailed subscription…’ section and select the Save button. Note: I strongly advise that you follow a consistent location naming (e.g. Houston, TX or Houston, TX, USA) to make visualizing the data easier later on.</p>
<div><a href="http://leocybersecurity.com/wp-content/uploads/2017/11/fig4.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1848" src="http://leocybersecurity.com/wp-content/uploads/2017/11/fig4-1024x766.png" alt="" width="474" height="355" /></a></p>
<p>Now we have to add the CFP due date. Select the ‘Due Date’ button.<br />
<a href="http://leocybersecurity.com/wp-content/uploads/2017/11/fig5.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1849" src="http://leocybersecurity.com/wp-content/uploads/2017/11/fig5-1024x767.png" alt="" width="474" height="355" /></a></p>
<p><a href="http://leocybersecurity.com/wp-content/uploads/2017/11/fig6.png"><img loading="lazy" decoding="async" class="size-medium wp-image-1851 alignleft" src="http://leocybersecurity.com/wp-content/uploads/2017/11/fig6-239x300.png" alt="" width="239" height="300" /></a> When I input the CFP due date, I often use the date prior to the published due date ( I also set the time to 11:59pm) as a way to ensure I don’t leave the submission to the absolute last minute.</p>
<p>After the date is selected I fill the card with more CFP-specific information that I find from the event website, Twitter, or a third-party CFP site. I also pate the URL for the CFP submission form into the card so that I don’t have to hunt for it later (it automatically saves it as an attachment). If other information, such as important dates, conference details, or comments about the event are available I often add those in the ‘Add Comment’ section. Just make sure to his the ‘Save’ button or the data won’t be added to the card.<br />
<img loading="lazy" decoding="async" class="size-large wp-image-1852 aligncenter" src="http://leocybersecurity.com/wp-content/uploads/2017/11/Fig7-1024x973.png" alt="" width="474" height="450" /></p>
<p>Optionally, you can leverage the ‘Labels’ button to assign color coded tags to denote different things. For example, I’ve used these to denote the audience type, the continent, country, state/province where the event is located, and whether or not travel and expenses (T&amp;E) are covered. These are really just informational to help you prioritize events.</p>
<p>Click the ‘X’ at the top right hand side of the card or click somewhere else on the board to close the card.<br />
<a href="http://leocybersecurity.com/wp-content/uploads/2017/11/fig8.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1853" src="http://leocybersecurity.com/wp-content/uploads/2017/11/fig8-1024x477.png" alt="" width="474" height="221" /></a></p>
<p>You now have your first conference CFP card that can be moved through the board calendar pipeline &#8211; something that I’ll discuss in my next blog post.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.andrewhay.ca/archives/3332/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>The Hay CFP Management Method</title>
		<link>https://www.andrewhay.ca/archives/3325</link>
		
		<dc:creator><![CDATA[Andrew Hay]]></dc:creator>
		<pubDate>Mon, 25 Sep 2017 12:27:47 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security Research]]></category>
		<guid isPermaLink="false">http://leocybersecurity.com/?p=1681</guid>

					<description><![CDATA[People often ask me how I manage the vast number of abstracts and security call for papers (CFPs) submissions. So I thought I&#8217;d create a blog post to explain my process. For lack &#8230; <a href="http://leocybersecurity.com/hay-cfp-management-method/">Continue reading <span>The Hay CFP Management Method</span> <span>&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="http://leocybersecurity.com/hay-cfp-management-method/">The Hay CFP Management Method</a> appeared first on <a rel="nofollow" href="http://leocybersecurity.com/">LEO Cyber Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>By Andrew Hay, Co-Founder and CTO, LEO Cyber Security.</p>
<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-1683" src="http://leocybersecurity.com/wp-content/uploads/2017/09/IMG_20160413_180330-225x300.jpg" alt="" width="225" height="300" />I speak at a lot of conferences around the world. As a result, people often ask me how I manage the vast number of abstracts and security call for papers (CFPs) submissions. So I thought I’d create a blog post to explain my process. For lack of a better name, let’s call it the Hay CFP Management Method. It should be noted that this method could be applied to any number of things from blog posts to white papers and scholastic articles to news stories. I have successfully proven this methodology for both myself and my teams at <a href="https://opendns.com/">OpenDNS</a>, DataGravity, and <a href="https://leocybersecurity.com/">LEO Cyber Security</a>. Staying organized helped manage the deluge of events, submitted talks, and important due dates in addition to helping me keep track of where in the world my team was and what they were talking about.</p>
<p>I, like most people, started managing abstracts and submissions by relying on email searches and documents (both local and on Google Drive, Dropbox, etc.). Unfortunately, I didn’t find this scaled very well as I kept losing track of submitted vs. accepted/rejected talks and their corresponding dates. It certainly didn’t scale when it was applied to an entire team as opposed to a single individual.</p>
<p>Enter <a href="https://trello.com/">Trello</a>, a popular (and freemium) web-based project management application that utilizes the <a href="https://en.wikipedia.org/wiki/Kanban_(development)">Kanban</a> methodology for organizing projects (boards), lists (task lists), and tasks (cards). In late September I start by creating a board for the upcoming year (let’s call this board the <em>2018 Conference CFP Calendar</em>) and, if not already created, a board to track my abstracts in their development lifecycle (let’s call this board <em>Talk Abstracts</em>).</p>
<p>Within the Talk Abstracts board, I create several lists to act as swim lanes for my conference abstracts and other useful information. These lists are:</p>
<p>* <strong>Development:</strong> These are talks that are actively being developed and are not yet ready for prime time.<br />
* <strong>Completed:</strong> These are talks that have finished development and are ready to be delivered at an upcoming event.<br />
* <strong>Delivered:</strong> These are talks that have been delivered at least once.<br />
* <strong>Misc:</strong> This list is where I keep my frequently requested form information such as my short bio (less than 50 characters), long bio (less than 1,500 characters), business mailing address (instead of browsing to your corporate website every time), and CISSP number (because who can remember that?).<br />
* <strong>Retired:</strong> As a personal rule, I only use a particular talk for one calendar year. When I feel as though the talk is stale, boring, or stops being accepted, I move the card to this list. That’s not to say you can’t revive a talk or topic in the future as a “version 2.0”. This is why keeping the card around is valuable.</p>
<p>Within the 2018 Conference CFP Calendar board, I create several lists to act as swim lanes for my various CFPs. These lists are:</p>
<p>* <strong>CFP open:</strong> This is where I put all of the upcoming conference cards that I know about even if I do not yet know the exact details (such as location, CFP open/close, etc.).<br />
* <strong>CFP closes in &lt; 30 days:</strong> This is where I put the upcoming conference cards that have a confirmed closing date within the next 30 days. Note, it is very important to record details in the cards such as closing date, conference CFP mechanism (e.g. email vs. web form), and any related URLs for the event.<br />
* <strong>Submitted:</strong> These are the conferences that I have submitted to and the associated cards. Note, I always provide a link to the abstract I submitted as a way to remind myself what I’m talking about.<br />
* <strong>Accepted:</strong> These are the accepted talk cards. Note, I always put a copy of the email (or link to) acceptance notification to record any details that might be important down the road. I also make sure to change the date on the card to that of the speaking date and time slot to help keep me organized.<br />
* <strong>Attending but not presenting:</strong> This is really a generic catch-all for events that I need to be at but may not be speaking at (e.g. booth duty, attending training, etc.). The card and associated dates help keep my dance card organized.<br />
* <strong>Accepted but backed out:</strong> Sometimes life happens. This list contains cards of conference submissions that I had to back out of for one reason or another. I keep these cards in their own column to show me what was successfully accepted and might be a fit for next year in addition to the reason I had to back out (e.g. conflict, personal issue, alien abduction, etc.).<br />
* <strong>Completed:</strong> This list is for completed talk cards. Again, I keep these to reference for next year’s board as it provides some ballpark dates for when the CFP opens, closes, as well as the venue and conference date.<br />
* <strong>Rejected:</strong> They’re not all winners and not everybody gets every talk accepted. In my opinion, keeping track of your rejected talks is as (if not more) important as keeping track of your accepted talks. Not only does it allow you to see what didn’t work for that particular event, but it also allows you to record reviewer feedback on the submission and maybe submit a different style or type of abstract in the future.<br />
* <strong>Not doing 2018:</strong> This is the list where I put conference cards that I’ve missed the deadline on (hey, it happens), cannot submit to because of a conflict, or simply choose to not submit a talk to.</p>
<p>It should be noted that I keep the above lists in the same order every year to help minimize my development time against the Trello API for my visualization dashboard (which I will explain in a future blog post). This might sound like a lot of work but once you’ve set this board up you can reuse it every year. In fact, it’s much easier to copy last year’s board than starting fresh every year, as it brings the cards and details over. Then all you need to do is update the old cards with the new venue, dates, and URLs.</p>
<p>Now that we have our board structure created we need to start populating the lists with the cards – which I’ll explain in the next blog post. In addition to the card blog post, I’ll explain two other components of the process in subsequent posts. For reference, here are the upcoming blog posts that will build on this one:</p>
<p>* <strong>Individual cards and their structure</strong><br />
* <strong>Moving cards through the pipeline</strong><br />
* <strong>Visualizing your board (and why it helps)</strong></p>
<p>The post <a href="http://leocybersecurity.com/hay-cfp-management-method/" rel="nofollow">The Hay CFP Management Method</a> appeared first on <a href="http://leocybersecurity.com/" rel="nofollow">LEO Cyber Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>