You’re Not Leaving This House Until You Cover Up That LLM
Dec 12, 2023
auto_awesome
Richard Ford, CTO, Praetorian, joins the hosts to discuss topics including relying on heroes versus building scalable processes in cybersecurity, AI's influence on attack models and dark business models, the importance of transparency in security incidents, continuous assessment and fixing vulnerabilities, and the value of data in making informed cybersecurity decisions.
Building a security program that doesn't depend on heroism involves recognizing the problem, creating scalable processes, and distributing responsibilities.
Organizations need to understand the risks associated with new AI technologies and develop effective strategies for securing them.
Deep dives
Building a Security Program Without Reliance on Heroism
Relying on IT heroism in a security operations center is not a good practice. Process scalability is key to avoiding the need for heroics. Letting processes break can uncover systematic issues that need to be addressed. Building a security program that doesn't depend on heroism involves recognizing the problem, creating scalable processes, and distributing responsibilities. It's important to avoid a hero culture and focus on building a team that knows how to handle problems.
Addressing the Risks of Adopting AI Tools in Cybersecurity
Adopting AI tools in cybersecurity can introduce new risks and security pitfalls. AI technology is being used by bad actors to improve the speed, precision, and scale of their intrusions. As a result, AI security spending has increased, and there are concerns about AI models making breaches more likely. Organizations need to understand the risks associated with new technologies and develop effective strategies for securing them. The focus should be on understanding the attack models enabled by AI and addressing the second-order effects and potential new dark business models.
Offensive Cybersecurity: From Reactive to Proactive
Offensive cybersecurity, often referred to as red teaming, is more than just pointing out vulnerabilities. It should be a strategic approach that informs defensive design. Red teaming should be continuous and provide insights for improving defenses, not just a one-time assessment. Offensive cybersecurity should focus on adversarially informed design, ensuring that systems are built to counter adversary capabilities. By actively attacking and testing their own systems, organizations can strategically build better defenses and prioritize fixing vulnerabilities.
Making Sense of Overwhelming Cybersecurity Data
The abundance of cybersecurity data can be overwhelming for CISOs. It's important to filter out irrelevant information and focus on what really matters. Most of the data received is likely to validate what is already known, while a small percentage may present something novel that requires attention. To effectively make sense of the data, CISOs should prioritize the basics, ensure ongoing communication with experts and peers, have a deep understanding of their own environment, and focus on actionable insights that drive real security improvements.
Why do many CISOs think adopting new LLM-based tools will make breaches more likely?
Why the rush to throw money at them?
How do you go about building a security program that doesn't depend on individuals?
Thanks to our podcast sponsors, Praetorian
Praetorian helps companies adopt a prevention-first cybersecurity strategy by actively uncovering vulnerabilities and minimizing potential weaknesses before attackers can exploit them.
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode