Category Archives: Blog

Information warfare sneakers

Making Cyber Security Awareness Less Boring

October, as we all know, was celebrated as National Cyber Security Awareness Month. While it is good to emphasize the importance of security with a month dedicated to it, Security Awareness is an ongoing activity.

According to this survey, only 45% of the participants said their employer offers formal cybersecurity training. 

IMG SOURCE

Remember that our teams and employees need to be aware of security best practices all around the year and not just for a month. A hacker needs one successful chance while we need to be right 100 % of the time, 365 days a year.

Over years I have conducted numerous workshops and awareness sessions for employees as part of induction, periodic training, sent countless emails & presentations, and conducted phishing simulations. However, it is difficult to hold attention for longer periods and them to be aware of the threats all the time. I think that there is fatigue associated with the traditional way of sending presentations, forcing wallpapers, screensavers, and email blasts.

Most people usually relate to movies, books, songs and other visual content better than usual presentation slides. In addition to existing modes, you can plan to have movie streaming or a book reading activities as a monthly or quarterly event and integrate them with ongoing company events/town halls.

During the COVID days, one of our HR organised monthly book reading events on zoom and it was a big hit. We would pick a chapter and read and review it. It also brought lot of people together!

Screen a movie in your office cafeteria, give out some goodies and swags for those who turn up or throw in a simple pizza party. As an event organiser both at workplace and amongst societies I have found out that a secret to increase attendance to any event is food!

If someone asks you how screening movies is contributing to awareness, don’t worry, throw in a Security Quiz at the end of the movie. This would even suffice your audit requirements too. You can also talk about some cool software and hardware gadgets that can safeguard both professional and personal lives too from a cyber security perspective. Some are listed down in the article.

Here are some suggestions:

Movies:

Snowden

Snowden is a biographical thriller released in 2016 and based on the life and events surrounding Edward Snowden’s whistle blowing. Snowden is considered a hero by some, and a traitor by others. No matter what happened, the epic story of why he did it, what he risked, and how he pulled it off makes for one of the most compelling films. This movie provides great insights into the inner workings of surveillance programs at the Nation-State level and what it means to the privacy of the general public. While I hate to reference it, the movie also showcases the risks of insider threats. 

LINK: https://www.imdb.com/title/tt3774114

Sneakers:

If you are a pentester or red team engineer and wanted to explain what you do for a living to your friends and family, then this is it, apart from some useful security tips and geek stuff. For a movie released in 1992, the plot had cutting-edge hacking and pentesting skills way aheaInformation warfared of its time including some cool social engineering tricks. A team of penetration testers become embroiled in a turf war between Government agencies and rogue hackers over a device that can crack all encryption (quantum cryptography anyone?). This movie has some prophecies too! Considering we have had multiple whistle blowing incidents in the recent past, as a security practitioner both the above movies emphasis one thing: Do the right things or walk away. CISOs are you listening ?

 

Wargames

Have you wondered about the worst case scenarios around automation, or lack of segmentation between your dev and production environments? Or even the implication of a red team exercise going wrong and causing downtime to your production environments? This movie has many of it… 

This movie was released in 1983 and starred Mathew Broderick as a lead character. A young computer whiz kid accidentally connects into a top secret super-computer which has complete control over the U.S. nuclear arsenal. It challenges him to a game between America and Russia, and he innocently starts the countdown to World War 3

LINK: https://www.justwatch.com/us/movie/wargames 

The Matrix

If there was ever a movie that brought to life the concept of hacking, simulation through its characters, that has to be matrix. There is a hacker, there’s a character called cipher. How do machines get access to the rebel network? they compromise cipher 😉 Matrix is a story of a computer hacker who joins a group of underground rebels fighting the vast and powerful computers that have taken over the earth. This movie was released in 1999 and also features a very popular security tool (let me know in the comments)

LINK: https://www.justwatch.com/us/movie/the-matrix 

Mr. Robot 

This is an award-winning web series released in 2015 and is now in its seventh season. This is a story of a hacker by the name of Elliot Alderson. He is a brilliant introverted young programmer who works as a cyber-security engineer by day and a vigilante hacker by night. He and his group are out to erase the credit history for all.

This series features all the things that are talked about in the world of cyber security: Tactics, Techniques, and Procedures (TTPs). You name it and the series has it including Social Engineering, using Raspberry Pis to discretely connect to networks, throwing malware loaded USB sticks in parking lots and lot more

LINK: https://www.imdb.com/title/tt4158110/?ref_=ttmi_tt 

Gultoo

Do you remember this Apple’s Privacy ad which created quite a stir when released on how we are tracked? That ad has a stark resemblance to a song in this movie called Gultoo, released a couple of years earlier. This underrated Kannada movie captures the journey of a hacker who is a part-time instructor in a computer training institute and the skills he uses capture the biometrics of a colleague and use it to find real identity, or use shoulder surfing and snooping in coffee shops to access passwords. This is a great movie that appeals to the younger generation and since it is made in India, folks here may be able to relate to it. 

https://www.imdb.com/video/vi3980900633/?ref_=ext_shr_lnk

Books:

Many companies that I know of have a tie up with library chains where books are delivered to your offices. Here are some good books that talk about various aspects of cybersecurity and are fun to read:

Cult of the Dead Cow

Cult of the Dead Cow is the tale of the oldest, respected, and most famous American hacking group of all time popularly called Cult of the Dead Cow or cDc. This book chronicles the journey of Hacker Culture, the origin of various conferences like DefCon, Blackhat. How hacktivism started, the journey of various security tools like l0phtcrack, nessus, etc.,

Many of the hackers in this group have become well-known names in the technology and security field like Peiter Zatko and Beto O’ Rourke. Peiter Zatko, popularly known as Mudge was in the news recently as the whistle-blower of improper security practices at Twitter. He had earlier served as Head of Security at Twitter. Beto O’Rourke is former Texas Congressman and was a presidential candidate  LINK

Permanent Record

Although this is an auto-biography on Edward Snowden, this book provides great insights into the inner workings of surveillance programs at the Nation-State level and what it means to the privacy of the general public. LINK

Cuckoo’s Egg:

Who doesn’t like mystery and thriller novels? This is a true story written by Cliff Stoll in1989. Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab. An accounting error alerted him to the presence of an unauthorized user on his system. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases. His hunt finally gained the attention of the CIA…and ultimately trapped an international spy ring fuelled by cash, cocaine, and the KGB.

LINK

Gadgets

You can talk about the benefits of gadgets like Privacy filters, webcam stickers, Hardware MFA keys that are phish-resistant etc.,

A gadget like Privacy Filter narrows the viewing angles and prevents shoulder surfing or snooping by others. This is a great addition for the sales and marketing teams and CXOs who are on the road and working out of cafes, airports, and other crowded places.

We have recently learned from the Uber hack about the MFA push notifications alert, which led to fatigue and employee selecting Yes after a barrage of requests. This is a worrying aspect as I have encountered a couple of similar attempts and I dread what if I pressed Yes or clicked on checkmark instead of an X!

This is where a hardware MFA token comes to the rescue. It is been published that hardware MFA tokens (those that comply to the FIDO framework) are phish-resistant. You can popularise these in your offices instead of traditional soft MFAs

I think password managers are still the most underrated tool when it comes to cyber security. We still have not transitioned from “remembering your password” to “passwords are not meant for remembering” mode.

Use the password manager in conjunction with a key or a token and then all you need to remember is just one password and the rest should be in a password manager on system or a browser.

How are you tackling the awareness fatigue of your employees? Please do comment and share your thoughts.

Podcasts and Audiobooks for Commute

pic courtesy: unsplash

The traffic is back! This is what you would hear from your friends, colleagues who have resumed commuting to the office and my opinion is no different. I shuffle between self-drive, cab, and public transport and can feel the noticeable increase in the traffic between the covid and present days. Cycling is ruled out due to the distance 🙂

The usual options during the commute were to listen to the Radio, Songs on CD (incase you remember)/USB drive, but I rarely listen to these nowadays. I remember reading somewhere that many FM radio stations are closing due to low patronage. Couple of the ways I have managed to deal with the commuting boredom or stress is listening to Podcasts and Audiobooks. Podcasts are the best things to have happened in the recent past and I think its a win – win to both the content creators and content listeners. Bear with the Podcaster talking about their sponsors at the beginning and the end and you can listen to uninterrupted content. Don’t like something, skip it and you are in total control in terms of interests.

As I work in the InfoSec, I started off with the podcasts around this topic to keep myself up-to-date, but later added other areas once the routine set in. I have found some of these podcasts very enriching and hence thought of sharing. Irrespective of commute or not, it is better to set aside some time in the day for listening to audio books or podcasts:

The Darknet Diaries

podcast darknetdiaries

If you work in the security field or just even an enthusiast, this is a great one. Jack Rhsyider interviews the people from the wide range of spectrum in the security industry ranging from hackers to CxOs, Hacktivists, self proclaimed vigilantes, Rappers, Social Engineers, Regime Survivors and more. My favorite episode was one about the investigation on Linkedin Incident , which actually led to breaches in other companies. If you are on the defensive side of the security, you can actually use this as a benchmark for enhancing security in your own companies. All the TTPs will unravel as you listen and you can connect the dots.  What I also like about this podcast is the music from BreakMaster Cylinder (fancy name eh!) which is pleasant to hear unlike the opening and closing notes of many podcasts.

Work Life by Adam Grant

work life

This is not related to InfoSec but do not miss this one as it touches various aspects of professional and personal life skills. Some of the episodes that have I have found very helpful include “The 4 Deadly Sins of Work Culture“, “How to Rethink a Bad Decision“, “Networking for People who hate Networking”

Some of the pointers in the podcasts talks about identifying the traits of the organisation culture before joining using a method called as culture audits. The podcast episode mentioned above in itself deserves a separate writeup and I will share some thoughts on them in future

Huberman Lab Podcast

Huberman lab podcast

Andrew Huberman is a neurobiologist. What the heck does Neurobiologist have to do with security for me to be recommending this ? Well, there are couple of changes I did based on this podcast and is helping me in my journey of physical and mental fitness including sleeping well ! Huberman podcasts are usually long (~1.5 hours on an average) and very detailed. Topics include managing stress, sleeping well, improving gut health. Handy tip: Do make you are not actually driving while listening this to Huberman’s podcast as any missed out attention will require listening from scratch 🙂

CISO Series Podcast

ciso series podcast

 If you are someone who works in the field of Information Security you will enjoy listening to this show as the speakers talk from a corporate angle dealing with vendors, the board, the management, peering teams. The podcasts are short with most of them ranging from 10-20 minutes and is hosted by David Spark.  A few topics that I liked include: “A look back at the Foolish Security Policies of Past and Present”, “After a Breach Its really easy to calculate Risk“, “Finding the perfect Time to Quit Your Job“,

When Audiobooks launched, I was skeptical initially but soon one book led to another and currently there are close to 20+ audiobooks in the library some of which I have listened to again. I listen to them not just during the commute but also during workouts, walks and even as a break from work. Most of the podcasts I listen to are themed around Information Security with the exception of few. Here are some of the books I have been listening/reading (mostly in audio book format) and it includes both fiction and non-fiction as well

Cult of the Dead Cow

cult of the dead cow

 

 

 

 

Fascinating book on the journey of Hacker Culture, the origin of DefCon, Blackhat, hacktivism, CyberLegal stuff and a lot more

Why I Am an Atheist and Other Works
Why I Am an Atheist and Other Works
This is the collection of letters Indian Revolutionary Bhagat Singh wrote while he was imprisoned

Permanent Record
Permanent Record
Biography on Snowden, great  insights on inner workings of surveillance program at NSA

The Phoenix Project
Phoenix Project
Book that made concept of DevOps popular

Ikigai
IKIGAI
Self-help / motivational

Talking to Strangers
Talking to Strangers
Non-fiction and a book that touches upon Inherent biases and how it affects our judgements

Zero to One
zero to one
From the Startup guru Peter Thiel, its actually notes from his lecture classes which a student compiled

Essential Calvin and Hobbes
Calvin and Hobbes
Calvin fan, hence 🙂 PS: This is a kindle ebook

An Astronaut’s Guide to Life on Earth Chris Hadfield
an astronauts guide
Fan of Space and Astronauts, hence

The Goal
The Goal
More like a precursor to The Phoenix Project, can draw parallel to modern day monolits

Outliers
outliers
Name says it all

The order of Time
The Order of Time
A good read on the captured history of time measurement. Felt this was philosophical as well during the listening of audiobook, probably will listen to it again.

Atomic Habits (still listening)
ATOMIC habits

The Almanac of Naval Ravikant (still reading)
The almanack of naval ravikant

What are your tips to beat the commuting boredom ? Feel free to share through comments:

Reading list: Fiction, Non-fiction

Here is a list of books that I have enjoyed reading and listening to and I will update this book as and when I complete with a small one liner:

Cult of the Dead Cow

Fascinating book on the journey of Hacker Culture, the origin of DefCon, Blackhat, hacktivism, CyberLegal stuff and a lot more

Why I Am an Atheist and Other Works

This is the collection of letters Indian Revolutionary Bhagat Singh wrote while he was imprisoned

Permanent Record

Biography on Snowden, great  insights on inner workings of surveillance program at NSA

The Phoenix Project

Book that made concept of DevOps popular

Ikigai

Self-help / motivational

Talking to Strangers

Non-fiction and a book that touches upon Inherent biases and how it affects our judgements

Zero to One

From the Startup guru Peter Thiel, its actually notes from his lecture classes which a student compiled

Essential Calvin and Hobbes

Calvin fan, hence 🙂

An Astronaut’s Guide to Life on Earth Chris Hadfield

Fan of Space and Astronauts, hence

The Goal

More like a precursor to The Phoenix Project, can draw parallel to modern day monolits

Outliers

Name says it all

The order of Time

A good read on the captured history of time measurement. Felt this was philosophical as well during the listening of audiobook, probably will listen to it again.

Atomic Habits (still listening)

The Almanac of Naval Ravikant (still reading)

Fintech Security & Compliance — Part 1

Fintech Security & Compliance — Part 1

image created using wordclouds

Fintech is one of the most happening sectors in India & world over with a wide array of services being delivered in lending, insurance, payments, stocks and mutual funds. While founders, product and engineering managers are busy in building the products and delivering them to the people in a rapid and scalable way, there is one huge challenge they must overcome. And that’s the Cyber Security aspect of it. I have had the opportunity to architect and implement controls around these requirements in the last few years and would like to share some thoughts here.

In India, Fintech regulators are:

  • Securities & Exchange Board of India (SEBI)
  • Reserve Bank of India (RBI)
  • Insurance Regulatory and Development Authority of India (IRDAI)

Each of these regulators have their own cybersecurity requirements and these span across multiple domains of cybersecurity like IT Governance, Information Security Audits (IS Audits), IT Outsourcing, IT Risk Management, Business Continuity Management (Good luck on a single region currently offered by the leading cloud vendor in India 🙂 ), Policies, Physical & Environment Security and etc

Apart from these, compliance with PCI DSS/PA DSS is a common requirement for all the fintechs handling credit card transactions. When it comes to PCI DSS, the magnitude of security requirements vary based on the volume of transactions. There are Four Merchant levels starting with Level 4 wherein a merchant handles 20,000 plus transactions and compliance requires that you fill a Self Assessment Questionnaire to Level 1 where 6 million plus transactions are handled annually. Level 2 and 1 have very comprehensive requirements to fulfil and are audited by a third-party.

Not all the Fintechs have the license to operate independently and they leverage the agreements with Banks/Financial institutions to offer the services. It would be surprising to know that banks themselves can offer most of the services which fintechs are offering. The key underlying factor here is Technology, which perhaps banks are yet to come to terms with. When it comes to security requirements and compliances, banks pass on these to the partnering fintechs. So multiple audits in a year are not unheard of in the fintech space.

RBI has Master Directions for entities operating in the banking/non-banking space covering Lending, Loans, Prepaid Payment Instruments, Non-Banking Finance Company (NBFC), Peer to Peer Lending companies, Full fledged banks, Payments Banks and so on.

IRDA has two two major cyber security requirements and one of them is meant exclusively for insurance offered on e-com channels like web/mobile/app channels called ISNP — Insurance Self Networking Platform. As most of the new-age insurance companies are ecom based, they are forced to comply with both (there is some overhead here).

IRDA’s requirement has a cybersecurity checklist with 307 controls and also mandates a Chief Information Security Officer (CISO) to be appointed by the insurance company! While these may be easier to implement for a legacy company with the monolithic architecture, startups usually find these difficult and herein lies the challenge.

SEBI’s framework for Stock Brokers and Depository participants is published here — What I found cool about SEBI’s directives on Cyber Security in comparison to RBI and IRDA is its forward looking approach and in sync with current demands and realities. For example they suggest using Bcrypt / PDKDF2 for hashing passwords, usage of passphrases vs complex passwords:

Also has a reference to Crypto Shredding, must confess I did not know such a terminology existed:

It makes me wonder if the major innovations in the fintech space in India is in the segment operated by the SEBI for reasons like these.

I am thinking of writing in detail about the challenges in complying with the security directives by the regulators in coming writeups but for now will focus on what this augurs for cybersecurity professionals in startups/fintechs.

There is going to be a huge demand for not just Developers, Product Managers, Architects, Data Scientists, but also Cyber Security professionals. When I say Cyber Security, it does not just limit to Pentesters / AppSec / Network / Cloud Security professionals. I see a demand for Data Privacy, Compliance and Legal folks who can understand, interpret complex regulations from the Regulators like RBI, SEBI & IRDA and help implement them in a creative, scalable and rapid way. I am currently working for an emerging Fintech company and a good chunk of my time is spent with the Legal team apart from the engineering folks in interpreting and helping fit newer technologies and controls around regulations, compliances, working on contracts, assessments, Third Party Risk management and etc

As a cyber security professional, I wouldn’t have expected to work this closely with the legal team, but no complaints and am beginning to see things from multiple perspectives! Remember that most startups live by the mantra:

“It is better to ask for forgiveness than permission”

At the end of the day, it’s all about solving problems.

If you have any questions, comments, feel free to post them here and I will try to answer them.

#fintech #cybersecurity #fintechsecurity #RBI #SEBI #IRDA #PCIDSS