Google's Search, Development and Enterprise Discussions

Google on Ulitzer

Subscribe to Google on Ulitzer: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Google on Ulitzer: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Google Authors: Kevin Jackson, Dynatrace Blog, Ben Bradley, Louis Nauges, Valeriia Timokhina

Related Topics: Cloud Computing, Security Journal, Google

Blog Feed Post

It Is Not About Security | @CloudExpo @StackIQ #AI #ML #Cybersecurity

There has certainly been no lack of punditry and controversy in the US regarding the hacking of John Podesta’s email account

There has certainly been no lack of punditry and controversy in the US regarding the hacking of John Podesta’s email account (along with the DNC email hack), with some claiming they were responsible for Mrs. Clinton’s loss in the election. I will leave the impact of these claims to those who write and talk about politics. I don’t discuss politics in a work setting, so will leave that aspect to them.

What I would like to address is the security infrastructure versus security posture that made this hack possible. For the uninitiated, Mr. Podesta received a targeted phishing email directing him to reset his password. This prompted him to contact IT support, who told him there was indeed a threat, and he should reset his password. Up to this point, it sounds like a day in the life of any enterprise. Reassured by IT support, he clicked on the link in the email to reset his password. The rest as they say is history.

Slide2At that point, it doesn’t matter what the security infrastructure of the organization was. Unless the organization is scanning outgoing connections for hazardous behavior (and even then, it would have had to be blacklisted, based on today’s user expectations), all security infrastructure was no hindrance to the attackers at all.

The IT support individual involved (his name is out there if you’re dying to know it, I will not besmirch him for the simplest – and potentially most clostly – of mistakes) has expressed regret for simply saying “Yes, this is a real threat, reset your password”, but it shows the difference in the world-view between leaders and IT. To security and support staff, “reset your password” implies “via the normal method you’ve always used”. While to the user, IT staff was implying “this is a legitimate request, please use it to reset your password”. The part that did not get communicated was “but not via the link in that email”.

It was a simple communication error. And though we will never know for certain the impact that it had, it is guaranteed that impact wasn’t good. It was at best neutral or more likely negative to the organization, it is just very difficult to gauge how negative.

The thing is, that one conversation and the resulting email – one email, one phone call, one click – bypassed whatever security infrastructure was in place. No matter how good, expensive, up-to-date, or all-encompassing it was.

In the case of Mr. Podesta, there was even another twist. This was his personal account, but as many of us do, there was a lot of work-related email on his personal account. This (gmail) account was outside of IT’s control, so any document they had telling users how to reset passwords was useless. Most organizations have these people in them, who really do work evenings at their home, and are productive doing so.

And if you are a company big enough to have IT support staff, it was your organization. You are every bit as vulnerable, and it could have happened to you. But it doesn’t have to be that way.

There are several things you can pursue to help avoid situations like this.

  • Teach employees to be cautious about links in email. Spear Phishing relies upon tricking a user, so give them the tools to avoid being tricked.
  • Give security communications training. There are multiple ways to go about this, but I’d recommend talking to Michael Santarcangelo over at Security Catalyst (https://securitycatalyst.com) he has a knack for teaching security folks communications.
  • Server side email filters will cut down on the number that get through, but shouldn’t be the only approach, simply because they will be unlikely to catch every phishing attempt.
  • Give Support and Security staff a script, or better yet, a web page on your self-help portal, that gives users explicit instructions to do things like reset passwords internally.
  • I’ve never recommended this before, but writing this blog has me thinking that it might be worthwhile for employers to get password managers for all employees. Something I’ll have to consider more deeply, but there you’re thinking with me. While Wikipedia lists tend to get out of date, as of this article’s writing, their list (https://en.wikipedia.org/wiki/List_of_password_managers) is a good starting point for looking over passwords. If, for some reason, a password manager is not an option, then at least convince your senior employees – the ones with the most strategic email and access to the most information – to use unique passwords at work.
  • Most most most important is to teach employees to be careful about what they say over email. I’ve been in subpoena situations for court cases, and sometimes what you find employees have said is cringe-worthy. In fact, the first time I realized what a subpoena of all email meant, I pondered how bad it would have been at my first development job… While rising through the ranks at a tax software company, I met and courted my wife. Things I said to woo her would have been hilariously embarrassing on the desk of an attorney hostile to the organization, even if they didn’t harm the company. Hacking is not required, those emails can be seen by people outside the company (M&A also being a scenario), so teach employees to conduct business, but leave the edgy/dark out. While retention policies are common, they’re not particularly effective, in my opinion, because there are copies of email all over the place – from backups to local PST files. Retention policies are better at keeping storage usage down, limiting access to damaging or dangerous information in email should be handled by training.

A political campaign is a short-term thing, and the window for potential damage was small. That is not true with your organization. Imagine someone having access to the email of a 10 or 20 year high-level employee, and having forever to use that in competitive situations against your organization. The potential for harm is large, and if there is bad enough stuff in there (I once wrote the CEO of an employer to tell him I had been commanded to fudge data, and that wasn’t the company I joined or he was running. While he fixed it, imagine that showing up competitively or in court – today I would call or wander over to his office to have that same conversation), it could cost not just business, but lawsuits to boot.

While doing all of this, remember to scale the approach so as to teach employees what is off limits, while reinforcing that email is a business tool and should be used for business goals. It is a powerful tool, but it can be a powerful tool in the hands of those who wish your organization ill also. It is important to keep the “powerful tool” part while reducing the risk.

Edit/Addendum: One of the companies I do business with has started inserting this line at the top of email coming from outside their network:

*** Exercise caution. This is an EXTERNAL email. DO NOT open attachments or click links from unknown senders or unexpected email. ***.

That line at the top of the phishing email may well have caused Mr. Podesta to stop and ask “Should I use the link in the email?”, thereby avoiding the entire unpleasantness. So add it to the list of things you can do to reduce risk.

@DevOpsSummit at Cloud Expo taking place June 6-8, 2017, at Javits Center, New York City, and is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.

DevOps at Cloud Expo / @ThingsExpo 2017 New York 
(June 6-8, 2017, Javits Center, Manhattan)

DevOps at Cloud Expo / @ThingsExpo 2017 Silicon Valley
(October 31 - November 2, 2017, Santa Clara Convention Center, CA)

Download Show Prospectus ▸ Here

The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.

@DevOpsSummit will expand the DevOps community, enable a wide sharing of knowledge, and educate delegates and technology providers alike. Recent research has shown that DevOps dramatically reduces development time, the amount of enterprise IT professionals put out fires, and support time generally. Time spent on infrastructure development is significantly increased, and DevOps practitioners report more software releases and higher quality. Sponsors of @DevOpsSummit will benefit from unmatched branding, profile building and lead generation opportunities through:

  • Featured on-site presentation and ongoing on-demand webcast exposure to a captive audience of industry decision-makers.
  • Showcase exhibition during our new extended dedicated expo hours
  • Breakout Session Priority scheduling for Sponsors that have been guaranteed a 35-minute technical session
  • Online advertising in SYS-CON's i-Technology Publications
  • Capitalize on our Comprehensive Marketing efforts leading up to the show with print mailings, e-newsletters and extensive online media coverage.
  • Unprecedented PR Coverage: Editorial Coverage on DevOps Journal
  • Tweetup to over 75,000 plus followers
  • Press releases sent on major wire services to over 500 industry analysts.

For more information on sponsorship, exhibit, and keynote opportunities, contact Carmen Gonzalez by email at events (at) sys-con.com, or by phone 201 802-3021.

The World's Largest "Cloud Digital Transformation" Event

@CloudExpo / @ThingsExpo 2017 New York 
(June 6-8, 2017, Javits Center, Manhattan)

@CloudExpo / @ThingsExpo 2017 Silicon Valley
(Oct. 31 - Nov. 2, 2017, Santa Clara Convention Center, CA)

Full Conference Registration Gold Pass and Exhibit Hall ▸ Here

Register For @CloudExpo ▸ Here via EventBrite

Register For @ThingsExpo ▸ Here via EventBrite

Register For @DevOpsSummit ▸ Here via EventBrite

Sponsorship Opportunities

Sponsors of Cloud Expo @ThingsExpo will benefit from unmatched branding, profile building and lead generation opportunities through:

  • Featured on-site presentation and ongoing on-demand webcast exposure to a captive audience of industry decision-makers
  • Showcase exhibition during our new extended dedicated expo hours
  • Breakout Session Priority scheduling for Sponsors that have been guaranteed a 35 minute technical session
  • Online targeted advertising in SYS-CON's i-Technology Publications
  • Capitalize on our Comprehensive Marketing efforts leading up to the show with print mailings, e-newsletters and extensive online media coverage
  • Unprecedented Marketing Coverage: Editorial Coverage on ITweetup to over 100,000 plus followers, press releases sent on major wire services to over 500 industry analysts

For more information on sponsorship, exhibit, and keynote opportunities, contact Carmen Gonzalez (@GonzalezCarmen) today by email at events (at) sys-con.com, or by phone 201 802-3021.

Secrets of Sponsors and Exhibitors ▸ Here
Secrets of Cloud Expo Speakers ▸ Here

All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades.

With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo@ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.

Track 1. FinTech
Track 2. Enterprise Cloud | Digital Transformation
Track 3. DevOps, Containers & Microservices 
Track 4. Big Data | Analytics
Track 5. Industrial IoT
Track 6. IoT Dev & Deploy | Mobility
Track 7. APIs | Cloud Security
Track 8. AI | ML | DL | Cognitive Computing

Delegates to Cloud Expo @ThingsExpo will be able to attend 8 simultaneous, information-packed education tracks.

There are over 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content.

Join Cloud Expo @ThingsExpo conference chair Roger Strukhoff (@IoT2040), June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA for three days of intense Enterprise Cloud and 'Digital Transformation' discussion and focus, including Big Data's indispensable role in IoT, Smart Grids and (IIoT) Industrial Internet of Things, Wearables and Consumer IoT, as well as (new) Digital Transformation in Vertical Markets.

Financial Technology - or FinTech - Is Now Part of the @CloudExpo Program!

Accordingly, attendees at the upcoming 20th Cloud Expo @ThingsExpo June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA will find fresh new content in a new track called FinTech, which will incorporate machine learning, artificial intelligence, deep learning, and blockchain into one track.

Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expensive intermediate processes from their businesses.

FinTech brings efficiency as well as the ability to deliver new services and a much improved customer experience throughout the global financial services industry. FinTech is a natural fit with cloud computing, as new services are quickly developed, deployed, and scaled on public, private, and hybrid clouds.

More than US$20 billion in venture capital is being invested in FinTech this year. @CloudExpo is pleased to bring you the latest FinTech developments as an integral part of our program, starting at the 20th International Cloud Expo June 6-8, 2017 in New York City and October 31 - November 2, 2017 in Silicon Valley.

@CloudExpo is accepting submissions for this new track, so please visit www.CloudComputingExpo.com for the latest information.

Speaking Opportunities

The upcoming 20th International @CloudExpo@ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA announces that its Call For Papers for speaking opportunities is open.

Submit your speaking proposal today! ▸ Here

Our Top 100 Sponsors and the Leading "Digital Transformation" Companies

(ISC)2, 24Notion (Bronze Sponsor), 910Telecom, Accelertite (Gold Sponsor), Addteq, Adobe (Bronze Sponsor), Aeroybyte, Alert Logic, Anexia, AppNeta, Avere Systems, BMC Software (Silver Sponsor), Bsquare Corporation (Silver Sponsor), BZ Media (Media Sponsor), Catchpoint Systems (Silver Sponsor), CDS Global Cloud, Cemware, Chetu Inc., China Unicom, Cloud Raxak, CloudBerry (Media Sponsor), Cloudbric, Coalfire Systems, CollabNet, Inc. (Silver Sponsor), Column Technologies, Commvault (Bronze Sponsor), Connect2.me, ContentMX (Bronze Sponsor), CrowdReviews (Media Sponsor) CyberTrend (Media Sponsor), DataCenterDynamics (Media Sponsor), Delaplex, DICE (Bronze Sponsor), EastBanc Technologies, eCube Systems, Embotics, Enzu Inc., Ericsson (Gold Sponsor), FalconStor, Formation Data Systems, Fusion, Hanu Software, HGST, Inc. (Bronze Sponsor), Hitrons Solutions, IBM BlueBox, IBM Bluemix, IBM Cloud (Platinum Sponsor), IBM Cloud Data Services/Cloudant (Platinum Sponsor), IBM DevOps (Platinum Sponsor), iDevices, Industrial Internet of Things Consortium (Association Sponsor), Impinger Technologies, Interface Masters, Intel (Keynote Sponsor), Interoute (Bronze Sponsor), IQP Corporation, Isomorphic Software, Japan IoT Consortium, Kintone Corporation (Bronze Sponsor), LeaseWeb USA, LinearHub, MangoApps, MathFreeOn, Men & Mice, MobiDev, New Relic, Inc. (Bronze Sponsor), New York Times, Niagara Networks, Numerex, NVIDIA Corporation (AI Session Sponsor), Object Management Group (Association Sponsor), On The Avenue Marketing, Oracle MySQL, Peak10, Inc., Penta Security, Plasma Corporation, Pulzze Systems, Pythian (Bronze Sponsor), Cosmos, RackN, ReadyTalk (Silver Sponsor), Roma Software, Roundee.io, Secure Channels Inc., SD Times (Media Sponsor), SoftLayer (Platinum Sponsor), SoftNet Solutions, Solinea Inc., SpeedyCloud, SSLGURU LLC, StarNet, Stratoscale, Streamliner, SuperAdmins, TechTarget (Media Sponsor), TelecomReseller (Media Sponsor), Tintri (Welcome Reception Sponsor), TMCnet (Media Sponsor), Transparent Cloud Computing Consortium, Veeam, Venafi, Violin Memory, VAI Software, Zerto

About SYS-CON Media & Events
SYS-CON Media (www.sys-con.com) has since 1994 been connecting technology companies and customers through a comprehensive content stream - featuring over forty focused subject areas, from Cloud Computing to Web Security - interwoven with market-leading full-scale conferences produced by SYS-CON Events. The company's internationally recognized brands include among others Cloud Expo® (@CloudExpo), Big Data Expo® (@BigDataExpo), DevOps Summit (@DevOpsSummit), @ThingsExpo® (@ThingsExpo), Containers Expo (@ContainersExpo) and Microservices Expo (@MicroservicesE).

Cloud Expo®, Big Data Expo® and @ThingsExpo® are registered trademarks of Cloud Expo, Inc., a SYS-CON Events company.

More Stories By Don MacVittie

Don MacVittie is founder of Ingrained Technology, A technical advocacy and software development consultancy. He has experience in application development, architecture, infrastructure, technical writing,DevOps, and IT management. MacVittie holds a B.S. in Computer Science from Northern Michigan University, and an M.S. in Computer Science from Nova Southeastern University.