Transcript
WEBVTT
00:00:00.100 --> 00:00:01.024
Hey, what is up?
00:00:01.024 --> 00:00:04.227
Welcome to this episode of the Wantrepreneur to Entrepreneur podcast.
00:00:04.227 --> 00:00:22.969
As always, I'm your host, brian Lofermento, and I'm so excited about the guests that we've got on here today, because this is someone who, I feel like, loves protecting businesses and loves thinking about things from a really technical perspective that a lot of us really want to ignore and that we may take for granted, both as consumers and as business owners.
00:00:22.969 --> 00:00:38.229
So we're going to talk about the things that really matter from a cybersecurity perspective here today, and we're doing it with an amazing entrepreneur, not just an amazing cybersecurity expert, but this is someone who also has his own business to help other businesses excel in this, and his name is Dante Jackson.
00:00:38.271 --> 00:00:39.923
Let me tell you a little bit about Dante.
00:00:39.923 --> 00:00:46.488
He's the owner and CEO of Circuit Tech Security, which is a cybersecurity consulting firm based in Atlanta, georgia.
00:00:46.488 --> 00:00:56.832
Their team of experienced professionals, with over 30 years of combined expertise, specializes in creating customized end-to-end solutions tailored to each client's specific needs.
00:00:56.832 --> 00:01:05.131
Dante has experience in both the US government and private financial sectors, so, of course, two industries where this stuff really matters a lot.
00:01:05.131 --> 00:01:21.329
So he's got a lot of experience there, including multiple senior leadership roles at a top 10 US bank, dante offers a wide ranging expertise encompassing threat management and mitigation, data protection, it risk management, resilience strategies and insider threat expertise.
00:01:21.329 --> 00:01:24.865
This is some big stuff that, like I said, we all probably ignore Now.
00:01:24.865 --> 00:01:26.954
Through his company, we all probably ignore Now.
00:01:29.120 --> 00:01:34.174
Through his company, dante has leveraged his expertise to provide tailored solutions to clients, empowering them to navigate the complex landscape of cybersecurity with confidence.
00:01:34.174 --> 00:01:36.865
He backs all this stuff up not only with experience.
00:01:36.865 --> 00:01:46.948
He's also got the credentials as far as he has an MBA from the Georgia Institute of Technology and a Master of Science degree in Criminal Justice Management from Sam Houston State University.
00:01:46.948 --> 00:01:55.623
His academic achievements complement his extensive practical experience, positioning him as a trusted authority in both the corporate and consulting realms of cybersecurity.
00:01:55.623 --> 00:02:01.102
And that's all just a tease as to why we're so excited to have Dante here today, so I'm not going to say anything else.
00:02:01.102 --> 00:02:04.085
Let's dive straight into my interview with Dante Jackson.
00:02:04.085 --> 00:02:10.312
All right, dante, I'm so excited that you're here with us today.
00:02:10.312 --> 00:02:11.133
First things first.
00:02:11.133 --> 00:02:12.133
Welcome to the show.
00:02:12.774 --> 00:02:13.655
Thanks for having me, Brian.
00:02:13.655 --> 00:02:15.016
I'm really excited to be here with you today.
00:02:18.919 --> 00:02:19.000
Heck.
00:02:19.000 --> 00:02:22.526
Yes, Now we're going to be talking about some complex stuff, Dante, but I know you're going to simplify a lot of it for us and I'm excited about that conversation.
00:02:22.526 --> 00:02:24.870
But before we get there, take us beyond the bio.
00:02:24.870 --> 00:02:25.852
Who's Dante?
00:02:25.852 --> 00:02:27.495
How'd you start doing all these cool things?
00:02:28.280 --> 00:02:29.883
You know I kind of fell into it.
00:02:29.883 --> 00:02:40.203
As I transitioned into the private sector, I went to one of the larger banks in the US we were going through the biggest merger in US history and then they were looking to build out their cybersecurity program.
00:02:40.203 --> 00:02:45.854
And, like I tell everyone who's looking to get into the industry, sometimes you just have to have that break and someone willing to take a chance on you.
00:02:45.854 --> 00:03:34.861
And from there I was just able to quickly develop my skills, put the work in and you know, just kind of took off and the career took off, the promotions took off and the knowledge took off, which is most important because you can just take the knowledge anywhere that you go no-transcript until you need it.
00:03:34.861 --> 00:03:37.068
And unfortunately that's how some of these companies look at it.
00:03:37.389 --> 00:03:38.540
But I think the tide's changing.
00:03:38.540 --> 00:03:45.028
I mean you're seeing the increased attack of ransomware, both nation state and individual, in large companies.
00:03:45.028 --> 00:03:46.430
Here in the US.
00:03:46.430 --> 00:03:57.848
Many of us get these notifications in the mail, right when you get the year-long experience experience credit monitoring service, because company A has been hit and your data is now on the dark web.
00:03:57.848 --> 00:04:03.909
It's all very frustrating, but I think the tide's changing and companies are recognizing now that, hey, we have to get serious about the protection of our consumer data.
00:04:03.909 --> 00:04:12.972
The reputational damage, the losses, the fines, depending on what industry you're in, it all accumulates and it adds up and it can be very damaging for a company.
00:04:13.860 --> 00:04:24.536
Yeah, this is one of the reasons why I like talking to people in the cybersecurity field, dante is because you all seem like you focus on things both at the macro level you immediately went to this is also geopolitically.
00:04:24.536 --> 00:04:39.891
It's a threat that we face on a really macro level but you also focus on that micro level, at a company level, at a consumer level, and so I want to ask you what is cybersecurity If we're talking about something so big and so global that spans governments, that spans every single consumer on the planet?
00:04:39.891 --> 00:04:43.591
We've all heard that term before, but what does it encompass?
00:04:43.591 --> 00:04:49.211
Does it make sure we've all got really great passwords, or what are the mechanics of what cybersecurity encompasses?
00:04:50.382 --> 00:04:54.120
I think, at its granular level, its most simplest form, is the protection of data, right?
00:04:54.120 --> 00:05:00.384
I mean, anytime you own a business, you have something unique to your business, right, and that can be described simply as data.
00:05:00.384 --> 00:05:05.742
And I think cybersecurity at its essence is the protection of that data, in whatever form that comes in.
00:05:05.742 --> 00:05:15.644
And it's funny that you asked that question, because anytime I go and I speak to future graduates or people who are looking to get into the industry, they give me this look and they say, hey, I want to get into cybersecurity.
00:05:15.644 --> 00:05:17.170
And I say, oh great, what do you want to do?
00:05:17.170 --> 00:05:19.483
And then they kind of look at me like, well, what do you mean?
00:05:19.483 --> 00:05:20.423
Well, I'm like do you want to do encryption?
00:05:20.423 --> 00:05:21.125
Do you want to do encryption?
00:05:21.125 --> 00:05:22.408
Do you want to do data protection?
00:05:22.408 --> 00:05:23.629
Do you want to do insider risk?
00:05:23.629 --> 00:05:25.492
I mean, there's all these verticals aligned.
00:05:25.492 --> 00:05:26.653
Do you want to do pen testing?
00:05:26.653 --> 00:05:29.670
I mean, there's all these verticals aligned to cybersecurity.
00:05:30.151 --> 00:05:36.540
I think it's very important for individuals to remember that when they're looking to go into cybersecurity, that you want to get an idea of what you want to do.
00:05:36.540 --> 00:05:41.629
Once you kind of get a general idea of all the different verticals within it and then focus in on that.
00:05:41.629 --> 00:05:44.875
I'll add to that there's all these different certifications out there.
00:05:44.875 --> 00:05:48.764
A lot of people think, hey, I can go this route, I don't need to get a degree, I can get certifications.
00:05:48.764 --> 00:05:51.353
But nothing trumps experience, right?
00:05:51.353 --> 00:05:52.357
So you have to be able to.
00:05:52.357 --> 00:06:03.329
If you're going to go the certification route or you're going to go the route to go to school, make sure that you have something lined up where you can get that experience, because it doesn't matter how many certifications you have or how many degrees you have.
00:06:03.329 --> 00:06:12.012
At some point you have to get the experience and get the hands-on keyboard time to be able to move up within whatever space you want to go within cybersecurity.
00:06:12.740 --> 00:06:32.567
Yeah, I really appreciate that, especially because, as someone who went to business school, I always hear this blanket term thrown out there where people say you should major in business there's so many opportunities or you should major in international business there's a whole world of opportunities there but you so correctly and so valuably call out the fact that there are verticals within all of these fields that people talk about.
00:06:32.567 --> 00:06:36.786
Talk to us about some of those, because to you, I mean, you can rattle these off so effortlessly.
00:06:36.786 --> 00:06:43.406
But I'm curious, especially from a business owner perspective, what are some of those things that we should be paying attention to?
00:06:43.406 --> 00:06:45.428
I mean, you talk about encryption, for example.
00:06:45.428 --> 00:06:58.250
We recently had a Jay Joshi on the show and he talked about some homomorphic encryption strategies, for example, and that's stuff that if we've got technical solutions, we can bake into those and understanding those.
00:06:58.290 --> 00:07:05.833
It's important for us to protect our consumers, but there's a whole other world of protecting our own data as businesses, protecting the data that we use.
00:07:05.833 --> 00:07:07.879
I'm going to call out ChatGPT, for example.
00:07:07.879 --> 00:07:11.129
We're all using all of these AI tools and passing a lot of our data there.
00:07:11.129 --> 00:07:17.411
There's so many important considerations, and that's not even looking at the consumer side of protecting our customers and clients.
00:07:17.411 --> 00:07:22.904
So, gosh, Dante, it's a loaded question, but what are those types of fields and verticals that we should be paying attention to?
00:07:23.747 --> 00:07:24.988
So I think one place to start.
00:07:24.988 --> 00:07:39.331
It kind of encompasses a few of the you know concepts that you mentioned and I think that social engineering right and email phishing, you know, from a consumer standpoint, from a business standpoint, it's just the frontline defense of kind of protecting a business and, as a consumer, protecting yourself.
00:07:39.331 --> 00:07:45.072
You know you mentioned ChatGPT right With the integration now and the kind of the explosion of AI and AI is tricky.
00:07:45.072 --> 00:07:46.937
Right, ai has been around for a very long time.
00:07:46.937 --> 00:07:49.103
I mean machine learning has been around for a really long time.
00:07:49.103 --> 00:07:57.620
But you know, kind of this commercialized explosion of AI has introduced the ability for bad actors to kind of leverage it to improve some of their social engineering skills.
00:07:57.680 --> 00:08:02.346
Right, you know, back in the day you would get an email and you know there were some grammar issues going along the email.
00:08:02.346 --> 00:08:06.913
You can pick things out hey, I have a daughter or a son that's in the US.
00:08:06.913 --> 00:08:12.447
I'm this prince blah, blah, blah, send me this money, send me a money order, and bang, you were hit that way.
00:08:12.447 --> 00:08:25.752
But now with the AI and some of the tools out there, you can really clean up some of the grammar mistakes that made some of these emails easy to pick up, and even the creation of these emails, the logos, the backgrounds, everything looks so professional.
00:08:25.752 --> 00:08:27.694
Now it's really really hard to pick these things up.
00:08:27.694 --> 00:08:32.457
So extensive training from a company standpoint, of what to look for from an email phishing standpoint.
00:08:32.498 --> 00:08:42.731
Because these bad actors are leveraging all the social media platforms Facebook, instagram, linkedin to identify organizations, identify weak points within organizations, to work their way to the top.
00:08:42.731 --> 00:08:52.191
They're no longer targeting the CEOs of these companies, they're targeting the admins of the CEOs that are booking the flight reservations, that are scheduling the pickup with the kids, that are emailing the wife.
00:08:52.191 --> 00:09:05.961
I mean, they're getting all this information that they can and collecting all this information that they can so that when they do make an attempt to go after that big whale, if you will, they have all their ducks in a row to make a valid and a valiant point to target this person.
00:09:05.961 --> 00:09:11.346
And it's very scary how they kind of incorporate all the different elements of social media into a targeting campaign.
00:09:12.087 --> 00:09:18.003
Yeah, dante, hearing you say that you bring up a really valuable point that I've actually never thought about and I've never talked about here on this show.
00:09:18.003 --> 00:09:25.047
And you talk about how many solutions have become commercialized, and that's great for us because they've become more accessible to us as end users.
00:09:25.047 --> 00:09:42.279
But what it really got me thinking is what's commercialized in your space, because you already talked about Experian credit protection, and you're right We've all gotten those from our credit card companies, from our financial institutions, from other companies that we've given our payment details to, and they've been compromised and so they offer that as a benefit.
00:09:42.279 --> 00:09:47.965
It seems like there's a lot of commercialized solutions for protecting us after something has happened.
00:09:47.965 --> 00:09:51.346
What's commercialized to protect us before things happen?
00:09:51.346 --> 00:09:55.630
And I guess it's a really natural segue into, obviously, what you do as a service.
00:09:55.630 --> 00:10:03.297
So what does that look like when you work with a cybersecurity expert to plug those gaps that aren't necessarily commercialized for us just yet?
00:10:03.317 --> 00:10:11.600
those gaps that aren't necessarily commercialized for us just yet, yeah, so, especially from a company standpoint, we typically go in and the first thing we like to do for companies is pen testing, right, and that helps to show a company their vulnerabilities.
00:10:11.600 --> 00:10:15.498
Hey, where are you vulnerable If I wasn't a bad actor, if I'm an ethical hacker?
00:10:15.498 --> 00:10:19.471
At this point, right now, I want to show you how we try to get into your network or exposure network.
00:10:19.471 --> 00:10:25.355
Where can we help you remediate and plug some of those gaps, so that the idea here is strengthening your security posture?
00:10:25.355 --> 00:10:27.576
I use the analogy of the big bad wolf, right?
00:10:27.576 --> 00:10:30.256
What you don't want to be is the house made of straw, right?
00:10:30.256 --> 00:10:45.775
You want to be the house made of brick, so that when a bad actor does come, he doesn't see us off target, he moves on to the next target, because you're never 100% clean or 100% bulletproof from a cyber attack, and I think that's a mistake people make and I think that's, along the lines, sometimes the frustrating part about cybersecurity.
00:10:45.836 --> 00:10:50.847
You can invest a lot of money into cybersecurity and at some point you still may be vulnerable, but that's okay.
00:10:51.168 --> 00:10:57.042
You want to make yourself as hard a target as possible so that bad actors kind of move on from you and move on to a more softer target.
00:10:57.042 --> 00:11:01.913
But the pen testing, the vulnerability management, the assessments there's levels to this, brian.
00:11:01.913 --> 00:11:14.484
I mean how deep and how far you want to go into it and how much you want to invest to protect your data essentially, and your customer data, and protect your customers and your reputation, and those are things that you have to really consider, but from a very high level.
00:11:14.484 --> 00:11:22.442
A good place to start is really with the pen testing and then you can start talking about access management ensuring that your employees only have the access that they need.
00:11:22.442 --> 00:11:25.868
The data protection models making sure you know where your data at you have it classified.
00:11:25.868 --> 00:12:08.438
There's multiple levels to this game, if you will, and it really just depends on how far you want to go and how many innings you want to go into the game no-transcript have to do it, but obviously a lot of times we don't want to do it.
00:12:08.780 --> 00:12:09.644
What's that conversation?
00:12:09.644 --> 00:12:12.889
Look like to kind of sell that value proposition to companies.
00:12:13.650 --> 00:12:16.173
Well, it starts with leadership right, and a lot of times it's a hard sell.
00:12:16.173 --> 00:12:22.952
But it starts with the leadership and where their focus is and how much do they want to protect the data and the reputation of the company itself.
00:12:22.952 --> 00:12:31.476
And you have to have that buy-in from executive leadership because they control the funding, especially when you're dealing in the financial sector, right, where the business is the revenue generator of the company.
00:12:31.476 --> 00:12:35.533
Right, the cybersecurity insurance portion of it is an expense.
00:12:35.533 --> 00:12:39.711
Sometimes it doesn't pay off, sometimes you don't have those attacks or those hits.
00:12:39.711 --> 00:12:44.129
So you're paying all this money for continuous monitoring and various solutions and you might not see the return.
00:12:44.190 --> 00:12:55.386
But really the return can be a quiet return and a lot of the conversations we have with our initial clients is really educating them on how they can protect themselves, understanding the model of their business itself and what benefits them the most.
00:12:55.386 --> 00:13:03.758
And I think from our standpoint our business standpoint the model we've created is a custom model, giving businesses what they need and not what we want.
00:13:03.758 --> 00:13:17.974
So if you have 10 solutions, trying to sell a company, 10 solutions when they only need 4, or trying to sell a company, a solution that fit with Bank of America but it doesn't fit at Wells Fargo or trying to force it to fit at Wells Fargo because it fit at Bank of America and they're both in the banking sector.
00:13:17.974 --> 00:13:32.253
I think you really, really have to get into that customization for a solution for a particular client and help them understand why they need it and how it's going to protect them and then from there you get that buy-in and you get that investment and you can really do well and do good and do proper by the client.
00:13:32.874 --> 00:13:34.498
Yeah, I really appreciate that, Dante.
00:13:34.498 --> 00:13:39.941
I'm going to publicly praise you here because I think that answer speaks volumes about the way that you also do business.
00:13:39.941 --> 00:13:42.481
You're not just talking about cybersecurity right now.
00:13:42.481 --> 00:13:56.489
What I really appreciate is someone who myself and our pre-production and post-production team we've already gone through the way that you operate and it's why we so appreciate you about that transparency and vulnerability and really that honesty about hey, let's create custom solutions that work for you.
00:13:56.548 --> 00:13:58.754
And on that point I want to go back to the house analogy.
00:13:58.754 --> 00:14:14.671
It's something that I always love in the cybersecurity field about hardening your house, and when I hear you talk about that, I imagine what most people will lead themselves to believe hearing you say and they're like well, yeah, there's 500 other houses on this street and most of them are bigger than my house.
00:14:14.671 --> 00:14:16.674
Why would anyone mess with mine?
00:14:16.674 --> 00:14:25.236
And a lot of small business owners can fall into that trap, dante, of convincing themselves well, no, this is an issue that faces the Bank of Americas, the Wells Fargo's of the world.
00:14:25.236 --> 00:14:27.745
Why should we care as small business owners?
00:14:28.807 --> 00:14:29.048
Yeah.
00:14:29.048 --> 00:14:34.087
So I think there's a percentage here and my numbers may be slightly off, but not too far off.
00:14:34.087 --> 00:14:48.322
I believe it's 68% of startup businesses go bankrupt due to a ransomware attack or a cyber attack, and that number alone should raise alarm bells in your head if you're a business owner or even beginning to think about starting your own business.
00:14:48.322 --> 00:14:52.682
These guys do not care about the size, they are there for the money, and I'll break it down a little bit.
00:14:52.682 --> 00:14:53.105
Think about it.
00:14:53.105 --> 00:15:04.019
If you go out and you take a $50,000 loan to start your business Joe's Pizzeria you're buying a building, you're buying equipment, you're hiring employees and then all of a sudden you get hit with a ransomware for $100,000.
00:15:04.019 --> 00:15:05.461
How do you recover from that?
00:15:05.461 --> 00:15:15.604
You can negotiate that down, or you call a service and they come in and they charge you a fee and then you negotiate it down and either you pay the ransom or you don't.
00:15:15.604 --> 00:15:16.264
But then what happens?
00:15:16.264 --> 00:15:17.287
When they double back and they hit you again?
00:15:17.287 --> 00:15:19.951
Or they encrypt your data and then they re-encrypt it and then they're trying to charge you twice.
00:15:19.951 --> 00:15:21.735
It can literally destroy your business and it's very, very sad.
00:15:21.755 --> 00:15:36.034
The percentages are astronomical about how many businesses just simply don't survive a ransomware attack and this stuff is serious and it's just getting easier and easier to do with the AI integration and just the accessibility to computers and some of the technical skills these hackers have.
00:15:36.075 --> 00:15:37.357
You have to remember.
00:15:37.357 --> 00:15:40.010
And some of the technical skills these hackers have, you have to remember, they're not playing with any rules, right, we're playing within rules.
00:15:40.010 --> 00:15:44.677
We're playing within the confines of assessments and compliance and things of that nature.
00:15:44.677 --> 00:15:55.897
They're not playing within the same rules that we are, so they can just go out and do what they need to do and they can attack anybody at any time and it can be very, very hurtful and detrimental to your business, especially if you're a small business.
00:15:55.897 --> 00:15:59.960
So I think a big mistake that a lot of small businesses make is like, oh, why would they care about us?
00:15:59.960 --> 00:16:00.879
They're not going to attack us.
00:16:00.879 --> 00:16:04.883
We're small, we're a small fish in a big pond, but no, you guys are an easy target.
00:16:04.883 --> 00:16:08.975
It's much harder to get into a bigger organization than it is into a small business.
00:16:09.845 --> 00:16:25.277
Yeah, that's a really good point, and I think that part of your job, I imagine, is to think like an attacker, and part of that is yeah, I mean, I could hit one huge house, but I'm probably going to land in a lot of trouble and they also probably have a huge budget to stop me from doing that.
00:16:25.297 --> 00:16:26.945
So let me go after the small guys, let me go after those small business owners.
00:16:26.945 --> 00:16:56.875
And, just as a really small scale example, just at a website level, I've got a plugin on one of my WordPress installations that tells me how many times someone tried to attack my WordPress database with SQL injections and all sorts of other things, and when I installed it, I thought to myself this is completely pointless, it's never going to flag anything, but every week I get a report of the hundreds of attacks and attempted attacks and what countries they're from, and it's crazy because, to your point, they don't play by rules, especially when we're talking about a global game of whack-a-mole.
00:16:56.875 --> 00:17:00.421
We're never going to be able to stop them, so we have to protect ourselves.
00:17:00.421 --> 00:17:01.943
So give us some examples.
00:17:01.943 --> 00:17:10.732
Dante, you mentioned ransomware, but I don't think people probably fully understand and appreciate what types of costs can be incurred by ignoring this type of stuff.
00:17:10.732 --> 00:17:12.277
So what are some of those?
00:17:13.005 --> 00:17:13.085
Yeah.
00:17:13.085 --> 00:17:14.268
So I'll give you a perfect example.
00:17:14.268 --> 00:17:17.894
One of the verticals that we assist with is the trucking industry, and I have a good friend of mine.
00:17:17.894 --> 00:17:20.286
He's a VP for a trucking company and they actually go around.
00:17:20.286 --> 00:17:23.534
They speak to this at some of the bigger trucking seminars.
00:17:23.534 --> 00:17:36.755
They were hit with ransomware, their data was encrypted and they lost a million dollars a day for seven days and that's how long it took for them to negotiate with the hackers and to get everything remediated and fixed and get their data returned to them.
00:17:37.095 --> 00:17:44.557
But you have to think as a logistics company you have trucks out all over the country that are carrying cargo that are being expected to be delivered to customers.
00:17:44.557 --> 00:17:48.075
You have to think those customers don't care about what's going on in your world.
00:17:48.075 --> 00:17:54.731
They want their goods because that's effectively hurting their business, because they don't have the goods that's required for them to continue doing what they need to do.
00:17:54.731 --> 00:17:57.137
So reputational damage we talked about earlier.
00:17:57.137 --> 00:18:02.662
So that company is going to look elsewhere because they're not getting the goods they need in a timely manner so they can continue their business.
00:18:02.701 --> 00:18:05.432
So it not only affects that particular business where the ransomware hits.
00:18:05.432 --> 00:18:22.921
We're talking about the fruits of a poisonous tree just tagging everything, all these different businesses across the country and, yes, they lost literally a million dollars a day, to the tune of $7 million, as they tried to continue negotiating it and decrypting their data to get it back, and I mean just had complete chaos within their organization for over a week.
00:18:22.921 --> 00:18:31.278
And some of this could have been prevented if they would have took the necessary steps to have some things in place to protect their business from a cybersecurity standpoint.
00:18:31.278 --> 00:18:33.391
And that's what they go around speaking on now.
00:18:33.391 --> 00:18:39.093
Is they wish they would have done these things and kind of educating the industry on how to prevent what they went through?
00:18:39.875 --> 00:18:42.647
Yeah, really well said, and this stuff has real life implications.
00:18:42.647 --> 00:18:47.614
Dante, I love the fact that I asked you that question and you didn't jump to theories or hypotheticals.
00:18:47.614 --> 00:19:05.974
You jump straight to a real life example and that's the stuff that we love and appreciate, because, yeah, it's scary, but I think that's the scary real life examples that we need to confront, and especially hearing you talk about this part of me wants to ask you and obviously we don't want to go too in depth here but how much of your job is thinking like a hacker, thinking like that attacker?
00:19:05.974 --> 00:19:07.185
How do you stay ahead of it?
00:19:07.185 --> 00:19:23.196
Because I would imagine that they're getting more sophisticated and with the introduction of AI, there's probably new ways that they can play around and learn new strategies and brainstorm new strategies makes me think that all the times I'm using AI for brainstorming for good things, they're probably using it way more for bad things.
00:19:23.196 --> 00:19:25.190
So talk to us about that side of your role.
00:19:25.810 --> 00:19:27.094
Yeah no, I mean 100%.
00:19:27.094 --> 00:19:29.711
You know a large portion of what we do is thinking like a bad guy.
00:19:29.711 --> 00:19:36.330
I mean you have to if you want to stay in this business and stay ahead, otherwise you're going to lose in this game because, make no mistake about it, it is a game.
00:19:36.330 --> 00:19:52.933
We spend a lot of time in hacker rooms until they figure out or think we're the police and kick us out, but we spend time just seeing what people are talking about, what some of these hackers, some of the information they're sharing, how they're incorporating things into the dark web and some of the strategies that they discuss.
00:19:52.933 --> 00:19:55.596
Because they exchange these things I mean they have conversations.
00:19:55.596 --> 00:20:00.682
Some of these guys form alliances and allegiances together to kind of do mass attacks or large scale attacks.
00:20:04.805 --> 00:20:06.011
It's a very fascinating culture within the hacking culture.
00:20:06.011 --> 00:20:08.884
So we spend quite a bit of time just brainstorming about how can we stay ahead, what's next, what are we seeing in the industry?
00:20:08.884 --> 00:20:09.645
What are the trends?
00:20:09.645 --> 00:20:11.208
It's a lot of time doing research.
00:20:11.208 --> 00:20:12.309
It's a lot of times doing reading.
00:20:12.309 --> 00:20:18.557
It's a lot of times spending time in these rooms, these hacker rooms, seeing what people are talking about and what's the latest and greatest software.
00:20:18.557 --> 00:20:21.361
Some of this hacking software has been packaged.
00:20:21.361 --> 00:20:27.027
I mean it's become commercialized.
00:20:27.027 --> 00:20:29.195
It's no longer someone sitting in a room and creating their own methods of doing hacking.
00:20:29.195 --> 00:20:32.086
I mean you can literally purchase software to go in and try to do hacking.
00:20:32.086 --> 00:20:39.692
It's really, really amazing when you take a step back and look at how this industry has evolved from an ethical and a hacker standpoint.
00:20:40.333 --> 00:20:41.115
Yeah, it's true.
00:20:41.115 --> 00:20:49.970
Again, coming to that, commercialization, all the good stuff is becoming more accessible, but in the information age and the internet age, all the bad stuff is also becoming more accessible.
00:20:49.970 --> 00:20:52.395
So, dante, I really appreciate you calling that out.
00:20:52.395 --> 00:21:10.318
I want to ask you about both sides of the coin because, having gone into the work that you do which, by the way, I love the brand that you've built and the way that you show up I think that so much of your personality and the way that you think about this stuff shows up in the way that your business shows up, your your headline on your website securing tomorrow, protecting today.
00:21:10.680 --> 00:21:14.772
I think it shows your emphasis on both sides of that of hey here.
00:21:14.772 --> 00:21:23.142
Part of it is protecting us today, but also you can't just do an initial assessment and an initial setup of fortifying your house, for example.
00:21:23.142 --> 00:21:26.194
You have to actually ongoingly secure that tomorrow.
00:21:26.194 --> 00:21:33.467
So talk to us about what that looks like for people who have never gone through a cybersecurity project and protected their business not only today but tomorrow.
00:21:33.467 --> 00:21:36.395
What's that ongoing relationship and obligation look like?
00:21:37.144 --> 00:21:43.093
Yeah, I think it starts by understanding your data, understanding what you have, again, right, because at the core, at the essence, that's what you're protecting.
00:21:43.093 --> 00:21:50.472
So I think that's where it really really starts, and then again identifying where your vulnerabilities are, and then you start going to that next level of managed services, right?
00:21:50.472 --> 00:21:51.615
You kind of spoke about Brian.
00:21:51.615 --> 00:22:01.317
You took a look at some of the hits that are occurring on your website and I think people would be totally shocked at how many attempts daily are made to breach a company.
00:22:01.317 --> 00:22:06.009
Essentially, this is a company that you're operating, right, and it's a global brand.
00:22:06.009 --> 00:22:17.032
So you have attackers from all over the world looking to gain access to see what type of data they can essentially extract from your business to likely throw on the dark web or hold for ransom against you.
00:22:17.775 --> 00:22:28.819
So I think, again, understanding your data and then taking that next step of continuous monitoring is kind of where we sit down with companies and say, hey, you've taken that first step, you've identified where your data is, you've identified where your vulnerabilities are.
00:22:28.819 --> 00:22:38.076
Now you need that ongoing protection and that's where we can help you to kind of do that active monitoring and that managed service of kind of knowing what are you facing who's looking to come after you.
00:22:38.076 --> 00:22:40.323
How can you fortify your defenses and strengthen that?
00:22:40.323 --> 00:22:42.028
Security posture is a term we use a lot.
00:22:42.730 --> 00:22:44.634
Yeah, dante, I so appreciate those insights.
00:22:44.634 --> 00:23:09.834
I want to switch gears a little bit, because hearing you talk about this stuff it's amazing hearing your cybersecurity hat but I also know that something I remind listeners of all the time is that all of our guests you are a fellow entrepreneur, you're a fellow business owner, and I want to tap into that entrepreneur hat of yours, and part of what I view is your role in the way that it seems to me like it's at the core of your brand and your service to clients, is that you are a leader for them as well.
00:23:09.834 --> 00:23:16.894
You take ownership of that big responsibility for their businesses, and it's something that I also know you invest in in your own businesses.
00:23:16.894 --> 00:23:19.823
You are, of course, the leader of your own business, your own team.
00:23:19.823 --> 00:23:27.835
Talk to me about what leadership means to you, because I so appreciate the way you show up, not only in today's episode, but in all of your work, and I want to hear some insights there.
00:23:28.664 --> 00:23:45.875
Yeah, so I think leadership means being prepared, having an understanding of who your team is, what their strengths are, what their weaknesses are, and aligning them to projects and giving them assignments that lend to their strengths but also improve their weaknesses right, and pairing people up where they're strong and another person may be weak.
00:23:45.875 --> 00:24:04.356
A big part of the entrepreneurial process, especially in cybersecurity, where you're fighting against some of the big four right, it's a David versus Goliath, because there's a lot of big, big companies out there that can offer cybersecurity services at a much, much lower rate or they can heavily discount things because they can make money up on the back end with some of their million-dollar projects.
00:24:04.356 --> 00:24:21.598
I think sales is just a really huge part of it, and that was kind of the part of it that I didn't realize is how much of owning your own company is a sales portion of it, and being able to approach people and walk up to people and say, hey, do you have an understanding of what's going on?
00:24:21.598 --> 00:24:21.976
I'll give you an example.
00:24:21.887 --> 00:24:27.068
I went to a conference yesterday and I met with a CEO that's working on a billion-dollar project here in Atlanta and he was on the way out after speaking and I said, hey, can I just walk with you.
00:24:27.068 --> 00:24:27.549
And he said, sure.
00:24:27.549 --> 00:24:31.952
I said have you guys given any thought to your cybersecurity needs with respect to this major project?
00:24:31.952 --> 00:24:33.257
It's a construction project.
00:24:33.257 --> 00:24:36.338
And he goes well, I don't think we really need anything cybersecurity related.
00:24:36.338 --> 00:24:42.682
And I go well, do you have blueprints to the power lines and to the city plumbing underneath where you guys are digging under the street?
00:24:42.682 --> 00:24:52.772
And he's like, yeah, and I'm like, well, that's very valuable to a nation state government to have that information, to have those plans with respect to a company and where the electrical grid is running and where the water is coming from there.
00:24:52.772 --> 00:24:54.347
And he looked at me and he goes you know what?
00:25:03.065 --> 00:25:06.827
Yeah, gosh, dante, these real life stories that you're bringing here today.
00:25:06.827 --> 00:25:25.920
It's something that listeners appreciate about this show is the fact that there are no pre-planned questions, and I, as a host, really appreciate how quickly and just on the spot you're giving us these real life stories, and I think that it shows the way that you think and you see these things everywhere, because, of course, you have so much experience in the field and you've been doing it for so long, so huge kudos to you.
00:25:25.920 --> 00:25:28.000
It also makes me want to ask you what did that jump?
00:25:28.000 --> 00:25:40.457
Look like you were in the cybersecurity field within these big businesses, working internally, but somewhere along the way you realized you have so much value out in the marketplace and you said I want to bring this to more businesses, to more clients.
00:25:40.457 --> 00:25:41.906
What gave you that push?