CISO Blog
My slice of Binary 3
I made a decision to be the best I can possibly be. This pushed me to learn as much as I could, know what I am capable of doing and know my limits then break those limits. This lead me to be one of the youngest Information Security Officers, for the then ABSA Corporate and Merchant Bank. Being young, arrogant and with a unwavering believe in myself I was under the impression I could boil the ocean….. I didn’t but I gave it a got shot though.
In previous posts I alluded to my stellar school academic record (Lots of sarcasm) and as a result I never thought it possible to earn my degree and gain a seat at the big boys table… but Sean Mouton, also a great leader, in 2008 told me to get my act together and get my degree. 4 Years later I have a Master’s Degree in Science, with merit I might add, from the University of Liverpool.
Today I have the title, the seat at the table and a reputation as a though leader and for getting the job done. I have the privileged of leading a great team of hungry professionals. I have come to learn that the title you have is one borne in servitude to those entrusted into your care. You are not their “Boss” but you are their Leader. This implies your job is to care for them, nurture, lead, guide, scold and PROTECT them….. and yes for time to time you have to make the real hard decisions.
Chase your dreams…..never give up!!!
#lifestory #ciso #leadership
CISO Blog
It’s Time to Close the Software Understanding Gap
The “software understanding gap” threatens everything we rely on—from national security to our daily lives. In 2025, we can no longer afford to sit back and watch as our adversaries, like China, pull ahead. It’s time to disrupt the status quo! You need to overhaul tech procurement policies and invest heavily in understanding these systems. Trusting faulty software is no longer an option. Collaborate with government and academia to create a unified approach. This is your chance to be a game changer—close the gap before it’s too late, or risk losing everything we’ve worked so hard to build!
Alright, listen up! It’s 2025, and the Cybersecurity and Infrastructure Security Agency (CISA), along with some heavy hitters like DARPA and the NSA, just dropped a bombshell. They’re sounding the alarm on a massive issue we can no longer ignore: the "software understanding gap." If you think your organization is untouchable, think again—the risks are real, and they’re creeping up on us fast.
Yes I know it’s a US centric article but the issue is universal and so is the guidance.
Here’s the deal: we’re cranking out software at lightning speed, but our ability to actually understand what’s going on in those systems? Not even close. This gap is allowing vulnerabilities to fester while we blindly trust software that could be compromised. How does that feel? The bigger issue is that this isn’t just a tech problem—it’s a national security threat that can impact everyone from military operations to critical infrastructure.
Let’s be crystal clear: this isn’t just some techie nuisance. This is about **your** business, your community, and the nation. With adversaries like the People’s Republic of China investing hugely in their software understanding, they’re getting a leg up. They can exploit our vulnerabilities while we sit back, thinking everything’s fine. Spoiler alert: it’s not.
- **Critical Risks**: From transportation failures to emergency service disruptions, the gap is putting us all on shaky ground.
- **Wasted Dollars**: We’re talking over $2 trillion lost due to software defects! Yes, you read that right. Wouldn’t it be nice if that cash were being used to actually *secure* our systems instead?
Let’s talk competition. Russia, China—you name it. They’re mastering the software game, while too many of us are playing checkers. The PRC has policies demanding national security reviews of software, which gives them the inside track to manipulate our systems and exploit weaknesses. Do you really want to hand the upper hand to your competitors while your own organization flounders?
It’s high time the U.S. government and private industry pulled their heads out of the sand. Here’s how we can close this software understanding gap:
1. **Policy Changes**: We need serious rethinking of tech procurement policies that push for software understanding. If you’re not on board, you’re part of the problem.
2. **Break Down Barriers**: Those pesky legal obstacles that block mission owners from grasping software? Let’s smash them to pieces.
3. **Invest in Knowledge**: Companies like yours should be pumping money into research, engineering, and partnerships that bolster our understanding of software before it’s too late.
Imagine a future where you, the mission owner, can interrogate your software and get solid answers—fast. We can achieve that if we collectively tackle the software understanding gap. Think of the power that comes with being able to accurately assess risks before deploying systems.
The groundwork has already been laid with initiatives like CISA’s Secure by Design and various government investments. But you know what? It’s just a start. We need more urgency and engagement from leaders like you.
Your position in this revolution is crucial:
1. **Build Expertise**: Get experts who know their stuff and create structures that focus on software understanding.
2. **Revamp Your Policies**: Demand your organization revolutionize acquisition policies to foster a grasp of software that stands up to scrutiny.
3. **Stay Ahead of the Game**: Invest in innovative solutions—formal methods, AI, threat modeling—whatever it takes.
4. **Collaborate and Conquer**: Forge partnerships across government and academia to create a unified front against this widespread threat.
Inaction is not an option. We need you to step up and help close this gap before we’re left picking up the pieces of a shattered infrastructure. Let’s not hand our competitors an open invitation to wreak havoc. Think of it as your chance to be a game changer in safeguarding our future. The clock is ticking!
Troublemaker CISO
The Troublemaker CISO: Navigating the Cyber Minefield of Critical Infrastructure
Critical infrastructure is the cornerstone of our modern life, yet it’s teetering on the edge of vulnerability. As we blend outdated systems with cutting-edge tech, cyber threats loom large, making vigilance paramount. From reinforced defenses to cross-sector collaboration, it’s time to prioritize cybersecurity like our lives depend on it—because they do. Buckle up; this mission is essential.
Ah, critical infrastructure—the backbone of our modern existence and, ironically, the Achilles’ heel of our technological world. Welcome to the rollercoaster ride where the stakes are sky-high, and the threats are very real. Whether it’s power grids, water systems, or transportation networks, these vital sectors are the unsung heroes of our daily life. Yet they stand precariously balanced on the precipice of cyber threats looking to find their chance to wreak havoc.
You might think security for these sectors would be tighter than Fort Knox, but let me shatter that illusion—far too often, the truth is dramatically different. Many of these systems were designed in a time when the word "hacker" referred to someone chopping wood, not slicing through digital defenses. Translation? They're old, vulnerable, and often crying out for attention.
In the past decade, we've watched cybercriminals move from curiosity-driven hacks to sophisticated, targeted attacks aimed squarely at the very infrastructure we depend on. Just picture this: a city plunged into darkness, water systems contaminated or railways thrown into chaos—all orchestrated from an assailant’s armchair halfway across the globe. It sounds like a blockbuster plot, but it's all too possible.
So, why haven’t we fortified these critical systems as if our lives depend on it? Oh right, because they do!
First, there’s the age-old challenge of legacy systems. These beasts require careful handling—bolting on security measures to outdated technology without disrupting services feels like performing surgery with a sledgehammer. Then throw in the fact that many operators are understaffed and underfunded, creating a perfect storm of vulnerability.
Here's the kicker: we’re at a point where the convergence of IT (Information Technology) and OT (Operational Technology) is unavoidable. We've got smarter grids and more connected systems, but this confluence also means more attack vectors for our cyber foes to exploit. It's not just about protecting data; it’s about safeguarding the very systems that sustain our way of life.
So, what’s the game plan? Here's a dose of Troublemaker wisdom:
- Prioritize Risk Assessments: Know your systems' weaknesses before someone else does. Conduct regular assessments to identify vulnerabilities and patch them up—stat!
- Strengthen Defense-in-Depth Strategies: Layering security measures is key. Think of it like adding multiple lines of defense so breaking through becomes a herculean task for any attacker.
- Foster Cross-Sector Collaboration: Get everyone on the same page. Government entities, private companies, and industry experts should join forces to develop standards and share intelligence on threats and best practices.
- Implement Continuous Monitoring: Rest assured, the bad actors don’t take breaks. Keep a watchful eye over your systems 24/7, using sophisticated monitoring tools to spot and respond to incidents in real time.
- Promote Incident Response Planning: Have a playbook ready. Train your teams to act quickly and efficiently in the event of a cyber incident. Preparedness is your lifeline.
- Invest in Cybersecurity Talent: Hire, train, and retain skilled cybersecurity professionals who specialize in critical infrastructure. They’re your knights in digital armor.
We’re living in a time where the saying “forewarned is forearmed” rings truer than ever. Critical infrastructure is a rich target for those looking to disrupt society. Therefore, it’s imperative for us to make cybersecurity a top-tier priority—not merely an afterthought.
The road ahead is fraught with challenges, but with a clear vision, steadfast commitment, and relentless innovation, we can safeguard the lifelines of our modern world. Remember, in this high-stakes game, complacency isn’t just negligent—it’s dangerous. Let’s rise to the occasion and secure our future, one system at a time. Buckle up, troubleshooters—this is a mission we can’t afford to fail.
Troublemaker CISO
Killware – A New Kind of Threat
Welcome to the brave new world of cybersecurity, where the stakes have soared higher than ever. Forget just data breaches and ransomware—enter the terrifying realm of killware. Yes, you heard it right: killware. This is not your typical cyber threat; it’s a harbinger of chaos with the potential to end lives.
As we experience a digital transformation at warp speed, our technology permeates almost every aspect of our lives, including critical infrastructure like healthcare, transportation, and even our homes. With this, the attackers have pivoted. They’re no longer just in it for the data; they now have motivations that can lead to life-or-death scenarios.
So, what exactly is killware? In simple terms, it refers to malicious software designed to cause harm, physical injury, or even death through the exploitation of vulnerabilities in systems controlling life-critical functions. Think of it this way: it’s one thing to steal sensitive information, but it’s an entirely different beast when that information breach can lead to a heart monitor malfunctioning during surgery or a runaway vehicle.
Let's start with healthcare. We’ve got devices like insulin pumps, pacemakers, and hospital systems all running on software that can be hooked up to the internet. These devices are life-savers, but they also have the potential to be turned into instruments of harm if a hacker manages to breach their defenses. A compromised infusion pump can manipulate dosages, leading to under-medication or overdoses. And what’s more alarming? We’ve already seen these nightmares brought to life in the form of real-world incidents.
Now, you might be thinking, “This is alarmist!" But let’s not kid ourselves. We live in an age where cyberattacks are not just a geeky tech problem—they’re a public safety issue. Attackers may be driven by different motivations, from ransom to revenge, and what better way to create chaos than by putting lives on the line?
Next, let’s jet over to the transportation sector. Imagine an entire fleet of self-driving cars getting hijacked by some nefarious cyber villain—suddenly transported from the realm of sci-fi into daily life. With smart cars and drones, systems that once seemed so marvelous could quickly become terrifying weapons in the wrong hands. It’s not just about rerouting these vehicles to an undesirable location; it’s about their potential to cause accidents and chaos on our roads.
So, what can we as an industry do? First, we need to embrace a culture of security by design. This means incorporating security measures into the development of technology from the get-go—not as an afterthought. We need to treat every line of code as a potential vulnerability and evaluate the impact it could have on human life.
Second, we should foster collaboration between cybersecurity professionals, device manufacturers, healthcare providers, and regulators. Establishing robust frameworks to ensure rigorous testing and validation of systems before they come online can thwart potential threats before they wreak havoc.
And finally, we must push for stricter regulations and compliance requirements around the use of connected devices, especially in critical infrastructure. The more we advocate for genuine accountability, the harder we make it for killware attackers to operate.
In conclusion, killware is not just a speculative threat; it’s a reality that demands immediate attention. We must stop treating cybersecurity as a mere IT problem and start acknowledging it as a public safety issue that can no longer be ignored. As defenders of our digital realm, it’s on us to protect not just our networks, but the very lives that are interconnected within them. Welcome to the future, where ones and zeros can mean the difference between life and death. Let’s tackle it head-on, or we risk becoming the architects of our own doom.
-
CISO Blog3 weeks ago
Salt Typhoon, an advanced persistent threat
-
Organizational Transformation2 months ago
Digital Transformation: Shaping the Future of Modern Enterprises
-
Threat Actors3 months ago
The Russian Bear Unleashed: The Cyber Threat of APT28
-
CISO Blog2 months ago
The Troublemaker’s Take on Liminal Panda
-
Digital Transformation2 months ago
The Importance of Digital Transformation in Today’s Business World
-
CISO Blog2 months ago
Part 2 of keeping our parents digitally safe
-
Troublemaker CISO2 months ago
The Troublemaker’s Guide to EVM: A Real-World Perspective
-
Strategy2 months ago
The Importance of Business Strategy: A Roadmap to Success