
Uh, and the title of this 5minute entertainment is WTF is TLA. Come and play a fast round of cyber buzzword bingo by Jeremy Kee. Let's welcome him to the stage.
[applause] >> Amazing. Thank you. Uh, look ladies and gentlemen, the reality is that cyber security is confusing. However, our mantra at the missing link is to bring clarity to the complex comp complex world of cyber security and I wanted to do just that for you today. Basically, you need to protect your assets and data and just be aware of jargon and threeletter acronyms or TLAs. So, if you want to deal with cyber security IRL and let me try and give you the TD TLDDR, you will need to protect your PI. So, you'll be on the lookout for IoC's and careful of SDK, S3 and API security, meaning you'll be worried about DOS, APC, CNC's, XSS, SQL injections, CSFRs
and bad active TTPs. You want to do regular OENT and check up on OASP and CVS cuz you don't want to end up with the BSOD. [laughter] A [ __ ] Uh, anyone know how to fix that? Is there anyone here from Kra? No, just kidding. These threats can be mitigated, of course, but is your EP an AV or an EDR? And does it include IDM or IDM? Does it integrate with your IDG? Does it come with CTI and can you plug it in your MDR, XDR, NDRC, which hopefully has you a sore? Ideally, you want to reduce your MTD and MTR. As long as you've identified your RTO and your RPA, your IP, BCP, and DP should kick in. You'll
be okay ASAP. Now, if you're still following along, you're in massive NR. Besides AV and EDRs, your maturity increase, you might want to add things like DLP, IDS, and IPS. For remote use, you might want to VPN with MFA. Now, it doesn't have to be by RSA, but should include SSO. You also want to consider other controls around FWVM, SEG, SWG, CSPM ASPM ZTNA SAS NS CB C Cap WAN NAP WAP DA SAS PAM EPME ASM and TIP and ensure a solid program and SAT. Uh, everything should obviously utilize ML and or AI. You will need approval probably from a CIO, a CISO, or CTO or CTSO, or CDO, CRO, sometimes even a CEO. They'll run
it by the the CEO. They will run it by the CFO who will care about ROI and TCO. Either way, you probably want someone who's at least a CISP or a SIS to manage that for you. Unless you outsource it all to an MSP or an MSSP or something like TML with a sock or a Gock or a [ __ ] who have eyes on glass 24/7. I was proud of that one. [clears throat] Hopefully, it's got a GI so UGL that makes you RFL. Besides that, you want more people in that team. There should be mix of CIS, SIS, SISM, CS, GC, SCP, CSP, and G CI. And hackers should be OCP at least, if not OSWP, OCP, OSWA, OS,
OCD, OE, or OSMR. If you hate Apple obviously essentially as long as it's not CH all still with me good >> you will have to address your GRC and explain whether your ISMS includes a C2M2 and does adhere to DIS NIST ASIC VPDSF GDPR co ISO 2701 and two sock one type one sock two type one sock one type two sock two type two ACSC8s AP 234 and 235 ISM privacy socky cis top 20 PCIS SMB 10001 and understand and your obligations to the OIC. Don't worry, you're probably not going to need to worry about HIPPA, but you do want to ensure that you're focused on your CIA. Now, it's not the American CIA, it's the
other CIA. Now, if you're thinking WTF, I don't care what this guy is referring to. Well IDC. If you do fall victim to fishing, fishing smishing whailing farming fishing, malware, or ransomware, hopefully your security tools aren't all shelfware and marketing where your data is going to be here, there, and everywhere. You might get informed over the NBN by ST or OET or the ACSC. If you're living in the past the JCSC and you want to check for any compromise to your WAN LAN VLAN or SDWAN, you're going to want to get coms out maybe by some messaging protocol like XMPPP, HTTP, HTTPS FTP TCP IP UDPS SMTPS FTP SSH or DNS, unless you want to use
something like SMS or MMS, but that can be subject to an MITM attack and result in someone LOTL. Obviously, you could use DDS because of the high QS, right? Yeah. Don't use RDP. You want to avoid RCE. Worst case, gold school, use another RFC like Ibo. That's purely one for the pigeon fans. Thought this would be the room where there'd be a few pigeon fans. Hopefully, with all that done, you won't end up being hauled in front of the OIC or worse, the ICAC or the AFP or in a really horrific situation, the CIA, which is actually the other CIA that I was talking about before. So, we're clear. You all understand perfectly. You are welcome. Uh if you still don't
understand, then RTF FM or GT FO. Finally, I just want to do a quick maturity assessment for you. This is not a security maturity assessment. Uh but there are words in cyber security that sound dirty but aren't. So if you find yourself giggling or snickering along to these in a meeting, come and see me for maturity uplift. Now look, if you're coming to me for maturity uplift, you're probably in the wrong spot. But [snorts] uh so see how you go with these spoofing splunk [snorts] for scout honeypot inest penetration test back door hardening wap and seammens. Hey thanks very much. I just heard the bar is op. So I'll catch you guys later. >> [applause]