Hello everybody, this is Ed Maguire, Insights Partner at Momenta Partners with our Momenta Podcast, where we interview some of the most interesting and thoughtful people in technology, connected industry, and business.
Today my guest is David Bauer who is currently a managing partner at Sandhill Lease, but I’ve known Dave for a number of years, and when we originally met he was the Chief Security Officer at Merrill Lynch, Dave brought a rich array of insights and experience to the role and accomplished an enormous amount at a large organization, with some rather daunting security challenges. Security for anybody who’s in any business, whether its Internet of Things, whether its industrials, whether its financial services and banking, is almost always top of mind, and David is one of my favorite people, and most understandable and articulate in talking about the problems people face, and a lot of the challenges that are overcome, and then really creative ways of thinking about security as well. So, with that, I’d like to welcome you to the podcast
Thank you very much
I’d just like to start by having you share a bit of your background, what brought you to
This morning before the webinar I was thinking back through my career, I started working in information security as long ago as 1987, so
I learned a lot back then, the nature of computer hackers and those who want to break those systems, that part hasn’t really changed in 31-years, they’re still an enemy and they’re still a target, just the enemies have changed, and the targets have changed. A seminal incident during that time at Bell Communications Research was, the Morris worm of 1988, the first well-publicized, self-replicating piece of software which found its way at that time into a large number of unit systems which are connected to the Internet; including Bell Communications Research, phone companies, and a lot of research institutions, and so-on. That was probably one of the most interesting events of all of
- Why didn’t the vendors tell us about these flaws? Because they knew about them, or did they know about them, and if they did then why didn’t they tell us about this?
- Why didn’t we have any way of being alerted quickly with what the issue was, and how do we fix our systems?
- Why didn’t we have anybody responsible for making sure our system’s up to date? The patching problem we grapple with today?
- Why isn’t there any government agencies providing oversight and assistance to
industries.
- Why don’t we have standards for our systems, training for individuals?
- Why is it that everybody has all their computers just connected to the Internet, without any security boundaries between?
All of this was brought to light in one incidence, and
It wasn’t the first, but it was the first
What struck me most about that position at the time in 1994 was, like most financial institutions we had thousands of distributed computers, mostly Sun at that time. The IBM mainframe had very good
I was explaining to somebody just maybe a week ago saying, ‘You don’t think about it, but of
But the questions did come from the executive management business about, does this represent a risk to the firm, and how do we protect against that? I found myself in discussions with senior business people at Morgan Stanley, by explaining to them what the risks were, and what we were doing to protect the company. And so that insight was very interesting, but even then, people perceived that inter-connectivity would bring additional risk, and asked questions about how that would be protected.
I was in that position for several years. Later I moved to Merrill Lynch in 2001 as the Chief Information Security and Privacy Officer. The interesting thing about that role was, in addition to being the Chief Information Security Officer, and all of what it brought with it,
That was the new thing as well, most of my peers were not Privacy Officers, or perhaps companies hadn’t thought about it, but
It was so novel at the time it made the front page of the Wall Street Journal, and some of my peers called up and said, ‘How could you do that? You need to keep in-house’, I go, ‘I have no visibility in-house, all the visibility about what’s going on is outside of me, and I need to have that intelligence to help me make better security decisions, and better protect my network’. That was pretty common, many companies hire security operation centers, and other external parties to monitor for
It’s been pretty exciting, and you and I got to know each other when you were involved in doing that first outsourcing of security at Merrill. I was struck by one of the comments you made about putting the first Morgan Stanley website online, and the fact you had to speak with executives, and in order to get them to trust that it would be safe to put this information online. That’s very similar to a lot of the conversations we’re having today with companies that are looking to connect their physical assets and be able to have visibility into physical processes they never had, which of course creates a lot of data and exposes a lot of data. What were some of the objections and ways you were able to convince executives to have trust in these systems that they had not seen before?
That’s a good question, what’s really interesting about that particular case was, the desire to use the Internet as a medium of communication was purely a business-driven decision there. There was Stephen Roache
What one would do now is, you would outline, ‘Here are the threats’, ‘Here are the
We talked about the risks that were prevalent, and what we were doing to mitigate them. It was a learning experience being able to explain in a number of ways to non-technical audiences what the risks were. Of course, we also had to educate on what the Internet was, what interconnectivity meant, people didn’t really use the Internet at that point for commerce, or access to bank accounts, or to buy things, so that in itself was an unknown quantity about what exactly what it was, why people would use it, why this was an effective mechanism, and what it meant to be interconnected. The interesting thing is, of
I remember at a conference Mary Meeker invited me to, where I talked about security and the Internet to a bunch of investors, probably in 1986, and a lot of those same question
Yes, in a couple of areas. So,
I think we could go back to those principles some more, and think about various components we have, and not define it as, ‘I’ve implemented this set of technology’, or, ‘these components’, or even ‘My staff have certifications’, or, ‘I’ve been audited and my audit is okay’, but more fundamentally is what are all my components, what is the business processes or the business I’m operating in my environment, and have I defined the trust levels, and the trust between the different components that I feel comfortable engaging in that business; with the kind of monitoring which lets me know whether that trust is maintained on a day-to-day basis? Because one of the most interesting things about the world of security is that trust is very dynamic, and so a configuration set up in a method of protection that I’ve implemented today may not be trustworthy tomorrow for a variety of reasons. I have to be vigilant and keep an eye on
I thought that’s one of the most interesting comments you made to me about this idea of risk being a dynamic challenge, and that’s something of course which makes security really interesting, but it also makes it hugely difficult to manage, and of course as things get more and more connected that ends up being a big challenge.
I’d like to pivot a bit to the role of governance, privacy, and regulations, and you’d mentioned when you were at Merrill you had the role of Chief Privacy Officer, and this has largely been moved into a corporate counsel role, but we have legislation, GDPR is coming into effect later this year in Europe; how have you worked with governance and privacy rules in the context of trying to match business demands, and business agility with the challenges of regulatory strictures or constructs that may not necessarily be designed to promote the most agile business processes, or the most flexibility in the business. And then
Yes, I’ve worked in a lot of aspects of technology, there’s never enough money for everything you want to do, whether its security or privacy, or building a trading system, so it’s all out with your point. I believe the privacy regulations/legislations are doing quite a bit to help people think about security and let me tell you why; you’re probably thinking, ‘That’s an odd statement’, but I think its true. So, what’s the essential element of privacy? The essential element of privacy is putting into the hands or at least the wishes of the individuals, which could be business, but most privacy regulations are targeted for information about individuals; what privacy legislation does is, it requires companies to follow the wishes of the individuals of whom the data is about, for the use of that data, and that’s a very powerful statement.
So, what it means is, the corporation can’t make all the decisions about the uses of the data.
What’s great about that is, as a corporation when you have these regulations to follow, you have some obligation to protect the status, a bunch of security things you need to do. They need to follow the will of the owner of that data, at least the provider of the data, so I need to build constructs to do that to collect their wishes, to follow it. But you can apply that to corporate data, if you follow the same theme, you said, ‘Hey your business unit that owns this data, I need you to tell me your wishes for how this data is to be used, and I’m going to protect it, as custodian I’m going to follow your wishes’, it’s just another set of requirements, people think about the ownership of data, whether its business data or private data, as ‘I want to provide my rules and my wishes for the data, and you custodians have to implement my
HIPPA
It really is essential to creating a foundation of trustworthiness between
I’ve seen some interest reactions. For example, I’m including now in contracts in companies that I’m advising indemnity clauses,
Interesting. We’ve got all of these new sources of data that are going to be connected. In the next several years we’ll have automobile data, with autonomous vehicles, you have all this data that’s been collected by smart cities and smart buildings, how do you see the security challenges
I do, there’s a couple of aspects to that. One is, HIPPA has actually got a pretty good framework for the protection of health information and how it needs to be protected, and then how it can be de-identified for use in say analytics, because when you collect all this data
The second piece is, how the data might be used, so you can identify it in some way and then companies use it to create general rules about people in my social economic class, that can eventually be
Others are at the opposite end of the spectrum, and
They’re not trustworthy because they don’t understand the ramifications of the service they’re providing, the data that they’re stewarding, and the implications on how that data might be used, either by their staff
If you’re a company looking to embark on an expansion of the devices and the systems that you have which are connected; say you have a fleet of truck generating data via GPS, or doing cold chain, tracking shipping, cargo
A couple of aspects, internally they should have a very clear internal policy for the use of the data, and they should make that clear across the company, and for however the data, or whomever the data is being collected, they should make that very clear. Often it might be an employment contract and people can sense you’re a driver and you’re going to be monitored for speed, distance and the rest of that kind of stuff. It’s clear, you might not like it but it’s clear. Just like working in financial services it’s clear, you have to be finger-printed, and you have to have a background checks, if you don’t like it well, then you don’t get the job, but you know it’s very clear what you need to do, I think clearly very important.
Two, when you go to your service providers, those who are collecting data, if you ask a couple of simple questions, you can say, ‘Are you collecting data about individuals? That’s confidential’, ‘Do you have a SOC 2, type II, security and confidentiality trust criteria?’ If they look at you with a blank stare, that would be a bad sign. If they say, ‘No, we don’t have it yet, but that’s
They’re not overly onerous, but they’re not simple either. Whereas it’s the simple way to gauge whether that service
I’d love to just go back a little to your experience and see if there were any incidents. Obviously, what you’re trying to prevent with a security strategy
Just thinking of the recent past, the Spectre and Meltdown incidents that are just weeks old now, I think are quite interesting, and they’re quite interesting for two reasons. One is, computers are just made up of layers of software, and even on top of a secure chip, a CPN chip from Intel, or AMD, or take your pick, the software that needs to run on those and they’re
What struck me as quite good about that, which was different from the past is, the process kind of worked on it, the researchers signed the clause, they worked with the major vendors ahead of time, so Amazon, Microsoft, Google, major cloud providers, major operating system providers within a very short amount of time, or even before, had the ability to fix the problem. That process I thought worked quite well. Then you contrast that to something completely opposite where the WikiLeaks by Snowden on the collection of security flaws at the end of the day had been collecting over the years, only some of which they had disclosed back to the vendor.
So, what that shows you
They even had some trains that were shut down, so
It was. I found those instances to be very telling in terms of a way that these things can be discovered and protected, and general at large the public protected was another way where that wasn’t. I think some thought around the policies there
Absolutely, one of the interesting incidents I just wanted to ask you about was the Mirai Botnet which was really nothing more than just a nuisance, but this idea that you have all these security cameras, EDRs
Good question. First of all, an interesting statistic is something like 2/3rds, 66% to 70% of all security incidents affect small and medium businesses, on a total number basis. So, it’s the right target, and one of the reasons it’s the right target is exactly what you said, is the small to medium business may not have the wherewithal either in expertise, or time, or perhaps even money to understand all the security issues they face and come up with a program to deal with that.
I think the answer to that is the following; one is, that risk is only going to increase, every SND is looking to automate, they hold data about their customers, about their business. They’re putting out more devices as we talked about, not just printer but cameras and other kinds of automation all of which are a target item. I would encourage them to think about the basic principles of security, just like they probably have layers of physical security, they’ve got a front-door lock and a lock in maybe the manager’s office, and a safe, they have to think about their technical security the same way, these large number of perimeter devices which need to be isolated from their ordering, tracking, and business systems, which need to be isolated from their core data. Just thinking that basic layered approach but for their technology, and then engaging with some local IT consultants who have some credentials to help them implement that, I think would go a very long way to the preventatives.
The vendors of these systems need to think more broadly about the protections they’ve built into them, I think it’s bad practice if they create a device and there’s a static password in it, or a static key they’re going to put on 100,000 devices they’re going to deploy all over the world and think no-one is going to discover that, because they are. They’re discovering all kinds of things, not just in devices of the business they’re supplying, but scary enough in the devices they’re buying for the children, talking dolls and things like that which are
So, to me it’s almost like ingredients, the FDA makes the company put the ingredients on the list before you can buy food, well electronic devices should have a statement of security on them that they’re going to be connected, so you can read it, and you can say, ‘Okay, this things connected, they’ve got some kind of protection on this, and they’ve got a way to update it when it’s time to deploy’. Minimum criteria which should be on a label.
That makes so much sense given all these connected devices. We’re coming up to the end of our allotted time here, but I wanted to just ask if you could share any resources when somebody asks you, ‘How do I get a little bit smarter about how to secure my business, and how to secure my life?’ Are there any resources you could point people to?
The Times Tech Blog, and I’m sure all the major newspapers have this, I read the New York Times, it has the blog on technology which very frequently has very good advice on how to protect home technology and think about the kind of devices which are being brought into the home, or the technology, and how to think about security. It’s very readable, with links to other blogs and other resources, so, for the consumer, that’s a great place to go. I’m not receiving any compensation from The Times for that, I just think it’s very readable!
I’m going to put the weirdest recommendation out that you probably have heard in a long time, if I’m a company, especially if I’m an SMBE, and I want to understand what are the elements of a security program that I should be thinking about, the essential elements; the best resource I’ve seen in a long time is security criteria by the New York State Department of Financial Services, it’s called the NYDFS, its 500 criteria…
We’ll put a link in the show notes for sure.
You can put a link, NYDFS Cyber Insurance Report. It’s probably 15 pages, extremely readable,
That’s really helpful advice, it’s going to be worth the price of a listen alone for most listeners.
David, as always, it’s a pleasure and it’s been extraordinarily informative, I think your insights continue to be relevant and valuable, and I really want to thank you for taking some time to speak with us.
No problem Ed, it’s been an interesting journey and it’s going to continue to be interesting for years to come, so thank you very much.
For everybody listening, this is Ed Maguire, Insights Partner at Moment Partners, and that was our interview with David Bauer who is a managing partner at Sandhill East. If you have any further questions please reach out to us, and we’ll put links to the resources in the show notes as well. Thanks a lot.