0:00
Hello everyone. Welcome to another
0:02
Hello everyone. Welcome to another
0:02
Hello everyone. Welcome to another episode of the cloud show. And um today
0:05
episode of the cloud show. And um today
0:05
episode of the cloud show. And um today we're going to talk about a a big topic,
0:08
we're going to talk about a a big topic,
0:08
we're going to talk about a a big topic, a kind of complicated one or at least it
0:10
a kind of complicated one or at least it
0:10
a kind of complicated one or at least it it appears and feels complicated uh for
0:13
it appears and feels complicated uh for
0:13
it appears and feels complicated uh for most of normal persons. So fortunately
0:15
most of normal persons. So fortunately
0:15
most of normal persons. So fortunately we have a star on the show uh today who
0:18
we have a star on the show uh today who
0:18
we have a star on the show uh today who is a super expert in this field. We are
0:21
is a super expert in this field. We are
0:21
is a super expert in this field. We are going to talk about cyber security and
0:24
going to talk about cyber security and
0:24
going to talk about cyber security and compliance or zero trust cyber security
0:27
compliance or zero trust cyber security
0:27
compliance or zero trust cyber security those kinds of things. And the expert on
0:30
those kinds of things. And the expert on
0:30
those kinds of things. And the expert on the show today is Prabat Nigam.
0:33
the show today is Prabat Nigam.
0:33
the show today is Prabat Nigam. [Music]
0:45
Hello sir. Hi Magnus. How are you doing?
0:47
Hi Magnus. How are you doing?
0:47
Hi Magnus. How are you doing? I'm doing very well. I'm so happy to
0:49
I'm doing very well. I'm so happy to
0:49
I'm doing very well. I'm so happy to have you on the show Prabot.
0:52
have you on the show Prabot.
0:52
have you on the show Prabot. Great to have you. Uh get to be there.
0:54
Great to have you. Uh get to be there.
0:54
Great to have you. Uh get to be there. Get to be here I should say. And uh
0:57
Get to be here I should say. And uh
0:57
Get to be here I should say. And uh absolutely.
0:58
absolutely. And and you're you're working out of um
1:00
And and you're you're working out of um
1:00
And and you're you're working out of um Los Angeles. I know you work for Golden
1:02
Los Angeles. I know you work for Golden
1:02
Los Angeles. I know you work for Golden Five Consulting.
1:04
Five Consulting. Yes.
1:05
Yes. Mhm. That's a You're the the CTO, right?
1:08
Mhm. That's a You're the the CTO, right?
1:08
Mhm. That's a You're the the CTO, right? Yes. I'm the global CEO for Golden Five.
1:11
Yes. I'm the global CEO for Golden Five.
1:11
Yes. I'm the global CEO for Golden Five. Nice. Very nice. So tell us a little bit
1:13
Nice. Very nice. So tell us a little bit
1:13
Nice. Very nice. So tell us a little bit about you and then we'll dive into this
1:15
about you and then we'll dive into this
1:15
about you and then we'll dive into this um massive topic of cyber security.
1:19
um massive topic of cyber security.
1:19
um massive topic of cyber security. Yeah, sure. um 25 years in the IT
1:22
Yeah, sure. um 25 years in the IT
1:22
Yeah, sure. um 25 years in the IT industry, started working in Microsoft
1:25
industry, started working in Microsoft
1:25
industry, started working in Microsoft uh technologies and uh being an engineer
1:28
uh technologies and uh being an engineer
1:28
uh technologies and uh being an engineer to being a CTO living in USA. Uh life
1:32
to being a CTO living in USA. Uh life
1:32
to being a CTO living in USA. Uh life dream has achieved uh being Microsoft
1:34
dream has achieved uh being Microsoft
1:34
dream has achieved uh being Microsoft MVP worked in Microsoft uh we met at the
1:38
MVP worked in Microsoft uh we met at the
1:38
MVP worked in Microsoft uh we met at the MVP summit and we had a lot of fun and
1:40
MVP summit and we had a lot of fun and
1:40
MVP summit and we had a lot of fun and since then we are keep having fun and
1:42
since then we are keep having fun and
1:42
since then we are keep having fun and loving to be uh be around you. Um yeah
1:46
loving to be uh be around you. Um yeah
1:46
loving to be uh be around you. Um yeah but uh no I'm no more MVP. I don't find
1:50
but uh no I'm no more MVP. I don't find
1:50
but uh no I'm no more MVP. I don't find enough time to write a lot of blogs but
1:51
enough time to write a lot of blogs but
1:51
enough time to write a lot of blogs but I I'm still supporting Microsoft some
1:54
I I'm still supporting Microsoft some
1:54
I I'm still supporting Microsoft some more the other way as a Microsoft
1:55
more the other way as a Microsoft
1:55
more the other way as a Microsoft partner. So selling Microsoft talking
1:57
partner. So selling Microsoft talking
1:57
partner. So selling Microsoft talking about Microsoft product with the
1:59
about Microsoft product with the
1:59
about Microsoft product with the customers maybe in a closed room
2:00
customers maybe in a closed room
2:00
customers maybe in a closed room meetings not in the public.
2:02
meetings not in the public.
2:02
meetings not in the public. So that's that's a little changing but
2:05
So that's that's a little changing but
2:05
So that's that's a little changing but yeah I'm still doing some conferences
2:07
yeah I'm still doing some conferences
2:07
yeah I'm still doing some conferences speaking a lot uh on Microsoft product
2:09
speaking a lot uh on Microsoft product
2:09
speaking a lot uh on Microsoft product as well. So
2:10
as well. So I I see you popping up at conferences
2:12
I I see you popping up at conferences
2:12
I I see you popping up at conferences now and then and and and I I realize and
2:14
now and then and and and I I realize and
2:14
now and then and and and I I realize and I understand that it's it has to be
2:16
I understand that it's it has to be
2:16
I understand that it's it has to be difficult. I mean, you have a demanding
2:18
difficult. I mean, you have a demanding
2:18
difficult. I mean, you have a demanding title, a global CTO for a large company,
2:20
title, a global CTO for a large company,
2:20
title, a global CTO for a large company, and being able to to be close to the
2:23
and being able to to be close to the
2:23
and being able to to be close to the community is maybe not always optimal,
2:26
community is maybe not always optimal,
2:26
community is maybe not always optimal, but hey, everybody knows you are the man
2:28
but hey, everybody knows you are the man
2:28
but hey, everybody knows you are the man to talk to when it comes to Exchange and
2:30
to talk to when it comes to Exchange and
2:30
to talk to when it comes to Exchange and various things. You you still run the
2:32
various things. You you still run the
2:32
various things. You you still run the Lexu UG, right? The user group for
2:35
Lexu UG, right? The user group for
2:35
Lexu UG, right? The user group for Exchange in in Los Angeles.
2:37
Exchange in in Los Angeles.
2:37
Exchange in in Los Angeles. Yes, I do. Uh time we have host the
2:40
Yes, I do. Uh time we have host the
2:40
Yes, I do. Uh time we have host the meetings uh like Microsoft just released
2:43
meetings uh like Microsoft just released
2:43
meetings uh like Microsoft just released the Exchange server SE. So we uh last I
2:47
the Exchange server SE. So we uh last I
2:47
the Exchange server SE. So we uh last I think last year we we we released an
2:49
think last year we we we released an
2:49
think last year we we we released an update or we had a uh meeting online
2:52
update or we had a uh meeting online
2:52
update or we had a uh meeting online meeting with New York with we
2:54
meeting with New York with we
2:54
meeting with New York with we collaborated with New York exchange user
2:55
collaborated with New York exchange user
2:56
collaborated with New York exchange user group. So LA Los Angeles and New York
2:58
group. So LA Los Angeles and New York
2:58
group. So LA Los Angeles and New York collaborated a joint event on talking
3:01
collaborated a joint event on talking
3:01
collaborated a joint event on talking about exchange server SE and how the
3:03
about exchange server SE and how the
3:03
about exchange server SE and how the pricing would be and everything. We
3:05
pricing would be and everything. We
3:05
pricing would be and everything. We still have a YouTube recording if anyone
3:06
still have a YouTube recording if anyone
3:06
still have a YouTube recording if anyone wants wants to look back and yeah it's
3:09
wants wants to look back and yeah it's
3:09
wants wants to look back and yeah it's still on the uh user group. We'll see if
3:12
still on the uh user group. We'll see if
3:12
still on the uh user group. We'll see if we can do a show link of your YouTube
3:14
we can do a show link of your YouTube
3:14
we can do a show link of your YouTube recording.
3:15
recording. But anyway, let's let's get to the
3:17
But anyway, let's let's get to the
3:18
But anyway, let's let's get to the topic. Let's get to the meat of this.
3:19
topic. Let's get to the meat of this.
3:19
topic. Let's get to the meat of this. So, zero trust cyber security frameworks
3:22
So, zero trust cyber security frameworks
3:22
So, zero trust cyber security frameworks and and and compliance and stuff. This
3:24
and and and compliance and stuff. This
3:24
and and and compliance and stuff. This is a for most people this is a
3:27
is a for most people this is a
3:27
is a for most people this is a complicated area.
3:29
complicated area. Yeah. Yeah, it is. Uh if we think about
3:31
Yeah. Yeah, it is. Uh if we think about
3:31
Yeah. Yeah, it is. Uh if we think about it uh today we are living in the world
3:34
it uh today we are living in the world
3:34
it uh today we are living in the world where we are getting um hits by a lot of
3:38
where we are getting um hits by a lot of
3:38
where we are getting um hits by a lot of cyber attacks
3:39
cyber attacks and that's where the zero trust uh um
3:42
and that's where the zero trust uh um
3:42
and that's where the zero trust uh um cyber security framework comes in where
3:45
cyber security framework comes in where
3:45
cyber security framework comes in where we all we we have to um we have to build
3:50
we all we we have to um we have to build
3:50
we all we we have to um we have to build our infrastructure in a frame where we
3:52
our infrastructure in a frame where we
3:52
our infrastructure in a frame where we don't trust any uh hit being uh any
3:57
don't trust any uh hit being uh any
3:57
don't trust any uh hit being uh any authentication or any data or any um
4:00
authentication or any data or any um
4:00
authentication or any data or any um thing which we are using endpoints we
4:02
thing which we are using endpoints we
4:02
thing which we are using endpoints we don't have to uh give any leverage to
4:05
don't have to uh give any leverage to
4:05
don't have to uh give any leverage to anything so we it means we are not
4:07
anything so we it means we are not
4:07
anything so we it means we are not trusting anything anyone any document
4:09
trusting anything anyone any document
4:10
trusting anything anyone any document everything is protected in the
4:11
everything is protected in the
4:11
everything is protected in the organization so building that zero trust
4:13
organization so building that zero trust
4:13
organization so building that zero trust cyber security is is a way to go to
4:15
cyber security is is a way to go to
4:15
cyber security is is a way to go to protect yourself from the cyber attacks
4:18
protect yourself from the cyber attacks
4:18
protect yourself from the cyber attacks so then there are ready to to go like
4:21
so then there are ready to to go like
4:21
so then there are ready to to go like frameworks that that the producers or
4:24
frameworks that that the producers or
4:24
frameworks that that the producers or suppliers have have built and and are
4:26
suppliers have have built and and are
4:26
suppliers have have built and and are maintaining so for example Microsoft
4:28
maintaining so for example Microsoft
4:28
maintaining so for example Microsoft have a a zero trust cyber security
4:30
have a a zero trust cyber security
4:30
have a a zero trust cyber security framework.
4:32
framework. Yeah. So, Microsoft has built a lot of
4:33
Yeah. So, Microsoft has built a lot of
4:34
Yeah. So, Microsoft has built a lot of products which Microsoft in in line in
4:36
products which Microsoft in in line in
4:36
products which Microsoft in in line in that. So, you you can buy those
4:38
that. So, you you can buy those
4:38
that. So, you you can buy those Microsoft products like Microsoft
4:40
Microsoft products like Microsoft
4:40
Microsoft products like Microsoft Defender for endpoints, identity,
4:42
Defender for endpoints, identity,
4:42
Defender for endpoints, identity, security um um and IoT and whatnot cloud
4:47
security um um and IoT and whatnot cloud
4:47
security um um and IoT and whatnot cloud and keep going with that with Sentinel.
4:50
and keep going with that with Sentinel.
4:50
and keep going with that with Sentinel. But I mean again deployment is a key. So
4:53
But I mean again deployment is a key. So
4:53
But I mean again deployment is a key. So overall the identity security, data
4:56
overall the identity security, data
4:56
overall the identity security, data security, network security, um endpoint
4:59
security, network security, um endpoint
4:59
security, network security, um endpoint security basically four main securities
5:03
security basically four main securities
5:03
security basically four main securities if everyone has achieved um then they
5:06
if everyone has achieved um then they
5:06
if everyone has achieved um then they are probably zero trust uh obviously the
5:09
are probably zero trust uh obviously the
5:09
are probably zero trust uh obviously the access from public network should be
5:10
access from public network should be
5:10
access from public network should be blocked and everything. So that that
5:12
blocked and everything. So that that
5:12
blocked and everything. So that that part that's part of network security. So
5:14
part that's part of network security. So
5:14
part that's part of network security. So we help uh we utilize Microsoft
5:16
we help uh we utilize Microsoft
5:16
we help uh we utilize Microsoft framework, Microsoft software and we
5:19
framework, Microsoft software and we
5:19
framework, Microsoft software and we help the companies to implement zero
5:21
help the companies to implement zero
5:21
help the companies to implement zero trust framework uh where they will be
5:23
trust framework uh where they will be
5:23
trust framework uh where they will be pro they will be protected from any
5:25
pro they will be protected from any
5:25
pro they will be protected from any external attacks unless uh obviously I
5:29
external attacks unless uh obviously I
5:29
external attacks unless uh obviously I mean now you when we're talking about
5:31
mean now you when we're talking about
5:31
mean now you when we're talking about this topic it's sometimes it's
5:33
this topic it's sometimes it's
5:33
this topic it's sometimes it's identified as insider is a problem so
5:36
identified as insider is a problem so
5:36
identified as insider is a problem so insider brings or forwards some emails
5:38
insider brings or forwards some emails
5:38
insider brings or forwards some emails himself and those emails have some virus
5:41
himself and those emails have some virus
5:41
himself and those emails have some virus and something they opened up So I mean
5:44
and something they opened up So I mean
5:44
and something they opened up So I mean those are also protected by by the
5:46
those are also protected by by the
5:46
those are also protected by by the defender and other um mechanisms but how
5:50
defender and other um mechanisms but how
5:50
defender and other um mechanisms but how the company policies are restricted
5:52
the company policies are restricted
5:52
the company policies are restricted saying oh you're not allowed that's it
5:55
saying oh you're not allowed that's it
5:55
saying oh you're not allowed that's it or you have a choice you can open it by
5:58
or you have a choice you can open it by
5:58
or you have a choice you can open it by your discretion. So the moment you say
6:00
your discretion. So the moment you say
6:00
your discretion. So the moment you say okay you can open it by your discretion
6:02
okay you can open it by your discretion
6:02
okay you can open it by your discretion that's the challenge that's a risky
6:04
that's the challenge that's a risky
6:04
that's the challenge that's a risky risky statement or we don't allow that's
6:06
risky statement or we don't allow that's
6:06
risky statement or we don't allow that's it block that's zero trust we don't
6:08
it block that's zero trust we don't
6:08
it block that's zero trust we don't trust it
6:09
trust it right so there's a lot of configuration
6:11
right so there's a lot of configuration
6:11
right so there's a lot of configuration and things you can do to to deny um
6:16
and things you can do to to deny um
6:16
and things you can do to to deny um I mean every kind of any kind of attack
6:18
I mean every kind of any kind of attack
6:18
I mean every kind of any kind of attack right
6:18
right like yeah and a lot of companies wants
6:20
like yeah and a lot of companies wants
6:20
like yeah and a lot of companies wants to use USB to do that storage uh as
6:24
to use USB to do that storage uh as
6:24
to use USB to do that storage uh as external storage to take the copy and do
6:27
external storage to take the copy and do
6:27
external storage to take the copy and do the presentation do the sales uh
6:29
the presentation do the sales uh
6:29
the presentation do the sales uh especially for sales team and going to
6:31
especially for sales team and going to
6:31
especially for sales team and going to the customer then we are saying that's
6:33
the customer then we are saying that's
6:33
the customer then we are saying that's very hard to uh protect. So we are
6:35
very hard to uh protect. So we are
6:35
very hard to uh protect. So we are saying okay you what you can do if
6:38
saying okay you what you can do if
6:38
saying okay you what you can do if something is public sharable then send
6:41
something is public sharable then send
6:41
something is public sharable then send it to your public email id and then use
6:43
it to your public email id and then use
6:43
it to your public email id and then use it maybe a public computer which is out
6:46
it maybe a public computer which is out
6:46
it maybe a public computer which is out of network that's the right way to use
6:48
of network that's the right way to use
6:48
of network that's the right way to use it that that's those are security things
6:50
it that that's those are security things
6:50
it that that's those are security things very basic probably everyone knows but
6:53
very basic probably everyone knows but
6:53
very basic probably everyone knows but don't follow that's where we have to
6:55
don't follow that's where we have to
6:55
don't follow that's where we have to build a framework and start adding
6:57
build a framework and start adding
6:57
build a framework and start adding everything there and today we are
6:59
everything there and today we are
6:59
everything there and today we are selling that uh product and uh services
7:01
selling that uh product and uh services
7:01
selling that uh product and uh services implementing that
7:03
implementing that right so tell me typically if somebody
7:05
right so tell me typically if somebody
7:05
right so tell me typically if somebody wants to like get into this. Now, I I
7:08
wants to like get into this. Now, I I
7:08
wants to like get into this. Now, I I assume if you're a large company, you
7:09
assume if you're a large company, you
7:09
assume if you're a large company, you should already be doing it. But but then
7:12
should already be doing it. But but then
7:12
should already be doing it. But but then again, I also assume you have you have
7:14
again, I also assume you have you have
7:14
again, I also assume you have you have plenty of customers that you you find
7:16
plenty of customers that you you find
7:16
plenty of customers that you you find that they they need to like improve
7:18
that they they need to like improve
7:18
that they they need to like improve their their security posture is not zero
7:21
their their security posture is not zero
7:21
their their security posture is not zero trust. It's not complete. It's not set
7:22
trust. It's not complete. It's not set
7:22
trust. It's not complete. It's not set up properly. What does it entail then to
7:26
up properly. What does it entail then to
7:26
up properly. What does it entail then to to get to such a point where you are
7:29
to get to such a point where you are
7:29
to get to such a point where you are where where you feel uh secure enough,
7:31
where where you feel uh secure enough,
7:31
where where you feel uh secure enough, if you will?
7:32
if you will? Yeah, this is uh this is a hard uh thing
7:35
Yeah, this is uh this is a hard uh thing
7:35
Yeah, this is uh this is a hard uh thing to sell. Uh if if you are just stepping
7:40
to sell. Uh if if you are just stepping
7:40
to sell. Uh if if you are just stepping into a new uh customer place and say hey
7:43
into a new uh customer place and say hey
7:43
into a new uh customer place and say hey are you cyber secure? Uh first reply
7:46
are you cyber secure? Uh first reply
7:46
are you cyber secure? Uh first reply comes yeah we are we are using Microsoft
7:48
comes yeah we are we are using Microsoft
7:48
comes yeah we are we are using Microsoft we are secure everything is well done
7:51
we are secure everything is well done
7:51
we are secure everything is well done perfect
7:52
perfect and next thing I hear is oh after two
7:54
and next thing I hear is oh after two
7:54
and next thing I hear is oh after two days or two months they have been hit by
7:57
days or two months they have been hit by
7:57
days or two months they have been hit by a ransomware attack they had a data loss
7:59
a ransomware attack they had a data loss
7:59
a ransomware attack they had a data loss and everything or different places some
8:01
and everything or different places some
8:01
and everything or different places some everything got wiped off or they are
8:03
everything got wiped off or they are
8:03
everything got wiped off or they are going to pay ransom and that's where I
8:06
going to pay ransom and that's where I
8:06
going to pay ransom and that's where I that's when I say didn't didn't we
8:09
that's when I say didn't didn't we
8:09
that's when I say didn't didn't we talked about it and you said
8:10
talked about it and you said
8:10
talked about it and you said everything's safe and secure and now
8:12
everything's safe and secure and now
8:12
everything's safe and secure and now you're you're you're attacked
8:15
you're you're you're attacked
8:15
you're you're you're attacked and uh then they have no answer but uh
8:18
and uh then they have no answer but uh
8:18
and uh then they have no answer but uh that tells the real story. So what we
8:21
that tells the real story. So what we
8:21
that tells the real story. So what we what we always suggest to anyone is um
8:24
what we always suggest to anyone is um
8:24
what we always suggest to anyone is um let's go for a cyber security assessment
8:27
let's go for a cyber security assessment
8:27
let's go for a cyber security assessment that will tell you that okay what are
8:30
that will tell you that okay what are
8:30
that will tell you that okay what are the gaps what are the open points where
8:32
the gaps what are the open points where
8:32
the gaps what are the open points where the possible leaks can happen and uh you
8:34
the possible leaks can happen and uh you
8:34
the possible leaks can happen and uh you can get a hit. If uh they accept that
8:37
can get a hit. If uh they accept that
8:37
can get a hit. If uh they accept that that's where they it's a starting point
8:40
that's where they it's a starting point
8:40
that's where they it's a starting point and uh it has it has to be run by an
8:42
and uh it has it has to be run by an
8:42
and uh it has it has to be run by an external party who is who has some more
8:45
external party who is who has some more
8:45
external party who is who has some more interest in knowing the things and gaps
8:48
interest in knowing the things and gaps
8:48
interest in knowing the things and gaps not by the insider insider knows okay my
8:51
not by the insider insider knows okay my
8:51
not by the insider insider knows okay my CEO asked for an exception outsider
8:54
CEO asked for an exception outsider
8:54
CEO asked for an exception outsider don't know who is the CEO or who has
8:57
don't know who is the CEO or who has
8:57
don't know who is the CEO or who has asked for so
8:59
asked for so yeah I agree with that because it's it's
9:00
yeah I agree with that because it's it's
9:00
yeah I agree with that because it's it's it's what they say right you you make
9:03
it's what they say right you you make
9:03
it's what they say right you you make the the absolute worst tester of your
9:05
the the absolute worst tester of your
9:05
the the absolute worst tester of your own things, right?
9:06
own things, right? Yes.
9:07
Yes. Because you know exactly how how your
9:09
Because you know exactly how how your
9:09
Because you know exactly how how your own things are set up. If if you need to
9:11
own things are set up. If if you need to
9:11
own things are set up. If if you need to like
9:12
like walk a specific path to get around a
9:14
walk a specific path to get around a
9:14
walk a specific path to get around a problem, you know how to do that. But as
9:15
problem, you know how to do that. But as
9:15
problem, you know how to do that. But as a external tester, you'll just charge
9:18
a external tester, you'll just charge
9:18
a external tester, you'll just charge right in and and you'll hit the problem.
9:20
right in and and you'll hit the problem.
9:20
right in and and you'll hit the problem. Right.
9:22
Exactly. So that that's that's our that's our
9:24
So that that's that's our that's our
9:24
So that that's that's our that's our focus which we recommend. That's a
9:26
focus which we recommend. That's a
9:26
focus which we recommend. That's a starting point. And in the cyber
9:28
starting point. And in the cyber
9:28
starting point. And in the cyber security space, man, a lot of things to
9:30
security space, man, a lot of things to
9:30
security space, man, a lot of things to be done. It's not is not ready. No one
9:32
be done. It's not is not ready. No one
9:32
be done. It's not is not ready. No one is ready. And now uh technology is is
9:35
is ready. And now uh technology is is
9:35
is ready. And now uh technology is is pushing them to go to towards AI. You
9:37
pushing them to go to towards AI. You
9:38
pushing them to go to towards AI. You know that's that's that's becoming more
9:40
know that's that's that's becoming more
9:40
know that's that's that's becoming more risky. And you you might have heard all
9:42
risky. And you you might have heard all
9:42
risky. And you you might have heard all the stories that hey AI we adopted the
9:45
the stories that hey AI we adopted the
9:45
the stories that hey AI we adopted the AI and AI destroyed everything in the
9:47
AI and AI destroyed everything in the
9:47
AI and AI destroyed everything in the company or AI took over uh their company
9:51
company or AI took over uh their company
9:51
company or AI took over uh their company not following the owner's guidance. So
9:54
not following the owner's guidance. So
9:54
not following the owner's guidance. So all kind of stories I'm listening all
9:57
all kind of stories I'm listening all
9:57
all kind of stories I'm listening all kind of impersonations happening today's
9:59
kind of impersonations happening today's
9:59
kind of impersonations happening today's in today's world. Someone may call me
10:01
in today's world. Someone may call me
10:01
in today's world. Someone may call me tomorrow as Magnus and I say, "Hey,
10:03
tomorrow as Magnus and I say, "Hey,
10:03
tomorrow as Magnus and I say, "Hey, Prabat, I need a help of $5,000." I know
10:07
Prabat, I need a help of $5,000." I know
10:07
Prabat, I need a help of $5,000." I know Magnus very well. I know this face very
10:09
Magnus very well. I know this face very
10:09
Magnus very well. I know this face very well. So, if someone comes with looking
10:11
well. So, if someone comes with looking
10:11
well. So, if someone comes with looking like you, yeah, maybe I'll transfer and
10:14
like you, yeah, maybe I'll transfer and
10:14
like you, yeah, maybe I'll transfer and uh but but that's where that's where the
10:16
uh but but that's where that's where the
10:16
uh but but that's where that's where the challenge is. So, no, I will better
10:18
challenge is. So, no, I will better
10:18
challenge is. So, no, I will better maybe verify that that's that's a better
10:20
maybe verify that that's that's a better
10:20
maybe verify that that's that's a better thing. I double check. Come on, man. You
10:23
thing. I double check. Come on, man. You
10:23
thing. I double check. Come on, man. You live in a in in Sweden. Um, and uh,
10:28
live in a in in Sweden. Um, and uh,
10:28
live in a in in Sweden. Um, and uh, yeah, you have, you had money and all of
10:30
yeah, you have, you had money and all of
10:30
yeah, you have, you had money and all of a sudden, how come you be bankrupt or
10:32
a sudden, how come you be bankrupt or
10:32
a sudden, how come you be bankrupt or something? You're asking,
10:32
something? You're asking,
10:32
something? You're asking, you know what, I could use $5,000. I'm
10:35
you know what, I could use $5,000. I'm
10:35
you know what, I could use $5,000. I'm just saying.
10:36
just saying. Yeah. Yeah. But I'm saying is it might
10:38
Yeah. Yeah. But I'm saying is it might
10:38
Yeah. Yeah. But I'm saying is it might not be you. It might go to someone
10:40
not be you. It might go to someone
10:40
not be you. It might go to someone else's bank account. True.
10:41
else's bank account. True.
10:41
else's bank account. True. That's the problem. That's it's not
10:43
That's the problem. That's it's not
10:43
That's the problem. That's it's not about giving you $5,000, you know. So
10:46
about giving you $5,000, you know. So
10:46
about giving you $5,000, you know. So it's it's a new landscape out there with
10:47
it's it's a new landscape out there with
10:47
it's it's a new landscape out there with the ai stuff because obviously um the
10:52
the ai stuff because obviously um the
10:52
the ai stuff because obviously um the latest technology has always been used
10:55
latest technology has always been used
10:55
latest technology has always been used by cyber criminals always.
10:57
by cyber criminals always.
10:57
by cyber criminals always. So great strides for humanity like AI
11:02
So great strides for humanity like AI
11:02
So great strides for humanity like AI well you better believe that the bad
11:03
well you better believe that the bad
11:03
well you better believe that the bad guys will be using it too even more so
11:05
guys will be using it too even more so
11:06
guys will be using it too even more so than many of us maybe.
11:07
than many of us maybe.
11:08
than many of us maybe. Yeah. So uh nowadays it's a profession.
11:11
Yeah. So uh nowadays it's a profession.
11:11
Yeah. So uh nowadays it's a profession. It's a job. It's a legitimate job.
11:13
It's a job. It's a legitimate job.
11:13
It's a job. It's a legitimate job. Probably we know someone who is a who's
11:16
Probably we know someone who is a who's
11:16
Probably we know someone who is a who's working in those industries where they
11:19
working in those industries where they
11:19
working in those industries where they are they are hacking. Um you know always
11:22
are they are hacking. Um you know always
11:22
are they are hacking. Um you know always there used to be a saying in the past is
11:26
there used to be a saying in the past is
11:26
there used to be a saying in the past is like okay th these all antivirus
11:28
like okay th these all antivirus
11:28
like okay th these all antivirus companies may be producing the virus and
11:31
companies may be producing the virus and
11:31
companies may be producing the virus and then they are releasing the antivirus so
11:33
then they are releasing the antivirus so
11:33
then they are releasing the antivirus so that their antivirus would be sold.
11:35
that their antivirus would be sold.
11:35
that their antivirus would be sold. That's that's has been in the past
11:36
That's that's has been in the past
11:36
That's that's has been in the past saying there's no proof about it.
11:38
saying there's no proof about it.
11:38
saying there's no proof about it. There's no uh literal uh any validation
11:42
There's no uh literal uh any validation
11:42
There's no uh literal uh any validation about it. But this is this has been
11:43
about it. But this is this has been
11:44
about it. But this is this has been saying so you you never know that's
11:45
saying so you you never know that's
11:45
saying so you you never know that's that's the point. Maybe someone out of
11:48
that's the point. Maybe someone out of
11:48
that's the point. Maybe someone out of three friends of ours maybe one of them
11:50
three friends of ours maybe one of them
11:50
three friends of ours maybe one of them is working for a hacking company who's
11:52
is working for a hacking company who's
11:52
is working for a hacking company who's hacking the things.
11:54
hacking the things. I know a couple of ethical hackers
11:56
I know a couple of ethical hackers
11:56
I know a couple of ethical hackers though, but I mean they're supposed to
11:57
though, but I mean they're supposed to
11:57
though, but I mean they're supposed to be the good guys. So I don't know that I
12:00
be the good guys. So I don't know that I
12:00
be the good guys. So I don't know that I know any any any real hackers uh out
12:02
know any any any real hackers uh out
12:02
know any any any real hackers uh out there. But let's be let's be a little
12:04
there. But let's be let's be a little
12:04
there. But let's be let's be a little practical here if we can for the with
12:06
practical here if we can for the with
12:06
practical here if we can for the with the limited time that we have. Again, if
12:08
the limited time that we have. Again, if
12:08
the limited time that we have. Again, if if a company wants to get into this like
12:10
if a company wants to get into this like
12:10
if a company wants to get into this like technically they would uh either have a
12:13
technically they would uh either have a
12:13
technically they would uh either have a problem already or they you know
12:15
problem already or they you know
12:15
problem already or they you know preferably they are want to do a checkup
12:17
preferably they are want to do a checkup
12:17
preferably they are want to do a checkup before they have a major problem.
12:20
before they have a major problem.
12:20
before they have a major problem. Absolutely. They should be they should
12:21
Absolutely. They should be they should
12:21
Absolutely. They should be they should be looking uh they should be um starting
12:26
be looking uh they should be um starting
12:26
be looking uh they should be um starting way before uh rather rather than having
12:28
way before uh rather rather than having
12:28
way before uh rather rather than having a problem. They should be look for
12:30
a problem. They should be look for
12:30
a problem. They should be look for compliance. I think compliance pushes a
12:33
compliance. I think compliance pushes a
12:33
compliance. I think compliance pushes a lot of uh security uh things. For
12:36
lot of uh security uh things. For
12:36
lot of uh security uh things. For example, right now we are helping a DoD
12:38
example, right now we are helping a DoD
12:38
example, right now we are helping a DoD contractors. We are a Microsoft AOSG
12:40
contractors. We are a Microsoft AOSG
12:40
contractors. We are a Microsoft AOSG partner which is a designation for um do
12:44
partner which is a designation for um do
12:44
partner which is a designation for um do for Microsoft GCC high and DoD licensing
12:48
for Microsoft GCC high and DoD licensing
12:48
for Microsoft GCC high and DoD licensing uh in USA. So we are reselling that.
12:50
uh in USA. So we are reselling that.
12:50
uh in USA. So we are reselling that. Along with that we learned that Micros
12:53
Along with that we learned that Micros
12:53
Along with that we learned that Micros um DoD released a new compliance in
12:57
um DoD released a new compliance in
12:57
um DoD released a new compliance in December last year. So that compliance
12:59
December last year. So that compliance
12:59
December last year. So that compliance our team is helping uh customers to
13:02
our team is helping uh customers to
13:02
our team is helping uh customers to implement DoD contractors to implement.
13:04
implement DoD contractors to implement.
13:04
implement DoD contractors to implement. So what it brings up it brings up ex
13:07
So what it brings up it brings up ex
13:07
So what it brings up it brings up ex almost everything in the zero trust
13:09
almost everything in the zero trust
13:09
almost everything in the zero trust framework. So you know you make your um
13:13
framework. So you know you make your um
13:13
framework. So you know you make your um identity secure you may with the multi
13:16
identity secure you may with the multi
13:16
identity secure you may with the multi for MFA or other other provisions also
13:20
for MFA or other other provisions also
13:20
for MFA or other other provisions also even with MFA the the point is if I'm
13:22
even with MFA the the point is if I'm
13:22
even with MFA the the point is if I'm logging in from different places Sweden,
13:25
logging in from different places Sweden,
13:25
logging in from different places Sweden, India, USA together at one point of time
13:28
India, USA together at one point of time
13:28
India, USA together at one point of time it might not be the same person. There's
13:29
it might not be the same person. There's
13:29
it might not be the same person. There's no there's no way possible. I'll be
13:31
no there's no way possible. I'll be
13:31
no there's no way possible. I'll be there in three places except I mean we
13:33
there in three places except I mean we
13:33
there in three places except I mean we have a virtual virtual environment so we
13:35
have a virtual virtual environment so we
13:35
have a virtual virtual environment so we can try to
13:37
can try to but yeah that's most likely it's not
13:39
but yeah that's most likely it's not
13:39
but yeah that's most likely it's not possible. So that's where the risky
13:41
possible. So that's where the risky
13:41
possible. So that's where the risky signins can be helpful which will
13:43
signins can be helpful which will
13:43
signins can be helpful which will autoblock the access saying that hey
13:46
autoblock the access saying that hey
13:46
autoblock the access saying that hey validate it it's not doesn't sound right
13:49
validate it it's not doesn't sound right
13:49
validate it it's not doesn't sound right at one point of time how can you log in
13:50
at one point of time how can you log in
13:50
at one point of time how can you log in from three different locations.
13:52
from three different locations.
13:52
from three different locations. Exactly. And then
13:53
Exactly. And then and then then then then you move to I
13:55
and then then then then you move to I
13:55
and then then then then you move to I mean all those these are the things
13:56
mean all those these are the things
13:56
mean all those these are the things which you implement with the um cyber
13:58
which you implement with the um cyber
13:58
which you implement with the um cyber security framework or um with zero trust
14:02
security framework or um with zero trust
14:02
security framework or um with zero trust in the compliance. So yeah, Kickstart
14:04
in the compliance. So yeah, Kickstart
14:04
in the compliance. So yeah, Kickstart point is a user um compliance. Uh you
14:08
point is a user um compliance. Uh you
14:08
point is a user um compliance. Uh you may go for CMMC, NIST, HIPPA. Um
14:12
may go for CMMC, NIST, HIPPA. Um
14:12
may go for CMMC, NIST, HIPPA. Um right,
14:13
right, that's will be
14:14
that's will be there are all of these compliancy levels
14:15
there are all of these compliancy levels
14:16
there are all of these compliancy levels and and some of them depending on what
14:17
and and some of them depending on what
14:17
and and some of them depending on what business you're in and what you do, you
14:19
business you're in and what you do, you
14:19
business you're in and what you do, you you are required to
14:21
you are required to get the like the seal of approval uh for
14:24
get the like the seal of approval uh for
14:24
get the like the seal of approval uh for that. You're required to follow the
14:27
that. You're required to follow the
14:27
that. You're required to follow the standards, right?
14:28
standards, right? Yeah. uh obviously the industry required
14:30
Yeah. uh obviously the industry required
14:30
Yeah. uh obviously the industry required you to follow the standards otherwise
14:32
you to follow the standards otherwise
14:32
you to follow the standards otherwise you cannot do business with different
14:33
you cannot do business with different
14:33
you cannot do business with different different team different companies. So
14:35
different team different companies. So
14:35
different team different companies. So like talking about like I was talking
14:37
like talking about like I was talking
14:37
like talking about like I was talking about DoD uh so if you have to work with
14:39
about DoD uh so if you have to work with
14:39
about DoD uh so if you have to work with DoD uh starting October I think the um
14:43
DoD uh starting October I think the um
14:43
DoD uh starting October I think the um contract will have the mandatory
14:45
contract will have the mandatory
14:45
contract will have the mandatory requirement for CMC compliance. Same way
14:48
requirement for CMC compliance. Same way
14:48
requirement for CMC compliance. Same way in in theos hospital hospital or medical
14:50
in in theos hospital hospital or medical
14:50
in in theos hospital hospital or medical industry hospitals I can imagine. Yeah
14:55
industry hospitals I can imagine. Yeah
14:55
industry hospitals I can imagine. Yeah very high bar. So, so essentially any
14:57
very high bar. So, so essentially any
14:57
very high bar. So, so essentially any any business that wants to to do
14:59
any business that wants to to do
14:59
any business that wants to to do business with these uh with these
15:01
business with these uh with these
15:01
business with these uh with these entities, they have to have the the
15:03
entities, they have to have the the
15:03
entities, they have to have the the compliancy standards and then they have
15:05
compliancy standards and then they have
15:05
compliancy standards and then they have to have like an audit and stuff, right?
15:08
to have like an audit and stuff, right?
15:08
to have like an audit and stuff, right? Yeah. And uh more or less almost every
15:11
Yeah. And uh more or less almost every
15:11
Yeah. And uh more or less almost every compliance what I what they ask you
15:13
compliance what I what they ask you
15:13
compliance what I what they ask you protect your identity uh protect your
15:15
protect your identity uh protect your
15:15
protect your identity uh protect your data with encryption data loss
15:17
data with encryption data loss
15:17
data with encryption data loss prevention and uh you know protect your
15:20
prevention and uh you know protect your
15:20
prevention and uh you know protect your computer uh with the different you know
15:23
computer uh with the different you know
15:23
computer uh with the different you know uh like Microsoft defender is the best I
15:25
uh like Microsoft defender is the best I
15:25
uh like Microsoft defender is the best I would say uh using that and that reports
15:27
would say uh using that and that reports
15:27
would say uh using that and that reports the portal and everything it pushes. So
15:29
the portal and everything it pushes. So
15:30
the portal and everything it pushes. So use that kind of product so that or also
15:32
use that kind of product so that or also
15:32
use that kind of product so that or also device management using in tune. So that
15:35
device management using in tune. So that
15:35
device management using in tune. So that will all add together that anytime even
15:37
will all add together that anytime even
15:37
will all add together that anytime even if you lost device it is not you're not
15:40
if you lost device it is not you're not
15:40
if you lost device it is not you're not losing any data.
15:42
losing any data. So all those
15:43
So all those that's right
15:44
that's right these are the common protections which
15:46
these are the common protections which
15:46
these are the common protections which are guided in every compliance if you
15:49
are guided in every compliance if you
15:49
are guided in every compliance if you pick anything. So that's a starting
15:51
pick anything. So that's a starting
15:51
pick anything. So that's a starting point start
15:52
point start right. So technically you go in and
15:54
right. So technically you go in and
15:54
right. So technically you go in and check that they are following all these
15:56
check that they are following all these
15:56
check that they are following all these things and and you also then like ensure
15:58
things and and you also then like ensure
15:58
things and and you also then like ensure that their configuration of their things
16:00
that their configuration of their things
16:00
that their configuration of their things is is in proper order and so forth.
16:03
is is in proper order and so forth.
16:03
is is in proper order and so forth. Absolutely. So yeah we when when we are
16:06
Absolutely. So yeah we when when we are
16:06
Absolutely. So yeah we when when we are engaged we look to see okay what
16:07
engaged we look to see okay what
16:07
engaged we look to see okay what compliance you're using oh this is this
16:10
compliance you're using oh this is this
16:10
compliance you're using oh this is this doesn't look like you're using when we
16:12
doesn't look like you're using when we
16:12
doesn't look like you're using when we run the assessment we look to see
16:14
run the assessment we look to see
16:14
run the assessment we look to see different uh portion of it onromises
16:17
different uh portion of it onromises
16:17
different uh portion of it onromises cloud if most likely we recommend to s
16:21
cloud if most likely we recommend to s
16:21
cloud if most likely we recommend to s uh to lower the their IT boundaries uh
16:24
uh to lower the their IT boundaries uh
16:24
uh to lower the their IT boundaries uh so the bigger the boundary bigger the
16:26
so the bigger the boundary bigger the
16:26
so the bigger the boundary bigger the compliance investment would be so it's
16:29
compliance investment would be so it's
16:29
compliance investment would be so it's better to be lower down uh move uh move
16:32
better to be lower down uh move uh move
16:32
better to be lower down uh move uh move the data to shareepoint online or uh
16:35
the data to shareepoint online or uh
16:35
the data to shareepoint online or uh move the um computers or servers to
16:37
move the um computers or servers to
16:38
move the um computers or servers to Azure uh so that you don't have to worry
16:39
Azure uh so that you don't have to worry
16:39
Azure uh so that you don't have to worry about data center data center hacked as
16:42
about data center data center hacked as
16:42
about data center data center hacked as data center can be attacked by physical
16:44
data center can be attacked by physical
16:44
data center can be attacked by physical local people as well. So those risks are
16:46
local people as well. So those risks are
16:46
local people as well. So those risks are gone. I mean just think those things um
16:50
gone. I mean just think those things um
16:50
gone. I mean just think those things um in in in LA in LA a lot of vandalization
16:52
in in in LA in LA a lot of vandalization
16:52
in in in LA in LA a lot of vandalization happening a lot of loots happening. So
16:55
happening a lot of loots happening. So
16:55
happening a lot of loots happening. So we we are trying those are other
16:58
we we are trying those are other
16:58
we we are trying those are other physical concerns physical risk as well.
17:00
physical concerns physical risk as well.
17:00
physical concerns physical risk as well. So yeah
17:01
So yeah uh those yeah assessment boundaries that
17:04
uh those yeah assessment boundaries that
17:04
uh those yeah assessment boundaries that that should be reduced um ID boundaries
17:07
that should be reduced um ID boundaries
17:07
that should be reduced um ID boundaries should be reduced that's that's another
17:09
should be reduced that's that's another
17:09
should be reduced that's that's another point we are making today. Yeah, that's
17:12
point we are making today. Yeah, that's
17:12
point we are making today. Yeah, that's how we start to see where are they and
17:14
how we start to see where are they and
17:14
how we start to see where are they and then where do where they should be with
17:16
then where do where they should be with
17:16
then where do where they should be with the benchmark and we try to help them
17:19
the benchmark and we try to help them
17:19
the benchmark and we try to help them achieve that.
17:21
achieve that. I understand. Yeah. So technically
17:23
I understand. Yeah. So technically
17:23
I understand. Yeah. So technically people should um know u a company should
17:26
people should um know u a company should
17:26
people should um know u a company should know what what standards they they need
17:28
know what what standards they they need
17:28
know what what standards they they need to live up to and and if they can't um
17:30
to live up to and and if they can't um
17:30
to live up to and and if they can't um fix that themsel or maybe even
17:32
fix that themsel or maybe even
17:32
fix that themsel or maybe even preferably they should go and and uh
17:35
preferably they should go and and uh
17:35
preferably they should go and and uh ensure they have someone um an expert
17:38
ensure they have someone um an expert
17:38
ensure they have someone um an expert who does it from the external because
17:40
who does it from the external because
17:40
who does it from the external because then they won't you know the expert will
17:43
then they won't you know the expert will
17:43
then they won't you know the expert will not have your uh pretty bad um personal
17:47
not have your uh pretty bad um personal
17:47
not have your uh pretty bad um personal like if it's my company I know where all
17:49
like if it's my company I know where all
17:49
like if it's my company I know where all the problems are right I I I'm I'm not a
17:52
the problems are right I I I'm I'm not a
17:52
the problems are right I I I'm I'm not a good tester. I'm not, you know, going to
17:55
good tester. I'm not, you know, going to
17:55
good tester. I'm not, you know, going to be able to do this this work properly,
17:57
be able to do this this work properly,
17:57
be able to do this this work properly, right?
17:58
right? Yeah. Uh external MSSP sock services
18:01
Yeah. Uh external MSSP sock services
18:01
Yeah. Uh external MSSP sock services should be adopted uh so that someone is
18:04
should be adopted uh so that someone is
18:04
should be adopted uh so that someone is watching your alerts 24 by7 providing
18:08
watching your alerts 24 by7 providing
18:08
watching your alerts 24 by7 providing cyber security yearly uh security
18:11
cyber security yearly uh security
18:11
cyber security yearly uh security assessments, penetration testing,
18:13
assessments, penetration testing,
18:13
assessments, penetration testing, vulnerability assessments. These are the
18:15
vulnerability assessments. These are the
18:15
vulnerability assessments. These are the common things everyone should adopt in
18:17
common things everyone should adopt in
18:17
common things everyone should adopt in the IT world. Now, where are we heading?
18:20
the IT world. Now, where are we heading?
18:20
the IT world. Now, where are we heading? That's the point. Uh unless if there's a
18:23
That's the point. Uh unless if there's a
18:23
That's the point. Uh unless if there's a there's a company which is running IT
18:25
there's a company which is running IT
18:25
there's a company which is running IT shop in just in one room, they're not
18:28
shop in just in one room, they're not
18:28
shop in just in one room, they're not going out just sending the emails
18:29
going out just sending the emails
18:29
going out just sending the emails outside. That's a different scenario.
18:31
outside. That's a different scenario.
18:32
outside. That's a different scenario. But
18:33
yeah. Yeah. Which is which is not today's IT. I
18:35
Which is which is not today's IT. I
18:35
Which is which is not today's IT. I think most
18:36
think most No, it's not. I mean I definitely AI has
18:39
No, it's not. I mean I definitely AI has
18:39
No, it's not. I mean I definitely AI has I'm I'm glad you brought that up in this
18:40
I'm I'm glad you brought that up in this
18:40
I'm I'm glad you brought that up in this show today that that about this AI
18:42
show today that that about this AI
18:42
show today that that about this AI business because it is is most certainly
18:45
business because it is is most certainly
18:45
business because it is is most certainly changing things. I have I have uh
18:47
changing things. I have I have uh
18:48
changing things. I have I have uh effectively been able to and and and
18:49
effectively been able to and and and
18:49
effectively been able to and and and maybe I'm the hacker. No, I'm not. But
18:51
maybe I'm the hacker. No, I'm not. But
18:51
maybe I'm the hacker. No, I'm not. But but I can actually ask stuff like chat
18:54
but I can actually ask stuff like chat
18:54
but I can actually ask stuff like chat GPT, you know, provide me the hack for
18:57
GPT, you know, provide me the hack for
18:57
GPT, you know, provide me the hack for so and so and and they can chat GTP can
19:00
so and so and and they can chat GTP can
19:00
so and so and and they can chat GTP can literally just give me a script. Hey,
19:01
literally just give me a script. Hey,
19:02
literally just give me a script. Hey, run this.
19:03
run this. Yeah, it does. It does.
19:05
Yeah, it does. It does.
19:05
Yeah, it does. It does. That's how that's how super simple this
19:08
That's how that's how super simple this
19:08
That's how that's how super simple this has become, right? To use
19:10
has become, right? To use
19:10
has become, right? To use my team reported that. I was like my
19:12
my team reported that. I was like my
19:12
my team reported that. I was like my team reported that. I was I was excited
19:14
team reported that. I was I was excited
19:14
team reported that. I was I was excited to see that. I'm like, "Okay, show me
19:16
to see that. I'm like, "Okay, show me
19:16
to see that. I'm like, "Okay, show me that how it writes and everything."
19:18
that how it writes and everything."
19:18
that how it writes and everything." Literally wrote that and it's definitely
19:21
Literally wrote that and it's definitely
19:21
Literally wrote that and it's definitely looking into the internet and copying
19:23
looking into the internet and copying
19:23
looking into the internet and copying the commands from there. So, um yeah. Um
19:28
the commands from there. So, um yeah. Um
19:28
the commands from there. So, um yeah. Um so the point was that zero trust is is a
19:30
so the point was that zero trust is is a
19:30
so the point was that zero trust is is a point. So don't trust on anyone
19:33
point. So don't trust on anyone
19:33
point. So don't trust on anyone mean that your friend is a hacker or my
19:34
mean that your friend is a hacker or my
19:34
mean that your friend is a hacker or my friend is a hacker but uh it it is
19:37
friend is a hacker but uh it it is
19:37
friend is a hacker but uh it it is possible because that's also a good that
19:39
possible because that's also a good that
19:40
possible because that's also a good that al that is also a profession. It's no
19:42
al that is also a profession. It's no
19:42
al that is also a profession. It's no more a hidden job. It may not be
19:44
more a hidden job. It may not be
19:44
more a hidden job. It may not be published uh widely but they there are
19:47
published uh widely but they there are
19:47
published uh widely but they there are people who are working uh eight hours in
19:50
people who are working uh eight hours in
19:50
people who are working uh eight hours in that in those places as well. So they
19:52
that in those places as well. So they
19:52
that in those places as well. So they are not
19:52
are not Yeah definitely to to work with hacking.
19:55
Yeah definitely to to work with hacking.
19:55
Yeah definitely to to work with hacking. Yeah. Yeah. Yeah. For sure. So um listen
19:59
Yeah. Yeah. Yeah. For sure. So um listen
19:59
Yeah. Yeah. Yeah. For sure. So um listen I think we covered a lot of ground here
20:00
I think we covered a lot of ground here
20:00
I think we covered a lot of ground here today and this is a huge topic. We could
20:02
today and this is a huge topic. We could
20:02
today and this is a huge topic. We could probably talk about this for hours but
20:04
probably talk about this for hours but
20:04
probably talk about this for hours but unfortunately as usual this these uh
20:07
unfortunately as usual this these uh
20:07
unfortunately as usual this these uh show episodes are quite short. So we are
20:10
show episodes are quite short. So we are
20:10
show episodes are quite short. So we are um wrapping it up. Um but uh it is more
20:13
um wrapping it up. Um but uh it is more
20:13
um wrapping it up. Um but uh it is more important than ever to be uh secure
20:17
important than ever to be uh secure
20:17
important than ever to be uh secure because AI is is making things uh you
20:20
because AI is is making things uh you
20:20
because AI is is making things uh you know more brittle potentially more
20:23
know more brittle potentially more
20:23
know more brittle potentially more challen like anyone can hack now
20:25
challen like anyone can hack now
20:25
challen like anyone can hack now uh so cyber uh cyber security frameworks
20:28
uh so cyber uh cyber security frameworks
20:28
uh so cyber uh cyber security frameworks and zero trust policies that's where you
20:31
and zero trust policies that's where you
20:31
and zero trust policies that's where you should be going if you don't have that
20:33
should be going if you don't have that
20:33
should be going if you don't have that under control that's what you should be
20:34
under control that's what you should be
20:34
under control that's what you should be doing right
20:35
doing right yes absolutely
20:36
yes absolutely that's the conclusion of today super hey
20:39
that's the conclusion of today super hey
20:39
that's the conclusion of today super hey I want to thank you prabat for being on
20:41
I want to thank you prabat for being on
20:41
I want to thank you prabat for being on the show today. It was really nice to
20:42
the show today. It was really nice to
20:42
the show today. It was really nice to have you and you know you should come
20:44
have you and you know you should come
20:44
have you and you know you should come back sometime and talk about something
20:45
back sometime and talk about something
20:45
back sometime and talk about something else.
20:46
else. Absolutely Magnus. It was fun being
20:48
Absolutely Magnus. It was fun being
20:48
Absolutely Magnus. It was fun being here. It was nice and I think 20 minutes
20:50
here. It was nice and I think 20 minutes
20:50
here. It was nice and I think 20 minutes pass in 20 seconds. So
20:52
pass in 20 seconds. So
20:52
pass in 20 seconds. So I know that's that's that's terrible but
20:55
I know that's that's that's terrible but
20:55
I know that's that's that's terrible but that's how it goes and uh the audience
20:57
that's how it goes and uh the audience
20:57
that's how it goes and uh the audience appreciates the the format. So audience
21:00
appreciates the the format. So audience
21:00
appreciates the the format. So audience thank you for listening today. We will
21:03
thank you for listening today. We will
21:03
thank you for listening today. We will see you next time on the cloud show.
21:06
see you next time on the cloud show.
21:06
see you next time on the cloud show. All right.