Narrator: You're listening to the Humans of DevOps Podcast, a
podcast focused on advancing the humans of DevOps through skills,
knowledge, ideas and learning, or the SKIL Framework.
Brian Smith: In a lot of companies they see the CISOs.
They were doing all this, but there's this DevOps group over
here, and I'm not quite sure what they're doing, I fully
understand it and so bridging that gap, I think is sort of
where a lot of companies are fairly immature.
Eveline Oehrlich: Hello, all this is Eveline Oehrlich, Chief
Research Officer at DevOps Institute, and this is the
Humans of DevOps Podcast. We are excited to have a wonderful
gentleman with us today, Brian Smith. But before I introduce
Brian, to you, the title of our episode today is the Importance
of Humans in Cybersecurity. As you all know, we're focusing
much on the human angle within DevOps and and the greater
topic. So welcome, Brian. Hello, there.
Brian Smith: Hi, It's great to be here. Thanks for Thanks for
having me.
Eveline Oehrlich: Thanks for taking the time out of your busy
day to come to us and speak with us and me quizzing you on a
variety of things. So let me, to our audience, introduce Brian a
little bit here. There's a lot of things I will read because I
cannot remember them all. So Brian Smith is a 20 year
veteran, an entrepreneur in multimedia, cybersecurity, and
technologies alike. He is co founder and CTO at Spyderbat, an
automated runtime security platform, we'll talk a little
bit about Spyderbat in a minute. spider bit Just quickly, stops
attacks and automates root cause analysis on cloud native
environments by proactively recording cloud systems and
container activities into a living Google Map. That sounds
very intriguing. So Brian has some background here and
technologies in 2000, Brian founded in conjunction with
somebody else, tipping point technologies, which was acquired
by three come. Then in 2009. He founded click Security acquired
by alert logic. I remember those guys, that's exactly the time
when I was thinking about going into security, but I stayed in
doing infrastructure and operations at my former company.
Brian has a PhD in Computer Science from the University of
California at Berkeley, and in 1994, and was the Xerox
Professor of Computer Science at Cornell University until 1998.
I'm sure maybe there are some former students of yours, Brian,
who are listening in wouldn't that be super? And he holds 13.
One three patents and is a fellow of the Alfred P. Sloan
Foundation. Fantastic. This reads wonderful, Brian, we're
excited to have you here. My first question, I have to ask
this Spyderbat. That's quite a name of a company. So first, how
did you come up with this name? And second, tell us a little bit
more about Spyderbat?
Brian Smith: Yeah, so when you this is like you said, this is
my kind of my third startup that I've done. And when you are
coming up with names for startups, there's couple of
considerations. One is you want it to be memorable. One is it's
it needs to be not too cute or too tricky. These names where
you say them and you can never spell them and say can never
find a website. And so when we were coming out when we're
talking about names with a company, we wanted something
that was kind of fun. And we're from Austin. So Austin, I don't
know if you know it has this big bridge that goes across the the
Colorado River, that big lake there in central Los I have been
there. And it's the Congress Avenue Bridge, and underneath it
has the largest colony of bats, Mexican free tailed bats in the
North America, I believe. And they're like the million bats
live under there so often is known as bats. And the city has
that. So we there's a type of bat called the spider bat. And
so we decided to have that as the name but it's spelled SPI D
or that they expire. And so when we went to open up our bank
account, we're just getting started. The guy at the bank
misspelled the name with spyder, and we thought well that's
pretty cool. So we we hadn't actually fired the corporation
documents yet. So we read incorporated under under that
name. And that's it story.
Eveline Oehrlich: That is a great story and the banker has
done you a favor by making a spelling mistake. That's a great
story. And at some point you want it to be instead of you go
Google it you want to say you go spyder batted right. That's kind
of the goal. So when people say let's go Spyderbat, did what?
What does that mean? In what what? Tell me about this Google
map recording? Tell us myself, of course, I'm curious as I'm an
analyst. Tell us about Spyderbat a little bit.
Brian Smith: Yeah, we've been, you know, I've been working in
security for for 20 years now and one of the toughest problems
is, you'll usually get notified about a security incident when
sort of when it goes boom, when something goes boom. And then
the tricky problem is trying to root cause that trying to figure
out what actually happened, do you have a bunch of
considerations? Like, what is it still happening? What happened?
What was the impact? How do I how do I stop it right now, who
do I need to inform and how to prevent it in the future. And a
lot of that is trying to figure out what happened. And the
problem we have right now is the traditional way that people do
that is they start going through the logs and trying to figure
out, you know, just from from log analysis, it's painful. And
a lot of times the data that you need is not there in a box. But
we looked at that and said, you know, the, these things are all
just computers running. And so if we could record everything,
build this kind of DVR like capability of everything good,
bad and different that happened, and then use that data to flag
this is interesting, this is interesting. This was something
bad happening. Once you have the bad, you could trace back to
root cause where this thing started. So we started building
something that could record everything that happened like a
DVR for your entire network. It built this map, we put that raw
data is if you just looked at the raw data, you'd be kind of
sad. So it built an analytic system that turned that into a
amount that you could understand, have a world call a
causal map that for any instance, you can say this
caused all this stuff to happen. And this is the stuff that
caused it. And then if you can just attach a security incident
onto that, then you can go from that and say, Okay, this is all
the bad stuff that happened. As a side effect of that, and work
backwards to this is what caused it. When you have that base
capability, then it's not a long stretch to add in security
content on top of that, that says these are bad things
happening. And then pretty easy to add on top of that, well,
let's stop it dead in its tracks. Because what we find is
that when something the average industry time at I'm sure you
know this level is that when something bad has happened, it's
56 days that they've been in your network, because the what
they call the dwell time, and then it's 178 days to actually
inventory everything that happened and figure out of
investigation time and then 96 days to clean it up. That whole
process is this massive manual effort. And so we by having this
recording, we can really crush that time.
Eveline Oehrlich: So you really reducing MTTR quite
significantly, right. That's, that's I think, to me and
infrastructure and operations, which is what I come from, it
sounds like it is an application. It's almost like a
dependency map, right? As we sometimes have application
dependency maps, but with the focus on what's actually
happening from a security perspective, which then allows
me as a team member, not necessarily security, but maybe
others to kind of look at it, where we can collaborate and
say, Hey, here's something and this is where we need to hone in
and need to do something file. That sounds fantastic. Great. I
love the name spiral bad superduper. Well, thanks for
sharing that anybody out there? Go check out spinal bad. But
again, I wanted to focus on a few things here. Because when I
started at Forrester, I had a colleague, and I know your
LinkedIn with him a John Kinder bag. I know, you know, John, so
John, dear friend of mine. He told me once, Eveline, you know,
you have to remember insecurity, it's not really, it's not really
to technology, it's to humans. It's the people who make the
change. And challenges always have a head and into shoulders.
Right? And I never really, I never had the chance to do
research with him. But I was always intrigued. And I did some
research before this podcast. And there's a couple of
challenges and a couple of shifts were actually a few
shifts happening. This is from Gartner want to make sure I
shout out to two colleagues, Gartner. And I want to highlight
them quickly. So first of all, this role of the CFO, the chief
information security officer is reshaping. So Gartner saying
it's reshaping from preventing breaches to facilitating risk
management. So that's very different, a very different
role. second shift is from cyber risk is a security problem to
cyber risk is a business problem. And I think we've seen
that there's multiple headlines out there, which made to the to
the demise of those. And then third, from security being a
road plaque blog to say Speed. Security is actually an Abler of
agile and secure products. And that's the one for me in the
DevOps in the DevOps folks, which is, that's a great
statement of shifts. But if you think about so now, your
question for you, Brian, if you think about the three shifts,
and think about the clients and your connections and your
networks, and the folks you talk to and your experience of 20
years, and I don't believe that 20 years, I think you'll have
more than that. But we'll leave it at that. Where are we there?
We will somewhere in these three things? Are we somewhere at the
beginning? Are we already kind of if we think of a hype cycle,
right, are we somewhere at the beginning of those things? Are
we somewhere in the middle? Or have we already matured on to
organizations making these shifts from that, to that? What
What are your thoughts on that?
Brian Smith: Well, I think there's three, there's a lot to
unpack there. But there's, there's from the risk
standpoint, I think that the CISOs have been taking that
attitude for for a fair amount of time. So I think most
companies are fairly mature. And I think part of that is just,
it's an acknowledgement of just having a very pragmatic approach
to it. One way, that the sort of notion that you can prevent all
breaches through, you know, some magic bullet security project or
some magic bullet process is is just kind of fantasyland.
Honestly, it's the waste I best way I heard described as imagine
a castle, like a medieval castle. And so it's got it's out
on a plane, and there are, you know, hundreds of windows and
hundreds of doors. And it's and, and you're the defender of that,
you have all these different ways that, that an attacker can
come in, and you have to defend every single possible entry
point. And it's just kind of this impossible, impossible
task. So the pragmatic approach is, to certainly shore things
up, you don't want to leave just everything unlocked. But then
also have, you know, sort of patrols and guards and humans in
there that are, that are watching watching the fortress
and saying, that's a little weird and being able to
investigate. And so the risk management is focusing on those
areas that give you the most bang for your buck on those
things. Whereas if a breach happened here, it doesn't really
matter if a breach happens here, that's really, really bad. And
so the risk is, you know, assessing, assessing that
situation, it's fairly, depending on the organization
fairly mature. The, the agility part is really interesting part
to me. Because traditionally, the security opera, you know,
security was a bit of a roadblock. And part of that was
the developers bring in security as they're the main guys come in
at that the last minute, and then they're the guys that say,
Hey, wait, we need to make this secure. And it feels like it
slows things down. And by involving them earlier, earlier
in the cycle, which is a lot of the ship left stuff, that
opportunities that we've seen, you end up being able to, for
them to become enablers of having things go faster, but
still, we still have to be secure as we deploy these
things. And part of the reason for that is just that, if you if
you're not secure, if your application gets popped, you're
gonna have a really bad week, or really bad month while you try
to, you know, clean up and assess the damage and stuff as
as a developer or development manager, DevOps. So it's all in
all our interest to prevent that from happening also from from
the business standpoint, and I think the business side is just
the recognition of, of all the damage that these things do to
the business. And so it's gotten bored level attention at this
point. So it's not just the security group that says
isolated silo, but it's much more on the business side.
Ad: Are you looking to get DevOps certified? Demonstrate
your DevOps knowledge and advance your career with a
certification from DevOps Institute, get certified in
DevOps Leader, SRE or DevSEC Ops, just to name a few. Learn
anywhere, anytime. The choice is yours. Choose to get certified
through our vast partner network self study programs, or our new
skillup elearning videos. The exams are developed in
collaboration with industry thought leaders, and subject
matter experts in the DevOps space. Learn more at
DevOpsInstitute.com/certifications.
Eveline Oehrlich: So I've heard conversations, or I've
overheard, and I've heard at RSA or other places. Now, of course,
most of them might join virtually, hopefully soon, I can
go again, we can all travel again, where I've noticed that
I've actually seen more business people at those conventions and
joining so I an admin Many times I always wondered, so why is
business not wandering? In asking it more questions
relative to those types of things? What is your what are
your thinking? What's your thinking on the wise business,
they don't seem to chime up when things have happened. And then
they are all worried and now, but they haven't in the past
kind of worried about it. They're just like, Oh, you guys,
techies, you guys got it?
Brian Smith: Well, I think I mean, I think there's a couple
different things going on. One is, you know, I like the part of
the shift towards pragmatism is this realization that, it's,
it's really hard to make it make yourself completely bullet proof
for one of these things. If someone really wants to go after
you like a nation state, it's, it's very difficult to defend
against that practice, and to prevent the breach. But if you
can have a rapid response to it, then that involves people and
processes and technology. So you want you have to do a little bit
rehearsal. But that means it's not just a security only kind of
these guys, the guys in the security group, it really has to
be kind of everyone's business. And the other is that where we
get, you know, a lot of the breaches come in at is through
exploiting people, honestly, exploiting social engineering
attacks and things like that, which is why companies focus on
training the people is a good way. One of the one of the many
good ways to prevent breaches, but what I've seen is that, you
know, sort of the, their, this traditional security group has
been focused on securing sort of laptops and mobile devices, and
IT systems and things like that. And then as we've moved into
DevOps, and more cloud native world, those are often are,
especially in Kubernetes, those are Linux systems. And they're a
little outside of the expertise. So I must have seen these
bifurcation of the security responsibility falling on DevOps
dev SEC ops and sre. And this other group, on the side, LLC,
suicide in the traditional SEC ops group, sort of managing the
the people and processes over here, and bridging those two
gaps together, I think is a business thing, because it has
it. Otherwise, the two sides, sort of can fight each other.
And in a lot of companies, I see the CISOs say, We're doing all
this. But there's this DevOps group over here, and I'm not
quite sure what they're doing, and they don't fully understand
it. And so bridging that gap, I think, is sort of where a lot of
companies are fairly immature.
Eveline Oehrlich: Yeah, I would agree. I would agree with seeing
that in our research. And you'll be delighted to hear in our
latest upskilling, it 2022 Which report is out on our website,
security, and cybersecurity was the number one technical skill,
even before even above cloud, so that, you know, cloud computing
skills and things like that. So I think that's fantastic. So if
people are out there thinking about new careers, whatever
changes you want to make security, cybersecurity is one
of those I wish, I wish I would have followed John, way back
into into this field. And I tried to get my kids into it.
Unfortunately, one is an architect, the other one is a
psychologist. So they never really got interested in either.
Brian Smith: Now, one thing I heard along those lines is there
was my data was from a couple of years ago, but at that time,
there were something like half a million open jobs in
cybersecurity was forecast to grow by 2025 to over a million
open positions. And some of that is because at least at the time,
and still is the job is so manual. And so one of the ways
we have to look at is automating it, but not automating it away.
But automating it as in providing, making the computer
these automated systems, partners with humans that make
the there are force multipliers for the humans.
Eveline Oehrlich: That gets me to my next question, actually,
because there is behaviors and culture, right, which play into
all of that, you know, if I think of my family in terms of
their laptops and their devices, I probably could break in easily
to most of them because the passwords are, I can get them.
But there's also there's more than just on the client side.
But there's other challenges. So around humans and cultural
changes, what have you seen and what would what can you suggest
to our listeners, what should they do? What should they look
out for? What advice can you give folks how to respond and
how to work within this challenge of helping out in
around organizations and both in IT and business?
Brian Smith: Yes. So I, you know, I think, you know, part of
this is what I was saying before is that traditionally, this was
viewed as a SEC Ops problem. And so we could kind of
compartmentalize it and say that's their problem, I'm just
going to focus on what happened. And I think there's this growing
recognition. And this is, this is a good thing, that it is a
business problem, and so that everyone has a has a bit of a
role to play, because you don't want your laptop to be the entry
point for a giant breach of some sort. So some of this is just,
you know, go, if you're a leader, make sure you start
training, have company wide training on this. Because every
individual should know what the signs are of someone trying to
trying to break in or trying to fool you. Social engineering is
a big attack. But the the, the other that that sort of, from
the human standpoint, from the, from the, you know, frontline
workers, people and in non technical positions, for people
in technical positions, it started building those bridges
to the SEC Ops and not treating them as the enemy, but kind of
inviting them in to try to try to work together. And I think a
lot of the problem there is that we, we almost talk in different
worlds. And in those things, so finding ways that we can
communicate with each other so that we can, the developers, for
example, that are developing application can pass along
artifacts to sec ops to say, this is the way I expect my
application to behave. If it's not behaving, contact me be that
way. Because I want to know, because we're all you know,
DevOps, we're all responsible for keeping our piece up and
running, and we know our piece better than any anything else in
the world. So I see that kind of role of DevOps, if they can
establish those communications of this is what my piece is
supposed to be doing. That would be that would be awesome. And
we're kind of working on at about about, about developing
those artifacts that help automate those processes. But
then, in the the other parts of the roles are, you know, there's
typically like SRS or more kind of DevSEC Ops, which are
responsible for the full platform security, and as
opposed to individual component securities. And so I think all
of those have kind of roles to play within this. But there's
but it's, it's treating it not as the SEC ops problems, but SEC
Ops being more of a coordinator of how we how we deal with
responses and sort of best practices for longest, and then
facilitating communication and treat them as a partner.
Eveline Oehrlich: I love that when you said coordinator, I
would actually sometimes think that word means different
things. Maybe it's more of an orchestrator. But I think that's
the same idea, right? It's said orchestration, going out and
bringing those folks together because many of those folks have
their own roles. And they have their own projects and things to
do on a daily on a daily list on a daily the daily tasks.
whenever necessary. I'm responsible for whatever on call
plus I'm supposed to be also doing some development, but
really highlighting that and orchestrating what have we done
now, that makes me think of this is not something I have any done
any research, but metrics, sometimes. We don't, it seems
like we don't measure the right things. We don't incent people
to be reaching out and orchestrating right. Have you
seen any, any specific examples of organizations who say, Well,
we're going to go and do something completely different,
we're going to incent everybody on doing one security thing a
week, or having little jam sessions or little whatever
those things are called anything, anything creative.
You've seen on on humans getting together and saying we need to
change something.
Brian Smith: You know, the one thing I think about is there's
this this book called Thinking Fast and Slow. Oh, yes. And it's
about, you know, how did this sort of help? There's parts of
our brain where we really engage our brain and our rational
thought, and that's the thinking slow part. And then there's the,
I don't know, scrolling your social media feed. And that's
the thinking fast part, right? Where you just kind of you're,
you're doing what I think they call the information scavenging
where you're scrolling through and just looking around, and
that tends to be based on our biological. It's the information
equivalent of our biological version of scavenging for food.
And for us just looking around and trying to find pattern
matching. You're saying, Oh, this looks interesting to go get
or this is a threat. And what I Think once you there, one of the
most interesting things is trying to teach people about
that and use it to train that train the people not to kind of
just click on things mindlessly, because but actually spend it,
but sort of see the warning signs, train train them in that
information scavenging to see the warning signs and say, Well,
that looks like a threat and turn on the slope. And, and, and
and think before they click on that thing or do that, that I
haven't seen too much in the way of, you know, kind of what I
what I think about metrics of, you know, sort of dials on
gauges. Yeah, thanks.
Eveline Oehrlich: I think there is still there's still some work
to do in this in this notion of the safety culture, and shaping
that safety culture, as you said, first, just quickly
summarizing, so first, really not just sick ops, but really
the DevOps and the other side of, of security, to bridge
across to the SEC ops folks who do the normal things, and then
for business to ensure that they are aware of what's happening,
right. So if we do design thinking, for example, in that
stage, right, if we do development of products and
projects, that we have that awareness, and then for us, as
individuals, no matter if we're in it, and business in whatever,
then we have a safety culture and start helping ourselves and
training each other and helping each other out. So fantastic.
Anything, any other thoughts you want to share with us?
Brian Smith: Yeah, the one other thought is just, you know, in
general, security tends to have these trends. And one of the
more recent trends was in the ship love culture was we would
try to build, get everything to be invulnerable, before we
actually shifted ship. And that sort of, I've seen sometimes
Eveline Oehrlich: That is that is a that is great advice. I
that sort of great being the enemy of the good in the sense
of, Well, once I do that, I don't have to monitor anything.
It's sort of like I've built perfect locks on my house. So I
don't need an alarm system. And I think that's a not a pragmatic
approach. So I think as we as we go through this evolution
towards, you know, sort of understanding spirit, just try
to be pragmatic about it, don't try to vote and the focusing on
risk is a good part of that. And the focusing kind of what is
actually happening as opposed to what theoretically could happen.
Is a good general trend. And just don't let the the
perfection over here be the enemy of good.
remember, Diego and myself at Forrester talking about shift
left many, many years ago. I think we took too much of a
theoretical approach at the time. So what you just said,
really thinking about that in a programmatic way is great advice
to our listeners. Appreciate it. I have one more question has
nothing to do with security. What do you do it? And don't
tell me you're doing security things on the weekend. But what
do you do for fun, Brian?
Brian Smith: Oh, recently I've gotten into tennis see, I have
two boys. They're they're 18 and 21. Now, but my younger son had
gotten really into tennis, from about the age of nine. And I
started playing with him. And then he rapidly advanced and I
couldn't play with them anymore. So last year, I've been trying
the last three years, I've been playing tennis pretty
aggressively to try to get up the points just so I can play
with my boy.
Eveline Oehrlich: That sounds great. Well, maybe there's a
natural Roger Federer just retire. So maybe there was a
Roger Federer out there in one of your sons, who knows, never
know. Well, Brian, this has been wonderful. We learned a lot.
This was great meeting you great chatting with you. And thanks
for your time always interested in few points from the other
groups such as security. If folks want to learn more about
your spider bat company, I guess it's easy to find, but anything
else you want to point out to any white papers, any other
things?
Brian Smith: No, just it's one thing in I guess the one thing I
doubt in Spyderbat is that it's got a free mode. So one of the
things that's always annoyed me about companies is where they
you have to talk to a sales guy and sign away things I want
people just to try it, experience it. And then if it
turns out to be useful for you, let's talk but just getting
feedback is always good.
Eveline Oehrlich: Excellent and as an analyst I approve that
because that's exactly what we recommend to our vendors. Super.
Thank you Brian this was wonderful. Enjoy your upcoming
day for me. I will enjoy the rest of my day as well and
everybody else here listening into this is Eveline Oehrlichm
Chief Research Officer DevOps Institute with Brian Smith from
Spyderbat. Thank you, Brian. Have a great day everybody out
there. Thank you.
Narrator: Thanks for listening to this episode of the Humans of
DevOps Podcast. Don't forget to join our global community to get
access to even more great resources like this. Until next
time, remember, you are part of something bigger than yourself.
You belong.
We recommend upgrading to the latest Chrome, Firefox, Safari, or Edge.
Please check your internet connection and refresh the page. You might also try disabling any ad blockers.
You can visit our support center if you're having problems.