Summary Of This Stop Being the Best Kept Secret Presentation
Are You Prepared to Protect Your Business from Cyber Criminals?
Cyber threats aren’t just an IT issue—they’re a business survival issue. Every day, cyber criminals refine their tactics, targeting businesses of all sizes. Are you confident your company is secure?
Join us for an essential discussion with Gina Tabasso, B2B marketing strategist at Barracuda B2B Marketing, Kevin A. McGrail, Cloud Fellow at Dito and cybersecurity expert, and Samir Black, fintech entrepreneur and cloud security consultant. They’ll share critical insights to help you strengthen your defenses.
Key Highlights: Protect Your Business from Cyber Criminals
• Personal Heroes and Inspirations 1:56
• Professional Backgrounds and Achievements 10:04
• Challenges and Strategies in Cybersecurity 24:14
• Practical Tips and Best Practices 39:19
• Upcoming Events and Final Thoughts 1:00:30
Resources
Stop Being the Best Kept Secret with Live Streaming Training Sessions
B2Btail – Helping Awesome Companies with Digital Sales Growth Solutions
Click here for more resources and guides.
Get Your FREE SEO Report
You Have Only One Chance to Make An Outstanding First Webpression https://b2btail.com/webpression/
Stop Being the Best Kept Secret: Manufacturing eCommerce Strategies
Grab these FREE B2Btail Resource Guides to help you on your eCommerce journey
- Dominate Search
- eCommerce Checklist
- Manufacturing Website Call-To-Action Strategies That Work
- 25 Blog Topics for Manufacturers Eager to Start Blogging
Exit Your Way– Helping owners create businesses that make more money today and they can sell or succeed when they want.
Damon on LinkedIn
Presentation Transcription
Curt Anderson 00:11
Yes, I am, but I’m great and ready to go. Boy, it’s our first time. Man, it’s our first rodeo here. So hey, yeah, happy Monday, everybody. Man, what a magnificent weekend. What a magical weekend it was, right? Samir, how about that? Well, alright, what a wonderful weekend. And we are just super fired up to start off our week. So Damon, you ready to get a good night’s sleep last night, I did, and I’m ready to go, ready rock and roll. Alright, let’s do this. So let’s start off. You know, we’ve got a repeat offender on the show today. She’s been on multiple times. My dear friend, Gina Tabasso, Gina, how are you?
Gina Tabasso 00:46
Hi, Curt, it’s good to be back. It’s been a while, and I brought two friends with me. You
Curt Anderson 00:51
did you know what? And you’re in. You’re kind of a show off because, Damon, I don’t have any friends, so it’s nice that you have at least two. And so you brought your friends here. So let’s go. Let’s go to KAM. KAM, happy Monday. How are you, my friend? I’m
Kevin A. McGrail 01:04
doing well, Happy Monday to you, is this where I should tell a little bit about things and make up some stories so people are impressed that I’m on the show. You
Curt Anderson 01:13
know, I got through just couple good, couple bad dad jokes. But what, you know, what I’m gonna I’ve got a I’ve got a question for you. KAM in one second. Let’s introduce Samir. Samir. Black’s in the house. Samir, how are
Samir Black 01:22
you dude? Dude, I am fantastic. Happy to be here. Thank you so much for having us.
Curt Anderson 01:27
Oh, my goodness, great. So thank you guys from bomb, my heart, we’re going to have a great time. But I know how busy you guys are saving all sorts of companies, cyber criminals, all these fun things, we’ve got a ton to get into cam. Here’s my first question now. Samir, now, Gina, I think I’ve asked you this before. KAM, I’m hitting you with a question. Samir, I want to ask you a totally, completely different question, just kind of throw you off a little bit. But cam, we’re just sharing a little bit about family before we went live, and a question I have for you to kick off our program today. When you were a little guy growing up, when you were a little guy growing up, who was your hero? Who did you look up to? Who just showered you with unconditional love? Who’s your hero?
Kevin A. McGrail 02:06
You know? I mean, I love John F Kennedy. That was probably my like here. But a guy that I actually really admire is a gentleman who I don’t actually know his first name, Mr. Adams. When I was in first grade, kindergarten era. I went to a birthday party, and during that birthday party, a gentleman showed me a computer that he had built. And this, by the way, this is back in the 70s, so when I say built, we’re talking soldering irons, yeah, and things like that. And he let me play with it by myself for about 20 minutes. And I came up, I was I was hungry, and I asked the mom at this birthday party, and I said, you know, hey, what’s for dinner? And she said, pancakes. And I said, that’s an interesting dinner. And she says, It’s not dinner time, it’s it’s 830 in the morning. So I pulled my first all nighter at, you know, literally at four years old, and this gentleman let me play with a computer that was many 1000s of dollars and many, probably hundreds of hours of work for him to assemble it and put it together. And I’ve always remembered a quote that somebody told me later on, which is it’s attributed to Samuel Clemens Mark Twain, who has a billion quotes that he may or may not have said, but it’s a good one, but it says the two most important days in a man’s life for the day he’s born and the day he finds out why. And so I knew at age four that I was going to work with computers and computers then, by the way, my parents were very supportive of it and everything. But that was more like a forest ranger. That was not a career, that was not, you know, this was like a fringe like thing that people did. It wasn’t, it wasn’t a it was a hobby, not A, not a career. So, so I would say Mr. Mr. Adams, for letting a four year old play with an extremely expensive toy. Man,
Curt Anderson 03:51
Gina, you don’t monkey around when you bring your friends on, like you’ve like you’ve got friends with muscle. Holy cow. Man, what a great story. And to pull out the mark, the Mark Twain quote, right, find out the day. Why? Man. KAM, thank you for sharing that so guys, connect with Gina, connect with KAM. Connect with Samir on LinkedIn. You’ll be thankful that you did Sameer, I’m coming at you with a totally, completely different question. Are you sitting down? Are you ready for this question? Hold
04:18
on, yeah. Are you good? Okay, I’m coming at you
Curt Anderson 04:21
with totally it’s not a different question. Samir, when you were a little guy growing up, who was your hero? My
Speaker 2 04:28
hero? Oh, man. So my hero was probably Robin Williams, man. The dude just spoke to me in a way that I just haven’t had anyone else, and it was just energy always just on the spot, like whenever, like his stand ups were fantastic. Nothing was ever pre rehearsed. And it just always felt like he brought energy to everything. And that’s kind of like what I like to do now is like, I want to be the person that puts a smile on everyone. Space, like, really, like, provide them the energy they need to, like, get through the problems. And to be honest, man, being in cybersec, like, people come at us really depressed because they’ve been hit with the worst, right? Like, you can’t get revenue. They’re being, like, exploited for millions. It’s, it’s not fun. But you know what does help a jovial person trying to help you navigate these terrible waters and get you through it. So you’re at the end, you’re back to doing business stuff again. And I kind of pull that stuff from Robin Williams, just a person that helps you get through hard times. Like, I like that.
Curt Anderson 05:35
That’s awesome. You know, made me think of, you know, the tight end with KAM he had, Mr. Adams. I thought of patch I have, I have a trivet question. Samir, being that you’re a young guy, do you remember Robin Williams first TV show? Damon, you remember that back in the 70s? What was Robin Williams first TV show? Man, I was hooked on that show. Do you remember? Oh, was
Gina Tabasso 05:55
it Mork and Mindy, yeah. There you go. Gina, that is
Kevin A. McGrail 06:00
incorrect. No, no, it was happy days. Was he? Oh yes. He was on Happy Days. Morgan Mindy was a spin off. Oh,
Gina Tabasso 06:10
I didn’t know that right?
Curt Anderson 06:12
Cam is 100% correct. And so KAM, Well done, my friend. I
Kevin A. McGrail 06:17
will look for my prize in the mail. There you go.
Curt Anderson 06:21
He was on Happy Days as Mork, can you believe that? Cam dude? That was impressive. Yeah, that was very well done. Alright, so we’ve got mister Adams. We’ve got Rob Robin Williams. Gina, I’m coming at you. I know I’ve asked you this before, but I’m going to hit you again. Who’s your is a little girl growing up? Who’s your hero that you looked up to?
Gina Tabasso 06:39
Yeah, my answer is always, always going to be my grandfather, my mom’s dad. He was professionally. He was a cake decorator at a at a age old, well respected bakery called Huff bakery in Cleveland. And before that, spang bakery, and back then, it was an art I mean, it was an art form, the flowers he could make by hand. And he made my first birthday cake, of course. And every Easter we would have a lamb cake. And he would make that. I still have his mold, but he was, at heart, he was an artist and a writer and a poet, and he painted and wrote, and he taught me how to read. We would sit, I would sit on his lap in a recliner with him, and he would read to me, and then I would learn how to read. And he was just the kindest, gentlest, loving human being you could ever meet in your life. And he died when I was six, and I remember everything about him. And when I grew up, I asked my mom. I said, Mom was, Grandpa is amazing of a person as I remember as a little kid, because, you know, when you’re a little kid, sometimes you’re naive and you don’t see what you don’t see. And she said, Gina, he was the best father anyone could ever ask for on the face of the earth. He was the most wonderful man I’ve ever met in my life. And so he’s my hero.
Curt Anderson 08:03
Gosh, what dude is a what a great answer, yeah. What was your grandfather’s name? Please.
Gina Tabasso 08:10
Stanley. He, he and to watch. I, I’ve seen people suffer with grace, like he had diabetes, and back then, that was a death sentence. And he lost his legs. He was very sick, very sick. Never unkind, never mean, never complained. One time he yelled at me. I remember he he was trying to sleep, and he yelled at me, be quiet. I’m trying to sleep, and I burst out crying because he had never yelled at me. And he was like, Oh baby, I’m so sorry. I’m so sorry. I’ll never do that again. Oh, my sweetheart, it’s not your fault. Grandpa just doesn’t feel well, like this man apologized upside down for yelling at me once in his life, and I feel like that’s being in the presence of grace. Wow.
Curt Anderson 09:02
Well, I tell you, the Apple didn’t fall far. So Gino, thank you for sharing that. What a what a beautiful testament to Stanley. And man, did he set the bar high for all of us as guys. Next year, you’re just talking about your grant, your your 17 month old daughter, yeah, you come out your three kids. I mean, they have somebody speak about you that way. What a testament to Stan Lee. So what a blessing he was for you. Gina, thank you for sharing that. So alright, guys, let’s dive in. So thank you for sharing your heroes. Let’s roll up our sleeves. Let’s dive into business. KAM, I’m coming at you first. You’re betting personally. KAM, you don’t you can handle it, right? You’re
Kevin A. McGrail 09:35
a good leadoff hitter, right? Easy stuff. If I don’t know the answer, I will make one up. I tell everybody, if you are familiar with like hallucinations and factual problems with AI, I can do that 10 times better than any any AI. There you go.
Curt Anderson 09:49
Cam, was aI before AI was cool, right? So, alright. KAM, alright. KAM please share a little bit our conversation today. And Gina, thank you for setting this up. Gina, I’m giving Gina 100% The credit for this. Gina, thank you for bringing our friends on today. Your friends, hopefully they’re not our friends. Tell us a little bit about you, your company. How do you guys make the world a better place? What’s going on? Well, I mean,
Kevin A. McGrail 10:12
I wear a lot of different hats, so it’s a little bit complicated to answer that, but you know, I’ve done a lot of things, everything from, you know, just like working on policies and procedures, I’ve worked in the federal agency space. I help volunteer with the US Marine Corps as a cyber auxiliaryist. I’ve worked in nuclear energy licensees, you know, but you know, a lot of what I do is a combination of hard work. So at Dido, we’re a premier partner. We’re Google first, and there I basically help manage, migrate and secure the cloud. I run our cybersecurity division, and we are Google’s preferred partner for civilian and DOD authorities to operate. Very proud of my work, helping everything from grandmothers and small mom and pop shops to, you know, some of the largest cybersecurity companies on the planet at Peregrine. You know, we do a lot of research. And you know, works of peregrine computer consultants Corporation, we do a lot of research into anti spam, that has helped me be able to do things like the cam rule set and work like, for example, in Lisbon, last month, I was honored for Lifetime Achievement work with the Mary Latin ski award for helping keep the internet safe. So I publish threat data that we’ve done for over 20 years at no charge. It protects hundreds of millions of mailboxes every single day. So, you know, that’s, that’s probably one of the bigger things that I do. And then my volunteerism and, you know, work with the Apache Software Foundation, you know, especially with Apache Spam Assassin and other related open source softwares that really have changed how we compute. You know, in 25 years, the the way software is done has changed radically, and the Apache Software Foundation has been a lot of the reason for
Curt Anderson 11:50
that. Well, geez, what an underachiever he is. Yeah, right. So, man, I’m like, I’m like, I gotta beef up my resume here to keep up with KAM. So KAM, next question, do you ever sleep? Or, my goodness gracious, how do you how do you
Kevin A. McGrail 12:05
people? You know, I do sleep. But you know, the nice part is, is, you know, if you think about my story that I told you about playing with computers, I’m blessed. You know that another Mark Twain quotes, and she liked them is, what is it? You know, enjoy what you do, and you’ll never work a day in your life. You know, I’m very blessed that way. So, you know, it is my hobby, it is my work, and I’m blessed that it pays more than a forest ranger, you know, as I talked about a little bit earlier. So yes, I do get sleep, but probably not as much as I should.
Curt Anderson 12:33
Excellent. Well, congratulations on the Lifetime Achievement Award, and just in Sameer, before we come over to you, just cam, just share with folks, if they’re not familiar with that award, just give us a little and don’t be modest, just share a little bit about what is that award and just what that meant to you and your family.
Kevin A. McGrail 12:48
Yeah, so MOG, or the malware abuse acting group, I’d have to look up at the exact acronym. It’s like m3 times, and mobile malware and something abuse, anti abuse working group. It’s an organization that that works to stop a phishing, malware, spam, and has done so for a long time. This was their 65th meeting last month. And you know, it’s 63rd meeting, excuse me, and the award is based on a lady named Mary letinski, who is behind the scenes of the organization, just making things work. And so they try and honor people that aren’t necessarily out at the forefront, you know, aren’t publicly known, but are working to make things safer. And some of the past awardees that I’m very proud to be with are people like Neil Schwartzman, Paul Vixie, Brian Krebs and some others. So couple, dozen more. So awesome.
Curt Anderson 13:41
Well, very impressive. Congratulations. Well done, well deserved. And just you know, love what you’re doing, Samira, let’s come over to you, my friend, share a little bit about you. Your background, your company. How are you making the world a better place? Oh,
Speaker 2 13:54
man, so we’re doing what we can, just working as hard as we can. So my background, I am a cloud professional, uh, dove real into the cloud environment. Was infatuated. You know what? I don’t like hardware. So when it comes to building things for enterprises and companies, SMBs, I really enjoyed like the cloud space, because it just got rid of all the headache that everyone has to deal with. From there grew into more architecture stuff, really trying to navigate, fix things up, spruce things up for businesses that tried to get into that space, and then that landed me in cybersec. I have been doing cybersecurity for quite a few years now, and it is a lot of trying to scope in the needs of the business versus the risks, and that has been a challenge. It’s super fun, but it’s a really interesting challenge. And from that, I created two businesses. I I’m a founder of a company called Data pros consulting that is a Incident Response firm and a payment verification product called Forseti, verify. Um. Yeah, it was safe pay, but the domain space was awful, so we just flip that up. And that honestly, kind of builds itself off of the foundation work that cam and others have, like, really created. It’s really important to, like, look at, you know why we have spam filters and all these other components, like creating a safe, secure environment, but like, it’s not done. The job is not done. It’s never done. It’s a continuous effort, and we have to continue to build on top of those pieces to like, combat the bad guys. I mean, this is all I do, is just fight bad dudes. So at this point, it’s just a fun thing that I really enjoy. Like, I love competitiveness. I love the challenge to, like, take on something that’s doing a huge amount of damage to an organization. And that’s kind of where we shine. We we come in, we provide that knowledge to people on like, what you need to do to navigate these problems and then getting them out of that hole.
Curt Anderson 15:52
Love it. Absolutely love it. Man, that was a great answer. And so, running two companies, and so when we’re going to go back around, when I come back to you, I wanted to think about, we’d love talking about entrepreneurship, but just share a little
Speaker 3 16:03
bit like, what’s it like running two companies
Curt Anderson 16:07
like Gina, you keep getting all these underachievers on them, right? So, like, what’s it like running two companies Samir,
Speaker 2 16:14
it’s I’m blessed. I’m blessed. There’s a lot of synergistic pipeline components between both and that’s kind of the key to why I’m able to do it. And it’s not easy to run two companies, obviously, and because they have to be separate entities, one of them has to follow policy procedures and compliance regulations through payments and stuff, and the other one is just an incident response firm. So we had to separate and segregate based off of like components. And because of that, obviously it’s a little bit more little bit more of a headache to kind of like juggle those two pieces. But what I would say is it’s doable, because our clientele and our prospects are very in line, so our pipelines work together very well.
Curt Anderson 16:54
Nice, excellent. Alright, thank you. Thank you for sharing that. So Gina, let’s come over to you. So you were on the show one time. You were with the Cleveland MEP, you were with magnet. Another time you last time you’re on the show, I believe you just launched barracuda. Barracuda. So just share with folks who is Barracuda? How are you making the world a better place?
Gina Tabasso 17:14
Well, yes, I launched Barracuda officially. September 2023 while I was working full time for a manufacturing company, and that role ended last year, and I’ve been doing my consulting work in the interim, while I’m looking for my next w2 gig, but I always will do the consulting on the side. I wanted to build the business to take it with me into retirement to supplement my income and also supplement my income in these crazy economy nowadays. So what I do is I do B to B marketing, primarily for manufacturers, but also I’ve worked with software companies and consultants and other kinds of companies, but my heart is in manufacturing, which is where I’ve specialized. How I’m doing good in the world is meeting people like Samir and cam and pulling partners close. I feel like my trajectory launching my business. I met people I never would have met. I’ve learned things I never would have learned, and it has been a miraculous process, and I think the people are the most important part of that. Just I have lifelong friends now and people of in every field and every industry and every talent, and it seems like I’ve met the best of the best, and they make me better. So that’s and I also, I don’t think I told you this Curt, because if the last time I was on here was September of last of 2023 last year, in 2024 I launched something called the manufacturing resource group. And it’s a consortium of service partners who can serve manufacturers. And the idea was, if a manufacturer is challenged with budget and they don’t have the cash flow to hire people to make them money, we can come in as a unit or multiple people. You don’t have to bring all of us in. And the idea was save manufacturers capital they didn’t know they were losing that they could then reinvest into their business to hire the people who can make them money without allocating existing budget to that work. And so again, I went out there and networking groups and one on ones, and met the most powerful, intelligent, loving, compassionate group of people I could ever meet, and I pulled them together into this consortium. And so that’s been my latest endeavor. I went from not being an entrepreneur to like Samir and Cam now I’m serialpreneur.
Curt Anderson 20:01
You’re well, I love it. And I’ll tell you, if get a chance for the detail, just type in Gina in the search box. And the last session, Gina, you gave a master class on manufacturing strategies for marketing strategies for manufacturers. I learned a ton. It was absolutely powerful conversation. Encourage people to go back and check that out. So how did you cross paths with these two fine young men, and why cyber from your perspective? And then Kim, we’re going to come back
Gina Tabasso 20:28
to you next. Yeah, that’s a good segue. Well, what happened was I go to a networking group for manufacturers and distributors that originated out of the Atlanta, Georgia area. It’s a virtual networking group, and I met Samir there he was in the meeting. And then the meeting has additional breakouts after the meeting, so they’ll have three people meet and do a three on three meeting, kind of like a one on one after a networking group, but it’s three of you that get together and you do a deeper dive and get to know each other. And Samir and I just had so much synergy, and really hit it off as just on a human level. I
Speaker 2 21:07
was so impressed by a presentation. It was amazing. It was really
Gina Tabasso 21:10
amazing. Thank you. Oh, that was the panel discussion. Yeah, we did a panel discussion on marketing and and then Samir is friends with KAM, and he introduced me to KAM, and the reason we teamed up is because tech stacks are at risk, and marketing is dependent on a pillar of tech stacks. You know, your CRM, your website, your social media, your email marketing, your all your documents, your share drives everything that goes into your business, not just on your shop floor, not just in your HR department, but everywhere. And marketing is really dependent on the tech stack, and so Samir and cam and I saw synergy here, that we see an opportunity, because a lot of especially small to mid sized manufacturers, they don’t have an in house IT department often, and if they do, they sub it out to an IT help desk or service center, which is not really full blown cyber security. They don’t have a disaster recovery plan in place, and then they get hit with ransomware, and it takes them down, and you’ve got to spend millions of dollars to get your assets back, and you’re losing all the money while you’re negotiating and trying to get those assets back. And we just thought we had a really powerful message to share as a collaborative group. And you know, cam from the operations space, Samir from the cyber security space, me from the marketing space. And all of us connected with manufacturing,
Curt Anderson 22:48
love it. Absolutely love it. Gina, so Alright, thank you. And man, what a fierce networker. Gina is demon. I mean, like she’s I know I believe you and I met years ago with the Twitter group and then active here on LinkedIn, and so cam, let’s come over to you. So we’re here talking about how, you know, you know, I have a, you know, manufacturing story here locally, where they get that ransom situation. And it’s ugly share a little bit. My first question for you, I’d like to know like, you know you had this epiphany at four years old. You knew why you were put on this planet, you could have gone multiple different directions. Computer, why cyber? And then let’s start diving in some tips and suggestions for folks. And how could they start better protecting themselves?
Kevin A. McGrail 23:30
Well, I, you know, that’s I, you know you’re, you’re a, well, I would call you a gray beard, but you know you’re, you’re losing your hair like me. And you know, I name all my gray hairs after, after my kids. But, you know, I started doing cyber before it was called Cyber. I mean, you know, you know, we just, really were just solving problems, very reactive, you know, originally, the the first internet connections I had were direct IPs.
23:56
We lost you can
Gina Tabasso 24:00
we can’t hear you. KAM, KAM, hear us either?
24:05
I think his Bluetooth headset went off and it died. Hey,
Curt Anderson 24:07
KAM KAM, KAM,
24:13
your Bluetooth headset
Kevin A. McGrail 24:14
died. No, I think, I think the internet went out. Am I here still? Yeah, I apologize. No worries, technology, no, I can say it better now, yes, by the way, I would like to say that Gina missed the opportunity to save your assets. But, you know, that’s, that’s just me there, you know, you know. So cyber was very reactive, just solving problems that were creeping up. And, you know, the the internet is an interesting place. You know, I love being involved with places like the IETF and having mentors like, you know, Dr Levine and stuff like that. But, you know, a lot of them are, are very they’ve never seen an evil side of the world. And so many things were set up on. The Internet where they didn’t really think people were going to use it maliciously, and so it’s been very reactive to try and solve those problems. So I don’t think it was so much like that I got into cyber as much as I got into how do I protect this? And then that led to, you know, those things. And we didn’t even call it cyber like, you know, for, you know, probably about, maybe about maybe about two decades ago, we really started calling it cyber security, but, but before that, it was just part of having a service. So,
Curt Anderson 25:28
excellent. So let’s, let’s start, let’s start tipping our toe. Any like, what are you seeing on the streets? What are some things like we’re targeting small manufacturers? What are some steps or some advice that you have for folks out there,
Kevin A. McGrail 25:42
I think the number one is, you know, probably the the biggest thing that I try and get people to do is to recognize that there’s three key points whenever I’m talking about a project, it’s, what’s your budget, what’s your timeline, and what’s your goals. And so many companies want to keep two of those three items hidden, which makes it very difficult, because, you know, it’s normally about risk adversity or risk handling. And so you know, if you tell me what your budget is, you tell me what your timeline is, tell me what your goals are, I can say, okay, in your shoes, I can apportion this money this way, or I can do these tasks. Or know you’re way off base with how much this is going to cost and whatnot. But it really dives down to how dependent Are you on your technology and, you know, budget accordingly. You know, I normally tell people, like, for example, if, if the internet goes out and your business stops, then you don’t, and you don’t have backup procedures for that. You’re not, you’re just ostraging or hiding your head in the sand. So, you know, think about how dependent you are on technology. What would happen if they’re disrupted, like Gina said, Do you have disaster recovery plan? Are you doing actual tests? You know, can you do things like turn off the internet and continue doing what your manufacturing is? Can you still take orders? Can you still ship orders if you can’t, you know, what can you do to fix those and de risk those individual problems?
Damon Pistulka 27:06
And it’s and it’s so interesting now in manufacturing, how many different paths that cyber criminals have? Because last year, I had a friend of mine. You know, running a manufacturing company might have been the year before, but they were running an older plasma cutter, right, an old piece of equipment that you would go, yes, it had a hard drive in it, but a computer was 10 years old or more, but it somehow is connected to the internet. Someone locked that thing up. They ended up having to go back to the manufacturer and get the entire thing re imaged on new hard drive, and basically throw the hard drive away, change what, however it was connected to the internet, and start over again, stop their production through that machine for like, three weeks. Well,
Kevin A. McGrail 27:52
if I can jump in there for a second, the three of us, Gina Samir and myself, are doing a presentation on the 13th for women in manufacturing, and I know one of the points I talk about is what I call the cyber danger zone, and it is specifically connecting OT. And it OT, for those who don’t know, on the call is operational technology. Operational Technology is my an old boss of mine. I loved his quote mark roroba Is anything that interfaces with the real world. So a building access control system, motor operated valve, a plasma cutter, you know, it interfaces and does something real. It is what most people are used to with informational technology and firewalls and servers and, you know, those kind of things. But when you connect the two, that’s where you get problems, because a lot of OT equipment like you described is sometimes decades old. Yeah, it might have been designed literally in 1960 it had no idea of cybersecurity, and all of a sudden you’re plugging it in and you’re letting it do things with the Internet. Is usually a recipe for danger. So that was a good softball to set me up for that and whatnot. But March 13, I know Gina will probably put a link or give it to you guys and whatnot to promote it. All right?
Curt Anderson 29:04
That is a huge problem. And that’s this Thursday, right? 13th is Thursday. So awesome, man, the three of you together, what a wild threesome man. You guys are just a powerhouse of and don’t you’re just saving cyber everywhere. So Friday
Kevin A. McGrail 29:19
is Pi Day, you know, three days, that’s
Curt Anderson 29:23
right. So, you know, and the same, the cyber danger zone, that sounds like a movie right now? Yeah, it could be like a good, you know, like
Kevin A. McGrail 29:30
worst song ever, yeah, the
Curt Anderson 29:34
worst danger zone, right? So, Samir, what do you got? David,
Damon Pistulka 29:37
well, the thing is, is that cyber crime used to be something that was reserved for larger companies, but now it’s the company down the street from you. It’s, it’s if you you probably can’t walk down the street or through an industrial park and not touch a company that hasn’t been hit by it or one of their suppliers have been hit. Buy it. But I’m not talking, you know, $2 billion companies, because we’ve seen that, obviously. But these are people that are a few million dollars
Kevin A. McGrail 30:08
or less. I mean, it can be a Nexus. I mean, I I probably would have to sit down and look at a calendar and tell you the last week where I didn’t have somebody calling me that was in tears, because, and it can be $100 it can be $1,000 it can be 10. I mean, you know, everybody’s pain points are their own, but you know, the number of scams I see and hitting very, very small organizations or even individuals up to large companies, it’s, you know, smear mentioned it. I actually have to usually warn people like, Hey, I’m going to use humor. I’m going to use dad jokes. Because, you know, you don’t want to sit here and listen to me give training for four or eight hours or whatever, about a problem without some levity. And you know, the dad jokes are like my compensation for how to deal with, you know, dealing with the dregs of the internet every single day. I will give you my favorite one. I mentioned a little bit about my son, but my son was heavily affected by autism. He was very young at the time, very non verbal, didn’t talk very much. We were at an event, somebody had a shirt that had a sad looking Tyrannosaurus Rex on it, and then it said, If you’re happy, and you know, it, clap your and then went, Oh. And my son was like, looking at this shirt, and he’s looking at it, he’s like, you know, he’s very clearly affected by this shirt. And he goes to me, and he says, Dad, do you know why Tyrannosaurus rex is can’t clap their hands? And you know, by this time, I’m doing like and stuff like that, and that’s what most people do. And he goes, it’s because they’re dead.
Speaker 4 31:42
They What’s your son’s name? Dylan. Dylan. Drop the mic. Dylan. Man, that was, what a stroke of genius. That was because they’re dead.
Curt Anderson 31:55
Oh, my God, no. Gina, that was the best dad joke on this show of all time. Yeah, it is. Cam, thank you, dude. Thank you for the tell. Dylan, thank you for the best dad joke of all time from your son. Dylan, so that was brilliant. Samir, let’s come at you, man. I gotta get my composure back. So Alright, we gotta get our serious faces on, right? So you are a cloud expert. Just share a little bit. What? How did you gravitate your expertise, your passion, your your skill set, you’re just, you’re you’re a crusader of helping folks with cyber Why did you go that direction? And let’s dive in. Let’s kind of piggyback off of cam. What are some things that you’re seeing on the street? What are some things that people can be doing? Let’s go
Speaker 2 32:35
there. So what kind of got me into this? Is skill set, honestly, you eventually grow into cyber what I’ve seen no matter what. So it’s an accumulation of knowledge in the industry and where you’re needed. People grow into each of these stages in technology. But what is the least amount of like populace is the high tier cybersecurity guys, like, that’s nothing that, like, is intentional. You can go learn cybersecurity, but like, if you don’t understand every aspect of the rest of technology, you’re going to struggle in that space, because you’re not providing the response and consulting that people need. And I have had the fortune of working with all kinds of organizations. I’ve worked with multiple MSPs managed service providers that cater to things of churches, manufacturing, hedge funds. I’ve worked with a number of different conglomerates, Honeywell relics. So I get the scope of technology. I know where the use cases are, how to do it, what to do, and that just makes a really good cybersecurity professional. And it’s not so much that we’re honing in on specifics for cybersecurity, but to understand how someone gets in, you need to know what keys are you they’re using. Where’s the door, where’s everything else? That’s a part of this, but that’s kind of like what led me into it, and why I’m decent at it. You know what I’m saying? Like, I got to go through, what is it? The gamut. But, yeah, tips for you guys, and this is me, kind of like, similar to Cam, we’re we’re seeing a lot of stuff. That’s where we used to have attacks on the major groups, but it’s more so everybody now. And why is it everybody? It’s because the major groups invested in cybersecurity over the last decade. Everyone else is trying to get their footing into technology in general, to even get to the point where they can consider and focus on cybersecurity. A lot of the environments that are in manufacturing, unfortunately, aren’t the best, and that is a well known exploitable thing for cyber criminals. They are looking at manufacturing because they know what technology they have on the floor for operational technology. They know what their stack looks like. They know what their networking equipment looks like. It’s it’s not uncommon. To look at these businesses in rural areas that are doing, you know, five to 50 million in revenue, and be like, that’s who we’re targeting. And these are out of country agents. This is, you know, Russia, Ukraine. We’re looking at people that are looking at businesses that are providing products, tangible products. It has to be tangible, because they are the ones that have the most diverse technology needs. Like you have to have this weird machine that, like, folds metal into this thing, and if it connects to the internet, oh God, if it connects to the internet, because a lot of them run off software like ham was suggesting that goes off of different operating systems. If you are on a Windows seven machine problem, it just means, like, the less you are up to date right now with the ever surging boom of technology, the more vulnerable you’re going to be. And honestly, if you are at the peak cutting edge, you’re also in that vulnerability shape. So keeping yourself in that medium of I’m not using stuff that’s expired, I’m not using the newest thing that exists, but I am keeping things up to date and patched in my environment. Those are going to be the key pieces that are going to help you, like, not get robbed so often. You know, like, I hate to say like that. I hate to be nonchalant about it, but like, it’s just what’s happening. And if you don’t do these important things, if you don’t take charge of your technology, which is, like, the big underlining component, if you don’t take charge and care, if you ostrich, like cam was alluding to, you’re going to be one of those people that are vulnerable to these kind of attacks, and it’s, it’s hard, it’s hard,
Curt Anderson 36:45
okay, and it gets a little scary. So Gina, talk a little bit. You guys have a wonderful event coming up this Thursday. Just share a little bit about, I know you’re super active with women in manufacturing. Let’s talk about the event on Thursday,
Gina Tabasso 36:57
please. Yeah. Um, well, before I go to the event, do I have a minute to you could take all day? Samir and Cam, I wanted to, I wanted to take it one step further. What they said, you know, cyber criminals in the past were using marketing methods, typical marketing methods, to attack people an email, you know, with requesting you to send a laptop because he left it in his car, or a gift card because your boss lost his wallet and they were badly spelled. We usually we had red flags really crazy email addresses that they came from. But cyber criminals now have become even more advanced because of technology. So they are using AI to attack people, and so their attacks have become more sophisticated through the use of AI. So it’s a little bit more complex than it was even a couple years ago. And then the other thing I wanted to mention from my area of expertise is I, you know, I have a Lean Six Sigma background, and Sameer and cam and I have talked about how cyber security is a process like any other process. So a lot of manufacturers practice Lean Six Sigma on their shop floor to avoid rework, eliminate waste, improve processes, increase efficiencies, but then sometimes they’re not doing it throughout the rest of their facility. And I’ve preached that about marketing, how I apply Lean Six Sigma to my marketing process, but your entire organization should be optimized. So you know, cyber security is a process, and it it needs to follow the same protocols you’d follow to protect your operations on your plant floor. So with regard to the events, Thursday is a busy day for Miss Gina. We are doing this virtual event for women in manufacturing. It’s a lunch and learn, and it goes way deeper into some of the things we touched on just now. Lot of data, a lot of information, and it’s at 1130 to one Eastern Standard Time, and you can register that for that up until Wednesday the 12th, the end of the day the 12th. We’ve got about 40 people or so coming already that are registered, but there’s plenty of room, because it’s a virtual meeting. And then I’m you talked about how we met Curt USA manufacturing hour the Twitter chat. I am hosting this week’s Twitter chat two o’clock Eastern, and I’m going to be talking about cyber security. So I kind of used some talking points from cam and Samir and I’s presentation for Wim, and pulled that into a quick, down and dirty for USA manufacturing hour. Excellent.
Curt Anderson 39:51
Alright, man, you have a hectic week, my friend. So yeah, here with us. Live today. You got the WIM program coming up on, on you. Said, on the same day, you’re, so you’re doing it,
Gina Tabasso 40:03
right? Well, the 1130 to one on Thursday and then two to three on Thursday. Well, you are. I wish you could get paid to do this stuff. I love it. I would love to do this full time.
Curt Anderson 40:16
So you’re, you’re really gravitating, alright, so cam, let’s come back to you. You piqued my curiosity not to reveal anything. But he said, like, there’s not a week that goes by when somebody’s not in tears. Can you just walk us through so when somebody has been impacted, what? What are the first steps they like, they have no idea where to turn Yeah, yeah. Let’s like, what’s a one on one? What do we do? Well, you know, it
Kevin A. McGrail 40:39
depends on how they get a hold of somebody like myself, like Sameer, somebody, you know, like I pride myself as a truth Sayer. So one of the things I try and do is start giving people information, start dealing with things that are time sensitive. So like, for example, you know, one of the biggest things I want to do is get them generally, to try and calm down. You know, they’re going through, like, just literally, like the five stages of grief. Sometimes they are literally crying, and I can barely, you know, understand even what they’re saying. But, you know, I need to get facts. I need to get some of them very, very quickly. So, you know, I’m kind of like a slap in the face or a cold water splash in the face, kind of trying to go, okay, look, you know, I need you to calm down and give me some information we might be able to help. Because, like, for example, if this happened, like three hours ago, you know, those companies or the bad actors, excuse me, will be working to mule that that money out of the US, usually at like $10,000 at a time. And so if we can get a hold of it in a certain period of time, we can start to put blocks on ACH. We can start following the threads and contacting banks. It won’t get them their money back necessarily, right away, but like sometimes, if we can freeze the funds, they will see it back in, you know, no joke, two to six months, they might get it back. There’s a whole bunch of procedures to prove it’s their money and those kind of things. But, you know, so usually, I’m trying to see, is there anything we can do that that would, you know, halt the damage as quick as possible? Did they use a credit card? Did they use a debit card? Did they use a check? Did they do an ACH transfer? What can we do it and then from there, it’s usually gathering information, trying to figure out, how did they get in? What are the particular policies and procedures, you know, we approach it very much from an engineering standpoint, you know, how did this occur and how can we prevent it from happening again? And, you know, the bad part is, is that it doesn’t usually have anything to do with intelligence or anything like that. People are usually pretty down on themselves. You know, people are like, you know, usually feeling really bad, but it’s a lot of times, it’s about catching people at the right time. You know, one of the stories from last year, a lady, you know, she just wanted to find love, and she fell for one of these, like, you know, kind of love scams. And I kid you not. I mean, you go back and you’re like, looking at this as an outside person. And she was laughing at it too, but laughing with, like, tears, because, yeah, you know, the whole the scam she fell for was an oil rig person who needed money paid so they could go on vacation. You know, that was, and I kid you not, the letter from the oil rig captain was literally Captain Crunch. And I’m like, Really, you fell for this, but, but, I mean, she probably has 180 IQ she, she teaches high level math. It’s just, you know, they caught her vulnerable, you know. And like, you know, for example, I had another customer that last week was literally waiting and waiting and waiting for a specific contract to come in. And something came in similar from DocuSign that was fake. And they, they, you know, they had people all ramped up waiting for it, like ready to jump on it, and then sometimes it’s other things. So, you know, the biggest thing I normally try and do is get a handle on what’s the TTP, the tactics, techniques and procedures that were used, trying to figure out if there’s any way we get there’s if it’s financial harm that we could stop to it, and then guiding people just on how to deal with this, legally, ethically, professionally, responsibly, and deal with it and hopefully have it not be an existential threat to the company. Because unfortunately, more often than not, I would, shouldn’t say more often, a considerable amount of the time the it can be enough to put a company under, yeah,
Curt Anderson 44:17
yeah. And I think from the emotional like you mentioned all the other traits, as you said, like people are in tears, they feel embarrassed, you know, like, how often do you feel like you’re playing a little bit of, like, shrink, you know? Like, just kind of, how absolutely, and
Kevin A. McGrail 44:31
a lot of times I’m like, Look, you know, we can, we can deal with the therapy later. I need answers, like, now because so you’re playing, yeah, I’m playing detective. And, you know, it’s like, you know, kind of like, you know, the murder has just occurred, and the suspect could be around the corner. So, yeah, you know, if we find the dead body, you know, 18 days later, it’s totally different, you know, kind of thing. But you know, usually I’m trying to, you know, time is of the essence, and a lot of these cases, so trying to, you know, be cognizant of and, like. Said, I tell people like, I’m not blase to this, I understand what you’re going through. And I actually, I’ll tell you a funny story. One time, I was working at a federal agency, and I was briefing about 200 people about a nation state level attack, and so I had about 200 engineers sitting in chairs, and somebody interrupted me and asked me why I was being so calm. And I said, Well, you know, I’ve got 200 engineers looking to Me for guidance. If you prefer me to have a have a breakdown, I could do that if you think it will help. You know, but in the meantime, I’m going back to my briefing. And I got back to my desk, and I had a an email from leadership at the agency, and it just, it had basically one sentence, and it said, are you aware that was a US senator? And I, I wrote back and just said no, but it wouldn’t have changed my answer anyway. And aren’t you supposed to let me know when there’s VIPs on my floor? So you know, it’s, you know, there is a level where I have recognized sometimes we’re almost too calm, we’re too dry. So like, for example, a lot of times, if I’m doing a training or something like that, that’s right after a compromise, we will tell people, Hey, we’re going to bring in dad jokes. We’re going to, you know, bring some humor to this. We’re going to bring some levity. It’s not that we don’t appreciate the gravity of this impact on your company, but you know, what do you want a boring presentation that you know won’t resonate with people? Or do you want some humor and people that take this very you know, carefully and passionately and and try and make things better. So, yeah,
Speaker 2 46:27
I will also add on to that, please. Samir, panic leads to bad things happening. Okay, when you are panicking and you don’t have guidance, you don’t have direction, you haven’t built a disaster recovery kind of thing, and you start making decisions, unconsulted decisions, on how you are going to defend your company against these guys that you don’t even understand how they’re attacking. I have seen reboots. I’ve seen like things that get rid of our forensic logs to be able to do these root cause analysis to play detective. Like cam was saying that would help us put you in a world of like, much better results than you know, you’ve already done. So, I mean, it’s not just a tactic to, like, you know, make things easier. It’s to put us in a position away from panic. Panic can just cause way too many bad problems for like,
Kevin A. McGrail 47:19
number one, number one technique that con artists use for 1000s of years, not just in the recent days, number one is to try and get you to separate your emotion and your logic. And if they can pull a lever that does that, then they will get you to turn on your lizard brain and do whatever they want them to do. And you know, the number one thing I hear during incident response is is something akin to 10 seconds after I did it, I knew I shouldn’t have done it. And the whole thing I try and do is to get people to step back, take that 10 seconds, talk to some experts. You know, I will give free advice to people. I’ve probably given away at least a couple 1000 hours of free advice to people during incidents, just to try and avoid exactly what Samira is talking about. Things like, well, I thought it would be better if I did this, or I decided to respond to them and do this, or, you know, those kind of things. And it’s just, you know, you know, Samira basically did it a little kinder than, you know, the smack your face and, okay, alright, now this is what we have to deal with. And instead of the Yeah,
Damon Pistulka 48:25
and it’s, like you said, though they separate your logic from your emotion, and the emotion takes over, and you’re like, oh, man, you know, it could be Yeah,
Kevin A. McGrail 48:32
and the and, you know, Gina brought up a great point, because she talked about it from a marketing standpoint, you know, you know, I one of the things I point out is, you know, while I have black hat background, and someday you can have me on and ask me some questions about like FBI raids and helicopter chases. You know, these days I’m completely a gray hat. I can never be a white hat until I fight a ball. Rog, but you know, you gotta be a, gotta be a Lord of the Rings fan again. You know the, you know when, when we’re dealing with these type of situations, I’m a behaviorist. I watch what the bad actors are doing. So I’ve been I, for example, we just published a zero day that we found last last month. And that zero day we found by watching what the bad actors were doing and going, Oh, why are they doing that? And then reverse engineering what they were doing, not using hacking skills. We basically just watch what they’re doing. And so we’re behaviorists. And thankfully, most con artists are not behaviorists. But like, for example, what Gina was talking about with marketing, everybody’s gotten those emails that are like, you know, for example, very bad English, very bad spelling. They’re very easy to figure out. And what I tell most people is there’s actually a reason they do it that way. Any guesses from you guys on here why they do that that way? So pretend that there’s five steps to get the scam before they actually get their money. The email is step one, and so they are actually pre filter. To get people that are more likely to follow through with all the steps. So in marketing parlance, we would say this is a pre qualified lead generator. Yeah, they use other techniques. They’ll use fear of missing out. Like, for example, one of my, one of my favorite things to talk about is, like, the the the scams and how old they are. But like, for example, you know, the A question I like asking is, when was the first electronic spam sent? I won’t, I won’t be Professor today, so I’ll tell you it, depending on your answer, it’s either 1861 or 1864 sent by telegraph, you know, literally Hawking either real estate or dental material. So many of these scams and the concepts we’re dealing with are not new. Another great example that goes into marketing. You’ve probably heard the phrase like, oh yeah. What are you going to do next? Sell me a bridge. You may not be aware that’s a real scam. Yeah. So in the early 1900s when they were building the first toll bridges in New York City, scammers went and printed up very fancy looking stock certificates. And then, you know, Damon will play the target here. And so, you know, I’d go up to Damon and I have five stock certificates, and I’d start pitching them about the stock certificates. And hey, you give me $1 for a stock certificate, and you’ll never have to pay a toll anymore when you go across this new toll bridge that’s building and whatnot. And then Samir is my, you know, partner in crime here, and he and Gina will come up to me and go, Oh, what are you selling? Oh, you got those stock certificates. How much are they? $1 Oh, that’s cheaper than the guy down the street here. Sell me. Sell me three of those, and I’ll take one. And now I’ve got one left. And you’ve just had marketing, you know, 101, where they’ve, they’ve validated the claim, and you’ve got fear of missing out now where you’re like, oh my gosh, here’s $1 give me that, that stock certificate, and, of course, me, Gina and Samir meet up on the next corner, have a good laugh, split the dollar, and then we get back the three other certificates, grab another one out of a briefcase that we’ve got, and we walk to the next corner and look for our next Mark. So
Gina Tabasso 51:59
that was George Parker. He was an famous American con man, and he his entire living he made illegally selling like property he did known in New York, all kinds of landmarks and a lot of times to immigrants, like people who were vulnerable, vulnerable communities like, look at how many times nowadays these hackers and scammers are scamming elderly people? Yep, you know. They’re going after vulnerable communities. And yeah, one of
52:30
the big ones
Kevin A. McGrail 52:32
that I’ve been dealing with from about four weeks ago people getting taken for about $15,000 they would do a fake ACH deposit and then threatened that they would affect their clearance. And so they had gotten a hold of people that were searching that were in the process of getting their security clearances, and they would say, you have to pay this money back right away because it was accidentally put in your thing, or we’re going to charge you with theft, and that’s going to affect your clearance. And of course, the ACH would bounce a couple days later, you know. And meanwhile, people would have transferred the money to cover the ACH, and it’s gone. So yeah, it’s
Curt Anderson 53:07
yes, but yeah, it’s so, you know. And, man, I know we’re coming into time. We can chat about this all day. The Kim, what I love, what you’re saying, because a lot of folks, when I have these conversations, like Samir, you mentioned, like, you know, burying your head in the sand, or came, I think you did as well. It’s not technology. It’s always been there. Like you said, we could go back centuries, and there’s people scamming, unfortunately, just Samir, are there really bad people out there? They really have bad intentions. Is that
Speaker 2 53:37
we should be look at like the global economy, right? Like, to them, it depends. It’s all about, like, value of $1 where you’re at in the world, right? So, and that also kind of lets you know who your targets are, right? So, depending, and this is coming from, like, heat maps globally, where we’re like, okay, we’re getting a central a lot of attacks from, like, certain areas and what type of attacks they are, it is kind of a where scammers are in the world, and, like, what matters to them? Because, I mean, I’ve seen $10,000 attacks from like, certain groups, but then, like, you start looking at these more organized syndicates that are doing, you know, multi millions. It really depends on, like, you know, where in the world they’re coming from, and that helps Iran,
Kevin A. McGrail 54:16
Iraq, Russia, China, former Soviet Union countries, Tunisia and Nigeria. There’s your there’s your,
Curt Anderson 54:32
alright, so Samir, let’s we’ll start winding down any, any, anything that you want to add as we start wrapping things up. Any, any tips, any suggestions for folks to kind of again. We can’t hide our heads in the sand. We can’t ignore technology. We can’t go hide from the internet. What are some things like? How can people be more resilient to protect themselves?
Speaker 2 54:50
So I want to start with a an important piece of information, because a lot of the stuff that cam was talking about was Ach, credit card and stuff like that. Those are. The piece is that if you’re a business owner, if you’re doing business operations, you have a business bank account, right? You need to know the restrictions and regulations that are around that there’s a group called natcha na Cha. They’re the policy group that basically determines whether or not a bank is allowed to be on the ACH network right now. Without going into too much detail, they basically flat out said that if you have a business bank account, you have less than 48 hours to deal with a fraud instance. Back to camps thing. We don’t have time when bad things happen. You need to realize them as quickly as possible, and then contact a professional, contact your bank, get on it. The normal person basically has like, 60 days to deal with a fraud instance, which is why it’s so much more important for business owners to be vigilant and like, you know, where if a mistake has made, if you aren’t able to deal with it within hours, like, it’s gone, it’s gone. Can’t give that five hour window that’s very real, and it can take, even if you deal with it within that five hour window, you still have like, six to eight months for it to, like, get out of the clearing houses and back to where it’s supposed to go, right? And it’s a challenge for businesses, because it’s like, where are you sending your money to? Is so important, and this is why I made my company for study verify. Because you need to know who you’re sending money to when it’s business related, you don’t really have that window of opportunity to, like, chill and deal with it later. And they’re targeting you. They’re targeting your accountants at 5pm on a Friday because they know that window is going to lapse, and they also know that there is no other party to verify that this is the correct thing, because your business partner’s accountant is off, like, it’s 5pm on a Friday, who’s going to actually be able to help you deal with that? These are the things that, like, keep me up at night, because I can’t save a business that is outside of its window for a CH fraud. I can save you from ransomware. We can build you back up. We can help you do that. But a lot of the time when you get hit with, like, these financial fraud situations, and the moment that you get back to, like, you know, talking to professional about it, it’s already over. I’m
Kevin A. McGrail 57:04
just sent a flyer out, and I forgot about this with Samir. But you know, I typically tell people there’s three policies that you can implement, number and this was based on a study I did in 2023 of every incident response that we dealt with that dealt with financial exfiltration, fancy term for money got stolen. So policy number one was ban the reimbursement of gift cards. It’s one of the number one ways they try and get non ACH transfers through number two, Ban the change for any ACH or direct deposit changes unless there’s a secure form and what we call an out of band contact, meaning somebody who knows that person calls them or texts them that you verify this change, also using Forseti and what, what Samira is building, is how we started talking, because the ability to verify ACH with another method is a key. And then really for the rule of threes, here is use multi factor authentication. If you did these three policies, you would stop every single hack that we had seen where money was stolen for several years worth of records,
Speaker 2 58:08
absolutely, and to kind of talk. On top of this, what you’re looking at are financial security controls. These are things that like you would practice as an organization, you would adopt this in your company culture, right? And it it’s not easy to get to this point. You need to have some sort of representation in your company that’s going to lead this cultural effort. And then you can start enforcing these things. But like, if you don’t have a core competency in technology and you don’t understand your ot versus it, getting to this point is, I hate to say it’s a lot, a little bit of a pipe dream for a lot of them. So growing your technology, growing to yourself, where you’re able to, like, understand your own organizational needs, and then enforcing cyber security, financial security controls for people to follow, is where you want to eventually get to. And what is it? I’ve heard it said before, you’re all on a security journey where you are now and where you want to be. It’s deterministic for you know, your industry and your business, but that’s where we want to take you guys. Like, yeah, we want you to get to the final point of your security journey where you are confident and comfortable with the ever flowing changes and the growth that comes with technology and your business,
Damon Pistulka 59:24
yeah? Well, it’s, it’s, it’s just, you know, the the graphic that you had up there,
Kevin A. McGrail 59:30
the three things stop sharing. It kicked myself out of the show,
Damon Pistulka 59:34
yeah, but they the graphic that you had up there. It’s simple stuff, right? It’s fundamental things. We have to just keep practicing the fundamentals and make sure. I’ve had this happen to me. I had, I was on the board of a local nonprofit. I had other board members that called me up. Said, hey, something wrong? Because someone says they need amazon gift cards. I’m like, nope, but they called me right? You’ve got to remember. Remember that every email you get, every text you get, every message you get on social media might be somebody else. So if it sounds odd, the only way to do it is to verify in person. I like you had one was in person up there or by phone. So you know, it’s not just an electronic fraud,
Kevin A. McGrail 1:00:18
exactly. And then this is another ot flyer. By the way, if companies are looking for it, love to talk to them about like, doing like, pack in flyers, produce these for customers. The other side has company brands. You know, you can get these with invoices and things like that, to help customers. That’s why we, we do these kind of things. But, yeah, it’s very
1:00:35
cool. It’s awareness, man. It’s all awareness. It is
Damon Pistulka 1:00:37
awareness. Yeah, thank you. Okay,
Curt Anderson 1:00:39
I know, man, I go, we like, we, we’re like, on overtime here. Gina, let’s find and so, man, this Thank you, Gina, thank you for sending us up. Gina, I’m going to go around the horn one last time, take us home. We’re can folks find you? Gina, I know LinkedIn, your website, just share work. Folks can find you. Two events coming up on Thursday. Just Let’s recap that, and then we’ll close out for today.
Gina Tabasso 1:01:01
Yeah. Well, you can reach me at Barracuda B to b.com letter B, number two, letter B. My email is Gina at Barracuda B to b.com and I am on LinkedIn. I don’t know if I’m the only Gina tabasso or not. I never, never bothered to look, but I’m the best Gina tabasso. And yeah. Reminder, Thursday, 1130 to one, we’re doing a deeper dive on cyber security for women in manufacturing. Virtual event registration still open, and I’m hosting the USA manufacturing our Twitter chat from two to three that same day, Eastern Time, also on cyber security.
Curt Anderson 1:01:45
Nice. Hi. Gina, again, thank you. Cam, we’re for where can folks find you? Damon’s dropped all three of your LinkedIn profiles in the chat box there. Kim, how can folks find you? Yeah, LinkedIn
Kevin A. McGrail 1:01:55
is great to find me. I’ll also on the 17th, next Monday, I’ll be teaching technical writing too for Google. It’s free. So developers, period, google.com/tech-writing, you can see the classes. I also have one in April on technical writing with AI. So in addition to cyber security, I do a bunch of other topics and, you know, whatnot. So you can find me there. I enjoy people heckling me, dad jokes, etc. So nice.
Curt Anderson 1:02:21
Awesome. Samir, where can folks find you? LinkedIn
Speaker 2 1:02:25
is a fantastic way to get in contact with me. Sameer, at datapros Consulting com would be a good email if you want to reach out for any important, you know, conversation pieces. What I’m going to be doing this next little bit is getting Forseti out to the people that need it, and we’re doing payment merchants, so that way we can make sure that our product is in the SMB space. We want to make sure that it is affordable for a lot of people, and that’s a great way that we found to do that. So, yeah, nice, awesome.
Curt Anderson 1:02:54
Alright, well, say, I know we’re over time, so guys, thank How about a big round of applause Damon for our wonderful panel today. I just really, this was just a awesome, phenomenal jam session. Yeah,
1:03:06
wonderful. Hello, and
Curt Anderson 1:03:09
and again. Like, if you Damon, do your thing, right, go back and hit that rewind button. A little, a little that slide was powerful, right? Yeah,
Damon Pistulka 1:03:16
yeah, if you got in this late, go back to the beginning and listen from the beginning, because they were dropping some incredible information about cybersecurity and some simple things you can do to protect your company and really help your organization stay safer. So it just awesome stuff today, guys, thank you so much. Yeah, this
Curt Anderson 1:03:35
was a master class. Gina, again, big our sending, our heartfelt thank you to you for setting this up. Cam, thank you wonderful dad that you are. Samir, good luck. Best of luck with your 17 month old. Guys. Hang out with us for one second and crush it on Thursday. Guys, yep. How it goes with the women in manufacturing? We got Gina on the Twitter or x manufacturing hour at two o’clock. So we will see you guys on we’re back here Friday. We’ll see you guys soon, and rest you guys hang out with us for one second and we’ll see you soon. Bye, okay? You.