Threat Emulation with Andrew Costis
Easy Prey11 Sep 2024

Threat Emulation with Andrew Costis

Security risks are dynamic. Projects, employees, change, tools, and configurations are modified. Many companies utilize PEN testers on an annual basis, but as quickly as systems are revised, you may need to implement threat emulation for regular monitoring.

Today's guest is Andrew Costis. Andrew is the Chapter Lead of the Adversary Research Team at Attack IQ. He has over 22 years of professional industry experience and previously worked in the Threat Analysis Unit Team at Firmware, Carbon Black, and Logrhythm Labs, performing security research, reverse engineering malware, and tracking and discovering new campaigns and threats. Andrew has delivered various talks at DefCon, Adversary Village, Black Hat, B Side, Cyber Risk Alliance, Security Weekly, IT Pro, Bright Talk, SE Magazine, and others.

Show Notes:
  • [1:14] - Andrew shares his background and what he currently does in his career at Attack IQ.
  • [3:49] - At the time of this recording, there has been a major global security panic.
  • [6:06] - There are many programs that we use on a regular basis that we don't always consider the security of.
  • [8:09] - Historically, companies would pay for an external pen test. Andrew describes the purpose of this and how they usually went.
  • [9:33] - Pen tests and threat emulation do not need to be limited to just once a year.
  • [10:45] - Andrew's team is in the business of testing post-breached systems. But they preach prevention.
  • [11:55] - Attackers are lazy in the sense that they will reuse the same strategies over and over again.
  • [14:13] - Many programs we use may be caught in the crosshairs of attacks and vulnerabilities in other companies.
  • [16:41] - Andrew discusses the frequency of really critical CVEs.
  • [19:01] - What do attackers go after when they've breached a system?
  • [21:04] - The priority for attackers is to get in quickly and make the victim's data unavailable.
  • [22:24] - A lot of people are under the impression of vulnerability testers. "Fire and forget it" is not a beneficial mindset.
  • [24:56] - If we run every test, the amount of data will be overwhelming.
  • [27:03] - In his experience, there has been client testing that has been overwhelmingly easy to breach.
  • [29:07] - There are also organizations that have done a fantastic job. However, vulnerabilities will still be found.
  • [30:18] - The red team is not going to be able to cover your entire organization.
  • [32:15] - Threat emulation and pen testing are technically the same thing. Andrew explains how she sees the difference.
  • [33:50] - How are vulnerabilities and tests prioritized?
  • [36:19] - Andrew describes the things his team works on and their objectives for customers and clients.
  • [38:34] - The outage at the time of this recording had a big impact. It gave a really good idea of what could happen if it were a real security breach.
  • [41:37] - There are a ton of free resources out there. The primary resource at Attack IQ is the free Attack IQ Academy.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Episoder(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mar 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mar 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mar 45min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
forklart
popradet
stopp-verden
fotballpodden-2
rss-gukild-johaug
lydartikler-fra-aftenposten
nokon-ma-ga
det-store-bildet
hanna-de-heldige
dine-penger-pengeradet
rss-ness
rss-espen-lee-usensurert
aftenbla-bla
e24-podden
rss-dannet-uten-piano
rss-penger-polser-og-politikk
frokostshowet-pa-p5