LeastTrust IT

Transcript Insider Threats

00:27 hey good afternoon everybody happy

00:29 Friday uh it’s a little cloudy kind of

00:32 gross here in New hampster uh we’re so

00:35 excited to have our good friend John

00:37 back um uh Tim golden founder of

00:41 compliance scorecard where we help your

00:43 msps operationalize the governance risk

00:46 and compliance pieces within your

00:48 business uh let’s see Mr Tim how are you

00:53 today doing doing great doing great and

00:56 uh really excited about this episode

00:58 John Pryor and I uh former colleagues uh

01:02 I got an extra r on my name

01:04 there I’m fixing

01:07 it uh you know I like for the emphasis

01:11 um but John and I used to work um at a

01:14 company called IAP ocean Tomo which was

01:17 known for its uh patent and IP auctions

01:21 that were really bringing together all

01:23 the buyers and sellers of Ip uh globally

01:27 these auctions were all over the place

01:28 they were a lot of fun John was actually

01:31 a phenomenal live Auctioneer and we went

01:34 to kind of work on different different

01:36 careers I I started working cyber

01:37 security and John continues to be one of

01:40 uh the world’s top IP strategists so

01:42 really excited about this like Tim shner

01:44 inquisitive it um I work in the tri

01:47 state area helping small businesses uh

01:50 Finance accounting law firms uh to um

01:54 help with their secure it so Jesse

01:58 you’re up awesome awesome let me PA

02:00 Jesse up into the right spot so we have

02:02 the right things you know trying to

02:04 trying to do some new

02:06 stuff um yeah I like this cool new

02:09 scrolling thing you got going on Tim

02:10 that makes it look super fancy um trying

02:14 yeah so I’m Jesse Miller founder of

02:16 power PSA Consulting uh we help msps to

02:19 scale their Security Programs and do it

02:21 profitably um I’m as well like Tim said

02:23 I I love following John and Linkedin and

02:25 all the things he has to say and I

02:27 especially appreciate what he does from

02:29 a VC perspective because he actually

02:31 gets clients to listen about doing data

02:34 tagging and data prioritization and data

02:37 management techniques that always seem

02:38 to find their way to the back burner so

02:40 again excited for uh the the show today

02:44 and getting to some maybe some pragmatic

02:46 techniques that our listeners can take

02:47 away to start talking with their clients

02:49 about Insider risk and um how we can

02:52 start structuring our programs around

02:54 that awesome awesome and Mr John welcome

02:57 to the show uh thank you so much for

02:59 being here let’s get you up on

03:02 stage that’s great I mean thank you very

03:05 much guys for the for the welcome for

03:07 having me back uh really appreciate it

03:09 and I think to pick up on a couple of

03:11 comments I I’m really

03:14 uh psyched motivated about the intersect

03:17 of uh intellectual property and uh

03:20 information

03:21 security I don’t think either area are

03:24 given sufficient attention but I I

03:26 honestly do

03:27 believe living through the big

03:31 ever misappropriation of corporate

03:34 wealth in history through essentially

03:36 through trade

03:38 secret love it love it and I supp

03:44 appropriation go ahead I suppose I I

03:47 ought to give myself the opportunity to

03:49 say hello because I’m not getting really

03:51 good at doing that from time to time but

03:54 uh yeah Tim Tim golden founder of

03:57 compliance scorecard as I kind of

03:59 briefly said in the beginning we help

04:01 your MSP uh take this whole crazy scary

04:05 thing compliance and kind of break it

04:07 down into uh uncomplicated meaning and

04:10 uncomplicated methods for you and your

04:12 MSP to kind of operationalize compliance

04:16 risk and all that fun stuff and so we’re

04:20 really excited today uh like I said to

04:23 have John because you know we’re g to

04:25 talk about uh Insider

04:29 threat negligent or or malicious right I

04:33 know we have some topics here that we’re

04:34 going to kind of get through so uh let’s

04:37 just Dive Right In my

04:39 friends yeah yeah so um John you know

04:44 like I said he’s one of the world’s

04:46 biggest IP strategies strategist um I

04:49 wrote a white paper probably a month or

04:51 two ago about malicious Insider threat

04:54 and um specifically you know there’s

04:58 there’s different kinds of sensitive

04:59 data in a in a small business

05:01 medium-sized business large business

05:03 right there’s the data you hold on

05:05 behalf of customers which is usually

05:09 what Regulators are looking for you to

05:11 protect and a lot of the compliance that

05:13 Tim deals with is is you know focused on

05:19 you know customer data then there’s

05:21 proprietary and strategic data which

05:24 which John is referring to you know we

05:26 we’re witnessing some of the biggest

05:28 theft of corporate you know corporate

05:30 Assets in history right like employees

05:33 walking out of a firm employees not

05:35 being careful um and there’s two Insider

05:38 threats right there’s malicious Insider

05:40 threat and then there’s negligence right

05:43 so like just having bad cyber security

05:45 and your borders are open your walls are

05:48 open you’re easy to fish that would fall

05:50 under the negligent category and then

05:52 malicious is really this um Insider who

05:55 was aware of great assets um you know

05:60 proprietary assets could be anything

06:02 could be recipes could be uh you know

06:06 decks uh sales lists customer lists

06:08 right um and then taking those with them

06:11 or giving them out a competitor for some

06:14 kind of

06:15 compensation uh this malicious Insider

06:18 threat like we usually hear about in the

06:19 news like someone leaked secrets to

06:22 China right like from a you know that’s

06:26 that’s more of a national security

06:27 concern but this happens all the time uh

06:31 at corporate businesses so um John yeah

06:34 any any thoughts I I was going to refer

06:37 to a famous movie with I don’t think

06:39 it’s that famous with Julia Roberts and

06:41 Clive Owen and they’re involved in

06:43 corporate Espionage if anyone seen that

06:48 movie love the movies yeah if you

06:51 haven’t John it’s definitely it’s

06:53 definitely a weekend watch

06:57 yeah yeah I know but uh yes

07:01 yeah the the the the press that came out

07:04 at the weekend over the guy uh and we

07:07 shouldn’t bang on about China in

07:08 corporate Espionage but this I’m not

07:10 sure this was nation state Espionage but

07:12 he was certainly corporate Espionage the

07:13 guy had been working at Google for 15

07:15 years spent an inordinate amount of time

07:18 back in China but uh but nobody knew he

07:20 was in China because his mates were

07:22 still carding him into the office uh but

07:24 he was over in China

07:26 basically pip uh you know walking around

07:28 selling uh Google’s uh top secret AI uh

07:34 you know code essentially and hopefully

07:37 make money for himself off the back of

07:39 it uh what he was doing how he was doing

07:41 it Tim you know I was kind of surprised

07:44 Google allowed this to happen on his

07:45 mapbook he was saving it down to notes

07:47 then he was transferring it to PDF and

07:49 then he was able to send it out and it

07:51 wasn’t being tracked it wasn’t being

07:52 identified and so you know this guy who

07:55 was former FBI director of cancer

07:58 intelligence said you know BS are being

08:00 dropped here left right and center and

08:03 you know three simple steps one is I

08:06 know what your crown jewels are number

08:08 one you need to get much better

08:10 identifying what is a crown jewel number

08:11 two identify the employees or exposers

08:14 and this comes back to something you

08:15 said the other day Tim you know least

08:18 least risk lean function I think it was

08:20 and and then number three monitor those

08:22 employees and the crown jewels so if the

08:25 guy’s leaving and going to China know

08:26 about it and it’s not that hard to do to

08:30 ATT trct that kind of information but I

08:31 guarantee the vast majority of

08:33 businesses don’t have a

08:36 proper you know my experience not proper

08:39 idea what what their cran jeels are

08:41 because they change all the time of

08:42 course depending on what’s going on in

08:43 the business yeah yeah I think that Tim

08:46 golden Jesse before you jump in Tim Tim

08:48 actually did something so cyber security

08:50 we’re going to call this asset inventory

08:52 Asset Management right Tim like step one

08:55 yeah right so it’s it’s amazing how like

08:58 the parallels and the cycle of Ip is it

09:01 just Falls right into line with cyber

09:03 security as well exactly I mean you know

09:06 know know what you have know where it is

09:08 know who who has access and I think this

09:10 is where Jesse’s going right before I

09:12 steal his Thunder is no no go go for it

09:15 where where is it who has it you know

09:17 all that fun things right and so Jesse I

09:18 know you were gonna chime in so let me

09:20 pull you on up well yeah no I you know I

09:22 think it’s interesting and we talk about

09:25 uh like John mentioned the overlap of

09:27 Trade Secrets IP and cyber security

09:29 right while they there are some

09:31 different pieces there there’s kind of

09:32 like that ven diagram where they do

09:34 overlap in the middle and I think uh a

09:37 simple pragmatic reason to get a crown

09:39 jewels exercise done is that it helps

09:42 you Target and get aligned with the

09:44 business and actually strategically

09:47 position cyber security controls that

09:49 help the business protect what they

09:51 value most so Trade Secrets aside I I

09:54 still don’t understand why we’re not

09:55 doing crown jewels exercises and

09:58 identification kind of like the first

09:60 thing in the door that we do as vcos and

10:03 risk strategist for our clients because

10:05 when you sit down and force leadership

10:08 to think through what the most critical

10:10 things are and then align those things

10:13 that they’ve said are critical with the

10:15 controls were proposing all of a sudden

10:17 that’s telling a story and it makes a

10:18 lot more sense and we might discover

10:21 that hey we’ve been doing some things

10:22 that maybe we’re not getting a ton of

10:24 mileage out of and so maybe we should

10:25 shift efforts take money and shift

10:28 budgets and that becomes in a business

10:29 conversation I think it’s very powerful

10:31 to do all those things for the security

10:33 program even aside from Insider uh and

10:36 threat and IP protection right yeah so

10:40 I’m gonna I’m gonna be I’m gonna be the

10:41 guy right I’m gonna I’m gonna talk a

10:43 little bit through like you know we use

10:45 these words crown jewels right let’s put

10:48 this in terms that msps can understand

10:51 right I’m not gonna walk into my

10:53 customer and say to them uh hey let me

10:57 talk about crown jewels because you know

11:01 they’re GNA be like uh no like it’s just

11:04 weird to them right so if I’m an MSP and

11:07 I’m trying to have this risk

11:09 conversation this you know Discovery

11:12 conversation like how do I even walk

11:15 into that customer and be able to start

11:17 that right what is a pragmatic way for

11:20 us to do that yeah F first first thing

11:23 Tim if I may jump in is uh what’s

11:26 existential yeah if this went missing

11:29 this got lost somebody stole it with

11:31 that impact your ability to to carry on

11:33 as a business with that impact your

11:35 ability to make money right if so that’s

11:37 probably going to be one of your most

11:39 sensitive most valuable piece of

11:40 information yeah so existential number

11:43 one number two it’s then profit impact

11:44 if but it impacts on your profitability

11:47 and then the next one down is yeah

11:49 impacts on a business but not not that

11:51 major kind of thing so if you can

11:52 categorize things in those three three

11:54 areas that’s relatively simple to do

11:57 people get their head around in my

11:58 experience quite quite quickly you know

11:60 existential profit impact and just

12:01 general impact and see how you go but

12:03 I’ll be really Keen to see what you guys

12:05 how you guys do it as well that is wild

12:08 that you just said that John because I

12:09 literally have an explainer that I use

12:11 with my clients it’s like you were just

12:13 reading off of that and that’s funny may

12:17 be a little better than

12:18 mine but that’s it I think right what’s

12:21 a high level Crown Jewel is something

12:23 that’s existential to the business if

12:25 the CIA was compromised either the

12:28 confidentiality the integrity or the

12:30 availability of this data or system does

12:32 that pose an existential threat to our

12:34 business right and that’s that’s a

12:37 really easy way to think about it and to

12:39 your point uh Tim I think uh I I used to

12:42 call them when I worked in the MSP as a

12:44 as a ceso with our clients and with our

12:46 team we’d call them applications or line

12:49 of business applications so you could

12:50 call it critical systems you could call

12:52 it line of business applications that

12:54 starts to make more sense maybe to the

12:56 client when you’re dealing with a less

12:57 sophisticated organization right

12:60 gotcha all right so

13:02 streamyards having a little bit like

13:06 that was me streamyards having a little

13:08 bit of lagginess so thank you everybody

13:09 for your patience I think that might be

13:11 Elon with with the satellite that Jesse

13:16 uses something yeah

13:18 there’s you know yeah it’s all good

13:22 though so so uh so to kind of uh just

13:25 for the listening audience maybe I have

13:27 a little bit better connection I’ll just

13:28 restate with Jesse was saying and that

13:31 is instead of using words like crown

13:33 jewels maybe you use words like line of

13:38 business applications or what we like to

13:41 walk through like a risk I’m sorry a

13:45 revenue process what brings you know how

13:48 do you make money right walking into my

13:50 customer as an MSP and flat out asking

13:53 them what makes you money because in

13:57 that is the crown jewel

13:60 right oh well and we talked about this

14:03 uh on Wednesday with our good friend Joe

14:05 from lionard like as an MSP I can walk

14:09 into the baker I can talk to that Bakery

14:13 about like like is your freezer more

14:16 important than your

14:18 frier right or is you know the cashier

14:21 out front more important than uh the

14:25 milk right and so you can kind of start

14:28 to have that

14:30 conversation in the words that they’re

14:33 used to instead of Crown Jewel or line

14:36 of

14:37 business or apps or whatever having that

14:40 conversation in terms that they can

14:42 understand like for example hey do you

14:46 care about your milk as a baker or do

14:48 you care more about you know the the

14:51 cashier out

14:52 front I think yeah Tim it gets even like

14:56 fuzzier right like how long’s your

14:58 business been like if the average towy

15:01 came by like would they know the name of

15:02 your business right like that’s hard to

15:06 that brand and uh what you’re doing

15:08 that’s special in the market right like

15:10 that’s hard to kind of I don’t know

15:13 conve or or like unearth with the

15:17 customer usually right like as you said

15:19 you’re mentioning kind of hard assets

15:20 physical assets this idea of

15:23 intangibles um as you said what makes

15:26 them money I think is is really really

15:29 you know that deep conversation that’ll

15:31 unearth these risks right as well on on

15:34 like what’s it going to like what would

15:37 have what would have to happen to your

15:38 business for it to you know stop stop

15:41 selling right or or becoming you know

15:43 the place that people went in that in

15:45 that community so um you know I think

15:49 that I think that yeah and great comment

15:52 there uh uh if you want to pull that up

15:55 to him I don’t have access to it but

15:57 yeah so our good friend Bob hey Bob

16:00 thanks for listening glad to have you

16:02 here um you know do the do the things

16:06 right the the things

16:10 so Bob teaches Innovation actually and

16:13 deals with a lot of Ip and and Bob John

16:15 he’s a great person for you to connect

16:17 with um down in down in Louisiana he

16:21 he’s a he’s a professor or a visiting

16:24 Professor teaching about Innovation um

16:26 and we talk at length about this like

16:28 how startups protect protect themselves

16:30 uh what’s the best way for them to

16:33 protect IP to get you know a Competitive

16:35 Edge very early when they’re Scrappy so

16:39 there he is yeah so so Bob does bring up

16:42 a good question it kind of circles back

16:44 to that you know things to protect

16:46 physical cyber so on and so forth the SE

16:49 Suite so uh Jesse you wna you want to

16:51 chime in on a little bit and then you

16:53 know we’ll get John’s take on it too

16:55 well he you know he’s exactly right and

16:57 I think and this is no knock against the

16:60 SE Suite or any anything like that they

17:02 have a wide variety of business risk

17:05 that they’re dealing with and so cyber

17:06 security is one little piece of that and

17:08 we got to keep that in mind right but

17:11 when we start broadening that that uh

17:14 overlap and talking about what’s

17:16 important to the business and what are

17:18 business risks and how do our our Trade

17:20 Secrets and our intellectual property

17:21 affect that and how do we protect those

17:23 from a cyber lens and they’re

17:25 participating in choosing those things

17:28 again we want a mandate from the top

17:31 down to say the the executive team has

17:33 stated that these are the most important

17:35 parts of the business most important

17:37 data in the business most important

17:39 systems in the business and they have

17:41 mandated that we protect them and he

17:43 said they are emotionally invested

17:44 that’s what I really liked about Bob’s

17:46 comment because that’s true you’ve taken

17:48 them out of their Whirlwind of all the

17:49 other things that they’re doing and

17:50 you’ve allowed them to uh anchor in

17:53 their mind why cyber security is

17:55 important and why we need to do the

17:56 things that we say that we’re doing

17:59 gotcha that’s good stuff good stuff just

18:01 more comments coming in yeah it is of

18:03 course it is thanks

18:05 Bob yeah it’s Gotta come it’s got to

18:08 come from the top right You’ gota you’ve

18:10 got to get make them believe why it’s

18:11 important why they need to protect uh

18:14 their advantage and why they need to

18:16 empower employees and build this kind of

18:19 culture that um it’s not okay just like

18:23 walk out with lists and things like that

18:26 um I I put together some slides I don’t

18:28 know if we’ll get time doing but I

18:30 really talk about the life cycle and

18:32 there’s people processes in technology

18:34 and technology is really really only

18:36 there to enforce policies and the things

18:39 that we’re I think trying to wrap our

18:42 head around right now like having those

18:44 initial conversations with the business

18:46 leader and building policy right

18:48 building building a framework building a

18:50 way to think about like how we’re going

18:52 to protect this yeah and cyber security

18:54 starts to come into the picture at least

18:57 uh from a tool perspective um to enforce

18:60 those policies and and make sure that

19:02 employees do the right thing right so um

19:06 John yeah any any any thoughts on that

19:09 and I know

19:11 you’re

19:14 yeah sorry your band list pretty good

19:17 right now so yeah go

19:21 ahead yeah I don’t know what’s going on

19:22 with the UK and the the sort of

19:25 bandwidth but uh yeah I always say and

19:28 it’s a very simple to say and and

19:30 probably difficult to ra it starts and

19:31 ends with the employee and the employees

19:34 understanding if they’ve got a good

19:35 understanding of what intellectual

19:37 property is what’s most valuable in your

19:38 business and why it’s important to

19:41 protect and defend that the the battle

19:44 is largely

19:46 one uh because people are looking out

19:48 for it but it’s often not the case that

19:52 people have good understanding of what

19:54 it is I mean let’s be honest

19:55 intellectual properties is are very

19:56 nebulous Concepts anyway and the vast

19:58 majority people really don’t have a a

20:01 common understanding what intellectual

20:02 property is and they’ve never spent the

20:03 time to do so and that that in itself

20:06 potentially my my world at least my

20:08 small world at least is is an issue it

20:10 may well be the same with with with I

20:12 you know information security as well

20:13 but the terminology is designed to send

20:17 people down Avenues you know what

20:19 patenting a copyright and all that kind

20:21 of stuff it’s just gobbly go you know

20:23 but uh most people don’t fully

20:25 understand what what IP is and hence

20:27 they can’t be looking at to protect it

20:29 and and as you said top of the airl 10

20:32 the majority of the ma valuable

20:35 information the business is lost

20:36 inadvertently by insiders uh not

20:39 maliciously I think he said 56% or 26%

20:43 is is malicious so if you can if you can

20:46 train your employees you’re you’re

20:47 trying to reduce that 56% the the 26%

20:51 then you do need the technology as well

20:53 to come to bur that’s where you guys

20:54 come in to to help track what’s going on

20:56 and who’s who’s downloading and who’s

20:58 who’s exporting and so on and

21:00 so yeah yeah the whole the whole idea

21:03 around either you know negligent or

21:05 malicious right you know for me I start

21:08 to think of

21:11 um are we as a small business I’m put my

21:16 small business hat on are we as a small

21:19 business um are we are we just dumb and

21:24 you know ignorant and ill-informed

21:26 because we don’t know that that the uh

21:30 the employer employees going to just

21:32 grab the list and walk out the door is

21:35 that is it from like our executive piece

21:37 like oh I I never thought my sales rep

21:40 would take my list and go work for my

21:43 competitor is it that side or is it the

21:47 I’m an employee and and they’re not like

21:50 I want to make more money so I’m just

21:52 gonna steal their list and go to my

21:54 competitor that’s going to pay me more

21:55 money and I’m gonna bring my book of

21:56 business right so is it that whole you

21:59 know that whole neglect or is it

22:02 malicious you know or is it all of it is

22:05 it both sides of it when we think of you

22:07 know Insider threat and there’s a whole

22:11 big

22:12 conversation about where this relates

22:14 into supplier risk third party risk and

22:17 so on and so forth up and down the chain

22:20 but kind of bringing us back into the

22:22 sort of topic of today is it just

22:25 ignorance and neglect or is it bad Mal

22:29 ious employees or is it

22:32 both so Tim you write a lot on this but

22:35 I think a lot of it is uh Tim know that

22:38 is it’s uh it’s always been there Tim

22:41 golden it’s always happened and uh you

22:44 know the sales guy who became becomes a

22:47 CEO somewhere along the line in his

22:49 career he’s taking PowerPoints from one

22:50 business to the next and he’s he’s

22:52 taking contacts and CRM information from

22:54 one business to the next you know it’s

22:57 you know my skill actually when I’m out

22:59 there in the market not me but you know

23:01 is actually getting people to talk talk

23:04 over and above what they should be

23:05 talking about and I learned so much at

23:07 that

23:08 conference uh but Tim you you’ve written

23:10 a bit about this I’ve I’ve read a couple

23:11 of your articles it’s along those lines

23:14 I think yeah no absolutely Bob Bob had a

23:16 great comment there uh it’s everything

23:18 you’ve created right so I think that’s

23:20 the problem and it’s this it’s this

23:22 expectation when you start to work at a

23:25 at a company are you a partner or like

23:28 you do are you a business owner or are

23:30 you an employee and I think employees a

23:32 lot of times think that as they said

23:35 they created something they created a

23:36 deck it’s theirs but if any of you have

23:39 ever worked at a very large company John

23:41 and I have um you sign something when

23:44 you work you know you sign something

23:46 from the beginning that says like all IP

23:48 created is property of the company right

23:50 like yep I’ve even inv I’ve been

23:52 involved my name’s been on a couple

23:54 patent applications actually John John

23:56 was as well um

23:60 but my name’s on there as an inventor

24:02 but I am not the owner I’m not the

24:04 assigned right right you know I’m not

24:07 assigned rights of that IP so if you

24:09 have that expectation very early on like

24:11 bringing employees on and getting them

24:14 to acknowledge that that they are there

24:17 they’re being paid you know they’re

24:19 being paid to work at a company and the

24:21 IP that’s created is not theirs so they

24:23 can’t they can’t walk out the door they

24:26 can’t give it to a

24:27 competitor um

24:29 you know so I I think that’s really

24:31 important just that expectation setting

24:33 and you know maybe in a second here

24:36 we’ll talk about kind of the IP life

24:37 cycle but that’s really important right

24:40 confidentiality agreements we’ve had on

24:42 uh even non-competes which I don’t think

24:44 non competes are really needed anymore

24:46 because if you have this declaration and

24:49 acknowledgement of Ip from the beginning

24:53 it’s much less of a problem so um so

24:56 what you’re saying isor uh you know

24:59 there’s things right here we’re like I

25:00 said we’re not really getting into the

25:01 cyber security yet but we’re getting

25:03 into the people process policy the

25:06 governance uh aspects that Tim knows so

25:08 well so yes so what I was gonna say when

25:11 I was trying to rudely interrupt you

25:13 which I’m getting better at not doing

25:16 is is Oh you mean we should have a good

25:21 employment agreement or a good MSA or a

25:26 good contract as an MSP with our

25:29 customer and with our staff right Jesse

25:33 have you seen any of this kind of stuff

25:34 kind of flowing through in any of your

25:35 MSP

25:37 work oh yeah absolutely I mean I think

25:39 the I think the better msps are you know

25:41 having a works for higher Clause like

25:43 you would get with an independent

25:44 contractor and I mean I think that’s

25:46 especially important and John you can

25:47 probably talk about this at length later

25:49 but especially if you’re working with

25:50 independent contractors protecting IP

25:52 becomes even more difficult right so you

25:54 definitely have to have some Ironclad

25:56 language around works for higher and

25:58 having them declare any um previous IP

26:01 that they’re bringing in or maybe IP

26:03 that they’re not allowed to use you got

26:04 to kind of sus all that out with when

26:06 you’re you know bringing on contractors

26:09 however from a strictly MSP perspective

26:11 I know one thing sticks out in my mind

26:12 there was a there was a salesp person at

26:15 one of the msps I worked with that tried

26:17 to walk out with a customer list and um

26:20 we actually you know again being we were

26:22 very security focused early on and so we

26:24 kind of had a system uh when we noticed

26:27 things about an employee that made think

26:29 they might be leaving or there was

26:31 something wrong there we put monitoring

26:32 on what they were doing in the

26:34 environment what they were accessing

26:36 right and so we actually did find that

26:38 he was pulling down a customer list and

26:39 sending it to his personal email we were

26:41 able to catch that and um you know serve

26:44 him with a cease and assist and um

26:47 luckily we we nipped in the bud right so

26:50 um that that was a win but I think uh

26:54 you know do you catch that every single

26:55 time no but I think to your point John

26:58 it’s about educating other employees and

26:60 and maybe he didn’t know you know I

27:01 wasn’t in I was not in management at

27:03 that time in this MSP so I don’t know if

27:06 he was malicious or he just thought hey

27:09 I’m leaving I’m going to take the

27:10 customers that I’ve worked hard to build

27:11 relationships with and sell them

27:12 something at my new at my new job so it

27:14 could have been something that was

27:15 actually benign you don’t know but point

27:17 being is you know what do they say

27:19 whether it’s ignorance or malicious it’s

27:22 still the same

27:24 right oh Oh you mean you mean this there

27:27 you go NE or I’m getting better I’m

27:30 getting better yeah so uh you mentioned

27:34 uh you put in things to monitor you put

27:36 in things to hate to use the word catch

27:38 them right you know we know our MSP

27:41 audience loves tools we don’t generally

27:44 specifically call out tools but I wanted

27:47 to have just a five minute

27:50 conversation on are there ways that we

27:53 as an MSP for ourselves and our customer

27:58 to be able to like know you know you

28:01 know Sammy the salesman just downloaded

28:05 uh an Excel document of lists and put it

28:07 on a thumb drive and took it with them

28:10 is there tools that can do that is that

28:12 just DLP or is that M3 like how do we do

28:15 that from a practical standpoint since

28:18 our you know there’s a bunch of people

28:20 here listening and they love

28:22 tools well it’s difficult you know it it

28:25 is not perfect and that’s why I think

28:27 John is saying you know when when the

28:28 employee understands it you’re that’s

28:30 where you get 90% of the the issue

28:32 solved of course that doesn’t solve

28:34 militias right um so you know yeah DLP

28:37 is uh UEA is another one like you know a

28:41 Salesman is going to be accessing client

28:43 records right but probably not a

28:46 thousand client records all at once so

28:48 if we have alerts set up for uh

28:51 excessive record access or things of

28:54 that nature or certain type of exports

28:56 being run or better yet we don’t let

28:58 exports be run so if they are going to

29:01 try and take customers out they’re going

29:03 to have to go click on every record

29:04 individually and screenshot it we make

29:07 it uh more uh we make it more U what’s

29:11 the word we make it more difficult uh

29:13 for them to to to do that and so maybe

29:16 that dissuades them and says maybe I

29:17 shouldn’t be doing this so those are all

29:19 you know things you can do that’s a good

29:21 point like when you get to that

29:21 deterrent right so like they see one

29:24 person get caught and they’re like whoa

29:25 like I don’t think I want to I don’t

29:27 want to be that guy that’s getting sued

29:29 by the company yeah um in the financial

29:32 services world it’s much more common

29:34 people get you know there’s litigation

29:37 on non-competes or people stealing

29:40 things or UHC and one of the reasons why

29:44 there is litigation is because the

29:46 evidence and the logs that these

29:48 companies and their attorneys have are

29:50 so good Tim just mentioned DP right so

29:54 this logging and tracking and access um

29:57 the fact that they have

29:59 their as I said leas trust lean function

30:02 they have a very small surface area they

30:04 know exactly where their data is who’s

30:06 accessing it when they’re accessing it

30:09 over the last four weeks before they

30:10 left the company they’ve got a rock

30:12 solid case and yeah go ahead so you mean

30:18 they have like there’s technical

30:19 controls and non-technical controls in

30:22 order to like bring this thing together

30:25 right there we go there we go so uh this

30:28 this is really the life cycle here and

30:31 um identify protect right like detect

30:33 respond and recover like these sound

30:35 familiar right from in this perspective

30:38 um the same life cycle in IP right a lot

30:41 of the people that are involved in Risk

30:43 Management I mean a lot of the same kind

30:45 of steps five you know the fstep process

30:48 here but we start with I think the big

30:51 circle right there uh John can talk

30:53 about this because he this is really

30:55 where I think he’s heavily involved

30:56 probably with ndas and

30:59 confidentiality and employee handbooks

31:01 as Bob Miller mentioned all these things

31:04 that kind of build that expectation

31:06 build that acknowledgement from

31:08 employees that they they need to do the

31:10 right thing right data retention policy

31:13 is another uh non-technical control that

31:17 talks about like how long do we keep

31:18 data how long do we get rid of data um

31:21 and John you know maybe you want to talk

31:24 about trade secret cataloges right like

31:27 I think that’s a concept that don’t I

31:30 don’t get caught on the word trade

31:31 secret but like think about just

31:33 anything proprietary and maybe you want

31:35 to talk about like how you do that and

31:37 then we can kind of come back to that

31:38 diagram and talk about all the

31:39 enforcement once you have the data

31:42 classification and the data uh

31:44 cataloging I guess you’re you’re going

31:46 to talk about

31:47 right yeah sure uh thank you and uh just

31:52 going back to the very quickly to the

31:54 the employee and the entry and exit from

31:57 the the business the first thing they

31:59 they learn about as you said is

32:02 everything you create here is

32:03 ours it’s all proprietary and you can’t

32:06 take it with us and then as they’re

32:08 leaving the business it’s like okay so

32:11 as we said at the beginning everything

32:12 youve created here is ours and you can’t

32:13 leave with it and uh by the way uh you

32:17 know those those cany little HR

32:19 questions such as what’s that you’ve

32:22 learned while you’re here is going to be

32:24 most valuable to you in your new your

32:26 new role

32:29 uh but yeah so from a from a trade

32:32 secret perspective that valuable

32:34 commercial and inventive information

32:36 because we must remember as we’ve

32:38 alluded to it’s both a lot of people go

32:42 down the Avenue just being invented

32:44 either a pents or is a trade secret yeah

32:47 but also as Tim’s mentioned it’s

32:50 commercial information it’s the market

32:53 uh research it’s the product launch the

32:55 new product launch that’s coming up it’s

32:57 pricing it’s customer list it’s

32:59 profitability profitability information

33:02 it’s uh managerial relationships you

33:06 know who’s getting on with who who’s

33:07 who’s who’s about to leave the business

33:09 and you know

33:13 Etc have catalog your intellectual

33:16 property and by that I mean to have

33:19 captured it date stamped date stamped it

33:21 when did he have it and documented it

33:24 and if you haven’t done that it’s very

33:26 difficult to persuade the judge that you

33:28 actually own that information at a said

33:31 point in time so it seems a bit of an

33:33 own exercise but many businesses and you

33:36 guys you know in the information side of

33:37 things when you’re doing is information

33:40 stuff you are recording a lot of

33:42 information a lot of time and it’s not

33:44 too difficult to found to convert that

33:46 into something could be in a trade

33:49 secrets register but there’s two

33:50 components Trade Secrets register where

33:53 information is captured but not the

33:54 trade secrets and then separately you

33:57 document trade secret the code the

33:59 algorithm you know the customer list Etc

34:01 you keep that separate in a separate

34:03 separate

34:04 area a little metadata yeah so you’re

34:07 you’re basically hashing this stuff

34:09 you’re going going deep yeah yeah so

34:12 like je Jean points out here like you

34:14 know gotta audit gotta figure out what

34:16 you have gotta figure you know gotta

34:18 make sure that it’s changed managed

34:20 right all the all the things right so

34:22 you can’t protect what you don’t know

34:24 back to that whole conversation of of

34:27 you know what is it where is it how do

34:29 we protect it you know as as Bob points

34:31 out policies and procedures you know all

34:34 of that you know book of business all

34:36 that stuff right um but what is next

34:41 here in our little slide deck make sure

34:43 I get that up here right oh wait hey

34:45 wait a minute I jumped to The Tool Part

34:47 like 10 minutes ago

34:49 whoops the gun yeah I think Jesse

34:52 probably has a lot of experience on the

34:54 tool side you as well Tim right in terms

34:57 of uh some of the tools you can log

35:00 right so I think John was just really

35:02 talking about talking to the customer

35:04 putting him in that hypothetical mindset

35:07 yeah something really bad happened to

35:08 your company employees stole something

35:10 you’re going to be in front of a judge

35:11 in two years what kind of evidence do

35:14 you want to have right so you have a

35:17 strong case so I think you know Jesse

35:20 started to dig into that a little bit

35:21 Tim as well so yeah I think the zero

35:23 trust piece is a big uh a good way to

35:25 start enforcing that and creating uh

35:27 land in zones that’s you know you have

35:30 lease policy access to and only the the

35:32 right people should be storing the right

35:34 things there you know one thing we don’t

35:36 talk about products a ton but one thing

35:38 I like about Confluence from alassian

35:40 for example is the fact that

35:42 everything’s date tagged um you can

35:45 restrict uh you know space access and

35:48 they even have workflows now so you

35:49 could automatically tag something as

35:52 intellectual property if it’s completed

35:54 in a specific space and only give people

35:57 via SSO that are are supposed to be

35:58 working on and access to that space and

36:01 that’s just one small easy Tod do

36:02 example right but you’re getting all

36:04 that tracking all that stuff is created

36:05 and it’s just and then the training

36:07 piece is hey you guys can only work in

36:09 this space this is where when you’re

36:10 working on this project this stuff gets

36:12 created this is all intellectual

36:14 property this is all company own

36:15 material you need to treat it as such

36:18 and it’s not even a don’t take it stuff

36:20 it’s just hey it’s good hygiene security

36:22 hygiene but in the piece of doing that

36:25 you’re building in business process to

36:27 start creating that register and so I

36:29 would love to hear from John as to what

36:31 he’s seen pragmatically that will work

36:32 to start getting that catalog

36:37 created yeah so there are there

36:40 are but it doesn’t have to be that

36:42 complex um you can run it on a an Excel

36:46 spreadsheet right fine at the beginning

36:49 but you can very

36:51 quickly I I guarantee I consider most

36:54 most companies in their engineering

36:56 department TR for

36:59 group people very very quickly and then

37:01 you start to get an unwieldy amount so

37:03 you you do need to have key things

37:06 documented and captured as we’ve said

37:08 already you know what isn’t you need

37:10 some kind of code for it what some ID

37:13 tag for it what it is it some summary of

37:15 what it is and then date stamp you know

37:17 when was it created right when’s it

37:19 going to be reviewed who who owns it

37:21 that that goes to business process right

37:24 like I mean this is just another piece

37:26 we put into we’re all about document

37:28 mentation and process here in MSP world

37:30 right so a project close step is to

37:33 complete the the catalog steps as part

37:37 of the intellectual property tagging and

37:39 clean that up right and you’re looking

37:40 at you know maybe an hour is worth of

37:41 work that’s additional to make sure that

37:43 stuff gets recorded properly and you’re

37:45 then you have that built into your

37:46 system and it becomes uh just another

37:49 piece in the process that you’re

37:50 executing right so it’s that iterative

37:52 process people in process right people

37:55 in

37:56 process I want to roll

38:00 come

38:01 on I was going to roll back to uh one of

38:05 the comments that came in uh let’s see

38:07 if I can find it here uh yeah Jonathan

38:10 here talking about Bia right because you

38:12 know we were talking about how do we do

38:14 this how do we have that conversation

38:16 what’s the pragmatic way of actually

38:18 doing this alongside of our customer

38:21 right and you know a Bia business impact

38:23 analysis is a really good first step um

38:26 I have a lot of experience in Bas um and

38:29 how that can maybe tie into Insider

38:33 threat as one of the items in a Bia

38:37 Jesse I don’t want to go on and on about

38:39 Bas do you have a little bit of a little

38:41 bit of insight into Bia well you know uh

38:44 to to the question right I think how

38:46 this feeds into Bia I think we kind of

38:48 touched on that right from a really high

38:51 level is you know criticality of the

38:54 data is it existential is it extremely

38:58 uh important or is it a minor

39:01 inconvenience and that’s the way to

39:02 think about it you know that’s like

39:04 that’s like the easiest Bia you can do

39:06 right um and I always try to put that

39:08 into buckets is it existential like John

39:11 said um is it long-term damage meaning

39:15 it will it could be and I always try to

39:16 put time frame on it like can we recover

39:19 from this yes but it take us six months

39:21 to a year to get back up to where we

39:22 were from it so we have a year of either

39:25 reduced profits or no profits can we

39:27 weather that right and then you know

39:29 like look at a quarter a month or two

39:31 it’d be a black eye it wouldn’t be fun

39:33 but we can kind of we can kind of

39:35 weather that storm very easily right and

39:37 so yeah business disruption scenarios to

39:39 consider physical damage to a building

39:41 well maybe we’re remote so that’s

39:43 doesn’t really matter for us right so

39:45 it’s creating that Matrix of Impact

39:47 versus um versus urgency right at at the

39:51 end of the

39:52 day yeah and it’s interesting because

39:54 you know even just this you know this

39:57 resource from .ov around Bas

40:01 right we’re a SAS company right we you

40:04 know we work out of our home office our

40:06 people are remote we’re a SAS Company

40:07 New England just got nailed by some nor

40:09 Easter a couple days ago and I lost

40:12 power and I had a whole boatload of

40:14 meetings and a whole boatload of things

40:16 I was gonna try to get done and I had no

40:18 power and no internet what was the first

40:20 thing I did I went and pulled out my

40:22 business continuity plan and remember

40:25 well and started going through that and

40:27 was like like I have a threshold of how

40:31 long my house can be without power

40:33 before my sump pump fills my basement

40:36 full of

40:38 water right the talk about the physical

40:41 damage the talk about you know the the

40:44 interruptions the outages right all but

40:47 where does that kind of you know flow

40:49 into Insider threat like I’m talking

40:52 physical stuff well Insider threat can

40:55 be that disgruntled employee Insider

40:58 threat can be you know whether it’s

41:00 malicious or neglectful that human that

41:04 decides to take home the extra half

41:08 dozen of eggs because oh well you didn’t

41:10 use the whole dozen I’m just going to

41:12 take the rest home tomorrow and I do

41:14 that day after day after day and now I’m

41:17 the business is missing 30 dozen eggs

41:20 because a little over time right whether

41:23 it’s malicious or not

41:27 so um yeah

41:30 anyways and this is not like this idea

41:33 of

41:34 protecting proprietary strategic

41:36 confidential information I just made a

41:38 comment if anyone seen the movie

41:40 Oppenheimer uh in New Mexico right like

41:43 they had them separated in different

41:45 camps where each each speciality and

41:48 this is this leash trust

41:49 compartmentalized right like well the

41:52 people that understand this part of the

41:53 project and this part of the project

41:55 they’re all in separ separate areas and

41:56 they don’t intermingle

41:58 um so you know it’s this isn’t a very

42:00 New Concept Le trust and and just you

42:03 know how they how basically he was

42:05 worried about you know foreign country

42:08 the enemies right gaining that

42:09 information so they had them broken up I

42:12 don’t know if this was Oppenheimer is or

42:13 the the General’s idea but um you know

42:17 it’s this isn’t a New Concept uh just

42:19 from a least trust perspective but um

42:23 yeah so Tim we we have anything else on

42:26 that other on the document just on the

42:29 life on the life cycle

42:31 here I need to go back to the other

42:33 slide that I was sharing uh hold on let

42:35 me do that uh this one yeah I mean just

42:39 the technical controls here on the right

42:41 um these are all things like we said

42:43 that you can use to uh enforce these

42:48 rights and provide that evidence um so

42:52 you know it’s a it’s just yeah these are

42:54 all like as you said msps infoset guys

42:57 either you know if if it’s insourced or

42:60 outsourced it everyone loves the tools

43:02 and these tools provide great ability to

43:05 provide that zero trust great ability to

43:07 provide uh the tracking and logging um

43:11 the reminding as Jesse said before it’s

43:13 a little bit of a deterrent if the

43:14 employees know that there’s that that

43:16 there’s great logs um certainly when

43:19 I’ve worked on consulting jobs at Banks

43:21 and financial companies like I’m not

43:24 walking out of there with anything I’ll

43:25 tell you that

43:28 um the expectation and just the presence

43:31 of security is pretty high

43:35 so yeah John um any anything do they say

43:40 good locks make good neighbors yeah good

43:43 fenes make good neighbors

43:46 no

43:49 yeah um John I know your uh your

43:52 internet’s coming back and forth but

43:54 anything else to add really like you

43:56 know I I I

43:58 talk about as you said like why don’t

44:01 people realize the damages are so big

44:04 right like the fact that I guess are we

44:07 just used to people not knowing like not

44:11 maintaining their strategic Advantage

44:13 like talk a little bit about that on how

44:15 you when you’re working with your

44:17 clients like how do

44:19 you you know get that point across

44:22 because it’s not in the news right like

44:23 it’s not like malicious Insider threat

44:27 and you said like the biggest theft of

44:29 you know corporate corporate assets is

44:31 happening right now and we don’t think

44:33 about it so like how do you I guess how

44:34 do you get that message

44:38 across well what I like about you guys

44:40 is that you do the kind of likes really

44:42 well so it’s kind of like this it’s kind

44:43 of like that and I’m learning a lot from

44:46 from the way you do that because it is

44:48 about bringing it down to dising it down

44:50 to what’s what’s really important this

44:52 isn’t malicious this is this is a case

44:53 that happened to me

44:55 today big company uh very very

44:58 successful big tech company and one of

45:01 the top employees is doing a a master’s

45:04 degree outside of outside of work and

45:06 they said oh it’s fine isn’t I’m doing

45:08 it all about our strategy and this and

45:12 he goes

45:13 who hold on you’re doing your master’s

45:16 degree which is public

45:17 information

45:19 all about our strategy so people just ar

45:22 ar thinking about it but you know I I I

45:25 haven’t quite got these sort of uh the

45:28 sort of analogies down to a tea like you

45:30 guys have but it’s not something that’s

45:33 like somebody walked out with a bag of

45:35 money some somebody got the gold

45:36 somebody got the jewels somebody did the

45:39 business over because data isn’t that

45:42 easy for for the majority of people to

45:43 get their heads around and so it’s a

45:46 it’s not perceived to be a crime but but

45:49 a as you guys know when it when it

45:52 happens the companies aren’t chaning

45:55 about oh s we’ we’ve been done over by

45:57 an lead we’ve been done over by a

45:59 customer A supplier they suppress

46:02 learnings from it are minimalized

46:04 because it’s not it’s not sort of

46:06 processed and engineered and understood

46:08 and and and that’s a big issue I think

46:11 so it’s not it’s not socialized so

46:13 people are going oh that’s a big issue

46:14 it’s suppressed so people are going not

46:16 really heard about that and then the

46:18 learnings aren happening so you know

46:20 information is leaking and uh people are

46:23 suppressing it’s not not much of a

46:25 problem no 10 to 15 years worth of work

46:27 on our l s the chat GPT to that’s not a

46:30 problem at all no

46:33 really can I just have GP write my stuff

46:36 for me and say give me a protection

46:38 thing and let me just give that and like

46:41 how do I protect my stuff. GPT right

46:45 well there there’s that whole piece is

46:46 inadvertent training with trade secret

46:48 so it goes that that’s a great point you

46:50 brought up is hey if stuff is Trade

46:53 Secrets you can’t go dropping it into

46:54 chat GPT because we’re training the

46:56 model with proprietary information and

46:59 you might as well put it out there just

47:00 like anything else because you know ac

47:03 across the pond somebody one of our

47:05 competitors might type in how do I do

47:07 XYZ and they get this really great

47:09 answer like wow I can’t believe chat GPT

47:11 thought of that well they didn’t you

47:13 just fed that data right into the

47:17 model go ahead Walter had a great thing

47:20 about this like even things that aren’t

47:24 classified as sensitive just by you

47:26 having access to your environment

47:28 there’s this idea in investment research

47:30 called the Mosaic Theory like if you get

47:32 two pieces of non-public non-material

47:35 information you can come up with like

47:37 material information right like things

47:39 that actually move the needle and he’s

47:42 he made this point that you put in all

47:44 this information it’s not classified and

47:47 if it’s not sensitive they can it’s

47:49 still dangerous because like it’s

47:50 intelligent it can figure you know if

47:53 this than that right like it can think

47:55 of so I think really risky and I think

47:58 the classification problem this is going

48:00 to bring this issue to the to the

48:03 surface pretty quickly go ahead Sam

48:05 sorry oh without a doubt yeah yeah Bob’s

48:09 got a great comment about unintended un

48:11 unintentional disclosures right so yeah

48:15 I was just gonna make a joke about the

48:16 whole chat GP so in other words

48:19 everything that I want msps to be

48:21 searching for around what we offer for

48:24 services I should be training chat d

48:27 on and keep feeding it all the

48:30 information when you’re thinking

48:33 ofo go over to power grid when you’re

48:36 thinking inquisitive it or you’re

48:39 thinking you know IP and intellectual

48:42 property or compliance we should just

48:45 keep feeding it all of our stuff right

48:47 at least how about this this week and

48:50 maybe some you know how LinkedIn kind of

48:51 drips features in so other people may

48:53 have had this before I did but you know

48:55 um

48:57 well the the these group articles that

48:59 they’re get getting everyone to

49:00 contribute to like we’re they were of

49:02 course training an AI model and then on

49:04 my profile this week popped up like oh

49:06 want to know more about this subject

49:08 click the AI button and it’s literally

49:10 like almost reading back to me things

49:12 that I’ve

49:13 typed that I put that too and I was like

49:16 it’s the little star Sprite thing it

49:20 happened to me and I was like oh my God

49:22 like wait I just Jesse just wrote that

49:25 or Tim just wrote that I know that

49:27 because

49:28 what yeah yeah but but but like to the

49:32 Mosaic Mosaic Theory right you’re

49:33 talking about Tim is imagine that you’ve

49:36 been using learned trade secrets from

49:39 your job to respond to those articles

49:42 and all of a sudden LinkedIn is giving

49:44 that information away for free yeah

49:48 that’s and that’s what was laying down

49:50 yeah go ahead John just just jump jump

49:53 in F because uh the property is being

49:57 challenged like it’s never been

49:59 challenged before as we know copyright

50:01 llms Etc but if you think about if you

50:03 just bear with me for a minute think

50:04 about

50:05 inventions you either patents or you

50:07 trade secret or you publish if you

50:09 patents

50:10 nowadays within 18 months it’s published

50:14 Tim knows this better than most you know

50:16 two three maybe five years later you get

50:19 a granted patent but now that 18 month

50:22 point every single inventive llm in the

50:24 world is reading that thing and

50:26 inventing on the back of it before

50:28 you’ve even got a granted Pat MH and so

50:31 you know it’s it’s strategically you’ve

50:33 got to really consider whether you’re

50:34 patenting or whether you trade secing

50:36 and how you going to go go and approach

50:38 that and there was some stuff in the

50:40 news today about you know the uh the

50:42 weight loss drugs which you know

50:44 billions of people around the world are

50:45 going to be taking eventually uh they’ve

50:48 got a whole new AI invent invention tool

50:52 that’s come up with a different way of

50:53 getting around the patents of the the

50:54 current thing and you know dealt with

50:56 some of this side effect tissues and

50:58 Bing Bang BOS they’ve invented a newer

51:00 better prototype for for for weight loss

51:03 so from an

51:04 invention perspective it’s a whole new

51:07 gain now patn trade secret published

51:10 there’s lots of strategic measures to

51:12 undertake because of what you’ve just

51:13 been disc discussing on on the llms and

51:18 the

51:23 I’ve um no no but you know John and I

51:26 I’ve heard people say this and I’d love

51:28 to get it’s a hot take so I’d love to

51:30 hear your opinion on it but they said

51:31 you know it really has signaled the

51:33 death of the patent like we’re not going

51:35 to see patents anymore and I don’t know

51:37 if you if you if you say well let’s not

51:39 you know put it’s not to throw the baby

51:40 out with the bath water to on that you

51:43 know my opinion yeah well you know Tim

51:45 Tim’s Tim’s a a big uh it’s got a big

51:49 voice big set of thoughts on it’s very

51:50 clear in his opinions on this and I

51:52 agree with you know the pattern’s being

51:55 devalued quite subst particularly in the

51:58 United States in the last 10 years and

52:01 given what we’ve just discussed and

52:03 other factors you know in the last six

52:05 to eight years trade have got stronger

52:08 and stronger and stronger there’s a

52:09 whole bunch of case law coming out now

52:11 that’s really you know as I said to I

52:13 didn’t say to you but the UK has made

52:14 its criminal law now uh in certain

52:17 circumstances so you know it’s getting

52:18 stronger all the time so yes you know

52:20 panil trade secret uh or publish is is

52:23 is quite a substantial discussion but

52:26 but Jesse if something can if somebody

52:28 skilled in the art one of you guys knows

52:30 the area is likely to invent it in a

52:32 short space of time patent it right

52:35 because then you get some protection

52:37 right uh and or but you know trade

52:39 secret law you can claim prior user

52:41 rights if somebody else does pent it Etc

52:44 or you could publish it so yeah yeah

52:47 very very time I tend yeah and that that

52:49 was a bit of a looted question of course

52:51 I tend to agree with Tim is it seems to

52:53 me in most cases and it goes back to the

52:55 impact analysis what kind of data you

52:57 have how secret is it like if you’re

52:58 dealing more transactional you’re just

52:60 you’re winning off of like your

53:01 operational efficiency how much money do

53:03 you really want to spend trying to get a

53:05 huge trade secret program going right

53:07 but so it’s a it’s a risk analysis and

53:09 an impact analysis on the types of data

53:11 you have right but that said is it it

53:13 makes more sense to me that uh being a

53:17 pragmatist to just circle the wagons and

53:19 protect your data through a trade secret

53:21 program is going to be more effective in

53:24 terms of high value data me much of the

53:26 time you know and that’s just cover yeah

53:29 it’s going to cover all those bases

53:31 Jesse right it’s going to cover trade

53:33 secrets that are Tech you know I think

53:36 the trade secret term is extremely wide

53:38 and it could be even wider and the court

53:40 you know if they’re taking something

53:42 that they they signed and acknowledge

53:44 that they wouldn’t take and they took it

53:46 yeah that’s all there is so as John

53:49 started going to talk about case law

53:51 case law trade secret case law is very

53:53 strong and foreign countries are

53:55 stealing from us so

53:57 that’s not that’s not like you know the

53:60 political Narrative of patent trolls and

54:02 we didn’t even talk about that

54:04 but bad people theying people so uh

54:08 trade secret laws is you know everyone

54:10 agrees with um and yeah you know John

54:14 talking about you’ve talked about this

54:16 for a while trade secrets are much

54:17 easier to to take to court and win

54:19 because it’s very easy to understand

54:21 good and bad in a trade secret case so

54:23 the result the recent analysis says 86%

54:26 of uh 86% win rate for plaintiffs with

54:29 trade secret cases MH kind of 57% for

54:32 for other cases so that’s a really high

54:35 number difference on Trade Secrets

54:37 because they EAS to for the courts the

54:40 jury to get the heads around good guy

54:41 bad guy stole it didn’t steal it kind of

54:44 thing so really interesting on that side

54:46 as well almost at the five minute Mark

54:49 here Tim but one more thing I was

54:51 talking to Paul our our good uh Pat

54:54 broker friend and he was just talking

54:55 about like the invalidation r as well so

54:58 even if you patent things and you go to

54:60 try to enforce them uh chances are the

55:02 courts are going to say they’re invalid

55:04 so

55:06 but at least in the US yeah maybe not in

55:09 Germany or Korea or what not but Tim so

55:14 as we as we start to wind down here um

55:17 we always like to end with a couple of

55:18 key takeaways John I’m gonna pull you up

55:21 first John and and have you kind of top

55:24 in talk a little bit about like what

55:26 does is the one or two key takeaways

55:29 that we can have from today from

55:33 you

55:35 uh I can’t use the word Crown Jews can I

55:40 so identify what’s most valuable in your

55:42 business by doing that analysis that

55:44 says you know what’s existential what’s

55:47 Pro what’s going to have a profit impact

55:49 identify those things protect and look

55:51 at them secondly train your employees

55:54 spend the time giving them education

55:57 because if you go secret case and the

55:60 employee says have no idea what you’re

56:01 talking about I don’t know what trade

56:02 secrets are you haven’t got you haven’t

56:04 got a leg to stand on if you can

56:06 evidence that you’ve trained them and

56:07 they understood that you’ve got a leg to

56:09 stand on so yeah identify CR Jews Tim

56:12 and and training yeah awesome awesome

56:15 that you know that’s a really good

56:16 thought so uh identify your crown jewels

56:20 all right uh yeah we won’t dig get a

56:23 crols we already need that so uh M Mr

56:25 schner my friend

56:27 yeah no so like I said um I I had a post

56:32 yesterday lease trust lean function this

56:34 really fits into this trade secret

56:36 identification perspective your

56:39 employees need to acknowledge that

56:40 there’s proprietary strategic

56:42 information or data um you need to

56:45 protect it you need to use tools to

56:47 enforce that protection and you’ll

56:50 you’ll be better off and you’ll they’ll

56:51 build an understanding and

56:52 acknowledgement that like you know IP

56:55 that’s created on their behalf along the

56:57 company so that that’s really the big

56:59 thing um there is tons of malicious

57:02 Insider threat happening all the time as

57:05 John said no company is going to admit

57:07 it because they don’t have to because no

57:09 regulator is asking them to be to expe

57:13 like when they you know not if it’s not

57:15 customer data The Regulators don’t care

57:18 so just get that out there right now

57:20 that um no one’s really out there to

57:22 protect you you have to protect yourself

57:24 here and it’s not something you can I

57:27 don’t I’m not aware of something you can

57:29 ensure as well

57:31 so awesome Mr Jesse you are up my

57:36 friend yeah well I’m going to continue

57:39 um what John had to say about the crown

57:41 jewels and hey I have a I have a

57:43 training paper that I wrote back in 2015

57:45 that talks about Crown Jews Tim so just

57:47 so you know but to to continue that I

57:51 think yes you have to identify that and

57:52 it has to be mandated from management so

57:54 there’s a piece like identify it who

57:56 identifying it make sure that this is a

57:58 top down driven approach that management

58:01 is involved executive leadership is

58:03 involved in setting those standards and

58:05 it’s not just an exercise that’s being

58:07 done in the IT department so I think you

58:09 have to build consensus with the crown

58:10 jewels and then use that consensus to

58:14 identify the lowest hanging fruit in

58:16 terms of technical controls being ueba

58:20 which there’s some good stuff coming out

58:21 for now but even then just doing things

58:23 like least access and uh Z TNA zero

58:27 trust network access things like that so

58:29 I think those are the two things that

58:30 you can continue on from the strategy

58:32 piece to the Tactical piece when you

58:33 start to implement these

58:35 programs awesome awesome and so uh I

58:39 suppose I ought to have a key takeaway

58:41 too huh I always forget to like bring

58:43 myself up and talk about Johnny’s lug

58:45 tell me about it yeah well you know I

58:49 think as far as you know Insider threat

58:52 whether it’s uh neglect whether it’s uh

58:55 malicious whether it’s ignorance you

58:58 know all the things that we talked about

58:59 today you know from a business

59:02 perspective and from an MSP into that

59:05 business perspective starting to have

59:07 that conversation with your client and

59:10 begin with the risk conversation begin

59:12 with the revenue compet uh conversation

59:15 you know begin with the uh reputation

59:18 risk Revenue reputation what is going to

59:21 impact your client’s business as a whole

59:25 but even putting that part aside think

59:27 about your MSP yourself you have a lot

59:31 of proprietary information not just on

59:33 yourself but on all your customers as

59:36 well right when you’re thinking about

59:38 The Insider threat that can happen

59:40 within your own

59:42 MSP bring your team together have that

59:46 conversation talk about it from top down

59:48 approach about why you want to protect

59:51 this stuff have the why conversation

59:55 right not just just the you know Johnny

59:59 you know don’t do this don’t do that you

60:01 need to be able to have the why

60:04 conversation around why this stuff is

60:08 important all right so uh hey if y’all

60:12 didn’t know we have a podcast head on

60:15 over to team tim. live click on the

60:18 listen and you can subscribe and listen

60:21 to this podcast while you’re driving

60:24 while you’re mowing the lawn while

60:26 you’re you know dealing with the cows uh

60:28 Dr Jesse uh you know so we now have all

60:32 these episodes heading on over into a

60:35 podcast format we’re waiting for the

60:37 Apple piece to get approved so we’ll be

60:39 on the we’ll be on the Apple F and the

60:42 spotle cast and the you know all the

60:44 different podcast areas so feel free to

60:48 head on over to the see the team Tim

60:50 live at the bottom and and do and do and

60:53 do the thing do the thing so thank you

60:56 everybody um next week real quick let me

60:60 pull this up here uh conferences are

61:04 they worth it um you know a friend of

61:06 ours uh G she’s been she anyways I won’t

61:09 get into all the grory details this is a

61:11 little bit of a Hot Topic a little bit

61:13 of a controversial topic right are they

61:16 worth it are they worth it from a from

61:18 an IT MSP perspective are they worth it

61:21 from a vendor perspective oh my gosh

61:24 there’s been and we’re about to dive

61:26 into conference season I know we’re a

61:28 minute over here but I think this is

61:30 really important do the like things the

61:33 subscribe things the listen things and

61:37 make sure you come on over next week and

61:40 listen to this uh episode about

61:43 conferences uh thank you everybody for

61:45 for being here and we’re out my friends

61:49 let’s do

61:52 this subscribe now