WEBVTT

NOTE
This file was generated by Descript 

00:00:06.405 --> 00:00:08.365
welcome to the Cybertrops podcast.

00:00:08.365 --> 00:00:12.275
This is a special live
event edition of the show.

00:00:12.365 --> 00:00:16.785
Uh, we're here at the Inch 360 event
in beautiful Spokane, Washington.

00:00:16.785 --> 00:00:18.325
And today we have Peter Gregory.

00:00:18.471 --> 00:00:19.681
Peter's from GCI.

00:00:19.691 --> 00:00:21.161
Welcome, Peter, to, uh, Cybertron's

00:00:21.161 --> 00:00:22.211
podcast.

00:00:22.391 --> 00:00:22.641
Great.

00:00:22.641 --> 00:00:23.361
Thank you, Jethro.

00:00:23.361 --> 00:00:24.151
It's nice to be here.

00:00:24.461 --> 00:00:30.011
And, um, I'm very grateful for GCI because
GCI was a sponsor for, uh, Leadership

00:00:30.011 --> 00:00:34.721
Summit that I did several years ago,
and, uh, when I lived in Alaska, and,

00:00:35.101 --> 00:00:39.026
uh, GCI's always been a great company,
so it's great to, uh, Reconnect with

00:00:39.076 --> 00:00:42.616
anybody from GCI because you guys have
been a supporter of my work in the past.

00:00:42.616 --> 00:00:43.436
So I appreciate it

00:00:43.846 --> 00:00:49.076
Oh, yeah, very very good GCI is
very bullish on community support

00:00:49.076 --> 00:00:53.916
and yeah does lots of sponsorships
Scholarships and so forth and really

00:00:53.946 --> 00:00:56.916
goes all in for serving all of Alaska

00:00:57.156 --> 00:00:58.276
Yeah, for sure.

00:00:58.286 --> 00:01:01.256
So, uh, what brings you
down here to Spokane to

00:01:01.256 --> 00:01:01.936
this event, though?

00:01:02.256 --> 00:01:06.586
So, I live in, uh, central Washington
State, just a couple hours away,

00:01:06.616 --> 00:01:10.966
and, uh, I haven't been to as many
security conferences this year, and

00:01:10.976 --> 00:01:15.286
when I saw this one come up, I thought,
great, an opportunity to meet some,

00:01:15.679 --> 00:01:19.779
meet some local cyber professionals,
and, you know, some that I know

00:01:19.779 --> 00:01:21.959
already, and meet a few new folks.

00:01:22.599 --> 00:01:25.869
Learn a few things, uh, and
just some local networking.

00:01:26.059 --> 00:01:26.949
Yeah, awesome.

00:01:26.949 --> 00:01:27.509
Very good.

00:01:27.789 --> 00:01:32.529
So, uh, you came to this conference for
the networking, getting to know people.

00:01:32.986 --> 00:01:35.826
Do you serve Washington
as well or just Alaska?

00:01:36.026 --> 00:01:39.126
Uh, GCI serves just,
uh, the state of Alaska.

00:01:39.256 --> 00:01:40.436
Gotcha, okay, that's what I thought.

00:01:41.017 --> 00:01:44.407
it's always good to connect with people
anywhere you go and anywhere you live.

00:01:44.653 --> 00:01:48.683
tell us what your main takeaway is
from this conference so far today.

00:01:50.073 --> 00:01:55.651
The main takeaway is that I've
learned more about, the What is it?

00:01:55.681 --> 00:01:58.141
Inch 360 organization.

00:01:58.141 --> 00:02:00.891
This is my first event that I've attended.

00:02:01.297 --> 00:02:08.927
I'm interested in getting involved in
local things and have for many years.

00:02:09.167 --> 00:02:11.427
I've lived in Washington
State for 30 years.

00:02:12.377 --> 00:02:16.667
Most of that in Seattle, but the
last six years in Central Washington.

00:02:17.454 --> 00:02:20.094
I'm just interested in getting
involved in the community.

00:02:20.214 --> 00:02:20.574
Yeah,

00:02:20.664 --> 00:02:21.174
awesome.

00:02:21.574 --> 00:02:26.104
And so, working for a company that
is in Alaska, uh, I imagine you

00:02:26.104 --> 00:02:28.534
probably travel up there sometimes.

00:02:28.554 --> 00:02:29.704
Uh, from time to time.

00:02:29.714 --> 00:02:33.594
Every few months, uh, I'm
in Alaska for a week or so.

00:02:33.664 --> 00:02:33.824
Uh

00:02:33.824 --> 00:02:34.134
huh.

00:02:34.564 --> 00:02:36.624
Uh, which is awesome,
because I love Alaska.

00:02:36.634 --> 00:02:37.704
So, that's good.

00:02:37.956 --> 00:02:42.816
but what's amazing about the way the world
works is that you can live down here in

00:02:42.816 --> 00:02:45.636
Washington and, and still be able to.

00:02:46.086 --> 00:02:50.186
Do that work from here and not
have to be there physically.

00:02:50.196 --> 00:02:51.736
And so what is your role?

00:02:51.736 --> 00:02:53.086
What do you do at GCI

00:02:53.476 --> 00:02:54.286
for sure?

00:02:54.286 --> 00:02:57.746
And I, I've been a full time
remote employee for 10 years.

00:02:57.976 --> 00:03:00.296
I've been in GCI about
three and a half years.

00:03:00.336 --> 00:03:02.656
I'm the senior director of cyber GRC.

00:03:03.586 --> 00:03:08.576
Uh, I have many functions in
cybersecurity, including, but not limited

00:03:08.576 --> 00:03:15.576
to risk management controls, policy,
privacy, third party risk management.

00:03:15.981 --> 00:03:20.116
Uh, Business Continuity, Disaster
Recovery, Data Governance, Data,

00:03:20.196 --> 00:03:24.386
uh, Records Management and Retention
and a few other things besides.

00:03:24.446 --> 00:03:27.216
Man, that's a lot of stuff
that you're, that you're over.

00:03:27.576 --> 00:03:33.786
So with that, what kinds of things
are you thinking about that people

00:03:33.786 --> 00:03:36.661
need to know about right now
as it relates to those things?

00:03:37.288 --> 00:03:41.538
One thing that's on my mind a lot in
one of the talks today, uh, zeroed in on

00:03:41.538 --> 00:03:47.628
this, uh, is security awareness training
and the fact that every worker in an

00:03:47.638 --> 00:03:53.198
organization, regardless of their role,
needs to have some working knowledge of

00:03:53.448 --> 00:04:01.158
safe practices, things to always do, other
things to never do, uh, because those,

00:04:01.238 --> 00:04:08.129
uh, decisions could, result in a great
deal of harm to themselves personally

00:04:08.139 --> 00:04:10.119
or to their organization or both.

00:04:10.799 --> 00:04:11.129
Yeah.

00:04:11.609 --> 00:04:15.602
And so what are, what are some of
those things that, give me a couple

00:04:15.842 --> 00:04:19.592
that everybody should do and a couple
that people should definitely not do?

00:04:20.322 --> 00:04:27.157
So a few examples is Slow down when
you're reading your email and think,

00:04:27.337 --> 00:04:31.927
give yourself a couple of seconds
before clicking on anything in any

00:04:32.217 --> 00:04:36.697
message, even messages that are
internal or appear to be internal,

00:04:37.147 --> 00:04:38.967
uh, by people that you work with.

00:04:39.273 --> 00:04:42.693
we, we're busy, but you,
you can give, definitely.

00:04:43.108 --> 00:04:44.408
Wait a few seconds.

00:04:44.448 --> 00:04:45.748
Just give it a little bit of thought.

00:04:45.788 --> 00:04:46.818
Does this look right?

00:04:46.858 --> 00:04:48.858
Am I expecting to hear from them?

00:04:50.198 --> 00:04:57.798
But before acting rashly and it's hard
to slow down people want to just click

00:04:58.028 --> 00:05:04.368
quickly through things and and get their
work done and Cyber criminals count on the

00:05:04.368 --> 00:05:07.458
fact that we're too hasty at what we do.

00:05:07.878 --> 00:05:13.233
We don't slow down to think and that's
why Fishing works for cybercriminal

00:05:13.243 --> 00:05:18.543
organizations because they only need
one or two people in an organization

00:05:18.543 --> 00:05:24.073
to click to give them that beachhead
which could be a part of a longer

00:05:24.073 --> 00:05:27.983
term campaign that could be very
costly for that organization.

00:05:28.213 --> 00:05:29.073
Yeah, yeah.

00:05:29.823 --> 00:05:34.073
And, uh, so that's one of the things
that you should do is slow down.

00:05:34.633 --> 00:05:34.993
Okay?

00:05:35.043 --> 00:05:40.108
And then one of the things you shouldn't
do is, uh, Click on anything that you're

00:05:40.108 --> 00:05:41.668
not sure about where it came from.

00:05:42.188 --> 00:05:43.898
Any other quick advice?

00:05:44.418 --> 00:05:48.438
Well, a few of the things in cyber
hygiene, there's so many, but another

00:05:48.438 --> 00:05:56.698
one that comes to mind is, regardless of
what we're able to do on the laptops or

00:05:56.698 --> 00:06:04.278
desktops issued to us by our employers,
we should refrain from installing any

00:06:04.278 --> 00:06:11.268
other tools or software that Maybe we've
used before or at home or in another job

00:06:11.268 --> 00:06:18.867
or something that we read about, there
are many good, trusted, safe tools out

00:06:18.867 --> 00:06:26.157
there, but there are also many that have
Trojans in them or are harmful in, in

00:06:26.157 --> 00:06:32.833
some way that may not be, obvious on
the surface, um, there are unscrupulous,

00:06:33.245 --> 00:06:37.715
tool and application vendors and there
are also those that don't practice very

00:06:37.715 --> 00:06:39.795
good hygiene, and they get compromised.

00:06:40.345 --> 00:06:42.975
Solar winds is the classic example

00:06:42.975 --> 00:06:43.315
today.

00:06:43.605 --> 00:06:45.125
Yeah, yeah for sure.

00:06:45.725 --> 00:06:47.095
this was great to chat with you.

00:06:47.145 --> 00:06:47.935
Great to connect with you.

00:06:47.935 --> 00:06:49.245
Thank you for coming out here.

00:06:49.265 --> 00:06:53.805
Is there any other things you'd
like to say to our audience,

00:06:53.885 --> 00:06:54.965
people all over the country?

00:06:56.955 --> 00:07:01.365
Slow down and think about what you're
doing on, on your computer and, and

00:07:01.605 --> 00:07:03.825
think about the potential consequences.

00:07:04.065 --> 00:07:08.355
If you are not an expert
in cyber, find one.

00:07:08.848 --> 00:07:15.088
find a good book somewhere that can help
you understand a little bit more about

00:07:15.088 --> 00:07:18.688
what good cyber hygiene is all about.

00:07:18.778 --> 00:07:21.229
That will, help keep you out of trouble.

00:07:21.679 --> 00:07:22.880
Yeah, and I think, uh.

00:07:23.489 --> 00:07:29.074
A cyber hygiene, podcast would be
beneficial to talk about, go more into

00:07:29.074 --> 00:07:32.324
depth on each of those things and,
and how you can have good hygiene.

00:07:32.324 --> 00:07:34.294
So that's a, that's an
idea for me for the future.

00:07:34.294 --> 00:07:34.794
You know it.

00:07:34.864 --> 00:07:35.844
Thanks for being part of the show.

00:07:35.844 --> 00:07:36.384
Appreciate it.

00:07:36.404 --> 00:07:36.734
Great.

00:07:36.734 --> 00:07:37.454
Thank you, Jethro.