Cybertraps Podcast

  • What are Zero Trust, SSE, and SASE
  • Zero Trust - everything behind it was trusted in the past, now we think everything is untrustworthy.
  • Poor handling of data by vendors
  • SASE - Secure Access Service Edge - a framework that combines network security functions with WAN capabilities to support the dynamic, secure access needs of organizations. It is particularly relevant in today's distributed and cloud-centric environments.
  • SSE - Server Side Encryption. 
  • Anonymous vs. identified
  • Responsibilities of bringing them up as digital citizens. 
  • Examining the strength of your identity program.
  • Student Privacy - VPNs, MFA, 
  • Zero trust eliminates the doors they don’t need to see. 
  • ZTNA Zero Trust Network Access
  • Raising a hacker child. 
  • The impact of AI on cybersecurity - AI is only as good as the data it is trained on. 
  • IT Admins have all the power. 
  • Delivering an agentless solution so people can get the work done without leaving a mark on the user device.
  • Using copilots to help with security, safety, reporting, etc. 

About John Spiegel
John Spiegel has 25 years of experience running global networks and managing infrastructure. He is an industry pioneer in software defined networking (SDN) and software defined WANs (SD-WAN). John has spoken on the topic network transformation at industry conferences such as Gartner, InterOp, VMWorld, Palo Alto Networks Ignite as well as executive roundtable discussions. He has also been a customer advisor to companies like VMware, Palo Alto Networks and Cisco Systems. Disruptive startups have also leveraged John’s knowledge to bring products to market resulting in successful exits. He hosts a podcast called ‘The Edge’ where he discusses the role of the CISO, Zero Trust and explores the emerging SASE landscape.  When not helping companies on their journey to modernize and secure their networks, John can be found cycling on the backroads of Oregon.

We’re thrilled to be sponsored by IXL. 

IXL’s comprehensive teaching and learning platform for math, language arts, science, and social studies is accelerating achievement in 95 of the top 100 U.S. school districts. Loved by teachers and backed by independent research from Johns Hopkins University, IXL can help you do the following and more:
  • Simplify and streamline technology
  • Save teachers’ time
  • Reliably meet Tier 1 standards
  • Improve student performance on state assessments
🚀 Ready to see why leading districts trust IXL for their educational needs? Visit IXL.com/BE today to learn more about how IXL can elevate your school or district.

What is Cybertraps Podcast?

We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!

Welcome to the Cyber Shops Podcast.

I'm Jethro Jones, coming to you from
Washington, founder of the B Podcast

Network and author of the book School X
and how to be a Transformative Principal.

I'm a former principal at
all levels of K 12 education.

I.

Greetings, everyone.

I'm Frederick Lane, an author,
attorney and educational consultant

based in Brooklyn, New York.

I'm the author of 10 books, including most
recently, cyber Traps for Educators 2.0.

Raising cyber ethical kids and cyber
traps for expecting moms and dads.

Jethro and I have teamed up to bring
timely, entertaining and useful

information to teachers, parents, and
others about the risks arising from

the use and misuse of digital devices.

Over the coming weeks and months,
we'll be talking to some of the world's

leading experts from the fields of
education, parenting, sociology,

cyber safety, and cybersecurity.

Today.

Join us as we look at what it
takes to better navigate our

increasingly high tech world.

For more information or to
donate to our work, please visit

center for cyber ethics.org.

The Cyber Traps Podcast is a
production of the Center for Cyber

Ethics, a 5 0 1 3 independent
nonpartisan educational institute.

Dedicated to the study and promotion
of cyber ethics as a positive social

force through research, curricula
development, publishing and media,

professional training and public advocacy.

Greetings there, Jethro.

Fred.

Long time no see, so glad to be
doing the show with you once again.

We had a whole bunch of episodes
where I was solo and I missed

my partner, so welcome back.

It is good to be back.

The clouds are parting and I think
things will be a little smoother,

Oh,

excellent.

Well,

yes.

Excellent

we've got a great guest on today.

His name is John Spiegel.

He has , 25 years of experience
running global networks and

managing infrastructure.

He's an industry pioneer in
software-defined networking

and software-defined WANs.

John has spoken on the topic of
network transformation and industry

conferences such as Gartner Interop.

VMworld Palo Alto Networks Ignite, as
well as executive round table discussions.

He's also been a customer advisor
to companies like VMware, Palo

Alto Networks and Cisco systems.

Disruptive startups have also leveraged
John's knowledge to bring products to

market resulting in successful exits.

He hosts a podcast called The Edge,
where he discusses the role of CSO Zero

Trust and explores the emerging sass e
landscape when not helping companies on

their journey to modernize and secure
their networks, John can be found

cycling on the back roads of Oregon.

And if you're lucky enough to see a video
of one of his great answers in one of our

audiograms, you'll see he's got like six
bikes behind him, which which is awesome.

So John, welcome.

So glad to have you.

Thanks for having me on the show.

Yeah, this,

you're inspiring me.

I think I'm going to have to
hang up my old marathon shoes

yeah.

me from now on

Yeah.

A funny note about that in Kodiak, where
I was a principal for three years it's

an island in the Gulf of Alaska and
there was a running coach whose kid would

throw his shoes around the telephone
pole, they'd tie 'em together and then

throw 'em around the telephone wire.

And so there was this tree and
telephone pole that were just

covered in shoes from kids who had
finished the season or whatever.

Mostly his son's own shoes.

But you know, those, those traditions
do exist and they are real.

So that's not what we're
here to talk about though.

Even though exercising
is important and healthy.

John, why don't you start by explaining
what Zero Trust, s, SE and SSE is?

For our education, mostly
education focused listeners.

Yeah, this is an area that I
um, probably spend most of my

time working on now here at HPE.

Put simply zero trust flips your
traditional security strategy on its head.

In the past, our applications
the, the key data that we ran our

businesses, our educational groups
with even the government was hidden

behind what I call the four walls
of the corporate or a data center.

So, much like a castle.

So we had these.

Massive firewalls, security devices,
um, and everything behind it was deemed

to be trusted and everything outside
of it on the internet was untrusted.

It's, it's very similar if you look
at a firewall or an internet device

that you might have at your home.

Maybe it's a, a Comcast device or DSL
from a another vendor on one side.

It's your home.

Everything inside of
that home, you trust it.

It's it could be your tv, it could be your
kid's laptop, iPads, all of those things.

You just trust those items.

Everything outside of that.

That's the world of the barbarians.

It's where all the bad things happen.

Uh, and, and that's how we ran
cybersecurity for a very long time.

Then things changed.

The internet came around
and started roaming around.

Left the data center.

They became SaaS applications.

And if you're in the education industry
it's likely like Google Docs and all

the other Google items they have.

Or Seesaw is, is something
my daughter uses, which is

delivered as a SaaS service.

Many items like that.

They don't exist in the
educational data center.

They're outside hosted
by firms on the internet.

And how you secure those is gonna be very
different than what you did in the past.

On top of that, now people
they work from home.

Hybrid workforce.

We saw during COID the emergence of
the school of one, if you want to

call it that, or what we call the
branch of one in the corporate world.

Whereas, you know, these devices that
again, were behind the firewall wall

in the schools, were now at homes.

How do you secure those items?

What do you do with them that has
risen to this new strategy called Zero

Trust, whereby we look at relationships
between devices, applications, and

try to get them down to a point
where it's just the things that you

actually need to get your job done in
the education space, it may be those

applications or enablement tools like
Zoom or teams or, or things like that.

Instead of seeing All of the
applications that you might see in a

data center or a school network, it's
just those five or six applications,

nothing else, nothing more than that.

So you're constantly looking
at trust, relationships.

The simple way I put it is zero trust
is much like when you have a A ship,

call it, I don't know, the Titanic
whereby you have watertight compartments,

which the Titanic didn't have.

And that's why it hit the
iceberg and, and sunk.

But in a ship, if you're, if
you ever served in the Navy, my

father served in the Coast Guard.

He actually was stationed in
Kodiak for a little while.

ships are have watertight compartments.

When you go to an alert status,
you close everything up.

You, you, you, you sever off
you know, spots in the ship

from other spots in the ship.

So if they do get water in
them, it, that's the only

place that gets water in there.

And that's one of the main
differences with zero trust.

It's, it's looking at those trust
relationships and you only have access to

the things that you need and nothing more.

So if I could, John, I mean, it
seems to me like the bulkhead

metaphor is really good.

For intrusion, right?

If someone's trying to get into
your system and exfiltrate data

from places they shouldn't.

I think one of the issues that K 12
institutions run into though, is the

poor handling of data by some of the
vendors that you're dealing with.

So when you're talking about
providing that kind of security it.

Doesn't necessarily reach out
into the broader world and make

sure that it's protected if it's
sitting on a server somewhere else.

Yeah.

And that's, that's a really good point.

Which leads me to the other two.

Frameworks that, that we're asked
about, and that's Sass, e and SSE.

Um, SS SE is this framework basically
that brings together zero trust

with networking, with security.

It's two main pillars, is network
access in the form of what

we call software defined wan.

I won't get into it too deeply.

The other side is this other framework
called SSE, where I deal with a lot.

SSE has certain components.

Zero trust is at its foundation.

Um, but it also has protections
from the internet, which we call

a software secure web gateway.

Um, it has another pillar
called remote access.

Called zt, NA zero Trust, network
Access, and then the item that you're

talking about, how do we secure these
SaaS applications that is called

A-C-A-S-B, or a cloud Security Access
broker, which actually will go into

these SAS services and then start to
look at how do we treat that data?

Should that data be secured in a way?

Are the right settings available?

Um.

Even has mechanisms whereby we can
look at how that data is transferred.

If it's transferred through one of
these SSE systems we can apply data loss

prevention techniques in a very simple
way to understand, oh my gosh, this, you

know, data has social security numbers.

Or maybe it, you know, we know what
the nomenclature is for that school's.

ID system so we can say, oh, that has,
you know, 1000 school ID systems in

it and start to take action on that.

Should that data be
transferred to a Dropbox?

Probably not a good idea.

Um, or is it, you know, going
between a school administrator

to another school administrator?

That's an okay thing to do.

At the core of all of these systems is
and, and that is really where the focus

of security has to be going forward
because it's not enough to put it behind

a firewall in a data center, these massive
walls, we have to get down to the point

where identity is the mechanism that
we're leveraging to understand should you

have access, should you not have access?

I, I'm gonna come at this from a
slightly different angle, but one of

the projects I'm working on is a book
called The Rise of the Digital Mob,

and it really is examining the impact
of technology on our communications,

particularly our political communications.

And so one of the issues that gets
raised by that, I think is relevant

to what you're talking about, which
is the issue of online anonymity.

And so it seems to, what I would infer
from what you're saying is that This

is another reason to take a hard look
at the concept of anonymity online.

You know, particularly from a
cybersecurity perspective, you

really do need to know who's
coming in and out of your data.

Absolutely.

I, I agree with you.

I mean, there is a, there is a,
a, a balance point between being

anonymous and, and not being anonymous.

Um, but we do see it
in the school setting.

My son, uh, who goes to school, he was,
was bullied online and it was not on

your regular, it was on social media
obviously, but you know, people take.

A, a, a bit different stance in how they
talk with you, how they interact with you.

If it's online and they're anonymous,
they will say things that they

would never say to you in person.

And,

uh, to your point, I think, you know,
identity has to play a role in that.

We have to get back to more of a civil
society where what you say has to be

very similar to saying it in person.

Because what I might say to you, In,
in, in a setting when we're in real

life, could be very different than on a
political format or in a school format.

And identity has to play a role in that.

,
That's

it's conscious in our human, human life.

I mean, we're just mechanisms of
what, 250,000 years of evolution.

and you can't just change that
in a, in a matter of two decades.

It's just

Yeah.

Give or take.

I think you're ex exactly right.

No, look, I, and, and this is a little
off, off topic, so I don't want to go

too deeply into it, but the the issue
of anonymity, You know, I am trying to

recognize that it's a power issue, right?

So there are times when anonymity
is a recourse, you know, to power.

But I think now the table is
flipped and anonymity has taken

on its own power that gets abused.

Absolutely.

I, I agree with you.

I think one of the things that I see
missing, and, and maybe we can touch

on this a little bit at least from my
experience in school, is this thought

of bringing them up as digital citizens.

I.

What are the responsibilities, uh,
that you must have in this environment?

I, it's very new let's just say that.

And what's coming at us is coming
at us super fast, but I think that's

a topic for education is what are
the rules of the road regarding

these new mechanisms and how do we
learn them and how do we teach them?

How do we teach 'em about privacy?

How do we teach 'em about, you know,
Phishing and, and some of these other

cyber attacks that are going on out
there and, and, you know, how do we treat

'em to be civil people , in a public
center that might be a social media.

That's a great question.

I Jethro, I mean, digital citizenship is
a topic we have touched on many times.

Yeah, I'm, it really is, and it's
something that the, the reason

why we're having you on talking
about these more advanced topics.

Topics is because we want people to
have a better understanding of what

something like Zero Trust is and why
you should pay attention to it and know

what it is and how it, it, the, the way
that I was thinking about this as you

were talking earlier, John, is that I.

It's like having a a badge swipe at each
individual classroom door in the school so

you know who's going into each classroom
rather than just saying, once you're

in the classroom, everything's fine.

And, and we know from bad things
that have happened in schools that

somebody can get into the school.

In, in a way that is not authorized and
be in the school when they shouldn't

be or where they shouldn't be.

And, and that can then make it
not safe for everybody else.

And I think that like having everybody
wear name badges is important and being

able to identify who people are and being
able to say something as simple as, Hey,

What's your name?

What are you doing here?

And, and being able to ask
those questions is good.

I, I want to talk a little bit about
the identity, because we're talking

about a virtual space and, and how
do you ensure that someone is the

right person when people can share
passwords and things like that.

What are the mechanisms in place to
prevent that kind of stuff from happening?

Yeah, that's a, that's
a really good question.

I mean, that comes back to how strong
is your identity program If it's based

clearly just on identity and passwords.

Um, to your point, sharing
passwords, sharing those

identities becomes very prevalent.

And as well, what is the complexity of the
password with zero trust in SSE Sass e.

You need to go beyond that.

You need to start to
interrogate other items.

What's the device that they're using to
leverage that application, that system?

Is it a school device?

Is it a home device?

Is it up to a certain standard?

Because that is another area that we
see lots of vulnerabilities around.

If, if those devices are not
maintained to a certain patch level or

revelation OSS level that's an item.

As well as where is it coming from?

So if a device You know, I, I'm in
the Beaverton school district here.

If the device is coming from this
Beaverton area, it's probably, you

know, reasonably certain to assume
that that's, that's legitimate.

But if it's coming from North
Korea or Texas may not be so much

we may want to, you know, ask some
other questions around that device.

So that's a whole nother
mechanism around it.

The other area that to be aware of,
and, and I, I don't know how well

this plays into a school system
is MFA being able to have multiple

factors for that authentication.

Certainly you know, a student.

May not be possible, but for an
administrator, a principal, somebody who

you know, has that access to the, to the,
the crown jewels of the school system

MFA is is another area to play into it.

So, going beyond just the
username and password is critical.

Having a good identity system.

Being able to then to, you know,
interrogate further depending on

the type of access you're granting
that person that, that to that

whatever resource or application.

Another point I wanna you know,
the card swipe analogy that you

put out there zero trust looks to
go a little bit further than that.

So instead of having a school where
you have the ability to do card

swipes on e every door zero trust
really looks to eliminate You even

seen the possibility of those doors.

So if you have a school of a hundred
doors, um, and that person only needs

access to 10 of 'em what zero trust looks
to do is, is eliminate those other 90.

So, all they see are are the 10 doors,
and those are the only ones they get into.

The reason for that is what happens is
when an attacker, a si bad cyber actor

breaks into a system, they start to
leverage what we call lateral movement,

which means they start to move around.

Or if we're using the school analogy,
they can move around the school to

see where the doors are available.

And even if you might have
a card swipe on there.

They might be smart enough to break
into that card swipe mechanism and start

to open those doors so those nother
other 90 doors become vulnerabilities.

Yeah, I appreciate you bringing that up.

'cause I think that that's the other
piece of this that people who aren't

in the know may not even be thinking
about that there's, you know, if, if I

could make it so you could only see that
there are 10 classrooms in my school

and you can't access anything else
because you don't know that it exists

that's a much different approach than

You could only go in the
a wing of the high school.

And, and so I, I'm glad
that you brought that up.

I think Fred was gonna ask a
question, but Fred, I do want to

talk about student privacy and them
using VPNs and things like that.

So if, if you're, if you wanna stay on
this topic, let's stay on it, but if you

want to move on, we can move on to that.

I think we can do both.

Oh,

So

let's stick with Let's stick
with this topic for a second.

So, yeah, absolutely.

I, I think John Jethro raises a
great point, which is that, you know,

schools are a perpetual testing ground.

For cybersecurity because of students.

I mean, this is not a static situation.

You've got x hundreds of people
who are constantly testing what

the parameters of your system are.

Are at the heart of that, so, you
know, to how, how do you suggest

that school districts cope with that?

What are the best tools for kind
of keeping the little rugrats

from running amuck in your system?

Yeah.

Uh, that's a technology I personally,
uh, would like to see go away.

'cause what VPNs essentially do is they,
they put your device on the network.

I mean, it, it is clearly on the network.

It's an extension of the network.

There's nothing in between.

It.

And that's one of the challenges that
we're dealing with now, that applications

have moved outside of the data center.

In the past, that was okay
because you had a device.

Most likely it was a firewall that
was doing inspection of that traffic.

Um, but with VPNs, that's no longer the
case, uh, because maybe some of that

traffic is routed back to the data center.

Some of that traffic's inspected,
but the majority of it, if it's going

to Google, you know, pick your SaaS
provider in the education space.

Is not being inspected.

So, that's where tools like SSE or
frameworks like SSE come into play

primarily with this technology called
Zero Trust Network Access or ZTNA.

Essentially what it does is it routes
the traffic to a central that is local.

Uh, to the area to eliminate
or reduce penalty of latency.

And that traffic can be
inspected even if it's SSL based.

We can break that tr that.

And, and approximately 80, 85%
of traffic on the internet today.

Is encrypted.

So, that's one of the me one of the,
the advantages of an SSE system is

it can be that man in the middle,
that sanctioned man in the middle and

start to break down that traffic so
you can start to see really what's

going on and then apply policy.

And that policy can be,
uh, based on you, you.

You get access to these applications,
or it can even be inspecting the traffic

that's destined for the internet.

So, what categories are you
going to allow people to access?

And that's very critical in
a, in a school environment.

And yes I've got a 16-year-old I don't
know how many security mechanisms

I've gone through to make sure that
he can only access what he accesses.

And I, I'll tell you, it's,
it's really hard because.

He's gotten down to the point where
he figured out that he could change

his Mac address on his device and
rotate it to, to get around some

of the security protections that I
was putting in, in place to prevent

him from getting to certain sites
a teenager would want to go to.

So,

um,

You, you sound like a, you sound
like a proud, frustrated father

I, I think I think at the end of the
day I've raised a hacker and, and uh,

and I wasn't attempting to do that.

He just is naturally curious and
if there's something out there that

he wants to go after he'll spend
a lot of time on going after that.

it.

It has been an observation of mine since
I've been writing in this area for a

while, that there are a few people on
Earth more dedicated than a teenage boy

who wants to get at something on the end.

Yeah.

That

really, really impressive.

So, John, if I can beg
Jethro's, forbearances here.

Let's, let's pivot a little bit and let
me, um, let me just ask you this, the It's

clear from the recent invitations I've
gotten for school districts and so forth

that concerns about AI are exploding.

This has just become such a hot
topic and people are grappling with

understanding what it is to begin with
and then what the implications are.

I would think that someone who's
dealing with cybersecurity would

have some thoughts on that.

So, let me ask you a
couple of different angles.

So number one.

What do you see as the biggest
potential threats of AI to a

security professional like yourself?

And then the flip side, obviously, are
there ways in which you might be utilizing

it to strengthen the work that you do

Oh gosh.

Let me, let me start with the first one.

Or the, the, the latter part
of your, your question there.

Um,

Sure.

are there, are there benefits
to AI for cybersecurity?

Absolutely.

Cybersecurity is a very complex field
and we have multiple tools that we're

dealing with, and we're trying to
basically fight the bad guy in real time.

That's a hard thing for a human to do.

So if there is a mechanism that can
bring to light insights start to, to comb

through the data in real time and start
to understand patterns that is a benefit.

So how will, how will AI
be used in cybersecurity?

It's gonna be very much like a chat
bot that you will encounter on a

website when you're trying to buy
something or if you're trying to,

you know, change airline tickets.

I recently did this with Alaska Airlines
where I knew I was sitting on the runway.

I knew I wasn't gonna make
that next flight, so I.

Opened up the chat bot and we had a
conversation at the end of the day.

It, it, it changed my flights.

I was happy.

But how is it gonna be
used in cybersecurity?

It's going to essentially take away a lot
of the complexity of the past where I had

to know how to work with device A, B, and
C and being an expert at all of these.

What it's going to do is present
the relevant information to me.

And then give me a list of, of decisions
that I can make based on you know,

one, two, or three high priority,
low priority or, or just ignore it.

But those insights are gonna pop up
and it's gonna make me it's gonna

give me the decision making process,
how that decision is executed.

I might be able to leave that
up to the ai, or I can, I'll

send that off to a human.

So yeah, AI is gonna definitely, um, make
a difference in, in this, this battle.

But how, how can it be abused?

AI's only as good as the
data that it's trained on.

So if I'm nefarious what I'm looking
to do is get into that data train it

in a, in a, in a way that benefits me.

So, security around the data that AI
is leveraging is absolutely critical.

Um, the second area is if I want
to create an attack it's going to

be a lot easier using a, a format
like a chat GTP, uh, to start to

understand, okay, I'm going against a.

You know, A-A-A-A-V-P-N from Vendor
X, what are the major vulnerabilities

based on its operating system that I can
leverage, and how do I bring together,

you know, the attack in multiple ways?

I.

In the past that was hard to do.

You, you, you had to do a lot of research
and bring it all together and code it.

What's difficult with tools like
chat, GTP or whatever the follow

on is, I can just ask it, query
it, it will spit out probably 80%

you know, the framework there.

And then I'm, I'm left to
do the 20% and customize it.

That's a pretty easy thing to do.

So, it it, it's gonna go both ways, but
we are definitely in interesting times.

Well, I think the thing that was
fascinating for me is the implications for

things like phishing and spear phishing

attacks where .You know, traditionally
we've relied on bad English, bad grammar,

inaccuracies in spelling things like that.

And of course, the large language
models are going to take that away and

everything will look smooth and perfect.

And the background research
to make the underlying pitch

more credible is easier to do.

Yeah.

Now it'll say, let's dive in
and that'll be our key word.

And anytime I read that, I
know it was written by AI

Well, we need some kind of
linguistic watermark, do we not?

We have to.

That's one

thing.

We've never really, never
really, in the 14 months that

chat, GPT has really been active.

Nobody's really sat down
and talked about that, so.

That's good.

Yeah.

Any, any thoughts from you on that, John?

Yeah, it's, it's, again, it's early days.

It's very early days in our journey
to ai and we're gonna learn a lot.

But is moving fast.

It's, it's, yeah, it's,
and it's everywhere.

it, every concept, every conference
I've been to in the past, uh,

three months, AI has been.

Top of the charts for
anyone talking about it.

To the point even where Forrester, which
is a analyst firm that tends to be very

conservative about making predictions
around new technologies came out day one

starting their security risk conference
in Washington, DC and it was all about ai.

So, we're at a watershed moment for sure.

I absolutely agree.

Yeah.

I think for, for me, the, the other
piece of the student privacy that I

want to go back to is, . Students have a
right to privacy as well, and employees

have a right to privacy as well.

And so how do you balance the
need for privacy and the need for

security in a virtual environment,
both for the employee perspective

and for the student perspective?

I think it goes back to, always gonna
have access to all of these things, and

that's most likely the IT administrator.

So, they have to be well-trained
and understood that thou shalt

not look at certain things.

Um, and that's a, that's a critical piece.

I, I.

You know, previously my, I worked
in a company where that, that,

that was violated and it was the
one time that I met with the FBI

Uh, it was, I was the victim of it,
it, but the one time I met with the

FBI and I, I never have to hope to have
that thing ever happened to me again.

But That's insider threat
is, is always prevalent.

Especially in an environment like
an education system where you're

probably going to be leveraging
some of the students for, um, it, it

just the way it is and that's a good
thing in, in, in a lot of respects

because it gives them a leg up on.

Their journey, their career, their future.

They get access to some systems that
hopefully they can, you know, go on

and, and have a, a strong career in.

So there's, there's definitely a balance
point between how you, how you treat that.

And it's something where I don't think
we, we have all the answers and there's

still a lot of of questions about that
and you know, . A couple of thoughts from

me on that is, you know, employees do
have a right to privacy, but also they

shouldn't be doing stuff that that is not
pertinent to their work on work devices.

I had a friend reach out to me the
other day and he said, Hey, I think

I'm gonna get my own . Personal device.

'cause I've always used my work
computer for all my personal stuff.

And I'm like, dude, that's crazy.

Like, I couldn't even fathom it because
I, I haven't done that until I became

my, I I'm doing my own business.

And so that's, now I do, but before
that, I always had my own computer

because I didn't want my . You know,
shopping history, my personal stuff on

the district computers, because I thought
there needed to be that, that separation.

But a lot of people don't
believe that that is the case.

And I, I think more people should
believe that that's the case.

But you know, you shouldn't
be bringing that stuff in.

But then it gets a little more tricky
with students because they don't have

they may not have access to these things.

Except through their school devices.

And so those are, those
can be tricky situations.

And you know, if we
just dive into something

Specific if a student is struggling from
a mental health crisis or something like

that, and they're trying to find support
for that in a way that is, is working

for them, that they're, you know, trying
to research and learn what they need

to do to deal with the, the challenges
they're facing they, that information

I think should still be private.

But . You know, if, if we can track
everything they're doing and see

everything they're doing and everywhere
they're going, then we're gonna,

we're gonna be able to see that.

And so then does that mean that we
intervene or should we not intervene?

Or, or how, how do we, how do
we know what the right thing

to do is in those situations?

Is, is kind of where I'm going with that.

Any thoughts, John?

Yeah.

a, I mean, that comes down, that's
a hard, hard, hard question.

In terms of the devices think there's.

Probably a generational issue here.

Whereas some of us who are more
seasoned understand that, you

know, thou shalt not mix devices.

So what I do in my home world, I mean,
I have two, two computers that I use a

laptop for, you know, on the weekends
and after hours and a laptop for work.

Um, and I try not to mix 'em.

But my kids on the other hand you
know, they're leveraging their iPads.

For schoolwork.

It, it's just the way they do it.

And you know, where it, where my
challenges come is, is the mobile devices

like the, the, the, the smartphone.

That definitely is hard to mix.

I'm not gonna carry two smartphones
everywhere I go, uh, and try

not to mix and match 'em.

So, I think where that needs to
be looked at is you know, and this

is something still, uh, out there
in, in terms of it is How do we

deliver an an agentless solution?

So, how do we deliver applications
without and with security?

With the visibility on a device
you know, may not be ours, it

may not be controlled by us.

And how do we containerize that?

So.

It's leveraged in a way that doesn't
leave a footprint on the, on that device.

There's no data on it, but
yet they can get the work done

that they, they need to do.

You know, in terms of, of looking at
data and understanding are, are, you

know, is, is there a crisis within a,
a person, uh, mentally and based on

the websites they're looking at, I'm
gonna, I'm gonna kind of avoid that.

Well, yeah, look, this is a hugely
complicated area, obviously, and it's,

it's difficult for schools in particular
because they're in loco parentis.

They have their own security needs.

So you do want to have student privacy.

But if that student is then trying
to, you know, figure out how to

pose a threat to the school, the
school obviously wants to know that.

Um, .A possible solution down the road
and maybe not that far down the road,

will be the ability of AI systems to
evaluate these things without a human

intervention and only reporting out
if certain criteria are met that rise

to a level of human intervention.

I'll be curious to see if that's the
direction in which things start to move.

Yeah, I mean, certainly I think
you're onto something there.

You know, given the level of
data that's produced AI systems

eventually will be going there and,
and you know, there is gonna be.

A moment where we have a coach, right?

And, and that coach is based on
what your needs are, what your

goals are, what your objectives are.

And it's gonna kind of give you I
think Microsoft calls it a co-pilot.

They're, that's kind of their,
the term they're using in, in

marketing for all their applications.

But I think it's a, it's a good
term because we're going to have

a copilot and, copilot is probably
gonna take it a little bit further.

When you're using that device,
they're gonna be scraping

the data and and analyzing.

Um.

Based on, you know, what websites
you're going to, what applications

you're leveraging, what social media,
uh, you're viewing and get down to

the point where even on your body,
you know, I wear an iWatch and it

measures Yep, it measures my heart rate.

It can measure, you know,
my blood oxidation levels.

The, it, the technology there
is gonna get to the point where

it can really understand it.

And then on top of that as
well there's a lot of emerging

technology around the brain.

And so I to your point, I think
we're, we're at a moment where what is

personal and what is not personable.

It's very possible there's a
scenario within 10 to 15 years where

if I'm at work I'm required or.

Incented to wear a device that kind of
measures my brainwaves to know whether

or not I'm focused on work or not.

And that may be enhancing me as
well to, to do, to do a better

job and to provide me focus.

But again, it goes back to the point
is, you know, what is really me and, and

personal to me and what should my employer
or even school be able to see or not see?

So, interesting times.

Hmm.

Oh yeah, for sure.

Yeah.

Hey, this was a, a great interview, John.

Where would you like people to go to learn
more about you and the work that you do?

Yeah, so really the best is,
is to reach out on LinkedIn.

I do a lot of posting there.

Um, I have some contrarian
opinions on technology, so I

call it stirred, not shaken.

I.

Opinions as well.

I do run a group called the SSE Forum
where we bring together practitioners

of this zero Trust, SS, SE and SSE
frameworks together and have conversations

around how to apply that technology.

And then finally my
podcast called The Edge.

Where we interview a lot of CISOs
or influencers or even technology

evangelists within the industry.

So those are the three places.

Great.

We'll have links to those in
the show notes, so make sure you

check those out@cybertraps.com.

And thanks again, John, for being here.

We appreciate it.

Thank you.

It's been a real pleasure, John.

That wraps up this episode
of the Cyber Traps Podcast.

In the coming weeks, we'll continue our
coverage of emerging trends in a variety

of areas, including digital misconduct,
cyber safety, cybersecurity, privacy, the

challenges of high tech parenting, and
now of course artificial intelligence.

Along the way, we'll talk to a growing
collection of international experts who

are helping us to understand the risks
and the rewards of digital technology.

You can find the Cyber Traps Podcast
on all of your favorite podcast apps.

We hope that you will share the show
with your friends and colleagues and

reach out to us if you have guests.

Tech questions or topic suggestions.

If you'd like to follow us on Twitter
or x, I'm at Jethro Jones and Fred is

at Cyber Traps, and if you're still
listening, you must have loved this show.

If that's the case, please
leave us a five star rating and

review in your podcast service.

We appreciate you having you with
us and look forward to having

you join us for our next episode.