WEBVTT

NOTE
This file was generated by Descript 

00:00:06.451 --> 00:00:06.781
All right.

00:00:06.781 --> 00:00:08.621
Welcome to the cyber traps podcast.

00:00:08.641 --> 00:00:13.521
We are here at the inch three
60 event, uh, in beautiful

00:00:13.571 --> 00:00:15.771
Gonzaga and Spokane, Washington.

00:00:16.101 --> 00:00:18.811
And, uh, today we have Pia Hollenberg.

00:00:18.821 --> 00:00:19.421
Did I say that right?

00:00:19.421 --> 00:00:19.571
Yeah.

00:00:19.571 --> 00:00:19.911
You said that.

00:00:19.951 --> 00:00:20.291
Okay.

00:00:20.351 --> 00:00:21.081
Pia Hollenberg.

00:00:21.471 --> 00:00:26.161
Um, so what she does is she is a,
um, is a recovering journalist.

00:00:26.501 --> 00:00:28.861
She said, tell us a little
bit about what you do now.

00:00:29.009 --> 00:00:30.549
I'm a cybersecurity writer.

00:00:30.829 --> 00:00:36.539
Uh, and what that means is I basically
take my journalism skills and I apply

00:00:36.539 --> 00:00:41.159
them to writing, uh, blog posts and
white papers and contributed articles

00:00:41.169 --> 00:00:45.639
for, uh, executives who don't have
time to do it themselves, um, because

00:00:45.689 --> 00:00:51.459
they're busy running a business, um, and
also for companies that have software

00:00:51.459 --> 00:00:56.399
that, uh, They're struggling to explain
to people what it is that this thing

00:00:56.399 --> 00:00:58.569
does, why should you really have it.

00:00:58.879 --> 00:01:05.209
So I have, I can sort of translate
all the tech talk into something

00:01:05.209 --> 00:01:06.289
that people want to read.

00:01:06.369 --> 00:01:08.219
And one of my clients actually said that.

00:01:08.229 --> 00:01:10.229
He said, well, you know, the
difference between you and all

00:01:10.229 --> 00:01:12.939
the other people is that you write
stuff that people want to read.

00:01:12.999 --> 00:01:13.749
Yeah, wow.

00:01:13.749 --> 00:01:16.589
And wouldn't it be nice if
everybody looked at their websites

00:01:16.589 --> 00:01:18.559
and ran them through that lens?

00:01:19.279 --> 00:01:22.704
Because there's a lot of, um Yes,

00:01:22.704 --> 00:01:26.194
there is a lot of junk, that is for sure.

00:01:26.524 --> 00:01:27.664
That's a good way of putting it, yes.

00:01:28.034 --> 00:01:31.434
Uh, so, what brings you
to an event like this?

00:01:32.224 --> 00:01:37.164
Um, so, three years ago I started my
own, I started working for myself.

00:01:37.604 --> 00:01:41.814
And, I was a journalist
for 20 years before that.

00:01:41.844 --> 00:01:45.194
I had another job in between,
um, doing fundraising.

00:01:45.194 --> 00:01:49.344
So I was basically always, uh,
surrounded by people and I thrive in it.

00:01:49.629 --> 00:01:54.269
in a busy environment, like news rooms
are, well they used to be Um, yeah.

00:01:54.989 --> 00:01:58.019
News rooms used to be,
oh, oh no, that's sad.

00:01:58.179 --> 00:02:02.319
No, news rooms used to be loud and
kind of boisterous environments and

00:02:02.329 --> 00:02:07.259
there's always people around you, you
can bounce ideas off your, uh, the

00:02:07.259 --> 00:02:09.149
person next to you, that kind of thing.

00:02:09.199 --> 00:02:14.954
And so, after I'd been on my own for about
a year, I started feeling kind of lonely.

00:02:15.114 --> 00:02:19.014
and I thought I'm for sure the
only person who does anything

00:02:19.014 --> 00:02:20.434
cyber security in Spokane.

00:02:20.444 --> 00:02:24.592
There can't be anybody else because
the writing agency, Tree Iron

00:02:24.592 --> 00:02:27.962
Company that I, I write for a lot,
they're based in San Francisco.

00:02:28.592 --> 00:02:31.222
And so all the cyber
writing was somewhere else.

00:02:31.262 --> 00:02:34.312
And I was like feeling lonely
in the Paulson building.

00:02:34.748 --> 00:02:40.248
and then I met Heather Stratford and
I kinda got involved a little bit in

00:02:40.248 --> 00:02:43.148
the cyber security, community here.

00:02:44.063 --> 00:02:48.973
And I realized that there were all these
people and there were all these companies

00:02:48.993 --> 00:02:50.823
that I didn't even know were here.

00:02:51.913 --> 00:02:54.843
And I thought, okay, I better
start going to those conferences.

00:02:54.843 --> 00:02:56.429
So, that's why I'm here.

00:02:56.529 --> 00:02:59.949
And I just kind of shake hands
and take notes and, um, I'm

00:02:59.949 --> 00:03:01.359
always looking for trends.

00:03:01.537 --> 00:03:06.497
like they were just talking about cloud
security and so, uh, that's something

00:03:06.507 --> 00:03:11.352
that I will You know, go home and write
up a few things just for myself, do a

00:03:11.352 --> 00:03:13.392
little research, what else is going on.

00:03:13.392 --> 00:03:17.982
I'm surprised to hear, um, working
from home being brought up again

00:03:18.002 --> 00:03:20.212
as a, a, a cyber security issue.

00:03:20.802 --> 00:03:25.463
Um, but I guess as long as we work from
home, There's bound to be some cyber

00:03:25.463 --> 00:03:30.531
security issues, and so I, I keep, I
try to keep on top of, the trends, so

00:03:30.881 --> 00:03:35.471
when I interview somebody for one of the
contributed articles I write, I can ask

00:03:35.471 --> 00:03:41.901
the right questions, and I Don't just sit
there and go, Oh, so dude, what do you do?

00:03:41.901 --> 00:03:42.221
Yeah.

00:03:42.271 --> 00:03:43.841
What is this cyber thing
you're talking about?

00:03:44.671 --> 00:03:47.555
Yeah, so when you were in
journalism, were you focused on

00:03:47.555 --> 00:03:49.415
cyber security or is this a whole

00:03:49.415 --> 00:03:49.925
new thing?

00:03:49.955 --> 00:03:51.165
No, it's a whole new thing.

00:03:51.379 --> 00:03:54.689
I covered basically a
lot of local journalism.

00:03:54.759 --> 00:03:56.909
I was an editor a couple of times.

00:03:56.909 --> 00:04:00.131
I covered politics,
elections, crime, anything.

00:04:00.561 --> 00:04:03.511
You know, you can think about
that comes into a small newspaper.

00:04:03.911 --> 00:04:07.791
The cyber thing happened because a
friend of mine was already getting

00:04:07.791 --> 00:04:10.131
into the cyber writing business.

00:04:10.651 --> 00:04:14.671
And she called me and she said, there's
this company, they really need a writer.

00:04:14.981 --> 00:04:16.051
You need to call them.

00:04:16.061 --> 00:04:17.711
You just, you could totally do this.

00:04:17.761 --> 00:04:18.831
And I was like, no.

00:04:19.051 --> 00:04:19.741
Are you kidding me?

00:04:20.461 --> 00:04:21.201
Have you met me?

00:04:21.311 --> 00:04:22.711
I mean, I'm not an engineer.

00:04:22.711 --> 00:04:23.451
What are you talking about?

00:04:23.451 --> 00:04:25.081
And she's like, no, call them.

00:04:25.121 --> 00:04:26.691
They really need somebody.

00:04:27.321 --> 00:04:29.131
And I was like, okay, pity hiring, right?

00:04:29.441 --> 00:04:31.331
Because they, they need somebody.

00:04:31.331 --> 00:04:32.011
Fill the seat.

00:04:32.611 --> 00:04:33.851
But they hired me right away.

00:04:34.097 --> 00:04:37.797
And that was a startup
company called Reciprocity.

00:04:37.798 --> 00:04:41.227
Uh, that's who I, that was
my very first cyber client.

00:04:41.847 --> 00:04:44.477
And so I wrote for them
for, uh, a couple of years.

00:04:45.112 --> 00:04:48.582
bought up, as they all, they all position
themselves to get bought up, you know.

00:04:49.052 --> 00:04:53.062
Um, so they got bought up, but then
I connected with, uh, Trier in San

00:04:53.062 --> 00:05:00.062
Francisco, and through them I have, uh,
written for Mandiant, I've written for,

00:05:00.339 --> 00:05:02.979
a start up, well they're not really
a start up anymore, they're actually

00:05:03.309 --> 00:05:06.269
pretty kick ass, they're based in
Israel, they're called Cyber Sixkill,

00:05:06.829 --> 00:05:10.249
and they are dark web threat hunters.

00:05:11.014 --> 00:05:14.674
And they made the huge mistake of
giving me access to their portals.

00:05:16.574 --> 00:05:18.254
No, I mean that in the kindest way.

00:05:19.294 --> 00:05:22.044
They sorted out all the stuff I
told them I didn't want to see.

00:05:22.264 --> 00:05:24.464
But I can, I can,
because they can do that.

00:05:24.514 --> 00:05:27.464
They can just block all the, if you
don't want to see this, it's fine.

00:05:27.944 --> 00:05:30.054
And so I learned so
much about the dark web.

00:05:30.054 --> 00:05:32.794
And all the stuff that's going on there.

00:05:34.189 --> 00:05:38.679
So let me ask you a question about that,
because normal people probably are not

00:05:38.689 --> 00:05:43.389
really thinking about the dark web, except
that we know it exists in some, you know,

00:05:43.399 --> 00:05:45.449
alternate place, and that's all good.

00:05:46.049 --> 00:05:50.289
But tell us a little bit about
what you're seeing happening right

00:05:50.289 --> 00:05:51.669
now with that, that we should be

00:05:51.669 --> 00:05:52.129
aware of.

00:05:52.549 --> 00:05:58.029
Well, I can tell you, um, my favorite, my
favorite statistic, or my favorite quote,

00:05:58.059 --> 00:06:00.009
and this always blows people's mind.

00:06:00.292 --> 00:06:05.232
The dark web is the third largest
economy in the world after the United

00:06:05.232 --> 00:06:12.832
States and China Wow, so Just let that
sink in it's not a place for basement

00:06:12.842 --> 00:06:18.212
dwelling nerds, you know what they sell
T shirts to each other or whatever.

00:06:18.232 --> 00:06:24.232
It is a professional It's a separate
business environment, and the, uh,

00:06:24.322 --> 00:06:29.565
companies that operate there, for instance
the ransomware companies, , They are

00:06:29.995 --> 00:06:33.045
set up just like a legitimate business.

00:06:33.375 --> 00:06:36.965
They have customer service, they
have packages you can purchase.

00:06:37.295 --> 00:06:40.025
Would you like to target your
former employee, employer

00:06:40.025 --> 00:06:41.185
with a ransomware attack?

00:06:41.205 --> 00:06:42.525
We can set that up for you, sir.

00:06:42.525 --> 00:06:45.265
It's 1, 000 in Bitcoin and in you go.

00:06:45.775 --> 00:06:51.505
And I think, um, one of the things that
people don't understand, unless you are in

00:06:51.505 --> 00:06:55.125
this business, is that we're way beyond.

00:06:55.190 --> 00:06:58.690
The basement coder in a hoodie.

00:06:58.930 --> 00:07:00.420
It's not about that anymore.

00:07:00.540 --> 00:07:04.870
So, and then it's interesting to me
that, uh, whatever political conflicts,

00:07:04.870 --> 00:07:09.010
a war we have in the rest of the
world is reflected on the dark web.

00:07:10.180 --> 00:07:11.380
So, okay.

00:07:11.950 --> 00:07:12.520
I'm biting.

00:07:12.520 --> 00:07:13.520
Tell me a little bit more about that.

00:07:14.360 --> 00:07:14.670
What do you mean?

00:07:14.680 --> 00:07:19.780
Well, like the current crisis, for
instance, in Ukraine, um, hackers,

00:07:19.810 --> 00:07:23.580
bloggers, the people who make a living
on the dark web, they take sides.

00:07:24.090 --> 00:07:27.250
And then they start, they
launch their own attacks.

00:07:28.000 --> 00:07:31.510
So, that's, without, that's, I
can probably say that without

00:07:31.510 --> 00:07:32.390
getting into too much trouble,

00:07:32.410 --> 00:07:32.540
right?

00:07:32.540 --> 00:07:36.901
Yeah, it's interesting, we had a, a
previous guest on the podcast who worked

00:07:36.901 --> 00:07:42.581
for the Navy as an intelligence officer,
and, and shared hints of that similar

00:07:42.581 --> 00:07:48.411
kind of stuff, that, um, you know, that,
that's a very real aspect of war, that

00:07:48.411 --> 00:07:52.231
we don't talk about in the news, and we
don't hear much about as normal folks,

00:07:52.291 --> 00:07:54.736
uh, but That, that is really happening,

00:07:54.846 --> 00:07:55.246
so.

00:07:55.576 --> 00:08:03.007
It is really happening, If you look at
the typical threats to, let's say, any

00:08:03.757 --> 00:08:08.837
internet user in the United States, they
come from China, they come from Russia.

00:08:08.967 --> 00:08:10.897
The most of them come
from China and Russia.

00:08:12.132 --> 00:08:13.702
Anyway, that was really interesting to me.

00:08:13.842 --> 00:08:14.962
Yeah, fascinating.

00:08:15.082 --> 00:08:18.132
I can easily go down a rabbit
hole, but I think this is good.

00:08:18.262 --> 00:08:18.612
I

00:08:18.622 --> 00:08:21.162
think we'll need to have
you on the show again.

00:08:21.272 --> 00:08:21.922
I would love that.

00:08:21.922 --> 00:08:22.772
And talk more about this.

00:08:22.842 --> 00:08:23.632
I would love that.

00:08:23.672 --> 00:08:28.292
So, Pia, how do people get in touch with
you and learn more about the work you do?

00:08:28.352 --> 00:08:31.862
Um, the best way to get a
hold of me is via my email

00:08:31.862 --> 00:08:33.492
address on my LinkedIn profile.

00:08:33.542 --> 00:08:38.912
I have a strange name, Pia Hallenberg,
and my email is just my name.

00:08:38.912 --> 00:08:40.652
It's PiaHallenberg at gmail.

00:08:40.652 --> 00:08:40.822
com.

00:08:42.217 --> 00:08:45.057
I have basically any sort of
social media because my name is

00:08:45.057 --> 00:08:46.477
so odd you can easily find me.

00:08:46.667 --> 00:08:47.597
Yeah, I hear you.

00:08:47.757 --> 00:08:49.557
That's how it is with Jethro as well.

00:08:49.627 --> 00:08:51.477
So, at Jethro Jones everywhere.

00:08:51.507 --> 00:08:53.227
Yeah, Pia Thank you so much.

00:08:53.227 --> 00:08:55.457
This is great getting to know
you and spend some time with you.

00:08:55.457 --> 00:08:56.957
So, Thank you