Thứ Tư, 23 tháng 5, 2018

Waching daily May 23 2018

Hanna: I was doing things that you were

supposed to, that society tells you to.

I had a nice job, I had a flat, I had everything

but I still felt empty. I didn't know what I was looking for anymore.

So, I wanted to do some more inner work

and try to find my purpose or what I would do.

Narayani: Being in a downward spiral

in my life, and it was due

mainly to self-criticism and doubt and

being very hard on myself--

no compassion--

which of course diminishes self-love,

and without that how can you really love life?

Hamid: Sat Yoga is the best platform

for people who want to really transform

their consciousness and live as a new being.

Hanna: It was so much more

than I would have expected.

I thought I would come here, get some insights,

go back to my other life.

But I realized it was a really life changing experience

and I felt straight away, in my heart, I'm going to stay.

Chantell: In the time that I've been here,

my whole perspective has changed.

My perspective on who I am,

my perspective on the idea

of chasing things in the world,

trying to accomplish something,

trying to add value somewhere,

and to be able to realize that

none of those things are actually going

to fulfill me, in any possible way.

Jennifer: The morning meditation, I think, at that time is key.

Juan Carlos: I thought I was going to struggle

waking up so early in the morning,

because I'm actually a night owl,

not an early bird.

I didn't struggle at all.

It's a nice experience to start the day

with the sound of the bell

and walking with the stars.

Chantell: In the immersion classes,

being able to see

what the unconscious mind is,

what ego fantasies are,

how the ego keeps playing these games,

what your patterns are,

what your bad traits are,

how to navigate through all of that,

in order to understand

and fully first grasp what your ego is,

in order to let that go.

Jennifer: It's not anything that's crazy

or "out there", it's just stuff that

people don't teach you.

Your teachers in school

don't teach that stuff, your parents don't,

nobody teaches this stuff anymore,

so it's forgotten.

So you get here and it's like,

I don't understand how I've never...

how have I never heard this before?

and so there's peace, like, there's peace,

that comes with the understanding.

Narayani: Inspiring

to see that a community such as this

was living the Dharma, you know,

and that this path was real for them

and that this path works.

Chantell: Shunya...

It was amazing to see

someone express so much...

divinity,

and just like, the beauty of what God is.

And he radiates that,

and it's there for everyone.

Kanu: He's just channeling

and flowing from Source, very clearly.

It´s coming forth, this revelation,

these words, are coming forth,

but there could be two thousand or a

hundred people or twenty people in the room

all with different issues,

but it's because of the energetic transmission

that's in those words,

that it applies to every single person

with all these different issues.

Claire: And the teachings every morning,

it just feels as if I have

a private conversation with Shunyamurti,

it is as if he is talking to me,

as if he can read my mind.

Chantell: He's just been a great father figure,

and a great spiritual teacher,

and a great friend.

Narayani: I have a new sense of purpose,

of spontaneity, of desire to create,

perhaps change my work.

I just feel renewed

and therefore capable of branching out

like the lotus flowering in directions, that

like I said, I was going like this before

but the lotus comes out of the mud

and blossoms.

I feel that analogy within myself.

Asherah: I encourage every being on this planet

to come here and experience this

in order to create this...

everywhere.

Jeremy: This place is not just a refuge

for those animals, for those humans,

this place is a refuge for consciousness.

Chantell: So if you are looking

for working on your soul

or your spiritual journey,

this place has everything you need.

Juan Carlos: That's why I decided to stay

for the whole month

for the Immersion Program.

I want to come for more and more and more.

Narayani: I feel very healed and blessed

to have come and to have

experienced this retreat...

For more infomation >> What is a Sat Yoga Ashram Immersion Program Like? - Duration: 5:12.

-------------------------------------------

This is why we play Rust! Why did we ever stop?! - Duration: 8:34.

For more infomation >> This is why we play Rust! Why did we ever stop?! - Duration: 8:34.

-------------------------------------------

Is the Catholic Church the Original Church? - Duration: 2:49.

- Back to the phone lines. Ferron listening in Piketon, Ohio, Sirius XM 131. Hi.

- Hi Hank.

- Thanks for taking my call.

- My pleasure.

- I have some Catholic friends who of course

claim that they are the original Church, and that Protestants can only go back to

the Reformation and Martin Luther, and I wondered if you had scripture or

anything where I could use to I guess refute that?

- Well I think what you

have to look at is the fact that historically there was only one church

up until the Great Schism of 1054. And there was a schism ostensibly over a

phrase - the Filioque - and the son that this was added to the Nicene Creed, and

as a result of that there was a there was a split, because the the Roman

pontiff - or patriarch at this point - is now adding something not in a

collegial fashion with the other patriarchies but just by himself. He's

adding this phrase to the Creed, and so you had this great schism. This

was sort of the straw that broke the camel's back to be honest with you if

you want to go through this with a lot of detail from a historical perspective.

But again, there was no split between the East and the Western Church until this

point. Now you have a great schism, and now you have a fractured

church. You have the Roman Catholic Church, and you have the Eastern Church.

You have the Church of Rome, and you have the Church of the other patriarchs as it

were. The Reformation happens almost 500 years later. In 1517 there's a split

between the Roman Catholic Church and the Protestant Church. And a lot of

people now think that Orthodoxy and Roman Catholicism are very similar, but

actually Protestants and and Roman Catholics have more in common

than Roman Catholics and Orthodox. Now what we do have in common

for those that adhere to mere christianity is the essentials of the

historic Christian faith - what we always say, in essentials unity, non essentials

liberty, in all things charity. So I personally have great differences with

Roman Catholicism, but I believe it is a truth church with some significant error.

For more infomation >> Is the Catholic Church the Original Church? - Duration: 2:49.

-------------------------------------------

What is Fortnite? - Duration: 3:37.

Welcome to I Am Your Target Demographic.

Today we're diving into Fortnite and explaining what this is, so this video is not intended

for people that already play but it's useful to share with friends and family that have

no idea what Fortnite is.

In a nutshell, Fortnite is a third-person shooter videogame available on all consoles,

including mobile versions.

Fortnite was developed by Epic Games and the company People Can Fly and was released in

late 2017.

On a story level, you play as a survivor in a zombie-like apocalypse and you must gather

resources and build forts, alongside other players.

This fort-building mechanic is really what makes this game unique, with the ability to

build (and destroy) most things in the game world.

This allows for creativity, including building massive ramps and ladders to cross the entire

map of the game.

You can also straight up fight these zombies, called husks in the game, by collecting weapons and ammo.

The game is silly and vibrant in nature, so both weapons and enemies veer towards the ridiculous.

When the game first launched, the default mode was called Save the World, where you

can play in a four-person team and you must stop waves of husks, by storing up resources

and building up your fort.

This cost as much as a normal video game would, however a new mode to the game was released

and this mode was standalone and was free to download, called Battle Royale.

This mode features 100 players in a match, where you can either play solo or in groups

of up to four people, and you now face off against other real people, utilizing your

shooting and fort-building skills to be the last ones standing.

As the match progresses, you must stay inside a giant circle that is slowly shrinking, so

that you can't just hide on the fringes and expect to win the game.

Again, the Battle Royale mode is free to download and is available on PC, Xbox One, Playstation

4, and is even available for free on iOS and soon Android devices and they connect to each

other, so you might be on your phone playing against someone on their PS4.

While it is free to download, there are optional things you can buy with real world money,

mostly including character models so that your character stands out and emotes, so that

your character can dance or showoff in the most interesting way.

A lot of these dancing emotes are based on real life dances or viral phenomenons.

More recently, we see an interesting collaboration with Marvel as the villain Thanos appeared

in Fortnite, in a new mode to fight over the infinity gauntlet.

This was a limited time mode but an interesting experiment that will likely result in more

crossovers in the future.

Now, let's zoom out.

As of May 2018, there are about 45 million active players.

That's massive.

It's not just big to play, it's big to watch.

Many people are playing and streaming their games for the world to see, the biggest of

which is a man named Ninja, Tyler Blevins.

Using the streaming service Twitch, Ninja makes about $500,000 a month by streaming

Fortnite almost exclusively.

He made the mainstream news when rapper Drake joined him for some games, reaching 600,000

watchers at one time.

Do you play Fortnite?

Do you think the genre of Battle Royale is here to stay?

Head down to the comments and give us your thoughts!

And subscribe for more stuff like this!

For more infomation >> What is Fortnite? - Duration: 3:37.

-------------------------------------------

Alabama's Beautiful Cahaba Lilies | This is Alabama - Duration: 2:44.

Submerged In the rocky shoals

Are the seeds

When they bloom They sing

Springtime is here

Year after year The blooms appear

And we celebrate their beauty

Each flower Only opens for a day

Yet endlessly inspires

Swift currents pass through The hardy stems

Their delicate petals Sprawl out like speckles of sunshine

Amongst a fascinating river We already love

We see a shining marvel Brilliant and rare

Sunlight hits And their radiance is shown

To all who pass through To all who care to look

They remind us That the river is alive

They remind us That the Earth is alive

They remind us That we must protect their habitat

And our own

So we can continue To celebrate

To be inspired by

To love The sheer beauty that is

The Cahaba Lilies

For more infomation >> Alabama's Beautiful Cahaba Lilies | This is Alabama - Duration: 2:44.

-------------------------------------------

What is The Pattern Day Trader (PDT) Rule in Stock Market Trading? - Duration: 5:24.

For more infomation >> What is The Pattern Day Trader (PDT) Rule in Stock Market Trading? - Duration: 5:24.

-------------------------------------------

Meghan Markle Is in Full Duchess Mode Just 3 Days After the Royal Wedding - Duration: 2:37.

For more infomation >> Meghan Markle Is in Full Duchess Mode Just 3 Days After the Royal Wedding - Duration: 2:37.

-------------------------------------------

REVEALED! LORETTA LYNCH SIGNED OFF ON SPY IN TRUMP'S CAMP – THIS IS HUGE! - Duration: 10:23.

For more infomation >> REVEALED! LORETTA LYNCH SIGNED OFF ON SPY IN TRUMP'S CAMP – THIS IS HUGE! - Duration: 10:23.

-------------------------------------------

Some kid who is too close to the mic. - Duration: 4:02.

This dude he-he's-he-he always anal rapes!

Look at this photograph!

Photogra-[Inaudible noise].

LOOK AT THIS PHOTOGRAPH!

Bap.

You just got creamed.

[Inaudible noise]

Im just gonna spectate, fuck that shit.

Who are you going to spectate you fat chode?

Wait what is.

I cant do the thing where I have to...

I'm trying to do the thing where basicly you just have to reload.

Guess not.

Hey I did it, cool.

I did it!

I had to set up mine for that though.

For more infomation >> Some kid who is too close to the mic. - Duration: 4:02.

-------------------------------------------

That is how bulgarians PLAY | Subtitled - Duration: 4:00.

Save me

I'll fuck your mom

Why aren't my spells on quick-cast?

Your mom is old

My god

Yeah, okay.. He is faster than...

He has a mechanical keyboard.. which..

Run

Cmon, I'll

Look at it

Why does it

I knew it

I entirely ripped her off

With the balls and pubic hair

Okay

No, how did they turn around like that

How does this happen?

I have ult

Viper is mid

What if Skywrath is mid and Viper safe?

buhh

I'll fuck your mom you treadle

I hope a horse will fuck you

I'll fuck your mom

Stupid fuck

He says run

I'll fuck your stupid mom

I'm going to kill Sniper

"I'm going to kill Sniper" - If it wasn't for this...

Die

Die

Fucking autistic Silencer

That was pretty good btw

No reason

You gave her duel again?

Typical

Yo, treadle

STFU

When the little dudes come in, I love Shadow Fiend

Because they give 6 souls

12 damage

Seriously, 6 souls equal 12 damage?

Just don't get hit by Shadowraze

You should win

But I'm Krasi

I'll go in the Shadowraze

WTF?

You died again...

"You died again" STFU 0/5 dumbass

Fucking treadle dude

You gave firstblood, that's 3 kills

Yeah... Even 10 kills

No.. No.. Please, gank me 5 more times

Your mom is old

He kills me

He kills me

We are a fun game ladies and gentlemen, we don't have any wards in this game

Fuck your mom... For fucks sake

I give up

All of a sudden, 5 times jump on me???

Give me one tango

Okay

Why do you need a tango?

Okay

So, I can die.. why? dumbass

Wait, I choked

Cmon, oneshot him

Let's play another one? huh?

kikiki brirds

Why do I have so much movement speed

332

Because you are flying?

My maths is telling me that we are playing at around ~1900MMR

Haha.. idiot

10 seconds later...

I'm going ot make Shadow Blade

And you will fuck my mom

Ohh, yeah! I killed myself

You are going to block your camp

I'm going to block the camp

"Don't treadle" Tell me something nice

You have 5 seconds

Yo, treadle.. I'll fuck your mom

He is going to block it.. Look at him!

For more infomation >> That is how bulgarians PLAY | Subtitled - Duration: 4:00.

-------------------------------------------

There Is MOAR To Structured Analytic Techniques Than Just ACH! - SANS CTI Summit 2018 - Duration: 32:22.

(high pitched chiming)

(applauding)

- For those that were here last year certainly know

that I'm a World War II history geek.

My company Digital Shadows started in London

and I just hit my two year anniversary last week

and I've been to the UK nine times.

And so when I'm there over the weekends I always go and do

all kinds of military history things to see.

Anyone been to RAF Duxford before?

Any of the Imperial War Museums?

They're awesome, RAX Duxford is a live museum,

you can be in Spitfires, they're quite expensive,

you can go up for 45 minute flights.

But I geek out there.

And some of you may have seen in previous talks

this analogy I'm gonna use about analysis

but it's really relevant for here.

They have a US Aviation Museum at Duxford.

So of course we have SR-71

and we have a U-2 kind of positioned

like Powers would've potentially been positioned

when he was shot down.

A little bit when I was in the army I worked with the U-2

as opposed to some of the other assets

we also worked with too but total geek out here for

an intel person, a military history person

and general geek, I love Duxford.

They also have a land warfare museum.

Does anyone here, maybe targeting people,

know if this is a BMP1 or a BMP2?

So this is a BMP1.

And you can tell, as a former imagery guy,

the size of the turret on top is one of the

indicators for it, but I use this to tell an analogy

of a young specialist Holland who went TDY

or to the Eisenhower when I was in Kuwait

and I was working with the ISs there,

and we were doing imagery from the TARPS platform

and we were looking in Southern Iraq

and specialist Holland made a mistake

and he called the BMP1 a BMP2.

Does anyone know the significance of

what this would'a been between the two Iraq wars?

Only the Republican Guards Divisions had BMP2s.

So specialist Holland basically called out

an Iraqi Republican Guards Division

further south than they should've been and you know

it hit the fan, things were spinning up.

There wasn't a lot of analytical rigor

in specialist Holland at the time.

And so I use this as a really good example of

making a mistake, maybe not having enough

peer review as well.

A lot of analytical failures didn't really turn out

to be that big of a deal, but for a little while

it was a problem.

But I really think it's a good way to lead into

analysis matters.

Certainly if you're in the intelligence community

it might mean something different

than it would be in the private sector.

But in the private sector, could be your livelihood

depending on what type of work you're doing,

commercial sector, competitive intelligence,

whatever the case may be.

So I always like to use this as a lead in on analysis.

And my personal failure, I like to make fun of myself a lot.

And there's a lot of things to make fun of.

Of course, I'm not gonna go into Dick Heuer Jr's book here,

I've had this on the slides probably for three years now.

But what I wanted to try to do is evolve,

is to look back, I spoke every year at the conference,

I've coordinated the conference

with the advisory board as well for the past three years.

And so I've had this slide up

and what I was thinking about this year is like,

OK, enough about just showing this slide

and telling you to read this book.

I want to try to move the conversation forward

on better analysis.

This book, how many people have read this pdf?

And you can download it for free right?

One takeaway if you haven't read this pdf,

highly recommend that you do,

it's probably one of the top five things

you should read in the space.

Also Thinking Fast and Slow, but I think the first time

I saw Kahneman talk, she also recommended that book.

And I read that as a result.

So here's, I'm not gonna read all this to you,

I was gonna highlight some of the important parts but

it's really about externalizing

and decomposing our thinking.

I think we have a lot of lone gunmen,

maybe that's not the best analogy, people that are

champions, they want to do it, heroes,

that's what I was looking for, superheroes.

They want to do it themselves, they want to save the day,

they want to get all the kudos for this

incident response analysis or this

threat intelligence analysis.

And really what I like about structured analysis

is you're exposing what you're thinking about

and you're getting more analytical rigor

into what you're doing.

There's a number of cognitive biases,

and Carmen mentioned some of them.

And I'm gonna go through a couple.

You can do a whole session on just cognitive biases alone.

But here's confirmation bias.

Facebook right now, if you looked on Facebook,

it's probably the number one source of confirmation bias

in these hyper political times.

Another one is mirror imaging.

Anyone familiar with mirror imaging or Into the Dragon?

So if you've seen this movie, it's probably

one of the top five movies ever made.

He's being attacked, he's being scratched,

and essentially he has to break the mirrors.

So you actually need to do this for your analysis,

you need to break through your mirrors.

Mirror imaging is basically when you look at,

and you make an assessment through your lens

and not the person who may be targeting you's lens.

You're not taking into context their social situation,

their geopolitical situation, them,

there's actually a technique called red hat analysis.

I'm not gonna talk about it today really

but they can be used to overcome mirror imaging.

Anchoring.

I think Carmen also mentioned anchoring in one context.

Is anyone familiar with anchoring?

We actually see this a lot with university students.

At my company we recruit a lot of people

from King's College in London,

graduate programs in intelligence studies and

there's a tendency with students that go through programs

that maybe the first analytical technique they stick with.

So you can anchor on the techniques that you know,

and then you can also anchor on maybe

the first assessment that you have.

And then perhaps, it becomes, oh this is the way

it's always been so it's gonna stay this way type of piece.

So we don't want to anchor either our techniques

or our assessments.

And then of course groupthink.

And I think everyone's familiar with groupthink.

I think this is a pretty good illustration

of groupthink as well.

And this is what

psychologists who coined the term groupthink,

Irving Janis talked about these conditions

that make groupthink possible.

I'm not gonna read through them all

but if you look at your org structure,

if you're maybe a student,

a fan of organizational behavior, some of these things

might reside in your organizations.

But there's one in particular that I highlighted in red,

those are situational factors that contribute to groupthink.

And I think it's really important

for this audience to be aware of.

How many people would describe themselves

as this individual in their jobs?

Are you ever tired?

Are you ever stressed out?

Are you ever working long days stuck on a console

for ArcSight or looking at packet captures?

The very nature of our role, no matter if you're an

incident responder or intel analyst,

anyone in cybersecurity today

in the threat landscape we have, is you're tired.

So we really need to be aware that fatigue

can cause groupthink, and really try to take steps

to protect ourselves or take care of ourselves

to try to avoid that.

Sleeping more than four hours a night is highly recommended.

One of my New Years Resolutions was try to sleep

seven hours a night, I'm not doing very good at it.

It's ACH, how many people have done ACH

in their careers at some point?

There's a fair amount of hands.

With this audience I would expect it.

This is an ACH that we did

at Digital Shadows on WannaCry and actually

made the Internet Storm Center.

But I don't want to talk about ACH.

I was not exposed to actually doing ACHs

until I've been in my career at Digital Shadows

and I actually think they're a pain in the ass.

They take a lotta time.

Even understanding, as you're setting up

the assumptions that you would have in it,

the scenarios you would have in it takes a lot of time.

But ACH is probably one that gets the most headlines

these days, people are talking about them and using them.

So I want to think beyond that.

So I'm not gonna talk about ACH

'cause I actually think it takes too much time

and there's other techniques that you can use.

There's a whole lot of techniques that you can use.

So just a small, and I have the reference

to this book at the end of probably 40 different

structured analytic techniques on this slide.

Is anyone familiar with this book?

I've got it at the end,

it's like a 70 or $80 book,

it's probably not a bad thing to expense for your teams

that are out there and they break down

all these structured analytic techniques.

I think it's very overwhelming in trying to know

the right ones to use in the right situation

is pretty important.

So I was gonna talk through a couple things

that you might do in your organization.

As you start to incorporate structured analytics

into your programs, and I think you really should,

I'm gonna go through a scenario and go through

a couple here, but you could kind of,

and what I've been trying to do here is line it up

to the tactical operational and strategic goals

that you might have from an intel perspective

on different types of structured analytic techniques

that you can use.

I'm a newbie on this.

Rob in his intro said no one's a pro here,

no one's an expert.

I am by no means an expert in

structured analytic techniques.

But I have been working with them,

I've done structure brainstorming, I've done ACH,

I've done SWATS, red hat analysis, cone of possibility.

But you probably are gonna have some

that are gonna be in your stable, and you're gonna use them

and it's important to refresh them from time to time.

But what I would recommend is you start to try to map

different techniques to different things

that you're gonna produce in your environment.

How many people on an ongoing basis in the room

actually have structured analysis built in

to the different intelligence products you create?

I see one hand, and that's an Army hand.

So typically that's what you'll find.

Unless you're maybe a very large

Silicon Valley technology company

with large intelligence teams, or you come from

the intelligence community you're not doing this.

But the whole point of my talk today is

that you don't have to do these crazy ass ACH

that take a lot of time, potentially take a lot of time.

Once you have them down you can do them quicker.

There's an easy way to do it, or easier.

And this is the common, this is the third time

over the past six months at a conference where I've

talked about this topic.

And I'll talk to people afterwards and really

this is what comes back, is we don't have time for this.

Our hair is on fire, we don't have time

to add new things in.

What I would say is you probably already doing

some types of analytics, structured analytics

that maybe you hadn't thought about and maybe

you just need to formalize a little bit more.

So I want to go through a scenario,

and in this scenario you have a recently promoted CISO,

let's call him Mick.

Mick came from the intelligence community.

So he's really into the intelligence trade craft

and of course like all CISOs or C-level folks,

he reads the Wall Street Journal.

And he just saw this headline this week

in the Wall Street Journal and tell me if

this has ever happened to you.

The CISO comes and knocks on your doors

and wants to know about this article in New York Times,

Financial Times, Wall Street Journal

and starts a fire drill for your organization.

Has that happened to anyone before?

Yeah yeah, well now I'm the one doing that now.

So this is Mick our fictional CISO's response

to this and he really wants to know what's gonna happen

for the organization.

So I'm gonna walk through this hypothetical ish situation.

I'm gonna do two techniques, we'll walk through,

it's really to give you a flavor of

how you could try to apply this to a real world scenario

from your CISO that's zomygod-ing the news.

So we won't go into detail on some of these things,

others we will, but I just want to give you a flavor

of how you can actually incorporate

something like this into your program.

And you could use other techniques as well.

Just a flavor.

So one that I think is really, really important

and actually doesn't take a ton of time

is a key assumptions check.

I think this is really important

for a lot of different things.

For those of us that are on the vendor side

and we're producing our super cool intelligence reports,

this sort of stuff, if you're on the vendor side,

you're writing research that you're using for

thought leadership marketing purposes,

you really should be doing a lot of structured analysis

inside of your research.

But key assumptions check is really really important.

It's the foundation of your intelligence product.

And if you're making faulty assumptions,

and in intelligence there's no certainty right?

We don't know everything,

so it's really important to do this.

This goes back to

what Carmen was talking about is you need to have a culture

that will allow you to question other peoples' assumptions.

Right we have to not have hubris, we need to be humble,

we need to recognize that we don't know everything,

that another perspective could be a better perspective

or complement your perspective.

So you really want to understand the evidence

and reasoning behind something.

So in the scenario that we're walking through

on cryptocurrency fraud, Mick our CISO

works for a financial institution,

so he's definitely concerned about the implications

of cryptocurrency in general and then fraud in particular.

We've got a number of key assumptions.

And so these are the assumptions there.

A couple of new alternative coins and exchanges will emerge,

cryptocurrencies will eventually be adopted

by major retailers and financial institutions.

Some of these are trailing trends anyway,

but we're making those assumptions

and we're making them clear up front.

So whenever you start any type of analytical process,

whoever the team is working on writes these assumptions down

and then if you're fans of Silicon Valley,

you get the stick it notes out.

And actually Carmen referenced this

with structured brainstorming, another way that

you can do this exercise as well,

you get the sticky pads out.

And you start to ask yourself these questions

about the assumptions that you've made.

What would make an assumption untrue?

What if it was true in the past but it's no longer true?

Assign a confidence level to the assumption,

and then basically, and there's some others

that you can add to the mix here,

but that's a high level of what you would do.

You ask these questions about each of these

key assumptions and then you rate them.

This is solid, we feel really good

about this assumption, it's valid.

It's caveated, meaning something must happen

in order for this, or it's unsupported.

And then if it's unsupported, throw it out.

So I would say for any kind of intelligence product,

this is the type of activity that you'll want to have.

And this is not something that's gonna take a long time.

You could do this in an hour.

And I'm gonna talk about some remote and collaboration tools

you can use as well.

For my organization, I have people from Greece to London,

East Coast, Central, West Coast.

So it's a large distributed team.

So there's some challenges there as well.

So now we have the assumptions.

And one of the things about the key assumptions check,

even if you were to do an ACH, there's many of these

techniques where assumptions

are gonna be a component of it.

So this is using one structured analytic technique

to build upon another.

Has anyone ever worked with scenario planning or futures?

Has anyone ever done a cone of plausibility?

So this is looking forward.

And what I like about this, especially as a CISO,

what I'm trying to accomplish here in this example

is how you could take some intelligence assessments

and actually then use them in your program.

We talk about this panacea of intelligence

informing business decisions and giving you

decision advantage over your blah blah blah blah blah.

My goal here is to try to start thinking about

how we could actually do some of this stuff.

So cone of plausibility.

This is a forecasting technique.

Often times you'll see it in larger

intelligence organizations and may do them further out,

you know 2025, what can we expect.

I like to make fun of forecasts.

Not the forecasts but the predictions.

As Rob said I was a Forrester analyst and every year

in October we'd do these predictions.

And I always like to talk about forecasts

and not predictions because there was no

analytic rigor really in the predictions that I would make

as an industry analyst.

I don't know that I was blind to that fact then,

but what I like about forecasts is at least you have

some rigor that's going into your thought process

that you're using here.

So essentially what you're trying to do is project trends,

events and their consequences,

and you look at scenarios that occur.

And I think from a business that is trying to plan out

the implications of something,

in this case cryptocurrency fraud in 2018 and 2019,

you can start to talk about things in the business

that they might care about and then you start to,

I'll walk through it, let me not get ahead of myself.

I have a reference for all the things that

I'm talking about I've got references at the end.

So you have one slide that you can just look at,

it's similar to what I did last year.

If you look at that one slide you can just

hyperlink out to all these things.

So there's a lot of things in the cone of plausibility

as far as the framework goes.

Understanding the current conditions,

so the drivers and the assumptions.

How many people are familiar with the PESTLE model?

So you can use the PESTLE model

to help do the drivers an assumptions but

what's driving the current state?

What are the key assumptions that you're making

about the state, basically new alternative coins

are gonna come, new exchanges are gonna come,

fraud's gonna continue what we went through

on the previous one.

And then you build out the scenarios.

And so you have a preferred scenario

which in my experience in doing these preferred

really never happens, a probable,

and then you have wild cards.

Now the wild cards, I think one other thing that

we need more of from analysis perspective is creativity.

So wild cards is you just pick something that's

super random that you may not have thought of,

completely out of the box,

and you have that as a scenario.

So it's really just to kind of challenge

the thought that you have, and basically

what you then do is you monitor for these scenarios

and then you come up with countermeasures

for those scenarios, it'll be the process.

We'll walk through it a little bit more.

But I really think the wild card one,

in the ones that we've done internally at Digital Shadows

it's kind of fun to do that one.

One that we did about 12 months ago was around

DDoS botnets and we were trying to think about

how extortion actors might change,

I'm sorry with IoT botnets, doing DDoS,

and so one of the wild card scenarios we had,

and we've seen a little bit of this but

not on a grand scale was gonna be grand scale of

crowdsourcing extortion so instead of extorting

the brand, it's Christmas and Rick wants to get on

Xbox Live or PlayStation, and we take it down

and now I'm like OK Rick, if you pay me

$100 and we crowdsource that, then we'll bring

the service back online.

So that was just one example of a wild card

scenario that we did there.

So this one, it's not as bad to read on that screen,

it's kind of what it looks like from a large scale.

You've got the drivers that you've come up with.

And here the drivers for this scenario is

the accessibility of the technology, the anonymity

that you have, or lack of anonymity

as some of the cyber criminals are finding out,

popularity and high reputation, the opportunity,

there's all kinds of opportunity for fraud, the users,

the exchanges, the platforms,

regulation or lack thereof regulation.

And then the security of individuals,

consumers and organizations.

Again, this is just to be illustrative of what you could do

for this and your organization may not have

anything to do with cryptocurrency.

Then we have the assumptions that we talked through

before on the previous slide, and then we have scenarios.

And really at a high level in scenarios preferable is

law enforcement gets their act together,

regulations come into place and the risk level goes down.

Pretty unlikely I think for most things in our area.

The most probable one, and I'm gonna walk through that

in subsequent slides, is the cyber criminals

continue to innovate, they target the cryptocurrencies,

the exchanges, they're having a lot of success,

they're making a lot of profit.

You might even see

other types of networks that may have been used

for ransomware that are moving over to this

particular piece on crypto jacking as an example.

And then in wild card scenario here, heavy regulation,

decrease of anonymity, the fraudulent attacks...

(mumbling) Water.

The number of targets greatly decrease

and this just goes away as well.

So unlikely on that scenario as well.

So here we're a financial institution.

Mick the CISO he's concerned about the exchanges

and the customers, the employees there.

So you have your scenario so you go through,

you understand the drivers, you have the key assumptions.

You think about two or three scenarios

and maybe you just plan for the probable

because that's all you have time for.

And then you start to monitor for that.

You want to be able to monitor changes over time

that indicate this is about to occur.

And then you want, you develop courses of action.

Of course military people will understand

courses of action but this would be your plan.

So for me, Mick the CISO trying to understand

what do we need to do practically about this threat.

So several things that I would, trying to take

a change in the threat landscape and tie it back

to my security program and how I might make investments

or de-invest in certain areas.

So things that I would want to do in this particular case,

we know that criminals are trying to use your Amazon Compute

for crypto jacking, so you're paying for them to mine

Monero, Bitcoin, whatever the case may be.

We see more Monero, a lot of cases.

But here, do I have a capability to monitor GitHub?

Now GitHub does a really good job of take down requests.

There's a lot of misconfiguration.

Let's talk about something that in our programs

like shadow IT, GitHub is a really painful component

of shadow IT, so here I want to understand

what's out here on GitHub, what misconfigurations

did someone do that shouldn't be there

that's exposing risk to my organization?

And then you start to see your Amazon bill going up.

So this is one practical thing that I might,

I may not have a capability to do this.

How can I do this, start monitoring that?

Another one, now this one probably is

appropriate for everything right?

This is web browser so this is crypto jacking

of your users' browsers themselves which

crypto jacking in and of itself,

using your browser resources it reminds me of,

people remember SETI@home back in the day

where you could my computer to, that's what

actually I kinda think about crypto jacking.

I actually wouldn't mind a SETI like

if I was gonna let someone mine my computer.

It was a non profit, let's say it's

a cancer research center or something like that,

I'm not necessarily opposed to letting them

mine my browser if it's gonna help them get Monero

that they can use for research so it's not to say

that all of this crypto jacking is necessarily bad.

There is some good out there potentially.

But here we want to look at our browser security

and the controls that we have extensions.

And I would guess for a lot of organizations

this is probably a weak area of their configuration

and patch management in general.

And this obviously helps out way more

than just a crypto jacking scenario right?

This is everything scenario since the browser

is such a prevalent attack pattern.

Another one, Have I Been Pwned, this is something

that you can do for free.

You can go out and look at your organization.

You can also subscribe to it as well,

but Troy Hunt puts together these databases.

So Mick the CISO wants to know if any of my employees

have been using their corporate email address

to register on one of these exchanges

that they're on, that exchange gets popped,

they drain all of the coin from them,

transfer it out, and then they have the email addresses

of everyone out there.

So what kind of risk does Mick the CISO's team have

from employees that are reusing their corporate credentials

even just the email address, right,

and these exchanges get compromised?

So this also then becomes a multi-factor authentication

conversation as well.

So again what I'm trying to do is map this threat

that you get from the Wall Street Journal

taking it down to how do you actually change

your security program as a result?

Another one, and I think this one is an interesting one

we were talking about, if you think about Millennials,

Millennials are more apt to invest in cryptocurrencies.

I actually see it as an opportunity, one is

I need to cover this in my security awareness training.

How many people have run security awareness

programs in their careers?

They're tough, and the way you get people to connect,

you talk about threats to their family,

to their children, well here,

for the Millennials that are interested in this,

this might be a way to connect with them,

and then you talk about hey look.

There's all kinds of fake exchanges set up,

fake platforms for trading, just understand

the overall risk, if you want to make the investment

that's fine, that's your business.

We're not gonna give you investment advice

but just know the risk there.

Oh by the way, here's some other things

that you want to think about.

So this could be an opportunity to take again

this Wall Street Journal zomygod article

and actually do something in my organization

to try to level up the security a little bit.

So what can you do?

There's a couple things and these aren't gonna be,

some things that'll be interesting,

some are more obvious.

But one, has anyone read this

Cases in Intelligence Analysis?

This is almost like a compendium book.

It's really good, we just started in the Dallas office

with our intel analysts, we're starting to take an event,

and basically it could be something like

attempted assassination of

anti-Putin journalist in Russia,

things that have happened historically and then

this is a workbook and they'll give you two to three

structured analytic techniques to work through.

What I have found to be the most valuable is

Harrison's one of the guys I do it with

in my office in Dallas is just us talking.

We're in a room, we're discussing these things

and it's just, the mere fact that you're having

communication maybe goes back to Carmen's point about

it's not as much about the structured analytics

as it is about better analysis.

This has been a really good way for us to do that

within our intel team out of the Dallas office.

So especially if you're a history buff as well,

you'll like this 'cause you're going back to

all sorts of, there's 20 of them in there.

In the books, maybe 60, about something like that.

So recommended take-home assignment for you.

Google Docs, this is one, now I will caveat this with

I realize Google Docs is in the cloud.

So you could use another solution but conceptually

either you host your own solution but

what I like about Google Docs, we used to use this

at Forrester, we'd have all the analysts,

I think we had 12 analysts on the team,

and we would be brainstorming

at the beginning of the year about

the threat landscape, customer pain points,

what do we want to write about?

And it would be ready set go and then everybody

just starts throwing up ideas on there

and just seeing them pop pop different colors.

Has anyone ever used Google Docs in this context before?

It's a really good technique especially,

especially for remote teams.

And I think that's a big problem that we have

just in general, especially as there's a trend

for more remote workforce, and you want to enable

your own remote employees so I really like this model.

And then essentially what you do is you start to

group these ideas together and you put them here

and then maybe you do a key assumptions check on that.

So it's a way that you can start off with

structured brainstorming, then you do

key assumptions check, then you can move on

to whatever else it may be.

This could be you're brainstorming on the threat landscape

for your organization in 2018 and beyond.

Maybe this is on the vendor side and you're trying

to think of really exciting research and capabilities

that you have that you want to highlight.

Whatever the case may be, Google Docs is one route to go.

Then, you can go big.

Now I do think, anybody here a developer in a previous life?

Developers, it's not the same everywhere,

but developers do a pretty good job of collaborating,

especially when you have remote product management

and development teams.

But there's tools like Google Jamboard

where you actually have a big TV like this

and it's interactive and I can draw ideas on it

and then I can use it on my phone,

can use it on a tablet as well.

So it really helps with both in person collaboration

for those in the office, as well as people that are remote.

The TV is like five grand so this is,

you're starting to (mumbling) a little bit more but

if you think of a threat intelligence team

and you want to have a better collaboration,

and this doesn't necessarily have to be,

this could be other things besides threat intelligence

this could be, I want to draw the architecture

of my environment in a real time view

so that we get a better understanding

of what our architecture looks like.

And Google Jamboard is not alone.

Stormboard has, it's a Canadian company.

They have an OnPrem version as well.

This is one I created last night on my own.

And you can put the note cards on.

So you could put the note cards up,

everyone could do that and then you could group

the note cards and things like that.

So there are some pretty nice collaboration tools out there

that you can use, again, you can have some

that you host yourself so you don't have to worry about

this being in the cloud.

A lot of the collaboration tools,

if the content you're working on isn't sensitive in nature,

they plug into Box, they plug into all the CESS applications

and it's a really convenient way to work.

Again, it depends on the content

and sensitivity that you're working on.

And Carmen actually mentioned this,

cued me up here with IARPA.

So IARPA has funded, I think it's about 50 million across

four universities to do research in,

CREATE is the name of the program,

but Crowdsourcing, Evidence, Augmentation,

Thinking and Evaluation.

If you want to put a Google alert down

on something to track, this, the first,

it's been in place I think maybe it's May of this year,

these universities are gonna present their findings.

Now I don't know how much of it will actually go public

but this is a good one to put a Google alert on.

And here's three of the specific products,

projects that they're working on.

Some of them are more focused on crowdsourcing,

of analysis, using AI with that.

In this case, when it's a university person

talking about AI versus vendor marketing,

I'm more inclined to believe their AI or maybe not

have as much distaste for it.

'Cause I am firmly in the camp of (audio muting)

machine learn and AI all the things is the wrong approach.

Maybe that's my bias from being analyst, it is,

my bias from being an analyst at Forrester

and getting machine learned to death

from everyone out there.

Swarm is a wiki, when you can ask questions

and get responses back.

Trace is another collaborative tool.

I don't know what these applications will actually

come out being, but there could be something

that we could leverage in the commercial sector as well.

And then of course for our friends

in the intelligence community, you may very well

be able to use these types of solutions

in the next several years.

The one thing I would say is this, SATS are not

silver bullets, just because you have

structured analytic techniques

doesn't mean you're not gonna fail.

Intelligence is, at best, a guessing game right?

Hopefully we can do a little bit more than that.

So don't think it could be this false sense of

look at all this analytic rigor.

We had these three techniques that were used

in the production of this particular product or asset

and it's good to go.

No you cannot be complacent with these,

you need to revise the tool set,

Carmen talked about that as well.

And I think this is a great quote.

I often ask if this is an overdone quote.

It depends, is this an overdone quote for this audience?

OK.

I like it.

Tell me what you know, what you don't know

and then most importantly, what you think

is most likely to happen based on that.

I think this is what's really really important for us.

I think if you look at the way we've been focused,

very much indicator focused over the years,

some of this stuff isn't, this is an abstract level above

where we're at but I think just knowing what you know,

knowing what you don't know is the tough piece.

This goes back to the Rumsfeld analogy a little bit too

right the unknown unknowns.

But at least for the things that you know,

what's your confidence level around

that realm that you do know it?

We know it really well or we don't know it that well.

I think this is a really important one to go off of.

That's a picture from last year.

I just was gonna throw up a thank you slide on there

and I found that was our monument walk

that we did last year.

I did put as a reference, a number of different things

that I put on here, and if you want to go through

an actual painful exercise, that second to bottom,

PARC ACH Software, has anyone ever used it?

Do you like it? - It's so old.

- Yeah yeah.

Might just be better to go with the spreadsheet.

It could be a little bit easier but

actually PARC's got some other tools out there as well.

There's different references, some stuff from Rand,

a couple different pdfs that you can download as well.

The one call that I would have on this,

and I don't know if a Slack channel's the right way

to do it but I really want to foster more conversation

about better analysis in our space.

So if you're interested in this,

if you're passionate about it, if you have experience,

please reach out to me.

I'd like to form some sort of group where we can talk

and collaborate on this and then further it for the field.

I don't know what it's gonna look like.

These may not be the right things for your organization

but I do think as we look to mature where we're at

as an industry and practitioners,

we need to be doing better analysis.

Thank you. (applauding)

(upbeat music)

For more infomation >> There Is MOAR To Structured Analytic Techniques Than Just ACH! - SANS CTI Summit 2018 - Duration: 32:22.

-------------------------------------------

✅ Aston Martin DB5 driven by James Bond in GoldenEye is set to sell for £1.6 MILLION - Duration: 3:36.

The Aston Martin DB5 is perhaps one of the most iconic cars of all time.One of the main reasons for this is due to its association with the James Bond franchise, with many incarnations of 7 getting behind the wheel of the luxury motor

Now, fans of the car and the movie franchise have the opportunity to get their hands on one of the cars using in the films

The 1965 Aston Martin DB5 driven by Pierce Brosnan in 1995s Goldeneye is going up for sale at auction

Related articles Aston Martin left to languish in a garage for 5 years is tipped to

Aston Martin DB11 AMR 18 - All-new flagship price, specs and perf. It is used in the scene that took place in the Monaco hills when he was in pursuit of Xenia Onatopp, the Ferrari-driving assassin played by Famke Janssen

Goldeneye wasn't only the movie where Brosnan debuted as 7 but also the first time since the Sean Connery era that the DB5 was seen in a Bond flick

After filming wrapped on the film the car was used by Eon Productions for promoting GoldenEye and the Aston Martin DB7

But in 1 it was auctioned in London as part of a James Bond sale - fetching a then record-breaking £157,75

It was bought by entrepreneur Max Reid who is now set to make a tenfold profit when he sells it in July

The 1965 sports car has been entered into Bonhams' Goodwood Festival of Speed sale on July 13 and it has an estimate of £1

6 million.Sholto Gilbertson, Motor Car Department director at Bonhams, said: "The DB5 is one of the most recognisable and desirable British classic cars in the world - add in the fact that is was actually driven by 'Bond' and you've got something seriously exciting

"Every Bond fan remembers Pierce Brosnan tearing through the hills above Monaco, racing Xenia Onatopp's Ferrari, and it must up there as one of the most thrilling Bond car chases in history

"This car is something very special indeed - it was rightly the most valuable piece of Bond memorabilia ever sold when it was purchased in 1 - and we are delighted to be offering it at our Festival of Speed Sale in July

"This still falls short of the price the 1964 DB5 driven by Connery in Goldfinger sold for, collecting £2

9million in 1 at auction.Powering the car is a 4.-litre engine which develops 282bhp allowing the car to sprint from -6mph time of 6

5 seconds and a top speed of around 145mph.

For more infomation >> ✅ Aston Martin DB5 driven by James Bond in GoldenEye is set to sell for £1.6 MILLION - Duration: 3:36.

-------------------------------------------

What is a Restaurant POS? - Duration: 1:31.

What is a POS?

A POS or, Point of Sale, is a system that combines hardware and software so businesses

can collect payments from their customers.

Most restaurants use one instead of paper and a cash register.

The technology has come so far that only using a POS to transact sales would be like only

using a smartphone to make calls.

So, what else can a modern system do?

With the power of cloud based technology, modern point of sale systems help restaurant

owners automate daily tasks such as billing, inventory,

and employee time tracking.

It also accurately records sales and creates hyper-detailed reports of each night's receipts,

highlighting trends, top selling items, peak times and more.

You can even dive deep into the performance of both your menu and staff.

For example, you can find out what dishes not only sell well, but which ones are bringing

customers back.

Modern POS systems allow guests to make purchases in near real time, adjusting

orders and payments on the fly.

If they change their mind about their side dish or want to add a dessert, an iPad-based

system allows servers to make updates without having to re-open a check.

Many systems also offer tableside ordering and payment so a server never gets stuck to

a fixed terminal.

To learn more about how a cloud-based POS system can help simplify your restaurant operations,

visit Upserve.com.

For more infomation >> What is a Restaurant POS? - Duration: 1:31.

-------------------------------------------

Homeopathy Is Customized Medicine - Duration: 1:21.

For more infomation >> Homeopathy Is Customized Medicine - Duration: 1:21.

-------------------------------------------

What Is Rolling Ball Sculpture? Physics & Sculpture - Duration: 5:02.

We're here in Indianapolis Indiana to meet Tom Harold, a rolling ball sculpture artist.

If that doesn't intrigue you, I don't know what will.

Follow me!

Creativity is nothing more than problem-solving at its root, at its base.

And I do tons of problem-solving every day, all day long.

Tell me, Tom, how did you

get into this hobby, or artwork, or art form, where did it begin?

I discovered rolling ball sculpture at the Children's Museum Indianapolis,

and when I saw it, I remember thinking,

coolest thing I've ever seen in my life!

The root beginnings of just that

interest in mechanics and mechanisms, and you know, that sort of

thing, that had just went all the way back to when I was a kid I always liked

machinery or just how, how things work.

When I was into cars in high school,

I honestly probably sacrificed most of my social life because I was so

focused on that. Kind of had something, like, some kind of a crossover moment,

or whatever, where I can look at that sculpture, and go, when I look at car

stuff, that's what it looks like in my head.

The pure visual appeal of a machine

moving or, you know, that sort of mechanical motion and making it

something that absolutely everybody can relate to.

First, when I'm doing a piece generally speaking they're so large that they

require a frame. You make the frame, you have to lay that all out.

The next major thing will be where is the ball going to start from?

There's a xylophone on there, well you can't put a xylophone anywhere you want.

You also have to have the ball rolling across it fast enough.

I've got friction to worry about and, you know, velocity, gravity, and all you

know, all that kinds of stuff.

You know, children love what I do and that I never

get, you know, I never get tired of that. It's also really cool that somebody

who's like 75 years old walked by and glance over at it, and they stop and

they kind of back up like a half step and they go, oh that's really cool!

I had this idea in high school that I just wasn't good enough.

Your genius has to

show when you're maybe, you know, five years old at the latest, you know any

time after that you're just, you know, you're missed the bus.

And I let that sort of thing stop me.

So what was that feeling like going from you didn't feel

like an artist you're not creative, which you are, and then to now somebody's like

I mean, you found your passion, and somebody wants to buy something you made?

That is incredible and it's still really hard to believe and a

lot of days it doesn't seem real.

You've got a goal and you come to the understanding that you're gonna have

to work at it really hard, and you're gonna have to work at it a long time, it

will bring about some kind of result.

Achieving a goal and doing something for

yourself that really matters to you and really makes you feel like you're living

the life that you want to live that you're being the best version of you

that you can possibly be.

Always take your dreams seriously they're there for a reason.

Your own happiness is really important to you, so treat it that way.

Thanks so much for watching today! Be sure to subscribe by clicking the button

above that way you don't miss out on any episodes and I can make more content

which I would love to do!

And if you haven't seen my previous episodes you

can use the link below, and don't feel bad, so go get on it, now's the time check

them out I would love to know. And be sure to comment on this episode I love

your feedback, and of course, share it if you don't mind.

Everybody have an awesome day,

and be Artrageous!

Không có nhận xét nào:

Đăng nhận xét