POPULARITY
Hello, and welcome to another episode of CISO Tradecraft -- the podcast that provides you with the information, knowledge, and wisdom to be a more effective cybersecurity leader. My name is G. Mark Hardy, and today we are going to discuss how nation state conflict and sponsored cyberattacks can affect us as non-combatants, and what we should be doing about it. Even if you don't have operations in a war zone, remember cyber has a global reach, so don't think that just because you may be half a world away from the battlefield that someone is not going to reach out and touch you in a bad way. So, listen for what I think will be a fascinating episode, and please do us a small favor and give us a "like" or a 5-star review on your favorite podcast platform -- those ratings really help us reach our peers. It only takes a click -- thank you for helping out our security leadership community. I'm not going to get into any geopolitics here; I'm going to try to ensure that this episode remains useful for quite some time. However, since the conflict in Ukraine has been ongoing for over two hundred days, I will draw examples from that. The ancient Chinese military strategist Sun Tzu wrote: “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” That's a little more detailed than the classic Greek aphorism, "know thyself," but the intent is the same even today. Let me add one more quote and we'll get into the material. Over 20 years ago, when he was Secretary of Defense, Donald Rumsfeld said: "As we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns—the ones we don't know we don't know. And if one looks throughout the history of our country and other free countries, it is the latter category that tends to be the difficult ones. So, knowledge seems extremely important throughout the ages. Modern governments know that, and as a result all have their own intelligence agencies. Let's look at an example. If we go to the CIA's website, we will see the fourfold mission of the Central Intelligence Agency: Collecting foreign intelligence that matters Producing objective all-source analysis Conducting effective covert action as directed by the President Safeguarding the secrets that help keep our nation safe. Why do we mention this? Most governments around the world have similar Nation State objectives and mission statements. Additionally, it's particularly important to understand what is wanted by "state actors" (note, I'll use that term for government and contract intelligence agents.). What are typical goals for State Actors? Let's look at a couple: Goal 1: Steal targeting data to enable future operations. Data such as cell phone records, banking statements or emails allow countries to better target individuals and companies when they know that identifying information. Additionally, targeting data allows Nation state organizations to understand how individuals are connected. This can be key when we are looking for key influencers for targets of interest. All targeting data should not be considered equal. Generally, Banking and Telecom Data are considered the best for collecting so be mindful if that is the type of company that you protect. State Actors target these organizations because of two factors:The Importance of the Data is the first factor. If one party sends a second party an email, that means there is a basic level of connection. However, it's not automatically a strong connection since we all receive emails from spammers. If one party calls someone and talks for 10 minutes to them on a phone call, that generally means a closer connection than an email. Finally, if one party sends money to another party that either means a really strong connection exists, or someone just got scammed. The Accuracy of the Data is the second factor. Many folks sign up for social media accounts with throw away credentials (i.e., fake names and phone numbers). Others use temporary emails to attend conferences, so they don't get marketing spam when they get home. However, because of Anti Money Laundering (or AML) laws, people generally provide legitimate data to financial services firms. If they don't, then they risk not being able to take the money out of a bank -- which would be a big problem. A second goal in addition to collecting targeting data, is that State Actors are interested in collecting Foreign Intelligence. Foreign Intelligence which drives policy-making decisions is very impactful. Remember, stealing secrets that no one cares about is generally just a waste of government tax dollars. If governments collect foreign intelligence on sanctioned activity, then they can inform policy makers on the effectiveness of current sanctions, which is highly useful. By reporting sanctioned activity, the government can know when current sanctions are being violated and when to update current sanctions. This can result in enabling new intelligence collection objectives. Examples of this include:A country may sanction a foreign air carrier that changes ownership or goes out of business. In that case, sanctions may be added against different airlines. This occurred when the US sanctioned Mahan Air, an Iran's airline. Currently the US enforces sanctions on more than half of Iran's civilian airlines. A country may place sanctions on a foreign bank to limit its ability to trade in certain countries or currencies. However, if sanctioned banks circumvent controls by trading with smaller banks which are not sanctioned, then current sanctions are likely ineffective. Examples of sanctioning bank activity by the US against Russia during the current war with Ukraine include:On February 27th sanctions were placed against Russian Banks using the SWIFT international payment systems On February 28th, the Russian Central Bank was sanctioned On March 24th, the Russian Bank Sberbank CEO was sanctioned On April 5th, the US IRS suspended information exchanges with the Russian tax authorities to hamper Moscow's ability to collect taxes. On April 6th, the US sanctioned additional Russian banks. These sanctions didn't just start with the onset of hostilities on 24 February 2022. They date back to Russia's invasion of Crimea. It's just that the US has turned up the volume this time. If sanctions are placed against a country's nuclear energy practices, then knowing what companies are selling or trading goods into the sanctioned country becomes important. Collecting information from transportation companies that identify goods being imported and exported into the country can also identify sanction effectiveness. A third goal or activity taken by State Actors is covert action. Covert Action is generally intended to cause harm to another state without attribution. However, anonymity is often hard to maintain.If we look at Russia in its previous history with Ukraine, we have seen the use of cyber attacks as a form of covert action. The devastating NotPetya malware (which has been generally accredited to Russia) was launched as a supply chain attack. Russian agents compromised the software update mechanism of Ukrainian accounting software M.E. Doc, which was used by nearly 400,000 clients to manage financial documents and file tax returns. This update did much more than the intended choking off of Ukrainian government tax revenue -- Maersk shipping estimates a loss of $300 million. FedEx around $400 million. The total global damage to companies is estimated at around $10 billion. The use of cyberattacks hasn't been limited to just Russia. Another example is Stuxnet. This covert action attack against Iranian nuclear facilities that destroyed nearly one thousand centrifuges is generally attributed to the U.S. and Israel. Changing topics a little bit, we can think of the story of two people encountering a bear. Two friends are in the woods, having a picnic. They spot a bear running at them. One friend gets up and starts running away from the bear. The other friend opens his backpack, takes out his running shoes, changes out of his hiking boots, and starts stretching. “Are you crazy?” the first friend shouts, looking over his shoulder as the bear closes in on his friend. “You can't outrun a bear!” “I don't have to outrun the bear,” said the second friend. “I only have to outrun you.” So how can we physically outrun the Cyber Bear? We need to anticipate where the Bear is likely to be encountered. Just as national park signs warn tourists of animals, there's intelligence information that can inform the general public. If you are looking for physical safety intelligence you might consider:The US Department of State Bureau of Consular Affairs. The State Department hosts a travel advisory list. This list allows anyone to know if a country has issues such as Covid Outbreaks, Civil Unrest, Kidnappings, Violent Crime, and other issues that would complicate having an office for most businesses. Another example is the CIA World Factbook. The World Factbook provides basic intelligence on the history, people, government, economy, energy, geography, environment, communications, transportation, military, terrorism, and transnational issues for 266 world entities. Additionally you might also consider data sources from the World Health Organization and The World Bank If we believe that one of our remote offices is now at risk, then we need to establish a good communications plan. Good communications plans generally require at least four forms of communication. The acronym PACE or Primary, Alternate, Contingency, and Emergency is often usedPrimary Communication: We will first try to email folks in the office. Alternate Communication: If we are unable to communicate via email, then we will try calling their work phones. Contingency Communication: If we are unable to reach individuals via their work phones, then we will send a Text message to their personal cell phones. Emergency Communication: If we are unable to reach them by texting their personal devices, then we will send an email to their personal emails and next of kin. Additionally, we might purchase satellite phones for a country manager. Satellite phones can be generally purchased for under $1,000 and can be used with commercial satellite service providers such as Inmarsat, Globalstar, and Thuraya. One popular plan is Inmarsat's BGAN. BGAN can usually be obtained from resellers for about $100 per month with text messaging costing about fifty cents each and calls costing about $1.50 per minute. This usually translates to a yearly cost of $1,500-2K per device. Is $2K worth the price of communicating to save lives in a high-risk country during high political turmoil? Let your company decide. Note a great time to bring this up may be during use-or-lose money discussions at the end of the year. We should also consider preparing egress locations. For example, before a fire drill most companies plan a meetup location outside of their building so they can perform a headcount. This location such as a vacant parking lot across the street allows teams to identify missing personnel which can later be communicated to emergency personnel. If your company has offices in thirty-five countries, you should think about the same thing, but not assembling across the street but across the border. Have you identified an egress office for each overseas country? If you had operations in Ukraine, then you might have chosen a neighboring country such as Poland, Romania, or Hungary to facilitate departures. When things started going bad, that office could begin creating support networks to find local housing for your corporate refugees. Additionally, finding job opportunities for family members can also be extremely helpful when language is a barrier in new countries. If we anticipate the Bear is going to attack our company digitally, then we should also look for the warning signs. Good examples of this include following threat intelligence information from: Your local ISAC organization. ISAC or Information Sharing Analysis Centers are great communities where you can see if your vertical sector is coming under attack and share your experiences/threats. The National Council of ISACs lists twenty-five different members across a wide range of industries. An example is the Financial Services ISAC or FS-ISAC which has a daily and weekly feed where subscribers can find situational reports on cyber threats from State Actors and criminal groups. InfraGard™ is a partnership between the Federal Bureau of Investigation and members of the private sector for the protection of US Critical Infrastructure. Note you generally need to be a US citizen without a criminal history to join AlienVault offers a Threat Intelligence Community called Open Threat Exchange which grants users free access to over nineteen million threat indicators. Note AlienVault currently hosts over 100,000 global participants, so it's a great place to connect with fellow professionals. The Cybersecurity & Infrastructure Security Agency or CISA also routinely issues cybersecurity advisories to stop harmful malware, ransomware, and nation state attacks. Helpful pages on their websites include the following:Shields Up which provides updates on cyber threats, guidance for organizations, recommendations for corporate Leaders and CEOs, ransomware responses, free tooling, and steps that you can take to protect your families. There's even a Shields Technical Guidance page with more detailed recommendations. CISA routinely puts out Alerts which identify threat actor tactics and techniques. For example, Alert AA22-011A identifies how to understand and mitigate Russian State Sponsored Cyber Threats to US Critical Infrastructure. This alert tells you what CVEs the Russian government is using as well as the documented TTPs which map to the MITRE ATT&CK™ Framework. Note if you want to see more on the MITRE ATT&CK mapped to various intrusion groups we recommend going to attack.mitre.org slant groups. CISA also has notifications that organizations can sign up for to receive timely information on security issues, vulnerabilities, and high impact activity. Another page to note on CISA's website is US Cert. Here you can report cyber incidents, report phishing, report malware, report vulnerabilities, share indicators, or contact US Cert. One helpful page to consider is the Cyber Resilience Review Assessment. Most organizations have an IT Control to conduct yearly risk assessments, and this can help identify weaknesses in your controls. Now that we have seen a bear in the woods, what can we do to put running shoes on to run faster than our peers? If we look at the CISA Shield Technical Guidance Page we can find shields up recommendations such as remediating vulnerabilities, enforcing MFA, running antivirus, enabling strong spam filters to prevent phishing attacks, disabling ports and protocols that are not essential, and strengthening controls for cloud services. Let's look at this in more detail to properly fasten our running shoes. If we are going to remediate vulnerabilities let's focus on the highest priority. I would argue those are high/critical vulnerabilities with known exploits being used in the wild. You can go to CISA's Known Exploited Vulnerabilities Catalog page for a detailed list. Each time a new vulnerability gets added, run a vulnerability scan on your environment to prioritize patching. Next is Multi Factor Authentication (MFA). Routinely we see organizations require MFA access to websites and use Single Sign On. This is great -- please don't stop doing this. However, we would also recommend MFA enhancements in two ways. One, are you using MFA on RDP/SSH logins by administrators? If not, then please enable immediately. You never know when one developer will get phished, and the attacker can pull his SSH keys. Having MFA means even when those keys are lost, bad actor propagation can be minimized. Another enhancement is to increase the security within your MFA functionality. For example, if you use Microsoft Authenticator today try changing from a 6 digit rotating pin to using security features such as number matching that displays the location of their IP Address. You can also look at GPS conditional policies to block all access from countries in which you don't have a presence. Running antivirus is another important safeguard. Here's the kicker -- do you actually know what percentage of your endpoints are running AV and EDR agents? Do you have coverage on both your Windows and Linux Server environments? Of the agents running, what portion have signatures updates that are not current? How about more than 30 days old. We find a lot of companies just check the box saying they have antivirus, but if you look behind the scenes you can see that antivirus isn't as effective as you think when it's turned off or outdated. Enabling Strong Spam Filters is another forgotten exercise. Yes, companies buy solutions like Proofpoint to secure email, but there's more that can be done. One example is implementing DMARC to properly authenticate and block spoofed emails. It's the standard now and prevents brand impersonation. Also please consider restricting email domains. You can do this at the very top. Today, the vast majority of legitimate correspondents still utilize one of the original seven top-level domains: .com, .org, .net, .edu, .mil, .gov, and .int, as well as two-letter country code top-level domains (called ccTLDs). However, you should look carefully at your business correspondence to determine if communicating with all 1,487 top-level domains is really necessary. Let's say your business is located entirely in the UK. Do you really want to allow emails from Country codes such as .RU, .CN, and others? Do you do business with .hair, or .lifestyle, or .xxx? If you don't have a business reason for conducting commerce with these TLDs, block them and minimize both spam and harmful attacks. It won't stop bad actors from using Gmail to send phishing attacks, but you might be surprised at just how much restricting TLDs in your email can help. Note that you have to be careful not to create a self-inflicted denial of service, so make sure that emails from suspect TLDs get evaluated before deletion. Disabling Ports and Protocols is key since you don't want bad actors having easy targets. One thing to consider is using Amazon Inspector. Amazon Inspector has rules in the network reachability package to analyze your network configurations to find security vulnerabilities in your EC2 Instances. This can highlight and provide guidance about restricting access that is not secure such as network configurations that allow for potentially malicious access such as mismanaged security groups, Access Control Lists, Internet Gateways, etc. Strengthening Cloud Security- We won't go into this topic too much as you could spend a whole talk on strengthening cloud security. Companies should consider purchasing a cloud security solution like Wiz, Orca, or Prisma for help in this regard. One tip we don't see often is using geo-fencing and IP allow-lists. For example, one new feature that AWS recently created is to enable Web Application Firewall protections for Amazon Cognito. This makes it easier to protect user pools and hosted UIs from common web exploits. Once we notice there's likely been a bear attack on our peers or our infrastructure, we should report it. This can be done by reporting incidents to local governments such as CISA or a local FBI field office, paid sharing organizations such as ISAC, or free communities such as AlienVault OTX. Let's walk through a notional example of what we might encounter as collateral damage in a cyberwar. However, to keeps this out of current geopolitics, we'll use the fictitious countries Blue and Orange. Imagine that you work at the Acme Widget Corporation which is a Fortune 500 company with a global presence. Because Acme manufactures large scale widgets in their factory in the nation of Orange, they are also sold to the local Orange economy. Unfortunately for Acme, Orange has just invaded their neighboring country Blue. Given that Orange is viewed as the aggressor, various countries have imposed sanctions against Orange. Not wanting to attract the attention of the Orange military or the U.S. Treasury department, your company produces an idea that might just be crazy enough to work. Your company is going to form a new company within Orange that is not affiliated with the parent company for the entirety of the war. This means that the parent company won't provide services to the Orange company. Additionally, since there is no affiliation between the companies then the legal department advises that there will not be sanction evasion activity which could put the company at risk. There's just one problem. Your company has to evict the newly created Orange company (Acme Orange LLC) from its network and ensure it has the critical IT services to enable its success. So where do we start? Let's consider a few things. First, what is the lifeblood of a company? Every company really needs laptops and Collaboration Software like Office 365 or GSuite. So, if we have five hundred people in the new Acme Orange company, that's five hundred new laptops and a new server that will host Microsoft Exchange, a NAS drive, and other critical Microsoft on premises services. Active Directory: Once you obtain the server, you realize a few things. Previous Acme admin credentials were used to troubleshoot desktops in the Orange environment. Since exposed passwords are always a bad thing, you get your first incident to refresh all passwords that may have been exposed. Also, you ensure a new Active Directory server is created for your Orange environment. This should leverage best practices such as MFA since Orange Companies will likely come under attack. Let's talk about other things that companies need to survive: Customer relations management (CRM) services like Salesforce Accounting and Bookkeeping applications such as QuickBooks Payment Software such as PayPal or Stripe File Storage such as Google Drive or Drop Box Video Conferencing like Zoom Customer Service Software like Zendesk Contract Management software like DocuSign HR Software like Bamboo or My Workday Antivirus & EDR software Standing up a new company's IT infrastructure in a month is never a trivial task. However, if ACME Orange is able to survive for 2-3 years it can then return to the parent company after the sanctions are lifted. Let's look at some discussion topics. What IT services will be the hardest to transfer? Can new IT equipment for Acme Orange be procured in a month during a time of conflict? Which services are likely to only have a SaaS offering and not enable on premises during times of conflicts? Could your company actually close a procurement request in a one-month timeline? If we believe we can transfer IT services and get the office up and running, we might look at our cyber team's role in providing recommendations to a new office that will be able to survive a time of turmoil. All laptops shall have Antivirus and EDR enabled from Microsoft. Since the Acme Orange office is isolated from the rest of the world, all firewalls will block IP traffic not originating from Orange. SSO and MFA will be required on all logins Backups will be routinely required. Note if you are really looking for effective strategies to mitigate cyber security incidents, we highly recommend the Australian Essential Eight. We have a link in our show notes if you want more details. Additionally, the ACME Orange IT department will need to create its own Incident Response Plan (IRP). One really good guide for building Cyber Incident Response Playbooks comes from the American Public Power Association. (I'll put the link in our show notes.) The IRP recommends creating incident templates that can be used for common attacks such as: Denial of Service (DoS) Malware Web Application Attack (SQL Injection, XSS, Directory Traversal, …) Cyber-Physical Attack Phishing Man in the middle attack Zero Day Exploit This Incident Response Template can identify helpful information such as Detection: Record how the attack was identified Reporting: Provide a list of POCs and contact information for the IT help desk to contact during an event Triage: List the activities that need to be performed during Incident Response. Typically, teams follow the PICERL model. (Preparation - Identification - Containment - Eradication - Recovery - Lessons Learned) Classification: Depending on the severity level of the event, identify additional actions that need to occur Communications: Identify how to notify local law enforcement, regulatory agencies, and insurance carriers during material cyber incidents. Additionally describe the process on how communications will be relayed to customers, employees, media, and state/local leaders. As you can see, there is much that would have to be done in response to a nation state aggression or regional conflict that would likely fall in your lap. If you didn't think about it before, you now have plenty of material to work with. Figure out your own unique requirements, do some tabletop exercises where you identify your most relevant Orange and Blue future conflict, and practice, practice, practice. We learned from COVID that companies that were well prepared with a disaster response plan rebranded as a pandemic response plan fared much better in the early weeks of the 2020 lockdown. I know my office transitioned to remote work for over sixty consecutive weeks without any serious IT issues because we had a written plan and had practiced it. Here's another one for you to add to your arsenal. Take the time and be prepared -- you'll be a hero "when the bubble goes up." (There -- you've learned an obscure term that nearly absent from a Google search but well-known in the Navy and the Marine Corps.) Okay, that's it for today's episode on Outrunning the Bear. Let's recap: Know yourself Know what foreign adversaries want Know what information, processes, or people you need to protect Know the goals of state actors:steal targeting data collect foreign intelligence covert action Know how to establish a good communications plan (PACE)Primary Alternate Contingency Emergency Know how to get out of Dodge Know where to find private and government threat intelligence Know your quick wins for protectionremediate vulnerabilities implement MFA everywhere run current antivirus enable strong spam filters restrict top level domains disable vulnerable or unused ports and protocols strengthen cloud security Know how to partition your business logically to isolate your IT environments in the event of a sudden requirement. Thanks again for listening to CISO Tradecraft. Please remember to like us on your favorite podcast provider and tell your peers about us. Don't forget to follow us on LinkedIn too -- you can find our regular stream of low-noise, high-value postings. This is your host G. Mark Hardy, and until next time, stay safe. References https://www.goodreads.com/quotes/17976-if-you-know-the-enemy-and-know-yourself-you-need https://en.wikipedia.org/wiki/There_are_known_knowns https://www.cia.gov/about/mission-vision/ https://www.cybersecurity-insiders.com/ukraines-accounting-software-firm-refuses-to-take-cyber-attack-blame/ https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ https://www.nationalisacs.org/member-isacs-3 https://attack.mitre.org/groups/ https://data.iana.org/TLD/tlds-alpha-by-domain.txt https://www.publicpower.org/system/files/documents/Public-Power-Cyber-Incident-Response-Playbook.pdf
Vrex brings your architects, construction, and design teams together inside the model from anywhere in the world with the power of virtual reality utilizing BIM models and point clouds from anywhere in the world. A virtual collaborative workspace, with the tools your team needs to be productive. Hans has a track record of bringing leading edge software technology to the business world. From his youth working part time at the local lumber yard he has always had a passion for the construction industry. In his career Hans has fronted data driven solutions to reduce complexity and provide insight to make solid plans and great decisions. Before joining VREX he commercialized research-based startup at global scale to become the preferred network service in the visual collaboration industry. At VREX his passions and experiences all come together: Taking Collaboration into a new dimension! Reducing the complexity of 3D-models, BIM and Point Cloud in Virtual Reality while sharing insight on a VREX collaboration platform. Twitter @VrexNow Instagram @hansjoha LinkedIn linkedin.com/in/hansfredrikjohansen Facebook https://www.linkedin.com/company/vixel/mycompany/ Website URL www.vrex.no Brian Jenkins has a demonstrated history of growing SaaS start-ups in the AEC industry. Customer centric, results-oriented and a problem solver, Brian grew up on the job site and has had a front row seat in viewing the growth of the constructions industry from one where business was conducted on a notepad to one that now allows for people of all walks to meet and collaborate virtual reality. LinkedIn https://www.linkedin.com/in/briandeanjenkins/
IMCCA is coming to CEDIA Expo 2021, Sonova acquires Sennheiser's consumer eletronics side, and taking stock of the AV over IP space.
IMCCA is coming to CEDIA Expo 2021, Sonova acquires Sennheiser's consumer eletronics side, and taking stock of the AV over IP space.
IMCCA is coming to CEDIA Expo 2021, Sonova acquires Sennheiser's consumer eletronics side, and taking stock of the AV over IP space.
Crunching the numbers with Ron Insana to figure out what's in store for the AV industry moving past this pandemic.
Crunching the numbers with Ron Insana to figure out what's in store for the AV industry moving past this pandemic. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Crunching the numbers with Ron Insana to figure out what's in store for the AV industry moving past this pandemic.
I grew up in a small town in Monterey County with my parents and two older sisters all choosing a career in teaching. I knew that wasn't my route. After graduating with a double degree in psychology and Spanish I followed the psychology path for a few years but high recidivism and a model where I didn't get compensated for all I put in to the job didn't fit me. Luckily I had a seasoned businessman uncle that guided me through the beginnings of a career in sales and business. Years later this is what I can show for myself: I've exceeded annual quota 13 of my 16 years in sales. Nationally recognized sales entrepreneur in Yahoo! Finance and Digital Journal. Award winning leadership oriented sales professional - background features more than 15+ years of exceptional performance in progressively responsible roles in sales and sales leadership. Multi methodology model expert (Challenger, Sandler, Miller Heiman, etc) but especially appreciate the power of mastering the psychology of sales. Specialties: Sales Process, Software-as-a-Service (SaaS), Collaboration Software, Enterprise Class Video and Collaboration, Account Based Marketing, Channel Sales Software, Personalization, and Rescue Dog Network. I was the number one performer while working at Salesforce, experiencing 4 startups that were acquired by Cisco, Experian, McDonald's, and AOL. I've hired and fired and exceeded annual quotas up to $2.5M. I'm an Enterprise seller with zero copy-paste component in my sales process. I also know all sides of the business having created a successful one spanning 3 years. I have experience effectively displacing legacy systems and maintaining Forrester quadrant leader status. This gives me pride and assists in interview processes but most important are authenticity, humility, and respect. No one likes a big ego selling them a business sales solution for 6-9 months. My passion is to help address your business needs. I thrive on showing businesses how they can maximize their results and achieve quantum leaps, easier and faster than ever before. This is what I bring to the table. Extra tidbits: I've traveled to 40 countries I motorcycled through China, Vietnam, and Australia alone after getting my motorcycle license 24 hours before getting on the plane I fell down an 8 story chimney I was 4th in the state of California for the 1500 meters I'm an amateur stand-up comedian and was an amateur hip hop freestyle artist I've gone on 4 bicycle tours with my father totaling 6,000 miles. I lived in Juneau Alaska to work I lived in Costa during high school living with a Costa Rican family and going to Costa Rican high school I lived in Spain in college attending a Spanish university. Contact Eric: Website Apple Podcast Spotify Podcast YouTube Channel LinkedIn
Steve Massey is co-founder and CEO of Prewitt Ridge, which was founded in 2019 to tackle the largest meta-problem in deep tech: systems engineering. They reduce friction in collaborative design efforts by connecting critical data elements between engineering teams and offering git-like tracking of project-wide changes. Prior to co-founding Prewitt Ridge, Steve was at Slingshot Aerospace for 2 years where he led the development of their real-time edge analytics pipeline working with USAF and defense contractor customers, and 5 years at SpaceX where he acted in a mission management and integration engineer role for multiple early Falcon 9 launches as well as led the avionics build for their Hyperloop pusher project. Some of the Topics Covered by Steve Massey in this Episode What Prewitt Ridge does and how it got started How Steve and his co-founder, Zeke Brechtel, decided to work together on Prewitt Ridge The timing behind Steve starting Prewitt Ridge How Steve decided on his ideal customer Raising funding for Prewitt Ridge and Steve's experience in Techstars Partnering with NASA JPL How Steve is thinking about customer acquisition for Prewitt Ridge The competitive landscape that Prewitt Ridge is operating in Building the team behind Prewitt Ridge What Steve learned while working at bigger companies like SpaceX and Slingshot Aerospace What the communication is like between Steve and his investors How Steve recharges Where Steve's interest in space came from Sign up for The Weekly Grind, for actionable insights and stories from successful entrepreneurs delivered to your inbox once per week: https://www.justgogrind.com/newsletter/ Listen to all episodes of the Just Go Grind Podcast: https://www.justgogrind.com/podcast/ Follow Justin Gordon on Twitter: https://twitter.com/justingordon212 Follow Justin Gordon on Instagram: https://www.instagram.com/justingordon8/
Finding out which video platform is right for your business.
Finding out which video platform is right for your business. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Sitting down with some of the "other guys" of the collaboration space and how they set themselves apart from the competition.
Sitting down with some of the "other guys" of the collaboration space and how they set themselves apart from the competition.
Sitting down with some of the "other guys" of the collaboration space and how they set themselves apart from the competition. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Microsoft, Bose and Sennheiser come together for collaborative solutions. Do these big name working together hold weight for consumers?
Microsoft, Bose and Sennheiser come together for collaborative solutions. Do these big name working together hold weight for consumers?
Microsoft, Bose and Sennheiser come together for collaborative solutions. Do these big name working together hold weight for consumers? See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The State of Project Collaboration Software in 2020: Slack, Teams, G Chat, and now P2 Automattic, the company that manages The post The State of Project Collaboration Software in 2020 appeared first on ProductivityCast.
Remote work, it got thrust upon the majority of people and while it became a bit of a pass time to complain about the challenges of working remotely. Yet, a recent survey shows that just 4% of global employees want to return to the office full time. That would come as no surprise to Chris Byers who has been leading a remote team since 2010 as the CEO of Formstack, a company that helps businesses enhance their workplace productivity through their proprietary platform.FREE Loving Remote Book A path to creating an inspiring culture that your employees will love!
Discussing video platforms for collaboration and designing a methodology for choosing one for you or your business.
Discussing video platforms for collaboration and designing a methodology for choosing one for you or your business. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Discussing video platforms for collaboration and designing a methodology for choosing one for you or your business.
The Wild - Your Guide to Virtual Reality Meeting and Collaboration Software - Recorded April 2, 2020
Zoom apologizes, but also reveals some INSANE growth numbers. Facebook Messenger comes to desktop. YouTube wants to clone TikTok. Apple let’s some people avoid the App Store tax. More gross firings by teleconference and a timely interesting raise.Sponsors:TinyCapital.com No Parking PodcastLinks: A Message to Our Users (Zoom Blog) Facebook debuts standalone Messenger app on Mac and PC (Engadget)'Content network effect' makes TikTok tough to copy (TechCrunch) YouTube Plans ‘Shorts’ to Rival TikTok (The Information) Apple Lets Some Video Apps Sell Shows Without Taking 30% Cut (Bloomberg)'It Felt Like a Black Mirror Episode' The Inside Account of How Bird Laid off 406 People in Two Minutes via a Zoom Webinar (dot.LA) Notion, Maker of Collaboration Software, Raises $50 Million (NYTimes)
MeetinVR - Your Guide to Virtual Reality Meeting and Collaboration Software - Recorded April 2, 2020
Acadicus - Your Guide to Virtual Reality Meeting and Collaboration Software - Recorded April 2, 2020
Inlusion - Your Guide to Virtual Reality Meeting and Collaboration Software - Recorded April 2, 2020
Subscribe on iTunes, Spotify, Google, Deezer, or via RSS.Links:McKayla's Code Review WorkshopsCodeStreamYC Combinator Show notes:As so often, I start by asking Peter what brought him to where he is today. Because, when you look at Peter's CV, you see that he graduated in Computer Science, but that instead of building software, Peter started out building whole software companies. Peter gives me a quite surprising answer. He says he was it was a dream of wealth and money. Yes, Peter wanted to become a founder, because he thought this is how he becomes rich and can live a good life. Peter does not completely answer my question, whether he managed to realize this dream, but listening to him, there is no doubt anymore that he found the right path for him. And yes, Peter's companies are successful.Which intrigues me. So, I want to know how he decided to start CodeStream, his current startup. CodeStream is a collaboration software for developers. It allows developers to connect and talk about different artifacts right within the IDE.Since Peter builds tech businesses for over 25 years, I wanted to know how their software development processes have changed over time. For example, I imagine that for the first startup he probably had a waterfall-based software process. And I guess that now they follow more agile processes. Peter explains to me that indeed some of the processes were more sequential at the beginning and one time they spend months developing a feature that really hurt their company's success. They only realized that after releasing it and it took them months to recover from that problem. Nowadays, CodeStream is very agile. He pushes code to production or test environments several times a day.CodeStream is a system that integrates with many other software systems, such as different IDEs, issue trackers, or planning software. So, I really want to know how they handle all the different integration points. How much of the software is universal, and how much is customized for each integration system?Peter says, that they knew from the beginning that they will have to integrate with so many different systems. They knew this ability will define their success. So, they spend a lot of time making sure the architecture is well-designed for that job. The main challenges come from integrating with the different IDEs, because the IDEs are rapidly evolving.As Peter has been in business for so many years, I want to know how much the tech stack has evolved. And yes, even for CodeStream they changed already from plain vanilla JavaScript to a tech stack including React. But what about the team culture? How does he make sure the company as a whole is successful? Peter says openness and transparency are what defines his success. He heavily promotes the social aspect of working together. People should not only build software, but they should also know they are part of something bigger.Even though CodeStream is quite remote, Peter makes sure that the team comes together a lot to socialize and stay in connection. They spend the money that they save by not having office, on travel.I also heard the CodeStream is going to be open-sourced. So, I want to know what motivates Peter to go along that path. Peter says, that, well quite frankly, this is what is popular right now. But also, open-sourcing gives them the ability to stay closer to their customers and the developer community. So, by open-sourcing their system, people get the opportunity to collaborate with them and learn from their software system. Another motivating factor is transparency. Peter says, as they are newcomers and a startup, businesses do not trust them yet. By open-sourcing people can see what the system looks like behind the scenes, what happens to the data that is shared, and how does the process really work. This helps them to earn the trust of their users. Another thing that interest me is how did Peter get funding for this idea?He says, that before this startup, getting funding was a soul-destroying activity. Because, when you are going to look for funding, 90% of the time, people will say know, Peter says. But Peter also explains that this does not say something about your startup or idea. Most of the time it says something about the portfolio of the investor. And a "no" mostly reflects that your type of company does not fit into that portfolio.But, Peter also tells me that by being part of the Y Combinator made a big difference. Looking for funding after having a YC badge, made this experience so much more enjoyable and looking for funding was much easier. I end this show by asking Peter for advice he would give to new founders. First of all, he says, that if you think about becoming a founder - just do it. It's the best thing in the world. Yes, when Peter talks I can clearly hear that he made the right choice and that he is very happy with his path.But, I also know many founders that are going through rough times, especially at the beginning, Times in which nobody seems to be interested in their product. Times that it's hard to come up with the right pivot of your systems. Times in which you doubt everything. So, what does Peter have to say to those people?Peter says, that he learned that most companies are initially having a hard time. They fail, and fail, and fail until at one point they succeed. Even companies like Airbnb were close to shutting down several times at the start. But, it's all about not giving up and working your way towards success. Peter says, if you haven't found product-market fit yet, then you have to do only two things: talk to customers and build product. Don't focus on marketing. Don't think about hiring.Talk to customers and build product.Yes, I agree. And we close the interviews here. I hope you enjoyed it.Cheers,McKayla
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format.
Looking at some cutting-edge technology that will add depth and production value to conference meetings, webinars and more.
Looking at some cutting-edge technology that will add depth and production value to conference meetings, webinars and more.
Looking at some cutting-edge technology that will add depth and production value to conference meetings, webinars and more. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format.
Kicking off Collaboration Week New York 2020 with the folks from #AVintheAm in a five hour livestream, now in an abridged, archived format. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
As China continues to fight the coronavirus, remote working is no longer an option but a necessity for many. Communication and collaboration platforms are essential to remote workers; Alibaba’s DingTalk, a.k.a. Dingding in the Chinese version, has seen a spike in demand in China.
Taking a look at what's come out of Zoomtopia 2019, and how AV technicians can get into the IT side of collaboration spaces. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Taking a look at what's come out of Zoomtopia 2019, and how AV technicians can get into the IT side of collaboration spaces.
Taking a look at what's come out of Zoomtopia 2019, and how AV technicians can get into the IT side of collaboration spaces.
What could become of purpose-built collaboration solutions, insights into future AV like 5G, and fostering the next generation of the AV workforce.
What could become of purpose-built collaboration solutions, insights into future AV like 5G, and fostering the next generation of the AV workforce.
What could become of purpose-built collaboration solutions, insights into future AV like 5G, and fostering the next generation of the AV workforce.
Discussing the latest in collaboration and communication software from Enterprise Connect 2019. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Discussing the latest in collaboration and communication software from Enterprise Connect 2019.
Discussing the latest in collaboration and communication software from Enterprise Connect 2019.
Logitech has a soft codec interface, the rise of huddle spaces in AV, and the pros and cons of hiring extra AV labor.
Logitech has a soft codec interface, the rise of huddle spaces in AV, and the pros and cons of hiring extra AV labor.
Logitech has a soft codec interface, the rise of huddle spaces in AV, and the pros and cons of hiring extra AV labor.
Unified communications and collaboration, how the new generation is impacting the IT and AV network, and how new laws could affect your next installation. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Unified communications and collaboration, how the new generation is impacting the IT and AV network, and how new laws could affect your next installation.
Unified communications and collaboration, how the new generation is impacting the IT and AV network, and how new laws could affect your next installation.
CONEXPO – CON/AGG Radio: Construction Technology Trends For Contractors
Technology is helping construction companies break down silos on the jobsite and improve labor-productivity growth. Kris Lengieza, director of business development for the Marketplace at Procore, joins CONEXPO-CON/AGG Radio to discuss why collaboration technology is important and the challenges with user adoption today. He also identifies the practical ways that a construction company can ensure the successful implementation of new software and the areas where it will provide immediate value.
In dieser Folge spreche ich über die Möglichkeiten, Collaboration Software als digitale Schnittstelle zwischen Unternehmenskommunikation und Social Media einzusetzen.
Given the way work gets done these days – in remote offices, by workers on the go, at global companies with employees scattered around the world – collaboration is more important than ever. Here's a look at where things stand, and what's coming next.
Todd Watson interviews Carol Galvin, Principle Segment Analyst with IBM Market Insights. She talks about the makeup of the global collaboration software market,opportunity spaces, LotusLive, doing more with less, increasingly empowered users, and more.
In the burgeoning software hub of Portland, OR, one company is breaking new ground today. Jive Software, a maker of “social business software” that helps employees communicate with each other and manage their work information, is releasing a new product called SBS 3.0. The software is targeted to businesses, and its goal is to let [...]Click here to play