tag:blogger.com,1999:blog-19716884367225323892024-03-28T20:30:02.583-07:00georgekurtzGeorge Kurtz – Chief Technology Officer & Executive Vice President McAfee, Former CEO of Foundstone. George Kurtz is an internationally recognized security expert, author, and entrepreneur, as well as a frequent speaker at many major industry conferences.George Kurtzhttp://www.blogger.com/profile/00232522960555162513noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-1971688436722532389.post-14008340935005015302012-09-06T08:48:00.001-07:002012-09-06T09:00:30.020-07:00FBI's Top Cyber Lawyer Steven Chabinsky Joins CrowdStrike as SVP of Legal Affairs and Chief Risk Officer<div style="text-align: justify;">
<style>
<!--
/* Font Definitions */
@font-face
{font-family:Arial;
panose-1:2 11 6 4 2 2 2 2 2 4;
mso-font-charset:0;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073711037 9 0 511 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:-536870145 1107305727 0 0 415 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin:0in;
margin-bottom:.0001pt;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Arial;
mso-fareast-font-family:Arial;
color:black;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:10.0pt;
mso-ansi-font-size:10.0pt;
mso-bidi-font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:35.4pt;
mso-footer-margin:35.4pt;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
--></style>
</div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;">I am delighted to announce that
Steven Chabinsky is joining the CrowdStrike team on September 10th, 2012. Steve most recently served in the
highest-ranking civilian (non-law enforcement officer) position in the FBI’s
Cyber Division. Steve will be assuming
the role of SVP of Legal Affairs and Chief Risk Officer (CRO) for
CrowdStrike. In this role, Steve will be
instrumental in addressing complex cyber security issues faced by our customers
as well as helping to manage privacy and risk matters for CrowdStrike. Steve is
leaving the FBI after a long and extremely distinguished career. He is excited to continue his vision for
changing the private sector’s cyber-security model to increasingly focus on
adversary deterrence, threat discovery, and threat mitigation. Steve will employ the same focus and passion at
CrowdStrike he has demonstrated repeatedly over a 17-year career at the FBI. Similar
to Shawn Henry, Steve is the second senior executive to join CrowdStrike after
a distinguished FBI service record.</span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><b>Pushing The Envelope</b></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;">For more than ten years, Steve
has helped shape and draft many of the most significant U.S. national cyber and
infrastructure protection strategies including the Homeland Security Act of
2002, the National Strategy to Secure Cyberspace of 2003 and, in 2008, National
Security Presidential Directive 54, which includes the Comprehensive National Cyber-security
Initiative (CNCI). As I have written in
prior blog posts, CrowdStrike is on a mission to fundamentally change the way
organizations think about security. We
are working night and day on some of the coolest technology I have personally
been involved in creating; however, technology alone is not going to solve all
of our collective security problems.
Pushing the envelope in “Offensive” security or “Active Defense” is the
next key step in our industry’s evolution.
What better person to help advance the full range of actions that can be
taken against cyber threat actors, without overstepping legal boundaries, than
the former top cyber attorney for the FBI?
In his new role, Steve will directly assist CrowdStrike’s Services and
Intelligence customers respond to the legal aspects of a breach and assist General
Counsels in evaluating all their legal options, including liaising with law
enforcement.</span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><b>Sharing Intelligence Is Key</b></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;">Steve is an expert on cyber law
and cyber intelligence and has testified numerous times in front of
Congress. He served as chief of the
FBI’s Cyber Intelligence Section where he organized and led the FBI’s analysis
and reporting on terrorism, foreign intelligence, and criminal matters with a
cyber threat nexus. In this capacity,
Steve also helped shape the public/private partnership of sharing critical
threat information by helping to develop InfraGard into a national
program. Today InfraGard is an
association of over 50,000 individuals across critical infrastructure sectors
in each of the 50 states who are dedicated to building trusted relationships
and sharing security information and intelligence, which is key in dealing with
targeted intrusions. Steve will play a
critical role for CrowdStrike in extending the successes he has achieved in the
government by helping to foster the trusted and actionable sharing of security
intelligence across targeted industry sectors.</span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><b>Privacy and Risk</b></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;">Steve will
oversee and manage CrowdStrike’s privacy and risk strategies as we evolve our
big data platform. In his new role,
Steve will report directly to me and advise the company on all cyber legal,
privacy, and reputational issues across the business from product development
to execution. Steve’s tremendous experience and knowledge while at the Bureau
in managing information sharing, compliance, and risk issues in a myriad of
cyber security areas makes him an ideal addition to our already stellar
team. Steve will also help navigate the
complex set of privacy laws that will allow CrowdStrike to offer the most
robust Intelligence and Consulting Services to our customers. This is really important to me because we are
currently assisting <span style="background: none repeat scroll 0% 0% rgb(254, 254, 254);">some of the world's largest organizations in
responding to sophisticated targeted intrusions that require a broad knowledge
of appropriate legal responses. </span></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><b>The Way Forward</b></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;">I believe in Steve’s vision and
strategy to help CrowdStrike and its customers better protect themselves. Our mission is too important to ignore the
legal complexities of cyber security law and the legal responses companies can
take to raise the financial, organizational, reputational, and legal costs to
the adversary. I feel as if we are in
the early days of a cyber revolution where companies can choose to stop taking
daily body blows from determined adversaries and take aggressive action to deter
and create a hostile environment for the enemy inside their own networks. While there are no silver bullets or miracle
“security programs” that can fix all of the challenges we face, legal “Offensive”
security is the right way forward to flip the inherent asymmetry in cyberspace,
which currently favors the attacker, into the defender’s favor.</span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;">Thanks again for all of your
continued support and encouragement!</span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;">George</span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="background: none repeat scroll 0% 0% rgb(254, 254, 254); font-size: large;">For daily
updates on our mission, you can follow me on Twitter</span><span style="font-size: large;"><a href="https://twitter.com/George_Kurtz"><span style="background: none repeat scroll 0% 0% rgb(254, 254, 254); color: black; text-decoration: none;"> </span></a><a href="https://twitter.com/George_Kurtz"><span style="background: none repeat scroll 0% 0% rgb(254, 254, 254); color: #1155cc;">@</span></a><a href="https://twitter.com/George_Kurtz"><span style="background: none repeat scroll 0% 0% rgb(254, 254, 254); color: #1155cc;">george</span></a><a href="https://twitter.com/George_Kurtz"><span style="background: none repeat scroll 0% 0% rgb(254, 254, 254); color: #1155cc;">_</span></a><a href="https://twitter.com/George_Kurtz"><span style="background: none repeat scroll 0% 0% rgb(254, 254, 254); color: #1155cc;">kurtz</span></a>, and you
can follow CrowdStrike via <span style="background: none repeat scroll 0% 0% rgb(254, 254, 254);">Twitter </span><a href="https://twitter.com/%23%21/crowdstrike"><span style="background: none repeat scroll 0% 0% rgb(254, 254, 254); color: #1155cc;">@</span></a><a href="https://twitter.com/%23%21/crowdstrike"><span style="background: none repeat scroll 0% 0% rgb(254, 254, 254); color: #1155cc;">crowdstrike</span></a>
.</span><br />
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br />We continue to seek out world-class programmers, designers, incident response consultants, malware researchers, and intelligence analysts who have strong skills and experience. If you think your experience matches up, please send your resume to </span>
<span style="font-size: large;"><a href="mailto:mission@crowdstrike.com">mission</a><a href="mailto:mission@crowdstrike.com">@</a><a href="mailto:mission@crowdstrike.com">crowdstrike</a><a href="mailto:mission@crowdstrike.com">.</a><a href="mailto:mission@crowdstrike.com">com</a>. </span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><b>Steve Chabinsky - Full Bio</b></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;">Prior to joining CrowdStrike,
Steven Chabinsky served as Deputy Assistant Director and as the highest-ranking
civilian (non-law enforcement officer) position in the FBI's Cyber
Division. In that capacity he helped
oversee all FBI investigative strategies, intelligence analysis, policy
development, and major outreach efforts that focused on protecting the United
States from cyber attack, cyber espionage, online child exploitation, and
Internet fraud. For over ten years, Mr.
Chabinsky helped shape and draft many of the most significant US national cyber
and infrastructure protection strategies, to include the Homeland Security Act
of 2002, the National Strategy to Secure Cyberspace of 2003 and, in 2008,
National Security Presidential Directive 54, which includes the Comprehensive
National Cybersecurity Initiative.
Between 2007 and 2009, Mr. Chabinsky served in the Office of the
Director of National Intelligence (ODNI) in various capacities, including
Acting Assistant Deputy Director of National Intelligence for Cyber, Chairman
of the National Cyber Study Group, and Director of the Joint Interagency Cyber
Task Force. In these roles, he led
national intelligence efforts to coordinate, monitor, and provide
recommendations to the President of the United States regarding implementation
of America’s cyber strategy. Prior to his ODNI tour, Mr. Chabinsky served as
chief of the FBI’s Cyber Intelligence Section where he organized and led the
FBI’s analysis and reporting on terrorism, foreign intelligence, and criminal
matters having a cyber threat nexus. </span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;">Mr. Chabinsky joined the FBI in
1995 as an attorney in the Office of the General Counsel where he initially
focused on employment law and personnel litigation. In 1998, Mr. Chabinsky was selected as the
Principal Legal Advisor to the multi-agency National Infrastructure Protection
Center (NIPC) and became Senior Counsel to the FBI's Cyber Division upon its
creation in 2002, during which time he rose in prominence as one of the
nation's foremost authorities in the complex areas of cyber law, surveillance
law, information sharing, and privacy.
Mr. Chabinsky played a prominent role in the national expansion of
InfraGard, a critical infrastructure partnership between the private sector,
academia, and government agencies. Mr.
Chabinsky helped develop InfraGard from an organization with roughly two
hundred unvetted members located in three cities into its current size of over
50,000 vetted members meeting in over 85 cities. Between 2002 and 2003, Mr. Chabinsky also
served in the White House Transition Planning Office for the creation of the
Department of Homeland Security, overseeing all legal issues associated with
standing up DHS' Information Analysis and Infrastructure Protection
Directorate. </span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;">Prior to joining the FBI, Mr.
Chabinsky worked as an associate attorney in the law firm of Simpson Thacher
& Bartlett in New York City practicing complex litigation including
insurance and reinsurance contract disputes, class action product liability,
and internal investigations. Mr.
Chabinsky clerked for the Honorable Judge Dennis G. Jacobs (now Chief Judge) of
the United States Court of Appeals for the Second Circuit and holds his
undergraduate and law degrees, both with honors, from Duke University. He has testified before the House and Senate,
and is a frequent keynote speaker and guest lecturer. His ideas have been featured in print news
media, he has appeared on radio and television, and he is the author of the
article "Cybersecurity Strategy: A
Primer for Policy Makers and Those on the Front Line," published in the
peer-reviewed Journal of National Security Law and Policy. He is the recipient of numerous awards and
recognitions, including the National Security Agency's bronze medallion for
inspired leadership, the ODNI's bronze medallion for Collection, and the Rank
Award of Meritorious Executive conferred by the President of the United States
for unwavering leadership and sustained extraordinary performance. In August 2012, Mr. Chabinsky was selected as
one of Security magazine's "Most Influential People in Security."</span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span style="font-size: large;"><br /></span></div>
George Kurtzhttp://www.blogger.com/profile/00232522960555162513noreply@blogger.com186tag:blogger.com,1999:blog-1971688436722532389.post-26766198245797463642012-08-16T06:54:00.000-07:002012-08-16T07:23:08.555-07:00Hacking Exposed 7: Changing the Game<div style="text-align: justify;">
<b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Summer time in the internet security community tends to be hot and busy, and this summer has been no exception for many of us! It was great to see many of you at Black Hat in Las Vegas recently as my new company CrowdStrike continues to attract worldwide interest and is blossoming daily. We really appreciate everyone’s support and interest in our mission. However, this blog is not about CrowdStrike, it is about continuing the tradition of helping to educate and connect with the security community. It is with great pleasure that I announce the release of the seventh edition of </span><a href="http://www.amazon.com/gp/product/0071780289/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=0071780289&linkCode=as2&tag=hackiexpos06-20" target="_blank"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">Hacking Exposed: Network Security Secrets & Solutions</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">.</span></a><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></b><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span></b></div>
<div style="text-align: justify;">
<b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">A lot has changed since the first edition of the Hacking Exposed series was written in 1999. Besides having a little bit more hair than I have today, it was a time before the term targeted attacks even existed. Persistence was a novelty, and a virus wrecked your computer rather than sucking out billions of dollars of intellectual property from your company. The attacks were numerous and varied, and there was a much smaller pool of attackers coming at your digital defenses. It was before Metasploit even existed, and </span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">netca</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">t</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> and Back Orifice were the best Remote Access Tools (RATs) around. Fast forward 12 years and we live in the age of the constant cyber adversary. If you step back and really analyze the current environment, the adversary’s tools and techniques have not really evolved all that much. </span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Netcat</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">, </span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">once the Swiss army knife of the skilled pen tester, has been replaced with Poison Ivy. Pass the hash is now automated, and lateral movement within a network looks like a carbon copy of <i>Chapter 4 </i></span></b><b id="internal-source-marker_0.29188641626387835" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">–</span></b><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><i> Hacking Windows</i>.</span></b><b id="internal-source-marker_0.29188641626387835" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></b></div>
<div style="text-align: justify;">
<br />
<b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">So as the seventh edition of Hacking Exposed hits the shelves this summer, our new daily reality is that targeted attackers are attempting to rain on your picnic at the beach by attempting to kick digital sand in your face. Hacking Exposed was designed to provide that extra confidence builder that every good guy needs to help understand how to fight the cyber bully attempting to plant a flag on your digital beachfront. The increase in stories over the last three years alone about the wholesale loss of intellectual property is startling. As our own Shawn Henry, President of CrowdStrike Services says </span></b><b id="internal-source-marker_0.29188641626387835" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">–</span></b><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> “It is time to stop taking punches, and let's change the game. It’s time for a major shift in the way we secure our networks, and Hacking Exposed 7 can help you return the pain to your cyber adversary.” More than ever there seems to be a growing and unified agreement in the security community that today’s information security teams absolutely must have an inside track on the ways to beat the adversary and change the game.</span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">So What’s New In the 7th edition?</span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We spent many late nights making sure the series is armed with the latest cutting edge information. We updated each chapter to get rid of the old and focus on the new. Some of the new items include:</span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></b></div>
<ul style="margin-bottom: 0pt; margin-top: 0pt;">
<li style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Addressing Targeted Attacks</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span></b><b id="internal-source-marker_0.29188641626387835" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">–</span></b><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> also known in some circles as Advanced Persistent Threats (APT).</span></b></li>
<li style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Embedded Hacking</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span></b><b id="internal-source-marker_0.29188641626387835" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">–</span></b><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> a topic near and dear to my heart. This section includes techniques used to strip circuit boards of all its chips and reverse engineer them.</span></b></li>
<li style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Database Hacking</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span></b><b id="internal-source-marker_0.29188641626387835" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">–</span></b><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> We added an entire section on hacking and protecting your most precious commodity </span></b><b id="internal-source-marker_0.29188641626387835" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">–</span></b><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> data. Hey, it is all about the data, right?</span></b></li>
<li style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Mobile Hacking</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span></b><b id="internal-source-marker_0.29188641626387835" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">–</span></b><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> We dedicated an entire chapter to mobile hacking, which couldn’t be more timely in today’s ever connected society.</span></b></li>
</ul>
<b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Lastly, we have created a new website to help accompany the latest release of the book:</span><a href="http://www.hackingexposed7.com/" target="_blank"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">www.hackingexposed7.com</span></a><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. Along with the new website, we have geared up our CrowdStrike team to provide quarterly webinars with exciting topics that are relevant to the community of security professionals we serve. </span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The first <a href="http://www.hackingexposed7.com/p/webcasts.html" target="_blank">webinar</a> hosted by CrowdStrike will be on Wednesday, September 12th from 11am PT/ 2pm ET and will be a one hour format titled </span></b><span style="color: black; font-family: Times; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span><span style="color: black; font-family: Times; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span><u><span style="color: black; font-family: Times; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; vertical-align: baseline; white-space: pre-wrap;">Hacking Exposed: Mobile Targeted Threats</span></span><b><span style="color: black; font-family: Times; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; vertical-align: baseline; white-space: pre-wrap;"></span></span></b></u><b><u><span style="color: black; font-family: Times; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;"> </span></span><span style="color: black; font-family: Times; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-variant: normal; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;">The Next Wave of Attack</span></span></u><span style="color: black; font-family: Times; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span><span style="color: black; font-family: Times; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span><span style="color: black; font-family: Times; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span><span style="color: black; font-family: Times; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span></span></b><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. </span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">This session will focus on mobile threats that have been observed in the wild and the next wave of threat actors. It will conclude with a demo of a seamless targeted attack against an Android ICS device. I hope you can join Georg Wicherski and myself for this informative webinar. Georg is one of THE top mobile security researchers in our space. You may be familiar with his work if you attended <a href="https://www.blackhat.com/usa/bh-us-12-briefings.html#Miller" target="_blank">Charlie Miller's recent Black Hat </a>talk.</span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">I am looking forward to continuing both doing Hacking Exposed Live seminars and giving live Webcasts that focus on timely and relevant information. I will leave you with a quote from a good friend of mine, Patrick Heim, CISO of Salesforce.com </span></b><b id="internal-source-marker_0.29188641626387835" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">–</span></b><b id="internal-source-marker_0.9714818908832967" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: Times; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> “I once heard an avid video gamer say, ‘If you are not moving, you’re dead!’ Use this book to move your security game and stay alive.” That exact sentiment conveys the pride I feel being involved with the Hacking Exposed series and giving back to the community so that you can “change your game” and live to fight another day!</span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">A big thanks to all the contributing authors who helped make this the best Hacking Exposed yet!</span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">For daily updates, you can follow me on Twitter <a href="https://twitter.com/George_Kurtz" target="_blank">@george_kurtz</a>.</span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"></span><br /><span style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">To join our Hacking Exposed 7 mailing list and receive updates on the latest webinars, please sign up directly at <a href="http://www.hackingexposed7.com/" target="_blank">www.hackingexposed7.com</a> website.</span></b>George Kurtzhttp://www.blogger.com/profile/00232522960555162513noreply@blogger.com21tag:blogger.com,1999:blog-1971688436722532389.post-4390470896085340682012-05-07T11:05:00.000-07:002012-05-07T11:05:00.621-07:00Two Stellar New Board Members - One Common Mission<style>
<!--
/* Font Definitions */
@font-face
{font-family:Arial;
panose-1:2 11 6 4 2 2 2 2 2 4;
mso-font-charset:0;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073711037 9 0 511 0;}
@font-face
{font-family:Arial;
panose-1:2 11 6 4 2 2 2 2 2 4;
mso-font-charset:0;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:-536859905 -1073711037 9 0 511 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin:0in;
margin-bottom:.0001pt;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Arial;
mso-fareast-font-family:Arial;
color:black;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:10.0pt;
mso-ansi-font-size:10.0pt;
mso-bidi-font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.25in 1.0in 1.25in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
-->
</style>
<br />
<div align="center" class="MsoNormal" style="line-height: normal; text-align: center;">
<b><span style="font-size: 12pt;">Gerhard Watzinger and Denis O’Leary Join the
CrowdStrike Board of Directors</span></b></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif; text-align: justify;">
<span style="font-size: small;">One of the things that I have learned during my time working for large and small companies is the need
to have the right leadership at all levels of your operation. I have seen first hand the value a powerful
Board of Directors (BOD) can bring to an organization and the long-term impact
on shareholder value they can have.
Today, I am delighted to announce that <a href="http://www.linkedin.com/pub/gerhard-watzinger/2/705/4b"><span style="color: #1155cc;">Gerhard</span></a><a href="http://www.linkedin.com/pub/gerhard-watzinger/2/705/4b"><span style="color: #1155cc;"> </span></a><a href="http://www.linkedin.com/pub/gerhard-watzinger/2/705/4b"><span style="color: #1155cc;">Watzinger</span></a>
and <a href="http://www.linkedin.com/profile/view?id=810041&locale=en_US&trk=tyah"><span style="color: #1155cc;">Denis</span></a><a href="http://www.linkedin.com/profile/view?id=810041&locale=en_US&trk=tyah"><span style="color: #1155cc;"> </span></a><a href="http://www.linkedin.com/profile/view?id=810041&locale=en_US&trk=tyah"><span style="color: #1155cc;">O</span></a><a href="http://www.linkedin.com/profile/view?id=810041&locale=en_US&trk=tyah"><span style="color: #1155cc;">’</span></a><a href="http://www.linkedin.com/profile/view?id=810041&locale=en_US&trk=tyah"><span style="color: #1155cc;">Leary</span></a> have joined the BOD of CrowdStrike, in
addition to our main investor <a href="http://www.linkedin.com/pub/patrick-severson/0/5b/b61"><span style="color: #1155cc;">Patrick</span></a><a href="http://www.linkedin.com/pub/patrick-severson/0/5b/b61"><span style="color: #1155cc;"> </span></a><a href="http://www.linkedin.com/pub/patrick-severson/0/5b/b61"><span style="color: #1155cc;">Severson</span></a> from Warburg Pincus. Gerhard will be assuming the role of
non-executive Chairman of the Board.</span></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif; text-align: justify;">
<span style="font-size: small;">From October 2007 - March of
2012, Gerhard Watzinger served as the Chief Strategy Officer and Executive Vice
President at McAfee, where he was responsible for guiding McAfee's global
business strategy and development.
Gerhard helped accelerate the international expansion of McAfee and
directed the company through numerous successful mergers and acquisitions,
which resulted in record revenue growth and increased market share. His most notable accomplishment was directly
architecting the sale of McAfee to Intel for almost 8 billion dollars, which is
one of the largest technology deals in the history of IT. Gerhard and I arrived on similar paths, and
joined McAfee via acquisition. Gerhard
was the CEO of SafeBoot, a leading enterprise security software vendor for data
encryption and user authentication, which was acquired in 2007 right before
they were about to go public. I can’t
tell you how excited I am to be collaborating with Gerhard again. He has vast
experience in helping to build, run, and scale large and small companies. Given his extensive international background,
he has the most global experience of any executive I have had the privilege of
working with in my career. I know he is
superbly suited and equally excited to provide the necessary strategic guidance
on the roadmap and evolution of CrowdStrike via a combination of organic and
inorganic growth models. Gerhard is one
of the rare gems in the business world that possesses a combination of ruthless
tactical execution and visionary strategic planning skills. Frankly, he was one of the main reasons
McAfee was so successful over the past few years. </span></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif; line-height: normal; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif; line-height: normal; text-align: justify;">
<span style="font-size: small;">Denis O’Leary,
is presently managing partner of Encore Financial Partners, Inc., a firm
focused on the acquisition and management of U.S. based banks. Previously he spent twenty five years at J.P.
Morgan Chase & Co, and served as the Chief Information Officer (CIO),
Director of Finance, Head of Retail Branch Banking, and Managing Executive of
Lab Morgan (a unit focused on strategic equity investing in technology),
becoming a member of the company’s nine - person executive committee when it
was established in 1997. Prior to the
acquisition by Intel, Denis most recently served on the Board of Directors of
McAfee where I had the privilege to work with him. As an experienced CIO who was in charge of
running one of the largest IT shops on the planet, his experience is
invaluable in helping guide us on delivering technology and services that meet
the needs of the most demanding enterprises.
Moreover, his experience as a public company board member at both
Fiserve and McAfee will aid in growing the company both domestically and
internationally. Most startups at this
stage of our life cycle don’t have the opportunity to attract individuals who
serve on public company boards, but when I approached Denis about our vision,
he immediately saw the opportunity to build a transformational security company.</span></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif; line-height: normal; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif; line-height: normal; text-align: justify;">
<span style="font-size: small;">The addition of these two individuals to our team
provides CrowdStrike with amazing depth in the boardroom. Gerhard and Denis
have stellar credentials; however, what is most impressive is that they each
share a common vision, mission, and purpose for CrowdStrike. Each of these leaders bear time tested battle
scars that will help us adjust and sharpen our roadmap to address today’s
security challenges. Like me, they too
share a common vision for creating a company focused on bucking the status quo. More importantly, they are the “A team” that will
continue to help us attract “A players” from around the globe. Things just got a little more interesting... </span></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif; line-height: normal; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif; line-height: normal; text-align: justify;">
<span style="font-size: small;">I also want to thank everyone who has reached out to
us and inquired about joining CrowdStrike; it has been truly humbling and awe
inspiring. We continue to seek out world-class
programmers, designers, incident response consultants, malware researchers, and
intelligence analysts who have strong skills and experience. If you think your experience matches up,
please send your resume to <a href="mailto:mission@crowdstrike.com"><span style="color: #1155cc;">mission</span></a><a href="mailto:mission@crowdstrike.com"><span style="color: #1155cc;">@</span></a><a href="mailto:mission@crowdstrike.com"><span style="color: #1155cc;">crowdstrike</span></a><a href="mailto:mission@crowdstrike.com"><span style="color: #1155cc;">.</span></a><a href="mailto:mission@crowdstrike.com"><span style="color: #1155cc;">com</span></a>. Keep up the
good fight!</span></div>George Kurtzhttp://www.blogger.com/profile/00232522960555162513noreply@blogger.com1tag:blogger.com,1999:blog-1971688436722532389.post-80244045382413722602012-04-17T21:33:00.000-07:002012-04-17T21:33:17.436-07:00CrowdStrike launches CrowdStrike Services, Former FBI Top Cyber Cop Shawn Henry joins as CrowdStrike Services President<div style="font-family: Arial,Helvetica,sans-serif;">
<b id="internal-source-marker_0.12897419929504395" style="color: black; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"></b></div>
<div style="font-family: Arial,Helvetica,sans-serif; text-align: justify;">
<b id="internal-source-marker_0.12897419929504395" style="color: black; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">In my previous</span><a href="http://www.georgekurtz.com/2012/02/crowdstrike-launches-in-stealth-mode.html"><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: transparent; color: #1155cc; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">post</span></a><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> I announced the launch of CrowdStrike - my new security company. Utilizing Big-Data technologies we are focused on helping enterprises and governments protect their most sensitive intellectual property from targeted intrusions. Today I am proud and honored to announce that Shawn Henry has joined CrowdStrike as the President of our newly formed professional services subsidiary – CrowdStrike Services, Inc. Shawn was the Executive Assistant Director of the Criminal, Cyber, Response, and Service Branch of the FBI. Shawn recently retired at the end of March of this year and he decided to start a new chapter in his already honorable service career. While at the FBI, he was responsible for all criminal and cyber investigations worldwide, as well as international operations, and critical incident response. Because of Shawn's work, and for his leadership position in enhancing the FBI’s cyber capabilities, he received the Presidential Rank Award for Meritorious Executive in 2009. While Shawn has spent his whole adult life with the FBI, in the last two years in particular, he has seen an incredible increase in persistence and determination from nation state actors attempting to steal intellectual property from many of our largest corporations and government institutions. </span></div>
</b></div>
<div style="text-align: justify;">
<b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
</b><br /><b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: left;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">When Shawn announced his retirement and his move into the private sector, there was wide speculation about where he would land because of his long-term service with the bureau and his continued day-to-day mission in chasing down and apprehending the adversary. Shawn had many compelling offers and a wide array of noble positions to consider upon retirement from the bureau. CrowdStrike is honored to have him on our team and we know that Shawn is solidly behind our important mission. We have spent months looking for the right person to run our services organization, and bar none he is the absolute best candidate because of his leadership, integrity, and passion.</span></div>
</b></div>
<div style="text-align: justify;">
<br /><b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Shawn has seen first hand the devastation from a multitude of adversaries across many sectors and knows what needs to be done. Like Shawn, I know there are too many national policy issues to solve and that in many cases the “free market” can address the complex adversary problem far better than the government alone. Collectively we share the same view that industry can’t rely on the government alone to address the problem of targeted intrusions. At CrowdStrike we do not mince our words about our abilities to use our advanced intelligence technology to bring the fight to the front door of the adversary, increase their cost of operations, and assist our customers in responding to and mitigating targeted attacks and intrusions. As the adversary adjusts and realigns their tactics on a daily basis, we also strive to stay a step ahead of them. We are relentlessly focused on addressing the threat and continually update our playbook to enhance not only our own strategy but to also enhance the existing capabilities that are currently in play with our collective customers. </span></div>
</b></div>
<div style="text-align: justify;">
<br /><b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The formal creation of the Services arm now sets in stone the last gem of our “Triple Crown” and lays the foundation to further assist our customers with our complete offering. Our </span><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Services </span><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">division, lead by Shawn, will be staffed with security practitioners that come with an unmatched pedigree of experience in information security and professional services delivery know-how. Our </span><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Intelligence</span><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> team led by Adam Meyers will be the glue that binds our Services and </span><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Technology</span><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> offerings led by Dmitri Alperovitch, Founder and CTO. Our offerings will provide an unparalleled strategic intelligence advantage over the adversary and will enable our customers to eventually encompass high-order attribution characteristics that easily rival the best collective intelligence agencies of the 21st century.</span></div>
<span style="background-color: transparent; color: black; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span></b></div>
<b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<div style="text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Thus, while we currently have our team focused on creating cutting edge technology to address the problem, we must build out a world-class services organization to immediately focus our professionals in helping organizations respond to the incidents that are bludgeoning them on a daily basis while providing the base compound to our intellectual “glue”. Our initial service offerings are focused on the following:</span></div>
<div style="text-align: justify;">
<br /></div>
</div>
</b><b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
</b><b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><ul style="margin-bottom: 0pt; margin-top: 0pt;">
<li style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Enterprise Adversary & Malware Assessment</span></div>
</li>
<ul style="margin-bottom: 0pt; margin-top: 0pt;">
<li style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: circle; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Identify unknown compromised systems and data exfiltration channels, determine attribution and motivation of the intruders, along with providing cyber counterintelligence strategies to respond to future intrusions</span></div>
</li>
</ul>
<li style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Incident Response Services</span></div>
</li>
<ul style="margin-bottom: 0pt; margin-top: 0pt;">
<li style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: circle; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">On demand based retainer service designed to empower enterprises with experienced and professional tactical response teams </span></div>
</li>
</ul>
<li style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Response and Recovery</span></div>
</li>
<ul style="margin-bottom: 0pt; margin-top: 0pt;">
<li style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: circle; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Triage based service designed for enterprises to contain and recover from specific malware incidents or targeted intrusions</span></div>
</li>
</ul>
<li style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Malware Researcher/Staff Augmentation</span></div>
</li>
<ul style="margin-bottom: 0pt; margin-top: 0pt;">
<li style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: circle; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Augment and assist your existing team with advanced capabilities in targeted attacks, malware research, and reverse engineering</span></div>
</li>
</ul>
<li style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: disc; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Computer Incident Response Team Augmentation (CIRTA)</span></div>
</li>
<ul style="margin-bottom: 0pt; margin-top: 0pt;">
<li style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; list-style-type: circle; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Supplement your response team with computer forensics examination, malware analysis, incident management, and litigation support capabilities</span></div>
</li>
</ul>
</ul>
</b><div style="text-align: left;">
<b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span style="background-color: transparent; color: black; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span></b></div>
<div style="text-align: justify;">
<b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">We are already engaged performing services for some of the world's largest companies and helping their teams respond to sophisticated targeted intrusions. What truly differentiates us from others is our ability to identify the adversary, their motivation, and their various tactics, techniques, and procedures. While the malware they use may change, their tradecraft is remarkably static. </span></div>
</b></div>
<div style="text-align: justify;">
<br /><b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Our goal is to build a team where we can instill confidence in our customers and provide leading edge analysis. CrowdStrike Services is staffed with security practitioners with broad years of experience in information security and professional services delivery. Currently, we are in the process of hiring additional consultants that have deep technical experience with computer malware threats, reverse engineering, and forensic investigation of networks in various areas like the financial, government, military, telecommunications, and industrial sectors. Shawn will be responsible for growing our services division into a global powerhouse with a laser focus on response, incident management, and incident prevention. Similar to what I created and built with our services organization at Foundstone, our goal is to be the absolute best in the industry, and we will be relentless in our execution of this goal. If you are interested in joining CrowdStrike Services and working with an exemplary team, please submit your resume to </span><span style="background-color: transparent; color: #1155cc; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">mission@crowdstrike.com</span><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. If your organization has the need for incident response and forensic services and you are tired of dealing with the attitude of the “old-guard,” please email us at </span><span style="background-color: transparent; color: #1155cc; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">services@crowdstrike.com</span><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">. We will get back to you immediately. </span><br />
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">To hear from Shawn directly please click <a href="http://blog.crowdstrike.com/">here</a> to visit his blog post and video. </span></div>
<div style="text-align: justify;">
<br /></div>
</div>
</b><div style="text-align: justify;">
<b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><div dir="ltr" style="margin-bottom: 0pt; margin-top: 0pt; text-align: justify;">
<span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Thanks again to all of you for all your support and encouragement that has poured in since our announcement in February, we truly appreciate it. If you would like to keep up with the latest news on</span><a href="http://www.crowdstrike.com/"><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span><span style="background-color: transparent; color: #1155cc; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">CrowdStrike</span></a><span style="background-color: transparent; color: black; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> please follow us on Twitter <a href="https://twitter.com/#%21/crowdstrike">@crowdstrike.</a></span></div>
</b></div>
</div>
<div style="text-align: justify;">
<b id="internal-source-marker_0.12897419929504395" style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="background-color: transparent; color: black; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span></b></div>
<div style="font-family: Arial,Helvetica,sans-serif;">
</div>George Kurtzhttp://www.blogger.com/profile/00232522960555162513noreply@blogger.com4tag:blogger.com,1999:blog-1971688436722532389.post-69768578519183979842012-02-22T15:44:00.000-08:002012-02-22T18:42:17.186-08:00CrowdStrike launches in stealth-mode with $26 million Series A round led by Warburg Pincus<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
As I mentioned in a previous post, I was delighted to announce that I had joined <a href="http://www.warburgpincus.com/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Warburg Pincus</a>,
a leading global private equity firm focused on growth investing, as an
Executive in Residence. So far my time as an EIR at Warburg has been
fantastic. The past few months have exposed me to many new companies and
technologies that really got my creative juices flowing and pushed me
to get back into the start-up game with Warburg Pincus as my partner.</div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
Today, I am proud to announce the stealth-mode launch of my newest venture that I co-founded with <a href="http://www.crunchbase.com/person/dmitri-alperovitch" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Dmitri Alperovitch</a> (CTO) and <a href="http://www.crowdstrike.com/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Gregg Marston</a> (CFO)
– CrowdStrike. CrowdStrike is a security technology company focused on
helping enterprises and governments protect their most sensitive
intellectual property and national security information. Utilizing
Big-Data technologies, CrowdStrike is developing a new and innovative
approach to solving today’s most demanding cyber-security challenges.
CrowdStrike’s core mission is to fundamentally change how organizations
implement and manage security in their environment.</div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
<b style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Why CrowdStrike:</b></div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
The seemingly daily barrage of disclosures about companies that have had
their crown jewels stolen in recent years reinforced a key principle
for us – <b style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><i style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">these companies don’t have a malware problem, they have an adversary problem</i>.</b> Many
just don’t know it. Today’s attacks are sophisticated, targeted, and
long ranging in scope. Unfortunately, almost every security solution
focuses on the tens of thousands of pieces of malware, exploits, and
vulnerabilities that are seen in the wild every day. Yet, those are just
the interchangeable and, in many cases, disposable tools that the
adversaries use to achieve their ultimate objective – theft of
intellectual property, trade secrets, and other business proprietary
information.</div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
As many of you know the security industry is building “Maginot-line”
style of defenses – attempting to prevent all adversaries from getting
inside the perimeter of the network or host system. More importantly, a
well-financed, trained, and highly determined attacker will always get
in. More than likely, they are already in. There is no silver bullet
that will stop a determined adversary, so while the security industry
attempts to build bigger fences, the enemy is bringing higher ladders to
the fight. Moreover, the industry continues to focus on the malware or
exploits which is akin to focusing on the gun as opposed to the shooter
committing the crime. The person or organization pulling the trigger (or
deploying the malware) is the one that you ultimately need to focus on.
The type of gun or ammunition they may be using is interesting, but in
most cases not strategically relevant.</div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
Based upon investigations we have led, such as <a href="http://en.wikipedia.org/wiki/Operation_Aurora" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Operation Aurora</a>, <a href="http://www.reuters.com/article/2011/02/10/us-energy-cyber-china-idUSTRE7190XP20110210" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Night Dragon</a>, and <a href="http://www.vanityfair.com/culture/features/2011/09/operation-shady-rat-201109" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Shady RAT</a>,
and knowing the limitations of existing technologies, we are horrified
at the amount of IP being stolen and financial damage inflicted every
day. It is evident that we are dealing with economic predators who are
systematically destroying value in countries around the world. Even
worse, we may very well see the enemy engage in destructive and
disruptive attacks designed to take down critical infrastructure or
modify key processes and data in a covert undetectable fashion.</div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
<b style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">The Missing Link: Attribution & Raising the Costs to the Adversary</b></div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
Attribution is the key strategic piece missing from all existing
security technologies – providing the answer to the “who?” vs. the
“what?” Knowing who is after your IP is critical in determining what
assets you want to protect and how. Protecting everything is impossible –
you may as well be protecting nothing. However, knowing the enemy is
the first step in the process of determining the priority of allocation
of scarce resources to defend the key assets and tailoring your response
to the Tactics, Techniques and Procedures (TTPs) of the adversary.
Knowing their capabilities, objectives, and the way they go about
executing on them is the missing piece of the puzzle in today’s
defensive security technologies. The key to success is raising
adversary’s costs to exceed the value of the data they may be trying to
exfiltrate and the only way to accomplish that is by forcing them to
change the way they conduct the human-led parts of their intrusions,
such as reconnaissance, lateral movement, identification of valuable
assets, and exfiltration. Other parts of the operation, such as
vulnerability weaponization, malware delivery, and command and control
can be mass-produced and changed at will with little cost. However,
attackers are creatures of habit and while they are fast to change their
weapons, they are slow to change their methods. <b style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">By
identifying the adversary and revealing their unique TTPs (i.e. modus
operandi), we can hit them where it counts – at the human-dependent and
not easily scalable parts of their operations.</b></div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
<b style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">The CrowdStrike Mission:</b></div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
As the President and CEO of CrowdStrike, one of the most exciting
aspects of this new venture for me is assembling a “dream team” of
security visionaries to address this important mission and challenge.
Our team is comprised of people who are “big thinkers” that have the
technical prowess to execute and carry out our mission goals without the
encumbrances that face legacy security solutions. Our team of
visionaries are the rebels who believe the current state of security is
fundamentally broken and want to do something about it. More
importantly, these are the patriots who are tired of seeing our
intellectual property and competitive advantage wiped away under the
thinly veiled cover of an Internet address. The recent stories
surrounding Nortel provide a shinning example of how the adversaries can
embed themselves into a multi-national organization for the better part
of a decade without detection while systematically accessing their most
coveted intellectual property. If we sit back idly and do nothing about
these types of attacks, we certainly face a crisis of epic proportions
and economic consequences that we have yet to fully comprehend.
CrowdStrike does not accept the status quo, and we intend to do
something about it. If you share our passion and vision about this
crisis, and believe you have what it takes to join our fight then please
send an email to <a href="mailto:mission@crowdstrike.com" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">mission@crowdstrike.com</a>.
We are looking for kick ass coders, consultants, and experts who like
us have been fighting and responding to nation-state targeted
intrusions.</div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
I will leave you with one final thought. The ancient Chinese military
strategist Sun Tzu in his teachings emphasized the need to “know your
enemy”. For if “you know your enemy and know yourself,” he wrote, “you
need not fear the result of a hundred battles.” Isn’t it time we apply
these simple time honored lessons in the cyber security battlefield of
the twenty-first century?</div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
If you would like to keep up with the latest news on <a href="http://www.crowdstrike.com/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">CrowdStrike</a> please follow us on Twitter <a href="http://twitter.com/CrowdStrike" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">@CrowdStrike</a>.</div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
<b style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">If you are attending the RSA conference next week, you can look for us at the following events we are speaking at:</b></div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
<i style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Monday February 27: America’s Growth Capital 8th Annual Information Security Conference</i></div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
10:15-11:00 am <a href="http://www.americasgc.com/news-events/index.asp?id=41" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Mobile Security The Changing Threat and Remediation Landscape (panel with George Kurtz)</a></div>
<div>
3:30-4:15 pm <a href="http://www.americasgc.com/news-events/index.asp?id=41" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Combating State-Sponsored Adversaries (panel with Dmitri Alperovitch)</a></div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<div>
<i style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Wednesday February 29: RSA Conference</i></div>
</div>
<div style="border-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin: 0px 0px 1.625em; outline-width: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<div style="text-align: justify;">
8:00-9:10 am <a href="http://365.rsaconference.com/community/connect/blog/2012/01/31/rsac2012-podcast-exp-201-cyber-battlefield-the-future-of-conflict" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Cyber Battlefield: The Future of Conflict</a></div>
<div style="text-align: justify;">
10:40-11:30 am <a href="http://365.rsaconference.com/community/connect/blog/2012/02/21/rsac2012-podcast-hot-203-hacking-exposed-mobile-rat-edition" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Hacking Exposed: Mobile RAT Edition</a></div>
</div>George Kurtzhttp://www.blogger.com/profile/00232522960555162513noreply@blogger.com13tag:blogger.com,1999:blog-1971688436722532389.post-11373748326998532442011-12-27T08:07:00.000-08:002011-12-27T08:45:50.657-08:002012 – It Isn’t Going to Get Any Better<style>
<!--
/* Font Definitions */
@font-face
{font-family:"MS 明朝";
panose-1:0 0 0 0 0 0 0 0 0 0;
mso-font-charset:128;
mso-generic-font-family:roman;
mso-font-format:other;
mso-font-pitch:fixed;
mso-font-signature:1 134676480 16 0 131072 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:-536870145 1107305727 0 0 415 0;}
@font-face
{font-family:Cambria;
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:-536870145 1073743103 0 0 415 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-unhide:no;
mso-style-qformat:yes;
mso-style-parent:"";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:Cambria;
mso-ascii-font-family:Cambria;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"MS 明朝";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Cambria;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:JA;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
mso-themecolor:hyperlink;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-noshow:yes;
mso-style-priority:99;
color:purple;
mso-themecolor:followedhyperlink;
text-decoration:underline;
text-underline:single;}
.MsoChpDefault
{mso-style-type:export-only;
mso-default-props:yes;
font-size:10.0pt;
mso-ansi-font-size:10.0pt;
mso-bidi-font-size:10.0pt;
font-family:Cambria;
mso-ascii-font-family:Cambria;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"MS 明朝";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Cambria;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:JA;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.25in 1.0in 1.25in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.WordSection1
{page:WordSection1;}
-->
</style><br />
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
At this time of year, I am always thinking about the many
events that have transpired both politically as well as in the field of
security. I will spare you my political
views, but I will provide some thoughts on 2011 from a security
perspective. As I have said before, it
really was the year of the hack. Notable
breaches include Sony, RSA, Epsilon, and dozens of others. These breaches really put a punctuation mark
on how vulnerable we are to any sort of competent adversary. Some
breaches transpired over many years and weren't all that sophisticated; however,
the RSA breach gave new meaning to the word “persistent.” What was particularly interesting were
adversaries targeting the security supply chain in order to break into their
ultimate targets - <a href="http://www.informationweek.com/news/government/security/229700151" target="_blank">Lockheed Martin and other companies</a> / governments that use
RSA authentication. While 2011 was a security disaster, what
does 2012 hold? I don’t have a crystal
ball, but I will give you a few of my predictions:</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>#5. Proposed
cyber-legislation will take one step forward and two steps back </b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
I do think that we will make some progress on more
<a href="http://www.reuters.com/article/2011/11/17/us-congress-cybersecurity-idUSTRE7AG2E220111117" target="_blank">comprehensive cyber-legislation</a> to help fight fraud, espionage, and
intellectual property theft. While taking one step forward, we will also
be saddled with awful legislative efforts like H.R. 3261 better known as the Stop
On-line Piracy act (SOPA) which will have us taking two steps back. Tackling these hard issues and creating a
modern cyber framework is not an easy task; however, one would hope our elected
officials could put some focus on something as critical as cyber-security. Hopefully some of the more well informed
politicians will realize this is a layer 8 problem (people) and not solely a
technology issue.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>#4. Mobile malware
goes mainstream but the world doesn’t end</b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
I know this is a softball prediction; however, I would be
remiss not to include it. We have seen
a massive jump in mobile malware from a percentage perspective; however, the
overall total is insignificant compared to traditional PC based malware. In particular, it was a busy year for Android
with a host of malware released into multiple app stores. While not malware, I particularly enjoyed the
details on getting a <a href="http://viaforensics.com/security/nopermission-android-app-remote-shell.html" target="_blank">root shell on an Android device</a> just by using it the way
it was designed.
Even though iOS has a pretty darn good security model, I still think we will
see some headlines next year. In
particular, I am surprised the self updating mechanism using Lua scripting <a href="http://www.linkedin.com/redirect?url=http%3A%2F%2Fmedia%2Eomediaweb%2Ecom%2Frsa2011%2Fkeynotes%2Fwebcast%2Ehtm%3Fid%3D3-3&urlhash=_NB0" target="_blank">I talked about at the 2011 RSA conference</a> this year has not been more widely abused.
I do think there will be a few notable security issues that hit iOS next
year.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>#3. Mac is back</b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
If I take the Warren Buffet approach to figuring out how
well a company is doing by visiting their stores, there appears to be no
recession going on in Cupertino. I have
also observed a large increase in executives who have switched over to MacBook
Airs as more and more Macs continue to backdoor their way into corporate America. With that backdrop and Apple’s market share
above 15% in most developed countries (not world-wide), we are finally getting
to a point where it makes financial sense for the bad guys to target the Mac
platform. In May 2011 we saw the tell tale signs of
interest in the Mac when Mac Defender was reported in the wild. More recently we saw DevilRobber used to mine
Bitcoin virtual currency. However, the
most troubling is Mac malware being <a href="https://krebsonsecurity.com/tag/trojan-dropper-osxrevir-a/" target="_blank">disguised as a PDF document</a>. I think we have seen this movie before, and
it isn’t pretty. While it won’t be earth
shattering, I think we will see some creative attacks against the Mac in
2012. Most of them spread via social
networks and abusing peoples trusting nature more than anything that is
terribly sophisticated. </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>#2 . Stuxnet / Duqu
tip of the iceberg</b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
With control systems blowing up, drones falling out of the
sky, and general paranoia around embedded systems reaching a fever pitch, we
are going to find more advanced versions of Stuxnet and Duqu in 2012. I still believe Stuxnet was an early
generation of what is out in the wild and that the level of sophistication
associated with well funded attacks will be awe inspiring. I think any person in security worth his/her
salt has to find these advance pieces of malware fascinating. So be ready for more entertainment in 2012.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>#1. Calling a Spade a
Spade</b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
There is a lot of dancing that goes on when we hear about an
APT. I have worked with many companies
that have had some form of APT, and the ones that didn’t just haven’t figured
out that they really did. By and large, many of the APTs appear to have originated in China. I think this <a href="http://www.bloomberg.com/news/2011-12-13/china-based-hacking-of-760-companies-reflects-undeclared-global-cyber-war.html" target="_blank">Bloomberg article</a> does a pretty good job of spelling out that China hit 760 companies and many
more that haven’t become public. Yes,
there are the other likely suspects that have a well-organized machine of cyber
warriors, but China has been pretty busy over the past few years. So in 2012 I think we will start seeing more
attribution of where these APTs are coming from and not just throwing the
overused and politically corrected APT on every intrusion. Being able to decipher the threat from one
nation to another is helpful in thinking about how to better protect
intellectual property and what resources should be spent on specific defense. Most
importantly, we can begin to shape <a href="http://www.forbes.com/sites/lorenthompson/2011/12/22/u-s-headed-for-cyberwar-showdown-with-china-in-2012/" target="_blank">what kind of response is warranted </a>in return
by understanding “who” is targeting companies, not just “what” malware exists. </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
I know that it is easy to make predictions and that
according to Jack Daniel there are <a href="http://blog.uncommonsensesecurity.com/2011/12/pandering-pentagram-of-prognostication.html" target="_blank">Five Pentagrams of Prognostication</a>.
While I enjoyed his post, I do
hope I have given you a few things to think about. Will any of this come true
next year? Who knows, but I will be
reporting back at the end of 2012 and grade my performance. Let me know what you think. You can reach me at george.kurtz at
warburgpincus.com.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>George Kurtzhttp://www.blogger.com/profile/00232522960555162513noreply@blogger.com2tag:blogger.com,1999:blog-1971688436722532389.post-61547676041888976282011-11-29T06:01:00.000-08:002011-11-29T18:48:09.906-08:00My New (ad)ventures<div style="font-family: Arial,Helvetica,sans-serif;">
</div>
<br />
<div class="MsoNormal" style="font-family: inherit;">
</div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif;">
There was a lot of speculation last month about my departure
from McAfee (now INTC), as reported by <a href="http://www.reuters.com/article/2011/10/18/us-mcafee-departures-idUSTRE79H63Y20111018" target="_blank">Jim Finkle at Reuters</a>. Well, I can finally confirm that I have left
McAfee as part of a multi-month planned transition. As many of you know, I spent the last seven
years in various roles including GM of the Risk and Compliance Business Unit
and most recently as McAfee’s Worldwide CTO.
After the acquisition of Foundstone by McAfee in 2004, I candidly didn’t
think I would have stayed for as long as I had, but I am proud to be part of
the executive team that put McAfee back on track and ultimately sold it to
Intel in February 2011 for almost $8 billion.
I have been involved in acquiring many companies over the last decade,
and I have been fortunate enough to be acquired twice in my career. While most acquisitions are exciting, I
believe it is always a good time to take stock in what a person wants to be
doing long term. To quote Steve Jobs:</div>
<blockquote class="tr_bq">
<div class="MsoNormal" style="text-indent: 0.5in;">
“Your time is limited, so don't waste it
living someone else's life. Don't be trapped by dogma - which is living with
the results of other people's thinking. Don't let the noise of other's opinions
drown out your own inner voice. And most important, have the courage to follow
your heart and intuition. They somehow already know what you truly want to
become. Everything else is secondary.”</div>
</blockquote>
<br />
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif;">
</div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif;">
You have to have the courage to follow your heart and be
passionate about what you are doing, and for me passion is everything. I am most passionate about being an
entrepreneur and building companies, which is ultimately why I decided to leave
McAfee.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="font-family: inherit;">
<span style="font-size: x-large;"><b>So What’s Next?</b></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif;">
I am delighted to announce that I have joined Warburg Pincus
as an Executive in Residence. <a href="http://www.warburgpincus.com/" target="_blank">Warburg Pincus</a> is a leading private equity investment firm with over $30 billion in assets under management. I have known several of the principals of the firm for
almost a decade and we always talked about doing the next big thing
together. I believe the time is right
and that Warburg Pincus’ growth-oriented investment style is ideally suited for
this space. Given the highly fragmented
security sector, where large players claim less than a 10% market share, there
are unique opportunities to solve problems which are not being addressed with
existing legacy technologies.
Blacklisting is a good example of a technology long past its prime. However, most large companies’ main defenses
center around technology that was invented during the VHS era. How many people are still using VHS at home?
Exactly. So why do we cling to the old
models of yesteryear to protect our most sensitive intellectual property?
</div>
<span style="font-family: Arial,Helvetica,sans-serif;">
</span>
<br />
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif;">
<br /></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif;">
That is a question I have asked myself for some time now and
why I am excited to partner with Warburg Pincus. We are working to assemble a world-class team
and looking to acquire technologies that will allow us to build a company
focused on solving the most demanding security problems of today – not 20 years
ago. Will it be hard? Of course.
Will it be fun? You bet! My
mission will be to build an enduring company where people are motivated to
solve really hard security problems. </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="font-family: Arial,Helvetica,sans-serif;">
If you think you have an interesting security idea or
technology, I would love to hear about it.
If you are a university with technology that you would like to
commercialize, I would love to hear about it.
Finally, if you are dying to be on a killer team looking to change
security, I want to hear from you. I
can be reached at george.kurtz at warburgpincus.com.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<br />George Kurtzhttp://www.blogger.com/profile/00232522960555162513noreply@blogger.com0tag:blogger.com,1999:blog-1971688436722532389.post-67915765413721200652011-10-05T07:15:00.001-07:002011-11-21T12:08:11.931-08:00This site will be active soon... keep checking back to get an update on my latest ventures.George Kurtzhttp://www.blogger.com/profile/00232522960555162513noreply@blogger.com0