TEC Talks Podcast: Cybersecurity with Gavin Klondike
Ep. 02

TEC Talks Podcast: Cybersecurity with Gavin Klondike

Phoenix, Arizona

Episode description

Today, we speak with Gavin Klondike about his experience working in tech as a senior cybersecurity consultant.

Gavin also runs NetSec Explained, a popular YouTube channel and led the 2023 CactusCon AI Village.

Download transcript (.srt)
0:00

Hello, and welcome to Tech Talks, a podcast by the Technology Education Collaborative.

0:04

Tech is an Arizona nonprofit that supports the secure, thoughtful use of technology by

0:09

empowering people with information about the technology they use each and every day.

0:16

Today, we're talking with Gavin Klondike, a senior security consultant and host of the

0:29

YouTube channel NetSec Explained.

0:31

Thanks for being here, Gavin.

0:33

Thanks for having me.

0:34

So this is the way this works.

0:36

We bring in a technologist and we ask them the same five questions.

0:39

Everyone gets the same five questions, but obviously we get different answers.

0:42

So you're ready?

0:43

Let's go.

0:44

All right.

0:46

What would you say your title or position is?

0:48

So my title is Senior Cybersecurity Consultant.

0:51

What that means is that I help companies realize the business value of cybersecurity investments.

0:56

Right now I specialize in penetration testing, mostly around application security, cloud

1:00

security and AI.

1:02

Companies hire me and my organization to come in, break their stuff, and then turn around

1:06

and tell them how we did it.

1:07

Sounds like fun.

1:08

Absolutely.

1:09

So that brings us nicely into question two, which is, what does that look like on a daily

1:12

basis?

1:14

On a daily basis, as a senior consultant, what I do is kind of go hand in hand with

1:18

sales and pre-sales, and then I do a lot of the engagement work itself.

1:22

So typically we'll have a conversation with the client and then understand and identify

1:25

what exactly they're looking for.

1:27

Typically they're looking for a penetration test.

1:29

And so a lot of regulations require penetration tests now, especially around PCI and SOX compliance.

1:35

So this is now a requirement.

1:36

Other companies like to be a little bit more proactive with their security.

1:39

So even though they're not regulated, they want to make sure that they can give their

1:42

clients and their users a strong reassurance that they take security seriously.

1:47

So they hire us, we get an understanding of what their environment looks like, what their

1:52

concerns are, what keeps them up at night, and then we go through and perform scoping.

1:56

So in scoping, we identify how large is the application, how long is that going to take,

2:00

and then we go through and start doing the engagement work.

2:03

Typically when I do the engagement work, I first will test all sorts of different applications.

2:08

So these will be desktop applications, web applications, sometimes mobile applications.

2:12

And so I need to get an idea of what it looks like from a user's perspective just to understand

2:16

what the heck the thing does.

2:17

And then from there, I'll go through and do an application mapping.

2:20

So I'm looking at every piece of functionality, including the stuff that users will typically

2:25

ignore.

2:26

From there, I start doing some threat modeling, some light threat modeling, and then I'll

2:29

do exploitation and try and find, okay, if I enter a one here instead of a two, do I

2:34

get access to somebody else's information?

2:36

Can I do something like SQL injection and get access to their database?

2:40

Can I get access to their server or maybe some files uploaded?

2:43

And then from there, we write a report and have a conversation with the client, walk

2:46

them through what we found.

2:47

We try to highlight and identify certain themes like, hey, I noticed that you have really

2:51

strong server-side controls, but your client-side controls are really weak and we want to work

2:55

on that.

2:56

Sometimes it's cryptography related, right?

2:57

You don't really have strong crypto here.

2:59

Here's ways that you can improve that.

3:01

And so we like to be very positive, very proactive and say, hey, this is what you need to do

3:04

in order to make your system more secure.

3:06

Okay, so if you were going to walk me through a hypothetical situation, let's say I came

3:11

to you and I have a small business and I accept people's credit card information.

3:15

They buy things.

3:16

I have an in-house app, right?

3:17

So there's an app they can go to to purchase things from my store.

3:20

Is that something you would help me with if I was worried about somebody getting everybody's

3:24

credit card information?

3:25

Yeah, absolutely.

3:26

First, I would try to get a better understanding of your application.

3:29

How do you process credit card information?

3:30

Do you do it in-house?

3:32

So that would put you under PCI compliance or do you outsource that through Stripe?

3:36

So that would probably be one of my first questions.

3:38

Do you run credit card information in-house or do you do that through a third party service

3:41

like Stripe or PayPal?

3:42

Okay.

3:43

All right.

3:44

So the third question I have for you is what is your least favorite thing about your job?

3:48

Because I don't care how much you love what you do, there's always going to be something

3:51

that you may not enjoy quite as much.

3:54

That one's a little tricky because I've found a way to make the hard things easier to do.

3:59

It's not that they get any less hard.

4:01

It's just that you get more used to it.

4:02

It's kind of like going to the gym.

4:03

I would have to say the things that I like least is probably reporting and probably having

4:09

to balance meetings with the engagement work.

4:12

When you're more on like that junior or mid-level, you primarily focus on the actual implementation,

4:17

the actual hands-on keyboard engagement work.

4:20

But when you get to my level, you have to do a lot with client calls and interactions

4:23

and then you're pushing the technical side of the business and saying, okay, here's how

4:27

we're going to build standards around our reporting.

4:29

Here's how we're going to build standards around our pen testing pipeline or our sales

4:33

pipeline from the technical side.

4:36

Here's how we do our scoping.

4:37

Right now, one of the big projects that I'm taking on is writing vulnerability templates

4:40

so that my juniors and people underneath me can take those and it makes their report writing

4:45

process easier.

4:46

The reporting and having to balance the client conversations with the business work and the

4:51

engagement work on top of it.

4:53

So a lot of responsibilities.

4:54

I think an interesting thing I'm just going to point out is that in my conversation with

4:59

many different kinds of technologists, it is incredibly common to hear that sometimes

5:04

it's exactly that reporting and to some degree, client interaction that falls on the less

5:10

enthusiastic side for them.

5:13

Like the farther they get away from the actual hands-on kind of working with technology,

5:18

you know, there's an inverse relationship to how much they're enjoying what they're

5:21

doing.

5:22

Yeah, absolutely.

5:23

Let me, all right, I'm going to tell you this about myself though.

5:25

So it's not the writing the report that I have a problem with.

5:28

It's everything I find, I get this little happy chemical that says, yay, you found a

5:33

finding and then immediately it goes to, you're going to have to write that up now.

5:36

So you don't even get the full dopaminergic experience.

5:39

You just get to have like a false high.

5:41

It's like a quick high and a quick low and I'm just like, I was on a, I was on an assessment

5:47

recently and I was investigating what I thought was going to be one thing, very likely to

5:52

be a finding.

5:53

And then I wound up finding six other issues around it that I wasn't even looking for

5:56

at that point.

5:57

Every single one of those are now new findings that I have to document and so I have to sit

6:01

and spend a whole day writing a report when, you know, usually it'll be, ideally what you

6:06

should be doing is documenting and reporting as you're going through and you're finding

6:10

the findings.

6:11

But if you find a lot of them, then you have to essentially dedicate a whole time to time

6:16

block and say, okay, this is the period of time when I'm going to do the assessment work.

6:19

This is the period of time when I'm going to do the report writing.

6:22

And so that really takes me out of it.

6:24

Okay.

6:25

So what then, going to our next question, is something that you love about your job

6:29

where you get to have the full experience of the high.

6:32

What is a high you get that doesn't crash?

6:35

I get to break things.

6:37

That is my job.

6:38

Can you give me an example of that?

6:41

I can only talk a little high level.

6:43

Everything else that I have is under NDA.

6:44

Again, my job is to break into companies and tell them how I did it.

6:49

So it's really fun to talk to a company and say, hey, I changed my user ID from a two

6:56

to a one and now I got access to somebody else's user ID.

6:59

Anyways, I wrote a little script that just keeps guessing all these different numbers,

7:03

you know, go up one, two, three, four, and now I enumerated a hundred thousand user accounts

7:08

and here's all of their database information.

7:11

And you just had this right here for me to exploit.

7:13

So you enjoy stopping the hearts of CEOs.

7:16

My favorite thing is stealing data.

7:19

I love stealing data.

7:22

When I was a kid and I saw the movie Hackers and also a lot of cyberpunk anime, I was a

7:26

really interesting kid.

7:27

I just love the idea of being able to break in, steal a bunch of stuff and then walk out

7:31

and nobody noticed that you were there.

7:32

That translates into my professional career where I just really love stealing data.

7:36

It's fun to talk to clients about that and say, hey, here's all the information that

7:39

you have on your system.

7:40

Let's talk about how to keep it protected.

7:43

So if somebody was looking into doing this themselves, what is the one practical thing

7:48

you think they should do in order to enter this industry and be successful?

7:52

I would say embrace self-study.

7:54

One of the challenges with penetration testing and security as a whole, it's not as difficult

7:59

today as it was when I first started out.

8:01

There's a lot of learning resources, a lot of free resources online, but it's almost

8:05

like reading a book on how to run a marathon.

8:09

It's not going to help you past a certain point.

8:11

There's going to be a lot of tutorials and the tutorials are good.

8:14

It's a good place to start, but you really need to start practicing on your own.

8:19

And so you go to certain resources.

8:21

Right now there's the, I recommend Live Overflow on YouTube.

8:24

I recommend John Hammond on YouTube.

8:26

Of course, my own channel, NetSec Explained on YouTube, a lot of great tutorials talking

8:30

about different perspectives and the thought process and the methodology that people go

8:34

through.

8:35

Once you get a solid idea of what a methodology is, something that you can copy, then start

8:40

doing some of this on your own.

8:41

You can get hands-on experience through Try Hack Me, through Hack the Box.

8:44

You can even go for certifications like the OSCP.

8:47

And so those teach you practical skills and usually they'll have a practical evaluation

8:52

where here's a server, here's a Kali Linux box, break into this system, have fun.

8:57

And so it's this struggle where you learn the most.

9:00

So for people who are just starting out, that's part of the game.

9:04

Sometimes you have to bang your head on the keyboard and see what falls out, but at the

9:07

end of the day, you do need to practice.

9:10

All right, so final question is, do you have any community groups that you're involved

9:14

with?

9:15

Any side passion projects that aren't related to what you do professionally?

9:18

Anything you want to share with our listeners?

9:20

I recommend for anybody to join either their local 2600 group or their local DEFCON group.

9:26

There's one in every major city.

9:28

So you can just Google, you know, if you're in Atlanta, Georgia, Atlanta 2600, Atlanta

9:33

DEFCON group.

9:34

Surround yourself with like-minded people, people who are interested in growing and developing

9:38

skill sets.

9:39

You'll learn a lot from them.

9:40

You'll also have a lot of crossover between people who are starting out brand new like

9:43

you and people who have been doing this for years because we remember where we came from

9:47

and that's how we got started.

9:48

Phoenix 2600 is one of the groups that I'm part of.

9:51

I also do a lot of stuff at DEFCON, so I'm with the AI village and we do a lot of things

9:55

at DEFCON.

9:56

Last year we had the world's largest generative AI red team event in coordination with the

10:01

White House and pick an AI company.

10:03

Nvidia was there, Google was there, Anthropic was there, OpenAI was there.

10:07

They're the creators of the chat GPT.

10:09

The third group that I'm a part of that I would recommend people hop into is take a

10:14

dance class.

10:15

I know it sounds weird, but a lot of engineers focus and double down on their engineering

10:20

side of things.

10:21

You know, the tech side of things, but you really need to develop some of the social

10:23

skills because that a lot of people will say is the hardest part is not just the hard skills,

10:29

but the soft skills and being able to communicate with people.

10:32

Take a dance class.

10:33

It's going to take you out of your element.

10:35

It's going to get you more exposed to people who aren't, you know, super techno nerdy like

10:39

yourself and it will make you a little bit more of a well rounded person.

10:43

So personally, I recommend looking for either something like country swing or West Coast

10:47

swing.

10:48

Those are really easy to pick up or salsa, which is also really easy to pick up.

10:51

That's excellent advice.

10:52

Well thank you so much for taking the time to speak with us today.

10:55

Absolutely.

10:56

Thank you for having me.

10:58

This episode was recorded at the Advanced Cyber Systems Lab at Gateway Community College

11:02

at the Washington campus.

11:04

The ASCL is a tech hub open to the general public where you can use a 3D printer, record

11:08

a podcast, practice advanced tech skills on one of our servers and more all free of charge.

11:13

If you don't know how to do any of that, but you'd like to learn, there's plenty of people

11:16

here who will teach you.

11:17

So come on by and stop into the ACSL.