Episode Transcript
[00:00:00] Speaker A: You're listening to protect it all, where Aaron Crow expands the conversation beyond just ot delving into the interconnected worlds of it and OT cybersecurity.
Get ready for essential strategies and insights.
Here's your host, Aaron Crow.
[00:00:19] Speaker B: I am super excited. Thank you for joining me today. Why don't you introduce yourself, tell us who you are, what you do, and kind of all your background. I'm really excited to dive into this conversation.
[00:00:27] Speaker C: Yeah, thanks so much, Erin, for having me. So I am a security researcher at Nokia and also a part time adjunct professor, and I teach machine learning. So a lot of my work is related to securing five g and six g. Basically, think of 5g, like with your cell phone when you're making a call or you're sending a text message. You want that information to be secure. You don't want it to be hacked. So my job is actually securing all of this technology for you. And that could also include using AI in order to make the phone calls and the text messages faster.
[00:01:06] Speaker B: That's awesome. I mean, you're hitting on all the buzzwords that everybody's talking about right now, from five g to six g to AI and machine learning. Like, that is everything. Almost every one of my guests that, come on, we're diving into this in some form or fashion. But, I mean, the reason for that is because it has so much power to really impact so many different businesses in so many different ways. So, man, let's dive into it.
Digging in a little bit more about the, what is the impact? What is the difference between five g, four g, all this. Obviously, there's a speed difference, but there's a whole bunch more that goes into that from how it works and what all can use it and what it can even be used for.
[00:01:47] Speaker C: Right, right. So I can give you a background. So you were right. Speed, that's a big thing. We also talk about latency, lower latency, so you have faster download upload speeds. In terms of big difference with 5g from 4g is that 5g is now being in multiple industries. So they're using it not only with cell phone call, but they're using it in manufacturing for smart manufacturing, industrial use cases. And six G research is actually what I'm working on right now. So we're trying to enable AI technology. So think of, like, metaverse, virtual reality, hologram ads, things like that. How do we actually create that and make it so fast that you actually think the hologram is right in front of you in real time? Right. You don't want it to be buffering as you watch the ad. So that's really the big difference between five G and six G and four G is we're trying to anticipate all this new technology and making everything faster and easier to use for users.
[00:02:58] Speaker B: Yeah, I mean, I'm dating myself here, but I remember back in the day when you had to plug in if you wanted a decent connection, you know, you're physically plugged. I remember having to do dial up. Right. And the fastest Internet you had was, you know, 14, four modem or 56k modem. Right. Obviously, I'm dating myself and how long I've been doing this type of thing. But. But now you mentioned. So a lot of the work that I do is in operational technology. So infrastructure and manufacturing and critical infrastructure, that kind of thing. And latency is the key. Right.
It's a. It's a very.
They don't send a bunch of data. Like, if I looked at a network I can support, most. Most industrial networks are ten megabit networks because they're not sending out big packets. It's not video, it's not anything like that. But latency, they need it to happen very fast. I can't drop packets. I can't miss a packet. It has to happen instantly, you know, sub microsecond response times for some of these processes. And latency is the. Is evil. I can't. I can't do it. So some of the security, you know, security tools that work in an iPad world, secure remote access and encrypting and encapsulating things, all those things don't. Yeah, they add some latency in an IT world, but the processes forgive it. But in an OT world, those processes don't forgive it. Like, you can't deal with that latency. I need it to be instant, instant, instant. So everything that I'm adding along the way, I have to be careful in what I do because of that. So I'm excited to hear about five g and how that can open up, because right now, a lot of the ways that you're doing things in power plants and manufacturing, I'm running fiber. You know, I did a power plant years ago where we were trying to do, you know, packet visibility and understand the networks, you know, and we spent a million dollars in a fiber footprint just because there's no other way to do it. Like, I have to get power, I have to get network 900 foot from one side to the other and wireless again 15 years ago, there's no way I would trust wireless on a critical process because it it's going to drop packets and all the things. So it's exciting to hear how that's going to help us lift, because then it becomes a lot cheaper and easier to deploy instead of having to have this very hard and old school physical infrastructure to be able to deploy sensors and capabilities in these environments that are, you know, 100 years old, some of them that I can retrofit them without having to upgrade the fiber plant.
[00:05:22] Speaker C: Right, exactly. And that's something we're actively working on. So you mentioned ot, right? So digital twins is something that we're thinking about in six g is how do we actually have a digital twin? So for those in the audience who might not know what a digital twin is, just think of it like a digital copy or a digital simulation of a system in real life. So that could be critical infrastructure. We're thinking about using it for a power grid, some smart devices in a power grid. And basically you're just going to have a digital copy of the devices in that power grid. So that allows you to simulate different kinds of attacks or different use cases, different things that could happen on the device, and that's called a digital twin. So when we're actually doing these studies for five G and for six G, what we're trying to do is simulate this kind of digital twin, and we're saying, okay, if this attack were to happen, how will the system behave in this case? And so we're doing that simulation exercise to try to secure those devices. And that's something. Six G, for example, it takes ten years. So this is something it takes a lot of time and effort to actually do. It's not something we could just do overnight, but, yeah, that's definitely something we're looking at right now.
[00:06:43] Speaker B: Yeah. And that's interesting. You know, digital twins. So I've built labs for years as well for similar purposes, but a lot of the labs that I've had to build in the past, I'd have physical hardware. Right. And some of the difficulties in, in securing and understanding ot is because I don't know how it's gonna handle. So I can't do red teaming very most places are not gonna let me scan. I can't do a red team attack because that process is critical, and I don't wanna have the, there's too much risk around causing damage or implement, you know, making the plant trip or whatever. I can bring it down. It's too big of a risk. So when you start doing a digital twin, or I have a lab, a safe environment, then I can also, beyond just being able to practice, you know, attack and defense, I can also understand what good looks like and what bad looks like. So if I understand what good looks like, then I can look for anomalies, like this is what it should look like, and anything that's outside of this is bad, I assume it's going to be bad, or at least it's something I should look at and see if it's bad. But right now, so much of our OT environment and a lot of these, because they're so old and they're temperamental and they're sensitive, I'm hesitant, most organizations are hesitant to do a lot of tracking, to do a lot of testing because they're scared of what's going to break. But adding digital twins, it opens up the world to be able to do a lot of things and understand what good looks like and how to protect in these environments.
[00:08:13] Speaker C: Right, exactly. And you mentioned the keyword anomalies. So actually everyone thinks of AI, right? So actually they're trying to use AI now in digital twins as well. So anomalies is the keyword. So any anomaly if you want to detect it, typically we use something in machine learning, or AI for those who are not aware. Machine learning is basically, think of it like the back end of AI. That's the easy way to understand it. So whenever you're using machine learning for anomaly detection, that will add some resource overhead. But we're using it for exactly this. Digital twins seeing any anomalies that might exist. And we're also thinking of doing something called network sensing in six g. So network sensing, basically the idea is you have these devices in the network itself and you can have some kind of 6th sense is what the marketing team is calling it. But basically it's like you have an ability to detect, okay, is this attack happening and what are the impacts to it? And. Exactly, it's just using digital twins to simulate these kinds of attacks to also see what is good, what do we want to happen on the device, what is bad, what is not ideal, and to hopefully anticipate it and create some mitigations around it. So a lot of my research has actually focused on that, and a lot of it is really difficult. Right. Because you have to balance so many different things. You have to have low latency, also high reliability, and sometimes that is a trade off as well.
[00:09:53] Speaker B: Yeah. And the other piece to this, you know, AI, I've been using AI for a while and. But ot is very slow to adopt. Right. So new technologies come out four g, five g, whatever the technology is, ot is usually very, very slow to adopt things.
Part of that is because of funding and, well, there's, there's a lot of reasons. But let's get back to how can we? Because I agree, like all of these things, I want to fast track this as much as I can and I want to go as fast as it's safe so that I'm not introducing undue risk in these environments. But some of the things that we're concerned around in OT is obviously, I don't want to connect my power plant to the Internet, right? I don't want somebody from China or even my next door neighbor to be able to connect into this thing accidentally or whatever because it's really risky. Right. I don't like to get into a power plant. There's a gate, there's a guard. You know, I have to wear ppe. It stands out. There's not that many people that work there. So even if I have all the right things, they know each other. So if I've never been there before, they're going to be like, who are you and what are you doing here? Right? So from a network perspective, we're bypassing a lot of that. Because if I can get to it from my house, whether my house is in Texas or Chicago or wherever it is, then that's a risk that is scary for good reason.
And these technologies, when we say five g, I think I know your answer. And the answer that we're looking at in the industry is that doesn't necessarily mean that I'm doing 5g with at and t. It just means that I'm using the technology. And that technology can be owned by the company. It can be a private network. It can be encrypted end to end on a private network that's not connected to the Internet, it's not connected to at and T or T Mobile or Verizon or any of these conglomerate cell phone networks, but it's still the technology that is allowing the speed. And I think that's where we have to differentiate, disconnect. Am I right in that? Just because I say 5g doesn't mean that I'm on a cellular network. That's a commercially available network, right?
[00:12:04] Speaker C: Yeah, exactly. I mean, everyone thinks of 5g equals these major carriers, T Mobile, at and T Verizon. But you can actually use this technology in your systems without using them. It's not always cellular. And actually Nokia will come out with a product. It's called network as a code. So if you've heard of it. It's basically a way to use this technology in five g and in six g, and you, instead of having to code it and understand how exactly is this technology looking like at the backend, you can have your developers have a very easy, almost drag and drop system that allows you to use this technology. And I know other companies are creating similar products as well. So, yeah, definitely you can use this technology without using at and T Mobile, Verizon, etcetera.
[00:12:54] Speaker B: And that's exciting because that opens up so many doors because, again, nobody is concerned about the actual media. So I look at 5G as like, the media. It's like Wi Fi or cat five or anything else, right? It's really the. The pipe that I'm taking it across. If I own that pipe and it's encrypted and it's secure and all those kind of things, then I'm less concerned about the technology. And if it can get me the latency and I can add devices and I can support it and all of that, you know, power plants and power companies, you know, all the power lines you see across the country, you know, we've been putting microwave on those things to get signals. Long, long haul. Now, obviously, latency is a huge problem there, but some of the device, we would use that network for non latent, you know, latency dependent messages, right? So we'd get logs out, we'd get, you know, different things like that. But imagine if I replace those microwave, you know, repeaters along the way with a 5G antenna instead. Then I can use that same backbone, that same network, but then I can do high latency required devices. Then I can start doing control, then I can start doing all these other things. And again, I own the network. It's sitting on my pole. It's sitting in my power redundancy. You know, I'm not. It's not going to the Internet, it's not going outside of my environment. So from a compliance perspective with regulation I'm not having, I still own it, all right? It's not going to China, it's not going to at and T or AWS or anything else, then I'm more secure and more confident in those things, and I'm more likely to use something like that if I can kind of control it end to end.
[00:14:30] Speaker C: Right? Exactly.
[00:14:32] Speaker B: That's super exciting. But let's dig into how AI is helping with some of these and doing those anomaly detections, because, I mean, AI is. I look at AI and machine learning as just a force multiplier. I can have a team of 100 people digging through alerts and trying to find the needle in the haystack, the anomaly that we talked about earlier, or I can start training AI to do some of those first level things for me. And then I have a smaller team that I'm just looking at the alerts that AI catches and sends to me. So instead of looking at thousands of alerts a day, maybe I'm looking at 50. And those 50 have already been prioritized based on the things that we're teaching AI.
[00:15:11] Speaker C: Right, right. Yeah, that's one way to use AI. So let's focus on anomaly detection. Right, so exactly what you were saying, Aaron. Exactly that. But so in machine learning and AI, people tend to think of it like a magic solution, but I always say it's just, you know, data analytics. So it's just a way to analyze your data and. Right. If you have thousands of alerts, you can't. You can have maybe a team of thousands of people to look at each alert, but that's not practical. So that's why you want to use machine learning. So machine learning, what you're doing when you train the model is you need enough data to actually train the model. And that's something in the industry that can be hard to do. But what you need is you need a lot of data to give your algorithm so that it can actually learn. Like, if I see this pattern a, then I know this might happen. And to actually see these kinds of patterns, it needs to learn from a lot of different data. So not just what you're looking for, but also any data that you're not looking for. Right. You need to look at all the different types of scenarios that you might anticipate. And so that's really what you're using machine learning for. And anomaly detection is probably one of the most popular ways you're using machine learning. But people are also using AI and machine learning in telecommunications to prevent against cybersecurity attacks that we might see with intrusion detection systems, intrusion prevention systems, they might also be using machine learning and AI. And again, whenever you have data, machine learning is just analyzing the data. So really, any scenario you can think of where you have a lot of data and you don't know what to do with it or you're not sure what it all means, then you can apply machine learning and AI to that.
[00:17:06] Speaker B: Yeah. Using that to find that needle in the haystack. Right. And being able to crunch more data than. Than a human can look at. And we've also seen those, you know, the phishing attacks where the website, the address looks, you know, Amazon.com. and you look at it from the human eye, it looks the same, but it's actually using a different, like, you know, cyrillic Alphabet instead of an english one. And it's actually going to another website. But me looking at it, it looks good, it looks fine. And I click on it and it goes to not Amazon, it goes someplace else. Right. And obviously a machine can see the difference between those two things, right? Um, little things like that, that, that humans are not going to potentially catch. We're good at seeing patterns, but. But obviously we're limited by, you know, maybe we had a rough morning or we didn't drink enough coffee or whatever. The thing is, I didn't sleep well last night or I've seen a thousand of these and I, I clicked okay twice instead of once. So I skipped one. And that one that I skipped was actually one I should have dug into.
You know, machines don't get tired.
They don't have a bad night. They don't, they're not hungover. They don't, they don't get the flu. You know, their girlfriend didn't break up with them. Like, they're just looking at the data all day long, all night long. So the more data that you send it, the more happy it is, which is really cool. The other side of this is beyond just, you know, looking for bad actors and bad guys. We can also use this to look for good things. Like, I can help it to do tuning, I can help it to make things more efficient from power use to, you know, cpu cycles and configurations. And there's all, looking at my code. There's a lot of things that we can use this for that are very beneficial. And a lot of people are on the fence around, you know, AI and, you know, it's going to be the Terminator and they're going to take over the world and it's going to get rid of jobs and all those things. Yeah. Okay. Yes, it's going to eliminate some jobs, but I think it's going to make other jobs. Right. It's. Jobs are going to be different.
Yes, it's going to eliminate some jobs. Absolutely. But it's also going to open up a hundred more jobs that look different. Right. You're just doing a different thing and you're using. Because I don't see a place, at least in the near future, where AI is just going to be able to do everything. I use AI all the time. And, hey, create me a diagram or a drawing or something like that. And it's really good at some things and then other things that are so basic, like just text, text and dolly trying to make an image. It's really bad at it.
[00:19:37] Speaker C: Yes. Yeah.
Well, it's interesting you brought up the phishing email. So a lot of people are scared of AI right now because people are actually using AI to craft different attacks. So people are using generative AI, like chat, GPT, and saying, create a phishing email for me, or create this phishing email with this text. And chatgpt or generative AI can create an email that's more convincing than what they might have done. So they might be able to correct any misspellings or get rid of any emojis, make it more convincing for us, and then we're more likely to click it. But yes, we're also using AI to detect these phishing emails. So Gmail, for example, whenever it says, this might be spam, this might be a phishing email, then it actually flags it and puts it in your spam folder. So with every good innovation, there is a negative side. But I think with AI, the positive outweighs the negative because there's so many things, you might not realize it, but we're using AI every day, even if you're not in tech, right? So even going on Hulu, Netflix, Peacock, whatever streaming service you want, you're using machine learning in order to do that. Because whenever it tells you you might like this movie, that's machine learning. It's getting the data from your user preferences or from people in your area or someone signed into your account, right? It's saying, okay, we see all these users are using this, this account, or they like, everyone who likes this action movie also likes this other action movie. So that's a way, you know, AI is being used everywhere. You know, banks are using AI, too, with chatbots, with creating, even for their fraud detection, they're using machine learning that, okay, this check might be suspicious, and they're actually using AI to say, okay, this check is suspicious. We think this is a suspicious transaction.
We'll flag this as an alert. So maybe people don't realize it, but any innovation that we're seeing, a lot of it is AI driven. So it's not the Terminator. Just think of it like an innovation, right? It's like industrial revolution, right? Some jobs went away, but we have new jobs now. So even though a lot of jobs might be going away, it's like the jobs that are going away are the ones that are easily automated. But there's so many other jobs. And I think actually there was a website, World Economic Forum, they actually said long term, AI is going to give you more jobs than the amount of jobs it's taking away. And we're already seeing that now. Like, if you look on LinkedIn or on any website, you see prompt engineering jobs and they're paying a lot of money. They're paying like $200,000 a year. And that's just create a prompt for chat GPT, you know, be able to type in a question to chat GPT. So it gives us the answers we want. But yeah, AI is not good for everything. You know, whenever you generate an image, like for example, when I try to generate an image of a person for my slides, the hands are always off. The hands are like, not, it's not these five fingers, it's like three fingers or six fingers. So, yeah, so AI is good, but also it's not perfect.
And it's just a way to analyze data and see patterns and helps automate certain things. But it's not going to take over humans anytime soon.
[00:23:28] Speaker B: I agree. You know, that sparked some, something for me is we've used, I'm working with a company called Threat Gen, and they created this AI auto tabletop product. And the reason I bring it up is because AI can be used in a lot of different ways. So we can use it for anomaly detection, we can use it, it for, you know, enhancing and looking for how to, how to make things run better, looking at code and, you know, misspelling things. You know, I can create a post and a blog post or whatever. I create all the content. I do a data dump of all the things that I want to say. And I don't necessarily have to worry about how to format it. I can dump it into chat GPT and say, hey, format it in this format. I want to be a post. I want all of this text to be, you know, put into 6th paragraph, whatever I want to say, and it dumps it back out at me. It's my original thoughts. It's just formatted by AI. Instead of me focused on doing that, which Microsoft word does the same thing, like, hey, this is a fragment, this is misspelled. Like it's just doing that same thing. It's just faster than having to manually type it. All the auto tabletop that I'm talking about, it can be used for training purposes. So imagine you talked about the digital twin earlier, in addition to all the benefits that we talked about already. The other thing is I can do training. So I've got this safe environment that I can then turn my. My soc analysts or my cyber. My engineers, anybody, I can turn them loose in this environment, and they can play. They can. They can, you know, misconfigure it. They can try to attack it, they can take it offline, and they can see how the system responds. Like, what messages do I get? Did I see the attacker coming in? You know, did. Did I see somebody change the configuration of the firewall? Like, all of those things? And I can train that on the tabletop. Most tabletops that I've experienced in my career have been once a year, they've been analog in a conference room on paper, and I've already determined all of the steps before I ever walk in the room. Whereas this is dynamic. It's on the fly. So if you come up with a really great. We get to step two, and you're like, yeah, but that's not how we would do it. We would do it this way. You can give it that response, and it'll dynamically adjust. So it's like a choose your own adventure instead of this static reading the book. And every time you read the book, you get the same answer. Page ten is page ten. Every time. I can use AI to think on the fly. I can give it configurations. I can give it, you know, architecture diagrams and all this kind of stuff. That's another great way that I can see. And for me, opens that up too, because if I can take a copy of everything that I have and duplicate it into a digital twin on the fly, real time, or at least near real time, then imagine how much better my staff can be. Like, I can train my people better, we can learn better. I can point AI at it and say, start analyzing this from now until whenever and when something changes, let me know so I can start looking. There's just the possibilities are unlimited when I open the bridge. Because right now, one of my bottlenecks is network and bandwidth and latency. If I fix those things, then I open Pandora's box to be able to do a lot more capabilities, and my data becomes a commodity. Data is more like in OT, like it is in it today, where I can send almost unlimited data to the cloud. Obviously, I have to pay for it, but there's no, there's. The bottleneck is financial, not bandwidth, whereas in OT, it's still a bandwidth and latency issue. But five G and six G has the opportunity to lift that up and then AI added on top of that, it's a ten x multiplier in OT, from what I see.
[00:27:13] Speaker C: Okay, that's really interesting. Yeah. Most of the tabletop exercises I've been to have been very manual. It's like you're in a conference room, you have the red team, the blue team, you have some managers in the room and they just have an Excel spreadsheet that they fill out. So. Yeah, that's really interesting.
[00:27:31] Speaker B: Yeah. We even did them. The first one we did, we did a live stream. I did it with the founder, the CEO of the company, and we streamed it to YouTube and we actually played, we did a themed version of a red of a tabletop, and it was Star wars themed, and we were on the Death Star and the rebellion was doing a cyber attack against the Death Star and we were having to defend the Death Star against the rebellion. So we were deploying cybersecurity and sin stormtroopers, but it was still cyber related, so it was more fun. It wasn't as dry, but I was still, you know, you can see how you can still get the message across. You're still doing the cyber basics, you're still following your run books, all that kind of stuff. You're just having fun with it. Right. It's a lot less dry and people aren't, aren't dreading it. I can start in making it more available to more people so I'm better trained. I can have more people involved and make it more fun. Then more people are like, yeah, let's go back, let's do another one next month. And next month let's do, you know, the Wild west or, you know, football or badminton or whatever. The thing is, you can make the themes unlimited by, but still the core of the message and the learning is still the core principles of what, what you're trying to teach your staff.
[00:28:46] Speaker C: Yeah, that's. That's really interesting. Yeah. Because whenever we talk about telecommunications, if we don't make it fun or if we don't have examples for people, then they're just lost, like, oh, we don't care.
So, yeah, definitely. That's. I mean, that's everywhere in technology. You need to make it engaging for everyone because otherwise no one's going to really pay attention. And so whenever we've all taken the.
[00:29:10] Speaker B: Class where the instructor is super smart, but they're dry and you just fall asleep, like, you know, you can't pay attention. Doesn't matter how intelligent the person is, it's not enjoyable. So it's almost impossible as a human to pay attention for very long. The more engaging we can make it, the more entertaining we can make it, the more likely more people will pick up on it and it'll be more widely adopted and people will stick with it and all that kind of thing. So let's make it fun. It doesn't have to be dry.
So what are some of the biggest hurdles that you see overcoming, that you'll have to overcome in 5g or six g adoption or from a architecture or engineering perspective, especially related to cyber and even in ot?
[00:29:52] Speaker C: Yeah, that's a really good question.
So it's going to be a multi part answer. So I think in terms of research, the biggest challenge we see in research right now, like I mentioned, six g is coming out in 2030. It's going to be very difficult for us to anticipate how exactly is AI being used right now. So we're see, we see, for example, we see the metaverse is a big trend we see, but it's really difficult to actually see how is this going to look like in 2030. So whenever we develop these standards, because I'm on the standards team and we're saying, okay, we want to standardize 5G, that all the operators like T Mobile at and T Verizon, Huawei, all of these different companies all over the world, they should use five g the exact same way. And so that's a challenge, is how do we collaborate with these global teams and say, yes, all of us agree six g is going to be exactly like this. And so that's really the biggest challenge we see in research is because it has to be a global collaborative effort. And so it can't just be, you know, the US interests and forget about Europe or China, because even China is actually involved with these standards. So sometimes that involves a collaboration and cooperation with all these different countries. So that can be a challenge. And then in terms of other hurdles that I've seen in five g and six g is, you know, 5g has been out, but a lot of people still don't have access to 5g, right? Because they have to actually create these cell phone towers. You know, they have to phase out three g, four g and replace it with 5g. So maybe when in 2030, when we see six g coming out, maybe then people will have more access to. They might not have access to six g right away, but it's, we have to not only research it and create the standards and create that technology, but actually deploying that technology does take time just because it's so involved and sometimes can be really resource intensive. So that's really? The other challenge that I see from.
[00:32:06] Speaker B: I know one of the issues I've heard is with 5g is it can support a lot more bandwidth, but the 5g signal doesn't have the same. The distance that a 4g does. Right. So I can have one 4g tower and it covers more. More, you know, a diameter bigger than a 5g tower wheel, which means I need more 5g towers to cover the same area as a 4g tower. So that's why what I've heard in a lot of, hey, heavily populated areas, big cities, et cetera, you're going to get 5g. But when you go out in rural America, I'm less likely to get it unless I'm on like a major highway or something like that. When I get off in the sticks, I'm less likely to have 5g. What about six g? As far as the coverage, etcetera, is it similar to 5g or.
[00:32:49] Speaker C: We're not sure yet. We're thinking it's similar to 5g, but right now it's just, what do we think six g will look like? So it's not going to. We're not going to define that until probably 2030. So that.
[00:33:02] Speaker B: Right.
[00:33:02] Speaker C: But right now, based on the discussions, I can tell you it's going to be similar to 5g.
[00:33:09] Speaker B: Sure, yeah. And by that time, hopefully we have better, you know, wider adoption of the 5g. So especially if it's similar to that, then the transition could potentially be easier. And that's the other good piece is, you know, you definitely want. Especially the world is so much more accessible now than it was 50 years ago, 100 years ago. I can be in London today on a plane. I want my phone to just work wherever I go, whether I'm in the Middle east or Asia or wherever I'm at. I want my phone to just work now, maybe I need to pay my provider for the rights to be on that network, but still, I don't want to have to exchange hardware.
It should work wherever I go. So that's a super important piece to this. Like you said, with six g is really making sure that we do have a standard that works across the globe, because all in all, we are all the same. We're on the same planet. Like the difference between here and Asia. From a technology perspective, yes, we're different countries and we have different religions and all that different stuff, but from a technology perspective, we're a lot closer together than we ever have been in history. So those are big reasons to make sure that we're working together, not against each other in those ways as best we can, obviously.
[00:34:32] Speaker C: Right? Yeah. Whenever we develop any standards for three g, four g, five g, and now six g, it's always a global collaborative effort, which people might not be aware of, but it's not only the US and Europe, but also Asia. Right. India, China. So we have not only Nokia, but also at and T, Verizon Orange, which is a french carrier. Just all of these different companies have to all agree on. Yes. 5g. We agree that it will look exactly like this or six g. We agree it will look exactly like this. And sometimes we have options, right? Maybe in China they want to do it one way. So we have an option for China and then we have an option for the US, but ultimately, we're all on the same planet, and we all have to agree that, yes, five G and six G will be like this, and everyone in the world will have access to it.
[00:35:24] Speaker B: So, yeah, that's awesome. I mean, yeah, I'm gonna go to. I'm gonna go to dinner with my wife after this for a date night. And it's hard enough just for us, the two of us, to decide where we're gonna go to dinner. So I can't imagine trying to convince people from all over the world, in multiple countries on a technology as complicated as six g. So thank you for all the work that you're doing. I applaud you for that.
[00:35:46] Speaker C: Yeah, it's like six meetings every year in different countries. So six meetings. Just imagine traveling to six different countries every year and having a discussion, and then that's, like, one version, and so, like, this happens multiple years to actually get it standardized. So, yeah, it's a lot of back and forth.
[00:36:06] Speaker B: Yeah. Exciting stuff.
So how. Obviously, looking at your LinkedIn and the stuff that we talked about before, I know one of the other things that you're extremely passionate about is women in cyber and getting more women into technology spaces. So talk a little bit about your experience as a woman in technology and the pros and cons and why you do it, and you seem to be very excited and passionate about the work that you're doing. So I love to give you an opportunity to chat about that and talk about opportunities for women to get in, like, why you're in it and why you love it and all that kind of stuff. Right?
[00:36:41] Speaker C: Yeah. So I think one thing is that women in cyber, or really we need anyone in cyber. We need everyone in cyber. We need not just women, but really anyone in cyber, if they're interested in it, we need more people in technology, because to solve these challenging problems, you need to see the problem from different perspectives. Right. Maybe you and I, we're both in the US, and we might need people from other countries to provide their perspective on this challenge as well, because we're seeing that with AI, it's really biased towards the english language and it's not accounting for foreign languages. So, yeah, definitely we need diversity in cyber, and I think especially for women in cyber. So I have mentored a lot of women, and a lot of women are scared to enter cyber because they say, we won't belong there, we don't belong there. There's not a place for us. Right. So I try to tell everyone that we need everyone in cyber. We need your perspectives as a woman in cyber because you might solve a challenge in a different way. You might have a new idea. If you think about it, research is all about new ideas, thinking outside the box. And so we need people to be able to think outside the box like that. So definitely, I would say if there are any women listening to us or watching today, don't be scared of following your dreams. If technology is something you're passionate about, go for it. Don't listen to people when they say you don't belong here, you do. And cyber, there's so much to it, right? We're talking about Ot and it, but there's so much to it. So maybe you're a teacher, you want to go into cyber, you can. There are so many different jobs. There are governance, risk and compliance. There's project management. There's red team, blue team, designing, coding. So there's so much in cyber, and I would say pretty much anyone could enter the field. It's just figuring out what it is you're passionate about and then pursuing that and pursue what you're passionate about. And don't really listen to people when they say you can't do it, because you can.
[00:38:55] Speaker B: Absolutely. I hundred percent agree with everything you just said. You know, I have three kids. One of them is, I have a daughter. I tell her the same thing, right, and I tell my sons the same thing. It doesn't matter. You know, don't listen to other people. You know, go into what you want. And we talked a little bit earlier about, you know, AI replacing jobs, etcetera. This is a prime example of something that we're going to need more jobs. The more AI and the more technology that we do, the more gaps that we have in the marketplace, right. Is we have, we have more roles that we need than we currently than we can fill. And to your point, I've always. I've had lots of very large teams and diversity. Diversity and thought that's the point, right? Divorce. It's about diversity and thought, right. Is as. I don't care what color you are, what race, nationality, any of those things. I want people that are excited about the job, that are coming in and not afraid to tell me their opinion, not afraid to challenge me. Like, I'm a tall person, I'm intimidating. You know, I'm loud. I have a beard. I'm six foot two, I'm, you know, 220 pounds. But I want people that are okay to challenge me. Right. I've been doing this a long time. I have a loud voice, but I'm not always right. I don't always know. I know what I know, but that doesn't mean that I know everything. It doesn't mean always know best. Right. We need people that are willing to challenge. They're willing to stand up and to the women that are, or anyone for that matter, that think cyber's not for me or I don't fit in there, I challenge that. Right. I think I interviewed a guy the other day, and he. He was a mechanic, an auto mechanic, and got into cybersecurity, doing cybersecurity, focused on vehicles. Right. And he took this non traditional path. Did he get into cybersecurity? But he absolutely fits. Like, I've had guys that were power plant operators that transitioned into this. Like, it doesn't matter what your background is. It matters. Do you have a different perspective? Are you passionate about? Is it something that you're willing to put in the work for? We need more people in this field that have that diversity of thought and diversity, you know, being willing to look at it outside the box and not just take the status quo because Aaron or somebody else said it was this way. Well, have you thought about this? Right. And being that schoolteacher will give you a different perspective than me being in cyber for 25 years? And all the experiences have I had, they're biased to the experiences that I've had where you've had different experiences. So I definitely. Look, look, it's one of the reasons why I brought it up. It's one of the reasons I volunteer at ICS Village and building cybersecurity, because we need more people in this space, and it's a really good space to be in. There's a lot of potential growth. There's a lot of opportunity, whether it's starting your own business or being a consultant, or doing product development or a programmer. There's just so many opportunities for this space for women and diversity and just everybody to get in. And the more people that are that we can get here, good folks that can help fight the good fight, definitely come on over.
[00:42:00] Speaker C: Right? Exactly. Agree with everything you said? Yes.
[00:42:03] Speaker B: Yeah. Okay. So we just said a lot what I'm gonna close out with in the next five to ten years. What is something that maybe you see coming up over the horizon that you're excited about, and what's something that maybe you're concerned about that we need to do something or it could be a problem?
[00:42:22] Speaker C: Yeah. So I'm going to talk about AI. So I'm really excited about six G and what six G is going to look like in 2030. That's six years from now. What is that going to look like? Will we have holograms in the future? And, like, the metaverse, how is that going to work? Because that's something we're actively looking at. Six G is maybe everyone's going to interact with avatars, and maybe that's something we need to use six G for. So that's something really exciting for me. But I'm also very scared of some of the different kinds of attacks that AI might be able to do because we're seeing that now with AI. People are using it, like we talked about, to craft different attacks. And one concern for me is this idea of misinformation and disinformation, because people are now using AI to create deepfakes you might have seen on the news. People are able to pretend to be, for example, President Biden and say, create a video that makes it seem like he's saying things when he's not actually saying those things. People are able to create AI images of, for example, Taylor Swift and create explicit images of her. Right. Which aren't real. But people are basically using AI now and generative AI in order to create fake images or videos to misinform the public and to make us think something that isn't true. So that is something I am concerned about. But I think, again, overall, there are a lot of positives with AI. We just need to be vigilant with, okay, this doesn't seem real or something's not quite right here, and just pay attention to that feeling.
[00:44:06] Speaker B: Yeah. And that's where we can use AI to protect against AI. Right. And that's where, that's where information is important. Right. You can't just assume, you know, you got to check your sources a and b, like, we said earlier with the website, you know, it looks the same. Are you sure? Like, does it seem like something that would be that way? And maybe there's ways that we can. We can use AI and tools to, you know, run. Run through. Is that. Is that a generated, you know, video right now, the video or a lot of the images that you see people using, you know, just normal stuff, using like, OpenAI and dolly for images.
Nine times out of ten, I can spot it from a mile away just because they, they seem to make the same type of images and it doesn't matter what it is. I could. Oh, that's an a generated. It's not a bad thing. I can just notice where it came from. But to your point, given enough, I mean, I do this podcast. I did, what, 50 episodes last year. There's hours and hours of me talking and on video. So somebody could take all of that and create a deepfake of me saying whatever they wanted to because I've got plenty of experience of examples of content with my voice and how I talk and the words and the language that I use and my mannerisms and my facial expressions. So obviously they could create a deepfake with that. So, yeah, that's definitely something that I've got on my radar as well. That's definitely something I'm hoping we find some solutions for pretty soon. So all that to say, thank you so much for coming. What is a call to action? What is somebody, if they want to reach out to you, maybe they want to get into cyber. They want to find you speaking somewhere, all that kind of stuff. Why don't you give us. Give us some of that.
[00:45:38] Speaker C: Yeah. Thanks so much for having me. The best way to reach me is LinkedIn. So find me on LinkedIn. I'm also on X, and I'll provide that information to you. That's probably the best way to reach me. I do provide free mentoring sessions to anyone who wants to get into cyber, so feel free to reach out. And then as far as what I have coming up, I do have a paper coming out the end of May at IEEe smartnets. We're basically going to propose a solution that uses AI and machine learning to prevent DDoS attacks in five G and six G. So that's something coming up that I'm really excited about.
[00:46:17] Speaker B: Outstanding. Yeah, we'll definitely put those links in the show notes, folks. So you're welcome to click on there and reach out and get those. That mentoring session that don't, don't, don't think that lightly like that's. A big opportunity, folks. So if you're looking to get into the space, you've got questions you're excited about 5G or AI or whatever, definitely, definitely hit her up for that. Same goes for me. If you all have questions or want to reach out, I definitely do the same thing.
Thank you for your time today. I really enjoyed the conversation. I'm excited to see what comes out with five G and read your paper as well. So thank you for all you're doing, and I look forward to meeting you in person one day.
[00:46:56] Speaker C: Thank you.
[00:46:57] Speaker A: Thanks for joining us on protect it all, where we explore the crossroads of it and OT cybersecurity.
Remember to subscribe wherever you get your podcasts to stay ahead in this ever evolving field. Until next time.