{"id":143271,"date":"2022-10-11T10:59:00","date_gmt":"2022-10-11T14:59:00","guid":{"rendered":"https:\/\/www.cyberark.com\/blog\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/"},"modified":"2026-04-17T04:32:52","modified_gmt":"2026-04-17T08:32:52","slug":"ep-13-cyber-fundamentals-where-things-fall-apart","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/","title":{"rendered":"EP 13 &#8211; Cyber Fundamentals: Where Things Fall Apart"},"content":{"rendered":"<p>Even when looking at layered enterprise solutions designed to thwart attacks and contain them, we must always go back to cybersecurity basics at the individual level. And that\u2019s what, on today&rsquo;s episode, guest Bryan Murphy, CyberArk\u2019s Senior Director of Architecture Services and Incident Response stops by to talk with host David Puner about. Murphy also dives into the importance of cyber hygiene as an essential preventive measure for protecting identities, as part of a defense-in-depth strategy. It\u2019s a perfect fit for October, which happens to be Cybersecurity Awareness Month (CSAM). Raise your awareness and give it a listen!\u00a0 \u00a0<\/p>\n<div class=\"transcript\" style=\"white-space:pre-line\">[00:00:00.120] &#8211; David Puner<br \/>\nYou&rsquo;re listening to the Trust Issues podcast. I&rsquo;m David Puner, a senior editorial manager at CyberArk,<br \/>\nthe global leader in identity security.<br \/>\n[00:00:18.210] &#8211; David Puner<br \/>\nBelieve it or not, humans are trusting by nature. Google it. If you don&rsquo;t believe me, you can trust at<br \/>\nleast some of those results, which is at least in large part to blame for our reflex to, among other<br \/>\npractices, click on that link or scan that QR code. To be socially engineered, to be phished. And that&rsquo;s<br \/>\nwhy even when looking at layered enterprise security solutions designed to thwart attacks and<br \/>\ncontain them, we must always go back to cybersecurity basics at the individual level. Cyber hygiene<br \/>\nas an inherent part of identity security as a part of a defense in-depth strategy.<br \/>\n[00:01:00.500] &#8211; David Puner<br \/>\nAt their core, the basics are about practicing distrust. Practice scrutiny. Think before you put yourself<br \/>\nor your organization on the brink of cyber apparel. Despite attacker innovation and evolving threats,<br \/>\ncyber attackers often play from an album of well-worn greatest hits. Sometimes they&rsquo;re incorporated<br \/>\ninto a new medley, and sometimes they inspire a new material, but the refrain is the same. And if<br \/>\nwe&rsquo;re individually familiar with the first notes of those hits, we can collectively stop them before they<br \/>\nplay through, because these are hits nobody from the trusting realm should have to endure.<br \/>\n[00:01:38.480] &#8211; David Puner<br \/>\nOn today&rsquo;s episode, I talk with Bryan Murphy who&rsquo;s the director of architecture services at CyberArk<br \/>\nand the leader of our remediation services team, and he&rsquo;ll talk about what that means and what he<br \/>\ndoes. Bryan&rsquo;s always fun to check in with and we do so regularly for the CyberArk blog, because he<br \/>\ncan talk about enterprise-level cybersecurity initiatives and solutions at a level that&rsquo;s simple to<br \/>\nconsume.<br \/>\n[00:02:02.750] &#8211; David Puner<br \/>\nThe complex cyber topics are inherently tied to basics, and in our conversation, the first of our<br \/>\nOctober episodes, October happens to be Cybersecurity Awareness Month, he makes the connection.<br \/>\nIf Bryan was a musician performing live, he&rsquo;d continuously find ways to keep his greatest hits fresh<br \/>\nthrough evolution. Stay on to hear why.<br \/>\n[00:02:39.070] &#8211; David Puner<br \/>\nYou&rsquo;re the director of architecture services here at CyberArk and leader of our remediation services<br \/>\nteam. Remediation and response teams, like the one you lead at CyberArk, are one of the first few<br \/>\ncalls companies make after a breach. How does that work? What&rsquo;s that call look like? What happens<br \/>\nin your world?<br \/>\n[00:03:00.310] &#8211; Bryan Murphy<br \/>\nFirst off, let me say thanks for having me. The call can go two ways. Number one is they could call us<br \/>\nbefore they&rsquo;ve called a forensics firm. I want to be a little transparent here that we do not want to do<br \/>\nthe forensics on these as the IR lead. We want to be like you introed it with the first few calls. What<br \/>\nhappens is that we can help them start to contain, start to understand what credentials were used.<br \/>\nBut normally we like to work with the forensics teams because what you find is the forensics teams<br \/>\nare good at what they&rsquo;re good at. They&rsquo;re good at discovering where they were, what accounts are<br \/>\nused, closing the doors the attackers were using to get in, but they&rsquo;re not fully versed in identity.<br \/>\n[00:03:48.050] &#8211; Bryan Murphy<br \/>\nThose recommendations and solutions they have, they want to lean on the experts in the industry.<br \/>\nWhat we do is we bring that experience, that blueprint, the framework we have, so that as they recover<br \/>\nfrom these breaches and incidents they have, the remediation team we offer to our customers fast<br \/>\ntracks anything the full IR team is doing. It allows them to shift their resources to other places<br \/>\nbecause they already have a plan on how they&rsquo;re going to control their identities going forward.<br \/>\n[00:04:20.200] &#8211; David Puner<br \/>\nSo are you about helping to come up with the plan for the plan, or are you about being like the Harvey<br \/>\nKeitel character in Pulp Fiction where you&rsquo;re cleaning up the mess, or is it a little bit of both or a little<br \/>\nbit of neither?<br \/>\n[00:04:33.400] &#8211; Bryan Murphy<br \/>\nI would say it&rsquo;s a little bit of both because it depends on the attack. Of course, not every attack is the<br \/>\nsame, but I like to say these attacks are very consistent, they have a lot of similarities to them. So as<br \/>\nwe start to draw from all of our experience, the framework becomes a little more consistent is what<br \/>\nwe can recommend. So now at a high level, if you&rsquo;re facing an incident and you call CyberArk for help,<br \/>\nwe already have a high level template to say this is what we&rsquo;re going to do, and then we can provide<br \/>\nthat to the forensics company, we can provide that to the customer to get a baseline, and then we<br \/>\ntweak the baseline based on the actual events that happen. So instead of going in and having to build<br \/>\nfrom scratch, we&rsquo;re building from that template or framework and we&rsquo;re just making tweaks to it so<br \/>\nthat we can control identities quickly and it doesn&rsquo;t become a discussion point, it doesn&rsquo;t become this<br \/>\nbig conversation before any identities can be managed within your organization.<br \/>\n[00:05:31.220] &#8211; David Puner<br \/>\nYou say \u00ab\u00a0we\u00a0\u00bb. How big is your team and how often are you actually the one receiving that call?<br \/>\n[00:05:37.580] &#8211; Bryan Murphy<br \/>\nOur team right now is very small. It&rsquo;s under five, but we have others within my architectural team that<br \/>\nhave experience in this field and have been doing this for years as well, they&rsquo;re just not fully dedicated.<br \/>\nFrom the rotation standpoint, the on call, 24 by 7 support, you can call CyberArk just to our standard<br \/>\n24 by 7 number for support. They have a procedure for engaging us, nothing special, that a customer<br \/>\nhas to do or a prospect on their side. We do run the globe, we do run 24 by 7. One point I wanted to<br \/>\nmake on the \u00ab\u00a0we\u00a0\u00bb. For us, the \u00ab\u00a0we\u00a0\u00bb is the forensics team, customer or client, and CyberArk. So when I<br \/>\nsay we make a decision, we&rsquo;re not trying to come into these incidents and replace anyone&rsquo;s opinion or<br \/>\nanyone&rsquo;s decision making powers on how to do things. We really want to be there to provide the best<br \/>\nguidance possible.<br \/>\n[00:06:31.810] &#8211; David Puner<br \/>\nWhat would the first question you would ask be when you pick up that call?<br \/>\n[00:06:36.730] &#8211; Bryan Murphy<br \/>\nI would ask, where are we at now, and I would start specifically with asking, was this a domain based<br \/>\nattack? Did they take over active directory? Because right away there&rsquo;s a few very prescriptive things<br \/>\nwe would do if it&rsquo;s related to active directory. If it&rsquo;s not related to active directory, we may start at a<br \/>\ndifferent phase than we would have for our standard blueprint.<br \/>\n[00:07:01.490] &#8211; David Puner<br \/>\nOctober when this episode releases is Cybersecurity Awareness Month. This year&rsquo;s Cybersecurity<br \/>\nAwareness Month theme is about seeing yourself in cyber, which is all about the people part of<br \/>\ncybersecurity. Inspired by that theme, how did you get into the cybersecurity field and when did you<br \/>\nfirst see or envision yourself in cybersecurity? What led you here?<br \/>\n[00:07:24.220] &#8211; Bryan Murphy<br \/>\nWe&rsquo;re going to go in the Wayback Machine, Dave.<br \/>\n[00:07:27.020] &#8211; David Puner<br \/>\nAll right, I like that. Let&rsquo;s do it.<br \/>\n[00:07:29.100] &#8211; Bryan Murphy<br \/>\nAlmost 17, 18 years ago. It started out at my previous job before I came to work at CyberArk. I worked<br \/>\nin, let&rsquo;s call it IT operations, maintaining a platform doing these type of things. I was brought into a<br \/>\ntabletop exercise for an incident and they were practicing how they would respond if they were<br \/>\ncompromised in any way. We went through this and I said, \u00ab\u00a0Wow, this is amazing. This is great.\u00a0\u00bb It led<br \/>\nme down the career path with them to move into security and start to lead some of these and be part<br \/>\nof the actual incidents that happened within that organization. Once I left there and came to work for<br \/>\nCyberArk, I did the normal deployment, standard things that we would do, but because I already had<br \/>\nsome experience and interest in these type of engagements, as customers would call us and say, \u00ab\u00a0We<br \/>\nhad an incident happen, how can you help?\u00a0\u00bb my team knew that I was the one with experience.<br \/>\n[00:08:26.710] &#8211; Bryan Murphy<br \/>\nI got brought into each one of those or I&rsquo;d be providing guidance to the larger team on what we can<br \/>\ndo. Now you fast forward 7-10 years, let&rsquo;s say that process kept growing little by little. It wasn&rsquo;t a<br \/>\nbusiness we wanted to have here at CyberArk. But what we realized is it&rsquo;s not about what we want to<br \/>\ndo, it&rsquo;s about what do our customers need? We figured out that we were getting more and more calls<br \/>\nfor customers saying, \u00ab\u00a0Help me recover from this. Help me figure out how to do this better.\u00a0\u00bb And<br \/>\nbecause of that, we decided to form a team. That&rsquo;s why the team is small right now, we&rsquo;re not pushing<br \/>\nto be that forensics company. We&rsquo;re pushing to really service our customers in their time of need. If<br \/>\nthe need becomes larger, we&rsquo;ll make the team larger.<br \/>\n[00:09:16.550] &#8211; Bryan Murphy<br \/>\nIn a real short way, that&rsquo;s how I got involved in this, it was purely out of inquiry, interest on my side and<br \/>\nthen just the fact that I was fortunate enough to put myself in a position to work on these early on in<br \/>\nmy career, that I was able to turn that into a full-fledged team here at CyberArk.<br \/>\n[00:09:37.990] &#8211; David Puner<br \/>\nWhat kind of attacks are you seeing a lot of or more of these days? We know attacks are happening<br \/>\neverywhere and often, but what particular kinds are you seeing now that are potentially sophisticated<br \/>\nor different than what we&rsquo;ve seen in months or years past?<br \/>\n[00:09:55.260] &#8211; Bryan Murphy<br \/>\nI would say one of the biggest differences we&rsquo;re seeing now is the MFA bypass. I&rsquo;ve been saying this<br \/>\nfor four years. Other vendors have as well. MFA everything and you&rsquo;ll be secure. That was the mantra<br \/>\nwe were living on there for a while. Now since the majority of organizations are MFAing, we&rsquo;ll say<br \/>\neverything, the majority of their solutions, we&rsquo;re now seeing the threat actors being able to bypass<br \/>\nMFA. They&rsquo;re finding ways to do this, so now, we were looking at it from a strategy before we were<br \/>\ndoing Zero Trust, Least Privilege, and those were the big buzzwords, we were saying MFA. Now the<br \/>\nattackers are finding ways around this. That becomes interesting because that&rsquo;s that first line of<br \/>\ndefense into the organization.<br \/>\n[00:10:47.240] &#8211; Bryan Murphy<br \/>\nI think the other trend I&rsquo;m seeing is, back in the day, you would hear this person, John, obviously<br \/>\nkeeping the names anonymous here, John attacked this company or this group of people did this<br \/>\nattack. Any more with the dark web and with crypto, you&rsquo;re starting to see organizations form and<br \/>\nshare more information. Maybe in the past they had the skill set to bypass MFA, they couldn&rsquo;t do<br \/>\nanything else. They&rsquo;ll sell that access they have to a different group, and now that different group that<br \/>\ndoesn&rsquo;t know how to bypass MFA is already in and then they can do the next step. Our adversaries are<br \/>\naligning to attack and work against us, and this is making it difficult because they don&rsquo;t have to be<br \/>\nexperienced in everything. They&rsquo;re specializing in getting into our organizations. We as security<br \/>\npractitioners and experts need to make sure we&rsquo;re doing what we can to have that defense.<br \/>\n[00:11:46.970] &#8211; David Puner<br \/>\nWhat does MFA bypass look like and is that similar to MFA bombing, MFA fatigue? All these things<br \/>\nthat we&rsquo;re hearing a lot about these days?<br \/>\n[00:11:59.090] &#8211; Bryan Murphy<br \/>\nIt&rsquo;s similar but an MFA bypass could be, let&rsquo;s say, a vulnerability or a weakness in a configuration that<br \/>\nthey found where they can truly just bypass MFA. Maybe they find a way to take the cash credential<br \/>\nand move it through without ever being prompted for MFA, but you also have those attacks as well.<br \/>\nWe&rsquo;ve seen recently where they&rsquo;re saying MFA bypass has happened in some of the organizations, but<br \/>\nreally, you do the MFA bombing, these type of things. It&rsquo;s more about getting the user to be socially<br \/>\nengineered, to trick them into approving it. Humans are trusting by nature. This is shifting a little away<br \/>\nfrom security for a moment but we&rsquo;re human by nature and we&rsquo;re very trusting by nature. It&rsquo;s very<br \/>\ndifficult to get people to flip that mindset to say, \u00ab\u00a0I shouldn&rsquo;t click on it. I shouldn&rsquo;t do this.\u00a0\u00bb<br \/>\n[00:12:49.480] &#8211; Bryan Murphy<br \/>\nWe genuinely want to help in whatever we do. This is where the fatigue comes in, this is where the<br \/>\nbypass comes in that they can just click on something and accidentally let somebody else in because<br \/>\nthey want to help make the message go away. This is where security training and everything we&rsquo;re<br \/>\ndoing is teaching them that, no, it&rsquo;s okay if you get a hundred of these messages. That means that<br \/>\nyou really need to rotate your credentials so you stop getting the messages, not clicking on it to make<br \/>\nit go away. This is the educational point that we have to train people on just because of the way the<br \/>\nhuman mind is built.<br \/>\n[00:13:24.060] &#8211; David Puner<br \/>\nMFA is still important, right?<br \/>\n[00:13:27.180] &#8211; Bryan Murphy<br \/>\nAbsolutely, without a doubt. It still needs to be one of the number one controls we deploy, but the<br \/>\nmindset needs to shift from some of the messaging that&rsquo;s been out there. I think we&rsquo;ve all seen it in<br \/>\nthe security industry where they&rsquo;ll say, \u00ab\u00a0MFA blocks 99% of these type of attacks that happen.\u00a0\u00bb And<br \/>\nthat number, I think, is going down a little bit because MFA does block, but it also relies on the human<br \/>\nuser. If the human user accidentally clicks yes, we&rsquo;re seeing this more and more, they push someone<br \/>\nthrough, we have to understand that we need to work on that next layer as well and have that<br \/>\ndefensive down.<br \/>\n[00:14:04.270] &#8211; David Puner<br \/>\nLet&rsquo;s say I&rsquo;m on the receiving end of an MFA bombing. What should I do in that case?<br \/>\n[00:14:11.310] &#8211; Bryan Murphy<br \/>\nI can give you a personal real world example here that may be fun for the audience. I was at Black Hat<br \/>\nof all places. Super scary. I say super scary from the standpoint that someone could be hacking your<br \/>\nphone, hacking your account, we&rsquo;ve all heard the horror stories. They have the wall of shame over<br \/>\nthere of people who are giving their credentials up inside the Black Hat Networks. I&rsquo;m out to dinner<br \/>\nwith my team and I receive an MFA push on my phone. I went, \u00ab\u00a0Huh, that&rsquo;s odd. I didn&rsquo;t log into that<br \/>\nsite. What&rsquo;s going on?\u00a0\u00bb I didn&rsquo;t know what it was, it only happened once. I didn&rsquo;t get a bomb, I didn&rsquo;t<br \/>\nget multiple attempts. But right away there, I went ahead and I rotated my password.<br \/>\n[00:14:52.840] &#8211; Bryan Murphy<br \/>\nThe reason I rotated the password was if somebody had my password and tried to MFA in, they would<br \/>\nhave to then know the new password to try to MFA in again. I don&rsquo;t want to leave the story there and<br \/>\nsay this is just what I did. The root cause of this was, it was a site that I share with my wife and my<br \/>\nwife is trying to log in, but my device was the only MFA device. She didn&rsquo;t tell me she was logging in<br \/>\nbut this is why the prompt came to my phone. Completely legitimate prompt that came through,<br \/>\nbecause we didn&rsquo;t communicate that that happened, I went ahead and immediately changed the<br \/>\npassword just to be safe to make sure that the account wasn&rsquo;t compromised.<br \/>\n[00:15:28.420] &#8211; David Puner<br \/>\nWhat other kinds of attack trends are you seeing these days?<br \/>\n[00:15:32.060] &#8211; Bryan Murphy<br \/>\nI think the biggest we&rsquo;re seeing is a shift from trying to deploy malicious code and having\u2026They&rsquo;re<br \/>\nexecutable, running on your systems to living off the land. This is not a new trend as in it just started,<br \/>\nbut this is a trend we&rsquo;re seeing gain momentum. What the attackers are doing is they&rsquo;re trying to<br \/>\nmasquerade as the identities you already have in the organization. They&rsquo;re trying to masquerade as<br \/>\nstandard users. So when you look at traffic, you threat hunt, you do these things, it becomes<br \/>\nincreasingly difficult to figure out who&rsquo;s the attacker and who&rsquo;s the trusted user on your network.<br \/>\n[00:16:16.430] &#8211; Bryan Murphy<br \/>\nAs they do this, what you find is they could use their own specific tools to do work. But instead, once<br \/>\nthey&rsquo;re living off the land, if you have a tool in place and they have access to it, they will go read the<br \/>\nguide and figure out how to use your tool, and they&rsquo;ll start using your tools against you. This becomes<br \/>\nimperative for the defense in-depth that we don&rsquo;t just look at, we&rsquo;re deploying security tools to secure<br \/>\nour environment. We need to look at, we&rsquo;re deploying security tools that we need to secure as well,<br \/>\nbecause if the bad guy gets it, they&rsquo;re going to use that tool against us.<br \/>\n[00:16:54.340] &#8211; David Puner<br \/>\nYou mentioned defense in-depth earlier. How does Least Privilege and Zero Trust fit into this<br \/>\nequation?<br \/>\n[00:17:01.580] &#8211; Bryan Murphy<br \/>\nGlad you asked that question, Dave. Zero Trust fits in because in the conversation we were just<br \/>\nhaving, we said we can&rsquo;t tell who is our attacker and who is our trusted user on the network, and<br \/>\nthey&rsquo;re masquerading as each other. But if we have Zero Trust, what that means is that users are not<br \/>\ngoing to have access to anything additional once they&rsquo;re in the environment. If we never trust them,<br \/>\nthey constantly have to reauthenticate or conditionally authenticate to gain access to different<br \/>\nassets. This is a balancing act and I tell all of my customers, the goal is obviously Zero Trust, but Zero<br \/>\nTrust may not be 100% attainable on all your applications that you have. What we should do is we<br \/>\nshould be doing Least Privilege as far as we can, and take Least Privilege as close as we can to Zero<br \/>\nTrust, with Zero Trust being the North Star, but understanding we may not get 100% there with all of<br \/>\nour applications in our environment.<br \/>\n[00:18:07.030] &#8211; Bryan Murphy<br \/>\nBut if we practice this and we think of it as tightening a screw and we keep turning down the<br \/>\nprivileges, we remove them slowly but surely, we&rsquo;ll eventually get to a point where, when an account is<br \/>\ncompromised, they bypass their MFA, they do an MFA bombing attempt, they have some way to get<br \/>\non our network, they&rsquo;ll have very little access. It puts another control in that defense in-depth where<br \/>\nthey can&rsquo;t get further within the organization to get to the actual data that they&rsquo;re looking for. This is<br \/>\nwhere everything ties together, this is why you&rsquo;re seeing Just-In-Time access. I know you didn&rsquo;t ask<br \/>\nabout that one, but Just-In-Time, Zero Trust and Least Privilege and why it&rsquo;s so important for everyone<br \/>\nto really start looking at this holistically within their environment and where they can deploy these<br \/>\ncontrols.<br \/>\n[00:18:52.600] &#8211; David Puner<br \/>\nYes, I think that&rsquo;s an important point you brought up about the balancing act, and I know we&rsquo;ve talked<br \/>\na little bit about this in other places. Do you want to elaborate a little bit on that metaphor? Because I<br \/>\nknow you like to go deep on it and I think it&rsquo;s a really interesting area.<br \/>\n[00:19:08.940] &#8211; Bryan Murphy<br \/>\nAbsolutely, and I&rsquo;ll end it with a story of an actual incident I worked years ago on trying to do exactly<br \/>\nthis. But yes, the problem I see is that we get excited. We like these new controls and we say, \u00ab\u00a0Yes,<br \/>\nthis is going to make our environment safer. It&rsquo;s going to keep our business safe. We should do this.\u00a0\u00bb<br \/>\nBut what we don&rsquo;t understand initially is either the technical debt that we have to work through,<br \/>\ntechnical debt being legacy configurations, certain user accounts, the way the business functions,<br \/>\nand not disrupting that, because security needs to make sure they enable the business still to get their<br \/>\njob done.<br \/>\n[00:19:51.190] &#8211; Bryan Murphy<br \/>\nThis is where the balancing comes in. An example of this I can give you is I had a customer years ago<br \/>\nthat wanted to do shared accounts. A shared account would be an administrative account instead of<br \/>\nbeing personally tied to Bryan, or personally tied to you, David, it would be a generic account, say,<br \/>\nserver admin, server admin 1, server admin 2. They wanted to go this route and they were in the<br \/>\nmiddle of just recovering from an incident. They said, \u00ab\u00a0Now&rsquo;s the time. We need to do this.\u00a0\u00bb Told them,<br \/>\n\u00ab\u00a0Don&rsquo;t do it, don&rsquo;t do it\u00a0\u00bb I said keep everything the same and slowly start turning on these permissions<br \/>\nand gradually move people over to these accounts.<br \/>\n[00:20:30.490] &#8211; Bryan Murphy<br \/>\nThey just wanted to capitalize on it because of internal corporate reasons. They hadn&rsquo;t had funding,<br \/>\nthey weren&rsquo;t able to move on. Just to help you with the justification as to why they chose to do this<br \/>\nright away. As they did that, what they found a year later was they ran into a singular roadblock, they<br \/>\ncouldn&rsquo;t figure out how to get a file share access or if I remember correctly, something along these<br \/>\nlines to the shared accounts, and it ended up stopping the whole process. What my message here is<br \/>\nto everyone who&rsquo;s listening is that if you just make that absolute change and you move over, the<br \/>\ntechnical debt may come back to stall the North Star you&rsquo;re heading towards because you don&rsquo;t know<br \/>\nhow to solve one problem or you don&rsquo;t have time to invest in this part that you weren&rsquo;t planning for,<br \/>\nand then it never takes off.<br \/>\n[00:21:20.650] &#8211; Bryan Murphy<br \/>\nWhereas if we would have done it originally where we said, \u00ab\u00a0Okay, we&rsquo;re still using personal accounts,<br \/>\npersonal admin accounts, let&rsquo;s remove who doesn&rsquo;t need it, let&rsquo;s start removing permissions from<br \/>\nthose.\u00a0\u00bb We could have slowly ratcheted this back and then migrated to those shared accounts. Little<br \/>\ntechnical example, but this is where it can be a trap, where we try to make this big shift and then we<br \/>\nend up not benefiting from any of the security features we wanted to deploy.<br \/>\n[00:21:46.860] &#8211; David Puner<br \/>\nI wanted to get back to tax again, briefly. Leveraging hard coded credentials. What&rsquo;s been going on<br \/>\nwith hard coded credentials and how are they being used to unlock high risk access?<br \/>\n[00:21:59.890] &#8211; Bryan Murphy<br \/>\nI&rsquo;m going to start, David, by saying it&rsquo;s nothing new. This is where many people who know me will<br \/>\nsay\u2026In the world of attacks that come, unless it&rsquo;s a nation-state targeted attack, these type of things,<br \/>\nmany organizations are hitting it where the attackers are just playing the hits. They&rsquo;re playing the<br \/>\ngreatest hits of the records they have. They&rsquo;re using the same types of attacks, so when you look at<br \/>\nthis, they know to scan the environment. They know to look for certain places where credentials will<br \/>\nbe embedded. For example, you may have software that needs a configuration file, and that<br \/>\nconfiguration file may hold the credential to something. They&rsquo;re going to know this. They&rsquo;re going to<br \/>\nlook for it or they&rsquo;re going to say you&rsquo;re using this piece of software, look at that software and see if it<br \/>\ncontains this in the online documentation.<br \/>\n[00:22:48.420] &#8211; Bryan Murphy<br \/>\nThis is part of that living off the land and finding what they have access to. It&rsquo;s really important that<br \/>\nwe make sure we remove those credentials from our scripts, from our applications, config files and<br \/>\nplaces where they live. It&rsquo;s not just enough to encrypt them. Encrypting helps so they can&rsquo;t see the<br \/>\npassword in clear text, but it&rsquo;s just an extra step. The idea here is not to minimize the extra step, the<br \/>\nidea here is to have so many steps in the process that our threat actor or attackers here, let&rsquo;s say, give<br \/>\nup or can&rsquo;t get any further in the environment. Not give up that they don&rsquo;t get what they want, they give<br \/>\nup because we detect. They give up because we found they were on our network.<br \/>\n[00:23:37.250] &#8211; Bryan Murphy<br \/>\nThis is really the goal. The goal is not to say don&rsquo;t encrypt. The goal is not to say don&rsquo;t have<br \/>\ncredentials in your scripts. If you have it hard coded in there, that&rsquo;s making the path easier for them to<br \/>\nretrieve the credential, this is why CyberArk recommends using our solution and our capabilities to<br \/>\nremove those embedded credentials because it adds a step in the process, making you more secure.<br \/>\n[00:24:03.270] &#8211; David Puner<br \/>\nThey rotate the embedded credential, but do you see customers doing that?<br \/>\n[00:24:10.390] &#8211; Bryan Murphy<br \/>\nWe don&rsquo;t, and I&rsquo;m glad you brought this up, David. You reminded me of a great point, which is<br \/>\ncustomers should take their service accounts and, forget about all the automation we can put in place<br \/>\nfor a moment and do this. They should at least rotate their credentials once. Please don&rsquo;t go in your<br \/>\norganization and rotate them all at the same time. We should methodically do this one by one.<br \/>\n[00:24:34.970] &#8211; David Puner<br \/>\nWhat happens if you do try to do it all at the same time?<br \/>\n[00:24:38.930] &#8211; Bryan Murphy<br \/>\nYou may inadvertently take down applications you weren&rsquo;t aware of. We&rsquo;ve seen this firsthand from<br \/>\ncustomers where they&rsquo;ll use CyberArk, they&rsquo;ll bring in service accounts and they just say password<br \/>\nchange. Next thing you know, there&rsquo;s five, 10 P1 tickets that applications are down. A lot of times it&rsquo;s<br \/>\nbecause the developer had access to a credential. They went ahead and built application A, but now<br \/>\nthey took over application B, they needed the same access. They leveraged the same credential, but<br \/>\nnobody else knew that they did this, the application just worked.<br \/>\n[00:25:15.510] &#8211; Bryan Murphy<br \/>\nWhat I hear from all of our customers at CyberArk is, \u00ab\u00a0How do I discover where my service accounts<br \/>\nare used at?\u00a0\u00bb We have detection tools, there&rsquo;s tools out there to detect a lot of places it&rsquo;s used, but we<br \/>\ncan only detect the places we know. It becomes very tricky when they embed it into an executable,<br \/>\nthey put it into a script somewhere that you&rsquo;re not scanning for and looking for the password field, or<br \/>\nthey call it in a very unfamiliar way, for how the credential is embedded. If you just do that manual<br \/>\nrotation once, what happens is, let&rsquo;s say you think it works for one application, you go to rotate the<br \/>\ncredential for that one application, you schedule the change and you take down 10. All of a sudden<br \/>\nwe&rsquo;ve created this major P1 incident.<br \/>\n[00:26:02.090] &#8211; Bryan Murphy<br \/>\nWhat you can do is go back in and reset the credential back to what it was before. This goes on the<br \/>\nnotion, you know what the credential is ahead of time. Sometimes there&rsquo;s cases where you don&rsquo;t, but<br \/>\nthis helps minimize the damage because we can restore back quickly so we don&rsquo;t have to touch and<br \/>\nfind every application. Now we know that when we change this one credential, it doesn&rsquo;t impact one<br \/>\napplication, it impacts, in this example, 10. We can start to break those apart slowly through the<br \/>\nprocess, and that identification and inventory of what you have is very helpful, but it also helps from<br \/>\nthe security side by at least rotating those service confidentials once, to start to expire all the hashes<br \/>\nand everything that&rsquo;s out there in the environment that the attackers would use to move laterally with<br \/>\nthose accounts.<br \/>\n[00:26:50.340] &#8211; David Puner<br \/>\nMoving on back to Cybersecurity Awareness Month. Your appearance on the podcast happens to<br \/>\ncoincide with Cybersecurity Awareness Month, as we mentioned at the top of the podcast, and that<br \/>\nseems apropos considering you live and breathe cyber awareness 365, 24\/7, or at least it seems like<br \/>\nyou do to us. What&rsquo;s something simple you&rsquo;re seeing that both cybersecurity professionals and<br \/>\nregular civilians might benefit from, as far as a little cyber hygiene brush up?<br \/>\n[00:27:19.990] &#8211; Bryan Murphy<br \/>\nI would say go look at your passwords. I think every one of us has a specific password that they like<br \/>\nto use or a combination of it in most of the things we do, and we have to set that first password or<br \/>\npasswords to generic sites that we go to. What I try to recommend people do is use a password<br \/>\nmanager solution. CyberArk has workforce password management as an example. Anything that&rsquo;s<br \/>\nout there that can help you randomize those. Because what you have to assume is that when you put<br \/>\nthat password into a website, that website, that back end, you&rsquo;re trusting will not be impacted,<br \/>\ncompromised in any way. Once you put the password into that tool, it&rsquo;s out of your control, where it<br \/>\nlives at, it&rsquo;s on the company or the website you&rsquo;re working on&rsquo;s control. So as you see recent breaches<br \/>\nwhere they compromise websites and different web applications that are out there, credentials are<br \/>\nbeing exposed.<br \/>\n[00:28:19.600] &#8211; Bryan Murphy<br \/>\nWhat I try to do is, I don&rsquo;t want to say it&rsquo;s impossible, it&rsquo;s something I do, but a unique password for<br \/>\nevery single site you go to, it&rsquo;s not for everyone. What I&rsquo;ll say is I try to keep what I do for enjoyment,<br \/>\nsuch as looking at fantasy football, reading blog posts, those type of things, separate from what may<br \/>\nfinancially impact me. This is the line I draw between the two. I don&rsquo;t use anything the same between<br \/>\nthe two of those because they&rsquo;re held to different security standards on the back end, but for me, it&rsquo;s<br \/>\nmore impactful if I lose money versus somebody is able to hack into my CNN account.<br \/>\n[00:29:04.770] &#8211; David Puner<br \/>\nWhat&rsquo;s your advice for someone considering a role in cybersecurity?<br \/>\n[00:29:09.010] &#8211; Bryan Murphy<br \/>\nMy advice to those looking for the role is start following cybersecurity groups online. Start following<br \/>\nthe blog posts, start following the industry as to what&rsquo;s happening first. That&rsquo;s going to help tee up-<br \/>\n[00:29:25.100] &#8211; David Puner<br \/>\nLike the CyberArk blog, right?<br \/>\n[00:29:27.740] &#8211; Bryan Murphy<br \/>\nYes, this blog, exactly. That&rsquo;d be perfect. Start here and start to understand the trends, start to<br \/>\nunderstand the mindset. I think that the hardest thing to do is to flip the mindset that we have as<br \/>\nsecurity practitioners. Once you start to do that, now you dip your toe into the certifications and<br \/>\nunderstand the concepts. I think one of the biggest challenges we have in cybersecurity is, you can&rsquo;t<br \/>\nsecure something if you don&rsquo;t know how it works. You can&rsquo;t say this is how you have to secure it<br \/>\nwithout understanding how Windows or Linux or the web browser is working that you&rsquo;re working<br \/>\nwithin. It requires a little bit of knowledge about the underlying system that you want to secure or the<br \/>\npassword or credential you want to secure.<br \/>\n[00:30:13.670] &#8211; Bryan Murphy<br \/>\nThen you can start to see ways to control that. You can read through the settings of the tool to see<br \/>\nwhat controls they offer. A lot of times some of them will say, this is good, this is better, this is best.<br \/>\nThis will help you to get that mindset and to figure out how to secure things further. Then beyond that,<br \/>\nyou want to start dipping into an IT role or position.<br \/>\n[00:30:38.130] &#8211; Bryan Murphy<br \/>\nAs you start in the IT side, you want to align with the security team. Now you&rsquo;ll start seeing how<br \/>\ninternally the security team operates and functions and what controls they have, and that&rsquo;s how you<br \/>\ncan start to make that move into security. It&rsquo;s not to say you can&rsquo;t find a security role out the gate, you<br \/>\nabsolutely can, but I really feel the balance is making sure you understand the tech before you go into<br \/>\nimplementing security controls on top of the tech.<br \/>\n[00:31:04.120] &#8211; David Puner<br \/>\nBryan, thanks so much for coming on the podcast. Appreciate it.<br \/>\n[00:31:07.880] &#8211; Bryan Murphy<br \/>\nDavid, thank you for having me.<br \/>\n[00:31:09.920] &#8211; David Puner<br \/>\nAppreciate it. Thanks for listening to today&rsquo;s episode of Trust Issues. We&rsquo;d love to hear from you. If<br \/>\nyou have a question, comment, constructive comment preferably, but you know, it&rsquo;s up to you, or an<br \/>\nepisode suggestion, please drop us an email at trustissues@cyberark.com. And make sure you&rsquo;re<br \/>\nfollowing us wherever you listen to podcasts.<\/div>\n","protected":false},"featured_media":214341,"template":"","class_list":["post-143271","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 13 - Cyber Fundamentals: Where Things Fall Apart | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 13 - Cyber Fundamentals: Where Things Fall Apart\" \/>\n<meta property=\"og:description\" content=\"Even when looking at layered enterprise solutions designed to thwart attacks and contain them, we must always go back to cybersecurity basics at the individual level. And that\u2019s what, on today&rsquo;s episode, guest Bryan Murphy,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T08:32:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"28 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/\",\"url\":\"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/\",\"name\":\"EP 13 - Cyber Fundamentals: Where Things Fall Apart | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-3.jpg\",\"datePublished\":\"2022-10-11T14:59:00+00:00\",\"dateModified\":\"2026-04-17T08:32:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-3.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-3.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 13 &#8211; Cyber Fundamentals: Where Things Fall Apart\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 13 - Cyber Fundamentals: Where Things Fall Apart | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/","og_locale":"fr_FR","og_type":"article","og_title":"EP 13 - Cyber Fundamentals: Where Things Fall Apart","og_description":"Even when looking at layered enterprise solutions designed to thwart attacks and contain them, we must always go back to cybersecurity basics at the individual level. And that\u2019s what, on today&rsquo;s episode, guest Bryan Murphy,...","og_url":"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-04-17T08:32:52+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-3.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"28 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/","url":"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/","name":"EP 13 - Cyber Fundamentals: Where Things Fall Apart | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-3.jpg","datePublished":"2022-10-11T14:59:00+00:00","dateModified":"2026-04-17T08:32:52+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-3.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-3.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-13-cyber-fundamentals-where-things-fall-apart\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"EP 13 &#8211; Cyber Fundamentals: Where Things Fall Apart"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/podcast\/143271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media\/214341"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=143271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}