In this episode, Raj Krishnamurthy sits down with Josh Bressers, VP of Security at Anchore and longtime leader in the open source security space. With decades of experience, Josh brings a candid and compelling perspective on everything from the chaos of early cybersecurity days to the nuanced challenges of SBOMs and compliance in today’s world.

Josh reflects on how he entered the security world before there were formal certifications or programs, how community and curiosity fuel innovation in open source, and why the relationships you build are often the most valuable asset in your career. He also dives into exciting new work with the SBOM Everywhere Working Group and shares how GenAI is helping categorize the sprawling ecosystem of SBOM tools.

Key Takeaways:
✅ GRC teams often overburden themselves with audits.
✅ Embracing a product manager mindset helps GRC teams drive security initiatives.
✅ Technical knowledge empowers GRC professionals to enhance security programs.
✅ Changing perceptions of GRC within organizations is crucial for success.
✅ Proactive strategies can elevate GRC’s role and reputation.
✅ Integrating privacy into GRC frameworks strengthens compliance efforts.
✅ High Trust certification is achievable on a budget.
✅ Automation can significantly improve GRC efficiency and reduce redundancy.
✅ Overlapping audit timelines minimizes disruption and streamlines processes.
✅ Discipline from endurance sports fosters focus, resilience, and growth.
Listen now to gain actionable insights and elevate your GRC strategy.

🎙️ Security & GRC Decoded is brought to you by ComplianceCow.

Learn More About How ComplianceCow Can Help Your GRC Team Today!

🚀 Enjoying The Show?! 🚀
Make sure to rate and review the show to let us know you’re enjoying the content!

Subscribe now for expert insights from industry leaders shaping the future of security & compliance.

Learn More / Connect with Josh Bressers
If you enjoyed this conversation and want to dive deeper into Josh Bressers’s insights on GRC, cybersecurity, and building effective security programs, connect with him directly:
💼 LinkedIn: https://www.linkedin.com/in/joshbressers/
🌐 Company: https://anchore.com/

uh-huh Uh-huh [Music]

Hey hey hey Welcome to security and GRC decoded I’m Raj Krishna Morti your host

and we have the awesome amazing and multi-talented multiaceted Josh Brussels with us today Josh is responsible for

security at Anchor He’s a hacker host of a hacker history podcast and has led

security and products at uh Elastic and Red Hat Josh welcome I’m so excited to be here Raj Thank you so much for having

me No thank you Josh So let’s get started Josh before we talk about you what is one controversial opinion that

you hold All right so I don’t know how controversial this is but I am of the

opinion that no one will do compliance or security out of the goodness of their

heart that these things are generally secondord functions Be it you have things like compliance or legal reasons

maybe your insurance is telling you you have to do it or if we make it the easy way This is where something like Rust is

one of my favorite examples where Rust automatically comes with a bunch of free security and people aren’t using Rust

for the security They’re using Rust for all this other stuff It’s just security kind of comes with it And this is one of

those things that I have the conversation many times where there are a lot of security people that think like “Oh people will do security because it’s

right.” I’m like “I don’t think so I think people will only do security if you make them do security or it’s the

easy default.” Okay that’s that’s interesting Can I call you the Yesb dude

Josh if if you like I mean I would I would give that title to Alan Freriedman who’s he’s at SISA and he definitely is

like the godfather of the esbomb But I I do love sbombs I do a ton of with sbombs right now I’ve got the company I work

for Anchor We do SSBOM management We’ve got an ESBOM generator an open source tool called CIF that’s like very very

popular I head up a group at the OpenSSF called ESBOMB everywhere where we’re trying to bring ESBOMs into some of the

open source world which is that that’s a bag of snakes in its own own right But then I also I I help out with various

working groups like at SISA and kind of anywhere I can just to just to further sbombs because I think they’re really cool and I really like what what we can

do with them and I’m looking forward to the things we can’t imagine yet that we’re going to do with them someday

Totally Um so let’s talk about you Josh How did you get started in security

technology I mean that’s a long story but I’ll give

you the very short version is I am a child of the ‘9s right I’m a gentleman of a certain age we’ll say now but when

I really started paying attention to technology it was the heyday of these

hacker groups like you had cult of the dead cow and you had loft and there was all this new technology and open source

coming out and you know when you’re a poor college kid a poor high school kid and you want a development environment

you want a Unix workstation and you don’t have you know $45,000 to buy a son

All this open source all this Linux stuff was really the thing to use and the thing to learn And so I feel like I

existed in this just like perfect nexus of like amazing security people that I really wanted to understand what they

did and be like them There was this open-source universe that just I I loved and it intrigued me And I’ll never

forget is when I was very young I would tell people I want to either do security work or I want to work at Red Hat like

that’s my dream and I ended up doing security work at Red Hat So I’m like nailed that one No that’s beautiful And

so you and then you moved from Red Hat into Elastic Is that is that right And then Yeah that’s right That was that was a lot of fun I So obviously Red Hat I

was at Red Hat during we’ll say the heyday of open source where we had a lot of conversations where people would be like “Oh that open source thing I don’t

know if that’s going to catch on.” And I mean I’ll never forget I had a boss at my first job that was like “You’re a smart kid Stop using this open source

crap like you’re wasting your life You know you Windows Windows is the future And of course being young and filled

with passion It’s like no no open source is the the only way It’s it’s it’s we’re going to win And it did I mean thank

goodness But but yeah so and then Elastic was kind of when all of the big data started becoming a thing right

where we had these the ability to ingest you know gigabytes and terabytes of data

and start understanding it and knowing what it was And so you know I I I won’t say open source was boring but I feel

like we kind of figured out a lot of the open source challenges So I’m like big data like that’s where I want to go next And so yeah I spent I think six years at

Elastic and I learned an amazing amount And even now I still run Elastic Search in my basement and anytime I see any

data of any sort it goes into Elastic Search and we start poking around at it It’s really a lot of fun I love it a lot

And then I would say kind of once the data thing I got you know I got my my cut my teeth in there and I I started

figuring that out I feel like the the whole open source supply chain esbomb thing became well I’ll say hip I don’t

know if I call it the hip thing but it it it is where my interest went And so then when when Ankor called I was like

ah this is it Like I’m in Yeah So you’re you’re a you’re a Linux dude you’re a

security dude you’re an SBOM dude you’re a maybe a supply chain dude Let me ask what is your opinion of uh the the crowd

strike falcon Can I dare to say the fiasco Uh what what is your opinion of

that It was a fiasco for sure I mean it’s amazing when one company has such

market share that they can just crash the world which is bananas I was actually funny enough I went on vacation

the week after that happened and I was flying Delta and I remember sitting my family down and I was like we might not

get to go anywhere like we’re going to find out And I remember we we got on the airplane in the morning and we flew to

Atlanta and I was like we might be spending a couple days in Atlanta like just to prepare everyone We didn’t thank

good we were very late getting out of Atlanta but we made it out so it was it was good But anyway so the whole crowd

strike thing I I think this is a really good lesson in the just the the supply

chain and and safety universe is where I would put it And and I bring up safety because anytime you have a system that

fails this is something that there’s a a friend of mine Tom Pierre He he wrote a blog post called I am not your supplier

is kind of his claim to fame But he also does a lot of safety work and I’ve learned a lot from him and I talk to him whenever I can about this But if you

look at failure of complex systems it’s never like one thing There’s always like

10 or 20 or a whole bunch of little things that all have to fail in in their own spectacular way to come together And

CrowdStrike was very much this right How many times had they pushed out these sort of updates to the world right

Multiple times per day And we’ve never seen an incident like this And it was you know this combination of it was a

very specific kind of update it had a very specific test that wasn’t checking this one thing that they did and it all

came together And I think this is kind of one of those lessons that we can take as you know GRC types where you have to

take a step back after an event like this and and take a good look at it and say like how could we have made sure

this didn’t happen and make sure it never happens again because I can promise you that particular failure mode

is never going to happen again at Crowd Strike guaranteed There are other things that could happen but that one is

certainly not right They know what they know what they did So what is your take um uh Josh that is it my and I’m not

trying to play blame games here but is it Microsoft at fault or for opening up the kernel updates to vendors or is it

the vendor’s fault crowd strike in this case for doing a bad patch resulting in a blue screen of death I mean you can

blame everybody You can blame the people who are running Crowd Strike Why were these organizations running software in

this way that they weren’t doing any testing on updates They were just pulling this stuff in and deploying it They didn’t have the ability to fail

over to something else Crowd Strike yeah certainly should not have pushed a bad update I mean that’s a no-brainer

Obviously Microsoft’s will say difficulties in working with these endpoint vendors in the way the kernels

access Yeah but again this comes back to remember when I said when complex systems fail like a whole bunch of

little things go wrong Those are all of the little things that had to go wrong in order for this to fail And so you can definitely spread the blame all over the

place I mean fundamentally at the end of the day the view I take on things like this and this comes from my days at Red

Hat when we would ship a lot of open source software If you ship it you support it So we can explain how

everyone could have done different things but I think at the end of the day this is like it’s CrowdStrike’s product

It broke Yeah you can blame everyone else but like Crowd Strike is holding the bag at the end of the day I think

Got it No that’s a that’s an interesting perspective Do you think sandboxing techniques like u if I if I can use ebpf

as a sandboxing technique that we have on Linux something like that could have

not avoided but at least mitigate can mitigate some of these issues I mean

probably everything I understand from what I’ve read says yes But at the same time like if you have a system that on

boot is just instantly crashing or making things not work that’s not it’s not going to matter if it’s sandboxed or not I mean if you have some sort of

endpoint you know protection running in place and it doesn’t allow any network access Like who cares if it’s in the

kernel or EPF Like you’ve broke everything I guess the one advantage is theoretically it might be easier to fix

Maybe I don’t know but I I don’t think eBPF is necessarily the magic bullet

that some may have claimed it was It it we’re just trading some problems for

other problems I think that the problems with EPF are probably less horrific than when you’re you know like literally down

in the kernel but it’s certainly not a silver bullet for this problem Got it And so I think it brings us back to

sbombs And for the for our users listeners what problems do you think Sbombs solve All right so I’m going to

define an SSBOM first just to set set the stage here for anyone who doesn’t know As sbomb software bill of materials

and the idea being you have this document that tells you what is in a

thing It could be a computer can have an asbomb of all the software on the computer You can have an application where let’s say I’m getting what we’ll

say crowd strike from a vendor and they give me an sbomb and it tells me everything inside of that application because as we know nobody’s writing all

their their code You’re using like 80 90% open source in in every single

public survey I’ve seen to date The number is just amazing how much open source is out there Like open source

truly won The dog caught the car Now what But it it’s it’s absolutely everywhere And so the purpose of this

document is to help convey what is in like what are the parts I’m using to build my stuff And this is not a new

concept When you buy let’s say a lawn mower it’s not uncommon at all that in

the back of the manual you have a list of every part they used You have diagrams showing where the parts go And of course this is for maintenance

reasons often that that you know oh this screw broke What kind of screw was it Let’s go buy a new one And it’s the same

basic idea for software right like why why do we treat software as this magic black box that we don’t know anything

about on the inside versus saying I want to know what’s in the stuff you’re selling me and then we can use that

information to do things like say when there’s an incident with a log forj we

can say do we have log forj running in any of our stuff have we ever had log forj running in any of our stuff the

history of this is what makes it really fun because these are JSON documents you can easily store this kind of goes back

to my whole elastic universe we can put them all into a system forever and then we can query back and

say like three years ago what was I running in this application like what was there was log forj there and so

that’s part of the fun of this is you can go you know way back in time because they’re they’re not huge documents they’re very easy to store got it and

and and this I’m I’m connecting this back to your earlier comment on Thomas DP right and the and the I’m not a

supplier article so are the incentives stacked well enough because as you

rightly said we consume open source at a extraordinarily high rate right and are the incentives stacked enough in the

open source community to build the right software security products and how do we go solve if not I I don’t think so the

way I describe this is I I say open source owes us nothing these are people that have written software they’ve put

it on GitHub they’ve added it to a foundation they’ve done whatever and if you look at every open source license that exists at the very beginning in all

capital letters it says this software is provided as is like there There are no guarantees that come with this You are

using it at your own risk essentially And I I don’t think it’s on open source to secure open source I mean I’m not

saying they’re like running around trying to be insecure but I think especially like log forj we saw this a

lot where you had these like Fortune 500 companies sending questionnaires to open source developers and they’re like I

work on this on Saturday afternoon Like I’m not answering your freaking questionnaire Like you have people who do this Go figure it out yourself And I

think this is one of those instances of like if you ship it you support it It is not open source’s job to do your

homework for you Like you’re using this open source It is your responsibility to understand what am I using and then at

the end of the day I have to deal with the fixes because I’m the one shipping product that contains this

code Totally And how do you fit see sbombs fitting into this the the the

notion of supply chain security Maybe it’ll be helpful to first describe what is your notion of supply chain security

and then how is bombs fit into it I don’t think anyone knows what supply chain security really is It’s I mean

look the way I kind of view it is when we go from a developer working on a

thing all the way to that thing going into production be it I’m selling software to you I’m deploying SAS I’ve

got an API running somewhere there are stages along the way right where you have a developer writing code you have a

developer pulling in open source dependencies you send it off to CI/CD you send it off to build it ends up

getting into the production system somehow maybe you’re compiling code there’s all these steps along the way

And I think we’ve created these very intricate and complex systems over the years and we just kind of gave them all

a pass for a long time I mean you probably see this all the time in the compliance world Raj where the focus the

obsession is with the thing I’ve deployed at the very end right When you’re going to get like your FedRAMP

compliance when you’re getting your PCI compliance it’s historically simply focused on like the thing I deployed

right It could be a complete mess over there to the left We don’t care because

that’s not what we’re that’s not what we’re auditing right My report doesn’t say anything about what’s going on over there And so I think this whole notion

of supply chain security is starting to lift that curtain and looking everywhere now At the same time I think we’re

seeing you know we’ve been talking about shift left for what like five years now and there’s this obsession with what

developers are doing but there’s also like a ton of stuff between developers and deployment that we’re not paying

attention to very well I mean and if you look at things like the the XZ incident

you had the Solar Winds incident those were like in the build systems Yep Who’s talking about I I feel like sometimes I

feel like this is madness because most of the successful supply chain attacks are happening like in the middle between

developers and deployment yet our obsession is with developers and deployment and it’s like look at what’s

going on here So anyway back to your question So sbombs right This is where

we can do things like we can take a snapshot of what is on the developer system We can take a snapshot of what

are the dependencies the developer is using we can take a snapshot of like what’s in CI what version of the

compiler did we use to build this stuff Like if you ask most people that they’re like I don’t know like GCC it’s like no

no no that’s not the version that’s the compiler’s name there are versions of it

and you know same thing where once you start to deploy things you can say like this is what I deployed this is what the

system looked like I deployed it on and then you can also do you can like rescan

it and say like this is what it looked like today this is what it looked like a week later why did all this stuff change

nothing was supposed to change and so that’s really what sbombs are giving you at this point is You take snapshots many

many times along the way and now you’re saving a reasonable size document versus like let’s say you’re working with

container images If you have you know a 1 gigbyte container image and you you snapshot it 10 times now you’re storing

10 gigs now do that you know five times a day and your your storage costs get out of control And so that’s kind of the

the power of these things Now granted we have a long way to go We are not in a place that we can do this successfully

today without a lot of just heroic and heavy lifting But that is the idea and I

think that’s what makes them so interesting and useful What scares me Josh is the are these transitive

dependencies and the depth at which you need to go right because software is made of software which is made of

software and it keeps going on So any advice in terms of how people should think about this I mean look transitive

or not it’s your dependency Again if you ship it you support it And I I this is

this amuses me always because I I have this argument sometimes People like “Oh we’re only going to scan the dependencies we added.” It’s like “No

that’s ridiculous If you ship it you support it It doesn’t matter It doesn’t matter if you added it or if something

five layers deep added it.” Like you still need to know it’s there Now there are some challenges because let’s say

you have a security vulnerability in something five layers deep you generally can’t just go update that You have to

get everything along the way to update itself So like that’s one of the challenges we see in this space that we don’t have necessarily good solutions

for But at the end of the day like transitive or not it’s your problem I don’t care Like stop making excuses and

fix your software No I I love what you’re saying If you ship it you support it I love it I mean that’s a very simple

effective tagline So is ESBOM a security necessity for companies building commercial software It it’s becoming one

I think if you look at a lot of the the the regulatory landscape and what it’s starting to look like we’re seeing ESBOM

demanded in more and more places For example like the in the United States you’ve got the FDA is

mandating them for device manufacturers We’re seeing the federal government is is they’re saying if you’re a vendor to

the federal government you need to supply us bombs I we all know how that works It’s it’s an unfunded mandate So

it’s you know this is the executive order Yeah Yeah Right Exactly Well there’s executive order but then we’ve

got like uh SISA has their SSDF questionnaire You’ve got um I think it I

I forget which organization it was but they put out guidance that said like every software vendor has to provide sbombs to whoever you’re selling

software to We’re seeing things coming out of Europe There’s like the the CRA

you’ve got NIS 2 they’re doing these these regulations that are requiring

ESBOMs And and it’s funny because we chatted the other day and I said “Oh I forgot what CRA means.” And I I I’ll

make sure I know And I’ve already forgotten So Cyber Security Resiliency Act Thank you H I I always forget Cyber

Resiliency Act I don’t think it is Yeah Yes But like that’s one of those things that are telling vendors in Europe like

you need an ESBOM And so again I think back to my my initial controversial statement You know people don’t do

things unless they have to And I think ESBOM is one of those Like it’s easy to say “Oh we should all make Sbombs.” And

we’ll all say “Yes that’s that’s a great idea.” But it it they’re not free Like you have to have infrastructure to do

this You have to have a place to store them You have to have a way to distribute them And so when it come when

the hard problems show up it’s easy to be like “Ah we’ll do it later right?” And then later never comes versus when the government starts saying you have to

absolutely do this Now it changes Now that also though the way these are written is you also need esbombs from

your suppliers So like if I’m selling you software that you as a company are going to say give me your sbomb and then

you give the asbomb you know you pass it on along the chain So that’s one of the things that we’re starting to see in the

space And do you see by maybe a I I don’t know if it’s a contro

controversial question or not and maybe a dumb question even Do you see publishing sbomb as a security threat

No No I I don’t think so I mean this is one of those things you’ll get people arguing back and forth about it you know

it’s intellectual property What software I have that the bad guys could look at it and figure out what’s going on I

think security through obscurity has never never worked And I think this is the same thing I mean you can maybe make

the intellectual property argument where you don’t want a competitor to know what open source you’re using or something

but I feel like it’s weak But regardless you don’t have to publish an ESBOM in public you can just give an sbomb to you

know whoever you’re selling to to your customer and and tell them like this is IP You can’t share it And that that’s

just the way it is I mean any sort of business relationship you know we got NDAs we’ve got the the protection of

intellectual property That that’s not uncommon And I think this is actually one of the the challenges ESBO has had

is in the early days when the NTIA in the US was was behind ESBOMs They put

out some guidance that sounded like you had to make them all public which people got a little up in arms about And that’s

not what their guidance was supposed to mean but it’s kind of how it looked So there’s lots of facts and things that

say “Oh that this isn’t true at all.” But I mean you know how things go It it can be tough to to get those updated

sometimes What do you how do you generally rate uh the maturity of our industry especially

dealing with these risks I have a great question for you to to

that that will judge this Is there a compliance standard I can follow that if

I’m brought into court and sued because I have an incident I can say I followed these best practices I did the right

thing There’s no case here There is no such thing because every compliance report is co-signed right by the auditor

who supposed to evaluate risk and by the management who’s who supposed to state that I provided everything to the

auditor that you know on which they are basing their evidence on so it’s a shared responsibility and each can

escape the other right and I think that’s one of the problems I mean there are industries where you can show

evidence that you’ve taken the we’ll say correct precautions and when the

accident happened It was not because you weren’t doing what you were supposed to do in terms of like say human safety or

something like that right Versus that’s where you get into kind of negligence versus just expected failure modes I

feel like in the world of security in IT security we’re still immature enough that we don’t have like we don’t have

the ability to say if you take the standard and you follow these instructions the odds of you being

breached are going to go down significantly Like you see the same thing with insurance How how often do you see your cyber insurance provider

say you have to follow this standard because if you do that like you’re not going to get breached as often and and

we don’t have that today I’m hopeful we will get them but that’s that’s kind of the the thing I keep in my mind all the

time is the industry I would call it mature when we have guidance that we

know works And I feel like a lot of our guidance often feels like you know kind of chicken bones and and voodoo

So maybe okay I I see your point So your point is that I think it goes back to the first comment that you made So your

point is that if with a proper regulation and I’m using the word regulation loosely and compliance

essentially an oversight body your argument is that a lot of these problems

can be mitigated Is that is that a fair thing to say I mean hopefully Now I I

will I’ll point at PCI as I think something that has shown promise I feel

like before PCI was as widespread as as it is you had horrific security breaches

where people I mean I remember a decade ago I feel like I got a new credit card every 3 months right And I I don’t think

I’ve had mine replaced in more than a year at this point which is I mean it’s pretty nice because it’s pain in the butt every time you get a new credit

card But I feel like PCI is one of those examples where some of this guidance appears to actually be having a positive

impact of what’s going on Now I’m sure I could find plenty of people to argue with me that that PCI is stupid and it

doesn’t do anything But like I’ve known I I you know what I have a story I can tell is I remember back in my early days

this was early early 90s I was working as an intern at a very tiny ISP and we

there was a a local marathon that was like we want people to be able to register online for the marathon and

enter their credit card number and then we’ll charge them We were just writing credit card numbers into a SQL database

Like there was no HTTPS that nothing was encrypted And I think about that and I’m like that’s nuts But I bet everyone was

doing that That was probably not uncommon right And now obviously PCI has guidance that says like absolutely not

You cannot do any of these things You have to encrypt the data You can’t collect entire card numbers You know

there there’s so much that you have to do And again I feel like when I look at like the credit card industry it feels

more secure than it did 10 or 20 years ago And so that I feel like is progress But I don’t always feel the same way

about all the other guidance Now I’m not I’m not dismissing compliance or security standards because I have no

doubt if we did not have what we have today things would be way worse than they are because like as weak as some of

these might be like as as nondescriptive as as ISO 27,0001 might

be I know we we chatted about that you know before the show It is very loose

and it is not well defined But I I think part of that problem is just we don’t

we’re learning right It takes a long time to figure this stuff out And you also the other challenge is in the world

of like compliance and standards If you put out bad compliance that’s sometimes

worse than no compliance And so I think they’re being very careful and measured

in what they’re trying to define versus being you know fast and loose and everyone being like “These people are

idiots We’re not listening to them ever again.” No I I love it Josh But let me ask you this How prescriptive should

compliance standards be Should they tell you what you should do I think yes Like I love the NIST 853

guidance I feel like it’s it honestly I think it could be more prescriptive in many instances I think I I love Fed RAM

for this reason Like when you’re trying to get Fed RAM compliance it is very specific about what you should or

shouldn’t do in many cases And I like that And the reason being how many security people do you know that you

would just say are completely overworked and they’re like running everything at 110% all the time right That’s that’s

every security person ever one of them And so by by not being very prescriptive

by be by having these more descriptive style compliance standards that puts a lot of mental strain on an already

mentally strained person And so they’re going to make mistakes They’re going to forget things are going to leave things out And yeah maybe auditors will catch

some of it maybe they won’t I mean when you have an auditor going through you know hundreds and hundreds of controls

they suffer from the same sort of fatigue everyone else does where I mean how many times have we been there where

just like copy paste copy paste copy paste whoops I’ve been pasting the wrong thing for the last 25 minutes I’ve got

to go fix them all you know because you just you you get tired and you don’t see these things and and you’re looking at a

sample of 20 for a size set of two two million 20 million records right Yeah Yeah Exactly Exactly

So I mean that that’s kind of my view on that But at the same time every environment is different and so it’s

very hard to have this very prescriptive guidance that says like you have to do exactly this because that doesn’t always

work I mean and again this I I’ll I’ll like turn the the light back on the ESBOM universe Like this is I feel like

it’s very it’s very understandable in that context where if you scan 10

applications and then you look at the software in them they might not have anything in common right Because they’re

like so grossly different So how do you provide guidance for those 10 things And now the the average enterprise has

thousands of things running at it Do you want thousands of different guidance documents for every one of those I mean

that sounds maybe worse I don’t know Maybe it’s better I can’t say That’s a beautiful argument But I feel that

you’re arguing on both sides Josh On one hand you’re saying it should be prescriptive On the other hand you’re making a case that it cannot be

prescriptive Yes I’m ex doing exactly that 100% Okay I’m not here Here’s how I

look at it though right As the person that’s trying to secure things I want very prescriptive guidance We I I have

customers that like we Ankor has their a a a product that does esma management We

do like vulnerability scanning policy enforcement things like that And our users say like I don’t want to figure

this crap out Like give me a policy that does what I want it to do They want something that has all the rules in

place and they don’t want to have to like read something and interpret it and figure out what it means right So as a

practitioner I want something to solve my problem But now as a vendor or as a

person existing in a world where we’re defining some of the compliance standards I understand the challenges

here Now how do we how do we bring these both of these sides you know kind of together in the middle I do not have an

answer for that But I think it is what we have to do We have to be more clear

because if we if we don’t have good guidance that really tells people like this is exactly what you need to do and

this is why you need to do it I think we don’t see the kind of progress we want to see If if a very smart person like

Josh does not have an answer who do you think has an answer I I don’t think anyone does I mean I think this is one

of the challenges you have when you have like a new industry I’ll I’ll tell you I I told you this story early but I I’ll

tell it for the audience So there is a a story I have about air brakes on trains

So back in the day when you see like the the old timey trains they had those like wheels on the top of the cars Those were

brakes and people would run back and forth on top of a train and they would spin those wheels to stop the train

because every brake was connected to one of those wheels and people would obviously fall off the train You fall off the train you’re dead Like that’s it

And it was horrific and there were lots of accidents and then someone invents air brakes and air brakes obviously

solved this problem because now people aren’t running back and forth on top of trains It took 80 years from the creation of the air bra until the the

regulators finally said like that enough like air brakes you’re using air brakes no more people on top of trains and how

how old is it I mean granted C is like 50 so we’ve got 30 more years to go

there But you know a lot of the stuff we’re doing it moves so fast and it’s so hard to keep track of And so that I

think is one of the extra challenges we have is it is really I mean like ESBOM is a great example I I mean what 2 3

years ago most people have never even heard of them And now it’s something that gets talked about all the time Well

what does that mean How do we how do we turn some of the things we can do with asbombs into you know useful compliance

into useful regulations and so we we don’t know today but now this is part of

the like human experience of being in any field is we have to learn we’re going to make mistakes we have made

mistakes we’ve made a lot of mistakes but that’s how it is but what we need to do is we need to make sure when we make

mistakes when there are challenges when things don’t make sense that we take good honest looks at them and say like

let’s figure out what happened and let’s make it better I do think in a lot of the computer security world and cyber

security we do not do a good job of learning lessons and making changes in

the future I think we could do better there and I think that would help a lot And what do you say to people

that this idea of compliance right or conformance stifles speed and innovation

I mean it might It probably does But that’s okay too right Because you need

some level of sanity I mean like move fast and break things is fun when you’re a social media site It’s not fun when

it’s my pacemaker you know I think there’s different levels of how things

work in the industries you’re in Like I don’t want my food manufacturer trying random things for flavors that no one’s

ever eaten before and we don’t know if it’s safe or not Like that’s terrifying right I mean honestly if you look at

food at the turn of the century in the early 1900s it’s kind of what they did I’m just like I just throw some of this

in there It’ll probably be fine And and it was horrifying right There were like people literally died And so I think

that’s one of the things we have to start reconciling is now that everything is becoming technology I mean you can’t

hardly buy a thing that doesn’t have a microprocessor in it now And so what does that mean How do we regulate it How

do we make sure we don’t kill a whole bunch of people And unfortunately an enormous amount of regulation is written

in blood And I would like to say that that it will avoid some of that but I I

I don’t know I mean I think history says we’re we’re going to learn some lessons and some of them are going to be pretty ugly Okay With engineers and product um

product guys right And even security compliance gets a very bad rap Why do you think that is the case Oh man It’s

totally our fault So so the stories I like to tell is I remember back in the days when I was a young security person

at at mostly at Red Hat is we would just show up and be like “Hey security’s here Everything’s going to be fine Like you

have just listen to us and we’ll solve your problems.” And developers were like “What are you even talking about Like none of this makes sense You don’t know

what you’re doing.” And I think security had this overinflated sense of importance for a long time And I think

we’ve kind of ruined our reputation quite a bit And so now when when you say like “Oh the security people are coming

They’re like h these guys like and and so I think the problem isn’t compliance

and the problem isn’t developers.” I don’t think anyone wants to develop bad code I think developers want to do things that help the company like being

compliant helps the company You can now sell to different markets You maybe have cheaper insurance whatever There’s a

million things that that it can be And so I just totally think it’s like that that whole attitude of security thinking

they’re smarter than everyone they’re better than everyone and just like get out of the way I’ll do it And no that’s not how any of this works And so I I

completely blame us It’s a human problem We screwed it up And I mean it’s funny because this is something I’m very aware

of And when I when I went to Anchor you know I’m like hatinand all the time when I go try to talk to someone and I’m like

“Okay here’s what I see.” Like you you tell me like “Does this make sense Are we doing the right thing In our yearly

compliance training or our yearly awareness training that I put together which I I I do it myself because like all the awareness training I found just

infuriated me and I’m like screw it I’m doing it my on my own And and basically I I keep pointing out I’m like look if

something happens just come tell me I’m not going to yell at you I’m not going to make you feel bad Like I promise you that is some security people you may

have worked with in the past I am not going to do that And I try my best to be as approachable and polite as I can I

tell people like if you’re buying your parents a computer you can ask me for advice and I will help you And and a

bunch of people have done things like that where you know they’ll come ask me like “Oh hey I need a password manager for home My kids’s going to college What

kind of stuff should I do?” And I think that’s part of it is like I I work really hard to build that goodwill

because someday I do have to show up and be like “We have to do this horrible thing you don’t want to do We have to you know delay this release We we have

to fix this package You don’t and it’s going to suck and it’s going to break a lot of stuff.” But when when you’re a

friend and you’re working together that’s an easier conversation than when you’re an adversary and they’re just

trying to get rid of you Oh beautifully said So to the to the security guys and girls that are watching this and your

peers you’re basically saying get off the moral high ground That’s what you’re saying We have no moral high ground Yeah

it’s it’s we’re we’re all we’re all on the same team Like just work together And I know that’s easy to say It’s hard

to do And especially if if security teams have been burnt in the past or I’m sorry developers been burnt in the past

by security teams it can be really hard to rebuild that trust like it’s it’s really tough for sure You have said

before that sbombs you see asbombs as an observability tool Can you explain for

our audience Yeah Yeah for sure So this I ironically this kind of hearkens back to elastic is elastic was used for

observability of software being what I mean by that is let’s say I have an application running and I’m going to pay

attention to what the application’s doing like what is the RAM use look like how much processor is using what is the

disk usage like how long our function calls taking there’s lots of things you can do right you collect all this data

and then you can look and and see like oh we see this part of the application gets slower when this part of the

application does this one thing right because you can start connecting all these seemingly unrelated events and it’s

super interesting and super powerful and I think like software bill materials feel very similar to me where we can

start looking at our software and it’s not the the executing part of it but rather the kind of development and how

it’s changing over time You can look at something like for example we could say we’re seeing developers are changing

this component on a regular basis like what’s going on why is that happening we can say we’re seeing like this new

dependency flowing through our systems like let’s understand what that means You could there’s so much information we

can start extracting from this and it it intrigues me like we don’t even know what we can do with it yet I mean I

think this is one of the things I learned from the big data universe is sometimes you don’t know what you don’t

know until you start poking at things and you look at trends and you can look and say things like something weird is

happening at 3:00 a.m every day in this application Why is that happening We could do the same thing with like an

esbomb You could say like why is it that on the 15th of every month we see all these dependencies start to change or

we’re seeing more dependencies added on a Tuesday or whatever like weird things And then we can start saying like why is

this happening And then once we start asking those questions we can start better understanding what our

development environment looks like what our supply chain looks like and then we can maybe make changes or maybe just be

aware that this exists at all That’s brilliant Josh I called you a Linux dude

Uh what did I call you Esbomb dude Uh I I’m I’m a security dude And I’m going to

add a data dude to it Yeah I’m an arbitrary data nerd I love data Um it’s one of my favorite things It’s so much

fun Like one of my favorite things I do kind of on the side is I I have I have two two projects I like to do where I I

take all the CVE data and I put it into Elastic Search and I create these like bizarre graphs Like actually um we’re

recording at the end of February and a couple days before we recorded the Linux kernel added 700 CVEes to the database

So when I’m looking at it like takes this huge spike up I’m like holy crap what just happened And then of course thanks to Elastic Search I could figure

out exactly why that happened which is cool Uh and the other thing I like to do is I take all as much open source data

as I can find about open source projects There’s this thing called ecosystems Um a fellow named Andrew Nesbbit runs it

It’s this like public API It’s an awesome service and I download like as much metadata as he has about all the

open source projects and you can watch them grow Like there’s literally hundreds of millions of open source releases in the world There are tens of

millions of open source projects in the world Like it is mind-boggling numbers and you can’t like as a human you can’t

wrap your head around it You can look at graphs and be like oh look at it go it’s going up exponentially That’s great Like

what are we going to do about this And again though I think that’s where like the whole ESBOM universe comes into play

is we can take this data and we can ask questions about it and we can say things like “Okay I have a dependency that’s

used by me and two other people That’s weird Like let’s figure out what’s going on here Did I just get hacked You know

have I downloaded the wrong thing I don’t know.” And so that’s where we can start combining all this data and really

having a lot of fun with it And I I just want to unpack what he just said because I think it is very profound What you’re basically saying is SBOM is loaded with

signals Oh yeah And it is and we we are still just trying to figure out what can

we infer from those signals and it can be huge That’s the point Yeah for sure For sure I mean I think today the the

the most common use case I see is just scanning for vulnerabilities where you say like I’m running version one version

1.5 has these vulnerabilities and they fix it in version 1.6 so I should upgrade to version 1.6 But there’s so

much more going on Like there’s so much fun data you can look at like how many files are there How big are they Where

did this stuff come from Like one of my favorites is we have this concept in our in the open source scanner sift that

Inkor works on where we call them known unknowns where you have a container right And there’s obviously stuff in the

container and you’ve got like you know the the operating system packages let’s say RPMs or Debian images You’ve got

like the npm stuff you installed So we can look at like all these things that got installed as part of your expected

development universe But what about this other crap that isn’t claimed by npm or

RPM or any any sort of package manager Where did that come from And sometimes you look at it and it’s stuff like oh a

developer accidentally copied a bunch of crap from their home directory into this this ESB you know into this container

And again that’s like some of the fun data we can unpack and unwind and and look at And um I I have a funny story

about that actually was um when I was at Elastic we had a release one time where

one of our customers we were not scanning with for we were not running an SPOM scanner at the at that time This

was way early days As scanners didn’t even exist honestly where a customer basically you know sends me an email and

they’re like “Hey why did the number of dependencies in this this thing you released double?” I’m like “What What

are you talking about?” And I went and looked I’m like “Oh holy crap they did.” And it’s because the developer accidentally packaged up all the

development dependencies with the production build And I’m like “Oh my goodness we look like idiots.” You know

and of course I made sure we weren’t going to do that again But you know it’s that kind of stuff where you can start looking at this and saying like “Our

dependencies doubled Why did they double What have we done We screwed something up?” Probably on a on a sidebar are we having

um a discussion around CVSS uh the CVSS scoring I mean the the

common vulnerability scoring system right Is there is there is there a big debate that is going on right now I mean

there’s been a debate for like a decade CVSs So we in in in the world of

vulnerabilities we love to crap on CVSS It’s not really CVSS’s fault So CVSS is

a scoring project from first.org or which I’m sure I suspect a lot of people are aware of first because they do a

whole bunch of compliance stuff but they have the the CVS common vulnerability scoring system and f this group has

created like this set of I guess metrics where you can say like this affects local network you you know you have to

be on the local machine it has oh I can’t remember all the all the

terms even now for it but anyway you you you kind of click all these boxes you say what the impact is you know like

does it impact confidentiality availability things like that very very normal GR RC things and then it gives

you a score and the score is intended to give you some sense of severity and of

course you’re supposed to apply this to your environment and understand how you’re using an application because like a good example is if I’m you know

writing a web server now we’re talking like network access versus if I’m just writing like

you know some tool that that runs against local data once a day like it

never touches a network those are very different situations and the CVS scores are going to be drastically different in those two environments Now there is a

project called NVD the National Vulnerability Database that NIST runs and they take CVEes and they give them

CVSS scores and we hate their scores We hate them so much and everyone knows

about them But what happens is and this is I I partially blame NVD for this I

partially don’t Like they assume the worst They don’t know how you’re using that library So they just assume people

are like parsing data off the internet with it And so they obviously the scores are very high much higher than they they

need to be And so I think CVSS gets a really bad rap in that regard because

what what we actually don’t like is we don’t like the way NVD is scoring things The problem isn’t CVS

Got it And and and first dog.org also publishes a model for exploitability

right a 30-day exploitability Uh EPSS EPSS Exactly So does that help does that

help address this issue I I I think so I mean so what we’re I think where we are

right now in the world of vulnerabilities is everyone is trying to find ways to prioritize this stuff We

used to just use CVSS and I think it has become abundantly clear that CVS is a terrible way to prioritize

vulnerabilities And I suspect all of the people who work on CVSS would agree with that statement 100% they’d be like “Stop

using this to prioritize vulnerabilities Like please stop stop hating us.” Um but

so EPSS is they’re looking at all of this kind of public data and it creates a a score between zero and one of how

likely is it that this vulnerability is going to be exploited in the next 30 days One being 100% because there is a

public exploit And obviously zero nothing is zero but you can be very very low And the number of things that are

highly ranked is very low because if you look at all of the data that’s out there it’s like 3% of vulnerabilities are ever

exploited in a given year Like the number is very very low Yet we’re running around crazy over every

vulnerability all the time And so the intent of EPSS is to start giving us this sense of like how important is it

going to be for me to fix this vulnerability Because the other thing the other thing that I think this also makes people hate security people is

there’s this like notion of zero CVEEs that that comes and goes every couple of years and it it’s it’s hip again Zero

CVE is just a fool’s errand right If that’s your if that’s your goal like

you’re going to hit zero CVE but you’re not going to do it in the right way This is 100% you know that that situation

where you just have these perverse incentives like the Cobra effect is one of my favorites right where it was uh

back in the many many years ago you had the British government telling you know folks in India if you bring us a dead

cobra we’ll pay you well you know the Indians being the entre entrepreneurs they are they started breeding cobras so

the cobra problem was way worse not better because now and then of course when the British government found this

out they’re like oh we’re not paying anyone they just let all the cobras go now it’s like way way worse than it was before you know and and I think the

challenges we have now is just how do we take all this data how do we take everything we understand and how do we

start making good decisions about it and we’re we’re we’re learning I mean there’s we have a long way to go but

there’s definitely a lot of interesting things happening in this space So I I feel like it’s better than it was a

couple years ago but I wouldn’t say it’s a solved problem at all Okay I want to come back to Sbombs Why are Sbombs so

difficult to generate Because software is complicated I

mean it’s getting easier There are many scanners that are doing a nicer job

We’re seeing some of the like packaging ecosystems are starting to just make

sbombs for you when you like Python is one of these that they’re just starting to add that ability into their build

tools which is 100% the right way to do this You’ve got other environments So like for example if you have CC code

like where did that CC code even come from You probably don’t remember I mean I’ll never forget I worked at a company fresh out of college that we had a a C

library in the product and one day I was like “What Where did this come from?” And they’re like “No one knows.” Like we

just have it Don’t ask questions Build it It goes in And it’s one of those things like “What What is this Where did

even and and in C that’s much harder.” Now there are a lot of tools like the the anchors tool sift makes it very easy

I’m not saying it’s perfect but we’re working really really hard to find more and more things and it’s constantly

evolving And I think making an sbomb today is a thousand times easier than it

was 5 years ago And I have no doubt in a couple years it’ll be a thousand times easier than it is now Like we’re making

a ton of progress in this space So it’s easy to crap on ESBO and say “Oh the scanners all suck and the data is bad and whatever.” Like to a degree but it’s

getting better And this is definitely one of those instances where like if you run an Esbomb scanner and it doesn’t find something report it It’s a bug

right Report it as a bug And and like I from our perspective we love those bugs like yeah we’re totally going to figure

out why it did that and and what we can do to make it better And and now at the same time there are things that are very

complicated that you’re never going to be able to scan And there’s um there’s a project at the Linux Foundation called

the Yakto project This is where they build like an embedded version of Linux that you can run in with IoT type stuff

They have instrumented their whole build system to output sbombs as part of the process because they know the thing they

output is this just unintelligible piece of binary stuff Like there’s nothing to

scan There’s nothing to figure out So they’ve said we’re going to do this for you and we’re going to give you an SBOM

so you know exactly what it is If you build it you support it right Or if you ship it you support it I should No

that’s that’s beautiful because that was going to be my follow-up question So if I build compile especially for compile systems if I build a binary from go and

delete the go some sum and the go mod what do you go scan against So actually go has done an amazing thing Your

example is really good So go has augmented the

compiler to add in information about which dependencies were included in that

build Now grant you can turn that off so you have smaller binaries but for most of us we want that data So actually when

SIFT scans Go material we get way better information out of that than we do out

of almost every other ecosystem that exists because the Go compiler puts all of that information into the Go binary

itself It’s amazing That’s beautiful So I want to come back as a from a compliance perspective Josh how and

maybe it’s from a security perspective as well From a security and a compliance perspective how do we accelerate this adoption of SBOPS what can we do as

practitioners as comp um and what can companies do I mean I think at this

point companies need to follow the law Like that’s the I I don’t think the question is how do we accelerate it It’s

going to be how do we how do we do this in a way that keeps us compliant because

it’s coming Like every industry is starting to worry about this stuff and I think we’re all going to need it And now

as I’m sure you’re very aware Raj as humans we love putting things off until the absolute last minute Like it always

amuses me when there’s some new compliance standard is is being enforced Um my favorite was what Dora just just

went into effect in the EU And I had someone email me like a week before Dora was supposed to be on like “Oh Dora’s

coming What do I need to do?” I’m like “You need to go back in time That’s what you need to do You’re not getting this

done in a week.” But I I think from the ESPOM perspective it’s really about you know understand the industry you’re in

Understand some of the compliance requirements and expectations that are

that are coming your way Like none of this is new we have years to prepare and

you know you know what’s coming if you’re in the industry you you pay attention and so I think what it really

comes down to is just understanding your environment and then finding tools that will help you create the sbomb for the

thing you have no one is saying you need a perfect sbomb they’re saying you need an sbomb right and it needs to be good

enough I mean this is all compliance right like there’s no such thing as perfect security you just need to make sure it’s good enough to pass the audit

and and comp and sbombs are going to be the same story like there are lots of tools there’s lots of open source tools There’s lots of vendors working on this

stuff Like I work for a vendor working on this stuff We even have an open source tool We try to make it easy to

use And so like step one is just just start doing it right Just go make an Espanner run it on your stuff and take a

look and see what you get And then of course there’s iteration and we need to improve And we need to figure out like

where do we need to be to make sure that we’re following this regulation that’s being in you know forced upon us by

Europe or the FDA or our our large customers or or or whoever And it it’s

less hard than it was even a year ago I would say So if you you kind of took a look at this and you were like “This is

ridiculous I’m out.” I would take another look I think things are getting better fast and I no doubt in a year or

two it’s going to be even better than it is today You ship it you own it for

uh yes that was your that was your your statement You ship it you support it You support it Okay You confuse me Yes I

mean Yep What do you see as the role of generative AI large language models

small language models in software supply chain I mean I don’t know I wonder this a lot actually There’s there’s an

article I just read this morning where Nvidia actually has a an a tool they

call Morpheus and and actually Ankor is in their tool chain of this this thing But what Morpheus does is they scan like

a container image because Nvidia has this thing that they have this like big container registry for all this

generative AI work they’re doing And they scan these images and then they get the the the vulnerability list right

And they built this tool called Morpheus that basically looks at these vulnerabilities It it goes out and

collects as much information as it can to put together some you know detailed descriptions of what they are using

their Gen AI And then it can also basically look at the thing it is in and

make some determinations about how is this piece of software used in the larger container in the larger you know

product or or project or whatever it is And then it tries to prioritize this stuff And the intent isn’t to like

automate the fixes It’s to help humans figure out like what are the things I need to know And I feel like automating

fixes in a lot of cases like we have depend about at GitHub That works great That I think is less interesting now

versus being able to use some of this technology to make to just help weed

through the trash Like there’s so many CVEes there’s so much vulnerability information and it’s really hard to

figure out what some of this is And so I’m really intrigued by what we can do But now that said one of the challenges

of security is there are certain things we have to not miss because they can be

catastrophic And I also think in many instances some of the generative AI will

say is not predictable or accurate enough that I would necessarily feel comfortable only using generative AI But

I think when it comes down to trying to understand and unwind some of these technical details it has some I I think

there’s purpose I I think there’s potential there So we’ll see I I I’m

very interested and I’m hopeful We’ll say cuz while drowning I love your

example So essentially I think you are saying generative AI especially in the world of sbomb supply chain can help you

narrow down on the signal to noise ratio because which is a huge problem Okay Yeah I I agree There’s so much noise

It’s so hard to figure out what is and isn’t noise in this space And I mean I feel like most of the tooling everyone

is working on goodness knows I am like the the tooling is more about at this point weeding out the noise than

anything else Got it We are approaching the end of the segment Um Josh um

for the new person who wants to enter into this field right What is your

advice to them How they can how can they become the next Josh Brussels Oh goodness don’t do that Um I mean in all

seriousness that’s one of the funny things that I’ve talked to many other geysers about is like we didn’t have any

education There were no certifications There was nothing Like we we it was all trial by fire So like the the way I got

to where I am shouldn’t will never exist again and goodness know should never exist again because like it was security

This all was so new and it was so weird and so crazy I mean there’s a lot of good ways to learn about anything you

want now right There’s so many working groups There’s all these communities and places like Reddit and Discord and

there’s Slacks there’s local university meetups There’s so much to learn from

this And and I feel like step one is just you need a foundation in technology right If you’re not if you don’t know

how a network works you cannot do network security by definition Like that’s just that is the reality Whether

you want to believe me or not that is how it works So you need that that foundation in just technology and the

things you’re interested in And and likewise if you’re interested in something it’s not a chore right You like learning about networks you like

learning about microprocessors you like learning about you know secure development whatever And then I think

it’s a lot of just knowing just meeting people and having discussions and figuring out what you can learn and how

you can learn it I learn more from the people I know than from anywhere else because someone will send me a link and

say “Hey look at this article I found Hey you should read this book I really liked it.” And I think the people you meet is the most important aspect And

this is true of any field This isn’t just security But the people I know are far more valuable to me than almost

anything else is because I can ask questions I can teach them things when I learn something new I mean it’s very

human that when we do a thing we want to show someone like who who can I show this cool thing I just did You know it’s

and that that I feel like open source is very much that of like look I built this cool thing everybody Isn’t this neat and

and so you get that and and I think like even open source is part of the story There’s so many open source tools

There’s so much open source stuff like you can get involved use it like sometimes like using a tool and writing

a blog post about it Even if there’s a million blog posts like you will learn as you write and there is someone who

will find value in that And so it I I feel I feel like this is a non-answer almost But it’s there’s so much going on

There’s like no one way Like yeah you can go to school you can go to meetups you can read books but at the end of the

day all of that is really going to come down to the people you meet and the people you know I think I think that’s

actually a great answer And any call outs for any specific open source projects in security or compliance Well

I mean obviously CIFS and Gripe are the two that help feed my family so I like

them a lot But then I I think from kind of a just a compliance perspective you’ve got all of these organizations

like I I I help out at the OpenSSF And now granted I complain about the OpenSSF all the time I’m not saying they’re perfect and I could I we could do a

two-hour podcast just about my complaints about OpenSSF projects but there’s all of these groups like like

FIRST is another good example like you can join first you can get involved you can be a part of this and you’ll meet

people along the way which is part of the fun And so there there’s a lot of that but when you look at just kind of

open source it it depends on the area you’re interested in I mean from the perspective of like you know sbombs and

and supply chain and all of this you’ve got you know there there’s these tools there’s a tool Google’s working on at

the opens stuff called guac guac which is like why you can’t even user

artifact composition something like that well done yes um I I it’s funny cuz the

guy who created I’m like Brandon you can’t name something guac I cannot find this

but but like you know it’s a great way to you know collect all the supply chain information you can visualize it and you

can understand it better and it’s really really interesting and there’s oh goodness what else is there there there’s a really cool project I’m

starting to work on um at part of the ESOM everywhere working group at the open ss staff where we’re calling it the

catalog very well we’re very good at naming things but it’s what we’re doing is in fact we’re using genai as part of

this project where we’re trying to find all of the like sbomb related tools and sbomb adjacent tools then we use genai

to help write descriptions and and we find some capabilities so We’re talking about literally hundreds and hundreds of things at this point Like we’re we’re

past the point where humans can actually do this easily Genai creates a descriptions and then it’s it’s a

website that you can like say I’m looking for an SBOM tool that generates like spdx sbombs for Python packages and

it’ll show you all the tools that can do that thing right And then there’s also like we put some fancy buttons in it so

you can like make edits and you know correct text and because we we know the gen AI is not going to get it right every time and that’s okay too Like our

intent is we love to just generate the stuff as humans go and fix it for us But we’ll get there I mean it’s it reminds

me of what’s that that law that says the easiest way to get isn’t to ask a question on the internet It’s to give

the wrong answer and someone will correct you Like it’s exactly the same idea But I I I mean oh man And and I

guess the other piece of that I would say is I’m an avid podcast consumer And

so I mean I call obviously this this podcast I’ll assume people are already subscribed if they’re listening but it

it’s a lot of fun and but there’s a handful of other things I love like there’s I like a lot of just random

space podcasts like Universe Today is one of my favorites I love um Paul Acidorian has Paul Security Weekly and

like his whole universe of that like that’s super fun They’re a great crowd I’ve been on that one a couple of times and a it’s always so much fun But then

there’s like um one of my favorites was Yahoo Paranoids used to have a podcast that was just like oh it was so good Um

unfortunately that one that was falling away but there’s just there’s so much media There’s so much fun stuff I I

can’t even I can’t even pick one Raj just there’s just there’s too much stuff you know and and that’s part of the fun

and again this is where knowing people I have people come to me all the time and say hey you should listen to this podcast like um in fact it was uh one of

my favorites right now It’s called security cryptography whatever and it’s incredibly technical It talks about

cryptography all the time I don’t even know what the heck they’re talking about half the time but it’s fun to listen to And that one was like I I was on Paul

Asidorian’s show and before we hit record he’s like oh I I found this podcast You should listen to it I’m like holy cow it’s awesome I love it You know

and that’s one of those things like there’s just so much cool stuff and ask the people you know for more cool stuff

cuz they’re going to they’re going to tell you what it is I think we should get the get this list from you and we would love to sort of put this as part

of the podcast so that people can see this Josh Yeah for sure You have so much information packed there Uh one final

question and I think you sort of already answered it other than the podcast Do you follow uh do you read read books

Read any books Follow any authors Follow any mentors Anything that you want to give a shout out I read so many books I

love I love reading it It’s super fun Um the the the one shout out I would give so I read a lot of technology books

obviously and and the one I would say everyone should go read if you haven’t read it is uh Joseph Men wrote a book on the cult of the dead cow which is

phenomenal and it was really good and that was like that was my growing up as a child like everything in that book I

remember all of it which was really cool but then I I also like to not read

technology books necessarily like it’s funny I had someone once asked me like what’s the best management book you ever read and I said Moby Dick He’s like what

Like I’m serious Like read Moby Dick and pay attention to like the management structure on that boat Like it is

horrifying Like it is the perfect example of what not to do you know And so I I think there’s a lot of value in

things like that Like I love reading science fiction I’ve been reading The Wheel of Time for like years at this point but I’ll get through that someday

But then um yeah it’s just again everything I read is because someone I

know said I should go read it and and that it it’s fun cuz then also when I read it I can go talk to them and be

like oh I read that book you told me to read and I you know this is what I thought about it this is what I liked this is what I didn’t like and it’s super fun then I will send you a book I

don’t know if you’ve heard of it Peter Singi wrote a book called the fifth discipline Peter is uh the what he’s

considered the systems engineering guru but there is nothing engineering about it and it it is sounds more

philosophical than engineering and I would I would love to for you to take a look at that book and you know give us

some feedback I’m excited Yeah definitely send it along Again this is the fun Raj Like people tell you things

and and it’s way more interesting than trying to find it on your own I love it Uh Josh this has been super super fun

conversation It’s been great Thank you very much Awesome and make you right

Listen on your favorite platform and stay updated with the latest insights, stories, and interviews.

CCM NERO graphic

Want to see how we can help your team or project?

Book a Demo