S1E2 | The SolarWinds Hack: How 18,000 Orgs Were Compromised | w/ Alberto Deto Hassan
In the time of attack.
Every second is important,
and you have to decide things
without all the information
and to have the ability
to lead the situation
while there is an enemy on the other side
against you.
So it's a kind of mind war.
You have to win.
Welcome to The CISO Signal, a true cyber
crime podcast. I'm Jeremy Ladner.
On this episode,
we step inside the breach
that shattered
illusions of security
at the highest levels.
A routine software
update to 18,000
organizations became a Trojan horse
for a nation state
campaign that infiltrated
the US Treasury,
the Department of Justice,
Microsoft and dozens more.
The cost
billions of dollars
of clean up, years of investigation,
and the hard won wisdom that solutions
we trust to protect us
could be turned against us.
This is the story of SolarWinds.
And joining us for the investigation
is a cybersecurity
titan
with decades of experience
at the highest levels.
Alberto âDetoâ Hassan is VP and CISO
at ICL Group
and formerly headed Israel's
National CERT.
He brings deep experience across IT,
OT, and critical infrastructure security.
Alberto, welcome to The CISO signal.
Can you tell us a bit
more about your background?
Okay. I'm married to Ruth.
She is my wife.
That's the most important.
I have three kids.
I came from the ISA, Israeli Security Agency,
and then after the Israeli
Security Agency,
I created
and opened the national CERT
and afterwards
I came back as a CISO to ICL.
So in the last six years, I'm V.P.
of Cyber Security defense in ICL.
Alberto, it's great to have you with us.
Now let's begin the investigation.
We are in the midst of a ceaseless war,
not of bombs or bullets, but of breaches,
firewalls and silent incursions.
The targets,
our borders, our banks, our commerce
and the critical infrastructure
that underpins a free civilization.
The enemy is cloaked in code,
fueled by greed, glory,
and a desire for chaos.
This is the story of the unseen
protectors, the nameless generals,
the CISOs,
chief information security officers.
They are the guardians at the gate.
Watchers on the wall.
Ever vigilant and always listening
for The CISO Signal.
How we perceive the passage of time
is a strange thing.
Seconds can stretch on endlessly,
each moment dragging like an eternity.
And yet years
can seemingly pass
in the blink of an eye.
Looking back,
they feel like
echoes from a parallel world,
a lifetime that almost doesn't
feel like our own.
The early spring of 2020
feels recent enough to touch and yet
impossibly far away.
Back then,
the world had come to a standstill.
Covid 19 had forced
much of the world to work from home.
Office towers stood hollow.
Rush hours evaporated, and dining
tables were hurriedly converted
into makeshift workstations.
We were all grappling with a new reality.
Working remotely, living cautiously
for the first time in generations,
the global community began
to contemplate
the fragility of the systems
that hold us together.
A supply chain built on people.
People who could get sick.
What if the virus keeps spreading?
If the people who pick the food,
transport the fuel,
keep the lights on, can't come to work?
What if the police just don't show up?
If the water doesn't flow, if
the grid goes dark.
It was a moment of
collective vulnerability.
And while most of us were worrying
about a biological virus
slipping past our defenses,
few noticed something else creeping
silently through
another kind of supply chain.
A virus of a different nature
crafted by human hands.
Intelligent.
Patient. Precise.
It didn't spread through the air.
You traveled through trust.
During that same spring of 2020,
the enemy got in.
It breached major government agencies,
compromised fortune 500 corporations,
and it did so using a weapon.
No one saw coming.
No. Not Covid.
Something arguably far worse.
That sound you hear approaching
is the blazing heat
of this episode's breach.
This is SolarWinds
and The CISO signal.
So you mentioned your wife
and kids earlier,
and obviously
family is very important to you.
What's the one thing about a career
in cybersecurity that you wish
you knew
way back when you started years ago?
Most of the attacks
arrive on the weekend.
Never mind where you are.
This is the statistics,
and on the weekend you have to be more
alert, more close to the computer,
more close to the system.
And you have to understand
that this is part of your job.
If you are not prepared for it,
don't do it.
But if you are a CISO or like CISO,
you have to be prepared
to work on weekends.
So you've been at the helm of these large
security organizations
now for many years.
Tell us a bit about the weight
of that responsibility on your shoulders.
What's that like?
I can say that every event
I understand the responsibility on my shoulders,
and I understand that
I am part of the Western world
that would like to protect the industry,
that would like to keep the industry,
the Western industry,
to be working
and not to stop
because of attacks
that mainly organized crime
that want us to be stopped
or to pay a lot of money.
So when we discuss
a breach of this scale,
and this scope,
we often focus on the size
of the ransom paid
or the cost of damages
or the sensitive data stolen.
What is the one element
you think we overlook
that we should be talking about?
First of all, the planning.
Somebody planned it very well.
Somebody made the preparation.
The impact is huge.
The impact is worldwide.
So you have to give respect to
who have done it.
Respect, professional respect.
And then to
realize to analyze it
with a cold mind -
What is the situation?
what we should do more
first, what we should do
in the medium time,
and what we should do in that
in more time.
But you have to make decision
making process in a very fast way.
Otherwise you are doomed.
Okay, so that's sort of an interesting
juxtaposition there
that you mentioned
between the slow and careful
planning of the enemy
and then the incredibly fast
reaction time that a CISO needs
when you're faced
with a breach like this.
How do you handle that?
I will say that every event is special,
with its own facts.
You have to be ready to react
and to react fast and to think fast
because you don't have time.
We love making this podcast
and we really hope
that shows in the care
and quality that we invest in it.
And we would really appreciate it
if you could take a moment to like
and share it with your fellow
security professionals
as well as dropping us a comment,
letting us know
what stories and guests
you'd like to have on the podcast
in future episodes.
Now back to the story.
September 2019.
Before the world locked down,
before the phrase supply
chain attack
sent shivers
through boardrooms and war rooms alike.
Something began quietly, deliberately,
far from the fluorescent
glow of the corporate world.
The cybersecurity landscape in late 2019
was, by all
appearances, business as usual.
Security teams hunted, malware
patched vulnerabilities
and deployed
firewalls, and slept
well under the illusion
that the systems
they depended on
were hardened, secure, and trustworthy.
But trust in this story is the first lie,
because somewhere
halfway around the world,
a patient adversary was already watching,
studying, and waiting.
The group would later
be known by many names UNC2452
DarkHalo, APT29.
The US government would eventually trace
the operation back
to Russia's
foreign intelligence service, the SVR.
These weren't
spray and pray hackers
looking to make a quick buck.
They were architects of espionage,
disciplined, methodical and state backed.
And in the fall of 2019,
they picked their target,
a little known I.T.
company called SolarWinds.
Not because of what SolarWinds did,
but because of who they served.
Government agencies,
fortune 500 corporations
and critical infrastructure providers.
The perfect Trojan horse.
This wasnât just a heist.
It was infiltration with intent.
A long con. They began with reconnaissance,
probing SolarWinds digital perimeter,
mapping their internal infrastructure
and identifying the cracks
in the foundation.
No malware, no alerts,
just eyes in the dark
because the plan wasn't
to breach and escape.
The plan was to become invisible,
to live inside the trusted systems
that others relied on for protection.
And so,
in the shadows of September 2019,
the groundwork was laid.
Digital casing of the joint.
The beginning
of one of the most devastating
supply chain attacks in history.
And no one saw it coming.
All right.
So there's that terrifying
moment of realization when it is clear
you've been breached.
What is the first thing you do
before you
assemble the team, before you alert
the necessary stakeholders?
Right after that
first moment of realization
and confirmation,
what does Alberto âDetoâ
Hassan do? To pray -
It's important!
If you pray twice, it's even better.
But after praying.
Do you have to take consideration?
Check on the
small things.
When you get an
update from any company,
never mind Microsoft or whatever.
Check it on small environment.
Closed environment.
Give it 24 hours to see
what the outcome of the update is
and if it's okay,
then continue to medium size
and then continue to all size.
But do not do it
immediately, automatically
all the way.
That's the wisdom
that we got from this event.
And many events like this.
Don't be so fast in updating systems.
Take into consideration
that maybe somebody was smarter
then you...
and may have put something in this update.
Okay,
so we are living in a post SolarWinds
reality now.
How do you suggest teams validate, test
and monitor
security tools like SolarWinds
before full deployment
and organization wide exposure?
I will say that you have to test it
in real threat
and to see
what is the outcome of false alarm.
The issue of false
alarm is very important.
If there are
many alarms that are not real alarms-
It's like the sheep and the wolf.
So you have to do two things
also to see that is detects
what it should detect.
But the same importance
that itâs not giving alert to something
that is nothing. Otherwise it's useless.
Act Two.
The Silent Intrusion.
It didn't look like a weapon.
There was no explosion, no fanfare, no
ransom note flashing
across a locked screen.
Instead, it arrived quietly,
like a whisper
slipped between lines of trusted code.
October 2019.
Somewhere on a keyboard inside a room
we may never fully identify,
a line of custom malware was compiled.
It's given name was SunSpot, but this wasn't
the kind of malware designed
to smash and destroy.
It was careful, calculated, designed
to impersonate trust itself.
Its job wasn't to detonate.
It was to hide, to wait, to observe,
and then to strike at the precise moment
its target.
Not a bank, not a hospital.
A software company, SolarWinds.
Specifically its build environment.
The digital assembly line
where software updates
are forged, tested, and blessed
for distribution.
That's where sunspot was placed.
Like a ghost on the production
floor, it monitored for files
related to SolarWinds
flagship product, Orion.
And when the legitimate update
was being compiled,
SunSpot
silently swapped in the infected version.
No one noticed.
Not the developers,
not the QA testers,
and not the security scanners.
February 2020
the attackers take the next step.
They finalize a second payload - Sunburst,
the actual espionage tool, and hide it
within the Trojanised Orion software.
It was genius. It was devastating.
And it was signed. Digitally authenticated
by SolarWinds itself. In March of 2020.
While the world was focused
on the chaos of Covid,
while families adjusted
to lockdowns,
while office towers
stood hollow while home
routers struggled
to shoulder the new weight
of global commerce,
SolarWinds shipped the tainted update
version 2019.4-HF5
It was deployed to
thousands of customers,
government agencies,
intelligence networks, fortune 500 giants
from the U.S.
Department of Treasury to Microsoft.
All of them unwittingly opened the door.
And that's when the ghost entered.
The brilliance of Sunburst wasn't just in
how it infiltrated,
it was how it stayed hidden.
The malware would lie dormant
for up to two weeks.
Then, like sleeper cells
obeying a silent countdown,
it would activate randomized, staggered,
perfectly timed to avoid suspicion.
It blended in with normal traffic.
It communicated
using DNS,
one of the oldest,
most trusted parts of the internet.
It watched and it learned,
and then it moved.
Lateral motion across networks.
Privilege escalation
data access. Each step slow
surgical, invisible.
From spring through fall of 2020,
the attackers navigated
through the digital hallways
of some of the most secure
systems on Earth.
No one knew, or rather,
some had suspicions.
By August, whispers of strange
behavior surfaced
at a few federal agencies
a discrepancy here,
a misfired authentication there.
But there was no smoking
gun, no signature, no breach alert,
just shadows where clarity used to be.
And then
in November 2020,
the hunters became the hunted.
FireEye, one of the most respected
cybersecurity firms in the world,
discovered something unnerving.
Their own
Red team tools had been accessed,
not sold on the dark web,
not deleted, not leaked, accessed.
But how?
They launched an internal investigation,
turning their forensics inward,
peeling back the layers.
What they found
would lead them
unknowingly to uncover
one of the most dangerous
and far reaching cyber
espionage campaigns in modern history.
But we're not there yet.
The system had
already been breached,
the infection was already spreading,
and the world still had no idea
what was coming.
Given the scale, the scope,
the complexity,
do you think it's realistic
for large enterprises or national CERTs
to detect tampering
from a signed
and verified update
from a trusted vendor?
Do you think we've learned
the lessons from SolarWinds?
Are we doomed to repeat
the same mistakes again and again?
Yes, I think we think we learned it.
We must do it in a small environment
to see, to check and then continue,
not to immediately
implement it or immediately update.
We cannot afford
the outcome of a failure.
The outcome of one failure
like that is huge.
So let's be more prudent, more humble
and check things before we go forward
with big scale.
So we all
know that it's not
a question of if you'll be breached,
but when.
What's the key thing you would suggest
CISOs prepare for in advance
when dealing with a supply chain breach
like this?
That leads
to total system collapse,
leaving you in a situation
where
you need to reach out to vendors,
to customers, to off site support teams.
But all of your critical contact
info and communications are now
suddenly offline.
You have to do the connectivity before
you have to be in a situation
that you have friends
all over the world,
that you have names and phone numbers,
all over the world.
So you can, in this situation,
not search
for the phone number
of the CERT of Indonesia.
You have to name
these two three people in any CERT
in order to contact them.
Because sometimes
because of the hours they may,
they may be sleeping,
they may be only waking up,
they may be at the end of the day.
So you have to say, Hi, I'm Alberto.
From Israel, it's late.
I have a big issue. I need your support.
Never mind-
âExcuse me for the hourâ
and then you begin.
So we talked about praying.
Certainly a very important
skill for every CISO to have.
Talk to us a bit
about the importance of visibility
and situational awareness
in the moments following a breach.
How do you begin
creating order from chaos?
I will have to know what happened.
I will have to know details
who is infected,
how much is the infection
and what is the damage in 1 or 2 places
Itâs enough
for me.
The moment I see that
it's more than 20 location,
I know that it's spread.
Then we have to begin to work fast
in order to reduce the damage.
Act 3
The Turning of the Lens.
In cybersecurity.
There's an old saying
everyone gets breached.
Not everyone finds out.
FireEye
found out. It began with a flicker,
a log entry that didn't add up.
Then another
a pattern, just shy of a pattern.
And for a company
whose business was finding
needles in haystacks,
this needle was exquisitely, well hidden.
But it was there.
FireEyeâs Red Team tools.
Digital lockpicks used to
simulate attacks had been accessed,
not destroyed, not leaked, just copied,
and whoever had done it
knew exactly what they were looking for.
An internal task force was launched.
The company turned its tools inward,
scanning its own networks,
investigating its own employees,
rechecking its own assumptions.
The hunt was personal
now, and slowly
the picture came into focus.
The attacker
hadn't breached FireEye directly.
They'd come through the supply chain
through SolarWinds.
The realization was staggering.
SolarWinds wasn't just a vendor.
They were infrastructure,
like plumbing, power or oxygen.
Their Orion software
sat at the center of IT systems
around the globe.
And if Orion was compromised
then so was everything downstream,
thousands of customers, federal agencies,
intelligence networks,
the private sector, all of them
unknowingly wide open.
FireEye reached out to the US government,
the Department of Homeland Security,
the FBI and a newly formed alliance
called the Cybersecurity
and Infrastructure
Security Agency, or CISA, for short.
Together, they began
the process of unwinding
what would soon be named Sunburst.
But as they traced
the malware's behavior,
its tactics, its traffic, its timing,
something else emerged.
This wasn't criminal.
It wasn't about money.
It wasn't even about destruction.
This was espionage.
Impatient, strategic, state sponsored,
and whoever was behind it,
they were still out there.
Given your experience with ICS,
what made SolarWinds so dangerous
for industrial and government systems?
What was the biggest mistake
you think leadership made here,
that nobody was thinking
that it can happen?
So 95% were not prepared
for this kind of attack.
They were sure that the updates are okay.
That nothing will happen.
And because
they were doing the same thing
every week, every two weeks,
every three weeks,
not thinking that it may be this time
a big attack.
Let's take the event.
If you remember a few months ago,
of CrowdStrike.
So many entities update
without checking and stop working.
Flights were stopped.
Schools. Hospitals.
Because of what?
Because of not learning the update.
If you were planning the update
and you are ready
to give respect to the enemy,
you give respect to the hackers.
They are smart.
They know what they are doing,
give them respect
and then you will be able to resist.
So I heard
you mention complacency
doing the same thing in regards
to security again and again
and expecting different results.
You also mentioned
underestimating the skill
and sophistication of your enemies.
What role does
human nature play in future threats
do you think?
Will we continue to be
the weakest link in our organizations
Armor? Take a red light okay. Every day
all over the world,
people are crossing at red lights
and some of them are having accident.
And we ask ourselves,
how come it happened again? Why?
Because it's human nature.
We do not believe
things will happen to us.
No, it will happen to my neighbor,
but not to myself.
And this is one of the crimes
of the human factor.
We have to be more humble.
So SolarWinds
certainly made us aware
of the security exposure that blind trust
in our vendor supply
chain dependency creates.
What are you doing to prevent
this sort of supply chain
security breach today?
Nothing is happening
immediately to our systems.
Always we have...
never mind
not only in ICL, in all the places
that respect themselves,
they will take a small environment,
they will check the things before continuing.
We'll see if there is
any connectivity to the internet
because in any attack
they want to have connectivity
to the internet
and to build up this malware.
The moment
you see some activity
that was not supposed to be there,
suspect it.
Don't think âoh itâs normalâ. No suspect it.
Check it, verify it.
If you see this, go to C2. Stop it.
It can happen.
Be ready to have every possibility
Act 4 The Dominoes Fall
November 2020.
FireEyes
revelation was just the opening move.
Within days, SolarWinds
confirmed what no one wanted to hear.
Their software had been compromised.
The scale was breathtaking.
Nearly 18,000 customers had received
the poisoned update.
Governments, corporations,
critical infrastructure, everyone.
The breach had gone viral.
On December
8th FireEye stepped into the spotlight.
They publicly announced their breach.
Unprecedented transparency in a world
often shrouded in secrecy.
Days later, the name Sunburst was born.
The malware was no longer a ghost.
It had a face and it had a name.
The US government moved swiftly.
December 13th, an emergency directive
ordered all federal agencies
to shut down Orion immediately.
This was a declaration of crisis.
A digital red alert,
the Malware's command and control
servers, the puppeteers behind the scenes
were seized
by a coalition of Microsoft, FireEye
and GoDaddy.
The fight had entered the public domain.
The media dubbed it a cyber Pearl Harbor.
Senate hearings were called.
The breach wasn't just a story,
it was a crisis of confidence.
How had the digital defenses
of the most powerful
institutions on Earth
been so thoroughly bypassed?
Then the disclosures began to roll in.
Microsoft revealed that attackers
had viewed parts of their source code,
but assured the public
that no customer data had been stolen.
The Department of Justice confirmed
that hackers
accessed thousands of employee
email accounts.
SolarWinds admitted internal weaknesses,
from weak passwords to delayed
vulnerability disclosures
behind closed doors, fingers pointed.
The breach exposed cracks
in the fortress.
LAX security ignored warnings
in the dangerous assumptions
that software supply chains were safe.
A former SolarWinds
security advisor would later testify
that repeated warnings
and cybersecurity
risks were often
overlooked by executives.
And in the wake of the chaos, a second,
unrelated attack
began exploiting
SolarWinds vulnerabilities.
Opportunists seeking to cash
in on the disaster.
By mid 2021, the fallout was undeniable.
The US government mandated
Zero Trust architectures.
No longer could anyone be trusted.
By default,
the breach had changed everything.
But even as the dust settled,
many agencies and companies
remained in the dark
about the full extent of their exposure.
The truth was sprawling and complex,
a puzzle still being pieced together.
The breach
had become more than an incident.
It was a warning. A call
to reimagine cybersecurity.
So after
the breach is confirmed
and the immediate
response is underway,
it's time to chat with those
not so technical folks the C-suite
executive management
team, the board of directors,
and bring them all up to speed.
Enact your BCP
or business continuity plan
can you offer any advice
in how to handle that
sometimes
challenging group of individuals?
Again, as before, you have to pray.
The management has to pray
because the issue now
is how to get out of this situation,
because you are already under a mess,
you have to get out.
You have to overcome.
It's not easy.
You have to prepare yourself
to the different situation.
One of them that you detect,
one of them that you did not
detect and itâs over you.
And then the infrastructure
is more important
how the infrastructure
is behaving to come back to life.
BCP, how they'll prepare themselves
to raise the the company back to work.
So everything is
depends on drills. On practice
and on giving
thought of all kinds of scenarios.
If you will not practice
various scenarios,
take home for example,
you want to protect the home against,
let's say against criminal
that will enter to your home
the analysis of all your
all your windows, all your doors,
all your walls
where they may be breached.
And then you have a plane.
But if one door is opened or breached,
you have to have a plan
how you overcome this situation.
So at the end of it,
it tends to professionalism and planning
and practicing because in cyber
everything can happen.
So a lot of CISOs are noticing these days
that these long dwell time attacks
are seemingly becoming far more common.
Why do you think they
are so hard to spot?
What would you attribute that to?
Because you have so many logs,
so many events every day
and you do not believe
that something will happen.
The issue is something with your mind.
You have to suspect anything
that is abnormal.
If you do not suspect,
you say, oh, it's nothing,
Ah, itâs nothing, ah, Itâs nothing.
When something will happen.
You will say, âAh, Itâs nothingâ
and you will get hit.
If you had to look at the most common
toolboxes
that CISOs are utilizing these days,
are there any detection practices
that you think are being under utilized?
Something that we think we should be
considering that we're not?
Maybe a method
you employ that you think
would significantly strengthen
our defenses.
You have to have multiple systems
that give you the alerts.
If you have alerts from one system,
probably the SOC will not react.
Security Operation Center.
If you have an alert that comes
from two layers of defense,
then they say something happened.
So always have two layers of defense
on each system
with kind of something that,
touches each other.
Act 5 The Reckoning.
As 2021 donned, the world sought answers.
Who was behind the breach
and how deep did the damage run?
On January 11th,
the US government broke its silence.
The attack was attributed
to a Russian state
sponsored group
known in the shadows as APT29,
also called CozyBear.
A well-oiled espionage machine patient
and precise.
Microsoft confirmed
the attackers had viewed
portions of its source code,
but stressed
no customer data had been compromised.
Meanwhile, SolarWinds
faced intense scrutiny
not just from regulators
but from a global community
shaken by the breach.
Weak passwords like SolarWinds
123 became a symbol of negligence.
delayed vulnerability disclosures
became a cautionary tale
about the costs of bureaucracy
in cybersecurity,
in congressional hearings
and security conferences,
experts dissected every misstep.
Testimonies revealed
that internal warnings
went unheeded,
that executive leadership underestimated
the threat.
The breach was not merely a
technological failure.
It was a failure of culture,
communication and accountability.
As the year progressed,
the breach
catalyzed a seismic shift
in cyber policy.
The US government mandated Zero
Trust security models, a
radical departure from legacy practices,
as software supply chain
security became a top priority worldwide,
and private industry
rushed to patch the vulnerabilities
that had allowed
the invisible invaders to slip through.
Yet the story was far from over.
By late 2021,
many organizations
still grappled with the fallout.
The breach had become a case
study in vulnerability,
a stark reminder that no system,
no matter how fortified, was impervious,
and the world's digital landscape
had forever changed. In 2025 and beyond.
The SolarWinds
breach serves as a catalyst
fueling innovation in cybersecurity,
inspiring legislation,
and sharpening
the focus on trust in the digital age.
It's a story of stealth and shadows,
but also of resilience and reckoning
because in the ever
evolving battle for cyberspace,
the only certainty is vigilance.
What do you think the
SolarWinds breach taught CISOs
about how to handle relationships
with supply chain vendors?
Do you think it's
made them a little paranoid
or just cautious enough?
Design a good process
how you enter things
to your organization, and to check things
to understand that
even if it comes from SolarWinds,
if it comes from Microsoft
suspect it,
don't think that
if it comes from a big âSaaSâ company
then it's safe for sure.
No, they may be
damaged exactly like most companies,
because when you think
that you know everything, then you fail.
Do you think most enterprises
or national CERTs
would handle a breach
like this better today
than they did back then?
No, I think that still
it will stay 30% to 40%
maximum of the state
that will be ready
and will react good, and 60 to 70%.
That will not react good.
Because they are not preparing themselves
enough.
So I think one of the things
that makes the role of CISO
such an interesting career is that it's
so multifaceted, it calls on you to
to master
so many skills,
and one of those is
kind of getting under the skin
or inside the head of your enemy,
knowing your enemy.
What advice would you give other CISOs
in terms of sort of that
foundational piece of information
they should consider
when profiling
or sizing up their enemies?
I think that we have to realize
that there are bad people in the world,
and they're organized crime,
that they are smart
and they know what they're doing,
and they insist to succeed.
And you have to be better than them.
otherwise you will lose.
All right.
So our final
question is
perhaps the most obvious one, but
do you think we have really learned
the lessons of SolarWinds
as an industry?
Are we
in the same spot
in terms of our defensive tactics
and response strategies,
or are we
miles ahead of where we were before?
Would you say that
we've learned the necessary lessons?
We are not in the same spot.
We are much better.
But it doesnât say that everybody is
much better...
Says that 40% or 30%
of the state understood
that they have to do activity
in their state
to raise their cyber culture.
We are not speaking about awareness.
We're speaking about culture
to the right situation
that you have a culture of cyber
in the UK.
Cyber culture in the United States.
The moment you arrive to a cyber culture,
then you know that you can deal with
SolarWinds
Mr Alberto âDetoâ Hassan,
thank you so much
for being our co-host today
on The CISO Signal.
I really appreciate your time
and I'm looking forward
to having you back again.
Thank you very much.
Have a great day.
Bye bye.
The SolarWinds
breach wasn't a sudden explosion.
It was a calculated infiltration
that unfolded over months,
hidden within trusted systems
in validated software.
It exposed not only the vulnerabilities
of a single company,
but the fragility of an interconnected
digital ecosystem
where trust is the most valuable
and most exploited currency.
For security leaders,
it was a harsh reminder
the adversary doesn't
always announce their arrival
with fanfare or brute force.
Instead,
they embed themselves
in the supply chain.
In the shadows of code.
Patiently watching, learning and
waiting for the perfect moment to move.
The consequences
reverberate beyond stolen data.
They shake the foundation
of operational integrity
and national security.
This is a story
not just of a breach,
but of a breach in confidence
between vendor and customer,
between system
and operator, between assumption
and reality.
As we move forward,
the challenge is clear
to build defenses that anticipate,
stealth. To question
assumptions long held sacred,
and to accept that perimeter
is no longer a line,
but a shifting landscape of trust.
Because in the world of cybersecurity,
the greatest danger often lies
not in the obvious, but the obscured.
And so we remain ever vigilant
and always listening for The CISO Signal.
All episodes are based on publicly
available reports, post-mortems,
and expert analysis.
While we've done our best
to ensure accuracy,
some cybersecurity incidents
evolve over time
and not all details have been confirmed.
Our goal is to inform and entertain,
not to assign blame
where facts are unclear.
We've used cautionary language
and we always welcome your corrections.
Thanks for listening to The CISO Signal.
