<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Carole Winqwist</title>
    <description>The latest articles on DEV Community by Carole Winqwist (@cwinqwist).</description>
    <link>https://dev.to/cwinqwist</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F216537%2Faaf99f95-08f2-45b3-9ba0-e0a6662a2928.jpeg</url>
      <title>DEV Community: Carole Winqwist</title>
      <link>https://dev.to/cwinqwist</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/cwinqwist"/>
    <language>en</language>
    <item>
      <title>Scaling a marketing team in a BtoB start-up post series B</title>
      <dc:creator>Carole Winqwist</dc:creator>
      <pubDate>Mon, 30 Jan 2023 10:36:24 +0000</pubDate>
      <link>https://dev.to/cwinqwist/scaling-a-marketing-team-in-a-btob-start-up-post-series-b-11j3</link>
      <guid>https://dev.to/cwinqwist/scaling-a-marketing-team-in-a-btob-start-up-post-series-b-11j3</guid>
      <description>&lt;p&gt;A year ago I was looking back at my first year at &lt;a href="https://www.gitguardian.com/"&gt;GitGuardian&lt;/a&gt;, a cybersecurity start-up developing cybersecurity solutions and &lt;a href="https://medium.com/@CWinqwist/cmo-at-a-fast-growing-btob-start-up-adding-boosters-to-the-rocket-fa4377ff15b8"&gt;summarized some lessons learned&lt;/a&gt; from this experience. I have now completed the second year in the CMO role and I thought why not do it again? Scaling an organization is definitely a thrilling journey and time flies so fast doing it that you never really realize how much was accomplished until you take the time to stop and look.&lt;/p&gt;

&lt;h3&gt;
  
  
  A bit of context
&lt;/h3&gt;

&lt;p&gt;GitGuardian now has 100 employees and the marketing grew in the same manner, we started 2022 with 8 team members and we are now 14. The ARR was multiplied by 2 and the marketing budget increased by 60%.&lt;/p&gt;

&lt;p&gt;Our customer base has evolved a bit towards larger accounts and therefore longer funnel time. Multi-touch is more than ever our bread and butter.&lt;/p&gt;

&lt;p&gt;In the meantime, the sales team and the product team also grew, consequently, the number of interactions and the need for alignment followed the same curve.&lt;/p&gt;

&lt;h3&gt;
  
  
  Team wise
&lt;/h3&gt;

&lt;p&gt;We made it! The team almost doubled. We did not change the overall team structure, we still have:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A growth/demand gen team&lt;/li&gt;
&lt;li&gt;A content team&lt;/li&gt;
&lt;li&gt;A product marketing team&lt;/li&gt;
&lt;li&gt;Support functions: design, web, data&amp;amp;ops&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The major changes are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Adding a mid-manager for the Growth Marketing team&lt;/li&gt;
&lt;li&gt;Adding a full-time resource for Data&amp;amp;Ops&lt;/li&gt;
&lt;li&gt;Internalising SEO&lt;/li&gt;
&lt;li&gt;Doubling similar positions&lt;/li&gt;
&lt;li&gt;Adding a full-time resource for field marketing&lt;/li&gt;
&lt;li&gt;Having the first team members in different time zones&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Here is the new organizational structure&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GwSJq7sO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1024/0%2AbseYWUFBbb4RC0VB" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GwSJq7sO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1024/0%2AbseYWUFBbb4RC0VB" alt="" width="800" height="449"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Marketing team structure&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Agencies are still used for Press Relations and for Analyst Relations. If you still wonder what to keep internally and what to externalize, here is an &lt;a href="https://newsletter.mkt1.co/p/agencies"&gt;excellent article&lt;/a&gt; on the topic.&lt;/p&gt;

&lt;p&gt;The objective of the year was also to double resources on similar roles while acquiring missing competencies. With this approach, you diminish your risk linked to turnover, you get rid of a lot of bottleneck issues and you improve the team’s expertise. And if you hire well you can build a great team of experts. As a manager, you have to&lt;a href="https://hbr.org/2015/06/leading-people-when-they-know-more-than-you-do"&gt;learn to lead people who know more than you&lt;/a&gt; on their specific subject. Let go of “you know it all”, don’t worry, you are also becoming an expert in complex system management!&lt;/p&gt;

&lt;h3&gt;
  
  
  Tech Stack wise
&lt;/h3&gt;

&lt;p&gt;No big changes there as we already had a solid ground to build on. We added small tooling to automate and gain efficiency.&lt;br&gt;&lt;br&gt;
Zapier + N8N for most automation proves to be a very powerful stack that will have us scale through series B. However we are starting to invest in a modern data stack, with the help of the Operations and Data engineering teams, with the implementation of Snowflake. The data warehouse will be essential to lift future blockers, such as attribution, lead scoring, and analyzing complex multi-touch funnels at the company level. One thing we tried was to deploy an outbound platform, Salesloft, and unfortunately, it has not been a success. The vendor oversold its integration capacities and the resulting processes were cumbersome which is the opposite of what you want when dealing with outbound involving sales time…&lt;/p&gt;

&lt;h3&gt;
  
  
  Adding a layer of management
&lt;/h3&gt;

&lt;p&gt;Growing your team will of course mean adding a layer of middle management. Based on experience I think a middle manager should manage at least 3 people. Below this number, the value added by the additional layer is questionable.&lt;/p&gt;

&lt;p&gt;Adding a mid-manager to the team, you’ll have to rebuild your RACI and evolve your rituals to leave enough autonomy to the newly promoted or hired manager. But on the other hand, you want to avoid the development of silos.&lt;/p&gt;

&lt;p&gt;We found good solutions to deal with this. First, we kept our dailys with the whole team but we created slack channels for people to asynchronously tell the rest of the team what they will tackle during the week and on Fridays, what they actually delivered. Keeping the daily meetings to discuss open questions, adjustments, alignments and so on. It still works with 14, but I realize It will have to evolve at some point when we continue to grow.&lt;/p&gt;

&lt;p&gt;The second solution aims at keeping a communication channel between team members and the CMO. We have put in place skip-the-level meetings. Every other month each team member has a one-to-one with me during which we address topics like company strategy, career path, advice, etc. It is a way for me to keep direct contact but also for the team members to get unfiltered feedback or information.&lt;/p&gt;

&lt;h3&gt;
  
  
  Deploying Career Ladders
&lt;/h3&gt;

&lt;p&gt;Finding the right profiles is quite difficult so you want to retain them. Giving visibility on a career path is a critical component of people’s motivation. Laying out the different steps and what is expected both in terms of soft skills and technical expertise is a very interesting exercise.&lt;/p&gt;

&lt;p&gt;We have developed a marketing career ladder for each of the main roles starting from an engineering ladder that contained most of the soft skills elements and adding all elements relative to technical skills. It is true that marketing has very different profiles in small quantities, but I still believe that giving a good vision of the progression path is worth the effort.&lt;/p&gt;

&lt;p&gt;This tool helps each team member and even myself (I build my own ladder :-) ) get a growth mindset, imagine their future, understand where they are at the given moment and take ownership of their progression. If you know where you sit on your career path, you can set and work towards goals that will take you to the next level.&lt;/p&gt;

&lt;p&gt;It gives also a more meaningful basis for career progression conversations and allows better comparison as the elements are objectively presented.&lt;/p&gt;

&lt;p&gt;I did not find many resources or templates on marketing career ladders, so feel free to reach out if you are interested to discuss this topic further.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2xDhRQqo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1024/0%2AxlACZQiI5F6YgzDt" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2xDhRQqo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1024/0%2AxlACZQiI5F6YgzDt" alt="" width="800" height="347"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Marketing career ladder in Notion&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Assessing your tactics’ maturity
&lt;/h3&gt;

&lt;p&gt;In 2021 we activated most tactics available and in 2022 we were able to run them, experiment and assess their effectiveness. As a post-series B we need to balance innovation and Optimization. The team members have to master both approaches and the ladder mentioned above helps outline the missing skills. It is also the right moment to assess our tactics’ maturity and set objectives to move them up the maturity ladder.&lt;/p&gt;

&lt;p&gt;We use a 5-phase scale:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Experiments&lt;/li&gt;
&lt;li&gt;Positive signals&lt;/li&gt;
&lt;li&gt;Repeatability&lt;/li&gt;
&lt;li&gt;Operationalize&lt;/li&gt;
&lt;li&gt;Fully integrated&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For each tactic, we evaluate where we are and what is missing to move to the next phase. This assessment is done quarterly and allows to set clear objectives and action plans to improve the overall engine.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_OxhEwPN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1024/0%2APrOoSy8zzWssiZdr" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_OxhEwPN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1024/0%2APrOoSy8zzWssiZdr" alt="" width="800" height="363"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Tactic assessment in Asana&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;An interesting example is SEO, for which we started with an agency until we hired a team member who could take it from where it was and operationalize it completely. The approach has been successful and we have been able to benefit from the internalization (better understanding of the offer, content available and audience dynamics) while building from an already solid situation.&lt;/p&gt;

&lt;h3&gt;
  
  
  Accelerating your production volume
&lt;/h3&gt;

&lt;p&gt;Adding fuel to the engine both in dollars and people’s time should translate into production volume. Beware of meeting sprawl, push people to work asynchronously, and meet only when decisions or discussion is absolutely needed. It is important to revisit some of your processes and spot elements that generate inefficiency.&lt;/p&gt;

&lt;p&gt;I like to say that marketing is like a factory, we need constant output and flawless production. And to get to this you need to make sure you have quality checks, emergency management capacities, deep understanding of your data. This is why we have an operation and data team member. At first, this resource should cover your “run”, ensuring everything works smoothly, and then do some “build”. You can even externalize some of the build to gain time and when the POC is proven efficient internalize the run. In 2023 we will test this for BDRs and for Intent management.&lt;/p&gt;

&lt;h3&gt;
  
  
  Finetuning your measuring
&lt;/h3&gt;

&lt;p&gt;Piling up data year over year allows you to finetune your models. One of the most complex models in a BtoB enterprise environment is the North Star metric one. Finding the right elements to create your prediction model is not an easy task. If you are interested in this subject I suggest you read &lt;a href="https://kellblog.com/"&gt;Dave Kellogg’s blog&lt;/a&gt;, he is an expert! Building your model will help in terms of marketing and sales alignment and will outline your business dynamics: close rate, deal size thresholds, lead time, and conversion rates. Setting marketing objectives and predicting sales outcomes is not an easy task and needs ongoing refinement. As the team leader you have to keep an eye on the score and your team too but don’t forget that you won’t win the game unless you focus on it.&lt;/p&gt;

&lt;h3&gt;
  
  
  Looking ahead
&lt;/h3&gt;

&lt;p&gt;I think a team is an ecosystem that needs some time to adjust to new components, this is why you should be mindful of keeping some pauses between big waves of hires in order to stabilize and have everyone fully operational before you grow again. In 2023 we aim at growing our ARR another 2x, so back to work full steam ahead!&lt;/p&gt;

</description>
      <category>cmo</category>
      <category>btobmarketing</category>
      <category>startup</category>
      <category>marketing</category>
    </item>
    <item>
      <title>The State of Secrets Sprawl 2022</title>
      <dc:creator>Carole Winqwist</dc:creator>
      <pubDate>Fri, 11 Mar 2022 09:25:30 +0000</pubDate>
      <link>https://dev.to/gitguardian/the-state-of-secrets-sprawl-2022-ah3</link>
      <guid>https://dev.to/gitguardian/the-state-of-secrets-sprawl-2022-ah3</guid>
      <description>&lt;p&gt;Today we, at GitGuardian, are happy to release the 2022 edition of the State of Secrets Sprawl.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://res.cloudinary.com/da8kiytlc/image/upload/v1646148528/GitGuardian_StateOfSecretsSprawl2022.pdf"&gt;Download the report&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Our previous edition, which has become the reference on secrets leaks, aimed at answering a simple question: &lt;strong&gt;how big of a problem is secrets sprawl on public GitHub?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We concluded that the problem was not only growing at &lt;a href="https://blog.gitguardian.com/state-of-secrets-sprawl-2021/"&gt;a very fast pace&lt;/a&gt; but also that most leaks happen out of sight of companies' security teams.&lt;/p&gt;

&lt;p&gt;The figures this year confirm this trend and even show that the phenomenon is probably underestimated: &lt;strong&gt;in 2021, our monitoring of public GitHub revealed a two-fold increase in the number of secrets leaked, reaching just over 6M&lt;/strong&gt;. On average, 3 commits out of 1,000 exposed at least one secret, a 50% increase compared to 2020.&lt;/p&gt;

&lt;p&gt;But that’s not all: &lt;strong&gt;with this edition, we wanted to push the analysis further&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Leveraging our unique position as the &lt;a href="https://github.com/marketplace?category=security&amp;amp;query=sort%3Apopularity-desc"&gt;leading secrets detection platform&lt;/a&gt;, we wanted to get to the bottom of the situation faced by IT professionals. For this, we conducted an in-depth study on the state of secrets sprawl in &lt;strong&gt;corporate repositories&lt;/strong&gt;.&lt;br&gt;
Monitoring thousands of repositories in real-time and scanning the entire history of corporate codebases provided us with the data to depict a realistic view of the state of application security in the DevOps era.&lt;/p&gt;

&lt;p&gt;If there is a single conclusion to be drawn from it, it is that the amount of work required for both remediating real-time incidents and investigating leaks detected in the git history (which can still represent a threat) &lt;strong&gt;far exceeds current AppSec teams' capabilities&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Xst6xPDn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/n6uhy86c1k3puy0jobv2.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Xst6xPDn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/n6uhy86c1k3puy0jobv2.jpeg" alt="State of secrets Sprawl quote" width="880" height="515"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://res.cloudinary.com/da8kiytlc/image/upload/v1646148528/GitGuardian_StateOfSecretsSprawl2022.pdf"&gt;Download the report&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When compared to open-source corporate repositories, private ones are also &lt;strong&gt;four times more likely to expose a secret&lt;/strong&gt;, comforting the idea that they permeate a false sense of secrecy.&lt;/p&gt;

&lt;p&gt;The historical volume of secrets-in-code, coupled with their constant growth, &lt;strong&gt;jeopardizes the remediation capacity of security teams&lt;/strong&gt;, primarily application security engineers. This, in turn, puts the whole transition process to DevSecOps at risk.&lt;br&gt;
The challenge for companies is therefore to address the threat of secrets sprawling while avoiding overworked teams. In our experience, the best way forward is to move towards a &lt;strong&gt;collaborative prevention&lt;/strong&gt; model between AppSec and Developers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What you will find in the report:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What's the growth rate of the secrets sprawl phenomenon on public GitHub?&lt;/li&gt;
&lt;li&gt;How frequent are cloud providers' credentials leaks?&lt;/li&gt;
&lt;li&gt;Are increasing detected credentials a sign of growing popularity?&lt;/li&gt;
&lt;li&gt;How many Docker images expose at least one secret on Docker Hub?&lt;/li&gt;
&lt;li&gt;When do leaks occur the most? Where do they originate from?&lt;/li&gt;
&lt;li&gt;How do breaches and supply chain attacks relate to leaked credentials?&lt;/li&gt;
&lt;li&gt;What is the reality of the problem posed by leaking secrets for AppSec teams?&lt;/li&gt;
&lt;li&gt;Do leaks occur more often on corporate private repositories?&lt;/li&gt;
&lt;li&gt;How to solve the problem of secrets sprawl at scale?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://res.cloudinary.com/da8kiytlc/image/upload/v1646148528/GitGuardian_StateOfSecretsSprawl2022.pdf"&gt;Download the report&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ciso</category>
      <category>appsec</category>
      <category>code</category>
    </item>
    <item>
      <title>CMO at a fast-growing BtoB start-up: Adding boosters to the rocket</title>
      <dc:creator>Carole Winqwist</dc:creator>
      <pubDate>Wed, 12 Jan 2022 14:52:01 +0000</pubDate>
      <link>https://dev.to/cwinqwist/cmo-at-a-fast-growing-btob-start-up-adding-boosters-to-the-rocket-3cl8</link>
      <guid>https://dev.to/cwinqwist/cmo-at-a-fast-growing-btob-start-up-adding-boosters-to-the-rocket-3cl8</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--k6SpfX5z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A3CeBfTWMCLGM1nIF-TnS_A.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--k6SpfX5z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A3CeBfTWMCLGM1nIF-TnS_A.png" alt="" width="880" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I am not a spaceship project manager nor a rocket engineer, not even an engineer, but some days I like to think I am dealing a bit with the same concepts. I joined &lt;a href="https://www.gitguardian.com/"&gt;GitGuardian&lt;/a&gt; a year ago as CMO and it has been quite an exciting and fulfilling experience. As I regularly meet and talk to my peers I find that there are recurring questions on &lt;strong&gt;how to scale an organization&lt;/strong&gt;. So here is my take on the subject.&lt;/p&gt;

&lt;h3&gt;
  
  
  The blueprint
&lt;/h3&gt;

&lt;p&gt;First some elements on the company and its specificities. I joined GitGuardian post series A and the company had reached the product-market fit stage for 2 products already. To give you some numbers, GitGuardian was about 30 employees at the time and the marketing team 3 (Versus 60 and 8 end of 2021), the ARR growth objective was a x4 (and we made it!) and we had the ambition to raise the Series B before the end of the year (which happened end of November 2021).&lt;/p&gt;

&lt;p&gt;The market GitGuardian addresses, Code Security, is growing fast as demand rises and new vendors emerge. Funding is massively flowing and accelerates the pace vendors need to sustain to build market shares.&lt;/p&gt;

&lt;p&gt;On the other hand, the cybersecurity market is still young and as it is very technical it requires a lot of education. The last element that will set the scene properly is the characteristic of GitGuardian’s customer base.&lt;/p&gt;

&lt;p&gt;GitGuardian solutions are adopted through two very different buyer’s journeys. The first one, representing the larger volume of users, is acquired in a bottom-up manner and is constituted by individual developers and small development teams. This user base is using the product for free and is fueling the adoption and virality engine.&lt;/p&gt;

&lt;p&gt;On the other side of the scope are the subscription customers, large to very large organizations choosing the solutions for their enterprise-grade capabilities. The enterprise customer journey is quite long and is multi-touch by nature.&lt;/p&gt;

&lt;p&gt;These two very opposite acquisition funnels demand different but also complementary marketing approaches to be successful.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--nGZlsDm4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AOFBNxLI9jIJITq9MbEvgLw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--nGZlsDm4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AOFBNxLI9jIJITq9MbEvgLw.png" alt="" width="880" height="450"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Funnels characteristics&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Choosing the crew
&lt;/h3&gt;

&lt;p&gt;Building a team to deploy this challenging and complex but exciting marketing strategy is crucial. You need to select the proper profiles that will enable you to address the needs for agility, data-driven approaches, technical knowledge and content development.&lt;/p&gt;

&lt;p&gt;Based on my experience the commonality of your team members must be the appetite for technical products, the taste for experimentation but also the capacity to project manage very rigorously.&lt;/p&gt;

&lt;p&gt;Building my team I found this &lt;a href="https://mkt1.substack.com/p/marketing-org-chart"&gt;presentation&lt;/a&gt; of Mkt1 quite well done. And here is a slightly revised version of the structure based on my marketing strategy constraints.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--VbvsTNKN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/960/1%2AwBMra_pEKRgMfW5XsjxH5w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--VbvsTNKN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/960/1%2AwBMra_pEKRgMfW5XsjxH5w.png" alt="" width="880" height="495"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Marketing Team Structure&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Of course, when you start building your team you need to prioritize your hires based on your budget. Here are some priorities in my point of view:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The growth team focused on-demand generation. If you face both a Sales led and Product led funnel, you need to staff your growth team with profiles able to both address acquisition and conversion. They need to be able to execute the whole set of marketing tactics including inbound, paid, nurturing and ABM but also field events. Your growth managers need to be tech-savvy as they need to fully understand the product and its value proposition, data-driven to conduct successful experimentations and very well organized to be able to execute multiple tactics at the same time.&lt;/li&gt;
&lt;li&gt;The content team. With a very technical audience and a market needing education, you need to invest heavily in content. Your content writer(s) and developer advocate if you sell developer-oriented products must have technical/development experience and real writing and content development skills. These types of profiles are maybe the hardest to find but they exist more than you imagine.&lt;/li&gt;
&lt;li&gt;Product Marketing. The value of product marketing is not always well understood but it is a critical component to success. Product marketing understands competition, articulates the value proposition, the messaging and enables sales. Your product marketer needs to be technical enough to fully understand your product. It is easier to teach someone about marketing than to get them technical.&lt;/li&gt;
&lt;li&gt;Brand &amp;amp; Creative. You can always subcontract the web design and the brand design but having even a part-time resource dedicated to marketing makes a huge difference when building your brand consistency.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Where you will benefit from agencies:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Press relations&lt;/li&gt;
&lt;li&gt;Analyst relations&lt;/li&gt;
&lt;li&gt;SEO&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These elements are critical for your strategy and cannot be only internalized. You will really benefit from specialized agencies’ savoir-faire and I recommend you find partners for the long run.&lt;/p&gt;

&lt;p&gt;Due to the size of your organization, you probably will need to be a player-manager. Depending on your profile as a CMO you may own one or the other subject as an individual contributor. On my part, I have kept Coms/PR/social media and employer’s brand under my responsibility.&lt;/p&gt;

&lt;p&gt;And the most important part is the balance between your content production and content usage teams. I think &lt;a href="https://mkt1.substack.com/p/fuel-engine"&gt;this article about Fuel and Engine&lt;/a&gt; summarizes this subject well.&lt;/p&gt;

&lt;h3&gt;
  
  
  Adding Boosters
&lt;/h3&gt;

&lt;p&gt;The interesting thing about building the marketing strategy of a pre-series B organization is that you have to think about scalability. Because what you build will be the foundation of your growth.&lt;/p&gt;

&lt;h3&gt;
  
  
  Choosing the right marketing stack
&lt;/h3&gt;

&lt;p&gt;Tools… Even if tools are a mean and not a solution to a problem, choosing the right tools will be crucial to your agility. Here is a basic list of what you need:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A CRM.&lt;/strong&gt; I have experienced salesforce and Hubspot among others and they both have their strengths and weaknesses&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A MAP.&lt;/strong&gt; You can of course use your CRM capabilities but a best-of-breed MAP is often more efficient. We have chosen Customer.io&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A project/task management system&lt;/strong&gt;. I have used Jira in the past but it is not fully adapted to marketing and I find Asana really flexible and pertinent. It allows templating activities, processes, onboarding and more. I even use it to present the marketing master plan with all key actions executed and planned.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A CMS&lt;/strong&gt;. My recommendation when it comes to choosing your CMS is autonomy. I have experienced complex websites with awful backend dependencies and I really think the simpler the better. We use Webflow and so far it fits the need.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;An automation tool&lt;/strong&gt;. Zapier and N8N are complementary.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A social media and web monitoring/publishing tool.&lt;/strong&gt; There are many solutions on the market for this and we found Mention to deliver the right value for our investment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A webinar platform.&lt;/strong&gt; Webinars and virtual events are quite an important tactic. We looked at different solutions and chose Crowdcast for its community-building capabilities among other things.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A knowledge management platform.&lt;/strong&gt; You’ll gather experience as a team and will need to document a good number of items to gain efficiency. We have chosen Notion for this purpose and document things like our KPIs, our plan, our vendors, our tools, our best practices… this is a goldmine for new team members but also to advertise what marketing does in the organization.&lt;/p&gt;

&lt;p&gt;Depending on your market and experience you can find solutions more adapted to your needs but in any case, you always need to choose a solution that will last a bit as changing a tool is always a disruption and takes a lot of energy that you could spend on production.&lt;/p&gt;

&lt;h3&gt;
  
  
  Putting the right processes in place
&lt;/h3&gt;

&lt;p&gt;I have always thought that team efficiency is maximized when you have the proper processes. Processes could seem in opposition to agility and speed but in fact, they are the actual foundation you build on. As your team will grow quickly, having processes is like having a GPS when you drive. Even if you know the road it gives you a sense of security and someone can very quickly take it from where you left it in case it is needed.&lt;/p&gt;

&lt;p&gt;A few examples:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Templatization&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Using templates to allow flawless repetition of execution is actually accelerating execution. You can create templates for content production, content dissemination, video production, events management, webinars but also for repetitive checks for your paid ads or your SEO. The important thing about templates is to get back to them regularly assessing their usage, improving them and sometimes removing some steps that are systematically not used.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Approval processes&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Alongside templates, you should implement documented approval processes and a RACI matrix. This framework diminishes the risk of mistakes but more importantly gives the sense of ownership. The person accountable is not the one doing it all but is definitely the one who should make sure things happen and happen correctly to serve the defined objectives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Objective setting&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
The expression “Happy if” was used by one of my managers and I like this terminology because it sets the scene for a given action. An objective is not always a number or an execution check box but can be more subtle as long as it expresses the sense of achievement. All activities should have a “happy if” checkpoint and for the most critical ones a post mortem analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Budget management&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Proper budget hygiene is critical to your agility. At any given moment you need to be able to tell what contracts you signed, what invoices were paid or are to be received, what buckets of money are still to be invested or are care committed. Budget building and management would require a full article but one thing is that you don’t need a specific tool to do proper budget management at this stage. A good spreadsheet is sufficient. Align with your finance department to group your budget lines under proper labels to allow analysis (demand gen costs, versus outsourcing, vs content, vs tools…). Record accurately the status of your spending and record the dates of each item with both a cash and a P&amp;amp;L view. It will help greatly when you’ll need to add or remove allocations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Rituals&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Having the right number of meetings so they are productive. Here is our schedule and it has evolved along the year to adapt to the growing team and to remote work increase and decrease.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Daily stand-up with Monday to set objectives for the week and Friday to make a wrap-up.&lt;/li&gt;
&lt;li&gt;Tuesday and Thursday we only cover questions of blocking points and on Wednesday we try to have everyone in the office and do an informal stand-up around a cup of coffee or tea :-)&lt;/li&gt;
&lt;li&gt;A weekly team meeting to address specific subjects, and a monthly reporting meeting. For this one, we recently changed the pattern to have the deck ready the day before so everyone can read and comment on it and have the meeting to address the questions and comments so it is not just a present and listen type of meeting.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We also borrowed from the agile methodology with a monthly marketing demo during which we present 1 or 2 key projects to the entire company. This meeting has multiple objectives: promote and educate other teams on what marketing is and does, get feedback, highlight team members’ successes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Onboarding&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
I have repeated it quite a bit. I guess in this article scaling the team is a major element of the growth. Therefore preparing the onboarding of new team members is critical. It needs to be documented, to have a clear timeline and to be checkbox-able (don’t know if this word even exists…). In parallel with the onboarding task list, you need a clear trial period ramp-up document stating the different elements to learn and the deliverables expected at each stage to demonstrate the ramp-up. Having this clear visibility is usually very much appreciated by the newcomers and allows an objective assessment of the performance.&lt;/p&gt;

&lt;h3&gt;
  
  
  Building the brand
&lt;/h3&gt;

&lt;p&gt;Moving away from the structure towards the actual activities, I will start with the brand. Evolving in both a BtoB enterprise market and a very immature technological market, we need to build a brand and educate the market on the niche we address. We also need to build an attractive employer’s brand as recruitment is key to our growth.&lt;/p&gt;

&lt;p&gt;This requires a consistent and qualitative production of content.&lt;/p&gt;

&lt;p&gt;In a way, we have set up our production as would a magazine:&lt;/p&gt;

&lt;p&gt;We have our writers, from the marketing team but also from the tech teams and we have also sourced external writers (experts on our subjects and willing to do guest blogging).&lt;br&gt;&lt;br&gt;
Extending your pool of writers really helps you scale. And you should always look internally first. Technical teams have writing skills and they can benefit from promoting their expertise.&lt;/p&gt;

&lt;p&gt;We have our editorial meeting to identify the subjects we could cover and a publication calendar to plan each week and get a good balance of topics and frequency.&lt;/p&gt;

&lt;p&gt;And we have our dissemination plan to make sure our content is properly promoted and used.&lt;/p&gt;

&lt;p&gt;We tried to have an editorial framework with “this day for that type of subject” and so on, but we found it too much of a constraint. We prefer to balance the content during our weekly meeting depending on what is ready to be published.&lt;/p&gt;

&lt;p&gt;And of course, there is no brand-building without proper press relations and analyst relations. For these subjects as mentioned earlier, we selected agencies to extend the team.&lt;/p&gt;

&lt;p&gt;Building a brand is a marathon and you better start early and have regularity. On top of your regular flow of publication and dissemination, it is good to have virality or high exposure contents (such as reports and cheat sheets for ex) creating momentum of attention. These assets will help on getting influencers’ attention but also on expanding your audience. The graal is to be perceived as a reference on a given subject and be mentioned in an earned fashion by various media and authors.&lt;/p&gt;

&lt;h3&gt;
  
  
  Deploying all tactics and testing
&lt;/h3&gt;

&lt;p&gt;When you join an early-stage start-up there is a chance that the marketing mix is limited and adding boosters to the rocket means adding channels of acquisition and conversion.&lt;/p&gt;

&lt;p&gt;Depending on the persona you address you need to choose the different tactics you will activate in your campaigns. My recommendation is to build a listing of all tactics available to you and assess your readiness and their adequation with your audience. Then you need to have a plan of activation of the different tactics depending on your team skillset, budget and time of the year. You can for example push the nurture flows to later in the year once you have sufficient data to nurture or invest in proprietary webinars when you have a large enough database to promote them.&lt;/p&gt;

&lt;p&gt;Whatever you choose to select there are a couple of important elements:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Set objectives — as explained earlier.&lt;/li&gt;
&lt;li&gt;Plan and document the execution — back to the template idea. You’ll gain time for the next iteration&lt;/li&gt;
&lt;li&gt;Test before signing up for a series&lt;/li&gt;
&lt;li&gt;Experiment and assess. You should embrace a growth marketing mindset and try a lot of different things. One thing that could be difficult is that when navigating an Enterprise market, the complexity of the sales cycle and the buyer’s journey does not allow immediate effect measurement. Therefore you need to find intermediate points of measure to validate or invalidate your experiments. Be inspired by the growth marketing approaches and methods, use them to keep your agility, but don’t be lured by all the fashionable growth publications which often advertise crazy numbers and massive traction. If you are in an Enterprise market the rules are different. Compare yourself with similar product types.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As the CMO, your role is to provide a strategic view to your team who are much more focused on operational topics. Ask the right questions so they can articulate their tactics in campaigns, help them prioritize and challenge their proposals.&lt;/p&gt;

&lt;h3&gt;
  
  
  Measuring results
&lt;/h3&gt;

&lt;p&gt;Of course, this is obvious that you need to measure your results but it won’t be done in a day. Finding the right KPIs, building the historical data that gives you enough data points and testing different metrics is an on-going activity.&lt;/p&gt;

&lt;p&gt;If you are not a data professional yourself, it is great to have a data person in your team, you’ll benefit at many levels:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Building the right data set&lt;/li&gt;
&lt;li&gt;Getting the right integrations and automation in place&lt;/li&gt;
&lt;li&gt;Analyzing the data in different ways and with different methods&lt;/li&gt;
&lt;li&gt;Getting a second opinion on the analysis&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You’ll have a set of measures and KPIs and the list can be long but you should definitely have one North Star Metric. My recommendation is that it is aligned with your sales team. It is a bit of the glue between marketing and sales. In our case, it is a number/value of new deals in the pipeline. Not leads, not MQL, not SAL, actual pipeline. It avoids a lot of useless conversations and biases on what marketing produces. And one thing you should definitely not do is look at marketing vs sales sourced pipeline. You’ll have a good summary of why not in &lt;a href="https://www.forrester.com/blogs/b2b-marketers-its-time-to-ditch-sourcing-metrics/"&gt;this article from Forrester&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;But to build the objective of this North Star metric you’ll need to iterate and find the right dimensions that will allow you to accurately measure success. As marketing works for future revenue, and this future can be months away, you need to evaluate success with ever-changing data if you grow fast (average deal size, close rate…). Go back to your numbers as often as needed.&lt;/p&gt;

&lt;h3&gt;
  
  
  The next frontier
&lt;/h3&gt;

&lt;p&gt;I hope you did not find this article too long but summarizing a year at a fast-growing start-up was maybe mission impossible… Writing it I thought some of the subjects would in fact need a deeper dive. I would be very happy to hear what you think and which subject could be the next to tackle! And now my team and I are focusing on acceleration and this will mean &lt;a href="https://careers.gitguardian.com/"&gt;doubling the team size&lt;/a&gt;… An interesting experience I am sure, that I will be happy to tell you about soon!&lt;/p&gt;

</description>
      <category>btobmarketing</category>
      <category>saas</category>
      <category>cmo</category>
      <category>marketing</category>
    </item>
    <item>
      <title>Red Team Chronicles Episode 5 — Alert to Avoid Serious CompromiseRe</title>
      <dc:creator>Carole Winqwist</dc:creator>
      <pubDate>Thu, 07 Oct 2021 09:30:53 +0000</pubDate>
      <link>https://dev.to/gitguardian/red-team-chronicles-episode-5-alert-to-avoid-serious-compromisere-4mo6</link>
      <guid>https://dev.to/gitguardian/red-team-chronicles-episode-5-alert-to-avoid-serious-compromisere-4mo6</guid>
      <description>&lt;h3&gt;
  
  
  Red Team Chronicles Episode 5 — Alert to Avoid Serious CompromiseRe
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--EwyMco5n--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AfVqi_I2GzzWcToFs.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--EwyMco5n--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AfVqi_I2GzzWcToFs.jpg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the previous episode, Philippe emphasized the need for a &lt;strong&gt;shift in the security posture&lt;/strong&gt; toward better detection. So let’s dig into this subject.&lt;/p&gt;

&lt;p&gt;We will first look at the timeline of a compromise:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fT9PdURE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2Aav4CPK2OHlDzxgLk9-tVkQ.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fT9PdURE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2Aav4CPK2OHlDzxgLk9-tVkQ.jpeg" alt=""&gt;&lt;/a&gt;Different phases of a compromise&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Philippe, can you drive us through this process, please?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Here, you go: during the initial reconnaissance phase, hackers will gather as much information as possible. The objective being to make initial access into the target system. Once you have access to the first system the initial intrusion happens. &lt;strong&gt;Hackers benefit from the trust that is put in the system they entered.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The next phase will be to try to elevate privileges. One thing that I usually do when I access a server is then to use the “history” command to gather a list of the previous 500 commands made and store them. It can give us credentials or file names that could store secrets.&lt;/p&gt;

&lt;p&gt;Hackers will then move laterally to access critical data and exfiltrate them. Once this is done, they will obfuscate their traces. This is then very difficult for the security teams to know what exactly happened.&lt;/p&gt;

&lt;p&gt;Most organizations focus on preventing the initial intrusion, but as we saw with examples provided in previous episodes, it is a bit of a lost cause. Security teams should also focus on putting in place a &lt;strong&gt;proper alerting system&lt;/strong&gt; for the phase between initial compromise and serious compromise. When hackers have access to legitimate admin profiles, it is too late. They will not trigger any alerts anymore.&lt;/p&gt;

&lt;p&gt;Even if ransomware is put in place during the initial phase it is limited to 1 or 2 machines, but after it can be the whole company. &lt;strong&gt;We see more and more of this type of corporate ransomware.&lt;/strong&gt; They are much more profitable for hackers. In the past, hackers would cash in as soon as they compromised one machine, now they stay and take the time to escalate, move laterally and compromise the whole organization.&lt;/p&gt;

&lt;p&gt;Alerting should be in place for key events leading to privileges, like admin profile creation for example, and for anomalies (server and services reboot, NTP synchronization, authentication failures).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Do you have other best practices for us?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Know your environment&lt;/strong&gt; , not just what is exposed to the outside world. Where is your code, who has access to it, what are the passwords for?&lt;/p&gt;

&lt;p&gt;If you have legacy servers, isolate them. Think that hackers are bouncing from one spot to another, try to &lt;strong&gt;block them in dead ends&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Install security patches, I repeat &lt;strong&gt;install security patches&lt;/strong&gt; …&lt;/p&gt;

&lt;p&gt;Do not use professional email addresses for external sites that are not essential to your business, or at least use password generators to &lt;strong&gt;avoid pattern copying&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Do not have a &lt;strong&gt;check box approach&lt;/strong&gt; to security. Try to think like hackers to adapt your security approach to your environment.&lt;/p&gt;

&lt;p&gt;And of course &lt;strong&gt;make some intrusion tests&lt;/strong&gt; , internally or with external providers or bug bounty programs.&lt;/p&gt;

&lt;p&gt;We hope that you enjoyed this first series of the &lt;a href="https://blog.gitguardian.com/tag/redteam/"&gt;Red Team Chronicles&lt;/a&gt; with Philippe Caturegli and that detection is now part of your agenda!&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published at&lt;/em&gt; &lt;a href="https://blog.gitguardian.com/red-team-chronicles-episode-5/"&gt;&lt;em&gt;https://blog.gitguardian.com&lt;/em&gt;&lt;/a&gt; &lt;em&gt;on October 7, 2021.&lt;/em&gt;&lt;/p&gt;




</description>
      <category>redteam</category>
      <category>cybersecurity</category>
      <category>threatintelligence</category>
      <category>appsec</category>
    </item>
    <item>
      <title>Red Team Chronicles — No Hidden Information</title>
      <dc:creator>Carole Winqwist</dc:creator>
      <pubDate>Wed, 15 Sep 2021 16:51:07 +0000</pubDate>
      <link>https://dev.to/gitguardian/red-team-chronicles-no-hidden-information-4p6d</link>
      <guid>https://dev.to/gitguardian/red-team-chronicles-no-hidden-information-4p6d</guid>
      <description>&lt;h3&gt;
  
  
  Red Team Chronicles — No Hidden Information
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--75j6i2U---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AkKTaqbZTTKwbyxhg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--75j6i2U---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AkKTaqbZTTKwbyxhg.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In this episode, you’ll discover a perfect illustration of the security knowledge gap existing between organizations. Offensive security expert Philippe Caturegli comes across a way too common belief: &lt;strong&gt;“&lt;em&gt;nobody will find my scripts or my data because they are very carefully hidden&lt;/em&gt;”.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;And here is how Philippe reacts to this:&lt;/p&gt;

&lt;p&gt;There is no such thing as well-hidden information. &lt;strong&gt;Security can’t be established by hiding things&lt;/strong&gt; or considering they are not understandable, cybercriminals have the time, intelligence and tools to find anything. A common error is to leave sensitive data in a development folder. Everything that is available in a website for example, even in sub-folders should be considered public.&lt;/p&gt;

&lt;p&gt;Multiple techniques enable attackers to find hidden or forgotten information: &lt;a href="https://www.csoonline.com/article/3445357/what-is-osint-top-open-source-intelligence-tools.html"&gt;Open Source Intelligence,&lt;/a&gt; &lt;a href="https://www.greycampus.com/opencampus/ethical-hacking/dns-enumeration"&gt;DNS enumeration&lt;/a&gt; (active or passive), attacks through folders and files dictionaries, website archives are some of them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;You need to protect the information in a way that even with complete knowledge of how things work, you can’t exploit it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In one case we got access to the source code of a Java application. In this application, they used a function called Math.random to generate a one-time password. This function is in fact a formula :&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;X n+1 = (a.Xn+c) mod m&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;where &lt;em&gt;a&lt;/em&gt; is a multiplier, &lt;em&gt;c&lt;/em&gt; an increment and &lt;em&gt;m&lt;/em&gt; a modulo&lt;br&gt;&lt;br&gt;
This formula generates pseudo-random numbers. These numbers constitute a sequence for which each new number depends on the previous one. The initial term &lt;em&gt;X0&lt;/em&gt; is called the seed. Each seed generates a new sequence. The modulo defines the randomization space.&lt;/p&gt;

&lt;p&gt;The sequence seems random but it is, in fact, predictable. &lt;strong&gt;We just needed a sequence of 3 numbers&lt;/strong&gt; , which we got by enrolling 3 times. From the 3 numbers, we could reverse engineer the formula using brute-force techniques. Current processing power makes it easy and quick. In this case, the function elements were static numbers in the java code, the only unknown element was the seed.&lt;/p&gt;

&lt;p&gt;You need to protect the Intellectual Property that is present in your code because if it leaks it can give hackers a lot of useful information to exploit.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;But you also discover hardcoded secrets, like credentials?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Oh yes… and cookies and tokens which have a longer lifespan, as passwords are often expired, but not always… also we can deduct things from accounts, password structure, the way they are used, internal machine names, internal IP addresses, even proxies. We often use multiple items together to succeed, one leading to another. &lt;strong&gt;So never consider something as not important.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In fact, I really believe that there is always a way to get in. Social engineering being one, even if people are trained. &lt;strong&gt;There is always a weak link.&lt;/strong&gt; Some profiles are also easier to bypass because it is their vested interest to comply. I am thinking for example about sales reps or support teams. IT needs to make sure access rights are correctly managed. Do sales need to access Jira tickets? &lt;strong&gt;Because in Jira tickets you often find security issues.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;But don’t get me wrong, &lt;strong&gt;developers are also potential targets&lt;/strong&gt; , even if it is a bit more difficult. We can use personal accounts and credentials leaked to embody a developer and create trust with their colleagues.&lt;/p&gt;

&lt;p&gt;In the end, &lt;strong&gt;security should really focus on detection&lt;/strong&gt;. Being compromised is not a major issue if you react early, because the initial intrusion is limited to a very narrow scope. This is a shift we’d like security teams to take, adding a discriminating alert layer to their protection. &lt;strong&gt;They should not only focus on preventing but also on alerting.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As you can see, Philippe has some interesting stories to share as well as some useful recommendations to make. If you are interested, keep following the Red Team Chronicle by subscribing to our newsletter or following us on Twitter or LinkedIn.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stay tuned for Episode 5!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published at&lt;/em&gt; &lt;a href="https://blog.gitguardian.com/red-team-chronicles-episode-4/"&gt;&lt;em&gt;https://blog.gitguardian.com&lt;/em&gt;&lt;/a&gt; &lt;em&gt;on September 15, 2021.&lt;/em&gt;&lt;/p&gt;




</description>
      <category>cyberthreat</category>
      <category>redteam</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>The illusion of the fortress — Red Team Chronicles</title>
      <dc:creator>Carole Winqwist</dc:creator>
      <pubDate>Thu, 15 Jul 2021 15:43:01 +0000</pubDate>
      <link>https://dev.to/gitguardian/the-illusion-of-the-fortress-red-team-chronicles-4gac</link>
      <guid>https://dev.to/gitguardian/the-illusion-of-the-fortress-red-team-chronicles-4gac</guid>
      <description>&lt;h3&gt;
  
  
  Red Team Chronicles — The illusion of the fortress
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1Pgz3QTd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AjBeUMFEllAEyEkHa.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1Pgz3QTd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AjBeUMFEllAEyEkHa.jpg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Last time we briefly touched on the concept of a fortress in cybersecurity. In this Episode, Philippe will do a more thorough analysis on this topic.&lt;/p&gt;

&lt;p&gt;Building a fortress is a strategy from the past. &lt;strong&gt;Mobility, remote working, cloud and SaaS have made the delineation between internal and external networks almost impossible.&lt;/strong&gt; And even beyond these concepts, physical security should be part of your cybersecurity strategy… An attacker does not need to bypass your firewall if he/she can bypass your receptionist and physically connect a device on your internal network.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--y4z6_vzS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AbII0sI7S17BSyTHFsqQtBQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--y4z6_vzS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AbII0sI7S17BSyTHFsqQtBQ.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While some of these scenarios may seem out of James Bond movies, &lt;strong&gt;the reality is that there are plenty of tools readily available to facilitate some of these attacks.&lt;/strong&gt; From &lt;a href="https://proxmark.com/"&gt;RFID attacking tools&lt;/a&gt; that can copy employees’ access cards from a distance to &lt;a href="https://github.com/rfidtool/ESP-RFID-Tool"&gt;RFID implants&lt;/a&gt; that can be installed on the card readers themselves &lt;a href="https://youtu.be/7VVpg6Fh1a4"&gt;in under a minute&lt;/a&gt;, these types of attacks no longer require really advanced skills.&lt;/p&gt;

&lt;p&gt;RFID access cards usually contain two values: Facility Code and Card ID. The facility code is usually the equivalent of the code of a building and is generally the same for all employees. On the other hand, we have observed that the Card ID is often incremental, which means that if an attacker can copy the card of one employee, it is then possible to perform other types of attacks (e.g. brute force) to then gain access to more sensitive areas such as computer/ network rooms.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---wloIdkh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A-Ul8rQpTV-7F5z68lmJC1g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---wloIdkh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A-Ul8rQpTV-7F5z68lmJC1g.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Here is a picture of a custom tool that can perform this type of physical brute force attack against card readers.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Sometimes we do not even need to copy access cards, gaining access to office buildings is as easy as following the crowd in the morning and block a meeting room for the day.&lt;/p&gt;

&lt;p&gt;In large organizations, we often see screens that tell you which rooms are reserved or available.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8R8xDBsy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/955/1%2AxXpagAvgIqfez0bicxFrgQ.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8R8xDBsy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/955/1%2AxXpagAvgIqfez0bicxFrgQ.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Our favorites are the ones that even let you reserve a room for several hours directly from a touch screen.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Meetings rooms often offer network and telephony access, so once an attacker has physical access to it, the opportunities are endless.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Moving away from physical access, let’s look at the targets.&lt;/p&gt;

&lt;p&gt;Generally, Attackers do not prioritize their initial targets based on their level of access. The first goal is to obtain initial access and then move laterally to other systems or vertically to escalate privileges.&lt;/p&gt;

&lt;p&gt;We see a lot of efforts and solutions implemented to secure the final targets but the initial targets are usually left out with little to no protections.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;When attackers acquire users’ authentication elements, they don’t need to further exploit any vulnerabilities, they are already in the system as a valid user.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Keep in mind that the initial target is not always a person, it can also be a machine connected to the network. Multi-Function printers are a good example. These devices often have default passwords and in order to send scanned documents by email or on a network share, credentials are often stored on it. &lt;strong&gt;These are perfect entry points for attackers.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To add to this, if your SSO is not well configured (e.g. auto enrollment), then it means the technical user account configured on the printer can also access systems like Jira or Slack which very often host a good number of secrets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;And what about two-factor authentication (MFA)?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It is a good thing and we recommend to our customers to use it because makes life more difficult for attackers. BUT deploying MFA does not make you immune against all attacks.&lt;/p&gt;

&lt;p&gt;We recently worked on a security incident for one of our customers, where the attackers were able to exploit a vulnerability in their VPN appliance in order to retrieve the cookies/sessionID of authenticated users in order to gain unauthorized access to the VPN and move laterally to the internal network.&lt;/p&gt;

&lt;p&gt;As you can see, Philippe has some interesting stories to share as well as some useful recommendations to make. If you are interested, keep following the Red Team Chronicle by subscribing to our newsletter or following us on twitter or LinkedIn.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stay tuned for Episode 4!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published at&lt;/em&gt; &lt;a href="https://blog.gitguardian.com/security-illusion-of-the-fortress/"&gt;&lt;em&gt;https://blog.gitguardian.com&lt;/em&gt;&lt;/a&gt; &lt;em&gt;on July 15, 2021.&lt;/em&gt;&lt;/p&gt;




</description>
      <category>redteam</category>
      <category>applicationsecurity</category>
      <category>pentesting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>The Red Team Chronicles — No such thing as a miracle solution</title>
      <dc:creator>Carole Winqwist</dc:creator>
      <pubDate>Thu, 24 Jun 2021 14:52:51 +0000</pubDate>
      <link>https://dev.to/gitguardian/the-red-team-chronicles-no-such-thing-as-a-miracle-solution-1078</link>
      <guid>https://dev.to/gitguardian/the-red-team-chronicles-no-such-thing-as-a-miracle-solution-1078</guid>
      <description>&lt;h3&gt;
  
  
  Red Team Chronicles — No such thing as a miracle solution
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--i9nqOSBX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2Apjc6ZzHREPJQBLEkkOpCBQ.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--i9nqOSBX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2Apjc6ZzHREPJQBLEkkOpCBQ.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Now you’ve met Philippe, let’s talk about a very common misconception that security professionals may have: “I have already bought this “all-in-one” or “one-size-fits-all” solution, so now I should be safe.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--C6WgXmJx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A2DYpAfSFk4HlWsKYM_3k7A.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--C6WgXmJx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A2DYpAfSFk4HlWsKYM_3k7A.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Let’s listen to what Philippe has to say about this.
&lt;/h3&gt;

&lt;p&gt;When talking to various organizations, I regularly meet IT teams who would love to find THE solution. You know, this perfect tool that you would just have to install and you’d be protected against all possible attacks… As you can imagine, such a solution does not exist despite claims from unscrupulous vendors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Quite often, we see security solutions that are not properly implemented or simply do not work as expected.&lt;/strong&gt; This often leads to generating too many false positives where normal events get miscategorized as security incidents and end up being ignored over time (until real security incidents occur). This is what we call &lt;strong&gt;“security fatigue”&lt;/strong&gt;. On the other hand, some security solutions are not properly configured leading to false negative, where real security incidents do not even generate an alert.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;When we successfully penetrate an organization’s IT infrastructure, either we do not trigger an alert because their notification systems have been disabled, or, they have so many alerts that the alert that really matters is lost in the mix and gets ignored.&lt;/strong&gt; This is one of the reasons why, one of our last phases after a successful compromise is to voluntarily perform actions that should generate alerts in order to measure the detection capabilities of our customers. And surprisingly, most of the time this does not trigger any response.&lt;/p&gt;

&lt;p&gt;For example, we create a new rogue domain admin user. This is typically easy to detect and could be an indicator that something wrong is happening: an admin user is not created every day, and its creation should follow a strict change management process. As such, these types of events should be under strict surveillance.&lt;/p&gt;

&lt;p&gt;The bottom line here is that security teams (and real-time monitoring solutions) should focus on compromise indicators rather than trying to look at everything all the time. They should also evaluate each solution to ensure that it does what it claims and they should run diagnostics to evaluate what solutions are needed &lt;strong&gt;and how they should be implemented&lt;/strong&gt;.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;One piece of advice: Do not take for granted vendors’ claims. I cannot count the number of times we bypassed so-called “new generation security tools” with very basic techniques.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;For instance, a few years back, one of our clients spent over 6 months (and a lot of money) to deploy a &lt;em&gt;new generation&lt;/em&gt; antivirus throughout their organization, and it took us less than 5 minutes to realize that it could be deactivated by simply uninstalling the application. This demonstrates a typical issue when organizations overprotect one door, but they leave another door wide open. As an attacker, if you run into a security solution that is efficient you simply try to go around it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--IVb4-EOB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AzlhO2_m2qEyUoG36.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--IVb4-EOB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AzlhO2_m2qEyUoG36.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When evaluating your security posture, you should always try to look at your environment like an attacker would. This is why our slogan is “We protect you from people like us.”&lt;/p&gt;

&lt;p&gt;You should think of all possible entry points and have a holistic approach to cover all your bases, rather than try to build a fortress around your crown jewels. This is why running red team exercises internally or externally is important.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;As you can see, Philippe has some interesting stories to share as well as some useful recommendations to make. If you are interested, keep following the Red Team Chronicles by subscribing to our newsletter or following us on twitter or LinkedIn.&lt;/em&gt; &lt;a href="https://blog.gitguardian.com/security-illusion-of-the-fortress/"&gt;Checkout &lt;em&gt;Episode 3&lt;/em&gt;&lt;/a&gt;&lt;em&gt;!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published at&lt;/em&gt; &lt;a href="https://blog.gitguardian.com/red-team-chronicals-miracle-solution-philippe-caturegli/"&gt;&lt;em&gt;https://blog.gitguardian.com&lt;/em&gt;&lt;/a&gt; &lt;em&gt;on June 24, 2021.&lt;/em&gt;&lt;/p&gt;




</description>
      <category>pentesting</category>
      <category>cybersecurity</category>
      <category>redteam</category>
      <category>applicationsecurity</category>
    </item>
    <item>
      <title>Red team chronicles — Looking over the shoulder of a Pentester</title>
      <dc:creator>Carole Winqwist</dc:creator>
      <pubDate>Wed, 16 Jun 2021 16:56:50 +0000</pubDate>
      <link>https://dev.to/gitguardian/red-team-chronicles-looking-over-the-shoulder-of-a-pentester-57n9</link>
      <guid>https://dev.to/gitguardian/red-team-chronicles-looking-over-the-shoulder-of-a-pentester-57n9</guid>
      <description>&lt;h3&gt;
  
  
  Red team chronicles — Looking over the shoulder of a Pentester
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TUVh4YWz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AUdzT3xWmXW1RFbMy.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TUVh4YWz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AUdzT3xWmXW1RFbMy.jpg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While developing our products we want to battle test them and get feedback from cybersecurity experts. This is how we met Philippe Caturegli, offensive security expert at &lt;a href="https://www.netragard.com/"&gt;Netragard&lt;/a&gt; and &lt;a href="https://www.seralys.com/"&gt;Seralys&lt;/a&gt;. Conversing with Philippe is always a very insightful experience and we wanted to share a bit of this through the Red Team Chronicles. The chronicles will be presented through a fly-on-the-wall viewpoint, in order for you the reader to &lt;strong&gt;grasp the reality of the battlefield&lt;/strong&gt;. Philippe will debunk some common misconceptions and share best practices to avoid serious compromise.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;So let’s start by introducing the Chief Hacking Officer, as he likes to present himself. Meet Philippe.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Tc7fzhp0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AXqlE-aj-sGk4oja8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Tc7fzhp0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/0%2AXqlE-aj-sGk4oja8.png" alt=""&gt;&lt;/a&gt;Philippe Caturegli — Chief Hacking Officer&lt;/p&gt;

&lt;p&gt;Philippe is passionate about Cybersecurity. &lt;em&gt;He kind of fell in it when he was little&lt;/em&gt; (this is a typical French expression if you are familiar with Asterix &amp;amp; Obelix).&lt;/p&gt;

&lt;p&gt;When he was 16, his parents bought him his first personal computer, and at the time it was really expensive to be connected to the internet via long-distance dial-up calls, so &lt;strong&gt;why pay to connect somewhere when you could develop a BBS server and have people connect to you instead&lt;/strong&gt; and exchange files and messages there… He did not really play games with his computer but was more interested in understanding how everything worked, if there were safeguards in place, and if so, how to get around them.&lt;/p&gt;

&lt;p&gt;At the time it was kind of simple. For software for example, serial numbers were only checked by a simple line of code with IF conditions, you just had to overwrite checks, and there you go, &lt;strong&gt;whatever the serial number, it was approved and you could install the software.&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“_The real game was in fact to work around the controls.&lt;/em&gt;”_&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Kind of a rogue teenager, no?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Even if he trained as an IT engineer, Philippe thinks he learned cybersecurity mostly by practicing on his own.&lt;/p&gt;

&lt;p&gt;His first experience of an attack was when &lt;strong&gt;a website he developed for a client was hacked by an SQL injection&lt;/strong&gt;. At that time no one understood what an SQL injection was. “ &lt;em&gt;As developers, we focused on the final results, is the website working, is it nice… We did not care about security. I started to look at the code of other sites and I noticed that most of them were exposed in the same way&lt;/em&gt; “.&lt;/p&gt;

&lt;p&gt;His first job was for a global pharmaceutical company. He was responsible for the security perimeter (firewall, IDS). At the time, the typical approach to security was really like building a fortress.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;During this first experience, is this when you really grasped the impact security could have on a business?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Exactly, in pharma your core business is manufacturing drugs, not deploying firewalls. Here is an example of what I faced: Changing a firewall is a question of hours, but on the business side it has huge repercussions. I had to update a firewall for a manufacturing site producing cancer treatments and the risk was that if the update failed, the manufacturing line would stop. They could not take this risk, so they took months to build a stock, just in case, and then another couple of months to absorb the oversupply they had created. You understand the difference of perception?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Build, Defend and Attack, Why do you think mastering the three makes you a good offensive security expert?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are 3 types of experience in cybersecurity: build, defend and attack and I think the best offensive profiles, &lt;strong&gt;the ones who strive in Red Teams, are the ones who experienced all three&lt;/strong&gt;. If you have built and defended, you understand the shortcuts developers and security teams take and you can exploit them in simulated attacks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;You are now an entrepreneur and you specialize in intrusion tests?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Yes I want to be able to replicate real-life situations when performing tests, not simply run scans and deliver a report.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Concerning the attacks that you witness, do you see an evolution in the type of attacks or the way they are handled?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Yes, I have seen a shift with the rise of ransomware. It’s all over the news. Beforehand, the main idea was to get access to the machine and then use it as long as possible, remaining unseen in order to monetize the access over time by joining the compromised machine to a botnet. Now it is often the opposite, as soon as hackers get access to the machine, they encrypt everything and ask for a ransom in order to monetize more and faster.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;So what’s the main issue now?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Well, even if budgets and resources for cybersecurity increase, the situation does not get better. Detection time is still extremely long, the average time to detect an intrusion is above 200 days when the average time between the initial intrusion and the irrevocable compromise is 4 hours. You see how huge the gap is. Intrusions are sometimes so difficult to track that they can be taken for internal fraud. I have experienced this with a bank that underwent malicious money transfers. At first, the audit team was sure that it was coming from an insider, as the transfers complied with all internal checks and processes. But in fact, the attackers were present in the systems for over 6 months and had access to most systems and documentation, so they could learn everything needed to behave like an authorized employee, go through operational check and turn their knowledge into money.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Are hackers independent or is there a real &lt;em&gt;“hacking economy”&lt;/em&gt;?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The dark web is now well organized, with hackers organized by specialty. Hackers tend to specialize in what they are good at, compared to others. Some will scan the internet for potential vulnerabilities, default passwords, etc. but they are not always able to monetize these vulnerabilities, so they sell the information to groups capable of monetization. There are even some groups specialized by industry verticals (such as finance or pharma), based on the experience of their members.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;And what are companies doing to react to this situation?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;What I experience a lot is that companies rely on generic solutions to defend themselves. Each vertical has its own specificities and security approaches should take this into account. I can tell you a lot more about this but I guess it needs another episode :-)&lt;/p&gt;

&lt;p&gt;As you can see, Philippe has some interesting stories to share as well as some useful recommendations to make. If you are interested, keep following the Red Team Chronicle by subscribing to our newsletter or following us on Twitter or LinkedIn.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.gitguardian.com/red-team-chronicals-miracle-solution-philippe-caturegli/"&gt;&lt;strong&gt;Checkout Episode 2!&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published at&lt;/em&gt; &lt;a href="https://blog.gitguardian.com/redteam-chronicles-episode1-pentesting/"&gt;&lt;em&gt;https://blog.gitguardian.com&lt;/em&gt;&lt;/a&gt; &lt;em&gt;on June 16, 2021.&lt;/em&gt;&lt;/p&gt;




</description>
      <category>applicationsecurity</category>
      <category>pentesting</category>
      <category>cybersecurity</category>
      <category>redteam</category>
    </item>
    <item>
      <title>CISO Live with Yury Koldobanov — Director of IT at Mirantis</title>
      <dc:creator>Carole Winqwist</dc:creator>
      <pubDate>Wed, 09 Jun 2021 16:15:29 +0000</pubDate>
      <link>https://dev.to/gitguardian/ciso-live-with-yury-koldobanov-director-of-it-at-mirantis-478k</link>
      <guid>https://dev.to/gitguardian/ciso-live-with-yury-koldobanov-director-of-it-at-mirantis-478k</guid>
      <description>&lt;h3&gt;
  
  
  CISO Live-Yury Koldobanov-Director of IT at Mirantis
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TFpRtlnW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A_RlsNkw7XVzek09_07A0wA.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TFpRtlnW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A_RlsNkw7XVzek09_07A0wA.jpeg" alt=""&gt;&lt;/a&gt;Yury Koldobanov — Director of IT Mirantis quote&lt;/p&gt;

&lt;p&gt;Mirantis helps organizations ship code faster on public and private clouds. The company provides a public cloud experience on any infrastructure from the data center to the edge. Mirantis empowers a new breed of Kubernetes developers by removing infrastructure and operations complexity and providing one cohesive cloud experience for complete app and DevOps portability.&lt;/p&gt;

&lt;h3&gt;
  
  
  Challenges
&lt;/h3&gt;

&lt;p&gt;Mirantis development teams are using GitHub extensively, with an infrastructure as code mindset. Like most developers today, they handle increasing amounts of credentials, and as Yury Koldobanov Director of IT and acting CISO puts it: “The combination of people working on Git repos and the handling of credentials leads to issues.”&lt;/p&gt;

&lt;p&gt;Yury’s team found out that some companies were impacted by secrets leakage via Github repositories and decided to work toward proactively preventing this from happening to Mirantis.&lt;/p&gt;

&lt;h3&gt;
  
  
  Solution
&lt;/h3&gt;

&lt;p&gt;Since manually investigating hundreds of repositories is ineffective and costly Mirantis started looking for a solution.&lt;/p&gt;

&lt;p&gt;Yury’s team first considered a hybrid DLP / analyst tool, with keyword-based detection capabilities for GitHub but which also covered other data sources such as Google Drive, dark web, etc. However, the key point for Yury was that GitHub is a different kind of data source with different considerations&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;“Like many software companies Mirantis is concerned about leaking keys”&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The need for a solution specialized in GitHub monitoring and capable of sophisticated secrets detection became obvious.&lt;/p&gt;

&lt;p&gt;Another important consideration was automation and detection time. Given that malevolent actors are actively scanning GitHub, having manual analysis of potential incidents would have a huge impact on detection time. This was both the case for bug bounties and for the DLP tool. GitGuardian’s ability to detect leaks instantaneously and immediately alert Mirantis’ security team was hence crucial.&lt;/p&gt;

&lt;p&gt;Another key differentiator for Mirantis was GitGuardian’s ability to automatically identify Mirantis’ publicly active developers, and therefore to create a dynamic perimeter to monitor.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;“Most DLPs would put the burden of defining the perimeter on us”.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This enables GitGuardian to not only focus on known corporate repositories, but most importantly on developers’ personal repositories, where companies typically have no visibility.&lt;/p&gt;

&lt;p&gt;GitGuardian is now leveraging the development team workflows by integrating with Slack, which is heavily used by the team. The customizable integration allows specific alerts to be routed to the appropriate Slack channel.&lt;/p&gt;

&lt;h3&gt;
  
  
  Results
&lt;/h3&gt;

&lt;p&gt;Alerting is only the first step, which is why GitGuardian also helps with the remediation aspect of the Incident Response process. Mirantis developed a triaging and severity rating questionnaire that they sent to developers with a precise and standardised set of questions and leverages the GitGuardian “Developer in the Loop” feature. This in app feature streamlines the information collection process and centralization in GitGuardian’s dashboard, which enables Mirantis’ teams to more quickly understand the context of a given incident thus facilitating the investigation and remediation. Without this feature, Yuri’s team would have to less efficiently collect feedback from different systems (email, Jira, Slack) and request actions from different stakeholders manually. Mirantis also found that involving developers in the remediation process is also a great way to raise secrets leakage awareness.&lt;/p&gt;

&lt;p&gt;Having been a GitGuardian customer for almost two years, Mirantis has been very positive about both their experience working with the GitGuardian team, and the enhancements brought to the product.&lt;/p&gt;

&lt;p&gt;Mirantis also had a good experience thanks to GitGuardian’s customer-centric approach “GitGuardian is flexible and reacts fast to feedback. I can talk about my specific needs, and see a reaction from the team very quickly. GitGuardian also provides guidance and best practices to help us grasp all details of this aspect of cyber security.”&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;“In an ideal world we would have several other security and detection systems, but for us, as a software vendor, we need to focus on what really matters. And this is our IT stack: Secrets are the keys to your kingdom”&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  What’s next
&lt;/h3&gt;

&lt;p&gt;GitGuardian is already well-integrated in Mirantis development stack thanks to the Slack integration. In order to go further, Mirantis is looking forward to having GitGuardian integrated with other systems it uses, since it would remove the need for some manual tasks and benefit from GitGuardian expanding its detection capabilities.&lt;/p&gt;

&lt;h3&gt;
  
  
  Interview
&lt;/h3&gt;

&lt;p&gt;Learn more about Mirantis usage and experience listening to this interview on Tech Strong TV — Digital Anarchist.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zAq10_wh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/500/0%2Atjx_0_mb-aMOvAHU.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zAq10_wh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/500/0%2Atjx_0_mb-aMOvAHU.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published at&lt;/em&gt; &lt;a href="https://blog.gitguardian.com/ciso-live-mirantis-yury-koldobanov-director-of-it/"&gt;&lt;em&gt;https://blog.gitguardian.com&lt;/em&gt;&lt;/a&gt; &lt;em&gt;on June 9, 2021.&lt;/em&gt;&lt;/p&gt;




</description>
      <category>cybersecurity</category>
      <category>codesecurity</category>
      <category>mirantis</category>
      <category>applicationsecurity</category>
    </item>
    <item>
      <title>CISO live — Anne Hardy from Talend</title>
      <dc:creator>Carole Winqwist</dc:creator>
      <pubDate>Sat, 06 Feb 2021 11:39:48 +0000</pubDate>
      <link>https://dev.to/gitguardian/ciso-live-anne-hardy-from-talend-5e76</link>
      <guid>https://dev.to/gitguardian/ciso-live-anne-hardy-from-talend-5e76</guid>
      <description>&lt;p&gt;&lt;strong&gt;Talend is a global leader in data integration and data integrity solutions and a pioneer in the open source world. Talend was the first company to market open source data integration software. As a result of this “open source DNA,” Talend uses GitHub.com extensively to collaborate and share code with the community.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--t4gyvMEO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AOur8dkEpAWrRnzXQpA88nw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--t4gyvMEO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AOur8dkEpAWrRnzXQpA88nw.png" alt=""&gt;&lt;/a&gt;Anne Hardi — CISO Talend quote&lt;/p&gt;

&lt;h3&gt;
  
  
  Challenges
&lt;/h3&gt;

&lt;p&gt;When Talend CISO, Anne Hardy, joined the company in 2020, she quickly identified that there was an issue relating to infrastructure credentials and other secrets leaking through GitHub.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“When I arrived, I heard about quite a few issues with GitHub, including leaks of private information, keys, passwords that could be unintentionally stored and publicly exposed on GitHub by our developers or some of our professional services. We absolutely had to deal with the problem quickly.”&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Talend had already tried to remedy this problem by developing an in-house tool. This complex project quickly exposed the limitations of building effective in-house detection solutions. The solution not only had some flaws but also proved to be both challenging and expensive to maintain. Additionally (and crucially), it couldn’t identify and monitor developers’ public personal repositories.&lt;/p&gt;

&lt;h3&gt;
  
  
  Solution
&lt;/h3&gt;

&lt;p&gt;It was at this point that Talend decided to look for a ready-made solution available on the market. The desired solution needed to allow for active monitoring of all their GitHub code repositories as well as the public personal code repositories of their developers.&lt;/p&gt;

&lt;p&gt;“We started by looking at open source solutions such as &lt;a href="https://github.com/zricethezav/gitleaks"&gt;Gitleaks&lt;/a&gt; and &lt;a href="https://github.com/dxa4481/truffleHog"&gt;truffleHog&lt;/a&gt;, but they did not meet our expectations. In particular, it was necessary to declare all the directories to be monitored, which represented a substantial workload.” Indeed, it is tricky to identify personal repositories belonging to developers, especially when dealing with large teams. Automating this process was the only feasible way forward.&lt;/p&gt;

&lt;p&gt;“Then we discovered the GitGuardian solution, and analysts confirmed that it was a solid solution and suited our needs.”&lt;/p&gt;

&lt;h3&gt;
  
  
  Results
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“Once we decided to deploy GitGuardian’s GitHub public monitoring solution, the ramp up was rapid. As soon as we had access to the platform, we were able to start remediating past incidents.”&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In parallel with the deployment of the solution, a procedure was put in place to treat of this type of leak, and all 400 developers were trained on secrets management.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“What I have found to be very effective with GitGuardian is that we can analyze the history of Talend related alerts on the entire GitHub perimeter, whether they are our official public directories or any public directory outside the control of Talend. We launched this audit, and several leaked secrets were brought to our attention. What was very interesting and what we didn’t anticipate was that most of the alerts came from the personal code repositories of our developers.”&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;GitGuardian can confirm that almost 80% of corporate leaks on GitHub occur on personal repositories.&lt;/p&gt;

&lt;p&gt;Talend’s first priority after taking ownership of the solution was to go through the list of historical incidents and enact the new procedure. This allowed them to start on a sound basis and rely on GitGuardian’s real-time alerting going forward. “It took us 3 months to clean everything up and solve problems especially with employees who had left the company.”&lt;/p&gt;

&lt;p&gt;Today, GitGuardian continuously monitors all commits within Talend’s perimeter, whether on Talend-owned repositories or developers’ personal repos. Credentials are detected a couple of seconds after they become publicly-visible and then listed on the dashboard along with information that will facilitate remediation.&lt;/p&gt;

&lt;h3&gt;
  
  
  Key Quote
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“Human error exists, but the key is to be alerted and be able to take appropriate action when a leak is found.”&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  What’s Next
&lt;/h3&gt;

&lt;p&gt;Talend has deployed GitGuardian for the Infosec team. They will also extend it to their team of security champions, developers who will act as an extension to the Infosec team and encourage best practices.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published at&lt;/em&gt; &lt;a href="https://blog.gitguardian.com/talend-customer-story/"&gt;&lt;em&gt;https://blog.gitguardian.com&lt;/em&gt;&lt;/a&gt; &lt;em&gt;on February 6, 2021.&lt;/em&gt;&lt;/p&gt;




</description>
      <category>cybersecurity</category>
      <category>talend</category>
      <category>applicationsecurity</category>
      <category>github</category>
    </item>
  </channel>
</rss>
