Ryan Nolette is a security technologist and threat Hunter at Sqrrl Data, which markets software for big data analytics and cyber security. In this lightning talk, Ryan gives an overview of the threat hunting process, and recommends visualization methods that expedite the process.
Ryan begins the discussion by showing what the process is currently like without visualization; it is monotonous, tedious and inefficient. By recognizing that humans are visual beings and naturally attuned to finding patterns, Ryan demonstrates how utilizing a visualization tool can save both money and time for security professionals.
It is clear that humans are visual learners, and Ryan puts together a very cohesive lightning talk that puts this into persecutive in a security context. By eliminating the tedious and repetitive actions, security professionals can find threats in a fraction of the time compared to conventional log crawling methods.
Brian Carrier (@carrier4n6) is the Vice President of Digital Forensics at Basis Technology, a software company specializing in applying artificial intelligence techniques to understanding documents and unstructured data written in different languages. In this lightning talk, Brian gives an overview of his experiences in using and designing open source security tools.
Brian begins his talk with a little about his experience in security, and how security tools were very limited early on. When Brian was still a student, Dan Farmer and Wieste Venema released The Coroner’s Toolkit (TCT), and from there, Brian built on top of that to deliver a more friendly user experience, resulting in Autopsy. He then discusses the evolution of digital forensics, moving from individual tools to platform-based tools.
This talk zeroes in on the importance of the user experience in digital security and how the security space is constantly evolving. Brian focuses on the importance of extensibility in the security space, and gives real-world examples of how improving the design of security tools leads to more users.
Liam Randall (@Hectaman) is the Senior Director of Software Engineering at Capital One and the Founder and CEO of Critical Stack, a sensor delivery network. Liam’s keynote presentation gives a detailed overview of the state of open source cyber security.
Being a security professional himself, Liam’s presentation is incredibly insightful in terms of approaching the problems currently facing the cybersecurity space as a security professional, and what open source projects can do to not only help companies, but also help themselves stay one step ahead of attackers. Perhaps the most significant takeaway from Liam’s talk is the importance of application delivery within organizations, and how the use of containers, which provide modular and isolated application delivery along with backwards compatibility.
Liam delves into great detail about certain open source projects, especially the Mitre attack framework, making this talk relevant for anyone interested in cybersecurity. He also understands that agility is critical, as it drives organizations towards responding rapidly in an advanced environment, providing valuable business insight as well.
There are three properties that differentiate osquery from other technologies; osquery is “platform agnostic”, meaning it can run on a wide array of machines. Osquery is also extremely scalable, as it has been used over at Facebook, demonstrating that it can run on one machine or hundreds of thousands of machines. Finally, osquery is an open source project, meaning that the community is doing much of the development and pushing the technology forward.
This lighting talk demonstrates the value of osquery as an open project, especially in security settings. While only scratching the surface of osquery, Jason does a great job explaining the factors that are making osquery one of the most important open source projects available today while painting a broad picture of the platform’s capabilities and uses.
Tim Byrd, SVP of Enterprise Information Security at Wells Fargo, speaks about the growing space of cyber security information sharing. Whether you're completely new to ISACs or a member of one yourself, hear Tim talk about how the space currently looks and where it's going.
Hear from some of the best from the open source security community in May! Whether you're an open-source contributor, cyber practitioner or someone interested in the security space, our single track conference will offer engaging panels, great networking and a keynote speaker to get you away from the office on monday!
- Date: 5/15/17
- Location: Hatch Fenway
- Time: 9a - 4p
Make sure you get your ticket for OpenSec 2017!
Attendees at OpenSec 2017 will have the opportunity to hear from top cyber security experts in the Boston area. In addition to keynotes addressing the current state of open source cyber security, how companies choose between open source, proprietary, or existing cyber security solutions, and more, there will also be a series of lightning talks. This fast-paced series will focus on specific open source projects and how they are being leveraged for cyber security uses.
We will first hear from Jason Meller, CEO at Kolide, about osquery. Among the most popular open source projects on GitHub, osquery allows users to ask questions to their Linux, Windows, and MacOS infrastructure and get accurate answers quickly. Osquery is often used for security purposes such as intrusion detection and pulling data from endpoints, but it can also be used to collect basic information about configuration and more. This talk will give you a solid foundation in what osquery is, how to install it, how to use it, what to avoid, and how to use open source solutions to protect endpoints on a broader level.
We will then hear from Brian Carrier, VP of Digital Forensics at Basis Technology, about Sleuth Kit. Sleuth Kit is an open source collection of command line tools and C library, largely developed by Brian, built to enhance digital investigations and incident response. At the conference, Brian will go over the basic functions of Sleuth Kit, and how it can be leveraged to create a strong incident response program through data analysis, giving companies the resources they need to respond to threats at thoroughly as possible.
Finally, we will hear from Ryan Nolette, Primary Security Technologist at Sqrrl. Ryan will speak about the benefits of visual threat hunting using open source solutions, specifically visualizing bro data with grapvizz. Visualizing your threat hunting exercises helps lower the bar of entry for threat hunting and provides answers to the common questions of - How do I get started? How can I explain what I found to my management? How do I justify my time?
To learn more about how these specific open source solutions are affecting cyber security, join us at OpenSec 2017 on May 15th!
With OpenSec 2017 ten days away, we are catching up with a few of this year’s panelists to hear the breadth of opinions surrounding the current state of open source cybersecurity, and where it is heading.
This week we spoke with Craig Chamberlain, Director of Security at Cogito. Craig is well known in the security space, working as a security consultant for various financial, defense, and government entities, as well as publishing security research.
To hear more from Craig and other leaders in the open source community, sign up for OpenSec 2017 on May 15th.
Craig Chamberlain @randomuserid
What aspects of cyber security got you interested in the space? How did you get your start?
I remember being on a tour of MIT once and hearing them describe how they had to disconnect the student grade tracking system because it was impossible to keep the students out of it. I remember thinking, they have one of the world's best collections of computer science knowledge and talent and they can't keep the students from hacking the grade system? I was sort of fascinated. Later I had more under-fire experience running Internet facing servers through the 2000 - 2005 period when the world experienced a series of historic security fire drills. The changing and adversarial nature of the problem set pulled me in. I went on to help build some security products and had amazing experiences along the way.
What advice would you have for people moving into or up in the Cybersecurity space?
Look for employers willing to invest in training and continuous education that is important to building skills and being successful. Share research; give talks at conferences and participate in the community. To quote Yoda, "Mind what you have learned. Save you it can. Pass on what you have learned.."
Once you get established, and feel comfortable mentoring, start looking for team members who show interest in, or aptitude for, security. Nurture this. Take them to conferences and meetups with you and hep them get started in security. The cost / benefit curve of building talent, rather then buying, is astronomical. Growing talent will become more and more strategic as talent inflation worsens.
What are some products or solution spaces you're watching and excited to see grow?
At the moment everything revolves around data science and machine learning. One practical application for these technologies I'd like to see is the application of graph analysis and entity-relationship based anomaly detection for threat hunting and intrusion detection; I'm working on a blog post to elaborate on how I would use this.
Where do you see cybersecurity going in the next 5-10 years?
Probably a shift towards automation and algorithmic security management and incident response tooling. The problem of talent inflation has become acute as threats evolve and proliferate. Throwing people at the problems isn't working due to scarcity and what I call "inflation fatigue" among business leaders.
Why do you think open source can make a huge impact on security?
Many security product companies are too focused on simple sales cycles in order to quickly build valuations. Product road maps are too often dominated by marketing managers who are either unwilling or unable to build really compelling and useful features and capabilities. Open source products allow well-resourced security teams to groom and customize tooling to meet sophisticated workflows and increase velocity in the process.
Interested in hearing Craig expand on his thoughts? Hear him and other Opensource security experts talk at OpenSec 2017!
For today’s OpenSec 2017 preview, we heard from Jen Andre, founder and CEO of Komand.
At Komand, Jen empowers security teams to focus on efficient incident response and decision making by offering the automation of manual tasks, and a space to share this automation and knowhow with the wider security community. Prior to founding Komand, Jen co-founded Threat Stack, and worked at Mandiant and Symantec. She is very involved in the cybersecurity space, authoring multiple articles and speaking at conferences around the country.
To hear more about the current state of open source cyber security from Jen and other leaders in the open source community, sign up for OpenSec 2017 on May 15th.
What got you interested in the cybersecurity space?
Hanging out with computer hackers in the 90s - early 2000.
What advice do you have for people moving up or into the cybersecurity space?
Find some great, friendly mentors, stay curious, and question the status quo.
What are some product or solutions spaces you are watching or excited to see grow?
Machine learning effectively applied to cybersecurity (promised, but yet to be delivered), productivity improvements for SecOps teams (in workflows, deployment of security stack), and better policy and technical deterrents to cyber-related crime.
Want to hear more from Jen? Hear her and other Opensource security experts talk at OpenSec2017!
With OpenSec 2017 less than a three weeks away, we are catching up with a few of this year’s panelists to hear the breadth of opinions surrounding the current state of open source cybersecurity, and where it is heading.
This week we spoke to Jason Meller, Co-founder and CEO at Kolide. At Kolide, Jason and his team are harnessing the power of Osquery to solve cyber security issues using accurate, timely, and queryable data. Prior to founding Kolide, Jason started as a member of GE’s elite computer incident response team, before moving to the Mandiant corporation and FireEye following Mandiant’s acquisition.
To hear more from Jason and other leaders in the open source community, sign up for OpenSec2017! on May 15th.
How are you related to Osquery and what do you think is so powerful about it?
My co-founder Mark Arpaia created Osquery while he was at Facebook. I started Kolide because I am a fan of Osquery. It just so happened that we were able to recruit him on the team. From my perspective, Osquery is just really exciting. It’s the first open source solution that really resonates with people who want to pull accurate and timely data from their endpoints. I think the fact that it is open source, and that there is so much community support behind it is exciting for many reasons. The first is that the existing proprietary software vendors have their own agents, which are these closed source, black box things. The future of host instrumentation is going to become a commodity. There are finite things you can pull from a host that are going to be interesting. Eventually, someone will produce and agent that will pull all of those things as performantly as possible. I think that solution will be an open source one. I think Osquery is in the best position to do that. As far as building a business, we believe that this thing is going to be a commodity, so the value is in what we do with that data, what insight and value are we driving from the data that Osquery collects. That’s what Kolide is all about – making a big bet on Osquery. We really want to grow that community. We think it is an awesome piece of technology, and that the future of the business isn’t necessarily the collection of the data, but what value can you get from it, which provides insight and lets you make competent security decision, DevOps decisions – or any decision where you need accurate and timely data from the host.
Why do you think Osquery is so popular on GitHub?
We kind of talk about the number of stars it has in relation to other security projects, but I think at the end of the day it’s because it’s so useful that it actually transcends the very narrow use case of cybersecurity. It basically allows you to ask any question you can conceive of the to endpoint and get an accurate answer as quickly as possible. The raw utility of that goes far beyond security. Getting good, accurate information as quickly as possible is an amazing capability to have to solve security problems, but it also solves a lot of other problems. One thing that I was really surprised about when we started Kolide was the number of people that cared about the security aspect, but they also use Kolide to get basic data from what’s going on on the Macs that their employees use: the configuration, is the firewall enabled, is it running these rules etc. These are very basic things that are hard to collect, because no one is really focusing on Mac and Linux from an agent perspective. Osquery treats those as first class citizens.
What will people learn by attending your talk at OpenSec?
I’m going to be talking a lot about Osquery itself. We’re not going to make this a commercial pitch for the product. We want people to get excited about Osquery. If you have never used Osquery before, and want to figure out what it is all about, how to install it, and ways that it can solve some problems out of the box you should attend the talk. We are going to walk you through every important facet of Osquery, and give you the materials you need to consider it seriously for your own use cases at your organization. If you are looking for a nice primer for dealing with Osquery this is the talk to you want to attend. You will get a lot of perspective. We know a lot of the sharp edges, and things to avoid that the documentation doesn’t necessarily state explicitly. It should be a fun talk for people who are psyched about Osquery, but also using open source solutions to deal with security issues surrounding endpoints at small or large organizations.
Want to hear more about OSQuery? Hear Jason and other Opensource security experts talk at OpenSec2017!
With OpenSec 2017 less than a month away, we are catching up with a few of this year’s panelists to hear the breadth of opinions surrounding the current state of open source cybersecurity and where it is heading.
This week we spoke to Brian Carrier, VP of Digital Forensics at Basis Technology in Cambridge, MA. In this role, Brian builds incident response software, open source software, and custom software to enhance digital investigations, having largely developed open source projects The Sleuth Kit, Autopsy 1 and 2, mac-robber, and TCTUTILs. Additionally, Brian chairs the annual Open Source Digital Forensics Conference (OSDFCon), which examines the latest open source tools and techniques.
To hear more from Brian and other leaders in the open source community, sign up for OpenSec 2017 on May 15th.
How did you start in Cybersecurity? What initially pulled you in?
I was an intern in the mid-90's when the company got their first internet connection. I got involved with setting up their Linux-based firewall. I then got interested in forensics when the first open source tools started to be released in 2000ish (The Coroner's Toolkit) and started to expand on them because I wanted to learn more. I was working at @stake at the time and we needed incident response tools for our work, so we built them and released them out as open source. I've been maintaining and involved with The Sleuth Kit and Autopsy ever since.
What are some products or solution spaces you're watching and exciting to see grow?
I focus a lot of my time on easy to use products that help companies do their own basic incident response and forensics. The basic idea being that as companies get more security maturity, they need to be able to respond to incidents, but most won't have forensics experts on staff.
Many companies will respond to a SIEM alert by looking at antivirus logs. If the antivirus is happy, then they are happy and that is all they can do. We want to enable companies to go a bit deeper and help them analyze additional data, which is why we've been building our Cyber Triage product.
I think this is a growing space because more companies need to do basic investigations, but don't have the skills or resources to do it.
What do you think makes open source different?
I like open source because it allows for a community to be built around the software. We organize an annual Open Source Digital Forensics (OSDFCon) conference each year (http://www.osdfcon.org) that attracts over 400 people and it’s great to see the developers and users all get together. They are both passionate about the software and what it can do.
From a digital forensics perspective, there is also the benefit of the software being reviewable when entering digital evidence into a court trial. Anyone can verify how it works and you do not need to rely on a software vendor to testify.
Interested in hearing more from Brian? See him talk at OpenSec 2017!
Last Wednesday, 2/1, HackSecure hosted a CyberSecurity panel at Wells Fargo (Thanks to WF for sponsoring!) in Boston. The panel included Tim Byrd, SVP at Wells Fargo, Clement Cazalot, VP of Tech at Intralinks and John McAleer, Senior Manager of IT Security at AthenaHealth. The conversation bounced between how their respective companies look at working with young security startups, what they see as the biggest risk threats for their teams moving forward and what they have on their security roadmaps for 2017. Certainly a fruitful conversation for those able to attend and plenty of advice for young companies targeting enterprise customers. Again thanks to Wells Fargo for hosting and a thank you to every who showed up + stayed for drinks after.
I was advised by many in venture that I wouldn’t last 5 months in venture; I was too impatient, too controlling, too much. Well 5 years later they get to be right, well kind of….
I am stepping down as a General Partner of Accomplice and will not be a GP in Accomplice’s next fund.
Hack Reduce and Hack Secure have proven to be incredibly valuable vehicles to achieve my goal of developing the next generation of great data science and cybersecurity entrepreneurs. Over the past 5 years we’ve built a community of over 7,000 members, having hosted hundreds of events, which led to the funding of over a dozen companies. I’m excited to continue cultivating both ecosystems with the goal of starting many more cybersecurity and data science companies (If you're one of them, get in touch). This requires a tremendous amount of my time and focus.
I also plan on continuing to lead The St. Baldrick’s Foundation’s $100M Tech Fundraising Campaign to end childhood cancer. In the U.S., more children die of childhood cancer than any other disease and I am committed to working with the amazing team at The St. Baldrick’s Foundation to do something about that.
I will continue to represent Accomplice on my portfolio company boards and remain involved with Accomplice as a Senior Advisor. I will continue to work with my seed investments independently and will spend time identifying, investing in and developing entrepreneurs.
Accomplice has become the brand for early stage venture capital in Boston. We've made a ton of progress in our short time, and I'm honored and proud to be a co-founder during this spectacular climb to the top. Our successes give me the opportunity to dig into my personal mission to continue to make Boston great, by focusing on my entrepreneurs, both those I’ve invested in and others I will in the future.
I am very proud of my Atlas and Accomplice partners and my investments over the past five years. I have every expectation to contribute to the delivery of three excellent funds and will always support, enjoy and have an active interest in where Jeff and Ryan take Accomplice from the strong base we’ve built.
My five years in venture has given me the opportunity to spend more time with my family, and collaborate with some incredible entrepreneurs. For this I am incredibly grateful. I want to thank Jeff and Ryan for their friendship, partnership, and for giving me the opportunity to reinvent myself over the last five years as the anti-VC and now to re-invent myself yet again… Stay tuned!
The Boston Tech community has stepped up big and is providing the leadership necessary to kick off our $100M campaign for Tech Tackles Cancer. Your generosity in support of finding a cure for kids cancer through support of St. Baldrick’s, we raised more than $500k, is legend. I want to tell you all how proud I am to know you and say thanks to each and every individual who helped make our 5th annual St. Baldrick’s event at The Landsdowne Pub, such great success and a rocking good time!
Once again, our event had over 500 people: shavees, volunteers, sponsors, Patriots, Celtics, start-up folks, raffle items galore, the great Savtones featuring Chris Cote (who crushed Yellowcard playing down the street). When all is said and done the total to St. Baldricks is over $505k with donations still coming in — we met and exceeded our ambitious goal!
Nationally, St. Baldrick’s is the single largest investor in pediatric cancer research next to the U.S. Government. Unfortunately, every 2 minutes a child is diagnosed with this terrible disease, and it kills more children in the U.S. than all other major diseases combined. Kids cancer is very different from adult cancers and hence requires specific research. Eighty percent of children with cancer have had it spread before being diagnosed and for those who survive 70% have shorter life spans marred with chronic health issues. In spite of these facts, only 4% of US Federal funding is solely focused on children’s cancer research. Further, 60% of adult cancer research funding comes from big pharmaceutical companies, with almost none for childhood cancer research because these drugs are not profitable. This is why we need St. Baldrick’s; 100% of their grant’s go to children’s cancer research, and not to one institution, but to the best and brightest researchers around the world-this is a different and winning strategy.
An event of this magnitude takes a lot of work behind the scenes, so I would like to give a special thanks to the committee responsible for organizing our St. Baldrick’s event. My first thanks is to Ben Hux, Volunteer Event Organizer, and Cort Johnson, Mayor of Tech Boston and hack/secure fame, who have stuck by me to make this happen. My goal is for this event is for it to be a Boston legacy we leave the next generation of entrepreneurs, serving to give us perspective, inspiration, strength, and unity.
Thanks also to Accomplice, Matt Burke, Cynthia Ferranzzani, Will Brierly, Lauren Wedell, Josh Terry, Josh Darling, Brittany Vogel, Boston Celtics Dancers, Patriots Cheerleaders, JLL, DLT, City National Bank, The Savtones, Galen Moore and Kyle Gross of BostInno, and Keith Cline of Venture Fizz for support of the event. Without these people and their assistance, this event would not have succeeded. Thanks to Em Vision films for producing the video to promote the event; and to photographer Winslow Martin and videographer Rosemary Jeneth for documenting the event. I also want to thank the Lyon’s Group, for hosting the event and all of the shavees, stylists, volunteers, and raffle items donors.
The generosity of Boston and the surrounding areas is incredible. I am very fortunate to have people like Mike Egan, Jit Saxena, Art Coviello and Jeff Fagnan in my corner. The sacrifice of the shavees alone is unbelievable. I thank them for their commitment to such a deserving cause.
The St. Baldrick’s Foundation is a volunteer-driven charity committed to funding the most promising research to find cures for childhood cancers and give survivors long and healthy lives. The St. Baldrick’s Foundation does this with the guiding principles of integrity, efficiency, transparency, a pioneering spirit and a sense of fun. It’s never too late to donate, I’ll keep the link live.
Join us and St. Baldrick's in the fight against childhood cancer and to prove, once and for all, that Boston has the greatest tech community in the country. Come out to support the cause, shave your head, and help fight against childhood cancer.
Last year, the Boston tech community raised over $400,000 in support of the fight against pediatric cancer. That was enough money to fund two research grants! This year we're aiming to break $500,000!
You can help us by donating today or attending the event on November 7th at the Landsdowne Pub.
On Saturday April 23rd, hack/secure and SimSpace with sponsorship from Square 1 Bank and Rapid7, hosted the first in a series of attack and defend challenges.
We had a great turnout with over 40 cybersecurity practitioners joining. The challenge, created by SimSpace, offered each team their own network consisting of full operating systems and configured with subtle, yet real world vulnerabilities and/or misconfigurations. Teams were required to use real world scanners, exploitation tools, and post exploitation tactics to capture 10 flags.
After 6 hours of attacking the SimSpace network, the team from Booz Allen Hamilton came out on top, capturing 7 of the 10 flags. Veracode came in a close 2nd followed by Rapid7 and Sqrrl in 3rd.
A big thank you to all those who participated. We look forward to seeing everyone at the next challenge!
Our July meetup was another riveting post-workday gathering of Boston’s local cybersecurity pros in Cambridge’s Kendall Square. After socializing with a slice of pizza and beer in hand, everyone centered their attention to the two guest speakers prepared with lightning talks:
First up at bat, Mike Li started off the night with a focus on exploitation frameworks: what to use, how to apply that tool to derive the best outcome, and all the stages in between.
Playing offense with your security systems
Mike Li took the stage to discuss exploitation frameworks, and how to responsibly use them. The goal: find and fix your weaknesses before an attacker does. Seems like a simple task in theory, but oftentimes people don’t even know what or where their vulnerabilities are to begin with. Enter penetration testing with exploitation framework tools.– Tools like Metasploit, Veil Evasion, etc. have given insights to modern security teams that help establish where vulnerabilities exist. When ethically utilized, these tools help to simulate real world attacks and expose weak spots in a network, which will ultimately help to build a stronger system that is challenging to breach.
But… even if you have a near impenetrable infrastructure, your systems are still susceptible to outsider attacks in the form of social engineering. We often think about holes in our system, or brute-force efforts as primary methods to gain access, when in reality many breaches occur due to human naiveté. And on that thought, Mike left us with a simple reminder: Penetration testing and exploitation frameworks are both necessary and valuable. But ultimately, they help us spot vulnerabilities in our systems, not our people. Humans are not infallible, and they are oftentimes a liability that cannot be disregarded. So while we are securing our systems, we also need to take into consideration the people and their behavior in conjunction with the systems.
“When you think of exploitation frameworks, you think of Metasploit. A system, a piece of code, a piece of software. But also, you can exploit a human. People are fallible, too.” - Mike Li #BostonSecurityMeetup @hacksecure
With a high barrier to entry, OSSEC isn’t easy to use. “Aw yeah OSSEC has a great UX!” (crowd chuckles) With a high barrier to entry, OSSEC isn’t easy to use.
“Aw yeah OSSEC has a great UX!” (crowd chuckles)
osquery is an open source framework used to easily and efficiently write SQL-based queries to accurately assess the current state of a system. It was intended to serve as a simple and reliable solution for Facebook’s intrusion detection issues, and has since evolved into a powerful community-driven framework that many companies leverage today.
After Facebook shared the initial osquery code, allowing for public use, the public in return has continued to test, alter, and make additions. What began as 27 SQL tables implemented via an easily extendable API, has now grown to 180 tables directly due to community contributions.
Mike Arpaia went on with tips on how to proactively find malware through the use of query packs and scheduling. To close, he extend an invitation to all listeners to test and reform the continuing osquery project. With over 6,434 stars, 900 contributors, and over 3,000 commits, osquery remains of the most popular repos on Github today.
Thank you Mike Li & Mike Arpaia for your time and expertise!
If you missed the July event, make sure to check us out at Boston Security Meetup, and RSVP for the upcoming meetup on August 11th!
We're excited to announce our hack/secure syndicate. Check out the article from Fortune and press release below.
First Investment Kolide Raises $1.6M and Assembles Top FireEye and Facebook Technologists to Found Stealth Cybersecurity Start-Up
BOSTON – June 27, 2016 – Today, serial entrepreneur and venture capitalist Chris Lynch along with partner Cort Johnsonunveiled hack/secure, an invite only investment syndicate to help U.S. citizens build cybersecurity companies to ensure the United States leads the global effort in protecting the free world. At launch, hack/secure includes a syndicate of 25 of the industry’s pre-eminent and proven entrepreneurs investing in the next generation of cybersecurity entrepreneurs. The organization already has local presences in Austin, Boston, DC and New York.
hack/secure was founded and is run by Chris Lynch and Cort Johnson. The 25 entrepreneurs and angel investors forming the syndicate serve as hack/secure leads. Using the power of the AngelList platform, when a lead finds a company they want to invest in, hack/secure backs that lead’s investment with up to $250,000 of additional investment capital.
“The world runs on software. It powers everything from the banks that govern our financial system, the computers that fly our airplanes and drive our cars, to the power plants that generate our energy,” said Lynch. “WWIII is already underway, and it’s a cyber war. We believe it will be won with hands on the keyboard, not boots on the ground. The cybersecurity industry is just as important to protecting the free world as the manufacturing industry was to supporting the Allied forces victory in WWII. hack/secure is our effort to ensuring America leads the protection of our way of life and that of the free world.”
hack/secure in action: Kolide
hack/secure’s first investment is Boston-based cybersecurity startup Kolide, a promising new venture formed by top technologists from Mandiant, FireEye and Facebook. Kolide has raised $1.6 million led by Dustin Willis Webber, CTO and co-founder of Critical Stack. Dustin has built a legendary reputation in the infosec community for his numerous key open source contributions, founding multiple successful security startups, and for the sheer speed at which he delivers innovative products. His investment is backed by hack/secure, Liam Randall, CEO of Critical Stack, and other security experts from its syndicate.
Kolide is led by co-founder and CEO Jason Meller, formerly Chief Security Strategist at FireEye. The founding team also includes Mike Arpaia and Zach Wasserman from Facebook’s elite security team, where the two built and open sourced osquery, which is used to ensure the security of hundreds of thousands of Facebook’s endpoints.
“Jason approached me with an incredible idea to leverage open source technology at the endpoint to solve some big challenges in a way I had never seen before,” said Webber. “As someone who has built their entire career contributing to and relying on open-source technology, I understood the benefits to that approach instantly. What you have here are the raw elements to break the endpoint market wide-open and I knew that if we could bring in additional open source innovators like Mike and Zach, we’d have something super special here to invest in through hack/secure. “
Kolide’s mission is to take on the nascent end-point security and dev-operations space by building an enterprise-grade experience and tooling around Facebook’s popular osquery project.
"Wide proliferation of network encryption has effectively neutered some of the best detection tools security experts have relied on for decades,” said Kolide CEO Jason Meller. “Visibility at each individual machine is the only remaining effective way for organizations who care about cyber attacks to regain that lost sight. Unfortunately, most the endpoint technologies out there are proprietary, and you are effectively trusting the vendor that you aren't introducing more holes. An open source solution like Facebook’s osquery, which can be scrutinized and improved by every expert in the field, is the solution. A ton of organizations are already making a major investment in osquery because of its current capabilities. When they see the value we add with Kolide, their bet on the technology will be paid off 100 fold.”
hack/secure is an investment syndicate of 25, and growing, of the top minds in the cyber security industry. The organization’s board of directors act as managing directors of their region across the U.S., and initially include:
- Washington D.C.: Liam Randall - Founder and CEO of Critical Stack
- Boston: Dustin Webber - Founder and CTO of Critical Stack, Founder of Threat Stack
- Boston: Jen Andre - Founder and CEO of Komand, Founder of Threat Stack
- Austin: H.D. Moore - Founder of Metasploit (acquired by Rapid7), Principal at Special Circumstances
- NYC: Dan Guido – CEO and Founder of Trail of Bits
Members of the hack/secure syndicate include:
- Bob Brennan – CEO of Veracode
- Corey Thomas – CEO of Rapid7
- Mike Viscuso – CTO of Carbon Black
- Art Coviello – Former CEO of RSA
- Tim Belcher – Former CTO of NetWitness
- Sam King – CSO of Veracode
- Patrick Morley – CEO of Carbon Black
- Dustin Webber – CTO of Critical Stack
- H.D. Moore – Founder of Metasploit
- Dan Guido – Founder and CEO of Trail of Bits
- Jen Andre – CEO of Komand
- Liam Randall – CEO of Critical Stack
- Brian Ahern – CEO of Threat Stack
- Adam Fuchs- Founder of Sqrrl
- John Langton – Founder of Visitrend (Acquired by Carbon Black)