56. Why the "R" in MDR I so Important Now. With guest Elia Cohen of AT&T
Subscribe to the Next Level BizTech podcast, so you don’t miss an episode!
Amazon Music | Apple Podcasts | Listen on Spotify | Watch on YouTube
Listen in today as one of the top experts in the security industry, Elia Cohen, Cybersecurity Director at AT&T, weighs in. Elia discusses where he got his start and how he got an early interest in security. Also, Elia opens up about the amazing toolset AT&T Security has to offer with everything from MDR & Security Framework build-outs to prem and web application firewalls along with Compliance checks throughout. Prepare for a wealth of knowledge!
Transcript of episode can be found below.
Josh Lupresto (00:01):
Welcome to the podcast that is designed to fuel your success in selling technology solutions. I’m your host, Josh Lupresto, SVP of Sales Engineering at Telarus. And this is Next Level BizTech, everybody. Welcome back to another episode. We are on the security track, and today we’re talking about the r and that R is the R in managed detection and response, or you might know of it as MDR. And today we got on a special guest, dear friend a, a peer in the space that’s helped us be extremely successful in the security space. Mr. Elia Cohen, director over cybersecurity at AT&T. Elia, welcome on, man.
Elia Cohen (00:44):
Hey, thanks for having me, Josh. Really excited to be here and talk about this really popular solution out in the industry today.
Josh Lupresto (00:52):
I’m excited you know, for the sake of time, we could go on forever with all the great stuff that you guys have over there that I don’t think a lot of people know about. But we’ll dive into a little bit of that here as we get going. I, I wanna kick us off though first about you. You know, personally, we know right now you were the cybersecurity director at AT&T and we can talk about what that means in a second. But where did you start? What, what’s your path? Has it always been tech? Has it always been security? Has it been something completely unrelated? Where did it begin and how did you get here?
Elia Cohen (01:21):
Yeah, I mean, so in terms of where, where I’ve come from and where I am now I think I kind of fell into this for the lack of a better term.
Josh Lupresto (02:24):
Family show, family show haha.
Elia Cohen (02:26):
Exactly. That, that that’ll keep, keep PG. Yeah. But ultimately education is really where it, it helped people get to a better spot. And so as I did that, I started to move into I got my first job outta college for security company more on the engineering side, and eventually started to move back towards sales probably four or five years into that. And then I’ve been doing technical sales and cybersecurity sales ever since. And it’s been probably a good 15 plus years now.
Josh Lupresto (02:59):
Love it. Love the journey. Talk to me about, you know, at t’s a big name. You know, I, I, I don’t think, and, and, you know, when we learned early on, I, I don’t think we knew the depth of the practice as it has with security. And then it’s certainly even expanded since we started. But we’re gonna get into products here, some more depth in products in a little bit, but maybe gimme a little you know, your segment of AT&T and your security side. What is that all about? What does that practice entail?
Elia Cohen (03:28):
Sure thing. So, yeah, I mean, I’ll, I’ll, I’ll, I’ll echo your sentiment that yes, AT&T does have a cybersecurity practice.
Josh Lupresto (04:55):
Love it. Let’s talk about, let’s paint a picture of what it was like before maybe one of the early on deals that, that you sold. Walk me through, you know, whenever this was. I, I don’t care how long it, how old it is, how much it dates you, it doesn’t matter. Let’s make it more entertaining. But tell me about one of the first deals that you sold in this, and when, when did that really open your eyes to the idea of, of what we could do in security?
Elia Cohen (05:20):
Yes. I’ve been in the security space for quite a while now, and I, I’ve sold EDR before it even existed and sold kind of the traditional antivirus or endpoint protection solutions, and was with an endpoint company when EDR was becoming a thing. And so it was pretty interesting to see the evolution of the technology going from pretty static types of detections, very signature based detections to the evolution of moving towards machine learning and, and advanced algorithms for detection. And so, as you can imagine, back then, it wasn’t a perfect science probably still isn’t today
Elia Cohen (06:16):
So at the time I was working with a, a fairly large insurance company, and they needed to advance their, their, their, their game when it came to protecting their endpoints. And they had stuff all over the place and data centers that they own in the cloud and then all of their end user compute devices that they needed protected. And so pretty common, they had a ra rather small team of individuals that was mostly focused on it and then a couple of named security persons. And so clearly wasn’t enough when it came to being able to manage a solution and look at all the different detections that were taking place 24 by seven. But that was the model back then. The, the M part of MDR didn’t really exist then. So we were really selling the point solution.
Elia Cohen (07:06):
And just like the evolution of the endpoint in its technology to edr the market kind of realized that there’s a big gap when it comes to the overall 24 by seven monitoring and response capabilities. And so this MDR space started to come in. So at the time, we didn’t have an MDR solution with that company, so we really just focused on selling, selling them the end product. But over time they started to build up more staff and they had a hard time doing that. And fortunately, within a couple years, they ended up having a service to add the management on top of that.
Josh Lupresto (07:42):
Love it. You, you bring up a good a good point, which is one of my next questions, which is the evolution of this. And so, you know, I I, I think I would love to hear maybe from you a little bit about how this helps the customers see an roi. But, you know, maybe weave in, you mentioned, you know, this has evolved. It used to be called antivirus, and then it was edr, and now it’s MDR, and there’s these other ideas of XDR and, and kind of what’s, what’s coming up next around. But talk to me about a, how and why has some of this evolved from your perspective in the trenches, and how do you still, no matter what, help a customer see ROI around that?
Elia Cohen (08:21):
Well, I would say, when it comes to cybersecurity, ROI is a dirty term these days.
Josh Lupresto (09:16):
Do you see, I mean, to to your point where it did used to be all about roi, do you see, though, when people come to you for a security need, is it about the ROI at all, or is it, I have this problem and it’s so important? Cost is the fourth thing on my list of priorities right now. What’s your trend?
Elia Cohen (09:36):
So there’s different types of customers out there, and it, and you really have to go back to the drivers that are leading this conversation. So anybody that’s had a reach will tell you outright that they will, that, that it’s probably the most awful experience that they’ve ever had, and they don’t ever want to have that again. And they’re ready to pay
Elia Cohen (10:27):
And by the way, you also need that to be managed. So now the customer doesn’t really have a choice. If they want to have cybersecurity insurance, they have to go buy a managed EDR service somewhere, somehow
Josh Lupresto (11:24):
You know, you bring up a good point. I mean, sometimes I think when we get in, we uncover the situation of what they really need. We just ask that we just want ’em to do something. I, I think that’s the overall idea with part of a security strategy is that, yeah, you can’t, you know, you, you could spend 80 of your 80% of your time covering 20%, or you’re gonna spend 20% covering 80%, right? E e either way. And I think when you have to look at it, we just want them to walk away and do something and make some progress to that point. So, yeah, I, I, I think we’re just happy now that their hands are forced to some extent, but it really just, it requires them to take a long look at it. And I think we’ve found the same thing, you know, 70% of the it’s responsibility has been it, and then they’ve maybe done, you know, security 30% of the time, and they still just need help even before all this craziness. You know, there was, there was a massive shortage in security when, when employment and all those things were normalized. So, good points.
Elia Cohen (12:19):
Yep.
Josh Lupresto (12:20):
So, all right, let, let’s spend a little bit of time here unpacking the AT&T product set. If, if this podcast for a three hour podcast, we could probably do it cuz you guys have so much good stuff in there. But if, if, if I, if we try to make a decision here for the sake of time we could talk framework building. We, to your point, more services, cmmc compliance readiness, you know, the MDR products that you guys have, pen test, there’s security awareness training. Maybe boil this down for me. Let’s, let’s start with the top three, maybe the top four. What’s the first product that you want to talk about so that we can make sure that everybody understands it from your side?
Elia Cohen (13:01):
Yeah, so as I mentioned before, the there’s really two focuses in the portfolio. One is managed security services, the second is security consulting. And and, and we, we have a number of solutions in both of those areas. So when it comes to protecting assets whether it’s your users, your endpoint or your applications and data, we have solutions that span across all of that. When you start to look at consulting, it’s kind of a weaving fabric for the managed services. So even though we might be providing a, a managed firewall or a managed endpoint solution there’s usually some thought that has to go through in how to do that effectively. And is that enough? Do we need more? Are there other things that we should be doing or could be doing? And what are the pros and cons of doing thAT&The risk that we’re managing with that? And that’s really where consulting comes into play. Getting a good sense of kind of the assessment, the framework that you mentioned of what we could do should do, and how does this align to industry best practices. And when you start to look at the different regulations that are out there this could be just a self initiative that the, a business could have, or it could be a regulated and mandated like PCI or CMMC or any one of the other regulations out there.
Josh Lupresto (14:24):
So, so if we, if we go over what you just mentioned again, and we do a little bit of kind of vendor soup, OEM soup I think that’s where sometimes the, the asks come from the customer side. So if we think about, I’m just going to, we’ll speed date this for a second, but if we talk about obviously frameworks, if we talk about what frameworks we’re building out, I mean, it, it doesn’t matter if it’s NIST, it doesn’t matter if it’s CIS. You guys have expertise to build out any of those and any others that I missed in there that you wanna cover?
Elia Cohen (14:54):
Yeah. HIPAA, I trust, pretty much the, the ISO, SOC2, pretty much all of the different types of initiatives for security that you can think of, we can support and provide the assessment services as well as some of the remediation and fill in some of the gaps, whether it’s with more consulting services or with with the managed security services.
Josh Lupresto (15:17):
Okay. How about from an awareness training? Is there a specific software specific manufacturer that you guys have had a lot of success with? Or ones that, that you tout?
Elia Cohen (15:27):
Yeah, so we have a couple of tools that we have in place. One from health systems, one from Orion. So those are kind of our two leading solutions. Yeah, I, I’d say that there’s a lot of folks out there that that already have security awareness training but what they’re doing with it, how that weaves into maybe some of the other services that they could be or should be doing. So typically if you have training, that’s great, but you should also be doing some phishing simulations. If you have phishing simulation, you should sometimes start thinking about getting social engineering and getting an actual human to your locations. So thinking about AT&, then starting to then test the environment with penetration testing to then test the defenses that are in place, which could also potentially indirectly test in the users. All of that kind of in concert is how we can start to look at solutioning for a customer versus just give them that one widget of say the, the security awareness training.
Josh Lupresto (16:27):
And from a, from a pen testing perspective, let, let’s, let’s lump in here pin testing and vulnerability assessments for a second. Is it safe to say that whether we need external ips just scanned to see if we have any open vulnerabilities versus even inside application level we, we could carve out a program for you to come in and, and, and scope out all of those, right. Internal, external, everything, everything adjacent.
Elia Cohen (16:53):
Absolutely. And I can’t stress this enough that our partners here don’t have to understand all this stuff,
Josh Lupresto (17:22):
Okay. One of the last couple here, maybe talk about MDR and then you know, firewalls both web app and, and prem and, and cloud, things like that. So from an MDR perspective, that, that important, you know, that that important technology to isolate whatever happens at the edge, at the endpoint server device. What, what are some of the MDR tool sets that you guys like that you’ve seen good results out of?
Elia Cohen (17:48):
Yeah, so there’s only one that we really lead with here within our portfolio, and that’s with Sentinel One. And so we have a very large partnership with Sentinel One. They’re a leading EDR solution in the industry. And so, so that’s what we focus on for edr on the network side. Again, alphabet soup, like you mentioned mm-hmm.
Elia Cohen (18:38):
The edge is kind of the internet
Josh Lupresto (19:53):
Great stuff. All right. Speed dating round over. And I know we just, we, we, we probably skipped over a whole bunch of good stuff, but I, I think it, it shows people the depth of what you have. It’s not just about, to your point, the, the point solution. It’s about what you do with those results, what you take action on, what best practices we recommend after. Cuz anybody can sell a point solution. So this isn’t about that. And I think that’s why you guys have had such good success, cuz you see that it’s in the services, it’s in the results, it’s in the, it’s in the skills and the people. So, great stuff. Okay. Let’s, let’s talk about you know, rather than roses and rainbows, let’s talk about the difficult parts. Let’s talk about the sales process. Help me walk through, if you have a hurdle.
Josh Lupresto (20:34):
I mean, we’ve all been in those conversations with customers where they just don’t think that they need help. How do you, I guess what’s, what’s your strategy in the conversation or what do you recommend for the partners listening to this that, you know, I, I, I know we’re telling them they don’t need to be experts. We’ve got a, a plethora of amazing engineers and architects, our team, your team that can help them with this, that are there every single step of the way. But when you’re in a discussion and, and you’re, you’re being asked to come on this call, how do you help get through that, that customer that just doesn’t quite see that they need help? What’s your, what’s your go-to talk track there?
Elia Cohen (21:11):
So I would say that everybody needs help. Everybody out there needs help when it comes to cybersecurity. There’s not there, there’s no, no, there isn’t one single thing that you could be doing. And I, I’ve yet to find a customer that tells me that they have adequate tools and personnel 24 by seven to go solve all their needs. So that being said typically when I hear customers indicating that they don’t need help, that they have things under control or that they they, they don’t need a particular solution typically it’s, it’s more indicative of maturity. And so oftentimes, instead of maybe trying to push or, or recommend say MDR or, or a Simmons SOC solution that might just be too advanced for the customer, they haven’t done some of their table stake guidance. Like, no, what’s in their environment?
Elia Cohen (22:08):
Do you have an asset management solution? Do you know what all the devices are that are communicating on your network? Do you know where they are
Josh Lupresto (22:56):
Love it. All right. I want to get into the last couple points here as we wrap this up. An example. So we talked about in the beginning, one of the examples that you saw, one of the deals that you worked, how you helped them through that. Give me through a, a situation here where, you know, maybe you got brought in, Hey, Elia, this situation and the environment looks like this. And you get in and find out it’s something completely different. Maybe you got in and, and it’s exactly what you said, but maybe just walk us through a situation that you were in where you guys were able to add a lot of value, but really what was the tech that you pulled out or what was the business problem and, and what kind of solutions did you end up putting in?
Elia Cohen (23:32):
Sure. So I’ll cover a a healthcare customer. They were doing and still are they’re doing clinical research using big data in the cloud. And they’re using multiple, multiple cloud platforms. Yes, they’re a startup, so
Elia Cohen (24:48):
And so so he decided to start working with us on that. And then meanwhile, because of all their different environments, they started to realize they needed some help to get a better sense of what’s out there. And so we started to look at both the, some vulnerability management capabilities as well as more of the Simmons SOC as a service. And since we were talking about that, we started to ask them what would happen if an incident takes place? Who would actually be responsible for caring forward, not the response, but the remediation, the eradication of, of the malware that’s in place, and also making sure that things are forensically sound if, if a law enforcement type of agent investigation needs to take place. And of course, they didn’t really have anything like that in place. So the, what the solution turned into was an MDR with Sentinal one, Simmons, the service with alien Vault managed vulnerability with qualis.
Elia Cohen (25:50):
And then also our incident response and forensics retainer. And before we even got a chance to stand up any of these services, we got, I got a phone call, personally,
Elia Cohen (26:51):
And then, of course, in parallel, we started to, to work on getting the, the endpoints deployed, the SIMs deployed, and it wasn’t probably more than another couple months before they had another attack that we detected this time. Ooh, using our MDR services, targeting their oh 365 environment, all their users, it’s mostly their executive staff. But ultimately the investigations that we did came and surfaced that their office 365 policies were fairly lenient in allowing adversaries to just communicate with their employees a little bit too directly mm-hmm.
Josh Lupresto (27:55):
Love it. Boom. if I had a mic drop sound effect, I would play it right now. It’s a great example, but, but it’s really typical. I mean, that’s exactly why we do this. That’s exactly why we need the solutions that we have out there from our vendors like yourself, because without that, we would not be able to solve these problems. So, nice work excited to keep, keep doing more of those great stuff. All right. So as we get to the end of this here, I think we’ve established the point of what the title of this is, is, you know, why is the R so important, right? The remediation, the response, because it’s not, things are gonna happen, bad things are gonna happen. We’re not defined by the quantity of things that happen, just like in life. We’re defined by how we respond to those things and what we learn and how we get better.
Josh Lupresto (28:38):
And so definitely, I think we’ve, we’ve called out the fact that people still need help. There are gaps all over the place, no matter how mature the organization is. So we have to work to find those. So awesome stuff. I think you really put a bow on that. Final thoughts here. So if we, and this is a hard space to look out more than 12 months, more than 24 months, but if we grab our crystal ball and in, in Eli’s humble opinion, as we look out, I don’t know, let’s call it twelve, twenty four months, what do we think changes? Does, does the, does the agenda change? Do the strategies change as to how we help customers with this? What, what do the products change? What do you see happening or, you know, what do you want to caution partners or give advice to partners for over the next next little while?
Elia Cohen (29:25):
Yeah, I would say that in the next 12 to 24 months security’s still gonna be a focus. There’s still gonna be a lot of of folks that are going to be increasing their level of maturity. So understanding where your customers are, are where some of their gaps are understanding what drives their business is gonna be really important. So if, if there’s some, some final words that I can share around what partners could be doing with their customers, doing what they do best, have a business conversation. Talk to them about what their business is, what their core competencies are what makes them viable as a business how they’re utilizing technology to drive their business and start to uncover some of the risks of what if your technology went down, what if your data was compromised? What if your operations weren’t able to continue forward, and have you thought through how to mitigate some of those risks? So really the focus, I think, should be around risk management. And what you’ll uncover is that some customers have a risk management practice in place, some don’t. Some have varying levels of it. And talking to them in that type of a tone, we’ll start to get them to be more open-ended around the responses that you’re gonna get, which then will open you up to a lot more opportunities s versus just widget selling
Josh Lupresto (30:55):
Love. Okay. Good stuff. All right. Well, man, hey, kudos to you. What you’re doing, what you’re building on the security practice, we appreciate everything over there. You know, big kudos for for Kelly Owoseni, you know, making sure that we really got a good understanding of everything that AT&T has to offer. You know, we got a lot of big advocates of your guys internally. So I, I appreciate you coming on and doing this with me, man.
Elia Cohen (31:17):
Hey, thanks for having me. Great conversation and looking forward to some of the, the momentum that we get after this.
Josh Lupresto (31:23):
All right, good stuff. Okay, everybody that wraps us up for today. I’m your host, Josh Lupresto, SVP of Sales Engineering. Elia Cohen, cybersecurity director at AT&T. This is Next Level BizTech. Until next time.