EP-S1001 - Cyber War Stories with Alex Aquino - Red & Blue Team #redteam #pentest #hack #cyber
**Full Transcription: "Beating the Drum with Cyber Gri" - Episode 1**
---
### **Introduction**
Hello and welcome to our very first episode of *Beating the Drum with Cyber Gri*. In this series, we’ll be diving into the world of cybersecurity, hearing from experts, sharing stories, and exploring the latest trends in the field. Today, we’re honored to have Alex Kino, a seasoned information security leader with over 20 years of experience, ranging from the US Air Force to Microsoft, Amazon, and currently running Security Programs at Autodesk. We’ll be talking to Alex about his career, his experiences as a red team member, and the lessons he’s learned along the way.
---
### **Introduction to Alex Kino**
Hello, Alex! Welcome to the show. It’s such an honor to have you on our very first episode. We’re looking forward to this conversation and sharing some exciting stories with you. Just for our viewers, let’s start by having Alex introduce himself in his own words.
---
#### **Alex Kino's Introduction**
"Hi, I’m Alex Kino. I’ve been in the world of security for almost 20 years now. It kind of fell into my lap when I was in the Air Force. I started at the lowest level, packing parachutes and loading cargo on planes, and eventually worked my way up to become an officer. During my time in the Air Force, I supported network operations for Air Force bases, did cybersecurity work, and even got involved in international guard missions, doing red teaming and blue teaming exercises. After 24 years of service, I decided to move on to the private sector. I joined Amazon, where I worked in their fulfillment centers, which was an exciting experience because those operations never stop—it’s the backbone of what they do. From there, I moved to Microsoft, where I did security program management for their cloud services, specifically M365. That was a crazy ride—I still can’t believe some of the things I got to see and do there. I also had a brief stint at Google, where I was a program manager for Android Biometrics. It’s funny because when I walked into a Best Buy, I realized how my team’s work directly impacted everything from face recognition to thumbprint scanners on those devices. After that, I came back to Microsoft and then moved to Autodesk, where I’m currently assisting in building out the Enterprise security team."
---
### **How Alex Got Into Cybersecurity**
The next part of the conversation delves into how Alex got into cybersecurity. He shares a fascinating story about how he ended up in this field.
#### **Alex's Journey into Cybersecurity**
"When asked how he got into cybersecurity, Alex shared that it was a combination of being in the right place at the right time and his passion for technology. While serving in the Air Force, he was approached by a guard unit that specialized in red teaming. They wanted to perform red team exercises on his network, and because of his forward-thinking mindset, he allowed them to do so. This experience not only taught him the importance of security but also opened doors to opportunities he never imagined. He emphasized that cybersecurity is a field where people often stumble into it through curiosity and passion rather than formal education."
---
### **The Role of Passion in Cybersecurity**
Alex highlights the importance of passion and curiosity in pursuing a career in cybersecurity, especially since many professionals in the field come from non-traditional backgrounds.
#### **Passion and Curiosity in Cybersecurity**
"During the interview, Alex discussed how many cybersecurity professionals, including himself, didn’t start with a degree in computer science or a related field. He shared that he met people in the industry who had degrees in English, art, or other unrelated fields but still excelled in security because of their passion and curiosity. He advised aspiring professionals to focus on learning through hands-on experience, attending conferences, and participating in online communities. He also stressed the importance of formal education in cybersecurity, noting that future generations should have more structured pathways into the field."
---
### **What Is a Red Team?**
The conversation then shifts to explaining what a red team is, as Alex dives deep into his experiences as a red team member.
#### **Understanding Red Teams**
"A red team, as explained by Alex, is a group of cybersecurity professionals who use adversary tactics to find vulnerabilities in networks or systems. These teams simulate attacks to test the resilience of security measures. While red teaming has evolved over the years, the core principles remain the same: footprinting, evasion, initial access, movement, and persistence. Alex shared that while traditional red teams may not be able to fully emulate nation-state actors due to resource limitations and persistence requirements, they play a crucial role in identifying vulnerabilities before real-world attackers exploit them."
---
### **War Stories from Alex's Career**
One of the highlights of the interview is when Alex shares some of his war stories from his time as a red team member.
#### **A Harrowing Red Team Experience**
"One story Alex recounted involved a supply chain vulnerability during his time in the Air Force. His team was assessing a network, and through curiosity, they discovered a script hidden in a system folder. The script contained domain admin credentials for multiple networks across the country. This discovery underscored the importance of securing sensitive information and the risks associated with poor security practices. Alex emphasized that such vulnerabilities can be exploited by attackers, leading to devastating consequences."
---
### **Lessons from the Target Breach**
Alex also touched on the infamous Target breach as an example of how critical it is to follow best practices in cybersecurity.
#### **The Importance of Following Best Practices**
"Discussing the Target breach, Alex highlighted the need for organizations to go beyond just conducting red team exercises. He stressed that true security requires a comprehensive approach, including patch management, log analysis, and identity verification. He advised businesses to treat security as an ongoing process rather than a one-time checkmark on a list."
---
### **Supply Chain Vulnerabilities**
The conversation also covered the importance of securing supply chains, drawing parallels to the SolarWinds attack.
#### **Securing Supply Chains**
"Alex explained that supply chain vulnerabilities are often overlooked but can have significant consequences. He shared insights from his time responding to incidents involving third-party vendors and emphasized the need for organizations to vet their suppliers thoroughly. He also discussed how attackers exploit trust relationships in supply chains to gain access to sensitive systems."
---
### **AI and Its Impact on Cybersecurity**
As the discussion progressed, Alex shared his thoughts on the advent of AI and its impact on cybersecurity.
#### **The Double-Edged Sword of AI in Security**
"Alex expressed mixed feelings about AI’s role in cybersecurity. While he acknowledged that AI has the potential to accelerate tasks like threat detection and response, he also warned that it is not a panacea. He stressed that AI tools require proper training and prompting to be effective. He shared concerns about misuse by attackers, who could leverage AI for malicious purposes, such as creating sophisticated phishing campaigns or automating attacks."
---
### **The Future of Cybersecurity**
Alex also shared his thoughts on the future of cybersecurity, touching on emerging trends like cloud security, zero trust models, and the importance of continuous learning.
#### **Emerging Trends in Cybersecurity**
"Alex discussed how organizations need to adapt to new threats by embracing modern security frameworks like Zero Trust Architecture. He emphasized the importance of staying updated with the latest tools and practices while also highlighting the need for ethical use of technology. He also touched on the importance of fostering a culture of mentorship and training within organizations to address the ongoing shortage of skilled cybersecurity professionals."
---
### **Key Takeaways from Alex's Book**
Alex concluded the interview by discussing his book, *Cyber Gri: The Art of Storytelling in Security*.
#### **The Power of Storytelling in Cybersecurity**
"Alex explained that his book was born out of a desire to share knowledge and experiences in the cybersecurity field. He drew inspiration from the role of griots in West African culture, who use music and storytelling to preserve history and pass down wisdom. His book aims to do something similar for cybersecurity professionals, providing them with a resource to learn from real-world examples and stories. He hopes that *Cyber Gri* will inspire the next generation of security professionals and encourage organizations to prioritize ethical practices in their work."
---
### **Conclusion**
As the episode wraps up, Alex expresses his excitement about being part of the show and looks forward to future discussions on cybersecurity.
#### **Closing Thoughts**
"Alex expressed gratitude for the opportunity to share his experiences and insights with the audience. He emphasized that cybersecurity is a constantly evolving field, and staying informed is crucial for professionals in the industry. He also encouraged viewers to reach out with questions or topics they’d like to explore in future episodes."
---
### **Final Words**
Thank you, Alex, for sharing your wealth of knowledge and experience with us. Your insights have been invaluable, and we’re sure our audience will learn a lot from this episode. Stay tuned for more exciting episodes where we’ll continue to beat the drum for cybersecurity awareness and excellence.
---
This concludes the full transcription of *Beating the Drum with Cyber Gri* - Episode 1 featuring Alex Kino.