[Infowarrior] - Are You Addicted to Information Insecurity?
Richard Forno
rforno at infowarrior.org
Wed Feb 4 13:29:48 UTC 2009
(h/t to multiple sources)
Are You Addicted to Information Insecurity?
Poor security is like nicotine for some companies. Ben Rothke offers
advice on kicking the habit.
Ben Rothke, CSO
February 02, 2009
http://csoonline.com/article/print/478780
A recent study has a finding that defies reason: close to half of 154
smokers who had surgery to remove early stage lung cancer picked up a
cigarette again within 12 months of their operation, and more than one-
third were smoking at the one year mark.
In fact, 60% of patients who started smoking again did so within two
months of surgery. The study, led by researchers at Washington
University School of Medicine and published in Cancer Epidemiology,
Biomarkers & Prevention confirmed that addictive behaviors are not
easily changed.
The study's lead author, Mark Walker, Ph.D., a clinical psychologist
and Assistant Professor of Medicine at Washington University, summed
it up best when he noted, "Patients are all addicted, so you cannot
assume they will easily change their behavior simply because they have
dodged this particular bullet." He concludes that their choices are
driven by insidious addictive cravings for nicotine.
In the world of IT, far too many organizations are addicted not to
something as tangible as a cigarette, but instead to insecurity. While
smokers' actions are driven by cravings for nicotine despite the
health hazards, information technology's actions are driven by users'
desire for easy access to data, usability, and quick deployment, with
a disregard for confidentiality, integrity and availability of that
data. These organizations typically know the risk of giving short
shrift to security (many have even been bitten by data breaches and
malware outbreaks), yet continue with their insecure ways despite
clear evidence of its hazards. While we are decades into the IT
revolution, too many companies are still not following computer
security fundamentals.
While each passing year brings greater and fancier security and
privacy tools and technologies, not much has changed about how many
organizations approach information security. In fact, Forbes noted
that during 2008, banks have lost more of their customers' personal
data than ever before. Based on this trend, and in light of
deteriorating economic conditions, by the time the 2009 security year-
in-review articles are written, there is every likelihood that this
year will be the worst year on record for information security and
privacy.
Getting your organization to change its addiction to insecurity won't
be easy. It is thought that addictive activities produce beta-
endorphins in the brain, which gives the person a feeling of being
high. Yet the highs of insecurity can include legal issues, regulatory
penalties, negative PR, and much more. In order for enterprises to
make those changes to a secure environment, they need to start by
executing in the following areas.
Time
At the macro level, becoming secure takes time. While security vendors
will hype appliances that will be up and running in minutes and other
security pixie dust, the reality is that creating a secure culture and
infrastructure takes time. How much time will it take? Think years,
not months. Sort of like the amount of effort it takes to stop
smoking. While some can quick cold turkey; the vast majority of people
require multiple efforts, with numerous resources, over many year.
Many organizations have been insecure for decades or more. Cleaning up
such a mess can't happen overnight. Organizations need to think of the
big picture over the long-term. Security and privacy are long-term
processes that require TLC to do correctly. Some items are quick-
kills, but overall, security can't be rushed.
The Need for a CISO
The CISO is more than simply the corporate security guru. An effective
CISO is responsible for strategic planning, skilled negotiating and
practical problem solving around not just information security, but
also privacy and risk management.
Only an individual with strong business savvy and security knowledge
can effectively oversee security planning, implement policies and
select measures appropriate to business requirements. A good CISO
should have a deep understanding of technology, combined with an
understanding of the organization's functions, politics and business
drivers.
A perfect example of a good CISO is one who realizes the imperative in
today's environment to secure business applications. Until recently,
security was all about securing the perimeter. Now, the perimeter has
collapsed and in some enterprises, completely disappeared.
Consequently, it is crucial to secure the application.
The most recent Symantec Internet Security Threat Report notes that
over 60% of today's threats target applications. Far too many
organizations still focus on the infrastructure and spend a
disproportionately small amount of time and resources on application
security.
If you are a new CISO, an excellent guide to use is Gartner's The New
CISO's Crucial First 100 Days. The report notes that a new CISO must
make the most of this critical period, because it represents the first
- and sometimes the last - opportunity to set the enterprise's
security processes and technologies on an effective course.
The bottom line is that unless an company has an effective CISO who
oversees, manages and enforces IT security, and who has a seat at the
boardroom table, the organization will suffer data breaches and
outages, and become a magnet for attacks.
Risk Management
It is imperative that your security program be based on an effective
risk management program. Who poses a greater threat to your
organization: a hacker from Estonia or the temporary CPA in the branch
office? Unless you have a comprehensive risk management program based
on the identification, analysis, mitigation and monitoring of your
risks, you will never know the correct answer. And if you don't know
that, you will likely be mitigating against non-existent risks.
Khalid Kark of Forrester Research astutely notes that true risk
management has little to do with technology; it's all about ensuring a
rigorous process for consistently identifying, measuring, and
reporting your organization's information risks, as well as having
regular interactions with business to calibrate the organization's
appetite for risk.
Ground Troops
War is often started from the air, but the dirty work is fought on the
ground. Security products are like the Air Force, sleek and powerful.
But for information security to work, you need ground troops, i.e.,
security Marines (otherwise known as the grunts from your security
engineering department).
Not only are security engineers invaluable, they are the difference
between ensuring that security works and having security hardware and
software just doing stuff. The single biggest mistake companies make
is expecting security products to solve their security problems in the
absence of a good security staff.
Policies, Procedures and Awareness
Security policies are quite simple—they define the aims and goals of
security to the business.
The follow-on to policies are security procedures. Effective
procedures (often known as SOP—Standard Operating Procedures) ensure
that your Chicago firewall administrator, for example, builds and
configures a corporate firewall in the same manner as his colleague in
Tokyo.
Organizations that take the time and effort to create formal
information security SOPs demonstrate their commitment to security. By
creating SOPs, their costs are drastically lowered (greater ROI), and
their level of security is drastically increased.
The aviation industry is a good example of an industry that lives and
dies (literally) via their SOPs. SOPs are built into job requirements
and regulations. Today's airplanes are far too complex to maintain and
operate without SOPs Information security might not be as complex as a
Boeing 777, but it still requires appropriate SOPs.
Security awareness is also essential as information security and
associated risks are not intuitive to the average end-user. Awareness
is really important in that it develops a first line of defense for
the organization. A mistake many CISOs make is that they treat
security awareness as a one-size-fits-all program. Different people in
your organization need to be trained differently. It is imperative
that your awareness program reflect this. Don't use generic templates.
Conclusions
While computer security is a challenge, insecurity is far too
hazardous for any organization to deal with. The fact that tens of
millions of credit and debit cards can be compromised, such as the
recent breach at Heartland Payment Systems demonstrates that insecure
systems hurts everyone; from the CEO, whose job may be on the line, to
the consumer, who has to deal with the effects of the breach.
Every security breach is a wake-up call, which too many organizations
respond to by pressing the snooze button. It's 2009 and organizations
must start to heed the plethora of security wake-up calls. If not, the
result will be the predictable, just like the outcome of any addictive
behavior.
Ben Rothke CISSP, QSA (ben.rothke at bt.com) is a Security Consultant
with BT Professional Services and the author of Computer Security: 20
Things Every Employee Should Know (McGraw-Hill Professional Education)
(McGraw-Hill).
More information about the Infowarrior
mailing list