Cisojourney
Cisojourney
Gene Fredriksen
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apolo-
gize to copyright holders if permission to publish in this form has not been obtained. If any copyright
material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans-
mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereaf-
ter invented, including photocopying, microfilming, and recording, or in any information storage or
retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright
.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the
CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
List of Figures.................................................................................................xi
List of Tables................................................................................................ xiii
Prologue......................................................................................................... xv
Foreword.......................................................................................................xix
Acknowledgments.........................................................................................xxi
Author........................................................................................................ xxiii
v
vi ◾ Contents
Risk Management..................................................................................27
Key Questions to Ask.............................................................................33
5 If a Bad Guy Tricks You into Running His Code on Your
Computer, It’s Not Your Computer Anymore........................................39
Worms, Trojans, and Viruses: What’s in a Name?......................................41
Myth One..............................................................................................41
Myth Two............................................................................................. 42
Myth Three........................................................................................... 42
Myth Four.............................................................................................43
Myth Five...............................................................................................43
Myth Six............................................................................................... 44
Myth Seven........................................................................................... 44
Myth Eight............................................................................................45
Myth Nine.............................................................................................45
Myth Ten (and My Personal Favorite)................................................... 46
Attack Types Are Wide-Ranging............................................................... 46
Social Engineering......................................................................................47
6 There’s Always a Bad Guy Out There Who’s Smarter,
More Knowledgeable, or Better-Equipped Than You............................49
What about Your People?............................................................................56
Plan for the Worst.......................................................................................58
Not All Alerts Should Be Complex.............................................................61
What about Wireless?.................................................................................61
Context-Aware Security..............................................................................63
Suggested Reading..................................................................................... 64
7 Know the Enemy, Think Like the Enemy..............................................65
Monitoring What Leaves Your Network Is Just as Important as
Monitoring What Comes In: Introducing the “Kill Chain” Methodology....73
Stack the Deck in Your Favor.....................................................................78
Picking the Right Penetration Test Vendor.................................................79
How Should Penetration Testing Be Applied?.............................................79
Selecting a Vendor......................................................................................80
8 Know the Business, Not Just the Technology........................................83
The Role of Risk Management within the Enterprise................................. 84
Separation of Duties...................................................................................86
Is There an Overlap between Legal, Compliance, and Human Resources?.... 90
A Model Structure......................................................................................91
Risk Management/Organizational Management Interaction......................92
Executive Steering Committee...............................................................93
Information Security Officer Committee...............................................93
Contents ◾ vii
Does the Provider Have a Disaster Recovery Plan for Your Data?........210
Don’t Confuse Compliance with Security............................................ 211
Has the Potential Vendor Earned Certifications for Security
and Compliance That Can Provide Assurance of Their Capabilities?.... 211
What Physical Security Measures Are in Place at the Supplier’s
Data Centers?.......................................................................................212
Where Are My Data Being Stored?......................................................212
Vendor Oversight Program Basics.............................................................213
Internal Trust...........................................................................................213
Section III SUMMARY
16 My Best Advice for New CISOs...........................................................221
Talking to the Board.................................................................................223
Appendix A: The Written Information Security Plan..................................225
Appendix B: Talking to the Board...............................................................241
Appendix C: Establishing an Incident Response Program..........................253
Appendix D: Sample High-Level Risk Assessment Methodology................273
Index............................................................................................................279
List of Figures
xi
xii ◾ List of Figures
xiii
Prologue
xv
xvi ◾ Prologue
individuals and groups who are poised to set powerful examples of how cybersecu-
rity must be integrated into pretty much every aspect of our lives.
According to a recent study undertaken by Intel Security in partnership with
the Center for Strategic and International Studies, 76% of corporate IT leaders
involved in cybersecurity decision-making who participated in the research said
their respective governments are failing to invest enough in building specialized
talent. Based on interviews with some 900 IT decision-makers from organizations
with at least 500 employees situated in a range of countries (including the United
States and seven others), a meager 23% said educational programs are actually pre-
paring students to enter the industry. More than half stated that the cybersecurity
skills shortage is worse than those faced by other IT professions.
Yet the scarcity of qualified pros has become a more prominent political focal
point for some in the last couple of years, prompting the likes of our own President
Obama and other countries’ leaders to urge greater support for the information
security field and its professionals’ growth and development. Even with a few prom-
ising proposals underway, however, they couldn’t happen soon enough given that
about 70% of the research participants said the current talent shortage is causing
direct, measurable harm to their networks. In fact, one in four admitted that their
businesses have lost proprietary or critical data because of the dearth of cybersecu-
rity skills on hand within their organizations.
What’s needed, they explained further, is some hearty on-the-job training,
which takes precedent over a mere university degree, though individuals looking
for a role in their companies must have formal educational credentials to garner
any serious consideration. Also, more vigorous continuous education, engaging
instructional opportunities and nontraditional methods of learning, such as hands-
on exercises, hackathons, and more, likely would prove an additional boost to
strengthening the talent pool.
In this regard, information security industry conferences and events—especially
those boasting more varied and practical learning experiences—have become more
vital and, as a result, well attended by seasoned pros and newbies alike. For Gene
Fredriksen, these gatherings are a pretty decent barometer in revealing how the
industry is changing and what long-time, more-seasoned leaders like him, a group he
calls “the first generation of CISOs,” can do to help it continue to thrive and evolve.
Mentoring, as he notes in the following pages of this book, is a main component
crucial to the ongoing development of this marketplace and the people in it. And
this happens not only at a variety of industry events, but also is critical on the job.
“As I move further into my career, my focus is on evangelism and helping to
drive the overall profession further. Part of that is helping peers explain complex
issues clearly to the E-suite (executive suite),” he explained to me in an e-mail
exchange last year. “It’s all about passing the torch and leaving things better as the
first generation of CISOs begins to retire.”
He called out some signs of this metamorphosis when attending one of the
longest-standing industry events, the RSA Conference, last year. As he looked
Prologue ◾ xvii
around at others hitting the show, he remembered thinking: “When did they start
allowing 12-year-olds on the exhibit floor? I can’t believe I got my first full-time
infosec job in 1989.”
But it’s that experience starting in the field right when it was only at the extreme
early stages of any real, well-formed profession that has enabled him to pick up
many a lesson along the way, study with varied and experienced mentors, make and
learn from mistakes, hone and grow his technical and leadership skills, and develop
and refine a robust information security philosophy. Enlisting all this know-how,
he has found himself over the years establishing and managing both cybersecurity
plans and departments for global organizations that often had neither when he
started there. Really, as an infosec pioneer, his own vocational beginning was just
as fledgling as the cybersecurity industry itself; he played an indispensable role
alongside others like him to drive and mold what it meant to create, propel, and
oversee an information security strategy and the teams and divisions supporting it.
After I met Gene around 2003 or so, he asked that I come to St. Petersburg,
Florida, to participate in a conference he had organized at the long-standing
financial services company Raymond James where he worked at the time as the
company’s first CISO. The roster was stellar, having other leading industry practi-
tioners like him speaking alongside cybersecurity specialists from the likes of the
FBI, DHS, and others. That I was asked to participate was an honor, especially
given that our first engagement was impelled by a disagreement over some topic or
another that I covered in one of my commentaries. Gene recalls contacting me with
his differing thoughts.
“The following month, you put a follow-up [in another commentary] saying
that Gene Fredriksen of Raymond James didn’t completely agree with your views
and passed them along. Shortly after that we talked and it’s been a great relation-
ship ever since,” he recalls.
And it has. His professionalism, thoughtfulness, and combination of both tech-
nical prowess and business acumen saw his career blossom over the years. From
Raymond James, he moved to IT industry research and analysis company Burton
Group, which was acquired by Gartner in recent years, to become one of their
leading industry analysts. After that, he was off to security systems giant Tyco
International where he created their global cybersecurity strategy and division,
thereby helping to advance the security of both internal operations and external
product offerings. And, currently, he is CISO for financial services firm PSCU,
which provides both traditional and online assistance to more than 800 credit
unions. All the while, he has contributed columns to SC Magazine and scmagazine
.com, spoken at our events—both live and online, participated on our Editorial
Advisory Board, and been a cover story subject who shared his thoughts on threat
intelligence gathering and kill chain processes to support information security
strategies and initiatives. More than that, though, he has provided much-welcome
guidance to me as my team and I navigated the industry to ensure that our brand
was always improving and always meeting the needs of CISOs like him.
xviii ◾ Prologue
Illena Armstrong
VP, Editorial, SC Magazine
xix
Acknowledgments
Richard Lanning, PhD: His help was instrumental in the creation of this book.
His ethics, analytical skills, and industry knowledge are a great asset to the
company and me personally. I value his friendship and counsel.
Illena Armstrong, SC Magazine VP and Editor: She has been a longtime source
of support and advice.
Pamela Fredriksen, my wife: Her support and love have kept me “shiny side
up” during this journey. There were many late nights and long trips over the
years and she has always been there for me.
Heather, Jeff, Holly, and Joe, our four children: They have kept life interesting
and rewarding for me. Thanks for your support and inspiration.
Kathy Simpson: Her graphics skills are amazing. Thank you for your invalu-
able help.
Deborah Kobza, CEO of the Global Institute for Cyber Security and Research:
A longtime friend and peer who has influenced my career.
David Bryant, Information Security Officer, PSCU: He has worked with me
at many companies over the last 16 years. Thank God he is patient and long
suffering.
Lori Lucas, Head of Technology Compliance for PSCU: She has also been a
longtime friend and advisor.
Rini Fredette, Enterprise Risk Officer for PSCU: A great peer and an expert in
the area of Enterprise Risk.
Lee Carpella: Instrumental in the editing of this book.
Larry Clinton, CEO of the Internet Security Alliance: An expert in the Cyber
Security Industry and Regulatory space. Larry is a great friend and advisor.
Richard Jacek: He was my first official mentor in industry. I still use many of
the skills he taught me today.
xxi
xxii ◾ Acknowledgments
Brad Anderson: A longtime friend and associate who has helped me shape my
views of technology and the world.
Chuck Fagan, CEO of PSCU: If there was a template for a Security Aware
CEO, it would be Chuck.
Michael Echols, CEO of the International Association for Certified ISAOs:
Mike is an exceptional resource given his broad range of private sector and
government experience.
Israel Martinez, CEO of Axon: A mentor and friend for many years.
Author
xxiii
INTRODUCTION I
AND HISTORY
Let’s get started by looking at a little history, both from a personal and an informa-
tion security standpoint. In an era of unprecedented change, sometimes it takes a
look backward to help chart the course forward.
My best advice? Understand where you are before you decide how to get to your goal.
Chapter 1
My name is Gene and I’m a long-term cybersecurity guy. In fact, I’m sneaking up
on retirement in a few years. I’m not sure if I should be relieved that I’ve survived or
sad that I will miss the daily challenge. As I reflect on my career as a CISO (Chief
Information Security Officer), it dawned on me that those of us around my age are
really the first generation of those to hold the CISO role. We have seen this career
path morph over the last 20 or so years from a sideline buried in information tech-
nology, to a strategic and visible role. I am excited about what the future holds for
those who succeed me.
I’ve seen all facets of information security change drastically over the years.
There is an old adage from the 1930s that basically said, “Better Bank Vaults Breed
Better Safe Crackers.” It really is a variant on the continuous improvement cycle.
As security technology becomes more robust, those creating ways to circumvent
the security become more technically competent and creative (Figure 1.1). This
continuing spiral means that we can’t become stagnant or complacent. If we do,
we will lose.
I’ve also seen the regulatory and governance side of the CISO job change. Let’s
be honest, when I accepted the first job where Information Security was part of the
title, it was “Manager of Information Security and E-mail.” Even the business was
not sure that this new “information security thing” would be a full-time job. Even
I wondered if technology might solve the whole virus and hacker problem. In the
1980s, there were few regulations about information protection, even in the finan-
cial services sector. Now, negotiating the complexity of overlapping and sometimes
conflicting regulations and laws can be mind-numbing at the least.
Also, to be honest, I thought that as I approached retirement, I would be spend-
ing more time at my desk, directing a great team who would be doing the hard
work. OK, now I know that was completely delusional. Today, I’m working harder
than I have in my life. Whatever rules there are, change daily.
3
4 ◾ The CISO Journey
A new threat
is published
A new
A new threat security
is born control is
created
Attackers
write an
attack to
evade control
As I thought about what kind of amazing book I would write, I, like many other
CISOs, came up with all sorts of technical and process topics. However, the more I
thought about it, the more it became obvious to me that this was probably not the
right choice.
As CISOs, we are charged with developing protection systems and processes
to protect the data of a specific company. Based in a large part on our experiences,
we design these systems, applying technologies to meet the needs of our business.
There is never a one size fits all. Given that, I’ve decided to share the journey from
mechanical engineer to CISO. The lessons and pearls of wisdom I’ve collected along
the way are what have collectively made me what I am today. Let me absolutely state
that I don’t consider myself the model of the world’s greatest CISO. God knows I’ve
had my share of problems over the years. What I’m hoping to do is share my mis-
takes, experiences, and lessons. Hopefully, you will find one or two of value in this
personal, slightly irreverent look at the evolution of a typical cybersecurity career.
Hopefully, you will see a little of yourself in the following pages.
Chapter 2
I’m often asked, “What is the most important thing about being a Chief Information
Security Officer (CISO)?” Interestingly, over the years, the answer has changed,
just like the field of information security.
Twenty-five years ago, I would have listed technical expertise. Most of us were
one-person shops with a focus on antivirus and firewall rules. The threats were
fairly slow moving, as was technology. Over the years as the job has changed, I will
now unequivocally tell everyone that leadership is now the most critical attribute.
The CISO is now one role in an effective security group. Don’t get a big head, I
didn’t say the most important, just one of the jobs.
A seasoned CISO understands the value of hiring people technically smarter
than him or her. You need all sorts of tools and talent to be successful; you can’t do
it all yourself. Your job is to lead the program with skill, not dictate. Information
security is a war of attrition, and leading your staff is like training the team to run
a marathon. You can’t do it by running on their heels and barking commands. You
must give them something to run toward. The way you do it is by exhibiting strong
leadership and having a crystal clear strategy. Be transparent and honest. You hired
smart people; let them do their job. Remember, even though you undoubtedly
worked hard to achieve the CISO title; don’t get too wrapped up in your own self-
importance. Being the leader is a job that is only needed if there is a team. Value
and nurture them.
If you follow information security and stories of breaches, you’ll notice as I did
that every year lately is referred to as the year of the breach. We are seeing unheard
of numbers of records being breached, and the reports of breaches are coming faster
and faster.
As I said, we are in a war of attrition with the criminals. The professional crimi-
nals are well organized, well trained, and well compensated. When I first started,
the typical hacker was a loner, or a teen with too much time on their hands. The
5
6 ◾ The CISO Journey
typical attack was a nuisance attack, more of an irritant than anything. We used to
refer to a large portion of them as “ankle biters.” Don’t worry, this will not turn into
a yearning for the “good old days” discussions. The world of today is what it is. We
have no control over the bad guys, we can only control how we respond and react.
There is no silver bullet; if there was, we would all know about it. In fact, I propose
that focusing all your efforts on searching for a technology solution will ultimately
hurt your security stance.
The best security solution for a business is a balance of People, Process, and
Technology controls that is tailored to the business need and mission. Throughout
this book, you will see me reference the People, Process, and Technology model.
Putting too much emphasis on only one segment weakens the whole model. Your
job is to be the visionary that maintains the balance. There are security frameworks
and control structures we can reference, but I’m sad to say there is no cookie cutter
approach that guarantees security.
Much of what we do as CISOs or security professionals is based on our experi-
ences and the lessons we have learned over the years. Mentorship is a critical part of
the development of our skills. In my case, I was lucky to have an excellent mentor
named Rick Jacek who taught me as much about human behavior as technology.
Rick was the Technology Troubleshooter for the company. If there was a technol-
ogy product headed south anywhere in the global company, Rick was sent in to
fix it. It was from him that I initially learned about the importance of People,
Process, and Technology, as it was never just one component that put the project
at risk. He was also keenly aware of the effect of culture, particularly outside of the
United States. I remember a discussion with a business unit manager in a South
American company recently purchased by the firm for which we worked. Rick had
to convince the manager that keeping a pile of cash in his desk drawer to “get things
done” was no longer an acceptable operating model.
I also learned from various mentors that Information Technology is in place to
serve the business, not the other way around. Computers are just a tool that allows
us to do what we are in place to do: serve the customer. This was made clear to
me in my first “Data Processing Manager” role for a manufacturing firm. My job
was to run systems that supported the end goal of getting product on the shipping
dock at the end of the day. If I did anything to jeopardize that goal, my job was at
risk. I knew my job was less important than the people who built and shipped the
product. A lesson I’ve kept till this day.
We have to constantly rethink our strategies and approaches. It’s clear that the
“build big walls” strategy of the past is not working. Technology companies would
have us believe that if we buy the latest, greatest product, we will be safe, but com-
mon sense tells us that is simply not true.
We are also at a significant crossroads in the evolution of the CISO role. The
image of an ass-kicking, hard-charging, and damn the torpedoes, barely legal cyber
cowboy must die. While I still see many of my peers hanging on to that stereotype,
it is absolutely the opposite of the C suite executive. We must become business
Learning from History? ◾ 7
people, able to protect the business while showing the value of what we are doing.
We all remember the FUD factor: Fear, Uncertainty, and Doubt? In the past, we all
used it at least a little to scare the business into making critical security investments.
Well, put it away, it doesn’t work in the long term anymore. You need to be a busi-
ness partner, an advocate of the business, and build the critical alliances necessary
to strengthen the security culture of the organization.
The other stereotype that must die is what I call the “secret police.” While it is
true that CISOs have many tools at their disposal that can monitor user activity,
they must not be used for fishing expeditions or to instill a “big brother” mentality
at a business. Ultimately, that will destroy security goodwill and culture. Watch
for the security folks who like to wear fobs or toys from law enforcement. Watch
for the people who say if they had to do it over again they would join the CIA or
Secret Service. CISOs must investigate, but must do it within the bounds of cor-
porate policy and culture. Like many people, I am a Dilbert fan. One of the char-
acters that turn up from time to time is “Mordac—The Preventer of Information
Services.” Trust me, you never want to get pegged as that person. If people assume
your answer will be no, they will look for ways around you. Your job is to say
“how” to do it securely. Work with the business, be part of the solution, don’t be
the problem.
For most of us, we are charged with protecting the information entrusted to the
company by its customers. We don’t own it, and we are bound by professionalism
to build and maintain a balanced security structure to protect it. It has taken me
years of experiences to build an approach to security. While it is impossible to cover
30 years in a short book, I’d like to share some of the major lessons and rules I’ve
developed. Around those lessons, I will try to inject some of my current thinking
on the issues.
Have I done everything right? Hell no. The one thing I do wish is that I’d had
a dedicated CISO mentor, but since that wasn’t possible, I gleaned information
from some great mentors over my career. My hope is that you take my experience
and thinking, and find at least a couple of good ideas that will help you in your
“Journey.”
Spoiler Alert: Since every business is different, and the threats morph quickly,
there is no silver bullet. You will have to find your way, build your alliances, and
become the great CISO that the industry needs going forward.
Chapter 3
9
10 ◾ The CISO Journey
me from his perch in the neighbor’s yard. It had become personal. That little rat
with a fuzzy tail was messing with me, an official Boy Scout.
The daily war continued for a couple of weeks. I was more irritated; the squir-
rel was fatter. Finally, one day, our neighbor, who was a retired farmer, sensed my
frustration and came over with some sound advice. He said, “I see your problem,
and you will never beat that squirrel!” “Why?” I asked, trying to be polite. He took
a puff on his pipe, looked at me wisely and said, “You spend maybe an hour a day
trying to keep that squirrel out of your feeder, but that squirrel spends 24 hours a
day figuring out how to steal your bird seed. If you are not prepared to make the
same effort to keep him out, you will lose.”
At that time, I thought I had learned a lesson about bird feeders and squirrels.
But, as I progressed in my career, I realized that it was about dealing with adversar-
ies of any type. In the cybersecurity world, we are no longer dealing with part-time
hackers, we are dealing every day with organized, well-funded, effective groups of
“squirrels” intent on stealing our corporate “bird seed.” These cyber criminals also
communicate well and share information freely among themselves. Interestingly,
this is contrary to the culture we have bred in the information security profession.
We tend to keep ourselves and our organization’s information locked up in a silo;
we have been taught that sharing vulnerabilities and problems we have experienced
is a bad thing. The actuality of the situation couldn’t be further from the truth.
Through this book, I will share experiences, something we must all learn to do if we
are to keep pace with our adversaries. The journey from good to great is not enough.
Unfortunately, our adversaries are already great at being bad.
Later in my career, I took a job where I had to live in New Jersey for a couple
of years. When I shared this story at a local conference, an attendee told me that,
in Jersey, they would have had a different approach to solving the squirrel story.
He told me that he “knew a guy who knew a guy that could make the squirrel
disappear—If you know what I mean…” Ah, what a difference cultures bring to
problems. The diversity of solutions to a single problem (in this case, tongue in
cheek, hopefully) shows that we must be open and ready to embrace many sugges-
tions and solutions.
the room where all the drawings were kept. If you were authorized to enter the print
room, you could check out a drawing, signing a log to acknowledge your actions.
All revisions or changes you made to the design were noted on the drawing, and
the drawing was eventually checked back in. If needed, you could make a copy
of the drawing. All critical drawings were microfilmed and the copy was kept off
site in case of disaster. Simple, manual, and easy to understand. And…we always
knew where the data were and if they were secure. I like to refer to this as the “good
old days” from a security perspective. However, it had productivity problems, and
needed to change to meet new business demands and the pace of industry in general.
Computerization came charging into engineering. As we began to explore
Computer-Aided Design, we realized that even though we printed out the draw-
ings (and locked them in the print room), we now had an electronic version of the
drawings that somehow had to be secured. We started with one generic sign-on for
all the engineers with no password, and slowly worked our way into each person
having a unique account name and password. By the way, once we had the design
on the computer, we printed it out and put it in the print room. Paper was still the
official copy and archive.
As always happens, business continued to change. Production needs to build
products faster and more flexibly drove the development of computer-controlled
equipment, which was electronically linked to the digital designs. While the early
machines kept the programs on rolls of black paper tape with ASCII format holes
punched in them, it was only a matter of time until the business wanted online stor-
age. As an engineer, one of my early projects was to connect production machines
via a thick coax-based cable to a central PC-based server. Today, that is about a
two-hour job to connect and format the equipment. I’m almost embarrassed to
say I spent six months on the project. Now, we had connectivity from the “office”
to the “factory floor.” With the changes in manufacturing such as Kanban and
Just-in-Time, the business also wanted the inventory levels linked real time to the
manufacturing processes.
Because of the dynamic environment, we had to look at setting up a type of file
level security to put a “wall” between production and designs, which were still in
development. Multiple levels of folders with unique access control lists soon came
around, and eventually we needed someone who specialized in this file level access.
At this time, there was no Internet: Securing the electronic frontier was simply a
matter of unplugging the modem we used for file transfer. There were good tools
from the computer companies to manage access to files and manage user IDs. No
distributed computers or PC networks, but that was all about to change.
The Internet hit us all. A project to create the first company website was a major
project driven by high-priced consultants. We put in our first firewall in about
1990. It was not very sophisticated; it was simply a packet filter. Packet filters acted
by inspecting the “packets” that are transferred between computers on the Internet.
If a packet matches the packet filter’s set of filtering rules, the packet filter dropped
it. It was simple and effective, but just a beginning.
12 ◾ The CISO Journey
Business and academia drove continuous change. More features and function-
ality brought additional risks. The cycle continued to spiral. Interestingly, in the
early days of my career, I thought the job would be more of an administrative func-
tion. The primary job was to design and administer access to information to protect
the information from loss or accidental corruption. How wrong can one guy be?
Over the years, I developed rules of Information Security. I adopted some from
peers, learned them through sometimes-hard lessons, and noticed that they were a
recurring theme at every turn. They are as follows:
Rather than walk through my entire life, I am going to organize the next sec-
tion in line with my rules of information security. In each section, we will discuss
the circumstances that prompted me to add a rule, and discuss current industry
best advice on the subjects.
My hope is that I can pass on some advice, lessons learned, or stories that will
strike a chord with you. Enjoy my life experiences and cyber stories. Good luck in
your career!
THE RULES II
AND INDUSTRY
DISCUSSION
This section looks at the “rules of the road” that have helped guide me over the
years. Some with a little humor, most with a little pain.
I’m sure every reader will glean some nuggets of wisdom or memories of similar
incidents that happened to them.
While many of them are common sense rules, I’ve found that in the heat of
battle, common sense flies out the window. Every great football coach will tell you
that the foundation of any career is built on the basics of “blocking and tackling.”
If you don’t excel in those areas, your career options are limited.
Find your own set of common sense rules and practice them daily. That way,
when you find yourself under pressure to act, the common sense part will be
automatic.
Enjoy, learn, and borrow the concepts as you chart your CISO career.
Chapter 4
A Weak Foundation
Amplifies Risk
I will always remember the first house we bought. It was small and crowded with
four children and a dog, but it was our palace. As with any new house, I had a huge
list of projects that needed to be done, so like any guy, I picked the most fun and
“manly” project, which was to build a deck off the back door. Yes, the vision of
grilling, picnics, and kids playing was crystal clear in my mind.
Like any young engineer, I had a great plan. I got my list together, borrowed a
pickup, and headed for the lumberyard: soon I was ready to attack the project. My
first task was to dig the holes for the supports that would hold up the deck. I got the
first hole to the prescribed depth with minimal problems. On the second, about a
foot below the surface, I hit a piece of buried concrete. Not to be defeated, I modi-
fied my layout and moved the hole about a foot. No luck—it soon became obvious
to me that the piece of concrete was roughly the size of Ohio. Damn….
Needless to say, the same scenario played out on the remaining holes. Since I
had no dynamite handy, I ran the posts down to the buried obstacles and decided
that the support would be adequate; after all, it would have been very difficult to
fix the subterranean issues. And, talking to some of my new neighbors, I found out
that my new house was built on a lot with a lot of construction debris as fill. Who
knows what was down there.
All was idyllic until the following spring. I noticed the deck had a definite list
to the right. Sure enough, one corner had dropped about two inches as a result of
the winter freeze and thaw cycles. Not to be outdone by a small problem, I jacked
it up and placed some shims to level it out. Although I didn’t know it at the time,
I was turning into a young Don Quixote, who instead of jousting at windmills,
15
16 ◾ The CISO Journey
I was making a career out of keeping the deck level, a task that turned out to be just
as futile and pointless.
Hey, I really didn’t have a choice; it would have quickly gotten to a point that I
could only grill flat stuff like burgers. If I tried hotdogs, they might roll off the grate
and end up on the floor unless I pinned them down with toothpicks.
In the end, I really should have fixed the initial problem, which was a weak
foundation. I ended up spending more time keeping the deck level than I would
have spent cleaning up the legacy environment.
I’m sure all of us can relate to this lesson from my life. In technology or busi-
ness, we get so busy doing new fun stuff that there is never time to fix the foun-
dational issue. We justify it calling it everything from “legacy issues” to the one I
really hate, which is “technical debt.” Whatever we call it, the weak foundation and
inefficiencies of the past add risk to every new project. So, we develop a new system
and identify and manage the risks in the new system; however, once we place the
new system on the weak foundation, any residual risk in the system is amplified due
to the problems in the infrastructure.
What is “technical debt?” Missing patches and upgrades, old or non-supported
applications (apps) (come on, admit that you have at least one old application that
still runs on Windows XP), broken/inefficient processes, and the list can go on.
There are only two ways to address it, let the bad stuff hang in until it is eventually
replaced or obsolete, or fix it. The ostrich approach of burying your head in the sand
and ignoring it is not a viable long-term risk management strategy.
Remember, sooner or later, your weenies will roll off the grill and it will happen
at the worst possible time.
In your organization, do you have a full understanding of all the components
of your foundation? You may be tempted to believe it is only built of computers
and networks, but in actuality it is the full combination of people, processes,
and technologies. They are all interrelated, and any one element needs the oth-
ers to make the environment work robustly and smoothly. I have learned over
the years that an effective foundation encompasses the three elements of People,
Process, and Technology. Take away one, or have one substantially weaker than
the others and you get a very unstable base. Just like a three-legged stool, if one
leg is shorter or weaker than the others, there is an accident waiting to happen.
Figure 4.1 looks at the three elements of People, Process, and Technology, and
how they intersect with the four primary functions of any information security
group. Those functions are to Prevent (bad things from happening), Detect (if
they do), Respond (to limit the damage), and Recover (quickly to get the business
going again).
Let’s look at the components from Figure 4.1.
People: In order to adequately protect your environment, the CISO must know
who is accessing the systems and why. We all have employees and customers, but
many of us also must allow partners and third parties to access our systems. If you
have been watching the news, you know that literally all of the major breaches have
A Weak Foundation Amplifies Risk ◾ 17
Awareness
Contingency planning
Prevent Alerts and advisories
Perimeter security
Virus management
Access reporting
Detect Security monitoring
Computer incident
Respond Response team
Business resumption
Recover Planning and disaster
Recovery plans
Granted this is not a full risk assessment, but it gives you enough data to intel-
ligently discuss the issue with management. You have an idea of the risk to the busi-
ness if the application crashes as a result of patching and upgrade. From a security
standpoint, you should already know the likelihood and impact of a vulnerability
being exploited. Since you have asked compliance questions, you already know if
there are any mandatory requirements to keep the server patched and in compli-
ance, and the potential penalties and fines if the server is not patched.
Have a business discussion, not just a security exercise. Don’t let the IT folks
simply “accept the risk” of a business impact. Ensure the right people are involved
in the decisions.
You can decide to stay with the current version of a system, keeping it current
through patches and occasional software updates, but only for so long. Vendors
don’t go on providing patches forever. Eventually, they sunset their products and
A Weak Foundation Amplifies Risk ◾ 19
release new versions. Think of all the versions of Microsoft Internet Explorer you
have used over the years or how many different Microsoft operating systems you
have used. The pace at which new versions are released has accelerated over the
years. Fortunately, prior versions continue to be supported, but I see that support
window closing as well. Let’s face it, vendors do not make a lot of money (if any)
supporting older products. It ties up valuable resources.
Early in my career, I understood that just like everything, technology products
have a limited time they are supported from the vendor. One of my hobbies is
restoring cars; my latest is a 1957 Chevy. Chevrolet quit making parts for a 57 a
long time ago. If I want parts, I have to buy them from a specialty manufacturer
who builds the parts. At some point, it becomes too expensive and certainly not
profitable for the vendor to continue supporting their earlier products. You need to
be proactive about planning the life cycle of the critical elements in your environ-
ment. It doesn’t have to be complex to start; the key is to start. Figure 4.2 shows an
extremely simple method of conveying the life cycle to the rest of IT.
This lets all support functions know when they must have a component out of
the environment. There will be a temptation to give exceptions and passes to the
drop-dead date. However, as I’ve painfully learned over the years, you can dig an
incredibly deep hole one shovel full at a time. Be careful and weigh any exception
against the strategic direction of security and operations.
designed for as well as other potential exploits. It would be like a car manufacturer
installing air bags without ever testing them. You ride along assuming they are
going to work just like you assume the patch is going to work. Fortunately, the car
manufacturers do extensively test their air bag designs and installations (though
recent air bag recalls would seem to indicate more testing is required). You need to
do the same with your patches.
I’ve seen it all—or so I think—but people keep surprising me. Probably the
most common mistake is installing a patch that requires a reboot, and forgetting to
reboot the system. So, the organization cruises along, thinking it’s protected when
it is not. Without a post-patch scan, you really don’t know if the patch took and did
what it was supposed to.
Another common mistake comes from using an automated patching tool. The
tech loads up the system and assumes the system did its job. Never assume success-
ful completion. As the old saying goes—trust but verify.
Of course, older products tie up our resources as well. Legacy software is like a car;
the older it gets, the more care and support it takes to keep it humming along. You can
find support for your software, just like cars, from other vendors. As time goes on, this
support tends to get expensive. Recently, I worked with a major database company to
buy “extended support” for an older version. The cost was an additional 20% over my
current maintenance payments coming to almost $300,000 for one year.
Eventually, though, even the vendors stop supporting their own software. I
recall working for a company that had an ERP (enterprise resource planning) sys-
tem so old even the vendor had no one on staff that had any experience with that
version of the software. There are third parties that tend to fill the void left by
vendors who have abandoned their earlier products. These third parties are likewise
expensive and their actual level of expertise can vary widely. In many cases, you
may find you are paying these third parties to learn your software. If your software
is highly customized, support from third parties can be very limited.
Once vendor support ceases, third-party support is basically focused on keeping
the software functional. There is no emphasis or concern on possible security flaws
within the software. The bad guys love flaws that have been identified in newer
software since there is a good chance these same flaws may exist in unsupported
versions of the software that still exist in the field. They have a wide-open door
A Weak Foundation Amplifies Risk ◾ 21
to your environment with no one to close it. In most cases, you won’t know that
security flaws exist until it’s too late, and even if you do know they exist, you have
limited options to address them without vendor support.
Lesson learned? Your only true and correct course of action is to make sure your
legacy software is kept up to date. This does not mean you need to be on the very
latest version. However, you certainly want to be on a version that you know will
be supported far enough in the future to allow you to upgrade to a newer version
before support ends on your current version. This is all part of software life cycle
planning that is rarely done or properly budgeted for.
It’s no wonder that patching falls by the wayside. There is always something
more fun or more interesting. This doesn’t take away from the fact that it is one of
the most critical security-related maintenance tasks that take place in any organiza-
tion. That one missing patch may be just the vulnerability the hacker needs to sneak
through all of your elaborately placed defenses. Hackers have plenty of targets and
can afford to be very specialized. A hacker may need only focus on one or two vul-
nerabilities, biding their time till they run across an organization that has left them
an open invitation. Once they are inside your organization, and they will get in,
unpatched servers provide an easy path for them to move within your organization
and escalate rights.
evaluate the impact of a patch. Today, it is still easy to think that the organization
is better off waiting for a few weeks after vendors release a patch before deploying
it internally. The idea is that if you wait a month and don’t hear any screaming on
security mailing lists, it will be safe to apply the patch.
Great concept, but the lack of complaints from others does not mean that you
won’t have problems. You need to test it yourself in your own environment. If you will
have problems, waiting a month will only delay the amount of time that passes until
you discover the issue. Let’s also remember that in today’s environment, a month of
being vulnerable to a serious exploit is an eternity. Today, we must patch quickly or
put in compensating controls such as Web Application Firewalls to address the risk.
Scanning Required!
Here are a few danger signs for your environment:
1. The network guys tell you that they can’t produce a network diagram because
the environment is too complex. Translation: I’m not really sure what is where
anymore, but hell, it still works, what’s your problem?
2. There are servers and apps that are too critical to be patched or scanned. The
truth? If you have apps or servers that can be crashed by a passive scan, scan-
ning is the least of your problems. These are usually business critical servers,
which are so fragile that they can’t be patched or scanned. Does this sound
like a Business Continuity or Disaster Recovery issue? Check for backups,
you may find that there is no backup of the server.
3. The vendor didn’t tell me there were new patches. Who owns the application
internally? Any service necessary for the business needs an owner. The main-
tenance of that application needs to be part of their review and raise process.
4. Finally, and always a goody: My application is patched but the underlying
components are not my problem. “I just handle the code, if JBOSS or Adobe
(which the application requires) have vulnerabilities, it’s not my problem.” IT
management must understand that all vulnerabilities are their problem; no
one gets to pick and choose. Ensure that someone is RESPONSIBLE.
5. Scanning for vulnerabilities besides just missing patches is crucial. Having a
methodology in place to deal with the results is equally important. Devoting
resources to the problem goes without saying. The only way these resources
will succeed is if they are given adequate support from the top, and their
efforts are recognized for the true importance they convey. If you don’t
reward and recognize those who are performing your vulnerability scanning
and patching, it will never get the attention it needs, nor will it attract the
quality talent necessary to ensure it is done correctly.
Misconception One
Vulnerability scanning can identify all vulnerabilities in an organization’s environ-
ment. If you do a good job at that, you can save money by not doing penetration
tests.
24 ◾ The CISO Journey
Been there, done that—I thought that if I could do weekly vulnerability scans
of the network and systems, that was better than a penetration test since I was find-
ing issues in real time. Besides, have you seen what the Penetration Test firms get?
Wow, I can certainly use that money elsewhere.
Here was the hole in my logic. The scanners are preloaded with “signatures” to
detect known vulnerabilities. The vulnerabilities are simply “doors” into the com-
pany systems. No scanners are perfect, so there will always be “doors” left open. A
penetration test goes beyond finding the open doors and looks at what actions an
attacker could take by exploiting a given weakness. For instance, a vulnerability
scanner may detect a system using a default password. A penetration tester could
use that default password to see how far into the network they could get with those
rights. That is a true measure of a system’s weaknesses.
Misconception Two
Professional penetration testers use really expensive tools, so it’s really not a good
test of what a hacker could do.
True, professionals may use some custom tools, but the majority of the tools
they use are freely available to the hacker community. In fact, a large number
have actually been generated by the hacking community. Many of these tools are
“Wizard Based,” making it easy for relatively unsophisticated bad guys to compro-
mise networks. The good things about penetration testers who use those tools is
that they can simulate an attack from a malicious hacker.
Misconception Three
A penetration test was a success if the attack team couldn’t get into your network.
Contrary to what you may think, if the testers couldn’t get in, you probably
should hire another firm. Every network has vulnerabilities that can be exploited.
All systems have users that open holes. I’ve used some great firms over the years.
At a high level, I do three tests. The first is a look from the public Internet. The
second is where I give the tester access to a network jack with no user id or pass-
word. The third is where I give them the phone number of the help desk to see
if they can “social engineer” their way into my system. The longest I’ve survived
their methods is three days. That is how long it took them to get user rights (some-
times system administrator) on the network. Understanding how they got in is
always invaluable. It allows you to make real changes and upgrades to your system
defenses.
Misconception Four
A system compromise is only applicable to the system that was compromised.
A Weak Foundation Amplifies Risk ◾ 25
Any penetration tester worth his salt will use one compromised system as a
launch point against other systems. Once an attacker has established a foothold,
they can watch for and capture user credentials to use against additional systems.
Misconception Five
Focus your penetration testing only on production networks containing sensitive
data.
Many CISOs focus on production networks containing sensitive data, exclud-
ing other networks containing nonsensitive data, such as development and test
environments. These are the networks most vulnerable to malware infection due
to the open and fluid nature of the work performed there. The bad guys also know
this and in many cases look for holes there first. It’s incredibly important that they
also be scanned and penetration tested as they could be launch points for produc-
tion system attacks.
Take an inventory of your applications. How many are unsupported right now
by the vendor? How many will be unsupported within a year? Chances are the
numbers are going to be larger than you like. More troubling will be the number
of applications and systems you find where no one is the owner and no one knows
what they do. And don’t just focus your inventory on the big name software. There
is a lot of software that runs behind the scenes that is just as critical to keep current,
such as Tomcat, Apache, Adobe, Java, your databases, and so on. Any in-house–
developed software is most likely composed of a number of commercial third-party
products. It is typically these behind the scenes–type software that makes it so dif-
ficult to keep up to date because of all the interdependencies. Upgrading one thing
might break several other things.
The easiest way to explain this is to reference the seven-layer open system
interconnection (OSI) model (Figure 4.4). Every application that runs in your
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
environment is built on these seven layers, each having its own risks and vulner-
abilities. True vulnerability management must look at the People, Process, and
Technology vulnerabilities of all layers. The Application Layer may have vulner-
abilities as the result of a coding error, and the Physical Layer may have vulner-
abilities related to weak change control procedures that would allow a technician
to pull or disconnect the wrong wire.
One necessary tool for tracking all these elements is an asset management sys-
tem. If you don’t have an asset management system, you seriously need to consider
getting one. If you are a small shop and can’t afford a big system, use a spreadsheet
or Access database. The key point is to document, document, and document! The
more you know about your environment, the better. Don’t let the magnitude of a
subject stop you from doing anything. I’ve been in many discussions that go like
this:
“We all agree that we need an asset management system. If we don’t know
what we have, how do we know what to patch and maintain?” Everyone around
the table shakes their head and agrees, but that is where the sanity gets very
scarce. The production manager says, “You know these systems cost hundreds
of thousands of dollars and take a couple of people to run. Unless I can col-
lect every conceivable bit of information about the environment, we should not
start.” Next comes the development manager who says, “I need the tool to map
all the applications running in the environment and how they relate to each
other.” Last country heard from is the Finance group who says “There is no way
we can afford a few hundred thousand dollars for this project, let’s just put it off
until we can afford it.” I sense many of you have been in the same meeting. We
went from a simple spreadsheet to list what our equipment (better than what
we had which was nothing) to a project we couldn’t afford. Then because we
couldn’t afford the top shelf solution, we decided to do nothing. You don’t have
to boil the ocean. As CISO, you will sometimes make more progress by taking
small steps that are lined up with a long-term objective. Here are some ideas to
get started.
Environment Control
◾◾ Managing equipment life cycle and depreciation status
◾◾ Enforcing standards
◾◾ Controlling purchases
◾◾ Optimizing utilization
◾◾ Managing vendors
Tracking IT Assets
◾◾ Assigning value
◾◾ Tracking cost of ownership
A Weak Foundation Amplifies Risk ◾ 27
Risk Management
◾◾ Tracking software licensing compliance
◾◾ Assigning and tracking ownership
◾◾ Tracking security risks
At a minimum, you should have a run book for each application in your envi-
ronment. This run book should include what applications are running on what
servers, when they were installed, what they do, what they interface with (especially
databases), who is the subject matter expert for each, who is the business owner for
each, what software language they are written in, are they public or internal facing,
do they contain sensitive data, and the location of additional reference documents
for each application. The more details, the better. One thing you might discover is
applications installed by users and business units that have bypassed IT’s normal
change management processes. A configuration management tool can greatly help
prevent these types of vulnerabilities entering your environment.
Lesson learned? Be sure and identify the owner for a system. Lack of assigned
accountability and responsibility for a system results in legacy systems remaining
in place long past their useful life. There is no one driving change for the system
or accepting responsibility for the system should things go south. IT is usually
left holding the bag on these systems. Yet, IT cannot speak for the business. Any
attempts at changing the system are usually met with outcries from the users. In
some cases, there are a very small number of users that should not realistically
warrant keeping the system alive. The simplest solution for IT then becomes one
of accepting the status quo even though this is not the correct decision. Why fight
City Hall? Every system needs to have a business owner as well as an IT owner for
the life of the system. If no one in the business feels strong enough to own a par-
ticular system, then it should be shut down.
Once you have a good inventory of your systems and run books created, you
can then prioritize the systems that need attention from a security perspective based
on potential risk. While every asset deserves attention from a security perspective,
you simply do not have the time, resources, or money to address every server and
application to the same degree. Obviously, if the system processes or stores sensitive
data or is required to meet certain governmental requirements, it should be high
on your list. If the loss or compromise of a system would cause business critical
functions to fail, having a significant financial impact to the company, then these
should sit high on your list.
How do I decide what needs to be fixed first? Each asset should be looked at
from at least two perspectives when considering risk. The first is what is the likeli-
hood that the asset can be breached? If it is behind a firewall and in a locked data
center, its exposure is much less than a server sitting in the DMZ or one of your
mobile assets. What is its current patch status? How many people have access to the
28 ◾ The CISO Journey
asset? I’d like you to think in terms of a 1–10 score where 10 is the greatest likeli-
hood that the asset could be breached. Keep that number in mind; we will use it in
a couple of minutes.
The next perspective: What are the consequences to the company should this
asset be breached? In other words, what is the impact to the company? Lastly, you
need to consider what the probability of occurrence of a system breach is. This is
similar to the risk exposure, though it focuses more on external factors, such as
whether your line of business is a prime target for hackers and whether the asset
in question is one a hacker would be interested in. Is it an operating system that is
frequently targeted by hackers? Do you have a high degree of monitoring in place?
Each of these factors can be classified as high, medium, and low or on a scale of 1
to 10. This is very subjective, but it can give you a relative idea of comparative risks.
Depending on your line of business, if you have systems that people’s lives
depend on, then they should go to the very top of the list. By lives depend on,
I mean systems that could affect one’s physical health and not some application;
e-mail typically seems to be considered in this category, that people can’t “live”
without. I once worked at a company where they occasionally turned off the instant
messaging system. The CEO strongly felt that people needed to actually talk to
people, if not face to face then at least by voice. He also wanted to demonstrate that
some systems aren’t as critical as we might think they are.
Clearly, anything accessible from outside the company (web based or otherwise)
is a higher risk to the company and needs to be given higher consideration. Age of
the hardware and the applications also impacts risk. Putting old software on a new
piece of hardware or vice versa does little to reduce overall risk. Just because an old
system has run reliably for years without compromise is no guarantee that it will
continue to do so. Older systems have most likely undergone a number of changes
over the years. How thoroughly tested and documented these changes have been
is a matter of concern. What were once considered minor configuration changes
may have opened up large security holes that were not recognized at the time of
the changes. Older systems tend to grow a multitude of interfaces over time. These
tend to be poorly documented. If any of its interfaces are not secure, then it doesn’t
matter how secure it is itself.
If you are lucky enough to have access to the test documentation for the sys-
tems, you can learn a lot as to how secure they might be. The number and types of
tests conducted will have a bearing on how secure a system is. A review will reveal
additional tests that should be conducted to address new vulnerabilities that have
been discovered since the system was first tested. Don’t limit your review to just
the test documentation. Look at all the system documentation that is available to
see how security was addressed. The design may have been architected under the
assumption that other things were going to be deployed in the environment that
might never have occurred or have changed significantly over time.
In reviewing your systems, you need to think like a bad guy. What systems and
data would they be most interested in getting access to? What ways are available to
A Weak Foundation Amplifies Risk ◾ 29
them to try and get to these systems and data? Be very creative in your thinking.
The more unconventional the thinking, the more likely you are to discover poten-
tial vulnerabilities in your environment. Take advantage of your staff’s extensive
knowledge. Make it into a contest to see who can come up with the most ways to
penetrate your environment or a particular system. If you have systems that have
been breached in the past, these need special consideration. What has been done
to fortify them? Are these measures still viable in today’s threat environment? Is
it possible that the vulnerability that permitted these systems to be breached may
exist on other assets? Are these systems still needed?
Once you have identified your risks and prioritized them, you then need to con-
centrate on your mitigation strategies. When considering your options, more than
just security concerns need to be evaluated. Business impact, resource limitations
(human and system), system interfaces, technology changes, system age, func-
tionality needs, documentation availability, subject matter expert availability, user
interface, and maintenance needs come into play for the system in question and
its mitigation alternatives. Like most problems, you will have to decide between
several alternative solutions.
Using the previous 1–10 rating, you have a high-level view of the security risks
posed by each system. By using a grid similar to Figure 4.5, you can map the scores
of each vulnerability and generate an easily understood road map of what issues
should be first on the “fix list.” For instance, the issue identified by the bubble
numbered one has a Likelihood of being exploited as a 10 and an impact of the
company, if it happens, of 10. This could be a web server exposed to the Internet
with an easily exploited vulnerability (10) that runs the company’s e-commerce site.
If it goes down, the company revenue is affected immediately (10). Plotting those
10 1
9
8
7
Likelihood
6
5
4
3
3
2
2
1
1 2 3 4 5 6 7 8 9 10
Impact
two points puts the issue in the upper right corner of the graph, meaning fix imme-
diately. Issue two has a Likelihood of 1 and an Impact of 1, meaning that the issue
is not a high priority and can be fixed at a later date. Issue three has a Likelihood of
2 and an Impact of 8. This means that while the likelihood is low, an exploit would
result in a high-impact issue to the business. When you plot the issue, you can see
that the 3 comes up as a Medium issue, meaning it must be fixed after the High
issues are resolved.
Your firm needs to define what the colors mean. Personally, my starting point is
that High issues must be resolved in two weeks, Medium in two months, and Low
in six months. Don’t finalize your definitions in a vacuum; form a team of business
and IT leaders to develop the change windows and MONITOR the health of the
program. If the process is not monitored and reported on, it will fade into oblivion,
leaving the business with a false sense of security that risks are being addressed.
Trust me, that is worse than never having started.
One option you always have is to do nothing. Doing nothing is usually more a
matter of delaying a decision rather than a legitimate option. Opting to do nothing
is usually chosen when a particular system is due to be upgraded soon or replaced.
If there are real security concerns with a system, then doing nothing is never a
smart strategy. We cannot ignore the inevitable. Even as a delaying tactic, doing
nothing is not smart. The system is still exposed. The bad guys certainly won’t be
doing nothing while you procrastinate. As we all know, projects get delayed or even
cancelled. If you have a security issue, it needs to be addressed now in some shape,
manner, or form. Doing nothing only makes sense if the risk is small. While some
may argue that the cost to mitigate may be too excessive to justify the particular
option, the cost of any breach will greatly outweigh any potential solution you
might ever come up with. At the very least, you need to find a way to reduce the
risk if you can’t eliminate it. I must caveat this in that you will never be able to
completely eliminate all risk. It is an exponential curve where you eventually reach
greatly diminishing returns on additional investments in risk mitigation.
Lesson learned? Not all mitigation strategies have to be costly or elaborate.
Creating new policies and procedures may be a very simple and effective way to
reduce the risk. Don’t get caught in the techie trap where every risk needs an expen-
sive hardware solution. Just applying additional monitoring will bring you down
a bit on the risk curve. Training can always help reduce risk whether it is for your
immediate staff or others. Making a few adjustments to your existing systems such
as implementing a new group policy or firewall change can help reduce the risk
without considerable expense.
Earlier in my career, as patching was becoming an issue, we identified a need
to upgrade the web server software for an external site to address a security issue.
As I talked to the developers, I found that there were a multitude of additional
changes they wanted to do as long as “We were touching the code anyway.” A
A Weak Foundation Amplifies Risk ◾ 31
few weeks later, I got a call from an irate product manager wanting to know why
my patching requirement was going to cost about $200,000. Much to my sur-
prise, I found out that a whole product rewrite had been included in my patching
requirement.
Lesson learned? Many times, you may need to patch or fix a vulnerability in a
system, especially in-house–developed systems. Be careful you are not drawn down
a rabbit hole by developers and the business wishing to implement all kinds of new
functionality along with the security fix. The primary motivation should be to fix
the existing security flaw. Time is of the essence. Taking on new functionality not
only slows down the process but may inadvertently introduce new security flaws in
the rush to address the existing flaw. Developers will be more interested in working
on the new functionality than the security fix. Security fixes are boring. Testing
will likewise be skewed more toward the new functionality rather than the security
fix. Better to just concentrate on the security fix and leave any new functionality
enhancements to be addressed in a separate project.
Lesson learned? Avoid the perception of chaos. Sometimes called “Whack a Mole”
management, this is where you have so many issues to be addressed that no one
knows what to do first. This is compounded if you are also confused. Take respon-
sibility, stand up a plan, and work it. Trust me, I’ve been in this situation many
times during my career, sometimes my fault, sometimes the actions of others.
Understand that you may discover new vulnerabilities or the same vulnerability
scattered throughout your code. Vulnerabilities can’t be ignored. Find them, list
them, organize them, and kill them. Be a leader.
New vulnerabilities will always come up and must be prioritized against the
degree of risk they present. To avoid scope creep and cost overruns, new vulner-
abilities should be addressed and analyzed separately. If you try to do too many
upgrades or patches at one time, it will only increase the chances something will be
broken in the software. As you find new vulnerabilities, you need to assess where
else in your environment this same code may be employed since developers often
reuse code. A good software code library will help immensely in identifying where
reused code is implemented.
Lesson learned? Don’t alienate the Development folks. A challenge that security
faces is how to properly communicate security issues to developers. Historically,
the security engineers come out of network engineering, so there is a built-in
“language barrier” from the start. These communication issues are not just per-
tinent to security, but they are definitely magnified due to the unique lingo of
security professionals. Developers can more easily relate to business functions
than security concepts. Your security staff needs to be adept at taking complex
and obscure concepts and translating them into actionable requirements for the
developers. This is not a skill that most security personnel readily possess. The
32 ◾ The CISO Journey
employment of Use Cases can help developers more easily understand complex
security requirements provided your security staff know how to develop Use
Cases. Also, be aware that a developer that has worked on a project for months is
proud of their achievement. Avoid calling their baby “ugly!” Tact and diplomacy
are as important to a security professional as technical prowess. Build a partner-
ship with developers, offer training, ask for input, and offer development basics
training to the security staff.
Upgrading an existing system to address vulnerabilities takes lots of planning
and time. Sometimes you are confronted with a decision to upgrade an existing
product or move to a competitor product. My experience has been that if your
existing product meets your needs and you have decent support from the ven-
dor, then why switch? Switching is always harder and usually more costly than
just upgrading. Switching should never be predicated solely on security concerns.
The patching tool we were using would not support MS Server 12. Rather than
upgrade the tool, a decision was made to purchase a different patching tool. We
now have the new tool patching MS Server 12 assets and the legacy tool patching
the rest. Getting off the old product has proven far more difficult than antici-
pated. Now that all assets are being patched, there is less urgency to consolidate
on the one patching tool. Sadly, this scenario tends to repeat itself far too often
where new systems are brought on line to replace old ones, yet in the end, both
systems remain in production. What you don’t want to do is throw the baby out
with the bath water. While your system may be vulnerable, it may only be a small
component of the system such as the database or user interface. Much like a car,
you sometimes have to replace a part now and then to keep it in top running
condition. Only after a fair amount of time and use does it make sense to replace
the whole car. Of course, if it is just the radio that is working great, you don’t
necessarily want to replace everything around the radio. Designing and incorpo-
rating modular systems in your environment make this such a viable approach.
Having good documentation, especially well-documented interfaces, is the key
to this approach.
Lesson learned? Understand the financial impact of system support. There are
a multitude of reasons why legacy systems are allowed to remain in production
despite their direct impact on the foundation of your enterprise. Cost is always
brought up as a key driver to stay with legacy systems. No one wants to foot the bill
for an upgrade. Costs include both time and money. Plus, like the person who buys
a car and drives it into the ground, there is a tendency for businesses to try and get
as much as possible out of their initial investment.
The true lifetime costs of systems are rarely recognized when they are imple-
mented. No real plans are ever presented up front that identify the end of life of the
system and delineate how it will be replaced. What we have are systems that tend
to never die.
A Weak Foundation Amplifies Risk ◾ 33
Delaying upgrades as a means to save money is not a good strategy. Older sys-
tems inherently require more personal attention to keep them running. They are
more likely to result in downtime and tend to run slower over time. Users are
deprived of enhanced functionality available in newer versions that could result in
quicker processing and fewer errors. When vendors stop supporting their products,
you need to hire specialized consultants when internal resources cannot solve a sys-
tem problem. Hardware parts become harder to find and more costly. These sorts
of costs tend to be overlooked.
◾◾ Are annual support and maintenance costs less than the system replacement
costs for both hardware and software?
◾◾ If the current system support person were hit by a bus tomorrow, could you
still do business?
◾◾ Can you quickly find people with the skills to maintain the hardware and/or
software applications?
◾◾ Does the original manufacturer still have replacement parts for your hard-
ware or are you using hard-to-find third-party or used resources for parts?
◾◾ Is the original vendor still in business and actively offering support for your
version of the system?
If you answered “no” to some of these questions, then you probably should be
on the lookout for upgrading or replacing your legacy systems before they cause
serious harm to your business. If you answered “yes,” to these questions, then your
34 ◾ The CISO Journey
systems are probably fine for now, but stay alert for obsolescence by staying current
on industry trends for your systems.
I worked for a company that had a large ERP system that they
stopped paying support for over 10 years earlier, yet continued
to use the product on which the entire company depended.
The system had to use an unsupported database as well as
run on an unsupported operating system to remain functional.
It finally got to the point where system failures and extremely
poor response times forced the business to make a decision
to upgrade it. Unfortunately, in order to upgrade, the vendor
required them to pay for all of the previous years of support
plus the upgrade costs. In an attempt to save money, they put
the users through a lot of pain and suffering, risked potential
catastrophic system failure, and exposed the business to secu-
rity breaches all for naught.
People know the current system and are comfortable with it. Things currently
work OK. The general sentiment is if it isn’t broke why fix it? People don’t like
change. Upgrading a system tends to have less resistance than replacing it with
something entirely different. Employees who have worked on a particular system
for years do not relish having to learn a whole new system. The time and costs
involved to retrain people on the new or upgraded system are certainly a factor in
staying with the status quo.
Lesson learned? Challenge the assumptions regarding legacy systems. My experi-
ence is that most of the assumptions have no basis in fact. If an assumption hangs
around long enough, it is assumed to be fact, and no one challenges it. For example,
the U-2 spy plane piloted by Francis Gary Powers was assumed to be untouchable
by Soviet anti-aircraft missiles. The strategists were confident that no missiles could
reach, let alone shoot down the U-2. Yet, on May 1, 1960, the unthinkable hap-
pened; the U-2 was shot out of the sky. Ultimately, this legacy system was breached.
The military was forced to recognize the risks the legacy system imposed and had to
upgrade and replace its hardware. The U-2 was ultimately replaced by the Lockheed
SR-71 Blackbird in 1964. Had the Air Force been able to upgrade sooner, the U-2
incident would have never happened. No SR-71 was ever shot down.
While the rest of the world marches ahead with newer technology, you may
find yourself in a situation where your legacy systems cannot interface with the new
stuff. Your only option may be to build very expensive customized interfaces. These
will prove to be difficult to maintain. Bringing on new systems will take longer.
A Weak Foundation Amplifies Risk ◾ 35
Keeping legacy systems around may also hurt your employees. Their skills
become dated. Your good resources will leave rather than hang around to work on
dinosaurs. In-house knowledge of legacy systems will quickly diminish, further
confounding support of these systems. Attracting new talent will also be difficult
since no one wants to work on unsupported and outdated systems. If you find your-
self in a situation where you have to frequently reboot your servers, this is a very
good indication that it is time to upgrade or replace. Either your in-house resources
do not have the requisite skills and knowledge to find the root cause of the issues
with the system or the system has reached its tipping point.
Something else to consider. Your legacy system may have gone into production
three years ago, but when did coding actually begin? Now consider that develop-
ers like to reuse code and take advantage of public domain code. How old is this
predeveloped code? Your software may be a lot older than you think. It’s like a
20-year-old getting a heart transplant from a 60-year-old. Things may work, but
what imperfections did we inherit?
Your applications are only as secure as the hardware they reside on, the operat-
ing system they utilize, and the network they interact over. Each piece has to be
secure. People tend to forget how important it is to keep your hardware’s firmware
up to date. Most patching tools cannot address hardware firmware. Different skill
sets tend to be needed to address hardware vulnerabilities.
You need to upgrade or replace. That is the only way to firm up your founda-
tion. New software, while certainly not invulnerable, has the advantage of learning
from the mistakes of the past. Like the unsinkable Titanic that incorporated all of
the best aspects of ship design, your newly installed software is very secure against
hacking until it runs into its cyber equivalent of an iceberg. And like the Titanic,
there are a number of factors that must come into play before your software is
“sunk.” The Internet is a very big ocean, and your company a relatively small ship
on that ocean. A technological form of global warming is setting adrift a lot more
icebergs across that Internet. You may be able to travel great distances and for a long
time before you come across a cyber iceberg. You have the advantage of many other
corporate ships at sea with you who can help you avoid these cyber icebergs. There
will be far fewer “USS Legacy” ships at sea as time goes on.
Should you decide to replace an existing legacy system, then you need to reeval-
uate your current security architecture. It makes no sense to put a new system in an
environment with security designed around the previous system. This is an excellent
opportunity to make further improvements to your security posture. In all likeli-
hood, the decision to replace the system was not made based on security concerns
but business needs. You need to ensure that security requirements are enforced
before any new system goes into production. This can be a painful battle with the
business. Any deviations from the security requirements must be documented and
the risks signed off by the business; otherwise, you will be accountable should a
breach occur in the future. Let’s face it, you will be held accountable regardless
but at least you have documentation that you recognized the risk. Security design
36 ◾ The CISO Journey
reviews, code reviews, security testing, and system penetration testing must be per-
formed before a system goes live.
There will invariably be situations where you cannot patch or upgrade in a
reasonable period of time. You will have to come up with some strategy to mitigate
risk. Common options available to you are segmenting off the network where the
system resides, virtualization, additional firewalls and/or firewall rules, and more
intensive monitoring of the system in question. Many times, alternative solutions
are provided for identified vulnerabilities, so if you cannot patch or upgrade, you
must resort to using these alternative solutions.
We can’t forget about the other critical piece of your foundation. The one that is
exposed to the elements and is at a greater risk of failing. That is your mobile assets.
While PCs are an obvious risk, mobile phones and tablets are now being rightfully
recognized as very serious risks to the environment. All of your mobile end points
need to be password protected and the data on them need to be encrypted. Users
should not have any sensitive information on their mobile devices regardless of
whether they are encrypted or not. The biggest concern would be passwords that
may be stored on the devices. The less your employees have on their end points, the
lower your risk.
Are your end points configured so they can be automatically updated with new
software versions and antivirus signature files? Do you periodically scan the end
points to ensure they have the latest software installed? More importantly, are you
verifying that the software installed is legitimate? Automated update processes pro-
vide an opportunity for the bad guys to usurp the process and insert their own
compromised software. Your networks should be configured to prevent any end
point that does not have some minimum standard of software installed from con-
necting. Older versions of software were obviously replaced with newer versions due
to security holes in the earlier versions. Why would you want to allow older versions
to connect to your environment?
In summary: You are only as secure as your foundation. Like the foundation on
a home, it requires periodic inspection and attention.
The bottom line is legacy software imposes significant risks on the company.
The costs to address legacy software are small compared to the costs a security
breach will incur. You have to make sure your foundation is intact. One small crack
can bring an entire structure down.
Is your foundation well identified or is it scattered all over your environment?
For example, are your sensitive data stored in a few key locations on your network
or can sensitive information be found everywhere you look? Is it in databases or
is it in files? Protecting a few critical databases is far easier than trying to protect
thousands of files with sensitive information sitting all over your network. You
should do everything you can to minimize the storage of sensitive information in
files. Once a bad guy gets access to your network, then it is generally easier for them
to peruse files on the network than it is to penetrate a database. At a minimum,
A Weak Foundation Amplifies Risk ◾ 37
sensitive files should be encrypted. If you must have sensitive files, then they should
also be centrally stored with restricted accesses in place.
Remember, just because things appear to be working correctly does not neces-
sarily mean it is true. A friend of mine owns an airplane. It had a slight vibration
that was certainly troubling to him. He looked for all the obvious sources for the
vibration for months with no luck. In the end, it turned out that one of the three
propeller blades was corroded internally, so that it did not move to take a bigger
bite out of the air as he climbed in altitude like the other two blades, thus throwing
things out of balance. There was no way to actually determine this without getting
inside the propeller operating mechanism.
As a CISO, it is your job to understand the legacy risk being experienced by
your company. To see how secure your foundation is, you may have to tear a few
things apart as well. Dig deep and don’t just take a surface view of things. In
industry, change is constant. Change requires vigilance. Keep your eye on both the
inside and outside of your foundation.
Chapter 5
It’s tough to be the computer expert for the family and friends. As soon as the word
gets out that you know your way around Windows, the calls start. Sound familiar?
It’s a common hazard of being an IT guy, and it isn’t a bad thing as long as you can
keep family and work separate.
39
40 ◾ The CISO Journey
As background, let’s talk about many of the common methods used to mali-
ciously disrupt network communications or gain unauthorized access to network
resources. One of the most common questions I’m asked is, “Why do individuals and
organizations want to carry out attacks against someone else’s network?” There is no
doubt that there are a variety of reasons to disrupt a network. To the “script kiddies,”
the thrill of penetrating or disrupting a network provides an ability to brag about
their prowess with common network-attacking tools. For disreputable businesses, the
capability to penetrate another business’ network may provide business confidential
information and an ability to discredit a competitor’s reputation. For countries, the
ability to penetrate the networks of other countries provides a potential wealth of
information about strategic, tactical, economic, and political policies that can lead to
decisive victories over their adversaries. Sometimes, the only goal of a malicious attack
is to render the network useless and deny the use of it to the organization’s employ-
ees. With respect to home networks, protection of personal information is critical to
defending against such problems as identity theft and undesired release of family and
individual private information. It is easy to understand that protection of network
assets is critical for all types of individual and organizational networks.
One of the primary tools of a hacker is malware. Malware is a broad category
that is usually associated with computer viruses, worms, Trojan Horses, and spyware.
Software that may unintentionally harm a computer user is not considered malware.
Software bugs certainly fall into this category. There must be intent to do harm or act
against the will of the targeted computer user. In other words, malware can do a vari-
ety of things, not all of which actually breaks a user’s computer. Generally, things that
don’t break a computer involve spying on the computer user and collecting data from
their system. Interestingly, you may find malware referred to as a computer contami-
nant in the legal codes of some US states, which is a pretty good description as well.
Malware is definitely something you do not want on any of your computer assets.
How about a little history to impress your techie friends. So how long has mal-
ware been around? A lot longer than many of you would suspect. The origins of
malware can be traced back to the late 1940s when a Hungarian-born mathema-
tician by the name of John Von Neumann did research and lectures on what he
termed “self-reproducing automata.” While he was primarily focused on biological
processes, he saw the potential for artificial automata. It wasn’t till 1971 that a true
attempt was made at creating artificial automata. Bob Thomas attempted to create
a self-replicating program. He was connected to the forerunner of the Internet, the
government-created ARPAnet. While his creation did not recreate itself as planned
on other target machines, it did spread across the ARPAnet causing the message,
If a Bad Guy Tricks You into Running His Code on Your Computer ◾ 41
“I am the Creeper. Catch me if you can!” to appear on the command line of tar-
geted machines. Creeper thus has been considered to be the first computer virus. In
response to Creeper, we quickly had our first antivirus (AV) program called Reaper
that was specifically designed to remove Creeper. While Creeper did no real harm,
it did act against the will of the end users who had no control over preventing it
from displaying on their command line. I suppose we could consider many of the
annoying pop-ups that appear in our browsers as malware though most browsers
do give us the ability to block pop-ups.
Myth One
I don’t need AV software to tell me when I’m infected. I’m pretty savvy.
OK, there are types of ransomware that threaten to lock your computer or
report you to the FBI unless you send them 20 bucks for a custom “malware
42 ◾ The CISO Journey
cleaner.” Of late, we’ve seen the rise of a new type of ransomware that encrypts
your data and demands a payment or “ransom” for the key to get your data back. If
you have done a good job of backing up your data, you can simply restore to a date
before the ransomware infected your computer. If you haven’t, you have some hard
decisions to make. In general, we still feel the most damaging types of malware are
invisible and rely on stealth to grow and steal data.
Don’t argue with your users. Have a policy supported by the executives that all
computers must have AV or they are not on the company network. Faced with the
alternatives of AV or no network access, most users will cave and accept.
Myth Two
I have a Mac so I don’t need AV.
We have all heard this before; Windows is the only vulnerable operating system
(OS). True, there are more hacks out there for Windows but Macs are also very
vulnerable. I use a Mac and I wouldn’t connect without AV.
You can’t argue that the number of exploits that specifically target Mac users
is a small fraction of what Windows users are exposed to, but that doesn’t mean
that there are no threats. It is generally accepted that the first virus specifically
engineered for Apple computers dates back to the early 1980s. Since then, there has
been a steady stream of malware specifically designed to attack Mac OS X.
The most dangerous malware targeting Macs are Trojans that hide in other pro-
grams, so be very careful what you download and always be suspicious when your
computer asks you to type your Administrator password out of the blue. Your OS
is just one attack vector for cybercriminals. Your web browser, Java, Adobe Flash,
and other popular utilities are also constantly under attack; they provide a path to
your computer as well.
From a practical standpoint, this is like arguing religion. Here’s my stand; while
working on a MAC connected to the company network, you will have AV, period.
A single or small group of users does not have the fiscal authority to accept the risk
of attack for the whole network. If they have a home machine and want to take that
chance at home, go ahead, but no machine without AV should ever be allowed to
connect to your company network. If you can’t get that commitment and support
from your CIO, it’s time to go back to the drawing board.
Myth Three
(Similar to Myth Two) Linux servers do not need AV; besides, it slows my servers
down.
There are many flavors of Linux. Similar to MACs, they have a reputation for
being resistant to malware problems. This leads Linux admins who are largely IT
professionals to resist installing AV on the systems. I’ve heard all the excuses. It’s
If a Bad Guy Tricks You into Running His Code on Your Computer ◾ 43
not necessary since Linux servers are immune to malware attacks. AV slows down
my servers. There are no reliable AV packages for Linux. The list goes on.
True, it is far less common, but doesn’t that lead you to believe that the attacks
may be more targeted and stealthy? We have seen rootkits like the one that tar-
geted the Security SHell Daemon (SSHD) in 2016 demonstrate that it is a real
threat. Unfortunately, hindsight is 20/20. There are many Linux administrators
who wished they had installed AV earlier.
If the OS is not as vulnerable, what is the big deal? Remember the picture of the
OSI stack in Figure 4.4? The answer is because all malware does not attack just the
OS. For an application to run, there are other components required. If the server
hosts a public-facing application, there is plenty of cause for concern. An average of
18,000–26,000 URLs are compromised each day by malicious code. The malware
targets vulnerable components of websites, such as content management systems
like Word Press, application environments, and extensions like JBoss, and most
importantly the webservers like Apache and TomCat.
Remember to check with your compliance group. Regulations like PCI-DSS
may require you to install AV software on systems that store or process sensitive
data.
Myth Four
E-mail attachments from my friends and coworkers are safe.
The reality couldn’t be further from the truth. Every day, I see e-mails that
are fraudulent. Lately, I have seen a rash of e-mails appearing to be from the
CEO asking the CFO to wire money for a new program. It is a common practice
for hackers to pretend to be another employee or friend to get you to open the
e-mail and attachment. Most companies have some type of e-mail and spam
filter. Typically, I have seen that 80% of inbound e-mail to a company is either
SPAM or loaded with malware. If you think that it is always safe to open e-mail
attachments sent from people you know, you should think twice because you are
potentially putting yourself and your company at risk. If you get pushback on
an e-mail filter from people saying that legitimate e-mail may be stopped, find
an e-mail filter that allows users to review the messages that were stopped and
quarantined. When the users see the type of e-mail being stopped, the objections
will disappear.
Myth Five
Internet proxies and controls that stop employees from visiting porn or question-
able sites are as effective as AV.
Give me a break: If it was really good, everyone would do it. Maybe it sort of
worked 20 years ago, but definitely not today. Last year, a major magazine had a
44 ◾ The CISO Journey
site for the “Thought of the Day.” The site became infected with a “drive by” piece
of malware, which could infect a computer simply visiting the site.
Lesson learned? The bad guys have learned they can infect more machines by
compromising legitimate sites. They want to infect you from sites you trust, so your
guard is down. Additionally, they will create lookalike sites, which are loaded with
malware. Your foundational Internet security is not an area to be too creative or
attempt to cut corners; malware protection is a perfect example.
Myth Six
All you need is security software.
“I’m safe because I use AV software,” said every naïve user who placed too
much hope and faith in technology. Cyberspace would be a wonderful place if good
software is all it took to keep it safe. Unfortunately, software can only protect us so
much. Again, I will go back to the People, Process, and Technology discussion. You
may have the technology perfect, but who will respond to alerts, and what process
will they use to identify the root cause of the issue? Or, even worse, how can a user
circumvent your software? A CISO is expected to have broad vision and be a prob-
lem solver, not just a technician. Continue to hone your strategic and holistic skills
for the benefit of your organization.
Myth Seven
Even if I get a virus, I have nothing important on my computer.
One of the metrics I track is the amount of user time lost due to a malware
event. If we have to get a technician to clean and/or rebuild an infected desktop,
that user is out of business for about four hours. If a virus event would infect
100 computers, that would be 400 hours or the equivalent of 10 weeks lost produc-
tivity. Moral? The damage from a virus event is seldom limited to data loss. Don’t
allow your users or your organization to be short-sighted.
Since I’m assuming you don’t allow computers on your network without AV,
let’s discuss how to make your users with home computers aware. First, a malware
infection can make you extremely unpopular with your friends and family. If the
malware accesses your address book and sends copies of the malware to all your
friends, you may quickly fall off their Christmas card list. It’s not just the informa-
tion on your computer, it is how it can be used to launch attacks on your computer.
Second, your computer may become part of a Botnet, a group of computers under
the control of a criminal that can be used for many types of attacks. Imagine your
computer becoming part of a denial of service attack against a government web-
site. Ever gotten a call from the FBI? Third, Botnets can be used to monitor your
keystrokes and traffic and echo them to a command and control server overseas.
If a Bad Guy Tricks You into Running His Code on Your Computer ◾ 45
When you visit your e-banking or bill pay site, every keystroke including account
number, password, credit card number, PIN, and so on could be echoed to a crime-
ware server.
Myth Eight
I’m as smart as the bad guys; AV just slows me down.
Wow, are these guys still around? You know the type, intelligent and over-
loaded with technology testosterone. Are they smarter than everyone else? While
I’ve run into them over the years, they always eventually get a very rude awaken-
ing. Macho chest thumping and trash talking have no place in the science of
information security. If you find these people, do your best to find them jobs
somewhere else.
Myth Nine
I uninstalled AV on my server because it was running too slow, and uptime is most
important to the organization.
Granted, there is some truth here. There are a couple of questions. First, what
is the reason that AV is causing your server to run slow? Is it possible that you are
having an active infection and AV is overwhelmed trying to stop it? In this case,
uninstalling AV, while it may make the server run faster initially, you haven’t found
or corrected the root cause of the problem. The most important question is whether
or not AV is important to the organization. The opinion of the system administra-
tor will usually be slanted toward performance, but they are not in a position to
make overall risk decisions for the company.
After any AV scanner has been installed in a computer, it will be loaded into the
computer’s memory each time the computer boots. This is done to help protect your
computer at all times, from any threat. When any program loads itself into mem-
ory, including an AV program, it will consume some of the total memory available
to the computer. If your computer does not have lots of memory, or is already low
in memory, this can affect the overall performance of the computer.
This was more of a problem in the past, but today most computers have plenty
of memory. It is more likely that a system will however slow down as the AV scan-
ner is scanning all the files on the computer to see if they’re infected.
If performance after AV has been installed is an issue, challenge the system
administrator to look at all the running process and tune the performance of the
server. In the case of AV, you can often determine if an AV scanner is scanning your
computer, stop the scanning, and change how often and when the scanning should
occur by opening the AV properties.
Ensure that the system administrator knows that AV is not optional, and
impress on them that the risk of a significant malware infection can be devastating
46 ◾ The CISO Journey
to a company. Involve their management if necessary, but trust me, this does need
to be put to bed.
This means that if one administrator creates a new user account, there is at
least one other administrator that will know that a new user account was cre-
ated when the logs are reviewed. In that situation, it would take at least two
collaborating individuals to create an unauthorized administrator account.
Social Engineering
Social engineering (SE) is the art of using human manipulation techniques, rather
than technical/computer processes, to accomplish the goal of the attacker. Most
individuals are raised by their parents and teachers to be helpful, polite, and con-
siderate of others. We were raised to hold the door open for others, use proper tele-
phone manners when talking with strangers, and look out for the needs of others.
Though these teachings generally make better citizens, this training also laid the
foundation for future SE attacks. SE attacks prey on a variety of human traits such
as the following:
These are just a few of the attacks that have been successfully used against
organizations. These should provide an idea of the scope of possibilities that an
attacker can use against organizational employees. A concept not understood by
many individuals is that many insignificant bits of information, when combined,
provide valuable information to an attacker. Any piece of information casually pro-
vided to an attacker provides the attacker with one more piece of the information
puzzle. A significant amount of SE attacks can be thwarted by policies about giving
out information and physical security policies. Once developed, employees must
receive initial and periodic training about SE methods.
Chapter 6
I tried to bring up a few common types of attacks in use today. Attacks come in
many forms, too many to cover in this book. Probably one of the more important
concepts to understand is that attacks can be human based (such as social engi-
neering or password cracking), protocol based (such as SYN flood attack), software
based (such as software exploitation), and occasionally physical connection based
(such as a simple man in the middle attack).
One critical concept to keep in mind is that often an organization can be more
successfully attacked by social engineering methods than by technical methods.
The human element is frequently the weak link in the security process. Active
employee awareness training programs can greatly add to the security posture of
an organization.
Use your head and keep your eyes open. Your awareness is the strongest line of
defense for your organization.
49
50 ◾ The CISO Journey
The new battlefield is the Internet. In this arena, a combatant’s campaign suc-
cess is no longer measured by how much territory has been seized, but rather in the
quantity and quality of data captured. Intelligence has replaced physical prowess as
a key “soldier” attribute. Anyone with a computer can enter the war, both willingly
and unwillingly. Which side of the war they are on is not so clear-cut. The enemy
is now ubiquitous and highly mobile. It is an army of one and an army of many.
The bad guys have an enormous pool of allies to draw from, which is one
of their greatest strengths. With such a target-rich environment and varying
Street
lights
Yard
fence
Screen door
lock
Front door
lock
Baseball
bat
interests, the bad guys are willing to work together to hone their skills, develop
new “weapons,” and share information. Because of the competitive nature of
businesses, there is a general reluctance to collaborate on security matters. As
recent events have shown us, breaches have occurred at major institutions that
were not reported for weeks, giving the bad guys the time they needed to go after
other victims.
There’s Always a Bad Guy Out There: Consider what would happen if a neighbor-
hood burglary was left unreported for weeks. People would be less sensitive to any
suspicious activity. Police patrols would not be increased. Additional security mea-
sures would not be taken by any of the residents, even simple things such as leaving
additional lights on at night. The perpetrators would certainly be emboldened to
continue and even intensify their crime spree. The criminals would also have plenty
of time to fence their plunder and capitalize on their crime, as well as cover their
tracks and make a clean getaway.
Sometimes your greatest exposure is your most technical people. With top tal-
ent comes a little swagger. They know they are smart and sometimes think they can
get away with more than other mere mortals can. Case in point:
When I was the CISO at a company years ago, I got a call from
the Recording Industry Artist Association (RIAA), the industry
watchdog that tracks the distribution of pirated recordings. The
RIAA strongly opposes unauthorized sharing of its music. The
association launched high-profile lawsuits against file shar-
ing service providers. It also commenced a series of lawsuits
against individuals suspected of file sharing, notably college
students and parents of file sharing children. Not an organiza-
tion to be taken lightly. They had tracked a server distributing
unauthorized music to our network. You can imagine this was
a real surprise, since we were a financial services firm.
Upon investigation, we found that one of our senior net-
work engineers had set up an open anonymous FTP server on
his desktop machine, so he could move files, and more effec-
tively work from home. A hacker saw the open port and used
it to set up an illegal music server on the engineer’s machine.
He was totally unaware of the existence of the server or files.
They were effectively hidden.
We cleaned up the mess and explained the incident, but it could have been
much worse. A privileged user effectively created a path around all the network
security controls. I guess in retrospect we were lucky the bad guy was just a music
lover.
52 ◾ The CISO Journey
Lesson learned? All code that is built offshore must be carefully scanned and
checked for malware or control problems. Even during the development phase,
carefully control all access to your systems and test data. When possible, use
Virtual Desktops that only run a virtual image desktop. When the connection is
terminated, there is no local residual data.
The enemy wears many faces and has many different agendas. Deciding how
to prioritize your assets and where to focus your scarce resources is a bigger chal-
lenge these days. No more is it a simple matter of placing bigger locks on the doors.
Financial gain alone is not necessarily the primary motive behind an attack. State-
sponsored attacks are more interested in information that will assist them in pur-
suing political agendas. Famous Prussian general and military strategist Carl von
Clausewitz has been credited with stating that war is politics pursued by other
means. His words certainly apply to what is happening over the Internet.
Another concept he introduced was “the fog of war.” In the Internet war, the
“fog” is thick. We are faced with incomplete and sometimes even inaccurate infor-
mation about our adversary’s numbers, disposition, capabilities, and even their
intent. Recently, there have been well publicized distributed denial of service attacks
on the name servers of the Internet. Because the attack used thousands of devices
infected with a BotNet, a small number of hackers executed attacks with tens of
thousands of attacking endpoints. Making assumptions about enemy strength, or
lack of, based on incomplete information is dangerous. We even have incomplete
knowledge of the state of our very own forces and capabilities.
Where there is opportunity, you will find organized crime. Just as the 18th
Amendment to the US Constitution (Prohibition) created a large criminally backed
underground organization, so has the Internet. The 2014 IOCTA (International
Organized Crime Threat Assessment) discusses how a service-based criminal indus-
try that provides sophisticated products and services to other criminals is develop-
ing. These are products and services that are being used to perpetrate crimes and
which are making entry into the world of cybercrime much easier.
Those who lacked the skills, tools, or resources to engage in cybercrime can now
order whatever they need online.
They also now have a convenient place to market the spoils of their criminal
exploits. Because these organizations operate in countries where the arm of the law
cannot reach, they can operate with impunity. International law regarding the Internet
is weak at best and hardly enforceable. In most cases, you won’t find these criminal
elements on the Internet we are most familiar with. Rather, they lurk in what has
come to be known as the Darknet. It is a place hidden from standard search engines
where, as stated earlier, “The enemy wears many faces and has many different agen-
das. Deciding how to prioritize your assets and where to focus your scarce resources is
a bigger challenge these days. No more is it a simple matter of placing bigger locks on
the doors.” There is no lock that a bad guy cannot penetrate. Domains and protocols
you find on the Darknet are not your standard fare. Anonymizers are the norm in the
54 ◾ The CISO Journey
The tools out there are quite powerful, and most are free for the asking. From
a CISO’s perspective, it only makes sense to take advantage of these free tools and
apply them to your network. You can be sure that the bad guys are using them.
What better way to determine the vulnerability of your environment than by using
the very same tools they are? Naturally, technology changes over time and tools
come and go, so these may not be the best or still available, but they should give
you an idea of areas in which to focus for similar tools.
The bad guys certainly realize that the front door is heavily guarded. Their
efforts will be focused on your back doors. Back doors you might not realize exist.
Back doors your own employees may have installed to make their lives easier. With
the proliferation of mobile devices, the bad guys have a lot more avenues in which
to gain entry to your environment. While you have some control over mobile
devices inside your four walls, once these devices leave the building, your means
of control rapidly diminish. In order to protect your data, the incorporation of end
point encryption is absolutely necessary. But you will still need a security solution
that protects laptops, tablets, and smartphones against a host of potentially serious
malware threats.
Malware, short for malicious software, is a broad category of software that is
designed for attack and compromise purposes. A growing trend is the use of bots
that allow an attacker to take control of the infected device. If a bad guy can get a
bot loaded on one of your devices, they now have a key to your kingdom. Loading a
bot on a device is as easy as having a user visit a website, where software on the web-
site looks for vulnerabilities on the device to exploit. Another common approach is
to infect the device by sending the bot via an e-mail attachment. The bad guys just
need to wait for an implanted bot to “phone home.”
Bots can work independently, but generally they are used jointly with other
bots in what is termed a botnet. The Conficker botnet was believed to consist of
bots, in millions, on devices around the world. The combined resources can then
be used to produce a disproportionately negative effect on other systems and users,
such as creating distributed denial-of-service (DDoS) or spam attacks. The power
of a botnet has made them a very attractive commodity to be sold over the Darknet.
Thus, criminal organizations don’t need to be skilled hackers but simply can
acquire the tools they need to carry out their harmful activities. An example of a bot
is Tinba, which is short for Tiny Banker. As its name implies, its function is to steal
financial information. This particular bot was commercialized and readily available
for anyone willing to purchase it. The original version is also tiny in size, only about
20 kb. As with other bots, it continues to be improved and modified by the bad guys.
Bots are not cheap. They are known to sell for tens of thousands of dollars, attesting
to the large financial returns they can bring into the wrong hands. Again, using the
example of the recent attacks against the Internet name server environment. The
Bots were extremely effective and engineered to work on home devices that connect
to the Internet such as DVD players and security cameras. This illustrates that not
just malware, but what we consider an endpoint, must continually evolve.
56 ◾ The CISO Journey
credentials, and like an unreported stolen passport, just walk right through the gate
into your domain.
The bad guys know they can effectively prey on unsuspecting users during times
of uncertainty. Consider an announcement by a major retailer that their systems
were breached, resulting in millions of credit card numbers being released. A bad
guy could piggyback on this opportunity to contact individuals, telling them their
card has been compromised and needs to be replaced. They then proceed to extract
as much personal information as possible from the person in what appears to be
an effort to help the customer resolve a problem. Customers, concerned over their
personal information, unwittingly release the very information they are trying to
protect. Knowing the e-mail addresses of a few IT folks can also be exploited by the
bad guys during a real incident by creating e-mails with forged sender addresses,
which is very simple to do and is known as spoofing. The bad guy then simply inter-
jects himself into the troubleshooting dialogue, appearing as a fellow employee,
and begins extracting information from others in the e-mail threads.
Getting the user to visit a compromised website or a website that appears legiti-
mate when in fact it is not can be quite effective in retrieving sensitive information
from an unsuspecting Internet surfer. Getting the user to download something
from these sites makes it even easier for the bad guys. The bad guys can also call
your users directly and attempt to trick them into providing them with the infor-
mation they need to compromise your environment.
While maintaining a blacklist can eliminate a large number of the bad sites
from access by your users, these sites are being generated faster than blacklists can
be developed. Whitelisting is more effective, but the size of the Internet and the
number of legitimate sites make it hard to maintain such lists without affecting
your users. Educating your users is your best defense, but as the saying goes, “There
is a sucker born every minute.” No matter how well you educate your users, there
will be that one that clicks on the pop-up that says, “You’ve Won One Million
Dollars!” or some other nonsense. Regrettably, it only takes one user to bring down
your environment.
Where you have even less control is the myriad of social network sites that exist.
While you may be able to control access to such sites from within your environ-
ment, your employees do whatever they want from the privacy of their home using
their own assets. Monitoring what your employees are placing for public view on
these social network sites is a monumental task. Unfortunately, social networks are
now frequently mined by the bad guys for information through botnets. People
place an incredible amount of personal information on these social network sites
that can be used against the very person that posted the information or to extract
information from close associates by impersonating the poster. What is more trou-
bling is the amount of company-sensitive information that employees place on these
social network sites. Having both personal and company information can help a
bad buy to appear very legitimate, easily tricking others into revealing sensitive
information. This process is known as phishing and is highly effective. Receiving
58 ◾ The CISO Journey
If you don’t already have one in place, you need to create an incident response
team. This should consist of your top talent. It will need representation from the
business side to assist in damage assessment and communicating with the busi-
ness. It also needs senior-level people with good communication skills who can
keep public affairs/corporate communications and senior level management abreast
of what is transpiring. The incident response team should also consist of people
with basic forensics skills. They should know what data are important and how to
preserve them for further forensics analysis. Forensics analysis should not occur
until after the situation is stabilized, but you need people involved that will prevent
valuable information from getting lost or destroyed in the recovery actions. Just as
every police officer is trained how to not contaminate a crime scene, so should your
incident response team be trained as to how to handle the forensic elements of a
cyber-attack. The incident response team needs to be activated at the first indica-
tion of a problem. With today’s technology, they do not necessarily need to be on
site unless, of course, the decision has been made to sever communication links.
If you have multiple sites, then you need people that can physically get to each of
these sites in a reasonable period of time. You should also have backup communica-
tions in place, since corporate communication systems may not be available. The
primary responsibility of the incident response team is to accurately assess the situ-
ation and secure the environment as necessary.
Once the situation is contained, they can relax a bit and focus on other aspects
of the incident. One important task is to document all actions that were taken. This
will help in event reconstruction, as well as help with any subsequent legal proceed-
ings. After containment, you can then begin the arduous task of assessing the extent
of the damage and begin recovery procedures. Communication will be key during
a crisis of this nature. Your public affairs/corporate communications office needs to
be brought into the situation. Ideally, they should have a crisis plan already in place
for events such as this. Customers and partners need to be informed. The infection
might very well have originated from one of your partners, and depending on your
business, you may run the risk of infecting your customers. At the very least, if busi-
ness operations are affected or customer data are involved, your customers need to
be told something. IT should never deal with the public or press directly. Prearrange
a communication plan with the marketing or public relations departments. They
will help wordsmith the message and avoid any missteps with the public.
Bringing in law enforcement right away will help ensure that important forensic
data are not lost in the turmoil. You should have contracts in place with businesses
that specialize in forensic analysis and they should be brought in right away. Secrecy
seems to be the normal approach in the wake of a cyber-attack, but being frank and
open will lead to better preparedness for not only your business but others as well.
Legal concerns, though, tend to stifle the free flow of valuable information.
Usually in situations like this, it is better to rebuild systems from scratch rather
than try to remove the malware. Care must be taken in using backups of the sys-
tems since these backups may very well include the malware. The systems are far
60 ◾ The CISO Journey
less important than the data themselves, which are most likely what the bad guys
were after. It may be difficult to determine exactly how much of those data have
fallen into the hands of the bad guys. This is especially difficult if they had unlim-
ited access over an extended period of time. Data are rarely actually taken; they are
simply copied; so there is no gaping hole to tell you what is missing.
You need to obtain all of your log files. The quantity and quality of logging
that you do will have a direct bearing on how much you can reconstruct of what
has transpired. Since the bad guys can be in your environment for months, if not
years, before detection you may not have logs back far enough to fully reconstruct
the chain of events. If the bad guys are really good, they will have altered your logs
as well. Log files need a high degree of security on them just like the systems and
data themselves.
Monitoring any unusual changes to log files may be your first indication that
you have a problem in your environment. Obviously, you hope you never have to
call out the incident response team. Having a multilayered defense will reduce your
risks of a penetration. The more obstacles you put in the bad guys’ way, the more
likely they will give up and go elsewhere or do something that will alert you to their
presence before they can actually do any harm. Of course, there are those who like
a challenge, so there will always be the risk your defenses might attract a few bad
guys wanting to prove how good they really are. In the cyber underworld, there is a
pecking order and those looking for increased bragging rights. Just as in any profes-
sion, there is a desire to be the best. In the hacker world, much of how good you are
is demonstrated by successful hacks or data thefts. Many groups like “Anonymous”
post messages after hacks claiming responsibility to demonstrate their prowess and
power.
Not all protection layers need to be concentric. You can provide a multilayered
defense around your most critical data that lies within another multilayered defense
around your network. All things do not have to be protected to the same degree.
In most cases, the data are where your greatest defenses should be focused. And
depending on the constitution of the data, you may need different layers of defense
for the data themselves.
Ridding your environment of outdated and one-off systems will reduce your
risks. These systems never get the full attention they need. They are either old or
little used technologies, so they are not fun to work on and add little to the resume.
Most likely, the vendor has long since ceased support, or it is marginal at best, since
they may be from small companies or technologies that have subsequently replaced
support. Your biggest risk may come from the free shareware someone was able to
download into your environment.
Setting up around-the-clock monitoring is one of your best defenses. Having
systems to do the monitoring is not sufficient. You need people that can understand
the data and react promptly to what they see. The volume of data can be stag-
gering, so developing baselines from which to draw comparisons will help facili-
tate identifying anomalies in your environment. Security Information and Event
There's Always a Bad Guy Out There Who's Smarter Than You ◾ 61
Management tools can greatly assist in this endeavor. Again, though, you need
people to actually interpret and respond to the data provided.
center. Hard to protect against things you are not aware of yet some bad guy might
have this modem sitting at the finish line of their race.
The fact the bad guys can specialize means their knowledge level and skills are
quite honed. We do not have the resources or the time to become so specialized.
The bad guys can and likely are specialized down to a particular make and model
of hardware and/or version of software. Such expert knowledge allows them to find
and exploit vulnerabilities before they become public knowledge. Besides preparing
for new types of attacks, companies also need to continue to deal with and defend
against older types of attacks. As sophisticated as the technology and techniques
get, we still can’t ignore the fact someone can break down the door and steal the
hard drives. Is it a likely scenario? Probably not. Is it still possible? Most definitely
yes. Do you have to consider it? Without question! So while someone breaking
down the door is not likely, a hard drive leaving the environment is not that far-
fetched. Especially, as you retire old systems and the size of these devices continue
to shrink. One lesson here is that even the most improbable of scenarios can pro-
duce very feasible situations affecting security.
Lesson learned? Are you aware that every multifunction office machine has a hard
drive? Are you aware that thousands of the last documents printed or scanned are
resident on the device? What happened to the last copier you traded in? Did you
keep the drive? ALWAYS retain and destroy the drive. Write it into the lease con-
tract when you procure the equipment.
Context-Aware Security
A new approach to security that is gaining a lot of followers is context-aware secu-
rity. Context-aware security is the use of situational information to include such
things as identity, location, time of day, applications accessed, or type of end point
device to improve information security decisions. Analyzing a combination of these
factors can help determine if something is amiss. For example, you find a user
VPNing into your network at 2 a.m. when this user historically only VPNs into the
network between 8 p.m. and 11 p.m. While it may be innocent, it certainly bears
a further look. Now, if they are normally located on the East Coast but your data
show them on the West Coast, then this may be more plausible as a security event.
Context-aware security is not new. Credit card companies have been using this
for years. The challenge is collecting and storing a sufficient amount of data from
which to develop a reasonable baseline of information needed to make intelligent
context-based decisions.
And let’s not forget about the ubiquitous Cloud. Unless you put tight controls
in place, your users will be uploading anything and everything to Cloud-based
providers. While these providers may not have any malicious intent, you have no
say or insight into the security they have placed on their environment to protect
64 ◾ The CISO Journey
your data. What becomes more troublesome are the Hybrid Clouds. While they
offer advantages of efficiency and availability, they pose a very real risk of expos-
ing sensitive information into the public cloud space. While cloud security has
certainly improved, it is still an area that deserves your attention and specialized
tools.
The bad guys are out there. They are getting smarter and better at what they do.
They are also getting more particular about who they go after. No one is safe. No
one can rest on their laurels. This is a battle that goes on all day, every day. There are
no holidays, no breaks, and no truces. In this battle, there are no real winners, only
losers. Today’s cyber battles are reminiscent of World War I trench warfare. Each
side deeply dug in, yet constantly trying to penetrate the other’s lines. Each side
introduces new technology that is quickly countered by even newer technology. In
the end, a lot of time, money, and resources have been expended with little to show
for it except the ability to fight another day.
Suggested Reading
Cyber Resilience Review (CRR): The CRR is a no-cost, voluntary, nontechnical
assessment to evaluate an organization’s operational resilience and cybersecurity
practices. The CRR may be conducted as a self-assessment or as an on-site assess-
ment facilitated by DHS cybersecurity professionals. The CRR assesses enterprise
programs and practices across a range of 10 domains including risk management,
incident management, service continuity, and others. The assessment is designed
to measure existing organizational resilience, as well as provide a gap analysis for
improvement based on recognized best practices.
Chapter 7
What do you have that the enemy would like to steal? If you were the bad guy, how
would you steal it? It’s not always motivated by theft. If you were the enemy, how
would you disrupt your business and why? Case in point:
65
66 ◾ The CISO Journey
So, what did I learn? First, nothing is ever as simple as it first seems, particu-
larly to the distributed management and users making the call. Second, traditional
data breach for profit, while very prevalent, is not the only answer—never become
comfortable, always challenge your assumptions. You don’t get paid to take the easy
answer; you are one of the last lines of defense for the company; if you don’t chal-
lenge and dig deep into issues, who will? Third, when you identify a threat vector,
learn to think like the enemy. If you were going to shut down production equipment
for revenge, or for competitive gain, how would you do it? If you were going to steal
your company’s data, how would you do it? If you were going to interrupt key pro-
duction of engineering processes, how would you do it? Here’s a real-life example:
Moral of the story: If you give the keys to the kingdom to an employee, be sure
you know who they really are and that they can be trusted (Figure 7.1). Also, when
the managers of that employee started the process to get rid of him, why didn’t they
take a close look at the damage he could do and take steps early to mitigate that
damage?
I often draw on history to evaluate the problems I face every day. Do that often
enough and you will find that while the technology may change, the fundamental
motivation and methods remain the same. Case in point: We’ve all heard of the
story of the Trojan Horse. How different would the story be if the guy who tiptoed
out of the horse that night was not able to open the door to let his friends in? It
probably would be more of a folly about how some idiots thought they could defeat
a fortified city with a wooden horse. Think like an attacker and develop defensive
strategies. Most networks today focus on keeping bad stuff out, but let information
freely flow from the inside out. Why don’t you lock down your outbound traffic?
Why don’t you lock the door so the guy crawling out of the Trojan Horse can’t eas-
ily open the doors and let your corporate jewels flow out to the Internet?
Also, looking a little further, how long do you think that the guys inside the
wooden horse could have stayed there undetected? If they wanted, they could have
stayed inside days, collecting intelligence about the city and its inside defenses. That
is, because the city did not think a bad guy could get inside, they ignored the pos-
sibility of that threat. Is this sounding familiar? How about the number of highly
public breaches where, when the details were released, the investigators found out
that the bad guys had been resident on the victim’s network for months without
detection?
It is time for a paradigm change. CISOs can no longer assume their “wall” is
impenetrable (Figure 7.2). Get serious; put the same effort in protecting the interior
as the exterior.
Know the Enemy, Think Like the Enemy ◾ 69
1. As dedicated as we are to protect our data, there may be hackers more dedi-
cated to steal it.
2. Since our focus must be enterprise wide, a focused cybercriminal will almost
always have the upper hand because they can be persistent, and focused on a
specific target.
3. The criminals will always attack a weak link in the defensive chain. Typically,
that is the human element. We need to understand where our “targets of
opportunity” exist.
70 ◾ The CISO Journey
Adversary
1995–2005 2005–2015 2015–2025
1st decade of 2nd decade of 3rd decade of
commercial Internet commercial Internet commercial Internet
organization and become insurmountable and yield a fertile target for all types of
public attacks.
Keeping up to date on patches and security updates is a good start toward
protecting your network. There is no hard and fast way to achieve and/or maintain
perfect security on any network. The goal of any security controls and counter-
measures should be to defend your network while maintaining ease of use and
accessibility.
Today, just like the squirrel of my youth, hackers are winning on sheer speed
and determination. Is there any way we can swing the odds in our favor? Can we
affect the time frames of an attack cycle?
Here’s how.
Over the past few years, attackers have proven to be adept at compromising
even the most secure organizations. A common theme in successful attacks is per-
sistence. Given the complexity of modern software and network environments,
if an attacker looks hard enough, or waits long enough, a weakness will become
apparent that can allow the attacker to compromise the target. Remember, the
attacker has an army of allies who take great pleasure in discovering vulnerabilities
and sharing their discoveries. It is like a badge of honor to be the first to crack some
line of defense. One need only look at the frequency that Microsoft publishes new
security updates to get a sense of how much attention is being spent by the attackers
on Microsoft alone looking for vulnerabilities. More troubling is these are only the
vulnerabilities Microsoft has become cognizant of. Undoubtedly, others exist that
are known only to the attackers. Consequently, focusing solely on keeping attack-
ers out of a network is no longer the best strategy to protect an organization from
cybersecurity threats.
The history is self-evident from Figure 7.3. In the 1990s, the time from a vulner-
ability being announced to an active attack in the wild was months. In the 2000s,
the number began to shrink; until today, we see attacks before we know there is
a vulnerability or problem. When speaking to groups, I equate the 1990s to an
impending hurricane. You have days of warning to prepare or evacuate. Today, it
is more like a tornado touchdown, which, in many cases, occurs without warning.
The losses are sometimes greater in that people did not have time to prepare.
The numbers speak volumes: It only takes minutes from the initiation of an
attack for an attacker to compromise a system. Once access has been achieved, data
can be extracted quickly. Within organizations, it takes on the order of months to
discover the compromise, and weeks for the breach to be resolved. Clearly, attackers
have the upper hand. The task of defending networks is becoming more difficult,
rather than easier, as perimeters continue to expand through the use of external
cloud systems, mobile devices especially the phenomena of Bring Your Own Device
(BYOD), and integrated services with external third parties.
Unfortunately, we cannot turn back the clock and return to more innocent
and less complex days. As attackers become more skilled and systems become more
complex, it is next to impossible to keep systems completely free from compromise.
72 ◾ The CISO Journey
Protect the
perimeter and
the data…
Total focus on Defense in
protecting the depth
perimeter 3 months from vulnerability
announcement to attack on
the Internet
Early 6 months from vulnerability 2000s 2020
1990s announcement to attack on
the Internet
I’m not saying that we should give up. In fact, I strongly believe that it is still
possible to prevent most attacks and—even when an attack is successful—it is pos-
sible to identify and remediate the breach before harm is incurred. The key is to
shift the time frames of an attack, so that the odds are stacked in the defender’s
(not the attacker’s) favor. In warfare, defenses are built to slow down the enemy.
By slowing them down, you have a chance to adjust your plans and successfully
defend against an attack; Cyber warfare is the same. Use the tools you have such
as network segmentation, firewalls, honeypots, and other systems to slow up the
attacker, giving you more notice to stop the attacker before serious damage occurs.
It’s also important to understand that cybercrime is an economic crime. In my
experience, there are very few attackers that look for complex targets to “test their
skills.” That is easy fodder for movies and TV shows, makes for great stories, but it
is not reality. The average attacker is looking for an easy target. If an attacker finds
that a target is too expensive in terms of time, effort, and resources to breach, the
attacker will switch attention to an easier target that offers the same rewards at a
lower cost. For example, segregating networks so that the attacker cannot easily
gain access to confidential information means that attackers have to work harder
before they can extract valuable data. The harder and longer the attackers have to
work, the better the chances they will leave traces that can be identified.
Network vigilance is another factor that can reduce the time frame from com-
promise to detection. It is during idle periods that attackers are able to explore
networks and steal resources without hindrance. By identifying abnormal net-
work activity and distinguishing it from normal day-to-day activity, incursions
Know the Enemy, Think Like the Enemy ◾ 73
can be detected before they cause harm. Modern Security Information and Event
Management (SIEM) systems allow logging data from Intrusion Prevention System
(IPS) devices, firewalls, file servers, and domain servers to be aggregated and ana-
lyzed. Not every attacker will generate alerts from the IPS system, but alerts such as
users attempting to access files outside of their job role, or at odd times of the day,
should prompt security teams to investigate further.
Prioritizing network security alerts requires procedures and practice. A typi-
cal set of security tools can generate gigs of logs every day. The CISO must look
at how to prioritize the alerts. Drinking out of a fire hose is never easy; you must
learn to drink without drowning. Minor alerts should be ignored so that response
teams can focus on important issues. Despite the headlines, major breaches are
rare events. Security teams may only be faced with such an incident once a decade.
However, when an organization is faced with such a scenario, security teams need
to be able to respond quickly, effectively, and confidently. This can only happen if
people are trained and practiced in responding to such incidents. Working through
theoretical exercises to decide how to respond, and practicing responses to simu-
lated attacks, should be standard practice in incident planning. By reviewing the
results of such practices, improvements can be implemented so that when a major
incident does happen, teams know exactly how to respond and react. Now for the
real key:
A kill chain is a process for finding and taking action on a target (Figure 7.4).
This integrated, end-to-end process is described as a “Chain” because any one defi-
ciency will interrupt the entire process.
◾◾ At each step, the malware must “phone home” for more instructions. If we
interrupt any one communication, we win.
◾◾ Rather than focusing all cyber protection efforts at one point (i.e., the perim-
eter), network and information defenses must be designed to interrupt the
“kill chain” at multiple layers in the system. This yields a much more robust
security infrastructure than traditional methods.
Know the Enemy, Think Like the Enemy ◾ 75
Action
Scan for Initial Establish Escalate Look for Data on
openings compromise foothold rights crown jewels breach target
In the real world, we have to face the fact that, despite our best efforts, we are not
going to be able to defend against every attack all of the time. This does not mean
that information security is ineffective. On the contrary, security managers are on the
front line fighting against the world’s most sophisticated adversaries. But to succeed,
we need to stack the odds in our favor through better planning, defense strategies that
frustrate attackers, and faster spotting, response, and recovery efforts. We can build the
biggest castle with the largest moat to protect us, but the sentry in the parapets is our
most effective early warning system. We shouldn’t wait till the siege engine has brought
down the walls to react. As General George S. Patton, famous World War II General
most noted for his actions at the Battle of the Bulge, so eloquently said, “Nobody ever
defended anything successfully, there is only attack and attack and attack some more.”
While we in industry can’t really go on the offensive, though the idea is interest-
ing, we must realize that, as a corporation, we tend to be a somewhat large, static
object. Nothing is easier to target than something that is not moving or, in the
case of industry, remains unchanging. We cannot rest on our laurels and must be
constantly varying the target landscape that we present to the hackers. We need to
be proactive in what we do and not reactive. Sort of like the Star Trek series where
they adjust the shield modulation to thwart the enemies’ ability to penetrate their
defensive perimeter around the star ship Enterprise. Also, another huge lesson from
Star Trek is: Never be the landing party crewman in the red shirt—it means you
will be the one to die. (Fashion tip for your next board meeting update.)
Another example comes to mind. I don’t know if you remember those little bio-
spheres they used to sell and still may. They were self-contained ecological systems
and were completely sealed. They would have a few tiny shrimp, a small twig more
for show, and some plant life of some sort. There would be an air bubble at the
top. The plants and shrimp were symbiotic. Without the one, the other would not
survive. I suppose in a way security folks and hackers have a somewhat symbiotic
relationship. Without hackers, there would be no need for security folks at least in
any great manner. Without security folks, hackers wouldn’t be needed since there
would not be any security to overcome. I remember reading an article where an
owner of one of these biospheres described how it appeared to be dying. His solu-
tion was to shake the biosphere vigorously a few times each week. According to the
article, the biosphere came back to life. In essence, that is what we have to do with
our environments and our people. We need to shake them up a bit.
76 ◾ The CISO Journey
George S. Patton also said that if everyone is thinking alike, then somebody
isn’t thinking. To effectively counter the bad guys, we need to think outside of the
box. Using the same defense strategies and tools that every other corporation uses
just makes the job easier for the bad guys. We need to be creative in our approaches.
They know how we think, act, and respond. We need to start thinking, acting, and
responding like them.
Facebook had and may still have an interesting approach to improving their
security. They offer a minimum of $500 rewards to White Hats for uncovering vul-
nerabilities in their software. Facebook’s White Hat Responsible Disclosure Policy
reads:
If you don’t know the link to Facebook’s White Hat Responsible Disclosure
Policy, you might have a hard time finding the page. But I suppose if you are a
White Hat, finding the page would not be a problem. While this approach may not
be appropriate for everyone, it does show some thinking-out-of-the-box–type men-
tality. Considering the costs of a breach, this is a very cheap insurance policy. Some
people just like challenges, so essentially Facebook is getting a lot of very low cost
testing of their applications. The White Hats may spend weeks or even months try-
ing to find vulnerabilities. Using full-time resources for this type of effort would be
extremely expensive. Of course, Facebook has no idea who or how many people are
actually looking for vulnerabilities at any one time. This also provides the bad guys
with an opportunity to practice their trade with new tools and techniques on a real
production system without fear of prosecution as long as they abide by Facebook’s
Responsible Disclosure Policy.
I would not recommend offering rewards to your own employees for discov-
ering vulnerabilities. You would be incentivizing poor coding and architectural
designs. Rather, you should do the opposite. There are a number of tools and ser-
vices out there that can be used to scan your software and environments for vulner-
abilities. Establish various thresholds and reward your staff for keeping software
and systems under them. The downside to Facebook’s policy is it runs the risk of
an insider intentionally incorporating vulnerabilities in the environment and then
colluding with a White Hat to share in the rewards.
Know the Enemy, Think Like the Enemy ◾ 77
Sun Tzu, a Chinese military general and strategist from around 500 BC, stated
that if you know the enemy and know yourself, you need not fear the results of a
hundred battles. Winning the war against the hackers will require us to know them
in great detail. The best way to know them is to act like them. Our tools are less
important than our human resources. Tools cannot interpret the data presented.
Tools cannot make judgment calls. Tools cannot think. They are indispensable
tools in the fight, but they cannot replace the human element. George Patton,
famous World War II US General most noted for the Battle of the Bulge, realized
this and stated that wars may be fought with weapons but they are won by men. I
am a firm believer that our people are our most valuable assets. We need to continu-
ally invest in their skills.
Carl von Clausewitz, Prussian military thinker, said that many intelligence
reports in war are contradictory; even more are false, and most are uncertain. The
same is true of the data we receive from our many tools. False positives are an
expected outcome of any tool. It takes smart, dedicated people to decipher what is
real and what is false. False positives can be just as disruptive to a business as true
positives. They consume valuable time and resources, diverting them from other
pressing tasks. Security folks are combination detective and weatherman; we sift
through the clues to develop a picture of what has happened and then evaluate the
data to forecast what might occur. Just like detectives and weathermen, this takes
training.
The best training is that which gets everyone to start thinking like a hacker. To
truly master the tools and techniques of a hacker, you have to basically become one.
This is the premise behind the Certified Ethical Hacker training and certification.
We have to understand that the tools we use in industry are not what are being used
by the hackers. Getting the tools that the hackers use into the hands of your staff
along with proper training will give them a whole new perspective on how the bad
guys operate. It will certainly heighten their awareness of things to look for in the
environment that are out of the ordinary.
Sun Tzu sums things up pretty nicely when he said the opportunity to secure
ourselves against defeat lies in our own hands, but the opportunity of defeating the
enemy is provided by the enemy himself. Understanding the tools and techniques
of the hackers allows us to discover and exploit their weaknesses. Just as they spend
countless hours studying our defenses and analyzing our weaknesses, so must we
study theirs. Every good hunter knows their quarry. Knowing the enemy attacks
the castle with archers, we raise our shields over our heads. Should we know they
will attempt to breach the walls of the castle, boiling oil will be waiting for their
arrival. Should we know in advance the enemy employs siege engines we build our
castle with a moat or concentric walls, the first layered defense so to speak.
There are lessons to be learned from the early concentric castle builders. Such
defenses were extremely expensive to put in place. Today’s network technologies
are likewise not cheap. The time required to implement these defenses consumed a
lot of time and resources. Implementing any new technology in our environments
78 ◾ The CISO Journey
requires lots of testing and training. These were not a defense mechanism to address
an immediate threat but rather one envisioned for the distant future. By the time
they were put in place, they were either not needed or overcome by newer technol-
ogy. When a zero day attack occurs, it is too late to put up new barriers. As we well
know, the effectiveness of our current defenses quickly erodes over time. Lastly,
they were so effective that rather than break into the castle, the attackers would
simply sit outside and try to starve the occupants out. Here, we have the classic
denial of service attack.
Knowing how the hacker will respond to each form of defense we put in place
gives us the advantage of being able to respond quicker to their countermoves. Carl
von Clausewitz said it is better to act quickly and err than to hesitate until the time
of action is past. We do not have the luxury of time on our sides. Knowing our
enemy allows us to respond somewhat quicker. And respond we must, to sit by idly
will accomplish nothing other than pass advantage over to the hackers.
We all should have a pretty good idea of where the crown jewels lie in our envi-
ronment. These are what the hackers are after. If you do not know where the crown
jewels reside or even worse what crown jewels even exist, then you are in trouble.
The immediate first step that you must accomplish in conjunction with the busi-
ness is isolating the crown jewels. Most people don’t alarm the bathroom or place
cameras there. At least, I sincerely hope no one does the latter. Nor should we spend
excessive time and money trying to defend areas of little or no interest to the hack-
ers. This is somewhat analogous to Sun Tzu’s philosophy that he who knows when
he can fight and when he cannot, will be victorious. In our case, we need to know
what we can defend and what we cannot.
Identifying the crown jewels is no easy task. It takes time and effort to separate
out the rubies, diamonds, and emeralds from the amethyst, amber, and pyrite.
They all look shiny and pretty, but they have vastly different intrinsic values. The
business typically views everything as highly valuable. After careful consideration
and analysis, what was once thought to be gold turns out to be nothing more than
pyrite (fool’s gold). Once the crown jewels are identified, it is then easier to aggre-
gate them in one place that is more easily defendable rather than spread all over
the environment. Of course, there are risks in putting all your eggs in one basket,
but it is more easily defended, and the costs are far more manageable. Clearly, the
federal government believes this is true in keeping our gold reserves in basically two
places, Fort Knox and the Federal Reserve Bank of New York. A sort of primary
and backup for continuity of government just as our crown jewels should have a
primary and backup site for business continuity.
three challenges. First, give them lobby access to look at wireless vulnerabilities.
See what they can find out and if they can discover any unsecured access points
or break into an approved device. Second, they are allowed to have a network con-
nection inside the firewall, but no network credentials, user accounts, or any inside
info about the network layout. This is what someone who talked their way into your
office would see if they found a vacant office and jacked into the network. Third,
they are to look at your organization from the Internet for holes and vulnerabilities.
Selecting a Vendor
Here are the criteria that you should use to select a suitable penetration-testing
vendor:
◾◾ Name recognition: If you are going to use the results of the test as proof of
your capability, you will want to engage a well-known name. That will add
credibility to your report.
◾◾ Confidentiality: Make sure the vendor explicitly states it will preserve and
protect the information it develops during testing. Understand how the
report will be delivered and if it will be encrypted during transmission.
◾◾ Insurance: What if the tester loses your information? What if they shut down
or corrupt critical production systems as the result of their testing? Does the
vendor carry sufficient liability insurance or bonding? You must make sure
they are adequately covered.
◾◾ Reporting results: It’s important to agree in writing what reports and recom-
mendations will be in the final deliverable. You should request copies of all
logs, reports, and other raw data collected during testing. The vendor should
also provide best practice documents and assistance for remediation of iden-
tified issues. Finally, ensure that you have a chance to review a draft of the
final report to correct any bad assumptions or errors on the part of the testers.
Beyond these items, vendors should be bound to a specific contract with terms
and conditions that specify a statement of work, causes for termination, confiden-
tiality and liability, indemnification, and so forth.
Know the Enemy, Think Like the Enemy ◾ 81
Here’s the key, if the firm you hired to test you is not able to penetrate you and
gain advanced access, you did not pick the right firm. You don’t run a penetra-
tion test to prove how good you are, you run it to find new holes and paths to the
corporate jewels that you do not know about. This is not about pride; this is about
protecting the company. Leave your ego at the door.
Chapter 8
83
84 ◾ The CISO Journey
Costs, Risk,
schedule, quality,
performance security
Separation of Duties
This concept, while simple, is difficult to articulate within the context of an orga-
nization. Simply stated, it is the idea that one person should not be in a position to
perpetrate fraud or abuse against the organization by himself or herself, or in the
case of management, to exert undue influence on staff, which could result in fraud
or abuse.
The simplest example of separation of duties has been around for decades. It is
the basic accounting control, which says that the person in an organization who
creates checks should not be the person to sign them. This old fashioned separation
of duties ensured that one person could not fraudulently create a check that could
be turned into cash. While simple, this provides a clear model of what is required.
Know the Business, Not Just the Technology ◾ 87
Costs, Risk,
schedule, quality,
performance security
Organizational Organizational
pressures pressures
In today’s electronic age, signatures have been replaced with electronic approval,
but the concept remains the same.
Whenever risk and operational priorities collide, there is potential conflict
(Figure 8.2). Normally, these issues can be resolved through organizational controls.
An example more applicable to most of today’s organizations relates to who cre-
ates and reviews audit reports. Let’s take a look.
1. Clearly, Holly is responsible for the performance of her subordinates, and the
daily audit report will be a good tool for monitoring their activities.
2. The fact that the analyst responsible for creating and following up on the
daily reports works for Holly may put the analyst in an uncomfortable posi-
tion. The analyst gets reviews and raises from Holly, so they have a vested
interest in making their boss look good.
3. In the above example, the audit reports never leave Holly’s department, mean-
ing that noncompliance with the new oversight policy may be concealed from
upper management.
4. Holly is also under considerable pressure to grant expanded access to these
system accounts to make sure there are no production or development prob-
lems. What about the expectations of her customers? Does that undue pres-
sure expose risk to the organization?
When discussing these issues, remember it is about discussing the scope of the
position, not the individual in the role at the time. There is no doubt that Holly
is a trusted individual in the organization, but will Holly always be there? Keep
personalities out of the discussion. When it becomes personal, risk controls will
usually take a back seat.
Let’s look at potential controls to address the four points above that could help
overcome the potential for conflict of interest.
4. There are two potential controls that could be used to address these points.
First, it appears that the departments creating the requirements are not fully
detailing the rights necessary for the applications to work properly. Holly’s
area is compensating for this lack of detail by granting excessive rights to the
accounts. The creation of a procedure to detail required accesses and man-
dating the information as part of the set up process will address this issue.
Secondly, Holly may want to limit the ability to create super-user accounts to
only one or two of her people. This will require the administrators to get the
needed detail for appropriate account setup.
In the finest tradition of the separation of duties concept, keep in mind who
your risk management group reports to. In some companies, this role is contained
within IT; in others, it might be Legal or Compliance, just to name a few. While
some case can be made that Compliance is an appropriate group to be part of, the
autonomy of the risk group should be maintained as much as possible. The IT areas
are typically one of the groups that are monitored the most and it doesn’t make for
good working relationships or effective reporting of risk issues when both groups
report to the same person. This also serves to put that individual (usually the CIO)
in the bad position of having to referee issues between the risk and security groups
and the operational areas. Most folks in this position would welcome the ability to
point the finger at an outside group and say that they are responsible for the new
policy or change.
However, it is also important that decisions be made with representation from
IT as well as other areas. Do not make policy or risk decisions without involv-
ing those that need to know. You must include their input when evaluating a risk
posture.
Paul didn’t get it, but the company had set his limit of approving financial trans-
actions at a specific limit. He didn’t understand that he couldn’t simply assume a
hundred-thousand-dollar risk for the company.
90 ◾ The CISO Journey
Lesson learned? Always make sure that those accepting risk have the authority and
signoff to do it. Put the risk acceptance in writing and have them sign it. These deci-
sions are too critical to execute with a handshake. People have a very short memory
when the crap hits the fan. Protect yourself, your people, and the company at all
times.
This will also ensure that the decisions that come down already have the sup-
port they need and will pass easily. In the event that an impasse is reached, it will
be necessary to elevate the issue to those who have overall responsibility for the
program. This would mean a communication with the Board of Directors if senior
management cannot agree. It makes everything better if there is an already estab-
lished reporting relationship. The purpose is to let them make the final decision
since they would have responsibility to the ultimate boss, and the shareholders. In
the instance that there is no Board of Directors, the CEO or company president
would be the appropriate party.
Does this structure place a conflict of interest on the CIO in that he may not
report all incidents to Executive management that was reported to him?
Does this structure place pressure on the analysts reporting policy violations to
keep their manager out of trouble?
Does this structure, which lets the head of IT make decisions regarding technol-
ogy risk, place him in a potential conflict of interest when faced with pres-
sures to deliver systems quickly and cheaply?
What compensating controls could be put in place to ensure that any issues
relating to conflict of interest are resolved and discovered?
A Model Structure
Let’s start first with a general description of the Risk Management organization
chart (Figure 8.3).
Keep in mind that this should be a simple structure by its very nature. There
should be very clearly defined roles for each person that is well understood
Chief
executive
officer
Chief
risk
officer
Chief
security
officer
Cyber
Physical
BCP
Chief Risk Officer Simply defined, this person is responsible for the
oversight of all risk management activities for the
company including information, financial, and
operational.
Risk Management/Organizational
Management Interaction
Transparency refers to the clear exposure of risk issues to the organization’s manage-
ment. In order for the operating management of an organization to make informed
decisions, it is critical that they understand any information risk issues that exist in
the business- or technology-related systems. A good way to facilitate the necessary
communication is the creation of two operating committees in the organization.
They are the Executive Steering Committee and the Information Security Officer
Committee.
Know the Business, Not Just the Technology ◾ 93
CIO
Retail Chief
VP counsel
Information
security
executive
council
HR
CSO
director
CRO
ISO
IT data
security
ISO ISO
operating operating
unit Information unit
security
officer
committee
ISO ISO
operating operating
unit unit
maintain an adequate separation of duties within the group. The number of analysts
in each group will vary based on the size of the organization. If the organization is
small enough, the same person may perform both duties. An important element of
this equation is that the positions of the people in the reporting structure as it relates
to the dotted line relationships should be equal. As it occurs in most companies,
security may be thought of as a hindrance or simply a necessary evil. If a junior-level
person is trying to communicate security or risk needs to a vice president, it is too
easy to have those needs ignored. In some areas, position plays an important part in
the weight of the arguments and it is easier to communicate as equals.
If the organization is large or geographically diverse, you may want to imple-
ment a strategy of Information Security Officers responsible for a specific business
unit or geographic area. As the CISO of a large international company, I imple-
mented an ISO for each of the major business units as well as an ISO for each
major geographical unit. This gave me an effective tool for coordinating informa-
tion security projects and getting important information disseminated. We had a
weekly call taking care to rotate the times to make sure our team members in Asia
weren’t always on a call at 9 or 10 p.m. The following were the basic duties of the
ISO and their supporting information security analysts.
by which information is protected. This can include build sheets for equip-
ment, coding standards for programmers, and the tools to guide the decisions
related to the protection of information.
◾◾ They develop SLAs. SLAs must be realistic and published. Also on an ongo-
ing basis, the performance against those SLAs must be published. The SLAs
can be as simple as the uptime of critical security systems, or throughput
measures to make sure the tools are not adversely affecting network traffic.
required today. It takes tools. There are many great choices for everything
from single sign-on to role-based access. If you don’t have a tool, establish a
scripted bake-off and make the potential vendors perform in your environ-
ment. The evaluation team should include folks from the business as well as
IT operations. Since some of what your tools will do may replace some of the
work by the domain administrators, you need their involvement and support.
Lesson learned? Include the Audit and Compliance folks. When the audits show
up, they will be looking for proof that your systems are operating and controlling
risk. Identify and create those reports as part of the initial process. Today, a com-
mon requirement for many audits is that the managers attest that their subordi-
nate’s access is correct on a quarterly basis. You can develop an automated system
with workflow or do it with e-mailed spreadsheets and manual effort. If you choose
the latter, be ready to join the witness protection program as there will be people
looking for your blood.
This discussion is not meant to be all-inclusive for the purpose of planning for
your department. Rather, it is in place to make sure that the thought process of
separation of responsibilities and conflict of interest issues are addressed up front. It
is very difficult to fix these problems after the process is in place. Sure, there will be
organizational battles in the beginning while defining the structure, but it is better
to fight them now and keep the autonomy that is required than try to fix it later
after it has been established.
Network operations
IT documentation
Info risk mgmnt
IT operations
Export firewall logs R A I I
Review firewall logs C R I I
Archive results I C R I
Distribute weekly report I C R I
Another useful tool is a responsibility matrix. Since the security of any orga-
nization is reliant on the activities of many people, a clear understanding of who
is responsible, accountable, consulted, or informed for each primary activity is
required. This tool, commonly called a RACI matrix (Figure 8.7), is an invaluable
part of the risk analysis process. It can aid in the quick identification of areas where
responsibilities for risk related activities are cloudy.
The RACI chart is designed to help people define and understand who is
Responsible, Accountable, Consulted, and Informed for the various tasks or deci-
sions required either by individuals or teams. By completing the RACI, the man-
ager or project leader clarifies what is expected and by whom. It’s very important to
first identify the various tasks in that process and then identify the roles (people or
groups or departments) and finally their responsibilities for a given task. Typically,
we associate a task with at least one role or, in some cases, multiple roles.
So basically, the RACI matrix is a responsibility assignment matrix. Let’s go
through each association type in detail below:
◾◾ Responsible
This is the person or position required to complete a task. Each task must
have a responsible person or position assigned to it to ensure that the task
or decision receives due attention. Typically, only one person or position is
assigned responsibility for completing a task. In other words, he or she is the
“doer” of the task or activity. The person who is “Responsible” need not be
accountable for that task, even though in some cases the same person can be
“Responsible” and “Accountable.” The degree of “Responsibility” can vary
and multiple roles can share the responsibility of a single task. Also, one role
can delegate the responsibility to another role. Using the RACI matrix, we
can see if a role has too many or too few responsibilities and try to adjust the
workload.
100 ◾ The CISO Journey
◾◾ Accountable
The person or position accountable for a task is responsible for insuring
that it is completed on time and in a manner that meets all expectations for
it. The Accountable (A) person or position does not have to physically do the
task. Accountability must be assigned to each task. In Figure 8.7, IRM is
accountable to monitor the Export firewall logs process, assuring the log files
are received on time. “Accountable” is the person or role who has the final
authority and accountability to a given task. For any given task, there is only
one role/person accountable. We can’t delegate this accountability to other
roles or individuals or entities.
◾◾ Consulted
The person or position assigned consulting status for a task must be con-
sulted by the Responsible (R) person or party before performing a task.
“Consulted” are the people or roles that we consult and get advice from before
and during the performance of the task. When there are many people who
have “Consulted” roles, the time taken to accomplish the task increases. On
the other hand, too few or no “Consulted” roles assigned to a task means that
task has the risk of underperforming. Any task with a consulting position
assigned to it must be consulted with before the task is performed. Because
of the delay caused by consultations, their use should be minimized. The
responsible party should be empowered to do the required task with very few
exceptions. In the above example, if IT Operations had a project to redesign
how and where the logs were archived, they would get the input of the IRM
group.
◾◾ Informed
The person or position assigned informed status for a task is required to
be informed that a task has been completed. The person or position with
the “I” can be informed before or after the fact. The Informed (I) person or
position is not being informed for permission or approval. In Figure 8.7, you
can see that the group responsible for exporting the firewall logs is Network
Operations. Since the review is a Risk Management function, Information
Risk Management is Accountable to ensure it gets done by monitoring the
review process. Both IT operations and IT Documentation are informed if
the process changes or breaks down. You need to make sure the right people/
roles are informed after we perform a task successfully. If too many roles are
informed after a task, we need to see if it’s necessary to do so and minimize
on that.
◾◾ People tend to think they are the ones who are responsible and/or account-
able whereas they might actually be in “Consulted’ or “Supported” roles.
Assigning wrong roles results in duplication of effort and misunderstanding
and even fighting in some cases.
◾◾ RACI allows the right people to be assigned to the role of consulted.
The RACI chart should initially be completed by a small working group and
then shared with employees or team members. The RACI is a living document that
changes over time as people become more and more accountable for their results.
In a team environment, the RACI is typically reviewed at the same time the team
charter is being updated with new goals.
It is your responsibility to ensure that your actions support the business. The
first step is to map out where yours match the company’s. An easy way to explain
the relationship to management is through a simple table (Figure 8.8).
Establish a relationship and be able to, in simple terms, explain the connection.
The final step is to relate your granular projects to your security goals and objec-
tives, again using the table method.
While simplistic examples, if you follow an approach similar to show the busi-
ness that you can connect an identity management project to the corporate goal
of growing the company, you will have greater success. Keep It Simple. We are all
technologists and as such have an irritating habit of trying to geek things up. Take
102 ◾ The CISO Journey
Identity management
Intrusion prevention
Incident correlation
Training awareness
Static code analysis
Cloud architecture
compliance
Staff development
Training response
Botnet intercept
program
Forensic server
goals
it from me, nothing irritates or alienates executives and the Board faster than you
trying to show how smart you are. Business is their domain. If you are going to talk
to them, show the simple respect of learning their language and explaining your
contribution in terms that add value to their goals. If you do, I’m sure they will
“GET IT!”
Conclusion
Organization, separation of duties, and responsibility definition are never an easy
process. Certainly, the approaches outlined above are one of a number of methods
that may be appropriate for your organization and structure.
In all cases, documentation and analysis are key factors. Leave nothing unde-
fined or cloudy, particularly with your major initiatives.
The work up front will pay huge dividends downstream. As always, make sure
all involved or interested parties are engaged and have the opportunity to provide
input. Remember, transparency of risk issues to the business and being inclusive in
your approach to analysis are critical to your long-term success in any organization.
Chapter 9
Technology Is Only
One-Third of Any Solution
103
104 ◾ The CISO Journey
more interconnected. The Internet has grown from a few nodes to billions. Our
corporate networks have gone from a few networked computers to global Wide
Area Networks. Looking at these numbers only as trends, and factoring in the
complexities of our own business models, you can see the challenges to effective
risk management emerging.
In 1990, a risk assessment process was fairly contained and vertical. The pri-
mary consideration was to make sure that the security of the system was main-
tained. Interconnectivity of systems was usually on the same platform or within
the same facility. The user base of any system was known, with most of them being
employees or associates. Any remote office connectivity was usually over leased
lines, which had low risk.
As the Internet became a prevalent medium for interconnectivity, many of the
stable controls we took for granted began to fade. New threats and exposures had
to be factored into the risk of doing business in the Internet age. Risk assessment
moved to more of a project-by-project analysis that took into account the multiple
variables that affected a project.
This age also ushered in some of the very visible cases of computer abuse, fraud,
and crime. Major financial institutions became the victim of computer crime.
White-collar crime rose to new levels as the technology level of the “bad guy”
increased. Very visible cases of corporate malfeasance also came to light, which
adversely affected the financial markets and investor confidence. Because of these
factors, state and federal government started to develop new rules and legislation in
an attempt to implement basic levels of risk management controls for companies.
The first of these was the Gramm–Leach–Bliley Act, or as it is commonly known,
GLBA.
The GLBA has its roots in the financial failures of the Great Depression.
Congress passed the Glass–Steagall Act in 1933, which prohibited national and
state banks from affiliating with securities companies. The sentiment was that
this separation of banking, securities, and insurance functions would make the
financial infrastructure of the United States more robust. With some revisions,
this maintained as status quo until 1999 when the GLBA repealed sections of
these acts and allowed financial services companies to expand their services once
again.
However, one overriding concern from this expansion of services was the pro-
tection of client data. It wasn’t always theft of data that bothered regulators. Many
institutions treated client data as property or an asset that could be bought, sold,
or traded. Very visible cases became known where some financial institutions were
selling customer information to marketers. Voter sentiment ran high, demanding
some basic protections to their identity data.
This sentiment was also evident on the international front where, in 1995, the
EU passed the Data Protection Directive, which required that international data
exchanges that used EU citizens’ personal data be afforded the same level of pro-
tection that their home country would afford them. The immediate impact to US
106 ◾ The CISO Journey
institutions that did business in Europe meant that the controls over an EU citi-
zen’s data had to meet the standards set forward by the EU, not just the US stan-
dards. US companies were now faced with a barrier to do business in the European
Union. What emerged from these challenges was a Safe Harbor process. The EU
Protection Directive is an example of a safe harbor law. It sets comparatively strict
privacy protections for EU citizens. It prohibits European firms from transferring
personal data to overseas jurisdictions with weaker privacy laws but creates excep-
tions where the foreign recipients have voluntarily agreed to meet EU standards
under the Directive’s Safe Harbor Principles. The European Union has, for many
years, had a formalized system of Privacy legislation, which is regarded as more
rigorous than that found in many other areas of the world. Companies operating in
the European Union are not allowed to send personal data to countries outside the
European Economic Area unless there is a guarantee that it will receive adequate
levels of protection.
Such protection can either be at a country level (if the country’s laws are con-
sidered to offer equal protection) or at an organizational level (where a multi-
national organization produces and documents its internal controls on personal
data).
The Safe Harbor Privacy Principles allows US companies to register their certi-
fication if they meet the European Union requirements. After opting in, an orga-
nization must recertify every 12 months. It can either perform a self-assessment
to verify that it complies with these principles or hire a third party to perform the
assessment. There are also requirements for ensuring that appropriate employee
training and an effective dispute mechanism are in place.
In our “backups gone wrong” story, the technology was in place; we had a
great written procedure of how things were supposed to work, but we completely
missed on the people part. I should have had a detective control to make sure that
the packs actually got to the bank. I could have rotated the duties; I could have
required the bank to verify the delivery to the vault. There is no single right answer.
You need to define the controls that work for your organization.
Since we have identified the three types of risk, we can now discuss the activities
that make up the continuous cycle, which helps us control or mitigate the risk. The
four activities are Prevent, Detect, Respond, and Recover. To bring these activities
into focus, let us look at a standard corporate virus protection program.
Standard antivirus protection is the classic risk management exercise. Tools and
processes have been installed to defend the company against viruses. Should a virus get
past the perimeter protection, it should be caught at the desktop, and a message should
be generated if user intervention to remove the virus is required. Finally, new definition
files are regularly downloaded to continuously improve and update the defense.
Technology Is Only One-Third of Any Solution ◾ 109
Prevent
Respond
In the terms of Risk Management, those activities are called Prevent, Detect,
Respond, and Recover. Figure 9.2 is commonly used to show their relationship.
Note that the middle is Resiliency. This reflects the business’s ability to continue to
function despite adverse events and activity. Overall, a business with high resiliency
has better risk controls than one without.
Prevent
The first of these activities is “Prevention.” In other words, let us stop the incident
from happening in the first place. If we use the example of virus protection, no
one would argue that the best virus is the one that did not infect your systems.
Organizations spend a significant amount of money to install systems, which keep
viruses out. Prevention, in risk management terms, is a “Preventative Control.” In
the case of virus protection, it is a technology control. There are many other types
of preventative controls. For example, a key people-based preventative control is
employee badging. This control helps prevent unauthorized individuals from enter-
ing your facilities. A common preventative control on the process side is “separation
of duties.” In this control method, processes are designed in a way to ensure that no
one person has all the rights to compromise a system. An example of this would be
separating the responsibility of maintaining an organization’s firewalls from those
who maintain the routers and network devices. If the process and responsibilities
are properly designed, it will “prevent” one person from completely opening up the
organization’s network to attack.
110 ◾ The CISO Journey
Detect
The second activity is “Detection.” In other words, if the primary preventative con-
trol fails, what controls are in place to detect that an incident has happened? If we
look at the example of virus protection again, if the Preventative Control of screen-
ing incoming e-mails fails and a computer system becomes infected, an alert from
the system notifies a technician that the system needs a virus cleaned. This type of
detective or “after the fact control” must be designed to provide timely notification
of the incident depending on how much of an impact the incident may have on
the organization. The greater the impact, the quicker the notification should take
place. Just as with preventative controls, there are also detective controls for people
and processes. A people-based detective control may be something like periodic
background checks. Many companies check the background of people in a critical
position before hire, but few require yearly background reviews of those same criti-
cal people. Ongoing checks detect whether the individual has had legal or financial
troubles over the last year, which may affect his or her work.
Respond
Responding to an incident is a critical phase of the process. Given the fact that any
threat or vulnerability may come to fruition despite our best efforts, the ability to
respond in a timely and effective manner is critical. It reinforces the old adage, “The
right time to look for the fire extinguisher is before your pants are on fire.” Prior
planning is critical.
Utilizing the virus protection example, let’s look at a scenario:
Tom was on the way out the door to work when his daugh-
ter told him that her laptop was running hopelessly slow, and
she really needs it tomorrow for a class assignment. Could he
please take a look at it before then? He grabbed it, stuffed it in
his briefcase, planning to take a look at it during lunch.
As lunch rolled around, Tom thought that it probably just
needed a file re-org. As long as he was at it, he should prob-
ably make sure she has all the latest operating system patches.
Heaven knows that is the last thing on her priority list. He
flipped open the laptop, turned it on, grabbed the network
cable from his desktop unit and plugged it in.
Technology Is Only One-Third of Any Solution ◾ 111
We probably do not need to take the story much further. This is a com-
mon occurrence at many organizations. Tom’s daughter’s laptop was infected
with a load of malware, which tried to propagate across the company net-
work. By plugging this laptop in, he circumvented the perimeter protections
for viruses.
Lesson learned? Never miss an opportunity to make a user friend. A cyber cow-
boy may have shut off her machine or demanded that it be reimaged. This right
approach was to talk about safe surfing and appropriate use. This helped reinforce
the culture of security we all want to build.
Response controls include plans and tools to find a problem system in an accept-
able time, based on the severity of the risk to the company.
Recover
Once the notification that a system on the network is attempting to spread viruses
on the organization’s network, and the offending systems is identified, the recovery
processes begin.
From a technology standpoint, the action would be to immediately disconnect
the system from the network. There may also be a process to clean other infected
PCs on the network if any infection attempt was successful. Regardless of the expo-
sure, it is important that effective recovery plans exist before the incident happens.
This critical phase is often overlooked in the risk measurement process but is critical
in the return of critical systems to a usable state. Additionally, from a people stand-
point, there is obviously a need for continuing education of Tom from the earlier
example on acceptable computer behavior.
If we take the four control activities discussed above and overlay them on the
People, Process, and Technologies illustration, we will arrive at the diagram shown
in Figure 9.3.
The intersection of each arrow is a point at which a discussion of threats, vulner-
abilities, probability, and controls should take place. This graphic is extremely use-
ful when consulting with business partners or development organizations to discuss
the different types of risk a system may encounter.
The basis of any risk management process is a standard frame of reference, or a
common language you and the organization speak. Take the time to articulate and
document what each of the lines on the above graphic mean to your organization.
Remember that the People, Processes, and Technologies are the resources that the
Technology Is Only One-Third of Any Solution ◾ 113
Awareness
Contingency planning
Prevent Alerts and advisories
Perimeter security
Virus management
Access reporting
Detect Security monitoring
Computer incident
Respond Response team
Business resumption
Recover Planning and disaster
Recovery plans
organization uses. The Prevent, Detect, Respond, and Recover are services that
your company uses. An example used in this chapter is virus protection. The anti-
virus software is a technology; the antivirus program management is a preventative
service.
What are your stories or life lessons? What would your “rule” look like for this
chapter? How would this framework have helped you detect, prevent, respond, and
recover?
In future chapters, we will refer back to this model as we explore the specifics of
an effective risk management program. In conclusion, a truly holistic risk manage-
ment program looks at all facets of risk and establishes a common framework to
which the organization can refer. The use of the methods discussed in this chapter
will assist you in establishing the foundations of both.
Chapter 10
When discussing risk, I often think about the story of the two
blind airline pilots. There were always a lot of questions when
the passengers saw the Captains with their white canes feel
their way into the cockpit, but they thought it was a joke, after
all how would they know what to do? Besides, the company
would not put the passengers at risk, correct?
So the airplane is at the end of the runway and the pilots
push the throttle forward. The engines roar and the plane
starts down the runway, rapidly gathering speed. The plane
went faster and faster, closer and closer to the end of the run-
way. Soon the passengers begin to panic and begin to scream,
“We’re going to die!!” On hearing that, the pilots pulled back
on the yoke and the plane leapt into the air. Once the plane
leveled out and things calmed down, the one pilot said to the
other, “You know, one of these days the people aren’t going to
scream and we will be in real trouble.”
What’s your approach to risk management? Is it the blind pilot approach where
you roll along until the business screams? You’d be surprised how many compa-
nies have no plans for a crisis. It’s human nature to assume bad things only hap-
pen to other people, right? Hopefully, you have a plan and a strategy to mitigate
115
116 ◾ The CISO Journey
risks before they become a crisis. No sugarcoating: the business relies on you to
maintain effective risk management controls. If one day they wake up and find
themselves speeding toward the end of the runway, you did not do your job. And
unlike the story of the pilots, you will probably not get another chance to fly with
the company.
Let’s face it, in our personal life, just as in business, we assume risk every day.
As a matter of course in our daily lives, most of those decisions to accept risk are
unconscious. When we drive to work, we assume the risk of having an accident.
When we walk across a street, we assume the risk of getting hit by a car. When we
climb a flight of stairs, we assume that we will not fall and break a leg.
In our personal lives, we would not dream of being so risk averse that we would
not drive, cross a street, take the stairs, or leave our house. We have built-in com-
pensating controls to reduce the risk. We look both ways, we drive defensively, we
use the handrail on the stairs, and if those controls fail, we have auto and health
insurance to cover the downside risks. Interestingly, the desire to think through
potential risks comes with experience and maturity. I remember being 18 and
immortal. The thought of any adverse outcomes were overcome by enthusiasm and
naivety. Being a risk manager is the same; with experience comes a mature ability
to analyze risk and design controls to mitigate that risk.
In security, many inexperienced leaders are risk averse. It’s easy to just say no to
anything new and justify the position by saying it is too risky. Case in point:
Risk
Means
There are many ways that analyzing data and alerts can go wrong. The risks of
too many alerts, not recognizing a new alert as a real threat, or not knowing what
to do when the alert is real. As with any problem, all we have to do is look to his-
tory for an example.
Achieving the proper results must be done at an acceptable cost. While risk is at
a minimum at point A in Figure 10.2, this does not mean the costs are acceptable
at that point. Most of us have to operate somewhere to the left of point A. How
far to the left is the critical question. A security department does not run on an
unlimited budget.
Risk is proportional to the amount of uncertainty. I’ve always said that I love
“boring.” Uncertainty always increases risk. The risk curve in the graph tends to
flatten out as we reduce uncertainty. Training also reduces uncertainty as system
operators become more adept at operating their systems and understanding the
data collected. These very data are what tends to push us to the right of point A.
Every Organization Must Assume Some Risk ◾ 119
Risk
A
Means
We have so much data we cannot process all of them. Data are useless unless they
can be converted into information. Information is critical to reducing uncertainty.
Information is available both internally and externally. Staying on top of the lat-
est threat assessments will help keep the curve flat. There are many publicly available
sources of threat information as well as paid services. Most vendors of security-related
products have a wealth of information they freely provide to their clients. The chal-
lenge is absorbing, filtering, and processing the information. Analyzing data tends
to be a secondary responsibility, if it is done at all, when it should be a primary role.
Just like each military branch has its dedicated group of intelligence specialists, each
business should likewise invest in dedicated intelligence analysts and not just system
administrators. Whether you recognize it or not, there is a war going on and industry
is the target. Good methodical and careful analysis is the best defense against becom-
ing overconfident and careless in how much risk you are willing to bear.
As the saying goes, it is not the destination that matters but the journey. While
we know where we want to be (the ends), and we have the resources (the means), we
are still left with execution (the ways). For every problem, there is generally more
than one solution. The journey though can be unduly influenced by the means. The
resources at hand may take you down the wrong path, the proverbial “tail wagging
the dog.” Current investments in people and technology may not necessarily be the
right fit for future needs. While it is hard and expensive to separate oneself of prior
decisions, such painful decisions sometimes need to be made. Anyone who has gone
through a divorce or leaving a job for a new one can relate. Failure to make a deci-
sion in dealing with a status quo that is clearly ineffective only increases risk. Since
multiple paths lead to the same destination, one should not place your entire faith
and confidence in one direction. The threat environment is constantly changing
and adapting. One must always have options to thwart an opponent that has identi-
fied your strategy and countered it. In security, the greatest risk is one of planning
for certitude. As Wilbur Wright stated in 1901, “Carelessness and overconfidence
are usually more dangerous than deliberately accepted risks.”
120 ◾ The CISO Journey
There is no perfect defense to reduce risk to zero. A 100% solution to any prob-
lem is unrealistic. The Maginot line was deemed to be impenetrable. (How did that
work out?) The Germans simply went around it, because the line was built to reflect
the current threats and was not modified to reflect changes in threat, in this case,
how wars were being fought. Creativity and technology will eventually defeat any
form of defense. As we define our objectives, develop our strategies, allocate our
resources, and implement our tactics, the opposition is likewise doing the same.
Complicating the equation is the fact that we are dealing with multiple external
adversaries and to a lesser degree internal ones as well. Though we can’t discount
the very real and potentially far more serious risk internal threats pose.
Security is the corporation’s insurance policy. And like any insurance policy, it
has lots of exclusions. Each explicit and implicit exclusion is a potential risk. It is
critical that the exclusions be well documented and communicated. The business,
just like your average insurance policy holder, is totally unaware of the fine print
and assumes everything is covered. Such assumptions have led to the downfall
of many a CISO. Wilbur Wright in a letter to his father back in 1901 summed it
up well, “The man who wishes to keep at the problem long enough to really learn
something positively must not take dangerous risks.”
Complex,
confusing
High
Moderate
maturity
Process
Cleanly Low
defined
Simple Complex
Technology
People environment
Probability of adverse risk event
to contend with in addition to the very real external threats. A security wizard will
have contingencies in place to deal with a changing threat environment and not
only be able to recognize when the threat environment has actually changed but be
able to implement the contingencies in a timely fashion. With a dynamically chang-
ing threat environment composed of a myriad of threats and actors, coupled with
internal restrictions, and having no clear vision of potential effects of actions taken
to address a threat defines the challenge and risk that comes with being a CISO.
So, what’s to be learned? Assess risk before you head down the steep hill. Take
a lesson or two, or talk to your peers so you can learn from their experiences. Once
you learn a painful lesson, don’t forget it: learn from your experiences. Lastly, you
don’t need a hundred-dollar pair of goggles to see clearly, particularly if you don’t
Every Organization Must Assume Some Risk ◾ 123
know that you will want to make skiing a serious hobby. You should start with
reasonable controls and technology to control risk. A million-dollar solution is not
always better than a thousand-dollar solution. Common sense? Yes, but these are
the things that will make you a better CISO in the long run.
What about the following trips? The more I skied, the better I
became. After the days on the slopes, my friends and I would
share stories about things we had learned. I became convinced
that for at least the foreseeable future, skiing would be a great
activity.
As our organizations mature and our products and services develop, it is impor-
tant to review our risk approaches to people, process, and technologies. With an eye
to market penetration and volume, is a simple firewall enough, what about intru-
sion detection? Is the business interested in developing a customer facing public
website for e-commerce? The message is that Risk, just like Business, is never static.
Business needs must drive the risk methodology and controls, but security must
evolve with the business.
In dealing with risk, you only have the ends, the ways, and the means to adjust
and be flexible. One size does not fit all, and while a solution may “keep the snow
out of your eyes,” it may not be a fit for the business. If you try to force flexibil-
ity on every solution, you will find that you may compromise the security of the
whole solution. You will need to be creative as you look at risk and security issues.
Don’t restrict your creativity exercise to just money and people; think in terms of
resources in general. There are many ways to improve efficiencies and reduce costs
without reducing headcount or changing tools. Look at ways to reduce the waste of
inefficient or redundant processes. Go back to the drawing board and take a fresh
124 ◾ The CISO Journey
look at where the business is and where it is going. Be a business partner instead of
a “risk cop.”
My wife to be (at that time) had a similar first ski trip experi-
ence, with a different lesson learned. Since we are very much
alike, when she jumped off the bus, she headed directly for the
bigger slopes. After a few false starts, she managed to nego-
tiate the tow rope to the top, pointed the skis downhill and
pushed off. In what can only be described as a slow motion
train wreck, she made her way down the hill and found herself
headed for the ski lodge. It then occurred to her that the one
thing lessons would have taught her was how to stop. Seeing
no other way out, she fell and skidded to a stop. Much like me,
she eventually swallowed her pride and headed for the bunny
slope and lessons (including how to stop).
security breach go unrecognized. Having never seen such a breach nor understand-
ing its mechanics, it is understandable how potential breaches become successful
breaches. If your staff thinks like a hacker and practices the techniques of a hacker
using the tools they have readily available, they will become far more attuned and
sensitive to changes in the environment that portend a breach. Directly engaging
the enemy is not a viable tactic. Such actions would only invite a much greater
onslaught since this would be viewed as a challenge by the hackers. You would have
far more to lose than the hackers. Unlike football, it is better to intimately know the
offense rather than actually having a good offense. Having a good defense, though,
is still an imperative.
So the bottom line is you will always have risk in your environment. How
much and where it resides is your job to help the business decide what is acceptable.
Security should never make the final determination as to what should be protected
or to what degree. Security’s role is to identify the risks, offer potential solutions,
implement the appropriate controls to reduce those risks, and then monitor for
how well the controls are performing. Explaining the risks to the business requires
diplomacy, tact, and the ability to take complex and abstract concepts and reduce
them to simple terms that are meaningful to the business. Saying this server is vul-
nerable and we might lose some data has far less meaning and impact than saying
this server contains sensitive data that are at risk of being stolen, which could give
a competitor a significant insight into our customer base. The real challenge is get-
ting the business to prioritize their data assets. Unfortunately, when dealing with
the business, everything tends to be critically important. Placing a dollar figure on
what it would cost to protect each piece of data helps the business to more accu-
rately prioritize its business assets. Having a charge back model is the best way to
ensure that the business knows what is protected and what is not. This also makes
it clear that if you aren’t paying for it, it isn’t protected!
Lesson learned? I go back to one of the core behaviors: You can’t control others’
behavior, you can only control how you respond. You might think a normal
response would be to never cooperate freely with audit again, but that will make
you look bad, maybe even having something to hide. Instead, my lesson was to set
expectations and ground rules before inviting audit into a project. Document in
e-mail. When properly done, you will find that Audit can be a tremendous partner.
Once you have an agreement with Audit, you will find they are a powerful ally in
the risk management process. For instance:
Nobody likes surprises when being audited. An audit is just like any other pro-
cess or project, it must be managed. You must involve the business and IT manag-
ers of the audited systems early. Don’t just look at the scope, look also at the rules
of engagement. Things such as the auditor’s access to data and information must
be defined early.
A few years ago, we were going to have an audit of our perimeter controls. All
of our administrators and engineers were on notice. The audit team showed up the
first day and requested a system login and copies of all the firewall rules for review.
Every Organization Must Assume Some Risk ◾ 127
Being good administrators, the IT staff flatly refused the request, thinking it was
a test. The auditors demanded, the administrators dug in their heels, and the issue
quickly spiraled out of control. By the time I stepped in, feelings were on edge, and
the tone of the upcoming audit was negative.
The Work
The process of testing your system’s security should be part of the overall plan. A
key takeaway: Keep track of the IT hours expended in support of audits. This is a
critical piece of information that will be valuable when budget time rolls around.
The time spent in support of audit is significant but is usually overlooked. Make
sure the auditor details this plan up front and then follows through without it
128 ◾ The CISO Journey
becoming a fishing expedition. Again, you are not trying to hide details; you need
to manage your resources and scope of the “Audit Project.”
The auditor will review the relevant policies to determine the acceptable risks.
The auditor will confirm that the environment matches management’s description
of the systems. For example, the documentation may talk only about Linux servers,
but a review shows some Microsoft servers. Auditors often use security checklists
to review known security issues and guidelines for particular platforms. Those are
fine, but they’re just guides. They’re no substitute for expertise, and you may have
to contribute some technical help.
Many auditors will want to run a vulnerability scanner to check the systems.
Personally, I recommend against any non-IT person running a tool that may dam-
age the infrastructure. Propose that the Auditors observe a security analyst running
the scanner, and take the results directly from the analyst. Discovering security
vulnerabilities on a production system is one thing; testing them is another.
Final thoughts—Above all, remember that there is a risk to taking an adver-
sarial approach to risk management. True risk management is an inclusive process
to benefit the business. Avoid empire building, oppressive controls, and complex
procedures. Ensure that the end result of the process is a safer, more productive
business environment.
Good for your career, great for the company.
Chapter 11
When Preparation
Meets Opportunity,
Excellence Happens
So what does that mean to us? Simply put, if we expect our users to practice
safe computing, we need to prepare and train them so they make the right choices
automatically. For us, that’s all about training and testing our users.
129
130 ◾ The CISO Journey
the open window before she can get a good look at the screen.
Cathy eventually took her concerns to Human Resources who
asked for a report to be run on Neal’s activities. The report
came back that although Neal was not spending excessive time
on the Internet, he had been accessing porn sites. Cathy called
Neal in and, with the help of HR, dismissed Neal from his job
for cause. He had violated the acceptable use policy.
Neal appealed the firing. He claimed that the company had
not told him that this conduct was unacceptable, and since
he was completing his assigned work without complaint, the
company was not justified in its actions. Because the company
could not produce any proof that Neal had been briefed or
trained regarding the company standard on acceptable use, the
court agreed and awarded damages.
Essentially, the courts are saying that unless both parties understand the con-
tract, there is no contract. Does this sound familiar? Has something like this hap-
pened in your organization? The answer is most likely a yes. This scenario happens
all too frequently in organizations today. Because information security–related
issues are still relatively new to many organizations, the thought of effective train-
ing and tracking of security awareness issues has not reached maturity. Traditional
issues such as human resources policies, business ethics, and workplace acceptable
behaviors have been thought out and adequately covered for years, because the risks
and potential financial losses have a historical basis. In fact, most employees will
understand the vacation or dress policy better than their responsibilities to secure
data. It will take a significant effort to bring information security issues into the
same sharp organizational focus.
Security awareness has the potential to easily fall into the torture category. It’s
mandatory and can be boring. Let’s face it; most people don’t perceive the value.
How do we communicate the value?
Awareness training is the most important component in any information secu-
rity initiative. Awareness training is a mechanism, which educates employees on the
following key security issues. If an organization has been successful, any individual
in the organization should be able to easily answer the following questions:
Training Methods
Should formal training be “Big Blast” once a year or quarterly? There are as
many acceptable awareness-training methods as there are opportunities. Blended
When Preparation Meets Opportunity, Excellence Happens ◾ 133
As it turns out, the practice was a long-standing “service first” initiative in the
department. Everyone had always taken it as sound practice, and never questioned
it. It was part of the traditional culture. The Security Trainer helped the depart-
ment understand how to go through acceptable processes if access to information
was needed. Because of a 10-minute training session, a serious security exposure to
the organization came to light and was corrected.
An awareness and training program is crucial in that it is the vehicle for dissemi-
nating information that users, including managers, need in order to do their jobs.
In the case of an IT security program, it is the vehicle to be used to communicate
security requirements across the enterprise.
An effective IT security awareness and training program explains proper rules
of behavior for the use of agency IT systems and information. The program com-
municates IT security policies and procedures that need to be followed. This must
precede and lay the basis for any sanctions imposed due to noncompliance. Users
first should be informed of the expectations. Accountability must be derived from
a fully informed, well-trained, and aware workforce.
On the first day at a new employer, new employees usually go through an intro-
duction to the organization. Usually it covers pay, vacation, parking, benefits, and
so on. On that first day, new employees should receive an introduction to their
responsibilities relating to information security. Does that happen where you work?
Ten to 15 minutes on that day can set the tone for the length of their employment.
Subjects to be covered on that first day should include the following:
◾◾ A review of the company’s acceptable use policy. Every company has differing
rules when it applies to using company networks and Internet connections.
◾◾ A review of the company’s password policy.
◾◾ A clear explanation of every user’s responsibilities for information security.
While specific roles may add additional responsibilities to a user, there are a
set of base responsibilities that should be covered.
◾◾ Explanation of the user’s privacy. If e-mails are monitored, let the users know.
If Internet access is monitored, let them know. Setting the tone early will
avoid downstream problems.
Since the tone of security should come from the top, don’t be afraid to stop down
and deliver the message in person. The employee will know and remember your face,
and understand that you felt it was important enough to deliver the message in per-
son. I guarantee it will stick with the new employee for a long time. On our graph of
easy to implement versus impact on risk, this small effort is a big winner.
The easiest way to start is with a centralized program. In this model, responsibil-
ity and budget for the entire organization’s IT security awareness and training pro-
gram are given to a single authority, typically the information security department.
All directives, strategy development, planning, and scheduling are coordinated
through this “security awareness and training” authority. Because the awareness
When Preparation Meets Opportunity, Excellence Happens ◾ 135
Awareness Seminars
Ongoing awareness seminars are a valuable tool in the educational process. A
standard presentation given on a regular schedule enables users to attend a yearly
session at their convenience. It is recommended that an organization establish a
requirement for at least annual attendance.
Preparing content that is relevant to the user is critical to the success of an edu-
cational program. In any organization, there are at least three main groupings of
attendees that should be addressed. They are as follows:
Once the awareness and training strategy has been set, supporting material can
be developed. Material should be developed with the following in mind:
In both cases, the focus should be on specific material that the participants
should integrate into their jobs. Attendees will pay attention and incorporate what
they see or hear in a session if they feel that the material was developed specifically
for them. Any presentation that “feels” canned—impersonal and so general as to
apply to any audience—will be filed away as just another of the annual “we’re here
because we have to be here” sessions. An awareness and training program can be
effective; however, the material must be interesting and current.
At some point, the question will be asked, “Am I developing awareness or train-
ing material?” Generally, since the goal of awareness material is simply to focus
attention on good security practices, the message that the awareness effort sends
should be short and simple. The message can address one topic, or it can address a
number of topics about which the audience should be aware.
The awareness audience must include all users in an organization. The message
to be spread through an awareness program, or campaign, should make all indi-
viduals aware of their commonly shared IT security responsibilities. On the other
hand, the message in a training class is directed at a specific audience. The message
in training material should include everything related to security that attendees
need to know in order to do their jobs. Training material is usually far more in-
depth than material used in an awareness session or campaign.
The question to be answered when beginning to develop material for an
organization-wide awareness program or campaign is, “What do we want all per-
sonnel to be aware of regarding IT security?” The awareness and training plan
should contain a list of topics. E-mail advisories, online IT security daily news
websites, and periodicals are good sources of ideas and material.
Awareness and training material can be developed in-house, adapted from
other agencies’ or professional organizations’ work, or purchased from a contractor/
vendor.
Changing peoples’ attitudes and behavior in terms of IT security can be a chal-
lenging task. New security policies are often seen as conflicting with the way users
have done their job for years. For example, departments and agencies that once
operated with the full and open sharing of information are now being required
to control access to, and dissemination of, that information. A technique that has
been successfully used to acclimate users to these necessary changes is to begin an
When Preparation Meets Opportunity, Excellence Happens ◾ 137
TIP: If you have call center or help desk people who may be the targets of social
engineering attacks, a good source of training may be no further than your local
or federal law enforcement office. Find a contact and let them know that you have
people who need basic training on how to identify deceptive behavior. Usually, they
will be glad to come over and offer a “lunch and learn.” If you want formal train-
ing, look at engaging an interview and interrogation speaker. They will have a great
number of tips on recognizing deceit either in person or over the phone.
There are some groups that need a specific focus. In my experience, system
or network administrators are more apt to ignore the basic password rules.
When reviewing logs at one of my employers, I noticed that there were a
significant number of IDs that had not been changed in months, just reset.
When I went down to the manager of the group and showed him the logs, he
admitted that is was his “internal department policy” to allow his engineers
to simply reset the same password instead of changing it. After all, they had
enough to remember without the bother of a password that changes every
90 days. We had a short but sweet discussion and expired all the administra-
tor passwords that night. OK, I never said I was popular, but you have to
protect the company.
Lesson learned? When doing ongoing awareness for administrators and network
engineers, ensure they know that policies are for everyone.
◾◾ Incident response—contact whom? “What do I do?”
◾◾ Handheld device security issues—address both physical and wireless secu-
rity issues. Mobile devices are a boon to business functions and a bane to
information security purists. Although they enable portability of data, they
are easily stolen, and the data can be compromised. Awareness training
should include material on methods to physically secure these devices, pro-
tecting them from loss or theft.
Success factors include ensuring the students know
– How to secure a device while traveling
– How to password protect sensitive documents and information
– Their personal responsibility for the equipment
◾◾ Use of encryption and the transmission of sensitive/confidential informa-
tion over the Internet—address agency policy, procedures, and technical
contact for assistance.
◾◾ Laptop security while on travel—address both physical and information
security issues. Include items such as the following:
– Allow yourself enough time. Airline travel is a hassle that only gets worse
when you don’t allow enough time to get on your plane. Mistakes can be
avoided if you slow down your pace.
– Do not check your laptop with your other luggage.
– Do not send your laptop through the airport X-ray conveyor belt UNTIL
it’s your turn to walk through the metal detector. That way, you’ll be able
to pick it up promptly when it comes out the other end and prevent anyone
else from walking away with it. X-ray equipment will NOT harm the laptop.
– When using the laptop, keep it with you and in sight at all times, includ-
ing when on breaks while attending a conference.
– Do not leave laptops in places with little protection, like a car or hotel
room. Use a hotel safe to lock your laptop or use a strong cable to attach
it to a secure object in the room.
When Preparation Meets Opportunity, Excellence Happens ◾ 141
Security Policy
Lesson learned? Creating targeted, usable policies are your job. Focus on the audi-
ence, ALWAYS.
Lesson learned? Create a high-level overview of all the policies to be included in
the employee handbook. No legalese, just a clear, concise statement of employee
facing policies.
144 ◾ The CISO Journey
◾◾ Establish overall strategy for the IT security awareness and training program
◾◾ Ensure that the executives, senior managers, system and data owners, and
others understand the concepts and strategy of the security awareness
and training program, and are informed of the progress of the program’s
implementation
Managers
Managers have responsibility for complying with IT security awareness and train-
ing requirements established for their users. Managers must work with the CIO
and IT security program manager to meet shared responsibilities. For users in roles
146 ◾ The CISO Journey
Users
Users are the largest audience in any organization and are the single most impor-
tant group of people who can help reduce unintentional errors and IT vulnerabili-
ties. Users may include employees, contractors (foreign or domestic), other agency
personnel, visitors, guests, and other collaborators or associates requiring access.
Users must understand and comply with agency security policies and procedures
and be appropriately trained in the rules of behavior for the systems and applica-
tions to which they have access.
It is not a one-way street for users however. Users must work with manage-
ment to meet training needs. It is also the user’s responsibility to keep software/
applications updated with security patches and to be aware of actions they can take
to better protect their organization’s information. These actions include, but are
not limited to, proper password usage, data backup, proper antivirus protection,
reporting any suspected incidents or violations of security policy, and following
rules established to avoid social engineering attacks and rules to deter the spread of
spam or viruses and worms.
Owners of information have the responsibility to determine the value and
importance of that information resource and to authorize access and assign cus-
tody. Custodians of information have the obligation to include information pro-
tection concepts in the design, development, or selection of systems that store
and process the information. Custodians of computer information resources are
primarily application development areas within the Information Technology
Department.
Although the specific roles may differ, everyone is responsible for understand-
ing the security design of an organization, and their roles in that design. The roles
are not universally applied. For example, a person may be a user of one type of
information, and an owner of another type. Ensure that the training is applicable
to all the needs of the attendees.
Eventually, an individual’s responsibility may include the reporting of a
security incident. Individuals must be trained how to report security incidents.
Incidents will be more likely to be reported earlier if people understand the
When Preparation Meets Opportunity, Excellence Happens ◾ 147
Formal Training
Success factors include ensuring that the attendees understand
Organizational Newsletters
If you have a good security story to tell, tell it! A monthly security newsletter with
relevant tips and tricks is a valuable method of conveying the security method.
Incorporate timely topics such as identity theft, making it hit home for the general
user. If you cannot issue your own security newsletter, talk to the publishers of the
company newsletter and institute a “security corner” column. Talk to a cross sec-
tion of users and find out what hot buttons they may have, or check with manage-
ment or internal audit for current topics of interest.
Awareness Campaigns
Nothing builds awareness like a well-planned campaign. This differs from stan-
dard awareness training in that it may incorporate posters, giveaways, contests, and
awards. It is meant to build enthusiasm for the subject matter. Posters should be
eye-catching. There are many sources for ready-made posters. Figure 11.1 shows a
sample awareness poster based on a “Top 10 Tips” theme.
Summary
Security awareness training must bring the message home to the user. The subject
matter must be presented in a manner that is relevant to their lifestyle and current
position. Users must understand that information security is in place to protect
their work. If a security event happens that was their fault, it may be their work
that is lost as well as the work of others. Simply reporting that the company lost a
large amount of money in dealing with a security breach does not bring the issue
home. However, describing the hours of effort required repairing or reconstructing
the systems brings the issue down to a more personal level and makes an impact
that users will remember.
Focus on the things they are expected to do daily in their job. Ensure that what
you are asking them to do is achievable and that you have given them the tools
to be successful. For example, don’t tell them they should shred all paper reports
for disposal without ensuring that shredders are available in their work areas. The
training is your formal opportunity to get in front of the only people who can truly
affect the success or failure of your information security program. Without the end
user’s attention and cooperation, there can be no Information Security program at
an organization.
When Preparation Meets Opportunity, Excellence Happens ◾ 151
The movement toward professionalization within the IT security field can be seen
among IT security officers, IT security auditors, IT contractors, and system/network
administrators, and is evolving. There are two types of certification: general and
technical. The general certification focuses on establishing a foundation of knowl-
edge on the many aspects of the IT security profession. The technical certification
focuses primarily on the technical security issues related to specific platforms, oper-
ating systems, vendor products, and so on.
Some agencies and organizations focus on IT security professionals with certifi-
cations as part of their recruitment efforts. Other organizations offer pay raises and
bonuses to retain users with certifications and encourage others in the IT security
field to seek certification.
Over the years, I have seen many cases of attackers (both internal and external)
operating on company networks with impunity for months before being discov-
ered. Years ago, the initial reports were from government systems; lately, it has been
155
156 ◾ The CISO Journey
major banks and retailers making the same confessions. Why can’t we sense the bad
guys? What is wrong with our approach to intrusion detection?
Sadly, compromises go on all the time. In many cases, it is your own employees.
Fortunately, in most employee cases, it is a matter of them downloading licensed
software the company has on its file shares and using it for their own personal use
or obtaining personal data on other employees. Typically, it is not to cause damage
to the company or for personal financial gain.
Do not underestimate the damage employees can cause. Just a single breach can
cost a company hundreds of thousands of dollars not even counting the damage
There Are Only Two Kinds of Organizations ◾ 157
that may result to the company’s reputation. So you need to protect against a single
breach and not just mass penetrations.
Internal compromises are much more difficult to protect against. Employees
already have access to a multitude of systems and networks. The IT staff in most
cases pretty much has the keys to the entire kingdom. Certainly your database
administrators have access to a considerable amount of data. Your employees also
have a larger number of ways to get the data out of the building than your typical
external hacker. Employees can dump data to CDs, DVDs, thumb drives, external
drives, and even printers. They can physically remove storage media such as a hard
drive from a PC and secret it out of the building.
Lesson learned? Compromises are not just the result of outside actors.
There are a number of data loss prevention (DLP) tools out there that can help
stem the flow of information out of the building. DLP is a tool, not a panacea, as it
requires configuration and tuning to meet business requirements. Configuring and
monitoring these tools can be a challenge and even they cannot account for every
contingency.
Do you know how many e-mails leave your environment every day? If they
have attachments, do you know if sensitive information is contained within them?
A company with whom I work receives about 20 million e-mails per month. About
80% of them are spam or junk and not delivered. That leaves about four mil-
lion e-mails delivered. Assuming that 20% of them are answered, that results in
800,000 opportunities for an employee to send sensitive information in an e-mail.
That is about 26,000 chances a day including weekends. Depending on the type of
data loss experienced, an organization can suffer a variety of consequences, but in
nearly all cases, it’s both a financial and reputation cost.
158 ◾ The CISO Journey
Loss Types
We can divide data loss into two broad categories:
The first general category is referred to as Leakage. We see this when customer
databases are hacked, usually falling into the news category of Identity Theft. We
have seen hundreds of millions of identities and other sensitive data exposed from
healthcare firms, financial firms, and retailers. We also see this when an insider inten-
tionally or unintentionally sends sensitive information out in or attached to an e-mail.
Second is Loss. This is where the data are no longer available to the organization
from which they were stolen. This results in a loss of availability. Another incident
that falls into this category is the theft or loss of a laptop or thumb drive.
Consequences of Loss
As with other security incidents, data loss incidents can result in significant cost
and reputational loss. Costs to the organization might be much more severe and
could include liability costs or sanctions and fines that aren’t always covered by
corporate insurance policies. Additionally, the organization could face increased
litigation or regulatory scrutiny for years to come.
Prevention Approach
DLP is an enterprise program targeted on stopping various sensitive data from leaving
the organization. Today’s DLP systems allow organizations to specify rules to detect
sensitive information, which may be included in an e-mail or attachment. Many of the
current offerings come with predefined rules for healthcare, financial services, and so on.
At the time when DLP first came out, we were an early adopter.
The DLP came preconfigured with standard templates for all the
biggies: Social Security Number, Credit Card Number, and so
on. We installed, thankfully, in the warn not block mode, and
turned it on. It was as if we just launched a denial of service attack
against our security mailbox. As it turns out, one of our business
units had nine-digit part numbers. In the early days of DLP, the
systems were not sophisticated enough to differentiate between
the groupings of the numbers. Nine digits were nine digits.
Lesson learned? Tools must be configured to meet the needs of the business. Just
as in this case, out-of-the-box controls seldom work well in any business.
Sensitive data can be stolen by many means. Just taking screenshots of sensitive
data and e-mailing it as an attached image can foil most DLP tools. If you have func-
tions with access to sensitive data like a help desk, you may want to restrict their ability
to send to non-company e-mails from their desk. Most help desk providers that handle
credit card information have strict policies for the work environment. However, some-
times where the help desk function is not a major department, the risk is ignored. The
Payment Card Industry has specific requirements for handling credit card informa-
tion. It applies to all functions that process or store card data. The following is a sample
credit card information handling guideline/policy you can use as a basis for your own.
Guidelines
People usually get caught when they get greedy. The hacker that infiltrates your
environment can remain undetected if they limit the amount of data they move
across and out of your network. Small blips tend to go unnoticed. The thief walk-
ing out of your neighbor’s house with diamonds stuffed in his pockets is less likely
to draw attention than the one with the 65″ flat screen TV across their back. Even
though your system administrators can grab a lot of information very quickly, don’t
discount the damage that can be caused by the average user. Their thefts may be
smaller in nature but can go undetected for a much longer period of time, resulting
in a much bigger cost to the company.
The employee who walks out with a DVD or thumb drive will go unnoticed.
When they start carrying out whole PCs, then their crime spree will quickly come
to an end. It is precisely these small thefts that actually embolden the perpetra-
tors to escalate their activities. Back in the 1990s, New York City recognized this
phenomenon and enacted their “Broken Windows” concept of crime fighting. The
theory is that by cracking down on smaller offenses, there will be less likelihood
that bigger offenses will occur. The success of this program in New York would
seem to validate the theory. In the corporate environment, we need to similarly
crack down on the smaller offenses. Besides the very fact that downloading licensed
software is illegal and could jeopardize the company if caught by the vendor, by not
enforcing copyright laws, it sends a message to the employees that certain socially
162 ◾ The CISO Journey
unacceptable behaviors will be tolerated. Employees then continue to try and push
the envelope until they get caught.
The best way to keep employees honest is to have a zero tolerance policy for any-
thing not socially acceptable. I have to be careful using the term “socially accept-
able.” In today’s society, a lot more appears to be socially acceptable than in the
past. Probably, better that the company set the bar for what will be tolerated and
well publicize this position. Then, the company has to strictly enforce this standard
for it to carry any weight.
Employee screenings are becoming the norm across most industries. These are
going beyond just a drug test. People’s backgrounds and personalities are being far
more heavily scrutinized these days. Besides background checks covering financial and
legal history, employees are being subjected to psychological testing. We can certainly
debate the ethics of all of this by corporations, but it certainly can identify poten-
tial problem employees. Unfortunately, the risk of false positives clearly exists. Good
potential employees can be summarily excluded due to a bad credit check, not realiz-
ing they just went through a horrible divorce or had a major medical issue and they are
now trying to rebuild their lives. Preventing people from getting a job only accelerates
their slide into criminal activities. Guess which company might be high on their list?
replace them with lower-paid staff either from the local economy or by using off-
shore resources. This prevalent trend has caused employee loyalty to be a thing of
the past. Employee loyalty is a critical factor in reducing internal threats. In a poor
economy, expect greater instances of criminal activities. The Ponemon Institute,
which conducts independent research on privacy, data protection, and information
security policy, found in a survey conducted during the height of the economic
downturn that of almost 1000 laid-off individuals, an astonishing 59% admitted
keeping company data after leaving the business.
Corporations also tend to cut pay and benefits not only in poor economies
but also whenever they want to boost earnings and the stock price. Unfortunately,
these cuts are not across the board. While workers struggle to make ends meet,
executives are rewarding themselves with huge bonuses, pay raises, and other perks.
Resentment or worse by the employees is inevitable. What the executives fail to
grasp is just how much damage a single employee can wreak. Poor managerial deci-
sions related to employees may momentarily boost the stock but end up costing a
career. A Verizon data loss report found that individuals with insider knowledge
of organizations account for a significant percentage of all breaches. This same
report also revealed that each internal incident compromised on average 100,000
individual pieces of sensitive information. This is at least 60,000 more pieces than
the average external hack.
One approach that can be employed to guard against internal as well as external
threats to some degree is by rewarding the reporting of any suspicious behavior
that leads to identifying a bona fide risk to the company. People tend not to want
to get involved, so by providing incentives, this will help change their attitude.
Such programs need to be well crafted to avoid witch-hunts and personal vendettas.
Anonymity also needs to be guaranteed. If monitoring is part of a person’s normal
job responsibilities, then naturally their specific monitoring activities need to be
excluded from the reward program. Your employees are in the trenches each day,
so they would naturally be in a better position to detect things that are out of the
norm. If morale is very low in your company, do not expect great successes from
such a program. You might find the employees actually rooting for the bad guys.
Key Point: Be sure and get Human Resource’s buy-in for any suspicious reporting
program. It may be a good idea for them to monitor the reports and distribute them
for investigation. Whistleblower protection must be guaranteed or the program
will die.
So besides using your employees for monitoring purposes, there are other
options available to you. Cameras are a great deterrent to physical theft. There are
two trains of thought on the use of cameras. One is to make them very visible so
people know they are being watched. The drawback to this approach is once people
know where all the cameras are located they can figure out ways to avoid their con-
stant stare. Cameras in the bathrooms are forbidden. Carrying a stack of 50 papers
164 ◾ The CISO Journey
into the bathroom and coming out with 48 will be totally undetectable. People
also tend to dislike being monitored, so while a few cameras might be tolerated,
employee resentment will grow exponentially as more cameras are added. Cameras
should be sold to the employees as a safety feature and not a theft deterrent.
The other approach is to conceal the cameras. They will only act as a deterrent,
though, if you acknowledge their presence without revealing their exact locations.
You really should strive for deterrence and not apprehension. Catching the perpe-
trator after the fact may be too late, especially when related to cybercrimes. Plus, it
is better to prevent good people from being tempted to pursue criminal activities.
The one major drawback to cameras is that someone has to be monitoring them
for real-time prevention. Otherwise, you need to review the tapes, which are rarely
done unless a real or suspected incident has already occurred.
Let’s not forget that employees aren’t the only ones that have full access to
corporate facilities and assets. While the cleaners have historically borne the brunt
of accusations related to thievery, you also have physical security personnel, ven-
dors, contractors, and a host of delivery services. It does not take much to attach a
key-logging device on a computer and then retrieve it a few days later. While such
devices might be more easily detected on a laptop, few people peer behind their
desktop computers, which typically sit on the floor under their desk. There is a lot
to be said for utilizing dumb terminals.
We all have our way of doing things. We tend to get into a pattern and stick to
it unless something jars us from our routine. We may commute the same way to
work every day until one day you notice a speed trap setup along your route. We
get into routines at work as well. People might review logs a certain way, focusing
on particular items that their experience has taught them as being important. We
might use tools that we are comfortable using and never explore newer technolo-
gies. Third-party comprehensive audits are a necessity. You need an unbiased set of
eyes looking at your environment. Like the ecosphere discussed earlier, third-party
audits will shake up the environment and hopefully breathe new life into it or pre-
vent someone from taking the life out of it.
Not all employees are bad, but even the good employees can place the company
in jeopardy. Employees can cause a company breach in one of several ways. It can
be intentional with malice, your typical insider threat. It can be intentional without
malice, such as not following established policies or procedures in the mistaken
belief some greater benefit will be achieved. Lastly, it can simply be unintentional.
As we have discussed, it can include a visit to a malicious website or opening an
infected e-mail attachment.
By only allowing access to data on a “need to know” basis, you greatly reduce
your risks. This can be problematic with administrators typically having access
to everything. Segregating responsibilities so your administrators only have access
to certain pieces of the environment will help. Placing the sensitive data behind
another layer of security such as password protecting files or using file level encryp-
tion will also work.
There Are Only Two Kinds of Organizations ◾ 165
Key Point: Use tools designed to monitor administrative access (Super Users).
These tools monitor the actions taken by those with sweeping rights and log those
actions to a location NOT ACCESSIBLE to the system admins. You can use these
tools for internal or external super users, as we all probably have systems that are
administered for the company externally. The external auditors and regulators will
want to see proof that you do this type of monitoring.
Of course, you have to know what data are sensitive and who has a legitimate
need to see these data. Too often, the easy route is taken and everyone in a particu-
lar department or division is given access to certain data rather than really sitting
down and evaluating the situation. Determining whether access should be granted
based on an individual or a role is also a decision point that has to be made. In
general, it is better to use role-based accesses since it is easier to justify the role as
well as administer the access.
Whether the data are truly sensitive can be a challenge to determine some-
times. Data classification schemes help immensely but are difficult to implement
and support. Separating sensitive data from other data makes managing and secur-
ing the sensitive data easier. By placing your secure data in specific locations, you
can tightly control and monitor access. You need then only focus your DLP-type
scanning to the other areas of your network and not waste resources and time scan-
ning what you already know has sensitive information.
Auditing tools can greatly assist in determining who accessed what data and
when. The drawback to this is the size of the log files that are created. You have to
determine how long you wish to keep these data. Since some breaches go unde-
tected for months at a time, you may want to keep your log files for quite some time.
The best way to handle the intentional without malice situations is by strictly
enforcing the security policies and standards. Sometimes you have to make some-
one the example. It’s a painful lesson, but without it, employees will continue to
push the envelope.
The bad guys, just like everyone else, like to do things the easy way.
Compromising employee end points is a much easier way to penetrate a corpora-
tion than by directly attacking the networks. Vulnerabilities in operating systems
and applications that are left unpatched give the bad buys an opportunity to install
their malware on the employee end point devices. It is not difficult for the bad guys
to find the vulnerabilities. They increasingly are relying on exploit kits. Exploit kits
are prepackaged software that can recognize vulnerabilities and install a malicious
payload. It is commercial software available to hackers that can cost thousands of
dollars. New to the cyber attack world are those who will attack others for you for
a fee. The DarkWeb has many sites with price lists depending on what you want
and how many computers you wish to attack. The really scary part? Now you don’t
have to have mad technical skills to be a hacker, you just need a Bitcoin account.
The myriad of file-sharing sites, software download sites, music-sharing sites,
and so on are routinely exploited by the bad guys. While many of these sites are
166 ◾ The CISO Journey
known and can be blacklisted, new ones continually pop up. Your employee can
simply use their Internet search engine to search for the latest song by XYZ and
they will come across dozens of sites offering them the ability to download it for
free. Along with the free song comes embedded malware and the cybercriminals
are now in your environment.
Once inside your environment, the bad guys can operate at their leisure. Time
is on their side. Mandiant reports that the median time to detect an intrusion is
well over a year. They can steal your data little by little or use your resources for
other nefarious purposes. They may come and go and you may never even know
they were there. Charles Baudelaire, a French poet, once said, “The greatest trick
the devil ever pulled was convincing the world he doesn’t exist.” This is exactly what
the hackers hope to achieve in your environment. It is only because of a third-party
notification that most companies discover they have been compromised. An amaz-
ing 94% of victims according to Mandiant.
Cybercriminals come in several flavors. At the top of the food chain are
the state-sponsored cybercriminals, which are no different than ordinary spies.
They are at the top of the food chain because they are very well funded and
equipped. Collecting intelligence and corporate secrets is their primary objec-
tive. Normally, direct economic gain or causing harm is not their immediate
goal but not always. Sony was allegedly attacked by North Korea in retribution
for a film they were producing that cast North Korea in a bad light. The infiltra-
tors stole unreleased movies and distributed them across the Internet, causing
considerable financial harm to Sony. State-sponsored cybercriminals may also
cause isolated harm as they test their capabilities to be able to produce wide-
scale damage at some future time.
Next down on the food chain are the cybercriminals supported by organized
crime. In these cases, financial gain is the primary driver. While not as well funded
and supported as state-sponsored cybercriminals, they are certainly a force to be
reckoned with. Just like the bootleggers of the 1920s produced very powerful crimi-
nal elements, so does the Internet with its global reach and almost unlimited targets
of opportunity. The financial incentive is very strong for these groups to continue to
develop and expand their cybercrime resources.
Then you have organized groups with social agendas such as Anonymous. Their
intents can vary widely from just trying to make a political statement to actu-
ally imposing financial harm. Usually, they are striving to promote human liber-
ties, information ethics, and free speech, but their methods can be destructive and
illegal. What started out as somewhat harmless prank calls and the sending of
black faxes to waste fax toner to the Church of Scientology quickly escalated into
full-blown Distributed Denial of Service attacks. The power of such groups can-
not be underestimated. Anonymous took on the Los Zetas cartel, a Mexican drug
cartel noted for its brutality, when the cartel kidnapped a fellow Anonymous mem-
ber that they considered troublesome. Anonymous threatened to release details of
those sympathetic to the cartel if their comrade wasn’t released. He was eventually
There Are Only Two Kinds of Organizations ◾ 167
released. Whether you make toys or guns, there is bound to be some social group
out there that has issues with your company’s products, policies, or practices.
Further down the food chain are your lone wolves. These are people sitting
in the relative comfort of their home or some Internet café or even within your
own company using your resources to penetrate other organizations for personal
gain. We have all heard the stories of employees running side businesses from their
place of employment. The Internet has made this so much easier. These employees
can also make your company an unsuspecting target through their actions. Lone
wolves typically have more modest goals but can still cause considerable harm to
a company financially or to its reputation. Lone wolves can be socially motivated,
financially motivated, or revenge motivated such as a terminated employee or a
highly dissatisfied customer. The end result is the same; the company is harmed in
some way. In some ways, they are easier to catch due to less sophistication in their
tools and methods. Though by the time you actually catch them, the damage may
already have been done.
Lastly, you have the curiosity seekers. These are people meaning no damage at
all. Some are just kids experimenting with their programming skills. Others may be
honest White Hats looking for vulnerabilities that they can expose for recognition
of their skills and as public service. You may have employees just trying to find out
how their salary compares to others in the company. While no harm may be their
goal, nonetheless harm can result.
The real challenge is distinguishing among the different types of hackers.
Though, in the end, does it really matter? The potential for harm exists for every
type, so you need to defend yourself regardless.
In Information Security,
Just Like in Life,
Evolution Is Always
Preferable to Extinction
Many times, in our efforts to secure the business from all threats, we forget to
speak the language of business. Business must change as its customer base does.
They can’t sell to Millennials with the same strategies that they used to sell to Baby
Boomers. Millennials are tech savvy, want to use social media, want information
at their fingertips, and use technology to stay in touch. If you only advertise in the
169
170 ◾ The CISO Journey
Sunday paper and avoid electronic marketing, your company will go the way of the
dinosaur.
The function of information security is to allow the business to operate and
grow securely. If Security is not in lock step with the business, how can we enable
the business? If you are not in tune with the 3- to 5-year strategic plan for the busi-
ness, how do you know what to focus on for your strategic plan?
Case in point:
How about you? What would you have done, or did do? Personally, I was aware
enough to place the technology in my three-year security plan and let the com-
pany know that if this technology would proliferate, there would be costs and tools
required.
It is never pleasant when common sense hits you in the face and shows you
there is a lesson to be learned. I realized in that instant that as technology marches
on, we must design and implement compensating controls to allow the safe use of
new technology. We may be able to delay the introduction of new technology, but
we will eventually have to cave in. Taking a curmudgeon approach also makes the
security profession look inflexible and not tuned to the business. Staying an inflex-
ible course is the fast lane to career extinction.
A few years ago at another company, we had a major culture shift when an
industry-recognized company released a radically new piece of technology called the
iPhone. Most businesses were completely BlackBerry and there was not much toler-
ance for anything new. Today, the iPhone is pretty much the de facto standard busi-
ness mobile phone. BlackBerry, on the other hand, has basically gone the way of the
dinosaur, primarily due to its slowness and reluctance in adapting to the times.
In security, we can never rest on our laurels. The lion devours the slowest in the
pack. Though being the leader in the pack has its own set of perils. You could be
In Information Security, Evolution Is Preferable to Extinction ◾ 171
galloping full speed toward the edge of a cliff. When it comes to security, the safest
place might just be in the middle of the pack.
Simply from a morale perspective, you need to keep your systems up to date.
People don’t want to be working with outdated technology. It is not good for their
professional development and it makes their jobs harder since newer technology has
much needed new functions and features.
When I’ve needed to drive home the need to upgrade company systems, I’ve
asked during a meeting for business leaders to pull out their cell phones. I then
ask them how old their cellphone is or when was the last time they updated the
software. Chances are it is highly unlikely any are more than two years old. Why
should the company’s future ride on outdated systems?
Flexibility is also a crucial characteristic of the successful CISO. The easiest
target for the German U-boats (submarines) in World War II was the convoy ship
that continued on a steady course. The security afforded by the convoy was negated
if a ship would not zig now and then. Such maneuvers complicated the submarine
commander’s firing solution and could potentially put a greater distance between
the two adversaries, thus placing the ship out of reach of the submarine’s weapons.
The hackers are very much like a submarine. They are out there but we can’t
see them. However, they have us clearly in their sights. They are relatively small in
number compared to their potential targets yet can impart considerable damage.
US submarines in World War II comprised just 2% of the US Navy fleet, yet they
accounted for the destruction of over 30% of the Japanese naval fleet and over
60% of the Japanese merchant fleet. They take their time. They search for the right
targets. They probe for weaknesses in the lines of defense. When the time is right,
they attack quickly and then as quickly disappear into the depths, leaving chaos
and destruction behind. Modern submarines are maybe even more so like hackers
in that they are less interested in wide-scale destruction and more interested in
collecting intelligence without being detected. The longer a security breach goes
undetected, the better the payoff for the perpetrators. Once the breach is detected,
the value of the information gained drops off rapidly.
As a CISO, you need to recognize when things are not working and be will-
ing to “zig.” Even if things are working, changing things up a bit complicates the
“firing solution” for the hacker. Changing how you do things internally can reveal
weaknesses previously not recognized. As the saying goes, the first sign of insanity
is when you do things the same way all the time yet expect different results. Using
a different scanning tool now and then is a very effective way to find holes in your
environment missed by your standard tool.
problems getting yearly funding for the important security initiatives. Do you find
yourself saying, “The Execs just don’t get it?” Depending on how you answer the
above questions, you may have a credibility gap with the executives of your com-
pany. In fact, the execs may be saying, “The Security guys just don’t get it…we are
in business to make money.” The sad truth is that many good CISOs have lost their
jobs because they were viewed as out of touch with the business or irrelevant. It is
up to YOU to make sure that does not happen: it is bad for you and even worse for
the company. While you will have to develop what works for you or your company,
let’s discuss a sample method you can use to get started.
Foundation/Strategy
Just what is it that the business expects you to do? Have you ever asked? What do
you think you are supposed to do? Have you ever documented it? If so, what are the
gaps, and who is involved in negotiating the middle ground? Sounds simple, but
you’d be surprised at the number of CISOs who have a mission statement copied
out of a book with no thought of business linkage.
So, start with an assumption of your mission, where you feel you are now, and
a road map to get to where you want to be in the next one, two, and three years
(Figure 13.1). Document it with all assumptions that got you there, as well as any
interviews that supported the plan.
Foundation/ Mission
security strategy Roadmap
Starting point
High-level 3-year plan
Monitoring Assessment
Risk assessment
Communications tools Pen test
and governance
Security minimums
Business
Considerations
Current FY
FY deliverables tactical plan
Mitigation strategy
is a system or device installed with the default account and password still in place.
Once they get a foothold, it is just a matter of time until they escalate privileges
until they get an administrator account. When that happens, the battle is over, you
are owned. Let’s be straight, there is no such thing as a pen test failure. You have
taken the initiative to test and learn. When you understand how they got in, you
can develop effective tools and processes to compensate for any weakness.
The second phase is to have the team do an outside-the-network scan and test.
Similar to the first, you are looking for any weakness that could be exploited.
Key Tip: Be sure and define how far the testers can take action on any weakness
found. Finding and identifying a vulnerability is a lot different from exploiting
the vulnerability. Running an exploit may shut down or corrupt the target; if it is
a production system, that is probably not a good thing. Typically, I do not allow
exploiting a target on a test. If a finding is particularly troubling, I will schedule a
secondary controlled test.
could result in financial losses or adverse publicity to the company.” No geek bab-
ble, just a solid precise statement of what the risk is and why the company should
care. There are a lot of Internet resources available on the subject of identifying key
risks such as ISACA.org.
Now that you’ve defined a few risks, be sure to list them in a central repository.
I refer to the document or system as the “Risk Tracker.” It can be as simple as a
spreadsheet as long as it lists the risk, definition, impact (high, medium, low), due
date, and owner. Follow up and issue quarterly reports on progress to the executive
group. Be organized and professional above all: disorganization will never get you
good recognition or respect.
Strategic information
Process inputs Business integration security plan/portfolio
Risk assessment
and audit results
Security/incident
monitoring Investment
Business drivers priorities
Industry
benchmarks Updated
Innovation and ITS roadmap
Regulatory strategies
drivers
Resource and
training plans
Outside
intelligence
Member input
Process Inputs
Items to include when planning the projects and programs.
◾◾ Items from the Risk Tracker, Open Audit Items, any other risks identified. Be
sure and include action items to address any critical or high-risk items. You
must be able to show the Audit Committee of the Board of Directors that you
are making progress in reducing risk for the company.
◾◾ Issues related to compliance with existing or new policies and procedures.
They are not always yours so look around. It may be a new HR or Legal policy
that you must support and for which you must supply reporting.
◾◾ Security Incident/Monitoring issues must be accounted for in your plan.
What are you seeing? Is it different (type, intensity, source) from last year?
What steps will you take to remediate? Be sure and include actionable items.
If you remember the Target company breach, the papers reported that the
security staff ignored multiple alerts that something was going wrong. What
will you do to ensure that does not happen at your company?
◾◾ Benchmarks are critical. How many of you have been asked if the security at
your company is comparable to a competitor or partner? How will you know
if you have not asked? Find a few sources and have a meeting or call to dis-
cuss. Make sure you share information with the company as well as getting
data. Typical things to ask:
– How big is your staff?
– What are your key metrics that you report to management?
– What keeps you up at night?
– Do you have a formal set of policies? Have you implemented any new
ones and why?
– As a percentage of company revenues or IT budget, how big is your
budget?
– What are your key projects for next year?
– What new technologies are you looking at for this year?
◾◾ Regulatory Drivers are a major part of many security programs. Have you
kept track of the new and emerging regulations? If so, what impact will they
have on your projects? Are any technologies or processes required to support?
Do you expect any new regulations over the span of the strategic plan? What
are they and what was the source of the information? The successful CISO
gets out ahead of the changes. You have a chance to show that you are a leader
and a strategist, not just an isolated security function.
◾◾ Outside Intelligence is a critical piece of proactively identifying future threats
and trends that will affect your company. If you do not subscribe to a world-
class threat feed, get it in your budget and do so as soon as possible. You and
your staff will never get the inside information and actionable intelligence
that a threat feed will supply. I’m not just talking about the CVE vulnerability
176 ◾ The CISO Journey
feed. A good threat feed will supply plain English information as well as the
motivation for a threat. Is it financially motivated, or political or trade secret
theft driven? What country is the source? Do you have operations there?
◾◾ Member or Customer Input is critical as customers are the ultimate consumer
of your company’s products and services. How would they like to interact
with your company? What is the sales department saying about customer
feedback? Are there authentication problems? What are their concerns about
breaches and identity theft? All of these are drivers for your security pro-
grams, and they are a chance to tie your initiatives to a specific member or
customer desire.
Information security
Grow the company
and compliance
program goals
Europe
My best advice: start simple and small. Make sure it adds value and can be
understood in a stand-alone document for a nontechnical Board member.
Remember, we should never do security just for security’s sake. It must address a
business need; the better job you do in explaining it, the easier it will be for you to
get support and funding.
Deliverables: Telling the company what you will do, when, and why. The odds
are that the company doesn’t keep you around because you are so good-looking or
smart. Trust me, the company wants to know what it is getting from the money it is
giving you. Remember, the executives must make decisions about where to get the
best return on the limited capital they have to invest back in the company. You must
be able to articulate the value of your activities to the overall company success. Never
ever use a hammer to try and get money. Saying that a new regulation “demands”
that a project be funded is a self-defeating strategy. Instead, work with legal to define
the risk (financial, reputational) that noncompliance would bring. Also make sure
that the right people in your firm weigh in on the issue as there are many facets to
any regulatory or legal question. Make absolutely sure the execs hear a common line.
Risk Mitigation Plans must be clearly identified along with a cost–benefit
analysis of mitigating the risk. Be prepared to answer the question, “What if we
do nothing this year?”
Investment Priorities must be clearly identified so that the company can plan
the financials for the year. If a project will not start until the third quarter, state it,
and explain the rationale for the program being lower on the list than others. An
easy way of illustrating it is to use a simple scoring method. My favorite is to rate
each project against two factors; the first is the potential impact to the company
if the issue the project addresses is exploited, and the second is the maturity of the
EXISTING controls to address the issue. Figure 13.4 is a quick example.
High - 10
2
4
Project #
Intrusion 1
Impact if nothing done
detection
expansion
Digital 2
leakage 1
protection
Security 3
awareness 3
training
Two-factor 4
VPN access
Low - 1
High - 10 Low - 1
Effectiveness of existing controls
Capital Expenditures
Your next year plan should be accurate. Given the process you just went through,
there should be no surprises for the next 12 months. Months 13–24 should be
fairly solid, but realize that you will have the next year strategic planning cycle to
hone the numbers. Months 25–36 will be strictly projection. Why go through this
process? It lets the company know that you plan and have a process to address new
and emerging risks. It also allows you to project expenditures to the finance folks,
and they will appreciate the advance heads-up.
Operational Expenses
Same thing with the three-year cycle, but focus on two main exceptions: First:
Will additional headcount be required to support the business? The earlier the
planning starts, the higher your probability of success. Second, remember that any
Capital Expenditures will probably bring additional year-over-year maintenance
cost increases. A good projection is to take 20% of the anticipated CapEx, and
project it for an OpEx increase. Again, work with your finance group to detail the
specifics. Once you show them you care about the budget and you are proactive,
you will make a powerful ally.
As a CISO, one of the things you must do well is budget planning. It’s not
incredibly difficult, but missing a major project or budget line item can cause you a
significant yearend miss in your budget. You are expected to be a manager as well
as a technical resource and security guru. Many people in the company will judge
your effectiveness by how you fare in the financial management area. Regardless
of where your budget rolls up to, you must make sure the organization allocates
funding and resources to protect critical assets in a rapidly changing technology
and threat environment.
The most common scenario today is where the CISO reports to the CIO
because security operations and budgets are part of the IT department, and a major
portion of the security budget is technology driven. As the CISO role matures in
an organization, they will directly control more of the budget, whereas in an imma-
ture organization, the CIO will control the budget. My advice: Stand up and take
responsibility; trust is earned and you must earn trust through successful financial
management.
The CIO control of the security budget does have some conflict of interest issues,
in that funds can be redirected away from a security project to other IT programs.
Keep records, do good project management, and communicate frequently with the
180 ◾ The CISO Journey
CIO and program owner. You can’t always control what happens to the budget, but
you can control how you respond. Learn your lessons and apply it to the next budget
cycle. God knows I have quite a few scars from financial floggings over the years.
Change is constant, and budget planning is no different. Things will change
over the course of the year, which will push and reorder priorities. Be flexible, but
don’t take your eye off the ball. Build a strong relationship with the finance depart-
ment and find a person who can mentor you on how the organization plans and
executes budgets.
As a help, here is some advice for you as you get started:
1. Know the state of your current systems: As discussed earlier in this book,
know where your existing systems are in their life cycle. How many do you
have? Where are they in the support life cycle? Will support no longer be
offered or will it be offered at a significantly increased price? This planning
will go a long way in helping you avoid the surprise of a critical security
tool no longer being eligible to product support or updates, and you have no
money to replace it.
2. Know the status of your staff, both employees and contractors: Do you have
people who may leave or retire? If so, are you planning for agency finder’s fees
or relocation packages? These can be huge expenses that can kill a budget.
3. Benchmark: Find peers in the area or in like industries and compare your
budget as a percentage of IT overall budget, or as a percentage of company
revenues. This will give an indication of whether or not your company is
adequately funding the security program. The more comparisons, the better.
Be sure and take geographic issues into account. Don’t compare Minot and
New York wages without adjusting the cost of living and other supplier issues.
4. Work with Finance on new projects and programs to get “creative” with
funding: Just as the accountants are not cyber geeks, the odds are you are not
a financial wizard. The rules governing what is capital and what is operational
expense changes frequently. How expenditures are classed can make the dif-
ference in getting a project funded or not. You will have to build a business
case for any major project. Involve the finance folks early and often, so when
the proposal gets to them, there are no surprises.
5. Measure the effectiveness of your security program: A successful CISO
will measure the effectiveness of his or her organization’s security program.
There are a variety of frameworks to help managers achieve this goal. The
National Institute of Standards and Technology Cybersecurity Framework
and Assessment tool is a great way to establish your position on the maturity
continuum and monitor your progress to higher levels. The Federal Financial
Institutions Examinations Council also has an assessment tool that is very
effective. Complete the analysis of your current systems and establish con-
tinuous improvement plans. Establish a goal of where you want to be on the
maturity curve every year.
Chapter 14
A Security Culture Is
In Place When Talk Is
Replaced with Action
Introduction
Just like countries, regions, and communities, companies also have their own
inherent culture. There are a number of ways to define culture. For our purposes,
culture is a shared way of thinking, behaving, or working that exists in an organi-
zation to achieve a common goal. Once a culture is established, though, it is very
hard to change it without an influx of a large number of new people and ideas or a
catastrophic event. For the most part, company culture is a reflection of manage-
ment ideas and principles embodied in your employees. Employees are the public
face of a company since it is through employees that others interact on a daily basis.
181
182 ◾ The CISO Journey
The following will focus on some key areas that can have a major impact on
influencing a security-based culture. These various components of a security-
based culture, if addressed properly, can elevate the overall security posture of an
organization.
Training
Training non-security personnel can go a long way in breaking down barriers
between security and the rest of the organization. Security training, while needed,
and in many cases mandated by external requirements, tends to be viewed more as
punishment than as a true learning experience. Just one of those things you have
to do to get the checkmark in the box. Avoid at all costs the “death by PowerPoint”
type training or some generic computer-based training that is just a repeat of what
was seen and done in prior years. What people are most interested in seeing and
hearing are things that are directly relevant to them. If you want to get their atten-
tion, start talking about the foreign hackers that were detected and blocked by your
systems and staff. Talk about the person that was fired for taking sensitive data
home on a thumb drive. Naturally, you wouldn’t mention anyone by specific name
unless it was already printed in the newspapers, and if that is the case, you prob-
ably have much bigger problems right now. Show actual video of tailgating occur-
ring at your site. Bring in someone from the FBI to talk about threats to your very
company. Find a retired hacker to talk to your employees about how easy it was for
them to breach systems.
Security training is best approached collectively. Remember, security is not just
a problem for the security department but for the organization as a whole. Involve
your executives, management, and employees from all across the company into
the same room. Even include your key vendors and business partners, especially
for outsourced functions whenever possible. Such opportunities allow everyone to
share their experiences, thereby enlightening the collective group on the types of
threats they have each personally experienced. Such open and frequent discourse
will not only tend to unify the company in regard to security but also identify
where there are strengths and weaknesses in overall security awareness.
Training is your best opportunity to promote a security-based culture. You
really should throw out the annual user security awareness training. Such training
becomes a compulsory necessity rather than a valuable opportunity to inform and
educate. By having frequent interactive training, you will be able to better prepare
your employees for the current threats. Use these sessions to draw attention to the
tactics, techniques, and procedures being used by hostile actors to gain unauthor-
ized access into your environment. Rather than blindly patch a recently discovered
vulnerability, educate the employees on exactly what the vulnerability is, how it got
into the environment, and the danger it poses. Such frequent interactions not only
184 ◾ The CISO Journey
make your employees more knowledgeable regarding security but also make them
a more viable component of your defensive strategy.
Get the business and rest of IT directly involved in the security presentations
and training. Make them part of the show and ultimately part of the solution.
Every company has some very creative people. Security folks tend not to be right
brain thinkers. Creativity is needed to get the message across, which is why you
need to engage people outside of security to effectively promote a security culture.
Part of Walt Disney’s success can be attributed to his willingness to embrace others’
ideas. He said, “I use the whole plant for ideas. If the janitor has a good idea, I’d use
it.” Live presentations are far better than anything canned. Being able to interact
with others helps drive the message home. Effective training should educate the
educators as much as the students.
It is hard to imagine a corporate culture where people don’t enjoy having a little
fun. Incorporating security into enjoyable activities will go a long way to making
security a notable part of the corporate culture. Have people identify security lapses
in a recent TV show or movie. Critique the infamous Red Wedding episode from
Game of Thrones or the episode where Jon Snow was murdered. Security is more
than bits and bytes; physical security is equally important. There are a number of
TV show episodes where one could have a lively debate on the efficacy of their data
security. How often does a document on a copier or printer end up in the wrong
hands?
Put on security-related contests and competitions. Create trendy calendars with
a security theme. Have celebrations based on meeting security milestones such as
running a phishing exercise and beating the previous threshold. Take full advan-
tage of National Cyber Security Awareness Month, which occurs in October, to
promote security awareness and a security-based culture. Use training as a means
to educate not only the users but also your staff to the pain points the business and
rest of IT are feeling and use this opportunity to try and develop ways to make life
easier for all parties involved.
An effective way to conduct training is to construct it similar to how one obtains
a college degree. Provide electives and mandatory “courses.” Have different types of
“degrees” a person can achieve based on the courses they take. Structure the train-
ing so people can actually obtain industry-recognized security certifications. In
this way, people can focus on areas of interest and obtain the type of training they
need for their individual jobs and commensurate with their capabilities. People
learn better the things they embrace and choose for themselves over things they are
forced to consume.
Effective training is your best means of creating a security-based culture. It gives
the workforce the knowledge and tools they need to be a valuable component in the
organization’s overall security structure. It all boils down to resource management.
Use everything you have in a constructive matter to achieve a desired goal. Ignore
the contributions your employees can make to security at your own peril. Training
should actually be removed from your lexicon and replaced with employee security
A Security Culture Is In Place When Talk Is Replaced with Action ◾ 185
Basics
What tends to happen is security professionals get too wrapped up in the technical
aspects of security. While knowing something about SQL injection and cross-site
scripting is important, unless the employees understand basic security concepts,
this techno jargon will only confuse and alienate them. This will be very detri-
mental in the process of creating a security-based culture. Introducing the more
technical aspects of security to the employees will keep the conversations fresh
and interesting, but only after they have fully embraced basic security concepts.
These concepts and the technology associated with them need to be conveyed to the
employees in quick and easy-to-understand terms. Security is not their primary job,
so there won’t be a lot of effort on their part to grasp the concepts if it turns out to
be difficult to learn on their part.
It is important to convey to the employees not only basic concepts presently
embraced by your company but others typically utilized throughout industry as
well. As an example, consider two factor authorizations. Some companies use this
technology while others do not. Educating the employees on the benefits of a tech-
nology or process not currently utilized will make it easier in the future to intro-
duce such a technology or process. Prior training and awareness reduces the fear
associated with change.
Passwords are one of your greatest security risks since they are the keys to the
kingdom. Most users are rather careless about how they manage their passwords.
Password management is a very basic but extremely important concept to include
in employee awareness. Don’t place too much emphasis on how to make effective
passwords if your applications force you to regardless. Rather, offer secure ways
employees can manage their multitude of passwords. Providing options to writ-
ing them down such as approved password managers goes a long way in reducing
this risk. Implementing single sign-on systems is a double-edged sword. While it
reduces the risk of people writing down their passwords, it also means a hacker
only needs to crack one password to gain access to multiple systems. Single sign-on
systems provide a good argument for two-factor authentication.
The importance of keeping devices and laptops updated has to be stressed.
While most companies have automated this process, employees should be taught to
verify their devices are indeed being routinely updated. Occasionally, a device will
slip through the cracks and not be updated. It only takes one vulnerable device to
open the door to a hacker. Remember this truism, as a CISO, you have to be cor-
rect 100% of the time; the hacker only needs to be correct once. If your users can
directly download applications to their devices (not really a good idea), then these
will most likely not be part of the corporate automated updates. The user will have
186 ◾ The CISO Journey
to update these independently. Users need to be educated on this and take respon-
sibility for doing this regularly.
Automated update processes are only good if they are achieving the desired
results. Security patches need to be implemented as soon as possible. In many
cases, such patches cannot wait till the normal patch cycle. Patching once a quar-
ter is not conducive to promoting a security-based culture. The more often you
patch, the better. Patching needs to be all-inclusive. You cannot exclude certain
systems from the patching for fear it would break the system. If the system is
that fragile, then every effort should be expended to replace the system. Patching
should also not be limited to just operating system security patches. Application
security patches need to have the same level of urgency and attention. Many
third-party applications pose a greater security risk than the operating system
itself.
Something I don’t see a lot of anymore is laptops and desktops that are secured
via cable locks. Securing these devices with cable locks sends a clear message that
this is a company that takes security seriously. If theft is a problem in your com-
pany, then this should be a no-brainer. Carrying out a laptop is rather easy in most
organizations and the data on most laptops can be quite sensitive and used to your
company’s detriment in the wrong hands. A password-protected laptop provides
little defense once the device leaves the building and is in the hands of a dedicated
hacker.
Need to know is the foundation by which access is granted to systems and
data in the military. The same sort of rigor should apply in your organization
if not already mandated by various auditing agencies. No one in your orga-
nization should ever need access to everything all the time. A consistent and
well-documented access policy needs to be in place. Accesses that are granted
likewise need to be well documented and continuously monitored. The more
granularities in the accesses granted, the better. Accesses should be restricted
by/from location, time of day, environments (Development, Test, Production,
etc.), operating system, application, and so on. Those that develop the software
should never have access to it once it is in production, commonly referred to as
separation of duties. Similarly, those with access to a system should not have the
ability to modify the logs associated with that system. A comprehensive system
of checks and balances should be in place to reinforce the notion of a security-
based culture.
A very basic concept yet one that receives marginal attention in many organi-
zations is asset management. If you don’t know what you have, how can you pos-
sibly protect it? Everything in your environment should be tagged, documented,
tracked, and monitored. What you should have is a literal chain of custody. This
does not just involve hardware but software as well. Applications and databases get
loaded on servers that people quickly forget who or what they are for, and there they
sit for ages since everyone is afraid to delete them for fear someone just might be
using them or need the data contained therein.
A Security Culture Is In Place When Talk Is Replaced with Action ◾ 187
The above basics have been shown to thwart many of the most common attacks.
They are effective measures to employ to prevent data breaches. They are cost-
effective and simple to employ and will be easily embraced by your employees.
They are fundamental to a security-based culture and can help reduce the workload
on your scarce security and IT resources. Leave the fancy security measures to your
trained security staff.
If your executive leadership sets the example by choosing to follow these basic
secure behaviors, it sets the right tone for a security-based culture. If they fail to
follow them, employees will not have any clear incentive to comply. Security will
be an afterthought rather than a prime directive. Your executives must embody
organizational security.
Technology
A security-based culture is more than just people and process. It also involves
technology. Yet, a security-based culture does not necessarily mean you have to
increase your budgets or apply greater effort. Rather, it means changing how
you do things and thinking differently. A great deal of technology is required if
one wants to position an enterprise for the best chance of resiliency in an ever-
changing threat landscape. If you were to inventory the technology you currently
have, you might find that a lot of it is underutilized, improperly utilized, or shelf
ware. People and processes, if properly applied, can help reduce the amount of
technology you need to deploy and manage and better utilize the technology you
currently have in place.
The breadth and depth of technology employed and how people view it play
a role in defining the security culture of an organization. Even the specific man-
ufacturer of a group of technologies can define the security-based culture. Very
often, we hear people refer to their location as a McAfee or Symantec or Cisco
shop. Technology coupled with such things such as training, user awareness, policy
guidelines, and information sharing on threats both internally and externally is
what will define the security-based culture of an organization.
Fear of change and the comfort associated with the status quo are huge
impediments to moving an organization to a new culture. History has shown
that companies that fail to change with the times tend to fail. When it comes
to security, failure to adapt is a definite path toward a breach. While those
Windows 2000 servers may be working fine and your staff is fully adept at man-
aging them, sometimes you just got to let go. Just like I gave up my leisure suits,
I also have let go of old technology no matter how much I liked the technology.
When it comes to security, the axiom “If it ain’t broke, don’t fix it” doesn’t really
apply.
Unless the security technology is simple to use and understand it is best not
to push it down on the employees. It will either not be used or used improperly.
188 ◾ The CISO Journey
Data Security
Security needs to be promoted as being there to protect the employees and not just
the company. Protecting the company is simply an added benefit. The organiza-
tional culture needs to be one that values and respects confidentiality and privacy.
While hackers pose a serious threat to businesses because they steal corporate-
sensitive information, they can also compromise employees’ personal and medical
health information. Personal data are just as valuable as corporate data on the dark
web. Both an organization’s and an employee’s reputation can be damaged through
a security breach.
Security requirements need to be included in the recruitment of employees to
ensure they will contribute positively to the security-based culture. Any new arrival
to the organization such as new hires, contractors, and vendors must be made
familiar with the values, traditions, and requirements of your company’s security-
based culture. Data security along with data privacy must be emphasized.
Security needs to be part of everyone’s performance reviews from top to bot-
tom to facilitate inculcating a culture that embraces security. Rewarding people
for executing good security practices goes a long way in moving to a security-
based culture. Promotions should be partially contingent on a person’s contribu-
tions they have made to support a security-based culture. The dilemma we face
is balancing security while trying to instill a culture of trust. Without trust,
you create a potentially hostile environment and one where work is certainly
A Security Culture Is In Place When Talk Is Replaced with Action ◾ 189
version was released. Strangely, this problem never seemed to occur in a BYOD
environment.
The amount of data even a small company deals with on a daily basis is astound-
ing. Not only does data flow into a company but a great deal is generated internally.
Most data have a finite useful life span, but in many organizations, the data seem
to live on forever. The original intent and purpose of the data tends to get lost in
time and there is a general reluctance to delete the data for fear someone just might
still need it. Maintaining and protecting these data is a huge expense as well as a
potential liability. In a security-based culture, employees realize that all documents
must be appropriately labeled and have defined retention periods. Automated dele-
tion processes are a CISO’s best friend. Everyday documents, both physical and
electronic based, should be destroyed as a matter of course. All documents need to
be protected in some manner from the moment they are created until the time they
are destroyed. While individual documents may not pose any security concerns,
the aggregation of apparently benign documents can bring to light highly sensitive
information.
Productivity
Security tends to be viewed as an impediment to productivity. My staff has been
referred to in the past as “Checkers” that do little other than identify vulnerabilities
and add workload to the rest of IT to address their findings. This is a dangerous
attitude to allow flourishing since it creates a culture of “us versus them” rather
than a cooperative environment. One can argue that if proper security policies and
procedures were followed, then there would be no need for the “checkers.” Such
reasoning fails to recognize that not everyone is an expert at security and only rein-
forces the “us versus them” culture. Security should never be viewed as a hindrance
to achieving corporate objectives.
Should that be the case, then security is an insignificant component of the over-
all culture of the corporation. Security needs to be seen as an enabler. A person who
is not part of the security department may view security as someone else’s respon-
sibility. Such a person sees security as having very little to do with anything that
person does or fails to do. It is important to view a security culture as the sum of
the environment; that of pure security-related positions and that of non–security-
related positions. Understanding the differences between security and non-security
personnel is vital to a balanced and appropriate security-based culture. While most
employees will take some degree of ownership of security, it is likely that there will
be divergent views among the workforce.
Unfortunately, security is not an idea or concern of high import to most lead-
ers unless you are a CISO or happen to work for a security-related business. On a
positive note, though, this attitude is changing. What is in the forefront of most
leaders’ minds is making the numbers. The culture then is one of productivity,
A Security Culture Is In Place When Talk Is Replaced with Action ◾ 191
efficiency, and a general work ethic. Security is rarely viewed as having a positive
contribution to any one of these. Leadership typically doesn’t think about security
until the organization is violated in some manner. As we know, blame then tends
to roll downhill, with the CISO bearing the brunt of it.
Changing the mindset of the leaders to recognize the importance of security
is a difficult task for a CISO. Unless the CISO has access to the company’s Board
of Directors, their efforts are further impeded. The Board exerts a considerable
influence over the direction and culture of a company. The CISO needs a seat at
the table with the Board, or at the very least, a direct conduit to one or more Board
members to provide an unfiltered overview of the company’s security posture.
The CISO’s relative position in the company will clearly determine how impor-
tant security is viewed within the company. Ideally, the CISO should be at the same
level as the CIO to ensure security has the same standing as operational matters.
Since security is directly related to the level of funding available, it is important that
security be high enough in the food chain to not have to fight for whatever scraps
remain. Products and services tend to garner the most attention and the most fund-
ing. The best products and services can become worthless overnight without a solid
security infrastructure in place.
Security is like an insurance policy. You know you need it but it is difficult to
see any return on investment. How much you spend on security is similar to what
you spend on an insurance policy; it is a matter of how much risk you are willing to
accept. Quantifying that risk though is a major challenge. The costs to a company
for a security breach are pretty well defined across the industry, but the likelihood
that a breach will occur is a lot harder to put a number on. There is a good argu-
ment to be said, though, that it is not really a question of if you will be breached but
rather when. A strong security culture will certainly help push the timing out a bit.
If you have teenage drivers, then you certainly recognize you are at a higher risk
and the insurance companies do as well to your detriment. Leaders, though, may
not necessarily recognize the level of risk their company or even industry segment
is exposed to. The fact you have not been breached develops a false sense of security,
reinforcing the notion that attention and resources can be devoted to areas outside
of security. This false sense of security is reinforced by the reality many companies
do not discover they have been breached until months after the fact. A certain level
of fear is not a bad thing to inculcate in your company culture. A security-based
culture is a lot like car seat belts. At one time, seat belts were an anathema to driv-
ers. Having never been in an accident, most drivers saw no need for them. Now, it
is rare for anyone not to buckle up in the car, though that nagging seat belt warning
bell might have a little to do with it.
Financial institutions are the first to come to people’s minds as being at high
risk. Yet, while people tend to focus on security breaches being driven by monetary
motives, even a nonprofit can be at considerable risk from those trying to make a
political statement or simply gaining access to personally identifiable information
to be used for other nefarious purposes. The smaller, less likely targets may actually
192 ◾ The CISO Journey
Communication
Communication is an integral part of a security-based culture. Without effective
communications, it will be impossible for employees to become active participants
in the organization’s security efforts. Communication takes many forms. It can be
verbal, visual, written, or a combination thereof. It can be top-down such as pol-
icy guidelines that are directed from executive leadership, or it can be bottom-up
A Security Culture Is In Place When Talk Is Replaced with Action ◾ 193
policies but don’t rely on it as an effective communication tool. Unless you have
a really interesting site with lots of real-time feeds to keep the content fresh,
you are not going to find a lot of people saying, “I need to go visit the security
intranet site today.” If you have a closed circuit TV feed in your company, ensure
that it has a security component to it. Like a moth to a flame, TVs do attract
people’s attention. Make sure, though, that you refresh the content. People don’t
like reruns.
Use your corporate experts in tailoring your communication channels and
crafting your communiqués. Marketing folks are quite good at this sort of stuff.
That is why they are called marketing. If you are really lucky, you might have a
separate communications group. They are even better at this than marketing, that’s
why they are called communications. Security is rarely viewed as a great commu-
nicator. Security is seen more as the cloak-and-dagger type hiding in the shadows
watching your every move. Consider many of us work in confined spaces behind
locked doors with no windows and lots of monitoring equipment; there might be
an element of truth there.
Security needs to work hand in hand with the rest of IT and the business. Being
an integral part of new initiatives as early as possible in the process will mitigate the
consequences of subsequent security checks. Security needs to promote a culture of
openness and assistance. Individuals need to feel they can come to security without
fear of retribution. When groups avoid interacting with security, you have a culture
problem. Walt Disney recognized the importance of communication. In his words,
“Direct and easy communications—freedom of speech in all forms and its broad-
est sense—has become vital to the very survival of a civilized humanity.” This is
equally true for a corporation.
Communication means opening up the kimono a bit. Security issues and inci-
dents tend to be kept behind closed doors. Unfortunately, you will never build
a security-based culture if no one is aware of the very real threats that exist in
their company. Imagine considering moving into one of two communities. One
openly publicizes their crime statistics and the other does not. If you were unaware
that the one does not publicize its crime statistics, you would probably feel more
secure living there since it has no crime, but this would be a false sense of security.
Knowing the true crime statistics gives you the ability to make a more informed
decision. Another example would be deciding between buying two used cars, one
has a detailed report highlighting the life of the car including accidents it was
involved in while the other does not. Which would you be more comfortable own-
ing and driving? Giving your employees security-related information allows them
to be more informed and more sensitive to their cyber surroundings and eliminates
an otherwise false sense of security. If you publish the fact there were X number of
phishing attempts against your company in the last week, then employees might be
more reticent about opening up that attachment for a free vacation.
A Security Culture Is In Place When Talk Is Replaced with Action ◾ 195
E-mail
E-mail is a necessary component of business. Unfortunately, it is also a hacker’s
easiest way to infiltrate a company. Having a well-trained workforce as part of a
security-based culture can go a long way in mitigating this vulnerability. An alert
and savvy employee is your best line of defense against this sort of threat. Everyone
in a company needs to understand the risks of clicking on an attachment or a mal-
ware embedded link in an e-mail. The expenses incurred in time and labor as the
result of someone being deceived into opening a malicious link or attachment are
substantial.
One way to bring home how easy it is to be breached via e-mail is through a
phishing exercise. Conduct such an exercise before your security training and then
show the results. Talk about the executive who clicked on the link not once but
seven times or the person who e-mailed their login credentials in response to the
phishing exercise. Educate the users that social engineering and spear phishing
e-mails are used to target one particular class of worker and may not target others
within a company. They can be highly personalized and extremely convincing. It is
still crucial that everyone in the company be mindful of what these types of exploits
entail. In a security-based culture, users are no longer complacent when it comes
to e-mails. They should know how to recognize and check suspicious e-mails and
know what actions to take should one be received.
E-mail also carries the risk of disseminating company-sensitive data.
Employees need to be made aware of what is not acceptable to include in an
e-mail, especially those destined for outside the corporate domain. A data loss
prevention (DLP) system can help but it can’t catch everything without affecting
productivity due to excessive false positives. As an example, an invoice number
might appear to a DLP system to be a social security number or credit card
number and get quarantined. Time and effort then must be expended to validate
its contents. Even personal e-mails to family and friends can innocently include
information on corporate initiatives that are not ready for public consumption.
Such information in the wrong hands could seriously affect a company’s market
strategy.
Many a person’s career has been ruined due to an ill-advised e-mail. Think twice
before hitting that send button. If it is company e-mail, then it should pertain to
company business. Don’t use the corporate e-mail system for personal e-mail. This
can be difficult since many companies restrict access to personal e-mail accounts
but nowadays almost every cell phone supports e-mail so you are not completely
cut off. E-mail systems should have defined retention periods with auto deletion.
E-mail is a huge financial liability when it comes to any legal discovery. The more
you have, the greater the costs. E-mail also tends to become a document manage-
ment system. Auto deletion mitigates this problem.
196 ◾ The CISO Journey
Morale
Corporate culture has a direct effect on employee morale, which can have a sig-
nificant impact on the security posture of a company. We all know that the big-
gest threat to security is from an insider. Low morale increases that threat. Even if
employees don’t take any overt actions to subvert your security, they are less likely
to proactively address indications of a potential threat. There are many ways to
gauge the morale of a company such as turnover, absenteeism, work ethic, and the
extent of social gatherings. There are many behaviors that can disrupt groups and
impact morale. Whether someone is liked or not does not matter. Your attention
needs to be focused on addressing bad behaviors. Some of the behaviors to watch
out for are sexism, abusive behavior, gossip, and creating conflict between individu-
als or groups.
Whether low morale is endemic or isolated, it needs to be addressed. It only
takes one bad actor to cause a breach or bring down the morale of others. While
company culture can affect morale, likewise morale, both positive and negative, can
have a huge impact on the culture of a company. While you can’t please everyone,
a positive culture will minimize the influence of the disaffected. If the attitudes of
the few cannot be improved, then you will be doing yourself and them a favor by
severing the relationship. Just the act of showing a genuine concern for their issues
and feelings can go a long way in improving the morale of an employee. You simply
cannot afford to ignore the matter and hope it will go away on its own. It won’t
and it will most likely get worse. Never let security violations just pass without any
sort of action on your part. When security abuses are ignored, they then become
habitual and adopted by others eroding the social fabric of a security-based culture.
Chronic security violators have the same detrimental effect as an outside infiltrator.
It is important and necessary to set clear boundaries.
The importance of a security culture has been officially recognized in what is
known as the Security Culture Framework. This is a free and open framework to
build and maintain a security culture in any organization. It is certainly a useful
resource to help guide a security-focused culture change in your organization. The
starting point in the Security Culture Framework is establishing metrics to mea-
sure progress in instituting a security culture. You need to ascertain your current
posture and identify where you want to end up. You can’t change what you don’t
monitor. Measure only what you feel you can realistically change. Metrics are fre-
quently abused, resulting in collecting a lot of useless data.
To effect any change, you have to involve senior management, for without their
support, there will be no change. Getting their support will be a challenge since,
as previously mentioned, security is not normally one of their priorities. Support
has to go beyond just lip service. People see right through that. If the leaders aren’t
committed, the employees surely will not be either. Human Resources should be
a major player in your efforts to create a security-based culture. They are typically
well versed in human nature, change management, and corporate culture. Don’t
A Security Culture Is In Place When Talk Is Replaced with Action ◾ 197
expect results overnight. Corporate culture has a lot of momentum. It will take a
lot of time and effort to change directions. To achieve long-term results, you will
need to carefully craft a plan to build the security culture you want and follow the
plan over the course of several years, carefully monitoring the metrics you have put
in place.
Jurgen Habermas (1929), a German philosopher, defined a modern society as
one that is able to examine and criticize itself. Such self-examination is needed
to enhance the security culture of a company. Employees must be able to have
a free and open dialogue about security. An employee should never be reticent
about expressing concerns they have regarding security for fear of retribution. To
accommodate those that fear “big brother,” put up a security suggestion box and
you might be surprised at the submissions you receive. Pleasantly surprised that is.
People tend to be more open under the cover of anonymity. Habermas succinctly
stated, “One never really knows who one’s enemy is.” The suggestion box may help
you in this and other areas.
Noam Chomsky (1928) is an American political philosopher that has ques-
tioned whether our political rulers are actually more ethical than those of for-
eign governments. Chomsky espoused that citizens should examine the facts and
not accept government pronouncements at face value. The same can be said for
employees in regard to their corporate leaders, especially when it comes to security.
Corporate leaders tend to downplay the security threat that exists. Chomsky said,
“Either you repeat the same conventional doctrines everybody is saying, or else you
say something true, and it will sound like it’s from Neptune.” Being receptive to
differing opinions builds a culture of trust and openness. A good security culture
is one where you don’t need the suggestion box anymore because people are willing
to express themselves. As the amounts of suggestions you receive begin to dwindle,
this is a good sign you are transforming the culture in a positive way. As a CISO,
you do need to stand up for your convictions. If the CEO, President, or Board is
downplaying security, you have to alter their thinking. Remember, the corporate
culture springs from the top. You need them to set the tone for a security-based
culture.
Workplace
An unattended computer is a perfect opportunity for you to make a lasting point.
Use the occasion to send yourself a rather critical e-mail from this machine. Then,
A Security Culture Is In Place When Talk Is Replaced with Action ◾ 199
call the person into your office to have them explain themselves. Show them the
e-mail. It is doubtful they will ever leave their PC unattended again and no harm
was done in the process. The grapevine will quickly spread the word not to leave
one’s PC in an unprotected state. Your reputation might also be enhanced among
the workforce when it is relayed as to how magnanimous you were in handling the
situation considering the content of the e-mail.
Clean desk policies are not a bad idea, though you have to be willing to walk
the talk. If you’ve seen my desk, this would be a challenge. With every phone hav-
ing a camera, it is so easy to get a quick copy of anything these days. The poten-
tial to acquire sensitive information increases after normal working hours. Regular
staff has left the facilities and is supplanted by various contract resources such as
maintenance personnel or cleaning staff. It is always entertaining to see the highly
secure sensitive paper disposal receptacles throughout a building yet the material
that ultimately ends up in these receptacles lies openly on many desks. Another
way to make a point is to pick up some of these papers and post them on a bulletin
board in your office highlighting the sensitive information, a wall of shame. You
will need to ensure, though, that you have an office that can be secured and that
has no windows, or you are just as guilty of not protecting sensitive information.
Speaking of windows, this is an area that is not given much thought except in
department of defense circles. Go outside your building some time with a good set
of binoculars and see how many computer screens you can actually read. A lot of
sensitive data can be gathered by just sitting out in the parking lot. Taking a picture
of what you can see from outside the building could really drive home the message
of how easy it is to gather information from a company. Repositioning computer
monitors so as to not face the windows or providing filters that obscure them from
any angle but dead on will reflect a security-based culture. Don’t rely on users to
lower the shades when they happen to be working on sensitive information.
Rather than scatter the secure sensitive paper disposal receptacles around the
office, put a personal shredder in every office that handles sensitive material. I hate
to say it, but people are inherently lazy. Chances are a lot of sensitive material ends
up in the regular trash. Making it easy to shred documents will help ensure sensi-
tive data is properly disposed of. Make it a policy to shred all paper products, not
just sensitive documents. Sometimes, people don’t realize what is and is not sensi-
tive. Shredding everything eliminates that concern. It also reinforces the concept
of a security-based culture.
Cell phone cameras are problematic. We have all been in meetings where every
square inch of a whiteboard is filled with the collective knowledge of the assembled
group. Rather than risk the loss of this mind dump, the cell phone cameras come
out and the knowledge is saved for posterity on a dozen phones you have little con-
trol over. Replacing whiteboards with electronic equivalents would help mitigate
this situation. Restricting who can take the pictures and with what devices might
reduce some of your exposure. With everyone these days having a PC, collaborative
idea generation-type software may be a viable solution.
200 ◾ The CISO Journey
Your security-based culture has to extend beyond the walls of your organiza-
tion. It is a scary world out there. Your employees may very well be already targeted
to gain access to your company’s secrets. Social engineering is highly effective at
acquiring the information needed to get through the barriers you have so painstak-
ingly put in place. The cloak-and-dagger approach of seducing the target at a neigh-
borhood bar while still in use and certainly effective is being supplanted by taking
advantage of the wealth of information readily available through social media. It
is amazing the information employees freely post in social media. Such informa-
tion not only threatens your company but can pose real grave danger to them. A
cursory scan of various social media outlets where you can see your employee posts
may identify some serious security exposures. Education and training are your best
defenses against this threat.
Organizations that support BYOD must ensure that comprehensive policies are
in place to protect not only the company but the employee as well. Such policies
need to guide employees on the safe usage of these devices both inside and out-
side the corporate walls. In essence, anything accessed outside the corporate walls
should not be trusted by the employee or the corporation. Additional safeguards
will need to be put in place through technology and process. BYOD has many
benefits for the company and the employee, but it requires additional work on the
part of management and the security department to ensure its safe execution. For
example, anything you would expect on a corporate device such as antivirus protec-
tion will equally need to be found and verified on any BYOD apparatus.
User education on BYOD and a higher degree of monitoring are definitely in
order. Employees must understand the importance in maintaining the same robust
security standards at home as they do at work. A security breach at home has poten-
tial work implications as well. Acceptable online behaviors need to be communi-
cated to include the types of information that should not be shared on social media.
This will help employees reduce security risks at both their homes and their places
of work. A security-based culture has to extend from the workplace to the home.
Conclusion
A security-based culture will make you more effective. Nothing can guarantee
safety, but a security-based culture will improve the odds. Just like you need to be
streetwise when walking a city street, you also need to be cyberwise when strolling
through the Internet. Your employees make decisions every day that can potentially
negatively affect the security of your business, usually without even realizing it.
When employees are grounded in a culture of security, there is far less potential for
improper actions. A primary motivation for a security-based culture is that it can
help with the alignment of security with the business as a whole. Having a security-
based culture is a means to an end. It allows you to achieve and maintain other cor-
porate objectives, such as meeting various outside security audits and regulations.
A Security Culture Is In Place When Talk Is Replaced with Action ◾ 201
203
204 ◾ The CISO Journey
So, what did I do wrong? Should I have given permission to move the applica-
tion to pilot? I think that my decision was appropriate given the visibility and the
limitation of it being an “internal only” deployment. Should I have assigned my
staff to ensure it was not exposed to the Internet after deployment? Absolutely yes.
I should not have trusted that the team would do as it promised given the risks.
The original phrase “Trust but verify” was made famous by Ronald Reagan in
December 1987 after the signing of a treaty with Mikhail Gorbachev. The Russian
leader quipped, “You repeat that at every meeting,” to which Reagan replied, “I
like it.” The origin of the phrase is actually from a Russian proverb, doveryai no
proveryai (trust but verify). However, “trust but verify” is an oxymoron when you
consider that the word “but” usually changes the meaning of the whole statement.
I remember the painful high school dating discussions that started with “I really
like you, but…” We’ve also all had the performance reviews that started with “You
are really good at your job, but….”
I’m not talking about “blind trust.” In management training classes, I’ve been
told that blind trust is not a sane strategy to employ across all decisions in a low
trust world. For instance, if you ask the clients that trusted Bernie Madoff, they
would probably say that they would have achieved a better result if they had veri-
fied what he was actually doing with their money. In our security world, CISOs
are tasked with protecting the company. Understanding that people have different
motivations, ethics, and values, it is not possible to put absolute trust in others, and
if we do, I’d argue that you are not performing the job for which you were hired.
A “trusted” insider can do more damage than any external hacker. Let’s look at a
couple of real-world incidents and then discuss what could be done to detect and
limit the damage of their actions.
taking credit for others’ work. They were happy he was finally
gone. What they didn’t know was that even after he was gone,
he had left a small program that continued to work.
When he first started, he was an IT superstar. But, as the
company grew and more people were hired, he began to feel
like his talents were no longer appreciated, and he felt his
assignments were of less importance than before. Rather than
stepping up, he decided to get even unless things got better. In
early 1996, months before his firing, he began testing a little
program that would be triggered at a specific date, running a
simple line of code that would delete a certain sector of the
main server. It was an incredibly simple piece of code that goes
as follows:
1. 7/30/96
The date is the triggering point in the code string,
executing the rest of the commands as long as it is after
July 30, 1996.
2. F:
This line of the code gives access to the server.
3. F:\LOGIN\LOGIN 12345
This automatically piggybacks User 12345, which has
supervisory rights and no password security, with which-
ever user first logs in on the file server.
4. CD\PUBLIC
This line gives access to the public directory, a com-
mon storage area on the file server.
5. FIX.EXE/Y F:\*.*
FIX.EXE is a DOS-based executable that served as the
deletion command but showed the word “fixing” on the
screen instead of “deleting.” This is a slightly modified ver-
sion of Microsoft DOS’ Deltree.exe.
/Y answers “yes” to the implied question of “Do you
want to delete these files?” F:\*.* refers to all files and fold-
ers on the entire server volume.
6. PURGE F:\/ALL
This line calls for all of the deleted information to be
immediately purged.
So, since trust doesn’t always work, what are some of the lessons learned that we
can take away from this?
admitted that 53 million e-mail addresses were stolen along with the previously
disclosed 56 million credit and debit card details. They also disclosed that the infor-
mation was lifted from their network because a third-party vendor’s credentials
were stolen or compromised.
Investigators found that the criminals used a third-party vendor’s user name
and password to enter the Home Depot’s network. While the credentials did not
have the rights to access the company’s point-of-sale devices, the hackers laid in
wait on the network until they acquired elevated rights. These rights allowed them
to deploy custom-built malware on self-service checkout systems in the United
States and Canada.
That accounts for the credit and debit cards, but what about the 53 million
e-mail addresses that were also taken during the breach? Remember that for those
who make money by phishing scams, a set of viable e-mail addresses, probably
susceptible to home improvement scams, would be worth real money. A comment
from an investigator read as follows: “Insider threats are not only the No. 1 cause of
breaches, but also lead to the biggest damage; this is because once on the network,
an outside attacker looks like any other employee and can take their time siphoning
off data without being seen.”
Home Depot isn’t alone. Target was also a victim of a supply chain partner’s
lapse in security. Their data breach was started through a compromised HVAC
vendor’s credentials whose security controls were admittedly lax.
Just like any other criminal, they look for the easiest entry into a target. If a
large company with large resources can make major investments in security, the
criminals will actively look for a backdoor or easy way in. One easy assumption is
that if you know the supply chain for a company like Target or Home Depot, you
have a list of potential targets. Supply chains are a good target because they often
have liberal access to company resources.
Companies need to get tougher regarding third-party controls and be willing to
pay a little more for better security. If you beat them into submission on product/
service price, you can’t expect them to support a million-dollar security system
to protect your business. Compounding the issue of control is that your partner
may have downstream suppliers doing work for them that ultimately supports you.
When you look at the whole issue, there are just too many gaps or holes in the
supply chain today. There is little doubt that the real-time nature of business today
makes it nearly impossible to monitor everything.
Here’s a real life story to drive the point home.
Medical transcription is one of those areas that is important and critical, but
can easily be outsourced to a firm that specializes in the business. A regional medi-
cal center in California decided to use a US-based outsourcer for medical transcrip-
tion services. Shortly after the process was established, the medical center received
an extortion demand from a medical transcriptionist in Pakistan: Pay a ransom or
your patients’ medical records will be posted on the Internet. Strange, the medical
NEVER Trust and ALWAYS Verify ◾ 209
center didn’t think they signed up for a service that would allow its sensitive medi-
cal data to be shipped overseas but they were wrong.
The medical center contacted the outsourcer and resolved the issue. With proper
awareness and oversight, they wouldn’t have been in that situation. They were put
in a position of violating a number of state, federal, and international privacy laws
because of an outsourced vendor. The lesson? Companies may be able to outsource
the processing of sensitive data, but they cannot abdicate their responsibility to pro-
tect the data. They will be held liable and accountable for the information entrusted
to them by their patients, customers, and users. Outsourcing functions requiring
access to sensitive information puts your company at risk of serious privacy viola-
tions and security breaches.
Employers will continue to use the cloud to outsource business functions such
as Human Resources. In fact, a recent survey by the Society of Human Resources
Management said that 58% of its members reported having sent one or more func-
tions to cloud-based providers. The result: US businesses are becoming more vul-
nerable to security attacks and breaches. From a risk and security perspective, there
is nothing wrong with outsourcing as long as programs are in place to mitigate the
risk. However, we should seek to achieve the benefits of outsourcing and the use of
a Cloud infrastructure while minimizing the risks of privacy violations and security
breaches.
all the companies that had stored their data on the systems that
was now lost forever.
Lesson learned? Before you entrust your data to any cloud service, you need to
know whether that vendor has a disaster recovery plan in place to recover data lost
due to theft, natural disaster, or human error. Many do not; don’t take chances with
your information assets. If possible, you need to understand the details of their DR
plan to ensure that the backup data are secure.
Remember, this is compliance with standards, not a guarantee that your data are
secure. Yet another good standard for certification is the best practices of the ISO-
27002:2013 standards for information security management.
Internal Trust
If your goal is to develop the strongest possible computer security for your company,
“trust no one” is the strongest policy. Absolutely any piece of software or hardware
214 ◾ The CISO Journey
could deliver a Trojan Horse or other malicious features, but ultimately you have to
trust someone. Just learn to pick carefully. Here’s a flashback from the ‘90s:
True, it’s an old example, but operating in a mode of low or zero trust is becom-
ing more common. We live in a plug-and-play world, even with security and pro-
duction devices. Unless you decide to write all your own code and build all your
own hardware, you will have to trust someone. Luckily, most computer and soft-
ware companies are relatively trustworthy, even if they aren’t as transparent as we’d
like them to be.
OK, let’s talk about trust. I’d argue that trust is multifaceted. If we go back to
the three foundational elements of security, People, Process, and Technology, we
can see that there are factors that can elevate our levels of trust.
Even in Table 15.1, there are many judgment calls and potential risk assump-
tions necessary to decide if an element should be treated with trust. If we added
one more column that talked about the value of the assets being accessed, it would
change again (Table 15.2). After all, we make those decisions every day. The person
NEVER Trust and ALWAYS Verify ◾ 215
who cleans our house has a key to get in when we aren’t home; however, they don’t
have the combination to the safe. If I was giving access to my safe without me
being there, I’d probably do an in-depth background check before giving them the
combination.
If the value of the asset is low, like public information, then almost everyone is
trusted. If the information is critical, then even trusted technology might not be
“trusted enough” to have access to the information such as Merger and Acquisition
plans.
That is pretty much how we operate today. The business makes all kinds of
critical decisions regarding legitimate access. If we compound the issue further by
introducing malicious traffic and actors, network issues, and the increasing speed
of business, the attempt to secure information using yesterday’s methods and tech-
nologies becomes an insurmountable problem.
Technology No No Low
The written information security plan is a mandatory part of any security pro-
gram. This template and description is a great starting point for you to develop you
own. Talking to the board is a skill that you will need to develop. Hopefully, this
section will provide you tips and tools to successfully navigate this part of your
career. Documenting and establishing an incident response program is a critical
process for you to go through as you build your own group. When the wheels
come off and an emergency hits, a well-developed response plan is worth its weight
in gold. Finally, I’ve added a simple risk assessment tool. It is not sophisticated or
comprehensive, but it will get you started.
Use these tools and build your own set!
Chapter 16
My Best Advice
for New CISOs
You, my friend, have picked a strange career. It can be a thankless job while at the
same time being personally rewarding. So, where are you headed as a CISO? Are
you destined to repeat the mistakes of the past, or are you going to continue to be
a trailblazer in a still emerging field? Much of the choice will be yours. I’ve tried to
share some of my practical lessons and observations; you will have your own. I urge
you to record them and pass them along to others.
Over the years, some of our less visionary brethren have created an environ-
ment where Security is viewed as an obstacle and not an enabler. We are seen as
the purveyors of “No.” But, you can’t blame your lack of success on them, or the
past. It is up to you to “sell” security to the business. When I say sell, that is exactly
what I mean. Maybe I had a head start as my Dad was an incredible salesman and
I watched him work deals from beginning to end. Maybe your next seminar should
be sales or negotiating.
Success is hard to measure. You go for weeks and weeks with no security inci-
dents. Are you doing a good job, just lucky, or have you already been breached and
just don’t know it? As one of my best managers says, “We have to be right a million
times a day, the bad guys only once.” Unfortunately, failure is easy to measure.
Usually, you will read about it in the papers.
You can never be too secure in your environment or your position. Stay hungry
and have a voracious appetite to learn about your business, not just Info Security.
Also, realize that you will never have the budget you need; spend wisely. The reason
that I talk budget and learning about the business in the same breath is that to
be successful, you must incorporate a security component to every new business
221
222 ◾ The CISO Journey
initiative to help subsidize and account for the true costs of security. Also, knowing
the business will help you get a seat at the strategic table where mergers and acquisi-
tions are discussed. This is how you get out ahead of the business where security is
concerned.
Communicate frequently to elevate awareness of the existence of the security
group and its importance to the company. Do this internally and externally. Develop
a presence in the community. I’m often asked if Info Security people should actu-
ally talk at seminars as it may prompt hackers to attack who would take the session
as a challenge. Since this is a “G Rated” book, let’s just say that I think that is crap
in today’s world. What is the greatest thing that the hackers do? Communicate!
They actually hope that we don’t share information about how they hack.
Get to know your peers in the industry and develop professional relation-
ships. Share information. McAfee (Underground Economies, McAfee, SIAC,
March 2011) has reported that “Only three in ten organizations report all data
breaches/losses suffered, while one in ten organizations will only report breaches/
losses that they are legally obliged to, and no more. Six in ten organizations cur-
rently ‘pick and choose’ the breaches/losses they report, depending on how they
feel about them.”
Keep yourself educated. Take advantage of the knowledge of your security ven-
dors both in person and what they provide on the Internet and in various reports.
Just a few samples of excellent material available to you are Symantec’s Internet
Security Threat Report, Verizon’s Data Breach Investigations, McAfee Threats Report,
Sophos’s Security Threat Report, and Trusteer blog entries.
Be creative. Antivirus/antimalware software is no longer enough. The bad guys
use a concept known as polymorphism. The result is that malware files mutate with
every changing appearances that signature-based malware detection software can-
not keep up with. Certificates are no guarantee of legitimacy. Cybercriminals have
been known to use stolen or forged certificates. These then give malicious files the
appearance of being legitimate applications or updates. The malware files will be
successfully downloaded, evading your malware protection applications.
Focus on the people, not the technology. Never assume technology can replace
the human element. Always ask probing questions, never assume you are safe. The
questions should include the following:
These are the kinds of questions we must ask ourselves every day. It’s part of our
intelligence-driven, threat-focused approach to defending our company from a
wide array of threats. Tomorrow, we must combine investigations and intelligence
operations to be more predictive and preventative—more aware of emerging threats
and better able to stop them before they turn into breaches.
My Best Advice for New CISOs ◾ 223
members will eventually hear about you through their circles and want to meet you
in person. Certainly, promote yourself internally through companywide communi-
cations and face-to-face meetings. Of course, a major data breach might also grant
you a onetime visit with the Board.
Finally: Despite the title of this book, there is no Silver Bullet for security.
Believe me when I say that I wish I could leave you one. The best I can do is pass
along some of my thoughts and lessons learned.
Best of luck as you develop your own path. I look forward to reading and hear-
ing about your thoughts on this book, security in general, and lessons you have
learned over time. I am never too old to continue learning from my peers. Plus, I
enjoy a good “war” story now and then.
Appendix A: The Written
Information Security Plan
225
226 ◾ Appendix A
Remember that this does not just apply to you if your business operates in
Massachusetts; it is a law that protects the residents of the Commonwealth. It
applies to you if you have even one customer that lives there.
are in Financial Services, then you are probably concerned about financial informa-
tion, possibly PCI, and definitely PII. If you are in a service or manufacturing sec-
tor, it may be Intellectual Property or Trade Secrets. Don’t forget about financials
and plans to acquire new companies or businesses. Understand where it is stored,
and what protections are available to the data or paper documents.
Now that you have identified the types of data at a high level and where it
is stored, map the information protection controls to the data and sources. This
should tell you if the data are encrypted, stored on site, or in the cloud; who admin-
isters the data; and who administers the systems and networks that support the data
stores. You must realistically describe the protections in place today.
Drafting a WISP may appear to be a huge program, and let’s be honest, it can
be. Develop a team; it is better if created with multiple viewpoints. Use the steps
outlined above, and the basic template that follows below. Get started. Remember,
the WISP is a great planning and documentation tool. It is useless if you put it on
the shelf and never look at it again. Socialize it. Circulate it. Regularly review and
update the plan.
The section below contains a sample WISP you can use to get started. My com-
ments are italicized so you can separate them from the WISP text.
Introduction
This first section is where you will scope your plan. Don’t try to
“boil the ocean” with your document. If you notice, this docu-
ment discusses the company plan to secure sensitive informa-
tion, not all information.
The Information Security and Compliance office performs several critical roles,
including managing the risks and protection of <YOUR COMPANY> information
assets; the development and implementation of global security policies, standards,
guidelines, and procedures; and managing security incidents to minimize impact
to the business.
This Information Security Plan also provides for mechanisms that identify and
assess the risks that may threaten protected information maintained by <YOUR
COMPANY> by the
<YOUR COMPANY> recognizes that this may not be a complete list of the
risks associated with the protection of protected information. Since technology
Appendix A ◾ 231
growth is not static, new risks are created regularly. Accordingly, the Information
Security groups will actively participate and monitor advisory groups for identifica-
tion of new risks.
<YOUR COMPANY> believes that current information technology safeguards
are reasonable and, in light of current risk assessments, are sufficient to provide
security and confidentiality to protected information described above maintained
by the central Company units. Additionally, these safeguards protect against cur-
rently anticipated threats or hazards to the integrity of such information.
All regulators from the SEC on down are now demanding that
the Board of a company be involved in the monitoring of and
decisions around cybersecurity. Consequently, it is important
that the CISO delivers a report to the board at least annually.
The review of the report must be memorialized in the minutes
of the meeting, along with any request for additional informa-
tion or follow-up actions.
results of security monitoring and testing, security breaches or violations and man-
agement’s responses, and recommendations for changes to the information secu-
rity program. The annual approval should consider the results of management
assessments and reviews, internal and external audit activity related to information
security, third-party reviews of the information security program and information
security measures, and other internal or external reviews designed to assess the
adequacy of information security controls.
The CISO shall ensure that Senior Management
should ensure, annually, the coordination and review of additional privacy training
appropriate to the department. These training efforts should help minimize risk
and safeguard protected information.
Information Systems
Access to protected information via <YOUR COMPANY>’s computer informa-
tion system is limited to those employees who have a business reason to know such
information. Each employee is assigned a user id and selects a password that meets
<YOUR COMPANY>’s complexity requirements. Databases containing personal
information, including, but not limited to, accounts, balances, and transactional
information, are available only to <YOUR COMPANY> associates in appropriate
departments and positions.
Systems requiring passwords must conform to the <YOUR COMPANY> Policy
on User ID and Passwords. Systems that allow remote log-ins over the <YOUR
COMPANY> VPN network must have passwords on all accounts.
<YOUR COMPANY> will take reasonable and appropriate steps consistent
with current technological developments to ensure that all protected information
is secure and to safeguard the integrity of records in storage and transmission.
The Chief Information Officer is responsible for all servers and ensuring that
they meet necessary security requirements as defined by information technol-
ogy policies. These requirements include maintaining the operating system and
applications, including application of appropriate patches and updates in a timely
fashion.
In addition, an intrusion detection system has been implemented to detect and
stop certain external threats, along with incident response procedures defined by
<YOUR COMPANY> for occasions where intrusions do occur.
All protected information will be maintained on servers that are behind
<YOUR COMPANY>’s firewalls. The Company has a number of policies and pro-
cedures in place to provide security to <YOUR COMPANY>’s information sys-
tems. These policies are available in the Company’s Policy and Procedures Manual.
The Company presently maintains a secure network for protecting the protected
information of its customers and employees.
Encryption
Database Encryption
Sensitive data stored at rest in a database are encrypted at the column level.
For internally developed applications, sensitive information is replaced with a
token unique to that data element. The token is a unique identifier within <YOUR
COMPANY> databases.
Third-party applications that do not have encryption built into the application
and cannot support the use of the <YOUR COMPANY> custom security API may
be encrypted using other approved encryption packages.
Internal Audits
<YOUR COMPANY> has an internal auditing group responsible for conducting
audits on physical and electronic security, application and system controls, general
computer controls, sensitive data access, and department policies and standards.
The methodology consists of reviews of existing documentation, one-on-one
and group interviews of personnel in the effected departments, and access to any
information needed for successful completion of the audits. After the evaluation,
follow-up meetings are held with IT Management to review any concerns or ques-
tions identified during the audit, and an action plan to correct or modify the sys-
tems in question is created. Internal Audit will then follow the completion of the
corrective action and retest as needed to ensure compliance.
◾◾ The ability to monitor intra-database attacks and back doors in real time
(such as stored procedures, triggers, views, etc.)
◾◾ Is agnostic to IT infrastructures
◾◾ Blocking and prevention, without being in-line to the transactions
◾◾ Active discovery of at-risk data
◾◾ Improved visibility into application traffic
◾◾ Data Loss Prevention capabilities that address security concerns, as well as
the data identification and protection requirements of the Payment Card
Industry (PCI) and other data-centric regulatory frameworks
◾◾ Database user rights attestation reporting, required by a broad range of
regulations
Maintenance Analysis
Business continuity
planning lifecycle
Testing and Solution
acceptance design
Implementation
Disaster Recovery
A Disaster Recovery Plan documents the steps to be taken by the Data Center
Infrastructure team to recover the hardware and all accompanying components.
In the base case, this plan is reviewed and exercised annually to ensure that all
changed environments are updated and, when necessary, replaced.
Physical Security
<YOUR COMPANY> has addressed the physical security of protected information
by limiting access to only those employees who have a business reason to know such
information. For example, personal customer information, accounts, balances, and
transactional information are available only to <YOUR COMPANY> employees
with an appropriate business need for such information.
Paper documents that contain protected information are shredded at time of
disposal.
I’ve run into more “talking to the Board” experts than any other
kind in my career. Granted, there is some political capital in get-
ting granted access to the top management group of an organiza-
tion and somewhere along the way people forget that the Board
just wants information. So put away your tuxedo and tap shoes,
and focus on creating and delivering a meaningful message.
Case in point: When Boards first started asking for a cyber-
security update as part of the risk overview of the company,
the expected happened: I was scheduled to write a slide deck
so the EVP of operations could update the Board on security.
There were about 40 rewrites with a lot of talk about “optics,”
how the Board would view our efforts, and the message he
wanted to deliver. Got a solid deck (finally) and our EVP
hopped a jet to deliver his message.
Unfortunately for him, there were at least two Board members
that had a good cyber background. As soon as he started, the
Directors threw away the deck and told him what they wanted to
talk about, unfortunately not what he had prepared for. He came
back bloody and bruised, and like a good seasoned manager, he
blamed the people who prepared the message. He hadn’t done
the background work to research the Board members. He forgot
to talk in business terms, and he hadn’t researched the subject of
cyber beyond the deck he was given.
After one more bloodied EVP took a hit from the Board, they
finally decided to send someone truly expendable: me. I took
the time to read the minutes from the two previous meetings. I
read the bios of all the Board Members and tried to figure out,
based on their background, what questions might be coming.
241
242 ◾ Appendix B
Finally, I made sure that all the technical and operational pro-
grams had clear linkages to business goals and objectives. I also
felt confident in my ability to answer any technical question
they might throw at me. I knew I had to earn their trust.
It might have gone better, but based on the recent history,
it was a stellar success. It was the first of many meetings, and
as we built trust, the meetings were more productive. Moral of
the story? When talking to the Board, just being a security guru
doesn’t guarantee success. They will not be impressed by the
letters after your name, because many of them have letters like
CEO. Do your homework, it will pay off.
If asked what has changed most in my job over the years aside from the threats,
it would be an easy answer. It is talking to the Boards and Execs. When I started
my career, we used to talk about the “ostrich defense” used by Execs and Boards. It
said that if management had delegated the responsibility for an activity to a lower
level of management, and they were not aware of any malfeasance or failure to per-
form, it wasn’t their fault because they “didn’t know.” In other words, they buried
their heads in the sand to avoid responsibility.
The courts took care of that defense over the years. They made sure that man-
agement clearly understood they were ultimately held liable for overseeing all things
performed in the business under their watch. A series of laws and regulations have
been enacted to regulate and enforce the direction and provide penalties for com-
panies and individuals who do not comply.
Given all that, I wouldn’t be doing a good job unless I said a few words about
addressing the Board. Your skills and success in this area can make or break a secu-
rity program. There are some great resources out there. For instance:
The National Association of Corporate Directors, in conjunction with the
American International Group and the Internet Security Alliance, published a
report outlining the five principles that all corporate Boards should consider “as
they seek to enhance their oversight of cyber risks.” I’d suggest you find and read
the report. They list five principles, which fundamentally say
There is now an understanding that Boards will have knowledge of the com-
pany’s information security programs supported by open access to the cybersecurity
expertise of the company. The external auditors and regulatory examiners now rou-
tinely ask for Board minutes that detail the discussions about cyber risk manage-
ment. This is why it is now given regular and adequate time on the Board meeting
agenda.
Boards now regularly meet with the chief information security officer (CISO)
of the organization. Even though the Board is getting reports from Enterprise Risk
Management and external independent sources, the Board is now taking the time
to meet with the CISO at least annually. The purpose of the meeting is to get the
state of cybersecurity from the organization’s information security program expert.
They want to know (be prepared to discuss the following topics when you address
the Board)
◾◾ What the key cybersecurity issues are from the CISO’s perspective. Important:
Tie in the business view here. They do not want to hear how many viruses you
stopped last month.
◾◾ Given the key issues you identified, what are your security strategies and cur-
rent projects to address the issues?
◾◾ Identify any key roadblocks or competing strategies that may affect your abil-
ity to deliver (key roadblocks, e.g., budget, political agendas, arrogance).
◾◾ Be prepared to discuss current data breaches within the organization’s indus-
try and how your program compensates for the vulnerabilities that led to
other breaches.
◾◾ The CISO is generally the “heart and soul” of an information security pro-
gram in most organizations. The Board will value your input. Give it profes-
sionally and listen. Become a trusted advisor of the Board.
in an attack (remember our recurring theme through this book): people, pro-
cess, and technology. Technological sophistication is not a guarantee against
compromise.
◾◾ The effects of a breach can significantly affect the profitability of a company
long term, resulting in risks to investors. It’s not just the immediate impact
of the news of the breach, or the fines, or the publicity. Long term, clients
and customers will react to a loss of trust in an organization, and may, as we
say, vote with their feet to go somewhere they feel safer or more comfortable.
◾◾ Public companies must report significant breaches. The SEC feels that inves-
tors must know about cyber risks that could affect their investment and past
breaches are a significant indicator. Remember hearing that “past performance
predicts future results?” It may not always be true, but in the area of cyber, it is
difficult and is a slow process for an organization to change its security culture.
◾◾ The Board should include formal actions to monitor, assess, and govern
cybersecurity based on the company’s risk profile. If the Board is ultimately
responsible for the oversight of cyber risk, then it must have formal pro-
cesses and procedures on how to accomplish this responsibility. However,
it is YOUR responsibility as the CISO to help them define that process and
ensure they are fully informed. It won’t be easy, and you may feel the culture
doesn’t support your efforts, but that is no excuse. Stand up and keep trying!
Given that, what are firms doing today? In an era of uncertainty, Boards are
reluctant to add a full directorship focused on cyber. While I believe that it will
eventually be commonplace, here is what I’ve seen today:
were actually followed. Ask yourself, “Could I prove in a court of law that I actually
follow my procedures?” You will need proof; your word will not be good enough
in all cases.
While state corporation law is careful not to permit shareholders to second-
guess every well-informed business decision adopted by the Board of Directors,
inadequate oversight over corporate risk can serve as a basis for individual member
liability. It must be determined that the directors consciously failed to implement
any reporting or information system or controls, or the directors, having imple-
mented such system or controls, consciously failed to oversee its operations and
thus failed to be informed of risks. The seminal Delaware case defining the scope of
the Board’s duty of oversight is in re Caremark International Derivative Litigation,
698 A.2d 959 (Del. Ch. 1996). Go out and take a look, ask your General Counsel
for the specifics. Every CISO should know the high-level facts of the decision.
The corporate jewels: what are you trying to protect? Sometimes the answer
is easy. If you process credit cards, then it is a PCI data. If you are a healthcare
provider, then it is healthcare information. If you are in the “other” category, it may
not be so easy to positively identify, but in order to know what to protect, you must
identify and locate your critical information. The critical information may include
the following:
Every business will have a different list, and will assign a different value to it.
This is a core element of every cybersecurity program and what is at the heart of
corporate risk.
The Board Reporting and Oversight process: By now, you should know that I’m
a firm believer in a process for all critical activities, and this is no different. So, when
we say that the Board must provide oversight, what does that actually mean? The
intent is for the Board to provide management with guidance on the status of the
cybersecurity program. As part of this, they must review the current program status,
understand the current risks, and approve the new plans, policies, and programs.
Additionally, the Board is expected to provide management with expectations
and requirements, and hold management accountable to specific actions. They must
clearly charge the company management with the central oversight and coordina-
tion of the program. The Board should ensure that company management assign
a person responsible for the program and the coordination of information security
Appendix B ◾ 247
Protecting
Mitigate information
downside
losses
Ensure
profitability
and growth
efforts. These duties should include but not be limited to risk assessment and mea-
surement, monitoring, and testing and reporting.
The goal is to define a program to identify an information security program that
balances the need to protect sensitive information and mitigate downside losses
while ensuring profitability and steady growth for the company (Figure B.1). When
done correctly, a program that balances profitability and security emerges. This
should be presented to the Board for comment and eventual approval.
Board framework
Approve, prioritize, monitor, govern
Breach report
Business
requirements External cyber Program
Written information and risk review monitoring
security plan appetite
State of cyber
security report Governance and
oversight
Cyber insurance
review
The results of the risk assessment process: Was an enterprise-wide risk assess-
ment performed and when? What risk assessment methodology was used,
and was it consistently applied across the organization? This section should
then list the prioritized risk assessment findings and the relative scoring, and
list any pertinent comments collected during the process. Finally, is there an
executive management consensus that the listed risks are actually the top risk
for the company? In my career, I have seen where the risk function will issue
a report that does not have agreement from the company management. If this
happens, the whole report is in question.
The risk management and control decisions taken as a result of the risk assess-
ment: It only makes sense that if a significant risk is identified to the executive
management team, the company will take actions to mitigate or control the
risk. This section should include any management responses to the identified
risks, and any actions that have been taken to date to mitigate the risk.
Any specific service provider arrangements designed to control risk to the com-
pany: For example, a company may outsource part of its operations to a service
provider. If such an arrangement is in place, what controls are implemented
to ensure that any access to company-sensitive data is restricted to only those
with a need to know? Has an onsite inspection taken place, and if so, what
were the results? Does the company have a policy in place to manage third-
party service provider relationships? If you look at all third-party relationships,
which are the highest risk and what steps are being taken to reduce the risk?
Remember, you can outsource your processing, but you can’t abdicate your
responsibility to protect your sensitive data, wherever it is. You, my friend, are
on the hook. Remember the Target breach? Target was held liable even though
the breach came from a third-party service provider network connection.
Overall, the report to the Board should include the results of management
assessments and reviews. Include any major gaps and comments and any high-level
observations about the program or its organization. This is also the section in which
you should include any internal and external audit activity related to information
security. Be sure to list any management actions to which the company has com-
mitted. The information should also include the results of any third-party reviews
of the information security program, or any other internal or external reviews
designed to assess the adequacy of information security controls.
Appendix B ◾ 251
Policy and Strategy Approvals: Annually, the Board should review and approve
the policies, the WISP, and the Cybersecurity Strategic Plan that includes
funding and staffing.
Cyber Priorities: Annually, the Board should review the Top 10 Cyber Risks for
the company. These should be discussed in light of new and emerging threats
and attack trends, and regulatory mandates. The Board should ensure that
funding and staffing are earmarked to address the risks identified.
Program Monitoring: How is the program doing against the plan? The Board
should review funding and staffing levels against plan and require explana-
tion for any material changes in the plans they approved. This can be done
252 ◾ Appendix B
at the Board level, but most organizations have the program reviews accom-
plished at the Audit Committee level. Since this committee usually receives
audit results and mitigation plans, it is a natural fit for the cyber plan review.
Summary
It is generally accepted that cybersecurity will continue to pose a serious risk that
the Board needs to actively measure and continuously monitor. For publicly traded
companies, this means that the SEC will continue to mandate additional gover-
nance and oversight responsibilities for Boards. It is clear that in today’s world, the
onus is on the Board to take its strategic role seriously in providing oversight.
Cybersecurity is no longer simply another agenda item for IT; it is an agenda
item for the Board as well.
Appendix C: Establishing
an Incident Response
Program
If you question the need for your company to develop an incident response pro-
gram, just look in the news. As you look at the breaches that make the news, you
will be able to separate the companies that had a response plan from those who
don’t. In your career with a company as well as your personal life, things will go
wrong. You will find, however, that you will be judged by your response more than
the original incident. Bad things happen every day to good companies and people.
Your job as the CISO is to make sure the company responds in a professional,
diligent matter.
NIST has great resources for developing an Incident Response program; in fact,
a significant part of the framework I use is based on NIST Publication 800-61. It is
easy to see why having a computer security incident response has become an impor-
tant component of not just IT programs but company-wide response programs in
general. Because cybersecurity-related attacks are increasing in voracity and pace,
we must be prepared to act with precision and professionalism. This is not a place
for luck; we make our luck through training and practice.
We don’t have to “boil the ocean” with our plan. As I’ve stated throughout this
book, the most important step is to start. Through risk analysis, we can define the
areas that are the most likely targets for attack, and through preventative actions,
we can hopefully limit the number of incidents. As we noted before, it is not just
the voracity of attacks but also the speed at which they come at us. We must ensure
that our plans enable us to respond rapidly and quickly. Just as with development
and technology in general, agility is critical to our success.
Establishing clear procedures for prioritizing the handling of incidents is criti-
cal, as is implementing effective methods of collecting, analyzing, and reporting
data. It is also vital to build relationships and establish suitable means of commu-
nication with other internal groups (e.g., human resources, legal) and with external
groups (e.g., other incident response teams, law enforcement).
253
254 ◾ Appendix C
The NIST and other sources list a common set of activities that should be
undertaken to build a complete incident response capability.
◾◾ Creating an incident response policy and plan: The first step is to develop
the foundation upon which the following activities are built. A good policy
will set expectations and scope of the plan. Here is a sample, simple starting
policy you can customize for your organization:
– The purpose of this policy is to establish a protocol to guide a response to a
computer incident or event affecting <COMPANY> computing equipment,
data, or networks.
– This policy applies to all <COMPANY> employees, contractors, and others
who process, store, transmit, or have access to information and computing
equipment.
– Incidents are prioritized based on the following:
• Criticality of the affected resources (e.g., public Web server, user
workstation)
• Current and potential technical effect of the incident (e.g., root compro-
mise, data destruction)
• Combining the criticality of the affected resources and the current and
potential technical effect of the incident determines the business impact
of the incident
– Incident reporting
• All computer security incidents, including suspicious events, shall be
reported immediately to your supervisor
– Mitigation and containment
• Any system, network, or security administrator who observes an intruder
on a network or system shall take appropriate action to terminate the
intruder’s access. (Intruder can mean a hacker, botnet, malware, etc.)
Affected systems, such as those infected with malicious code or systems
accessed by an intruder, shall be isolated from the network until the
extent of the damage can be assessed. Any discovered vulnerabilities in
the network or system will be rectified by appropriate means as soon as
possible.
– Eradication and restoration
• The extent of damage must be determined and course of action planned
and communicated to the appropriate parties
– Information Dissemination
• Any public release of information concerning a computer security inci-
dent shall be coordinated through the office of the CIO
◾◾ Developing procedures for performing incident handling and reporting:
As in the example above, a clear set of expectations for an employee discover-
ing suspicious activity is necessary. Escalation paths should be customized to
match the hierarchy of the company.
Appendix C ◾ 255
are insufficient, high volumes of incidents may occur. This could overwhelm the
resources and capacity for response, which would result in delayed or incomplete
recovery and possibly more extensive damage and longer periods of service and
data unavailability. Incident handling can be performed more effectively if organi-
zations complement their incident response capability with adequate resources to
actively maintain the security of networks, systems, and applications. This includes
training IT staff on complying with the organization’s security standards and mak-
ing users aware of policies and procedures regarding appropriate use of networks,
systems, and applications.
In other words, these attack vectors have the highest probability of being the
route by which a successful breach may take place. The lesson here is to plan in
advance for these attack vectors and you will have a solid foundation for an incident
response plan.
Information
security
management
CSIRT incident
handler
Corporate Teams
Various Corporate Teams play a role in incident response. Management is respon-
sible for coordinating incident response among stakeholders in order to mini-
mize damage, report, and authorize corrective actions. Key resources include the
following:
◾◾ IT Leadership
◾◾ Business Leadership
◾◾ Corporate Security
◾◾ HR
◾◾ Legal
◾◾ Public Relations
◾◾ Functional IT partners
Designated
Alleged incident incident handler
occurs
Stage
notified of alleged
incident
Preliminary
No
Problem resolved by other means
Did an incident (i.e., IT help desk)
occur?
Identificattion
Yes
No
Corporate IT security
Does this situation
manager notified of
warrant involvement from
incident by incident
other internal and external
handler and/or CSIRT
resources
member
Notification
At the discretion of the
corporate IT security manager,
Yes
necessary resources will be
notified
Appendix C ◾
◾◾ Legal
◾◾ Internal Audit
◾◾ Human Resources
◾◾ Marketing
These resources may be called upon under the direction of the CISO and CSIRT
team leader as the severity of the incident under investigation dictates. Extended
team members may be asked to provide assistance in specific cases.
◾◾ Data owners responsible for personal information play an active role in the
discovery and reporting of any breach or suspected breach of information on
an individual. In addition, they will serve as a liaison between the company and
any third party involved with a privacy breach affecting the organization’s data.
◾◾ All data owners must report any suspected or confirmed breach of personal
information on individuals to the CISO immediately upon discovery. This
includes notification received from any third-party service providers or other
business partners with whom the organization shares personal information
on individuals. The CISO will notify the appropriate administrator and data
owners whenever a breach or suspected breach of personal information on
individuals affects their business area.
Identification
Follow-up/
Containment/
lessons
notification
learned
Preparation
Recovery Eradication
organization if an incident occurs. In keeping with the severity of the incident, the
organization can act to mitigate the impact of the incident by containing it and
ultimately recovering from it. After the incident is handled, <COMPANY> issues a
report that details “lessons learned” from the incident: the cause cost of the incident
and the steps for the organization to mitigate future incidents.
4.1 Explanation of the Six Stages of Computer Security Incident Response
Preparation
The preparation stage enables <COMPANY> to protect our company from the
obvious threats posed by malicious or unintentional attacks.
Explanation: This stage requires the utmost vigilance as we establish policy and
warning banners on system and make decisions with senior management before
an incident happens to lay out responses. It is our goal to create relationships with
law enforcement and CSIRTs to ensure cooperation should an incident require the
notification of law enforcement.
Procedures: A CSIRT led by a primary Incident Handler has been built from
qualified, multidisciplinary personnel. This team has identified a location for
command post in the event of an incident and established visibility and a com-
pensation plan. An emergency communication plan has been developed with
emergency conference bridge number and shared voice mailbox to ensure effi-
cient, uninterrupted communication between team members while addressing
an incident.
Training is an integral part of the preparation stage as well as the success of the
CSIRT. Therefore, meetings on scenarios, tools, and techniques occur often and
are supplemented with white board exercises in which unannounced penetration
tests are staged to evaluate team response. Training is not limited to the CSIRT, but
extends to Help Desk personnel, system administrators, and network administra-
tions. Cultivated relationship with and training these groups are <COMPANY>
first-line defense as they are often the first targets of social engineering and in many
situations the first to respond or receive notification of an incident.
Identification
In the event that an incident is reported, it must first be identified as an incident
before progressing to further stages.
Explanation: In the identification stage, the previously appointed Incident
Handler and the CSIRT will gather and analyze events to determine if there is or
has been an incident.
Procedures: Extensive notes that can be later used as evidence are taken as a pri-
mary and secondary Incident Handler investigate the possible incident. Incidents
can be identified through Network Perimeter Detection, Host Perimeter Detection,
and/or System-level Detection. Unusual processes and services, files, network usage,
scheduled tasks, accounts, and log entries are red flags and aid in identification of
an incident.
266 ◾ Appendix C
Containment/Notification
Following the identification of suspicious activity as an incident, the CSIRT will
begin the containment stage.
Explanation: The ultimate goal of the containment stage is to prevent the
attacker from causing more damage by accessing more information or spreading
to other systems.
Procedures: The three substages of the containment stage require short-term
containment, system back-up, and long-term containment. This stage also includes
notification of management and, at management’s discretion, the notification of
law enforcement and incident reporting agencies. During the short-term contain-
ment substage, the CSIRT will stop the advance of the attacker into the system
while not destroying evidence on the compromised computer or server. Next, in
the system backup substage, the initial backup of the affected system is created to
be used for forensic analysis. Finally, the CSIRT will undertake long-term contain-
ment, in which the system is patched to allow the team to undertake the eradica-
tion stage and begin cleaning up the system.
Notification—The IT Manager will brief additional layers of management
based on the severity of the incident and the potential for the disclosure of company
confidential information. All contact with external media and press will be handled
through the legal and/or communications department. Under no circumstances
will an IT person grant a media interview.
Eradication
Explanation: The eradication stage is extremely difficult as it requires the complete
and safe removal of any malicious code or other toxic remnants of the attack on the
system, such as pirated software and pornography.
Procedures: The Incident Handler and the CSIRT will use information and evi-
dence gathered during the previous stages to isolate the attack and determine the
cause and symptoms of the incident. The team will improve system defenses and
conduct a performance vulnerability analysis during this stage to ensure that the
system will not be compromised in a similar way again.
Recovery
Explanation: When the threat and malicious material has been eradicated from the
system, the CSIRT will restore the system to full operation.
Procedures: The system will be restored and monitored to ensure that the threat
has been neutralized.
Post-Incident Follow-Up
The post-incident follow-up stage, commonly known as the “Lessons Learned”
stage, requires the creation of a report to document the incident for feedback and
constructive criticism to avoid future mistakes. A meeting to discuss the report and
the incident will be held within two weeks of resuming production.
Appendix C ◾ 267
Severity Examples
Level Description (Including, but Not Limited to)
APPENDIX
Contents:
CISO
Primary handler
CSIRT member
CSIRT member
CSIRT member
Local law
enforcement
Federal law
enforcement
Legal contact
Human resources
contact
Physical security
contact
<COMPANY>
Computer Incident Report for Medium- and High-Risk Incidents
Report Completion Date: ______________ Time: _______________
Incident Discovery Date: ___________ Time: _____ Location: ___________
Person who reported/discovered the incident: __________________________
Title: ______________________________________________________
Phone Number: _____________ E-mail: _____________________
Incident Recovery Date: _______________ Time: ___________
Confidentiality Statement
Distribution of this document is limited to <COMPANY> Corporate IT Group. Access
should only be granted to those with a business-related need-to-know. If you have any
questions pertaining to the distribution of this document, please contact the Point of
Contact listed below.
Conclusion
Introduction
A major theme throughout this book has been that we need to start simple. Start
somewhere, get results, refine, and repeat. Doing nothing because the process
seems too complex and expensive is not a wise approach. Besides leaving potential
risks in place without a remediation plan, it will look like you aren’t concerned with
risk assessment to an entity like Internal Audit. The following is a simple approach
to get started. It is adopted from a GAO document on risk assessment. Get started.
Find the big risks. Document and remediate the risks, and repeat the process. As
you repeat risk assessments, you will find that it gets easier and your organization
will begin to see and appreciate the results.
273
274 ◾ Appendix D
Evaluate threats
Team
Team Team
Compare actual controls in place with minimum requirements and identity gaps
Team
Team
maturity, avoid too broad of a scope. Bound the scope of an assessment in order
to get meaningful results and provide some actionable insight and results to
management.
a short statement summarizing the outcome and documenting its decisions and
decision-making process. It then provides the business a copy of the risk assessment
table. Guidelines require the business unit being assessed to retain the completed
matrix and documentation supporting the outcome, such as major threats consid-
ered, and major decision points, such as the team’s rationale used in arriving at the
appropriate level of risk.
278 ◾ Appendix D
Risk Category
Personnel
Facilities and
equipment
Applications
Communications
Software and
operating systems
If there are areas where additional controls are needed to meet minimum
requirements, management will develop an action plan and submit it for evalua-
tion. The plan includes those controls management believes would provide the level
of protection appropriate for the risk associated with the asset. Factors considered
are security exposures, the level of risk associated with the business function or
activity, the costs of implementing the controls, and the impact of noncompliance
on other business units or operations within the organization.
If the business believes that the time needed to implement controls is too lengthy
or the steps required are too costly, the business may request a waiver. The business
manager must describe the rationale for the waiver and what compensating controls
the unit has or will implement. The information and enterprise risk organizations
must approve or deny requests that may affect the entire organization. If a waiver is
approved, it should not to exceed one year.
While this process is very high level, it provides a solid starting point. It is easily
understood and will not require an unreasonable amount of time investment from
the business. Get started, kick the tires, and find out what works for your organi-
zation. Build the process with the involvement of the business. Be reasonable and
show that you are a partner to the business, not just a “checker.” You will find that
done properly, this tool will be a valuable risk identification and remediation tool
for the organization.
Index
A Reaper, 41
security measures, 233–234
Access control up-to-date, 46
issues, 141 Apache, 43
lists, on network, 46 Apple computers, 42
Accountability Applications
RACI matrix, 100 architecture, 18
for system, 27 DAM, 236
Actions deploying, 62
board, from report and briefings on layer, in OSI model, 25–26
cybersecurity, 251–252 LDAP-capable, 234
on objectives, phase of kill chain, 74 old/non-supported, 16
Adjustment, WISP, 239 public-facing, 43
Administration risk management, 27
system and user account, 234 scanning, requirement, 23
user access and, 97–98 security, 35, 186, 255–256
WISP, 231–232 Approval, WISP, 249
Adobe Flash, 42 AppScan, 62
Advanced Encryption Standard (AES), 235 ARPAnet, government-created, 40–41
Advanced persistent threat (APT) The Art of War, 124
actors, 74 Assessment
prevention, 236 cyber risks, 247
Advertisements, 193 high-level risk, methodology, 273–278
AirCrack, 61 risk, 121–125
Alerts, 61, 73, 118, 235 security strategy, 172–173
American International Group, 223, 242 Asset(s)
Analysis, incident, 257 breach, 27–28
Analysts, responsibilities, 87–89, 96 management system, 26
Androids, 62 tracking IT, 26
Annual recertification, WISP, 249 valuable, 189
Annual “state of cybersecurity” report, 249–250 Attacker(s)
Anonymizers, 53–54 internal and external, 155–157
Antivirus (AV) programs running code, on your computer, 39–48
alternatives, 41–42 smart and knowledgeable, 49–64
companies, 46 think like, 65–81
Linux servers, 42–43 Attacks
Mac users and, 42 forms, 49
malware myths, 41–46
279
280 ◾ Index
Facebook, 76 H
Federal Financial Institutions Examinations
Council, 180 Habermas, Jurgen, 197
Federal Information Security Management Act, Hackers
158 ethical, 62
File servers, 73 penetration test and, 24
File storage encryption, 235 vulnerabilities, focus on, 21
284 ◾ Index
T risk, reducing, 30
security, 144–150; see also Security
Talking, to Boards, 223–224, 241–252 awareness and training
Target, 208, 211, 245 security-based culture, 183–185, 200
Team leader, CSIRT, 262–263 staff, 5, 30
Teams tests and quizzes, 149
core team members, 260, 262 uncertainty and, 118
corporate, 260 user, 46
CSIRT, 258, 259, 260, 262–263, 265, 266 WISP, 232–233
extended team members, 262–263 Transparency, defined, 92
IT support, 259–260 Trojan Horses, 40, 41–46, 137, 214
risk assessment, selection, 275 Trust, 203–217
support team members, 262 cloud-based tools, 209–212
Technical certification, 155 internal, 213–217
Technical debt, 16 overview, 203–207
Technical experts, IT, 259–260 with value, 215
Technical staff, awareness education for, 135 Vendor Oversight Program, 212–213
Technology, 103–113 vendors, 207–209
backups, 103–104 Tuning, 118
creativity and, 120 Tzu, Sun, 77, 78, 124
DAM, 236–237
risk management for, 104–106
Safe Harbor principles, 106–113 U
security-based culture, 187–188 Uncertainty, risks and, 118–119, 244, 245
Test documentation, reviewing, 28–29 Update, WISP, 227–228, 249
Testing Upgrading, systems, 16, 18, 21, 24, 25, 30, 31,
penetration, see Penetration tests 32, 33–34, 35, 36
security awareness training, 149 Up-to-date AV programs, 46
system’s security, 127–128 Use Cases, 31–32
The Onion Router (Tor), 54 User access, administration and, 97–98
Third-party service provider risks, 248 User(s)
Thomas, Bob, 40 account, administration and management, 234
Threat cycle, 3, 4 education, on BYOD, 200
Tinba, bot, 55 general, security awareness education,
Tiny Banker, bot, 55 135–136
Titanic, 35 IT security awareness and training
TomCat, 43 responsibilities, 146–147
Top cyber risks assessment, 247 training, 46
Tor (The Onion Router), 54 U-2 spy plane, 34
Tor Hidden Services, 54
Tracking IT assets, 26
Training V
awareness, 130–131, 132, 152 Vega, 62
awareness vs., 152 Vendor, penetration-testing
Certified Ethical Hacker, 77 picking, 79
CSIRT, 265 selecting, 80–81
end-user, 130–131 Vendor Oversight Program, 212–213
formal, 147 Vendors
incident response team, 255 contracts and review, 213
methods, 132–133 earned certifications for security and
new hire, 133–135 compliance, 211–212
plan, 178 trust your, 207–209
292 ◾ Index