The CISO Journey: Life Lessons and Concepts To Accelerate Your Professional Development 1st Edition Eugene M Fredriksen Download
The CISO Journey: Life Lessons and Concepts To Accelerate Your Professional Development 1st Edition Eugene M Fredriksen Download
https://textbookfull.com/product/the-ciso-journey-life-lessons-
and-concepts-to-accelerate-your-professional-development-1st-
edition-eugene-m-fredriksen/
https://textbookfull.com/product/the-ma-formula-proven-tactics-
and-tools-to-accelerate-your-business-growth-1st-edition-peter-
zink-secher/
https://textbookfull.com/product/journey-across-the-life-span-
human-development-and-health-promotion-daphne-taylor/
https://textbookfull.com/product/the-linux-devops-handbook-
customize-and-scale-your-linux-distributions-to-accelerate-your-
devops-workflow-wojslaw/
https://textbookfull.com/product/money-lessons-how-to-manage-
your-finances-to-get-the-life-you-want-lisa-conway-hughes/
Yoga Mind Journey Beyond the Physical 30 Days to
Enhance your Practice and Revolutionize Your Life From
the Inside Out Suzan Colon
https://textbookfull.com/product/yoga-mind-journey-beyond-the-
physical-30-days-to-enhance-your-practice-and-revolutionize-your-
life-from-the-inside-out-suzan-colon/
https://textbookfull.com/product/core-light-healing-my-personal-
journey-and-advanced-healing-concepts-for-creating-the-life-you-
long-to-live-barbara-brennan/
https://textbookfull.com/product/guide-to-software-development-
designing-and-managing-the-life-cycle-arthur-m-langer/
https://textbookfull.com/product/the-dissertation-journey-a-
practical-and-comprehensive-guide-to-planning-writing-and-
defending-your-dissertation-carol-m-roberts/
https://textbookfull.com/product/the-brand-mapping-strategy-
design-build-and-accelerate-your-brand-karen-leland/
The CISO Journey
Life Lessons and Concepts to Accelerate
Your Professional Development
Internal Audit and IT Audit
Series Editor: Dan Swanson
A Guide to the National Initiative Mastering the Five Tiers
for Cybersecurity Education (NICE) of Audit Competency:
Cybersecurity Workforce Framework (2.0) The Essence of Effective Auditing
Ann Butera
Dan Shoemaker, Anne Kohnke, and Ken Sigler
ISBN 978-1-4987-3849-1
ISBN 978-1-4987-3996-2
Operational Assessment of IT
A Practical Guide to Performing Steve Katzman
Fraud Risk Assessments ISBN 978-1-4987-3768-5
Mary Breslin
Operational Auditing: Principles and
ISBN 978-1-4987-4251-1 Techniques for a Changing World
Hernan Murdock
Corporate Defense and the Value
ISBN 978-1-4987-4639-7
Preservation Imperative:
Bulletproof Your Corporate Securing an IT Organization through
Defense Program Governance, Risk Management, and Audit
Ken E. Sigler and James L. Rainey, III
Sean Lyons
ISBN 978-1-4987-3731-9
ISBN 978-1-4987-4228-3
Security and Auditing of Smart Devices:
Data Analytics for Internal Auditors Managing Proliferation of
Richard E. Cascarino Confidential Data on Corporate
ISBN 978-1-4987-3714-2 and BYOD Devices
Sajay Rai, Philip Chukwuma, and Richard Cozart
Fighting Corruption in a Global ISBN 978-1-4987-3883-5
Marketplace: How Culture, Geography,
Software Quality Assurance:
Language and Economics Impact Audit and Integrating Testing, Security, and Audit
Fraud Investigations around the World Abu Sayed Mahfuz
Mary Breslin ISBN 978-1-4987-3553-7
ISBN 978-1-4987-3733-3
The CISO Journey:
Investigations and the CAE: Life Lessons and Concepts to Accelerate
Your Professional Development
The Design and Maintenance of an
Gene Fredriksen
Investigative Function within Internal Audit ISBN 978-1-138-19739-8
Kevin L. Sisemore
ISBN 978-1-4987-4411-9 The Complete Guide to
Cybersecurity Risks and Controls
Internal Audit Practice from A to Z Anne Kohnke, Dan Shoemaker,
Patrick Onwura Nzechukwu and Ken E. Sigler
ISBN 978-1-4987-4054-8
ISBN 978-1-4987-4205-4
Cognitive Hack: The New Battleground in
Leading the Internal Audit Function Cybersecurity ... the Human Mind
Lynn Fountain James Bone
ISBN 978-1-4987-3042-6 ISBN 978-1-4987-4981-7
The CISO Journey
Life Lessons and Concepts to Accelerate
Your Professional Development
Gene Fredriksen
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apolo-
gize to copyright holders if permission to publish in this form has not been obtained. If any copyright
material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans-
mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereaf-
ter invented, including photocopying, microfilming, and recording, or in any information storage or
retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright
.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the
CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
List of Figures.................................................................................................xi
List of Tables................................................................................................ xiii
Prologue......................................................................................................... xv
Foreword.......................................................................................................xix
Acknowledgments.........................................................................................xxi
Author........................................................................................................ xxiii
v
vi ◾ Contents
Risk Management..................................................................................27
Key Questions to Ask.............................................................................33
5 If a Bad Guy Tricks You into Running His Code on Your
Computer, It’s Not Your Computer Anymore........................................39
Worms, Trojans, and Viruses: What’s in a Name?......................................41
Myth One..............................................................................................41
Myth Two............................................................................................. 42
Myth Three........................................................................................... 42
Myth Four.............................................................................................43
Myth Five...............................................................................................43
Myth Six............................................................................................... 44
Myth Seven........................................................................................... 44
Myth Eight............................................................................................45
Myth Nine.............................................................................................45
Myth Ten (and My Personal Favorite)................................................... 46
Attack Types Are Wide-Ranging............................................................... 46
Social Engineering......................................................................................47
6 There’s Always a Bad Guy Out There Who’s Smarter,
More Knowledgeable, or Better-Equipped Than You............................49
What about Your People?............................................................................56
Plan for the Worst.......................................................................................58
Not All Alerts Should Be Complex.............................................................61
What about Wireless?.................................................................................61
Context-Aware Security..............................................................................63
Suggested Reading..................................................................................... 64
7 Know the Enemy, Think Like the Enemy..............................................65
Monitoring What Leaves Your Network Is Just as Important as
Monitoring What Comes In: Introducing the “Kill Chain” Methodology....73
Stack the Deck in Your Favor.....................................................................78
Picking the Right Penetration Test Vendor.................................................79
How Should Penetration Testing Be Applied?.............................................79
Selecting a Vendor......................................................................................80
8 Know the Business, Not Just the Technology........................................83
The Role of Risk Management within the Enterprise................................. 84
Separation of Duties...................................................................................86
Is There an Overlap between Legal, Compliance, and Human Resources?.... 90
A Model Structure......................................................................................91
Risk Management/Organizational Management Interaction......................92
Executive Steering Committee...............................................................93
Information Security Officer Committee...............................................93
Contents ◾ vii
Does the Provider Have a Disaster Recovery Plan for Your Data?........210
Don’t Confuse Compliance with Security............................................ 211
Has the Potential Vendor Earned Certifications for Security
and Compliance That Can Provide Assurance of Their Capabilities?.... 211
What Physical Security Measures Are in Place at the Supplier’s
Data Centers?.......................................................................................212
Where Are My Data Being Stored?......................................................212
Vendor Oversight Program Basics.............................................................213
Internal Trust...........................................................................................213
Section III SUMMARY
16 My Best Advice for New CISOs...........................................................221
Talking to the Board.................................................................................223
Appendix A: The Written Information Security Plan..................................225
Appendix B: Talking to the Board...............................................................241
Appendix C: Establishing an Incident Response Program..........................253
Appendix D: Sample High-Level Risk Assessment Methodology................273
Index............................................................................................................279
http://taylorandfrancis.com
List of Figures
xi
xii ◾ List of Figures
xiii
http://taylorandfrancis.com
Prologue
xv
xvi ◾ Prologue
individuals and groups who are poised to set powerful examples of how cybersecu-
rity must be integrated into pretty much every aspect of our lives.
According to a recent study undertaken by Intel Security in partnership with
the Center for Strategic and International Studies, 76% of corporate IT leaders
involved in cybersecurity decision-making who participated in the research said
their respective governments are failing to invest enough in building specialized
talent. Based on interviews with some 900 IT decision-makers from organizations
with at least 500 employees situated in a range of countries (including the United
States and seven others), a meager 23% said educational programs are actually pre-
paring students to enter the industry. More than half stated that the cybersecurity
skills shortage is worse than those faced by other IT professions.
Yet the scarcity of qualified pros has become a more prominent political focal
point for some in the last couple of years, prompting the likes of our own President
Obama and other countries’ leaders to urge greater support for the information
security field and its professionals’ growth and development. Even with a few prom-
ising proposals underway, however, they couldn’t happen soon enough given that
about 70% of the research participants said the current talent shortage is causing
direct, measurable harm to their networks. In fact, one in four admitted that their
businesses have lost proprietary or critical data because of the dearth of cybersecu-
rity skills on hand within their organizations.
What’s needed, they explained further, is some hearty on-the-job training,
which takes precedent over a mere university degree, though individuals looking
for a role in their companies must have formal educational credentials to garner
any serious consideration. Also, more vigorous continuous education, engaging
instructional opportunities and nontraditional methods of learning, such as hands-
on exercises, hackathons, and more, likely would prove an additional boost to
strengthening the talent pool.
In this regard, information security industry conferences and events—especially
those boasting more varied and practical learning experiences—have become more
vital and, as a result, well attended by seasoned pros and newbies alike. For Gene
Fredriksen, these gatherings are a pretty decent barometer in revealing how the
industry is changing and what long-time, more-seasoned leaders like him, a group he
calls “the first generation of CISOs,” can do to help it continue to thrive and evolve.
Mentoring, as he notes in the following pages of this book, is a main component
crucial to the ongoing development of this marketplace and the people in it. And
this happens not only at a variety of industry events, but also is critical on the job.
“As I move further into my career, my focus is on evangelism and helping to
drive the overall profession further. Part of that is helping peers explain complex
issues clearly to the E-suite (executive suite),” he explained to me in an e-mail
exchange last year. “It’s all about passing the torch and leaving things better as the
first generation of CISOs begins to retire.”
He called out some signs of this metamorphosis when attending one of the
longest-standing industry events, the RSA Conference, last year. As he looked
Prologue ◾ xvii
around at others hitting the show, he remembered thinking: “When did they start
allowing 12-year-olds on the exhibit floor? I can’t believe I got my first full-time
infosec job in 1989.”
But it’s that experience starting in the field right when it was only at the extreme
early stages of any real, well-formed profession that has enabled him to pick up
many a lesson along the way, study with varied and experienced mentors, make and
learn from mistakes, hone and grow his technical and leadership skills, and develop
and refine a robust information security philosophy. Enlisting all this know-how,
he has found himself over the years establishing and managing both cybersecurity
plans and departments for global organizations that often had neither when he
started there. Really, as an infosec pioneer, his own vocational beginning was just
as fledgling as the cybersecurity industry itself; he played an indispensable role
alongside others like him to drive and mold what it meant to create, propel, and
oversee an information security strategy and the teams and divisions supporting it.
After I met Gene around 2003 or so, he asked that I come to St. Petersburg,
Florida, to participate in a conference he had organized at the long-standing
financial services company Raymond James where he worked at the time as the
company’s first CISO. The roster was stellar, having other leading industry practi-
tioners like him speaking alongside cybersecurity specialists from the likes of the
FBI, DHS, and others. That I was asked to participate was an honor, especially
given that our first engagement was impelled by a disagreement over some topic or
another that I covered in one of my commentaries. Gene recalls contacting me with
his differing thoughts.
“The following month, you put a follow-up [in another commentary] saying
that Gene Fredriksen of Raymond James didn’t completely agree with your views
and passed them along. Shortly after that we talked and it’s been a great relation-
ship ever since,” he recalls.
And it has. His professionalism, thoughtfulness, and combination of both tech-
nical prowess and business acumen saw his career blossom over the years. From
Raymond James, he moved to IT industry research and analysis company Burton
Group, which was acquired by Gartner in recent years, to become one of their
leading industry analysts. After that, he was off to security systems giant Tyco
International where he created their global cybersecurity strategy and division,
thereby helping to advance the security of both internal operations and external
product offerings. And, currently, he is CISO for financial services firm PSCU,
which provides both traditional and online assistance to more than 800 credit
unions. All the while, he has contributed columns to SC Magazine and scmagazine
.com, spoken at our events—both live and online, participated on our Editorial
Advisory Board, and been a cover story subject who shared his thoughts on threat
intelligence gathering and kill chain processes to support information security
strategies and initiatives. More than that, though, he has provided much-welcome
guidance to me as my team and I navigated the industry to ensure that our brand
was always improving and always meeting the needs of CISOs like him.
xviii ◾ Prologue
Illena Armstrong
VP, Editorial, SC Magazine
xix
http://taylorandfrancis.com
Acknowledgments
Richard Lanning, PhD: His help was instrumental in the creation of this book.
His ethics, analytical skills, and industry knowledge are a great asset to the
company and me personally. I value his friendship and counsel.
Illena Armstrong, SC Magazine VP and Editor: She has been a longtime source
of support and advice.
Pamela Fredriksen, my wife: Her support and love have kept me “shiny side
up” during this journey. There were many late nights and long trips over the
years and she has always been there for me.
Heather, Jeff, Holly, and Joe, our four children: They have kept life interesting
and rewarding for me. Thanks for your support and inspiration.
Kathy Simpson: Her graphics skills are amazing. Thank you for your invalu-
able help.
Deborah Kobza, CEO of the Global Institute for Cyber Security and Research:
A longtime friend and peer who has influenced my career.
David Bryant, Information Security Officer, PSCU: He has worked with me
at many companies over the last 16 years. Thank God he is patient and long
suffering.
Lori Lucas, Head of Technology Compliance for PSCU: She has also been a
longtime friend and advisor.
Rini Fredette, Enterprise Risk Officer for PSCU: A great peer and an expert in
the area of Enterprise Risk.
Lee Carpella: Instrumental in the editing of this book.
Larry Clinton, CEO of the Internet Security Alliance: An expert in the Cyber
Security Industry and Regulatory space. Larry is a great friend and advisor.
Richard Jacek: He was my first official mentor in industry. I still use many of
the skills he taught me today.
xxi
xxii ◾ Acknowledgments
Brad Anderson: A longtime friend and associate who has helped me shape my
views of technology and the world.
Chuck Fagan, CEO of PSCU: If there was a template for a Security Aware
CEO, it would be Chuck.
Michael Echols, CEO of the International Association for Certified ISAOs:
Mike is an exceptional resource given his broad range of private sector and
government experience.
Israel Martinez, CEO of Axon: A mentor and friend for many years.
Author
xxiii
http://taylorandfrancis.com
INTRODUCTION I
AND HISTORY
Let’s get started by looking at a little history, both from a personal and an informa-
tion security standpoint. In an era of unprecedented change, sometimes it takes a
look backward to help chart the course forward.
My best advice? Understand where you are before you decide how to get to your goal.
http://taylorandfrancis.com
Chapter 1
My name is Gene and I’m a long-term cybersecurity guy. In fact, I’m sneaking up
on retirement in a few years. I’m not sure if I should be relieved that I’ve survived or
sad that I will miss the daily challenge. As I reflect on my career as a CISO (Chief
Information Security Officer), it dawned on me that those of us around my age are
really the first generation of those to hold the CISO role. We have seen this career
path morph over the last 20 or so years from a sideline buried in information tech-
nology, to a strategic and visible role. I am excited about what the future holds for
those who succeed me.
I’ve seen all facets of information security change drastically over the years.
There is an old adage from the 1930s that basically said, “Better Bank Vaults Breed
Better Safe Crackers.” It really is a variant on the continuous improvement cycle.
As security technology becomes more robust, those creating ways to circumvent
the security become more technically competent and creative (Figure 1.1). This
continuing spiral means that we can’t become stagnant or complacent. If we do,
we will lose.
I’ve also seen the regulatory and governance side of the CISO job change. Let’s
be honest, when I accepted the first job where Information Security was part of the
title, it was “Manager of Information Security and E-mail.” Even the business was
not sure that this new “information security thing” would be a full-time job. Even
I wondered if technology might solve the whole virus and hacker problem. In the
1980s, there were few regulations about information protection, even in the finan-
cial services sector. Now, negotiating the complexity of overlapping and sometimes
conflicting regulations and laws can be mind-numbing at the least.
Also, to be honest, I thought that as I approached retirement, I would be spend-
ing more time at my desk, directing a great team who would be doing the hard
work. OK, now I know that was completely delusional. Today, I’m working harder
than I have in my life. Whatever rules there are, change daily.
3
4 ◾ The CISO Journey
A new threat
is published
A new
A new threat security
is born control is
created
Attackers
write an
attack to
evade control
As I thought about what kind of amazing book I would write, I, like many other
CISOs, came up with all sorts of technical and process topics. However, the more I
thought about it, the more it became obvious to me that this was probably not the
right choice.
As CISOs, we are charged with developing protection systems and processes
to protect the data of a specific company. Based in a large part on our experiences,
we design these systems, applying technologies to meet the needs of our business.
There is never a one size fits all. Given that, I’ve decided to share the journey from
mechanical engineer to CISO. The lessons and pearls of wisdom I’ve collected along
the way are what have collectively made me what I am today. Let me absolutely state
that I don’t consider myself the model of the world’s greatest CISO. God knows I’ve
had my share of problems over the years. What I’m hoping to do is share my mis-
takes, experiences, and lessons. Hopefully, you will find one or two of value in this
personal, slightly irreverent look at the evolution of a typical cybersecurity career.
Hopefully, you will see a little of yourself in the following pages.
Exploring the Variety of Random
Documents with Different Content
MOUNT HUNGER, MILL SETTLEMENT, BARTON'S
RIVER, VERMONT, May 19, 1896.
P.S. Rose says it is n't fair for people to order without knowing the
quality, so we 've done up a little of Mrs. Blossom's in some
Homeepatic (I don't know where that "h" ought to come in) pellet
bottles, and will send you a half-dozen "for samples," March says, to
send to any one to taste you think would like to order. H.C.
Yours devotedly,
HAZEL.
IX
THE PRIZE CHICKEN
The rest joined in the singing with such goodwill that the noise
brought in Chi from the barn. When he was told the reason for the
rejoicing, he looked thoughtful, then sober, then troubled.
"What's the matter, Chi? Cheer up! You have n't got to pick
them," said March.
"'T ain't that; but I hate to throw cold water on any such
countin'-your-chickens-'fore-they 're-hatched business," said Chi.
"'T is n't chickens; it's preserves, Chi," laughed Rose.
"I know that, too," said Chi, gravely. "But suppose you do a little
figuring on the hind-side of the blackboard."
"What do you mean, Chi?" asked Hazel.
"Well, I 'll figure, 'n' see what you think about it. Seventeen
dozen times four, how much, March?"
"Eight hundred and sixteen."
"Hm! eight hundred and sixteen glass jars at twelve and a half
cents apiece--let me see: eight into eight once; eight into one no
times 'n' one over. There now, your jars 'll cost you just one hundred
and two dollars."
There was a universal groan.
"'N' that ain't all. Sugar 's up to six cents a pound, 'n' to keep
preserves as they ought to be kept takes about a pound to a quart.
Hm, eight hundred 'n' sixteen pounds of sugar at six cents a pound--
move up my point 'n' multiply by six--forty-eight dollars 'n' ninety-six
cents; added to the other--"
"Oh, don't, Chi!" groaned one and all.
"It spoils everything," said Rose, actually ready to cry with
disappointment.
"Well, Molly Stark, you 've got to look forwards and backwards
before you promise to do things," said Chi, serenely; and Rose,
hearing the Molly Stark, knew just what Chi meant.
She went straight up to him, and, laying both hands on his
shoulders, looked up smiling into his face. "I 'll be brave, Chi; we 'll
make it work somehow," she said gently; and Chi was not ashamed
to take one of the little hands and rub it softly against his unshaven
cheek.
"That's my Rose-pose," he said. "Now, don't let's cross the
bridges till we get to them; let's wait till we hear from New York."
They had not long to wait. The next day's mail brought three
letters,--from Mrs. Heath, Mr. Clyde, and Jack. Hazel could not read
them fast enough to suit her audience. There was an order from
Mrs. Heath for two dozen of each kind, and the assurance that she
would ask her friends, but she would like her order filled first.
Mr. Clyde wrote that he was coming up very soon and would
advance Hazel's quarterly allowance; at which Hazel cried, "Oh-ee!"
and hugged first herself, then Mrs. Blossom, but said not a word.
She wanted to surprise them with the glass jars and the sugar. Her
father had enclosed five dollars with which to pay Chi, and he and
Hazel were closeted for full a quarter of an hour in the pantry,
discussing ways and means.
Jack wrote enthusiastically of the preserves and chickens, and,
like Hazel, added a postscript as follows:
"Don't forget you said you would write down for me the song
about Love that Miss Blossom sings when she is kneading bread.
Miss Seaton is just now visiting in Boston. I 'm to play in a polo
match out at the Longmeadow grounds next week, and she stays for
that." This, likewise, Hazel kept to herself.
Meanwhile, the strawberry blossoms were starring the pastures,
but only here and there a tiny green button showed itself. It was a
discouraging outlook for the other Blossoms to wait five long weeks
before they could begin to earn money; and the thought of the
chickens, especially the prize chicken, proved a source of comfort as
well as speculation.
As the twenty-first day after setting the hens drew near, the
excitement of the race was felt to be increasing. Hazel had tied a
narrow strip of blue flannel about the right leg of each of her twelve
hens, that there might be no mistake; and the others had followed
her example, March choosing yellow; Cherry, white; Rose, red; and
Budd, green.
The barn was near the house, only a grass-plat with one big elm
in the centre separated it from the end of the woodshed. As Chi
said, the hens were sitting all around everywhere; on the nearly
empty hay-mow there were some twenty-five, and the rest were in
vacant stalls and feed-boxes.
It was a warm night in early June. Hazel was thinking over
many things as she lay wakeful in her wee bedroom. To-morrow was
the day; somebody would get the prize chicken. Hazel hoped she
might be the winner. Then she recalled something Chi had said
about hens being curious creatures, set in their ways, and never
doing anything just as they were expected to do it, and that there
was n't any time-table by which chickens could be hatched to the
minute. What if one were to come out to-night! The more she
thought, the more she longed to assure herself of the condition of
things in the barn. She tossed and turned, but could not settle to
sleep. At last she rose softly; the great clock in the long-room had
just struck eleven. She looked out of her one window and into the
face of a moon that for a moment blinded her.
Then she quietly put on her white bath-robe, and, taking her
shoes in her hand, stepped noiselessly out into the kitchen.
There was not a sound in the house except the ticking of the
clock. Softly she crept to the woodshed door and slipped out.
Chi, who had the ears of an Indian, heard the soft "crush,
crush," of the bark and chips underneath his room. He rose
noiselessly, drew on his trousers, and slipped his suspenders over his
shoulders, took his rifle from the rack, and crept stealthily as an
Apache down the stairs. Chi thought he was on the track of an
enormous woodchuck that had baffled all his efforts to trap, shoot,
and decoy him, as well as his attempts to smoke and drown him out.
But nothing was moving in or about the shed. He stepped outside,
puzzled as to the noise he had heard.
"By George Washin'ton!" he exclaimed under his breath, "what's
up now?" for he had caught sight of a little figure in white fairly
scooting over the grass-plat under the elm towards the barn. In a
moment she disappeared in the opening, for on warm nights the
great doors were not shut.
"Guess I 'd better get out of the way; 't would scare her to
death to see a man 'n' a gun at this time of night. It's that prize
chicken, I 'll bet." And Chi chuckled to himself. Then he tiptoed as
far as the barn door, looked in cautiously, and, seeing no one, but
hearing a creak overhead, he slipped into a stall and crouched
behind a pile of grass he had cut that afternoon for the cattle.
He heard the feet go "pat, pat, pat," overhead. He knew by the
sound that Hazel was examining the nests. Then another noise--
Cherry's familiar giggle--fell upon his ear. He looked out cautiously
from behind the grass. Sure enough; there were the twins, robed in
sheets and barefooted. Snickering and giggling, they made for the
ladder leading to the loft.
"The Old Harry 's to pay to-night," said Chi, grimly, to himself.
"When those two get together on a spree, things generally hum! I 'd
better stay where I 'm needed most."
Hazel, too, had caught the sound of the giggle and snicker, and
recognized it at once.
"Goodness!" she thought, "if they should see me, 't would
frighten Cherry into fits, she 's so nervous. I 'd better hide while they
're here. They 've come to see about that chicken, just as I have!"
Hazel had all she could do to keep from laughing out loud. She lay
down upon a large pile of hay and drew it all over her. "They can't
see me now, and I can watch them," she thought, with a good deal
of satisfaction.
Surely the proceedings were worth watching. The moonlight
flooded the flooring of the loft, and every detail could be plainly
seen.
"Nobody can hear us here if we do talk," said Budd. "You 'll
have to hoist them up first, to see if there are any chickens, and be
sure and look at the rag on the legs; when you come to a green
one, it's mine, you know."
"Oh, Budd! I can't hoist them," said Cherry, in a distressed
voice.
"They do act kinder queer," replied Budd, who was trying to lift
a sleeping hen off her nest, to which she seemed glued. "I 'll tell you
what's better than that; just put your ear down and listen, and if you
hear a 'peep-peep,' it's a chicken."
Cherry, the obedient slave of Budd, crawled about over the
flooring on her hands and knees, listening first at one nest, then at
another, for the expected "peep-peep."
"I don't hear anything," said Cherry, in an aggrieved tone, "but
the old hens guggling when I poke under them. Oh! but here 's a
green rag sticking out, Budd."
"And a speckled hen?" said Budd, eagerly.
"Yes."
"Well, that's the one I 've been looking for; it's dark over here in
this corner. Lemme see."
Budd put both hands under the hen and lifted her gently. "Ak--
ok--ork--ach," gasped the hen, as Budd took her firmly around the
throat; but she was too sleepy to care much what became of her,
and so hung limp and silent.
"I 'll hold the hen, Cherry, and you take up those eggs one at a
time and hold them to my ear."
"What for?" said Cherry.
"Now don't be a loony, but do as I tell you," said Budd,
impatiently. Cherry did as she was bidden; Budd listened intently.
"By cracky! there 's one!" he exclaimed. "Here, help me set this
hen back again, and keep that one out."
"What for?" queried Cherry, forgetting her former lesson.
"Oh, you ninny!--here, listen, will you?" Budd put the egg to her
ear.
"Why, that's a chicken peeping inside. I can hear him," said
Cherry, in an awed voice.
"Yes, and I 'm going to let him out," said Budd, triumphantly.
"But then you'll have the prize chicken, Budd," said Cherry,
rather dubiously, for she had wanted it herself.
"Of course, you goosey, what do you suppose I came out here
for?" demanded Budd.
"But, Budd, will it be fair?" said Cherry, timidly.
"Fair!" muttered Budd; "it's fair enough if it's out first. It's their
own fault if they don't know enough to get ahead of us."
"Did you think it all out yourself, Budd?" queried Cherry,
admiringly, watching Budd's proceeding with wide-open eyes.
"Yup," said Budd, shortly.
They were not far from Hazel's hiding-place, and, by raising her
head a few inches, she could see the whole process.
First Budd listened intently at one end of the egg, then at the
other. He drew out a large pin from his pajamas and began very
carefully to pick the shell.
"Oh, gracious, Budd! what are you doing?" cried Cherry.
"What you see," said Budd, a little crossly, for his conscience
was not wholly at ease.
He picked and picked, and finally made an opening. He
examined it carefully.
"Oh, thunder!" he exclaimed under his breath, "I 've picked the
wrong end."
"What do you mean?" persisted Cherry.
"I wanted to open the 'peep-peep' end first, so he could
breathe," replied Budd, intent upon his work. Cherry watched
breathlessly. At last the other end was opened, and Budd began to
detach the shell from something which might have been a worm, a
fish, a pollywog, or a baby white mouse, for all it looked like a
chicken. It lay in Budd's hand.
"Oh, Budd, you 've killed it!" cried Cherry, beginning to sniff.
"Shut up, Cherry Blossom, or I'll leave you," threatened Budd.
Just then the moon was obscured by a passing cloud, and the loft
became suddenly dark and shadowy. Cherry screamed under her
breath.
"Oh, Budd, don't leave me; I can't see you!"
There was a soft rapid stride over the flooring; and before Budd
well knew what had happened, he was seized by the binding of his
pajamas, lifted, and shaken with such vigor that his teeth struck
together and he felt the jar in the top of his head.
As the form loomed so unexpectedly before her, Cherry
screamed with fright.
"I 'll teach you to play a business trick like this on us, you mean
sneaking little rascal!" roared March. "Do you think I did n't see you
creeping out of the room along the side of my bed on all fours? You
did n't dare to walk out like a man, and I might have known you
were up to no good!" Another shake followed that for a moment
dazed Budd. Then, as he felt the flooring beneath his feet, he turned
in a towering passion of guilt and rage on March.
"You 're a darned sneak yourself," he howled rather than cried.
"Take that for your trouble!" Raising his doubled fist, he aimed a
quick, hard blow at March's stomach. But, somehow, before it
struck, one strong hand--not March's--held his as in a vice, and
another, stronger, hoisted him by the waist-band of his pajamas and
held him, squirming and howling, suspended for a moment; then he
felt himself tossed somewhere. He fell upon the hay under which
Hazel had taken refuge, and landed upon her with almost force
enough to knock the breath from her body. Cherry, meanwhile, had
not ceased screaming under her breath, and, as Budd descended so
unexpectedly upon Hazel, a great groan and a sharp wail came forth
from the hay, to the mortal terror of all but Chi, who grew white at
the thought of what might have happened to his Lady-bird, and,
unintentionally, through him.
That awful groan proved too much for the children. Gathering
themselves together in less time than it takes to tell it, they fled as
well as they could in the dark,--down the ladder, out through the
barn, over the grass-plat, into the house, and dove into bed,
trembling in every limb.
"What on earth is the matter, children?" said Mrs. Blossom,
appearing at the foot of the stairs. "Did one of you fall out of bed?"
Budd's head was under the bedclothes, his teeth chattering
through fear; likewise Cherry. March assumed as firm a tone as he
could.
"Budd had a sort of nightmare, mother, but he 's all right now."
March felt sick at the deception.
"Well, settle down now and go to sleep; it's just twelve." And
Mrs. Blossom went back into the bedroom where Mr. Blossom was
still soundly sleeping.
Meanwhile, Chi was testing Hazel to see that no harm had been
done.
"Oh, I 'm all right," said Hazel, rather breathlessly. "But it really
knocked the breath out of my body." She laughed. "I never thought
of your catching up Budd that way and plumping him down on top
of me!"
"Guess my wits had gone wool-gatherin', when I never thought
of your hidin' there," said Chi, recovering from his fright. "But that
boy made me so pesky mad, tryin' to play such a game on all of us,
that I kind of lost my temper 'n' did n't see straight. Well--" he
heaved a sigh of relief, "he 's got his come-uppance!"
"Where do you suppose that poor little chicken is?"
"We 'll look him up; the moon 's comin' out again."
There, close by the nest, lay the queer something on the floor.
"I 'll tuck it in right under the old hen's breast, 'n' then, if there 's
any life in it, it 'll come to by mornin'." He examined it closely. "I 'll
come out 'n' see. Come, we 'd better be gettin' in 'fore 't is dark
again--"
He put the poor mite of a would-be chicken carefully under the
old hen, where it was warm and downy, and as he did so, he caught
sight of the rag hanging over the edge of the nest. He looked at it
closely; then slapping his thigh, he burst into a roar of laughter.
"What is it, Chi?" said Hazel, laughing, too, at Chi's mirth.
"Look here, Lady-bird! you 've got the Prize Chicken, after all.
That boy could n't tell green from blue in the moonlight, 'n' he 's
hatched out one of yours. By George Washin'ton! that's a good one,-
-serves him right," he said, wiping the tears of mirth from his eyes.
The chicken lived, but never seemed to belong to any one in
particular; and as Chi said solemnly the next morning, "The less said
on this Mountain about prize chickens, the better it 'll be for us all."
X
AN UNEXPECTED MEETING
His friend turned to the others. "That's a go; I 've never seen Sherrill
so hard hit before." Then he fell to discussing the new plan with the
rest.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com