Are you prepared for your next security crisis? Learn these lessons before you hit the panic button
After a lot of thought, Im fairly certain that I would never recommend my career path to an aspiring information security professional. I started out by hacking friends' bulletin board systems back in the 1980s something society has become less tolerant about in the current day.
At age 18, I was working on the security staff at concerts and football games at 5'7" and 135 pounds, I got a learning experience, but not the kind that necessarily improves your exploit development or network protection skills. Later, I worked in the back of an ambulance and did mountain rescue again, experiences that taught me a lot, but not the kinds of things that help you roll out that security awareness program.
An early career path like this is definitely a lot of fun, however. And on the off chance you survive the first part of the training program and then get a job as a PC technician, you might be able to build it into an IT security career, like I did.
First, turn that PC tech job into a systems and network administrator position. Learn HTML when Mosaic came out, and turn that into your very own software development department for a major university. All of a sudden computers dont look so bad.
Leave the university with a history degree, start your own security and web development consulting company, get recruited by a better company thats acquired by Gartner three months later, and you might wake up one morning as an industry analyst.
Spend seven years as an industry analyst specializing in data and application security security, and you might just be able to start a blog and go into independent consulting. I hope you make it through this strange but unusual career program then I wont be the only washed-up-former-paramedic-ski-patroller-rock-security-ex-analyst-data-security-geek-blogger-consultant in the business.
One advantage of such a strange career path which spans physical security and emergency response along with more traditional technical positions is that it helps to learn lessons in the physical world that are overlooked by many who work only in IT. For example, take breach disclosure.
More often than not, when an organization is the victim of a data breach, its people fumble the response. Many organizations attempt to cover up the breach, with varying degrees of success. Once the breach is revealed, most organizations attempt to minimize the potential impact with press statements that always seem to start with, "The safety of our customers is our top concern" and end with "we dont believe out customers are at risk." If the organization does explain how a breach occurred, it usually doesnt release details until months if not years after the incident.
Is this the best approach to breach disclosure? To answer this question, let's try a little regression therapy. Take yourself back to 1982 the year the Commodore 64 was released and imagine what would happen if Johnson & Johnson treated the Tylenol tampering case like a modern breach disclosure.
If you don't remember it, about 15 years ago, seven people lay dead or dying in the Chicago area from some sort of poisoning, and law enforcement investigations indicated that Tylenol was involved, perhaps through contamination in the manufacturing process or through bottle-tampering in retail stores.
If Johnson & Johnson followed today's breach disclosure practices, the company would perform an internal investigation of their factories, while urging the police to avoid making any public statements. The lawyers would begin combing through business contracts and regulations to see if they had any legal obligation to disclose the tampering.
Eventually, someone in PR would learn that the police were going to go public, and Johnson & Johnson would begin notifying only the potentially affected stores in the Chicago area. The company would release a statement that they take the lives of their customers very seriously, and have engaged a consulting company to identify the scope of the problem. Sick customers would be advised to enroll themselves in a health care plan with health monitoring.
In breach-disclosure world, the police investigation would reveal that that the Tylenol was tampered with, after it was on the shelves. Johnson & Johnson would issue a press release stating that its internal security controls were not breached, and the deaths were the result of security lapses with their trusted business partners.
Company executives in our hypothetical situation would begin calling reporters and discussing how they cant be held responsible for lapses at the retail outlets. A former employee would go public and state (on a BBS, since its 1982) that he or she warned the company of potential tampering with the current product line, but was fired for demonstrating techniques to management during a meeting.
More people would die, the details would never become public, and nothing would prevent future incidents with other companies.
Fortunately, Johnson & Johnson didnt treat the Tylenol tampering case like most enterprises treat data breach disclosure. Once its product was identified as the source of the deaths, the company immediately halted all production and advertising.
Hospitals were advised, a national recall was issued, and Johnson & Johnson began a national advertising campaign to warn people from using any products containing Tylenol. The exact source of the tampering was identified and publicized, and Tylenol was reintroduced into the market with the tamper resistant packaging thats now standard across the industry. In less than a year, J&J stock returned to normal levels and Tylenol continued to dominate the market.
The Tylenol tampering incident is now a textbook example of crisis communications something were actually taught in emergency services. By accepting responsibility, placing its customers first, communicating clearly and honestly, and taking decisive action to end the incident and ease public safety concerns, Johnson & Johnson retained the trust of the public and the market for Tylenol.
Truth, honesty, and respect for your customers are a strength, not a weakness. Crisis communications experts know that spinning an incident with anything less usually leads to far worse consequences.
Rich Mogull is founder of Securosis LLC and a former security industry analyst for Gartner. Special to Dark Reading.