Analytics
8/26/2013
05:31 PM
Mike Rothman
Mike Rothman
Commentary
50%
50%

Incentives And Organizational Alignment (Or Lack Thereof)

The lack of incentives for security effectiveness remains a problem for security professionals. Until we define legitimate success criteria as the basis to align the organization around security, nothing will change

Salespeople are very predictable. They will act in the best interest of their wallets, at all times. I don't say that in a judgmental or critical fashion; I'm just stating fact. That's why corporate executive teams painstakingly spend weeks generating sales compensation plans each year. The comp plan defines how the sales force will behave, what they will sell, and, more importantly, what they won't. If a senior team gets the comp plan wrong, the chances for success are limited.

It's just human nature. Incentives drive behavior. And such is the problem of doing security. What's the incentive for doing security well? How do you even know if you're doing security well? If you beat back the attackers, what happens? Nothing. Actually, you don't get kicked in the teeth that day. So there's that. If you miss something and it results in data loss or downtime, get ready to take your lumps. It's a thankless job. And your incentive to excel is keeping your job -- which on most days doesn't feel like an incentive, right?

So how do we solve this problem? We have to define proper incentives for a security team. It certainly can't be stuff that doesn't impact the business. So if your MBO is based on shortening patch windows or full AV coverage, that's a huge fail. How about a bonus for achieving PCI compliance? Yeah, since PCI is such a high bar for security, you should definitely be incenting the security team to achieve mediocrity.

Likewise, if your success criteria (and associate bonus plan) hinges on having no data losses or breaches, you are being set up for failure. The fact is incidents happen. Whether we like it or not. You could do everything right and still get pwned. You want an incentive plan that doesn't ignore failure, but also puts a bulk of the incentive on things within your control.

Given that fact, what would be most impactful to the business? Maybe time to remediate an incident? Set a baseline and set objectives for improvement. That would impact the business, no? Of course, that can be a little squishy, but you have to start somewhere. How about something that prevents train wrecks before the train leaves the station? By that I'm referring to application security. Maybe something like number of security defects identified and fixed before applications go to production. That's not exactly in your control, but it's pretty important to the business.

You can quibble all you want about whether your security awareness training helps secure your environment. Yet with rampant social engineering attacks, how can you not spend some time training the weakest link in the chain -- your users? How about tracking the results of your internal social engineering simulations and providing incentives for improvement in the rank and file?

And it's not just the security team who need incentives to achieve security objectives. What about the operations folks who drag their heels on a firewall change (or, even worse, make a mistake), causing a potentially exploitable situation? What is their incentive to take a chance the firewall change causes downtime by closing a critical port? And how do you expect developers to write secure code when their incentive is to ship working code on time and within the budget? Right, they won't. Incentives create alignment within organizations as well. Without that alignment, achieving security goals is mission impossible.

This sounds an awful lot like a metrics discussion -- and it is. We, as an industry, have done a poor job of standardizing on a set of success criteria that indicate acceptable security posture. Without that success criteria and accompanying metrics to drive that behavior, you can't really design incentive programs to get both the security team, operations, developers, and the employee base to do the right things.

By the way, it's not like I have a lot of answers to address this issue. In my varied travels, it's hard to find folks who are happy with the incentive programs for the security team. Incentives are either nonexistent or based on activity that doesn't really reflect security posture or help the business. Until we get a much better handle on these incentives, folks will continue to ignore the need to secure things. That means we'll continue to repeat Groundhog Day over and over again.

Although I guess we could go all Game of Thrones and parade the head of the latest phishing victim on a stick in the cafeteria. That would certainly get everyone's attention, no? Mike's bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Drew Conry-Murray
50%
50%
Drew Conry-Murray,
User Rank: Ninja
8/28/2013 | 12:29:54 AM
re: Incentives And Organizational Alignment (Or Lack Thereof)
Glad to see you raising this discussion. You're right that the current incentive infrastructure (i.e., nothing bad happened today so you get to keep your job) is a poor one. I'd love to see folks weigh in with some examples of successful incentives they've rolled out at their own organizations.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.