Operations

4/27/2016
11:30 AM
Joshua Goldfarb
Joshua Goldfarb
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
50%
50%

8 Signs Your Security Culture Lacks Consistency

Organizations that practice what they preach and match their actions to their words do far better achieving their goals than those that do not. Here's why that matters.

Recently I interacted with someone who was friendly, tolerant, and accepting in public, but in private turned out to be unfriendly, intolerant, and hateful. I’m sure nearly all of us have come across this type of person at one time or another. But rather than let interactions such as these anger or frustrate me, I always try to learn a life lesson from them.  In this case, in addition to a life lesson, there is also a security lesson. It’s about consistency.

Consistency is a critical trait that successful security professionals, security leaders, and security programs all share but is too often overlooked and underestimated.  How many people have we met that can confidently fast talk their way through an interview or a meeting, only to have their true lack of skills become evident at the most inopportune of times?  How many security leaders have we seen publicly profess expertise and experience, only to privately reveal that in fact they lack those two important aspects?  How many security programs have been marketed and sold to us as “world class” only to have a peek beneath the covers reveal the extent to which this is not actually the case?

Image source: Picserver.org
Image source: Picserver.org

The common trait that is lacking in all of the above situations is consistency.  Lack of consistency can become a cultural blight within an organization that will actually impede security maturity and harm the organization’s security posture in the long run.  Before we can understand these ramifications, we need to understand some of the signs of a culture lacking consistency. They include:

  • Talk without action: As the old sayings go, “talk is cheap” and “actions speak louder than words.”  Sometimes, an organization, and particularly an organization’s leadership, talk a big security game.  But sadly, that talk isn’t always backed up by action.
  • Do as I say, not as I do:  Often, those who lecture on security or set security policy don’t actually practice what they preach.  This is an unfortunate circumstance that occurs far too often.
  • We have to do something:  I can’t keep track of how many times I’ve heard the phrase, “well, we *have* to do *something*”.  Anyone can do “something”, but doing the right thing, something that is both constructive and helpful, is something different entirely.
  • We have the finest people:  Almost all organizations tout the quality of their people.  The security organization is usually no different in that regard.  But backing that assertion up with consistent action is important to an organization’s security posture.
  • Our customers’ privacy is extremely important to us:  This assertion reminds me of those automated phone system messages, such as “your call is important to us”.  Really?  If my call was important to you, wouldn’t you have a human answer?  It’s one thing to say that customer privacy is important to the organization, but another thing entirely to actually mean it and work to safeguard that sensitive information.

Unfortunately, inconsistency within a security team can have cascading effects that impede growth and maturity of the entire organization:

  • Talk without action: I’ve heard plenty of people talk a big security game.  But that talk needs to be backed up by action. Are investments in people, process, and technology made at a level becoming of a world class security program? Are security staff addressing issues and challenges that will truly improve the security posture of the organization? Does leadership truly understand and support the strategic goals and priorities of the security organization?  If the answer to any of these questions is no, it’s going to be hard to achieve the desired results because actions are not consistent with words.
  • Do as I say, not as I do:  People aren’t naive.  If security leaders and security organizations don’t lead by example, no one will follow.  If what we do is inconsistent with what we say, we can’t realistically expect anyone to heed our word and follow our advice.  And that doesn’t bode very well for the security posture of an organization.
  • We have to do something:  Knee jerk reactions never solve anything. In fact, they almost always impede the progress of a security team and lower the security posture of an organization.  Diverting resources to the current shiny object is inconsistent with a strategic, holistic approach to security based upon risk mitigation.  To my knowledge, that is the only way to build a successful security organization.
  • We have the finest people:  If you say it, mean it.  Train your people.  Equip them with the right tools to do their job.  Educate up the management chain and laterally so the team can do their jobs.  Support them when politics, conventional wisdom, knee jerk reactions, or other distractions threaten to divert focus and progress away from where it needs to be.  Be consistent for the good of the team and the good of the program.
  • Our customers’ privacy is extremely important to us:  Really?  Are you prioritizing mitigating the risk that customer data will be stolen, or are you merely paying lip service to this sensitive subject?  Are you adequately prioritizing this risk and working to mitigate it with the right mix of people, process and technology?  What customers want with respect to the privacy of their data is consistency.  If you say that protecting their data is important, they want you to mean it. 

Consistency is an important but often overlooked trait in security. Security professionals, leaders, and programs that practice what they preach and match their actions to their words do far better in the long run than those that do not. Fast talking may fool some people in the near-term, but in the long-run, the truth usually surfaces.  Be consistent -- your security program will be better off for it.

Related Content: 

Gain insight into the latest threats and emerging best practices for managing them. Attend the Security Track at Interop Las Vegas, May 2-6. Register now!

Josh (Twitter: @ananalytical) is an experienced information security leader with broad experience building and running Security Operations Centers (SOCs). Josh is currently co-founder and chief product officer at IDRRA and also serves as security advisor to ExtraHop. Prior to ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Now about that mortgage refinance offer from Wells Fargo .....
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6970
PUBLISHED: 2018-08-13
VMware Horizon 6 (6.x.x before 6.2.7), Horizon 7 (7.x.x before 7.5.1), and Horizon Client (4.x.x and prior before 4.8.1) contain an out-of-bounds read vulnerability in the Message Framework library. Successfully exploiting this issue may allow a less-privileged user to leak information from a privil...
CVE-2018-14781
PUBLISHED: 2018-08-13
Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolu...
CVE-2018-15123
PUBLISHED: 2018-08-13
Insecure configuration storage in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows remote attacker perform new attack vectors and take under control device and smart home.
CVE-2018-15124
PUBLISHED: 2018-08-13
Weak hashing algorithm in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows unauthenticated attacker extract clear text passwords and get root access on the device.
CVE-2018-15125
PUBLISHED: 2018-08-13
Sensitive Information Disclosure in Zipato Zipabox Smart Home Controller allows remote attacker get sensitive information that expands attack surface.