Risk

4/10/2008
04:45 PM
Rob Preston
Rob Preston
Commentary
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Down To Business: It's Past Time To Elevate The Infosec Conversation

At the RSA conference, the security discussion was about helping customers innovate and deliver business value.

The RSA Conference, the annual security fest hosted by EMC unit RSA, is to the information security industry what the New Hampshire primary is to the presidential election process: the first major venue for the leading players to set the tone and frame the discussion for the coming year.

Last year, RSA chief Art Coviello championed industry consolidation, arguing that as a handful of major vendors (EMC, Cisco, IBM, Microsoft) built security into their infrastructure platforms, standalone security challengers would fall by the wayside--all within three years. "If I'm proven wrong about the timing," Coviello said last year, "I won't be proven wrong in the need for this." The likes of Symantec and McAfee begged to differ, and the industry continues to debate the strengths and weaknesses of all-in-one security architectures.

RSA, as host vendor, sought to exploit its home turf advantage again last week, when Coviello struck a different tone. Instead of focusing on industry restructuring and technology architectures, he elevated the security discussion to one about helping customers innovate and deliver business value.

More than 80% of the IT, security, and business executives RSA recently surveyed with IDC "admit that their organizations have shied away from business innovation opportunities because of information security concerns," Coviello told the RSA audience. The main challenge: Move the internal conversation about security away from fear mongering and worst-case scenarios toward how security can augment new products and services. Or at least don't get in the way. It's tantamount to the security pro's Hippocratic oath: First, do no harm.

While RSA offers no elixir for making security a "business enabler," it has created a Security for Business Innovation Council to get security pros talking about the issue. RSA quotes member David Kent, VP of security for biotech company Genzyme: "If you are doing your job, you shouldn't even sound like a security person. The business doesn't care how many viruses you stopped. ... 'How are you helping me meet my business objectives?'"

Likewise, InformationWeek contributor Greg Shipley, CTO of security consultancy Neohapsis, urges security pros to integrate risk management into all processes. They also need to get better at understanding and relating to their internal audiences, assessing which data to assign the most protection, and picking their battles and technologies more carefully. "For some organizations," Shipley writes, "this will require a wholesale transformation."(See Risk Management: Do It Now, Do It Right.)

It's still early in this evolution. When asked last year how their companies measure the value of their security investments, the 1,100 U.S. respondents to InformationWeek's Global Information Security Survey offered a stew of mostly operational criteria: 43% said they measured value in terms of reduced worker hours spent on security; 33% measured it in reduced breaches; 33% in reduced network downtime; and 24% in reduced incident response times. With the exception of improving intellectual property protection (27%) and honing risk management strategies (25%), none of the criteria selected relates to business value. In fact, 24% of the respondents didn't measure the value of their security investments at all.

The sooner security pros can converse in the language of risk mitigation and business opportunity, the more they'll be involved in strategic planning and the less they'll be considered a cost center.

Compare Coviello's nuanced approach to the classic fire and brimstone of Homeland Security Secretary Michael Chertoff, who at RSA last week warned that a large-scale cyberattack on the United States could inflict damage comparable to the Sept. 11, 2001, terrorist attacks. Chertoff likened U.S. government efforts to improve cybersecurity to the Manhattan Project, which developed the atomic bomb.

Chertoff has his own unique war to fight; enterprise security pros may want to use Manhattan Project metaphors sparingly.

Rob Preston,
VP and Editor in Chief
[email protected]

To find out more about Rob Preston, please visit his page.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Hacked IV Pumps and Digital Smart Pens Can Lead to Data Breaches
Dawn Kawamoto, Associate Editor, Dark Reading,  12/4/2017
Tips for Writing Better Infosec Job Descriptions
Kelly Sheridan, Associate Editor, Dark Reading,  12/4/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.