Perimeter
5/16/2012
01:23 PM
Mike Rothman
Mike Rothman
Commentary
50%
50%

Time To Deploy The FUD Weapon?

When suffering from compliance fatigue, you may have only one option to getting the funding you need to do your job

I liked the recent Dark Reading column from Glenn Phillips because it's real. Folks who run companies need to make decisions every day about resource allocation, and the compliance hammer doesn't always work to secure funding for security projects -- not when it's competing for resources to keep the business running. But that doesn't help you, the security professional, does it?

Your charter involves protecting the critical information assets of the organization. Over the past few years, compliance has been pretty handy, right? Just whisper PCI or HIPAA, and the money tree sprouts manna to feed all of your security sales reps, service providers, consultants, and the like. At least that's the way it has been. Yet all good things come to an end. As I wrote last month, PCI could be a dead man(date) walking, which would be a cursor to the end of the compliance gravy train. Until we see some serious enforcement actions, there is only so long that CFOs and other bean counters will continue footing the bill. Compliance fatigue is happening.

So what now, professor? It's time to redeploy the FUD weapon. Don't pretend you don't know what I'm talking about. You see it from the vendors all the time. They try to use Fear, Uncertainty, and Doubt (FUD) all the time. They come equipped with a variety of press clippings about this breach, that attack, or word of nation-states hacking each other and knocking down nuclear reactors. All of that could happen to you, unless you buy Product A, right? (With the side benefit of helping the rep make the monthly payment on his too-expensive car.)

Obviously, you can tell I'm not a big fan of FUD within the context of selling security products. But that doesn't mean you can't use FUD to help sell your security program. Yes, there is a time and a place for FUD; in the hands of a skilled security practitioner, you can make a very important point to your executives and have a better chance at securing the funding you need for the projects critical to achieving your charter.

A good example of this FUD can be found in a recent interview on NPR. It seems the Department of Defense has been deploying the FUD weapon on large companies for years. It brings CEOs in and scares the hell out of them. It gives them a day-long Top Secret clearance and provides some visibility into the tools and tactics our folks are using to attack our adversaries. Think about Stuxnet. Yeah, that kind of stuff.

I'd imagine this would be a pretty powerful technique to get CEO-types to take security more seriously. Of course, you probably don't have the Cyber Command at your disposal to brief your senior team. But that doesn't mean the approach isn't worthwhile at times. You can do a post-mortem on a recent breach and show how that stuff can happen to you. Not that it will, but that it could. Not in a Chicken Little way, but in a matter-of-fact way. It's important that your FUD weapon isn't perceived as a shakedown, but, rather, an educational briefing to make sure your senior team is aware of the latest and greatest attacks.

I'm all too aware that FUD is a slippery slope. In a perfect world, you should have buy-in for the security program and not have to fight for every nickel and dime used to stay current. In the real world, you see examples like Glenn's above, where the senior folks are OK with taking the risk. Guess what happens when the inevitable happens? Right, you (the security person) get thrown under the bus.

To be clear, the FUD weapon should be used as a last resort -- kind of like a self-preservation act that happens right before you send your resume off to your favorite security recruiter if things don't go your way. But every so often, the weapon hits its mark and cracks open Fort Knox -- which is a good thing for your security sales rep. It also allows you to play, at least for a little while. Though it's probably not a bad idea to keep that resume updated in any case.

Mike Rothman is president of Securosis and author of the Pragmatic CSO. Mike's bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Title Partners Role in Perimeter Security
Title Partners Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.