Threat Intelligence

5/30/2018
10:30 AM
Matthew Doan
Matthew Doan
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Getting Revolutionary (Not Evolutionary) about Cybersecurity

Being a security revolutionary isn't purely about new, ground-breaking ideas. It's about anticipating, outpacing, and influencing your world, both internally and externally. Here are five keys to success.

Hockey legend Wayne Gretzky is famous for his saying, "skate to where the puck is going, not where it has been." The phrase has made its way across industry for years, with many leaders such as Warren Buffett touting its strategic relevance. Naysayers claim that if everyone looks long-term, then the advantage cancels out. Bogus, I say! As it relates to cybersecurity, especially if you're at a large company or government agency, you can't afford to ignore this advice. Instead, you'd better dissect how this phrase applies to your world. Let's break it down.

Why Chasing the Puck Is Hard (Being Evolutionary)
You know that feeling of always playing catch-up? Where no matter how hard you prioritize and "crush it," you feel like you're making literally no progress at all? And whether you're an executive leader or operational cybersecurity guru, I'll bet that you feel like you're always "chasing the puck," as Gretzky would put it. CISOs and other cyber leaders are constantly battling — and struggling — to obtain buy-in from business leaders on the value proposition of the cyber mission and resources to help execute it.

Likewise, security practitioners are dealing with a seemingly endless barrage of challenges in gaining appropriate asset visibility, monitoring for worrisome activity, playing whack-a-mole with incidents, and implementing security mechanisms that allow the business to quickly adapt and grow in line with market demands. This is the evolutionary approach, where security programs are working to make incremental progress as they see the world around them changing. It's largely reactive, and terrifyingly exhausting. And today, many security and risk management professionals are finding it to be a fool's errand. For all this churn, the return on investment just isn't surfacing, nor are security leaders and practitioners getting the respect they deserve.

Why Staying out in Front Is Better (Being Revolutionary)
If what you're reading so far doesn't jibe with your experience, please suspend your disbelief for the moment. At the core, being revolutionary in this context isn't purely about new, groundbreaking ideas. It's about anticipating, outpacing, and influencing your external world. It's a radical shift in how to approach the challenge, including moving:

  • From here and now … to future oriented: You're actively looking over the horizon from the business perspective. You see where the ship is heading — the changing business models (e.g., shift from products to service platforms), required infrastructure, new partnerships, and overall strategic priorities. You'll orient security around this reality.
  • From consumer … to designer: You're no longer figuring out enterprise business and technology strategies after the fact and bolting on security reactively. Instead, security has a seat at the relevant tables as a top-level, heavily valued influencer. In this scenario, security is shaping decisions based on risk and reward, for overall business health and prosperity. Focus topics will include back-end IT infrastructure, product and service design, production, and business partner selection.
  • From static … to dynamic: The security program moves beyond a "set it and forget it" capability and organizational configuration. It's now an agile, living instrument that lives for energizing the business. The connective tissue that binds the security program and the business is so strong that it acts as one. Interpersonal relationships are very strong between the two sides, the cyber value proposition is mutually understood, and communication about needs and priorities flows back and forth seamlessly.
  • From cost center … to profit enabler: The mindset shift needs to occur inside and outside of the security program. Gone is the perception of business having to pay the "security tax," or a CISO having to get by on a woefully unrealistic budget. Instead, the enterprise sees the value of infusing cybersecurity "goodness" up and down the value chain to increase brand value and guarantee the product and service promises made to downstream customers.

Five Ways to Help You Get There
Don't get me wrong; I recognize that what I've laid out above is a profound shift from today's reality. It won't be easy, but the benefits are significant. If you're a security leader (or simply an advocate) and want to unlock a future more like this, here are mechanisms to start employing:

1. Continuously scan for major muscle movements in the business. Look for indicators of major shifts in the business. Find ways to get insider knowledge on how the business model, products, services, and partnerships are changing. There are all sorts of forces that will cause such shifts, such as global megatrends, geopolitics, and industry competition. Your job is to obtain proactive insights into the business ecosystem in order to understand what effects these forces will have downstream on security, and position accordingly.

2. Become best friends with people guiding technology strategy. I'll bet that there are a select few people that are making the major technology decisions in the areas of IT infrastructure (inclusive of outsourcing and cloud decisions), manufacturing, customer-facing products and services, and even facilities (e.g., smart buildings). Learning future direction as early as possible gives you time to react, and, most importantly, influence.

3. Gauge alternative cyber futures. As you learn about macro-level business and technology shifts, you can start to understand your cybersecurity requirements and solution options. Given the likelihood of your business evolving in a certain way, plus your knowledge of how adversary activity, security capability, and the regulatory landscape is likely to evolve, you can begin to sketch out alternative futures. Will your industry be under heavy attack? Is the board likely to view cyber as a top enterprise risk? How do you see your budget evolving? These factors all matter, and they'll help you steer the security program toward the right design.

4. Acquire a seat at the table. Let me state clearly that the security program leader needs to have a prominent position within the enterprise. It's key to unlock yourself from suboptimal organizational positioning and establish influence at key steering committees. Know your value. Get obsessive about communicating and fine-tuning it.

5. Make agility an obsessive focus. Business models and the cyber threat landscape both evolve exceptionally faster than they used to. Ensuring your program has the processes in place to reprioritize objectives and shift/surge resources is critical to staying out in front.

Related Content:

Matthew Doan is a leader in Booz Allen Hamilton's commercial practice. He advises senior clients and leads project teams in driving innovative strategic and operational cybersecurity solutions, particularly for global automotive, oil and gas, industrial, and high-tech ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.