Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

CA Exec: Security Pros Need to Be Unburied From the Org Chart

To succeed, IT security must raise its profile in the business, says former CIO

SAN FRANCISCO -- RSA Conference 2008 -- Security pros need to stop fighting fires in the data center and start getting themselves noticed in the boardroom, a former CIO and top-ranking security executive said here last week.

Many IT security people see themselves primarily as technologists and problem-solvers, said Dave Hansen, former CIO at Computer Associates and currently senior vice president and general manager of CA's Security Management business unit. But as security becomes more critical to the business, CSOs need to delegate some of the operations functions and get more tied into the business, he said.

"Right now, 46 percent of CSOs spend up to a third of their day just analyzing security event reports," Hansen said. "That’s not the way to maximize value to the organization -- and it needs to change."

To help make his point, Hansen showed the audience a humorous video that demonstrates how deeply the security function may be buried in some organizations.

"If you’re a CIO and you don’t know where your CSO sits, you’re probably missing a critical component in your strategic planning," Hansen said during the keynote and in a subsequent question-and-answer session afterwards. "When I was a CIO, I wanted that CSO close by, because I was ultimately responsible and I needed to know what was going on."

For their part, security pros need to do a better job separating operational issues from strategic business issues, Hansen said. "You are serving as a security strategist in the organization. Don’t allow yourself to be consumed by the day-to-day tactical demands of the job. Build a strong team so that you can deliver value to the C-suite. Build a security framework that matches the goals of the business."

Security people need to build their visibility within the organization, but not solely as the "cops" who say no to everything, Hansen said. Security teams should look for ways to enable the business to do more, rather than just disallowing activities that might pose a risk.

"Security people know they have tasks for the business or compliance, but they don't always understand the reasons behind them. If you can get a grasp on what the business is trying to do, you can suggest ways to do it better and safer."

At the same time, security should become a more integral part of what companies are doing in IT operations, Hansen said. "Historically, the network and systems management people didn't work together, but that's changing, particularly because security issues can have such a huge impact on the business."

There's a lot of debate currently over the CSO's role in the organization and where he/she fits in the org chart, Hansen observed. "I've heard some CSOs say they shouldn't report to the CIO, because they should have unilateral ability to shut systems down if there's an issue. I think that's taking it too far -- a decision like that should involve the CIO and the business, too.

"But the CSO definitely needs to become more visible," Hansen said. "The only way that's going to happen is if he or she has a better relationship with the rest of the business."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29040
PUBLISHED: 2021-05-16
The JSON web services in Liferay Portal 7.3.4 and earlier, and Liferay DXP 7.0 before fix pack 97, 7.1 before fix pack 20 and 7.2 before fix pack 10 may provide overly verbose error messages, which allows remote attackers to use the contents of error messages to help launch another, more focused att...
CVE-2021-29041
PUBLISHED: 2021-05-16
Denial-of-service (DoS) vulnerability in the Multi-Factor Authentication module in Liferay DXP 7.3 before fix pack 1 allows remote authenticated attackers to prevent any user from authenticating by (1) enabling Time-based One-time password (TOTP) on behalf of the other user or (2) modifying the othe...
CVE-2021-29047
PUBLISHED: 2021-05-16
The SimpleCaptcha implementation in Liferay Portal 7.3.4, 7.3.5 and Liferay DXP 7.3 before fix pack 1 does not invalidate CAPTCHA answers after it is used, which allows remote attackers to repeatedly perform actions protected by a CAPTCHA challenge by reusing the same CAPTCHA answer.
CVE-2021-22668
PUBLISHED: 2021-05-16
Delta Industrial Automation CNCSoft ScreenEditor Versions 1.01.28 (with ScreenEditor Version 1.01.2) and prior are vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code.
CVE-2021-29039
PUBLISHED: 2021-05-16
Cross-site scripting (XSS) vulnerability in the Asset module's categories administration page in Liferay Portal 7.3.4 allows remote attackers to inject arbitrary web script or HTML via the site name.