Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


CA Exec: Security Pros Need to Be Unburied From the Org Chart

To succeed, IT security must raise its profile in the business, says former CIO

SAN FRANCISCO -- RSA Conference 2008 -- Security pros need to stop fighting fires in the data center and start getting themselves noticed in the boardroom, a former CIO and top-ranking security executive said here last week.

Many IT security people see themselves primarily as technologists and problem-solvers, said Dave Hansen, former CIO at Computer Associates and currently senior vice president and general manager of CA's Security Management business unit. But as security becomes more critical to the business, CSOs need to delegate some of the operations functions and get more tied into the business, he said.

"Right now, 46 percent of CSOs spend up to a third of their day just analyzing security event reports," Hansen said. "That’s not the way to maximize value to the organization -- and it needs to change."

To help make his point, Hansen showed the audience a humorous video that demonstrates how deeply the security function may be buried in some organizations.

"If you’re a CIO and you don’t know where your CSO sits, you’re probably missing a critical component in your strategic planning," Hansen said during the keynote and in a subsequent question-and-answer session afterwards. "When I was a CIO, I wanted that CSO close by, because I was ultimately responsible and I needed to know what was going on."

For their part, security pros need to do a better job separating operational issues from strategic business issues, Hansen said. "You are serving as a security strategist in the organization. Don’t allow yourself to be consumed by the day-to-day tactical demands of the job. Build a strong team so that you can deliver value to the C-suite. Build a security framework that matches the goals of the business."

Security people need to build their visibility within the organization, but not solely as the "cops" who say no to everything, Hansen said. Security teams should look for ways to enable the business to do more, rather than just disallowing activities that might pose a risk.

"Security people know they have tasks for the business or compliance, but they don't always understand the reasons behind them. If you can get a grasp on what the business is trying to do, you can suggest ways to do it better and safer."

At the same time, security should become a more integral part of what companies are doing in IT operations, Hansen said. "Historically, the network and systems management people didn't work together, but that's changing, particularly because security issues can have such a huge impact on the business."

There's a lot of debate currently over the CSO's role in the organization and where he/she fits in the org chart, Hansen observed. "I've heard some CSOs say they shouldn't report to the CIO, because they should have unilateral ability to shut systems down if there's an issue. I think that's taking it too far -- a decision like that should involve the CIO and the business, too.

"But the CSO definitely needs to become more visible," Hansen said. "The only way that's going to happen is if he or she has a better relationship with the rest of the business."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google Maps is taking "interactive" to a whole new level!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-18
RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins.
PUBLISHED: 2021-05-18
There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
PUBLISHED: 2021-05-18
A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes it can cause the rgw to crash, resulting in a denial of service. The greatest threat to the system is of availability.
PUBLISHED: 2021-05-18
TCP firewalls could be circumvented by sending a SYN Packets with other flags (like e.g. RST flag) set, which was not correctly discarded by the Linux TCP stack after firewalling.
PUBLISHED: 2021-05-18
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.