Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

9/28/2018
04:15 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

4 Traits of a Cyber-Resilient Culture

Companies with a solid track record of cybersecurity share these practices and characteristics.

Attend enough security conferences and you're bound to hear solemn advice about the importance of building a strong security culture across an enterprise. But what exactly does that mean? And how can it be accomplished? The leaders at (ISC)2 recently endeavored to define what it means to build a resilient cybersecurity culture. They put together a survey of tech leaders at 250 companies with a solid cybersecurity track record to get an idea of the common traits, practices, and thought processes among security-focused organizations.

For longtime security pros, none of the findings were particularly surprising. But it did confirm what a lot of professionals have recommended to their peers for a long time with regard to developing security staff, educating users, and engaging with the business. The following are four key traits that both the recent survey and other experts say are common among the companies with the strongest cybersecurity cultures.

Employ a CISO
One of the strongest commonalities among companies with a solid cybersecurity culture is that they have a definitive and highly placed executive in charge of security. The study found that 86% of companies performing well in security employ a chief information security officer (CISO). 

Now, this might seem like a gimme, but the truth is that almost half of average companies today still don't have a C-level security executive in place. According to a study done earlier this year by PricewaterhouseCoopers, just 52% of global organizations have a CISO. This is particularly troubling because the CISO is the person who typically develops better support from the CEO and board.

"The CISO must help the board understand where the company stands in providing cybersecurity for the company networks," Keith Alexander, CEO of IronNet Cybersecurity and former head of the US Cyber Command and the National Security Agency, told PwC. "The information provided should include any cyberattacks that have occurred, as well as shortfalls in training, equipment, and tools in the cyber domain."

Quality Relationship with the Business
The relationship between resilient cybersecurity culture, presence of a CISO, and support from top management is so tight that it's hard to say which of these factors begets the other. The (ISC)2 study showed that 97% of cyber-resilient organizations have top management that understands the importance of strong cybersecurity, and 96% indicate their policies align with their board of directors' cybersecurity strategy.

To gain and maintain that kind of buy-in, security organizations must work hard to establish a quality relationship not only with those stakeholders in the upper echelon but also across the business. 

Experts recommend frequent meetings and check-ins with business counterparts to ensure that the security team is setting its course according to business priorities.

"Monthly meetings with key stakeholders to ensure cybersecurity and risk decisions align with your firm's business needs; this isn't likely to happen if operations and governance are handled by cybersecurity and IT staff," says Bart McDonough, CEO at cybersecurity consultancy Agio, who explains that regular meetings ensure that business-unit managers participate in planning. "These monthly meetings should review, certify and update your firm's data map, any new business processes or 'shadow-IT' activities that could create new exposures, ensure that cyber-event activity logs and incident-response plans are updated as appropriate, decide where to make strategic investments in cybersecurity, and develop ways to integrate cybersecurity procedures into work processes with minimal disruption."

Formalized Risk Management Policies
According to the (ISC)2, one of the top reasons cited for confidence in cybersecurity preparedness is a strong risk management policy. Organizations need to have repeatable, rationalized processes, and those are based on policy that is set by the close relationship just mentioned.

Security experts recommend that risk policies should be largely driven by data and identity context.

"IT security departments should refine and enhance their risk-based strategies to ensure they fully understand the impact of where data resides, the criticality of that data, and how we’re managing risk to an acceptable level regardless of where it's stored or processed," says Robert LaMagna-Reiter, senior director of information security for First National Technology Solutions. "Data-centric enhancements to the risk management process should be further enhanced by incorporating identity-driven enforcement."

Long Tenures within the Security Team
One of the biggest indicators of a strong security culture is how well the organization can not only recruit but also hang on to security talent. The recent study showed that 79% of security-centric firms keep their security staff on the roster for three or more years, and 37% of them report an average tenure of longer than five years. 

"Organizations that want to recruit — and more importantly retain — the best security talent need to provide a growth path and continued learning opportunities to keep their security staff engaged," says Drew Nielsen, CISO of Druva, a cloud data protection firm. "The other option organizations have is to grow talent from within. If organizations have IT talent that is champing at the bit to make a career move, training them in security is an excellent to start to fill this gap. Growth can come in many forms, such as through a security career path or training and skills development, but the most important part here is accessibility and options for employees to achieve that personal and professional growth."

The survey numbers echo this recommendation. About 70% of the best-performing security firms train and promote staff from within, 57% offer training and certification opportunities to employees, and 55% cross-train IT workers in cybersecurity skills.

Related Content:

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tcritchley07
50%
50%
tcritchley07,
User Rank: Moderator
10/4/2018 | 12:10:40 PM
Cyber Resilient Culture
Good article Ericka and I don't throw out compliments on articles like confetti. I'd like to add that the internet in its present form is basically open by design and will remain unprotectable forever. It needs redesign. What we call cybersecurity defence today is like putting better and better paint on the rust spots of a basically rust-bucket car. You can hide them for a while but in the end you'll be left with a pile of iron oxide.
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23351
PUBLISHED: 2021-03-08
The package github.com/pires/go-proxyproto before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function. The reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a newline. Since no limits are implemented in ...
CVE-2009-20001
PUBLISHED: 2021-03-07
An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user's cookie to login as them.
CVE-2020-28466
PUBLISHED: 2021-03-07
This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers: Running a NATS service which is exposed to untrusted users presents a heightened r...
CVE-2021-27364
PUBLISHED: 2021-03-07
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
CVE-2021-27365
PUBLISHED: 2021-03-07
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length...