Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

3/10/2015
10:30 AM
Kevin West
Kevin West
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

5 Things CISOs Can Learn From The Best GMs In Baseball

A MLB team has many goals and objectives: to win, be profitable, have a solid strategy and understand the people whom they serve. Sound familiar?

I live and work in Boston, and as you have probably heard, we have a lot of snow here. One of my coping mechanisms as I await warmer weather is thinking about baseball season. To get in the mood, I have been reading Moneyball, the book about Billy Beane’s success putting together competitive teams. There is something so rewarding about building a successful organization – one that wins consistently and performs at the highest level. It occurred to me, there are a lot of similarities between a successful baseball GM and a successful Chief Information Security Officer.

Photo of Fenway Park in Boston Feb. 10 by @EricLuallen
Photo of Fenway Park in Boston Feb. 10 by @EricLuallen

A MLB team has several goals and objectives, both short- and long-term. One goal is to win. The team also must be profitable. They have to have a strong strategy to accomplish both. They have to know their revenue, and revenue potential. They have to understand the expectations of their fan base. Does this list look familiar? Chances are these are some of the same drivers for your information security team.

A baseball GM must understand the overall goals and objectives of ownership, and also must be extremely savvy and smart about putting together the right team. When it comes to corporate IT security you need to act like a GM to create a confident program.

What makes Billy Beane, Theo Epstein or Brian Cashman great? They each take their own approach to their work, but they all do the following:

  • Prioritizes efforts based on the owner’s goals. If the team ownership has a goal to be below the salary cap while maintaining a competitive team, a GM will combine proven, experienced talent with training and resources grown in the farm system. In security this approach is required of nearly every organization. As new threats emerge, both veterans and younger staff members need to keep pace.
  • Understand the marketplace and threats. A GM always has one eye on what his competitors are doing, and what trades are available on the market. Similarly a CISO must ensure that the organization keeps pace with advancements in the market, evolves as threats become more sophisticated and changes over time to ensure on-going performance.
  • Keep the fans engaged and happy. Ticket sales, ad revenue, and television deals all depend on fan loyalty, so GMs have to assemble a product fans deem worthy of their hearts, time, and money. This is a team that wins, and does so consistently. Similarly, effective security programs must engender respect and adherence from employees and provides customers with peace of mind and confidence.
  • Understand opportunities and challenges specific to the organization. Oakland Coliseum, Wrigley Field, and Yankee Stadium all require a unique skill set. A poor-fielding slugger is best-suited for the Designated Hitter position in the American League. Every player will perform best in a specific environment. A strong GM leverages all the tools available to him – analytics, salary, on base percentage, medical histories – to put the best team on the field. A smart security program leverages the right team members, specific policies, and the strength of different technologies to create the most effective program for that specific organization.
  • Provides the team manager with the right resources. The GM has a big role in hiring the team manager. The manager’s role is to make day-to-day tactical decisions: who pitches, when to bunt, who to play in Right. He makes all of these decisions based on a combination of instinct and analysis of historical performance. A security manager will leverage technology, threat reports and policy to best position the company to avoid attack, reduce risk and perform effectively.

So what can we learn from the best GMs in baseball? You will always be more successful with a plan that aligns your security team with the strategic objectives of the organization. If you are working from a plan you will be more likely to have the right resources on your team, and the right technology and procedures in place to succeed.

Kevin West is the chief executive and founder of K logix, where he oversees a team of data security experts who help customers build confident data security programs. View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/10/2015 | 4:36:35 PM
Re: Keep the Fans Happy
Good point @RyanSepe. But who are the "fans" in information security? Users? Emplyoees? Seems like there are constituencies like business units, management, customers...
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
3/10/2015 | 10:40:21 AM
Keep the Fans Happy
From my perspective, this is one of the most crucial. I have seen situations where the "fans" aren't happy and it makes it very difficult to incorporate any type of security mechanism due to the pushback. This is why I stress test, test, test before unveiling anything into production. If you don't and happen to run into issues the security team will be fighting uphill battles from then on. This principle is very much like brand reputation.
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8813
PUBLISHED: 2020-02-22
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CVE-2020-9039
PUBLISHED: 2020-02-22
Couchbase Server 4.x and 5.x before 6.0.0 has Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).
CVE-2020-8860
PUBLISHED: 2020-02-22
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. T...
CVE-2020-8861
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue ...
CVE-2020-8862
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the ...