A good security team helps the business help itself operate more securely -- soliciting input while adhering to a unified strategy, vision, goals, and priorities.

Joshua Goldfarb, Global Solutions Architect — Security

October 22, 2019

5 Min Read

I've been fond of the idiom "too many cooks in the kitchen" for quite a while now. The Free Dictionary defines the idiom as "Too many people are trying to control, influence, or work on something, with the quality of the final product suffering as a result." In some sense, this phrase goes hand in hand with another favorite of mine: "A camel is a horse designed by a committee."

Those of us who are familiar with these sayings are aware of the lesson they aim to teach us. Sometimes, we need to lead. Other times, we need to follow. And still other times, we need to move out of the way of those already engaged in an activity. Knowing when which type of behavior is required is difficult. Here are five ways they apply to security:

Maturation rate: The goal of any security organization should be to continuously mature. For more mature security organizations, this means keeping pace with changing risks and threats and not being lulled into a sense of complacency. For those organizations that are less mature, it provides an opportunity to take a step back, thoroughly assess gaps in the organization's security posture, and work to address those gaps. In both of these cases, leadership, informed from a variety of sources, needs to set a strategic direction. Responsibility for implementing the different elements of the strategy needs to be delegated to the management within the security organization, and individual team members need to be given clear direction regarding what to execute, along with the requisite resources.

This may sound straightforward, but, perhaps surprisingly, many organizations struggle with this. Lack of clear direction from leadership creates a cacophony of voices weighing in on and trying to affect strategy and vision. Lack of training, skills, or proficiency within the management ranks causes a failure to properly implement the strategy, leading various individual team members to attempt to take charge from the bottom up. Lack of guidance causes team members to overstep bounds or to perform redundant or overlapping activities. Any or all of these indicate that there are too many cooks in the kitchen, and this has the effect of slowing down the maturation rate.

Policy: Formal security policies are and have always been an important part of a mature security program. While setting and enforcing policies is important, so is drafting them properly. When drafting policies, it's important to solicit and incorporate feedback from a variety of sources both inside and outside of the organization. Equally as important, however, is maintaining strong leadership throughout this process. While the feedback and guidance we receive from others is valuable, we cannot allow it to drive the process. That will only stall us — preventing us from progressing as we need to. Take input for what it is — data, not leadership.

Process: Setting up practical, efficient, and productive processes is one of the best ways a security organization can mature. As you might expect, this is easier said than done. While attaining the right processes is in itself a process, there are a few tips that can help make the journey smoother. When designing a process, it helps to have in mind the initial conditions, as well as the desired end state. It is also useful to gain executive, management, and stakeholder buy-in. Lastly, industry best practices, third-party guidance, and expert advice can also come in handy. When leveraged properly, all of these inputs can greatly improve processes. On the other hand, when the inputs begin to drive process, rather than the organization's vision and strategy, the result is rarely the practical, efficient, and productive process we seek.

Technology: As time marches on, technology changes, often for the better. As such, it makes complete sense to consider new and improved technologies as they prove fit for our respective security programs. The trick with technology is to procure it to address process inefficiencies, programmatic gaps, regulatory requirements, and business needs. The chorus of voices suggesting every which technology under the sun can't be allowed to drown out the matrixed operational needs of the security organization. Giving in to the noise can steer the security team off course and slow or even harm the maturity of the organization. There is a balance here between soliciting feedback around technology and managing technology procurement in line with the organization's strategic direction.

Business: The job of the security organization is to reduce and mitigate risk in order to facilitate the business operating as securely as possible within the bounds of accepted risk. There will always be business functions that necessitate accepting a certain amount of risk. That being said, there are often creative ways to reduce and mitigate some or all of that risk without adversely affecting the business. The security organization needs to work with the business, but it also needs to be firm. It can't be the Department of No, but it can't be a pushover either. Walking this fine line means understanding, listening to input from, and accepting feedback from the business. It does not mean, however, allowing the business to take the wheel and steer security. A good security team helps the business help itself to operate more securely — soliciting input while adhering to its strategy, vision, goals, and priorities.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Turning Vision to Reality: A New Road Map for Security Leadership."

About the Author(s)

Joshua Goldfarb

Global Solutions Architect — Security, F5

Josh Goldfarb is currently Global Solutions Architect — Security at F5. Previously, Josh served as VP and CTO of Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team, where he built from the ground up and subsequently ran the network, endpoint, and malware analysis/forensics capabilities for US-CERT. In addition to Josh's blogging and public speaking appearances, he is also a regular contributor to Dark Reading and SecurityWeek.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights