Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:30 PM
Andy Nieto
Andy Nieto
Connect Directly
E-Mail vvv

Navigating The Slippery Slope Of Public Security Disclosure

In talking publicly about cybersecurity, CISOs need to portray capability, strength, and confidence, but without offering critical details that could lead to an attack.

Mountain climbers call a narrow ridge with steep drops on both sides an “arête.” Crossing one can be one of the trickiest parts of any serious climb. Talking publicly about security is the chief information security officer’s arête.  There’s a thin area of even footing to follow in order to be successful, but make one misstep and a slippery slope and catastrophic consequences will follow. 

When a CISO discusses security, he or she can’t be too boastful or they paint a target on their company’s back. Many hackers are childish and what they perceive as public bragging is a challenge to them. The CISO cannot disclose too many details about their measures, for that will simply end up providing a blueprint for hackers. Staying silent is not an option either. The media, the public, investors and users demand answers and information about security. Is it possible to portray capability, strength, and confidence without key details? Yes, it is not only possible, it is the only path to cross the security arête. 

[By 2020 there will be 25 billion Internet of Things devices...all full of vulnerabilities. What can we do to solve the problem now? Don't miss the next episode of Dark Reading Radio, "Fixing IoT Security," this Wednesday, Sep. 23 at 1 p.m. Eastern Time.]

First, the CISO must state, and act, on the principle that security is a process. The general public, investors and even board members often see “bottom line” and “deliverables” as finite accomplishments. Security is a constantly evolving, changing action. Security is a verb. Educating the public to this fact is critical to controlling your message. When planning your public security persona, consider what parts will need to be visible as a deterrent as well as a protection and which parts need to be anonymous in order to dissuade interest in attacking.

The message must contain action verbs: “Our firewall scans all inbound and outbound traffic” is a more powerful statement than, “Our firewall has traffic audit features enabled.” The action verbs should speak to real processes, but be cautious. Provide only a vague description of the process. 

For example, “We conduct regular internal and external perimeter testing with currently available methodologies” is a good statement. It does not speak to any specifics and yet provides a clear statement that there is an active process. Stating, “We conduct regular internal and external denial of service and port-scan tests” is a poor statement. A hacker may know of several other attack vectors which you are not testing for. This is their blueprint for a possible attack. 

When considering a public message, consider our most secure US public figure, the President. We know that the President is the most guarded and protected person on the planet. What the Secret Service won’t tell us is how they accomplish this -- and that is by design. Grand visible gestures are a small fraction of the actual security measures in place, yet they serve as a visible and impressive deterrent to foul play. Strong public statements on security without specific details are good. “We employ a myriad of applications, systems and processes to ensure the protection of your personal data” is one such statement.

When making your statements, avoid “naming names.” An executive I know recently made a very public announcement about hiring an “ethical hacker” as a member of his security team. This new team member had recently bragged to other hackers about winning a “black hat” contest. Their name alone became the catalyst for an inbound attack. Remember, as I mentioned, some hacker personalities are childish. 

In our Presidential example, we did not discuss what the public doesn’t see. The public does not see the “pre-work” put in before the President lands. This advance preparation is much like the risk assessment and risk mitigation programs which all CISOs should actively run.

For each risk or security situation, you must evaluate the strategic and technical response, and then also prepare a public statement. You may never have to use the public statement for each element of risk or security. However, having the answer ready helps present a calm, powerful, and deterrent public image of security and strength.

Proper planning and knowing where to step, and areas to avoid, is the way to navigate an arête. Similarly, when discussing security publicly, determine your approach, don’t let distractions impede your focus, and stick to your path. 

Andy Nieto is the IT Strategist for DataMotion, an experienced email encryption and health information service provider (HISP). DataMotion was founded in 1999, and today, millions of desktop, tablet and mobile users leverage its mature, cloud-based data delivery platform to ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
9/21/2015 | 2:42:59 PM
Exercise in Diction
You should always be careful with what you say. However, I don't think that rearranging your statements in such a minimal fashion as explained by the article is going to help you not become a target. Don't be arrogant, I agree. But I believe you are a target due to the foundations of your business. What do you do, what information do you hold, etc?
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-09-15
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
PUBLISHED: 2019-09-15
In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS.
PUBLISHED: 2019-09-15
GetSimple CMS v3.3.15 has Persistent Cross-Site Scripting (XSS) in admin/theme-edit.php.
PUBLISHED: 2019-09-15
In Bludit v3.9.2, there is a persistent XSS vulnerability in the Categories -> Add New Category -> Name field. NOTE: this may overlap CVE-2017-16636.
PUBLISHED: 2019-09-15
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.