Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

9/21/2015
01:30 PM
Andy Nieto
Andy Nieto
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Navigating The Slippery Slope Of Public Security Disclosure

In talking publicly about cybersecurity, CISOs need to portray capability, strength, and confidence, but without offering critical details that could lead to an attack.

Mountain climbers call a narrow ridge with steep drops on both sides an “arête.” Crossing one can be one of the trickiest parts of any serious climb. Talking publicly about security is the chief information security officer’s arête.  There’s a thin area of even footing to follow in order to be successful, but make one misstep and a slippery slope and catastrophic consequences will follow. 

When a CISO discusses security, he or she can’t be too boastful or they paint a target on their company’s back. Many hackers are childish and what they perceive as public bragging is a challenge to them. The CISO cannot disclose too many details about their measures, for that will simply end up providing a blueprint for hackers. Staying silent is not an option either. The media, the public, investors and users demand answers and information about security. Is it possible to portray capability, strength, and confidence without key details? Yes, it is not only possible, it is the only path to cross the security arête. 

[By 2020 there will be 25 billion Internet of Things devices...all full of vulnerabilities. What can we do to solve the problem now? Don't miss the next episode of Dark Reading Radio, "Fixing IoT Security," this Wednesday, Sep. 23 at 1 p.m. Eastern Time.]

First, the CISO must state, and act, on the principle that security is a process. The general public, investors and even board members often see “bottom line” and “deliverables” as finite accomplishments. Security is a constantly evolving, changing action. Security is a verb. Educating the public to this fact is critical to controlling your message. When planning your public security persona, consider what parts will need to be visible as a deterrent as well as a protection and which parts need to be anonymous in order to dissuade interest in attacking.

The message must contain action verbs: “Our firewall scans all inbound and outbound traffic” is a more powerful statement than, “Our firewall has traffic audit features enabled.” The action verbs should speak to real processes, but be cautious. Provide only a vague description of the process. 

For example, “We conduct regular internal and external perimeter testing with currently available methodologies” is a good statement. It does not speak to any specifics and yet provides a clear statement that there is an active process. Stating, “We conduct regular internal and external denial of service and port-scan tests” is a poor statement. A hacker may know of several other attack vectors which you are not testing for. This is their blueprint for a possible attack. 

When considering a public message, consider our most secure US public figure, the President. We know that the President is the most guarded and protected person on the planet. What the Secret Service won’t tell us is how they accomplish this -- and that is by design. Grand visible gestures are a small fraction of the actual security measures in place, yet they serve as a visible and impressive deterrent to foul play. Strong public statements on security without specific details are good. “We employ a myriad of applications, systems and processes to ensure the protection of your personal data” is one such statement.

When making your statements, avoid “naming names.” An executive I know recently made a very public announcement about hiring an “ethical hacker” as a member of his security team. This new team member had recently bragged to other hackers about winning a “black hat” contest. Their name alone became the catalyst for an inbound attack. Remember, as I mentioned, some hacker personalities are childish. 

In our Presidential example, we did not discuss what the public doesn’t see. The public does not see the “pre-work” put in before the President lands. This advance preparation is much like the risk assessment and risk mitigation programs which all CISOs should actively run.

For each risk or security situation, you must evaluate the strategic and technical response, and then also prepare a public statement. You may never have to use the public statement for each element of risk or security. However, having the answer ready helps present a calm, powerful, and deterrent public image of security and strength.

Proper planning and knowing where to step, and areas to avoid, is the way to navigate an arête. Similarly, when discussing security publicly, determine your approach, don’t let distractions impede your focus, and stick to your path. 

Andy Nieto is the IT Strategist for DataMotion, an experienced email encryption and health information service provider (HISP). DataMotion was founded in 1999, and today, millions of desktop, tablet and mobile users leverage its mature, cloud-based data delivery platform to ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
9/21/2015 | 2:42:59 PM
Exercise in Diction
You should always be careful with what you say. However, I don't think that rearranging your statements in such a minimal fashion as explained by the article is going to help you not become a target. Don't be arrogant, I agree. But I believe you are a target due to the foundations of your business. What do you do, what information do you hold, etc?
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Average Cost of a Data Breach: $3.86 Million
Jai Vijayan, Contributing Writer,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13151
PUBLISHED: 2020-08-05
Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use ...
CVE-2017-18112
PUBLISHED: 2020-08-05
Affected versions of Atlassian Fisheye allow remote attackers to view the HTTP password of a repository via an Information Disclosure vulnerability in the logging feature. The affected versions are before version 4.8.3.
CVE-2020-15109
PUBLISHED: 2020-08-04
In solidus before versions 2.8.6, 2.9.6, and 2.10.2, there is an bility to change order address without triggering address validations. This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipm...
CVE-2020-16847
PUBLISHED: 2020-08-04
Extreme Analytics in Extreme Management Center before 8.5.0.169 allows unauthenticated reflected XSS via a parameter in a GET request, aka CFD-4887.
CVE-2020-15135
PUBLISHED: 2020-08-04
save-server (npm package) before version 1.05 is affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version version 1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version. This is patched by implementing Double submit. The CSRF...