Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

// // //
10/12/2017
07:15 PM
Joe Stanganelli
Joe Stanganelli
News Analysis-Security Now

Security by Discomfort

If you want to bridge the talent gap, look beyond the usual pool of corporate candidates to fill infosec positions.

In the world of cybersecurity, executive leaders and HR workers alike constantly complain of talent shortages. One of the primary takeaways at a recent InfoSec event targeted to upper-level cybersecurity workers, however, was the notion of starting to see and think about things in different ways -- talent being no exception.

"Every single time we add a new platform... we are adding to the complexity that there's no way to grasp it entirely," said Tarah Wheeler, founder of and principal security advisor at Red Queen Technologies, in a presentation at the inaugural DEEP 2017 conference held recently by information-security firm Cybereason. "If you add just a little more strangeness to your world [in the form of diversity, then] you start adding an 'unknown unknown' product space to your known unknowns."

Tarah Wheeler is lead author of Women In Tech: Take Your Career to the Next Level with Practical Advice and Inspiring Stories. Unsurprisingly, therefore, when Wheeler took the stage at DEEP, her presentation highlighted gender diversity in the InfoSec workplace -- a perhaps apt topic considering the audience makeup (just over a dozen women in the room, compared to more than 70 men).

And yet relatively little time was spent on the gender aspect of diversity in Wheeler's talk, "Freaks and Geeks: Why Security Needs to Be Weird to Save the World." Instead, Wheeler's diversity propositions were grander and less typical. Wheeler urged cybersecurity executives to look beyond themselves and their own successes and modes of working to the "weird" outsiders who can offer valuable insights and skills -- those that are normally considered pariahs by some IT departments, such as people who have a history of light drug use or other relatively minor offenses.

"I smoke a lot of weed," admitted Wheeler. "Guess what I can't do. No government jobs."

Ditto for former black hats and grey hats.

"Compliance doesn't stop you from hiring black hatters," advised Wheeler after an audience member voiced concerns about drawing unwanted attention by hiring black-hat hackers. "You're losing a competitive advantage to companies who are more concerned with compliance than with protecting people well."

On this point, Wheeler was emphatic that bridging the gap to work with these atypical candidates and collaborators is imperative to IT security not just from a business standpoint and a PR standpoint but also a moral one -- especially considering that morality is a major driver for many of these security researchers and hackers.

"I know those pictures on your phone. I got a couple of them too," breezed Wheeler, before chastising: "Every one of you should be deeply motivated by this [desire] to keep people safe."

To this end, people who look and think differently from the cybersecurity norm, said Wheeler, are "a good thing" -- even if (especially if, Wheeler seemed to advocate) you don't see eye to eye on most things yet embrace the discomfort of working together.

"There's a difference between interpersonal and group conflict," said Wheeler. "You don't want interpersonal [conflict], but you do want group conflict."

That group conflict and diversity of background and opinion, Wheeler explained, allows enterprise organizations to be better prepared for their unknown unknowns in data security and data privacy because limiting hires a few traditional archetypes may lead to a relatively sheltered -- and thus unprepared -- data-stewardship team.

"The people in this room are successes, and the reason why that's a problem for you is that you're going to keep doing what you're doing," advised Wheeler -- who went on to point out that the executives at much-maligned Equifax, Yahoo and other companies grabbing recent headlines for mega-breaches, "were doing the right thing again and again and again and hearing they were a success."

Indeed, Equifax presents a particularly apt case study here. In the month prior to Equifax's revelation of its massive data breach, the Atlanta Business Chronicle recognized Equifax's then CEO Richard Smith (now recently "retired") as a "Most Admired CEO" in Atlanta. Prior to public knowledge of the Equifax ultra-breach, the big-data company's CEO was "a success."

Conversely, said Wheeler, if data-protection executives with a long track record of traditionally defined "success" commingle with those who may lack it (particularly those with a track record of "failing their way forward"), they benefit from the knowledge, skills and experience from those who have already learned hard lessons through failure.

"If you're failing, you're learning, you're growing, you're changing what you're doing," pointed out Wheeler. "If you're succeeding, what are you doing? You're staying still."

Accordingly, Wheeler's calls for cybersecurity honchos to seek out discomfort was not limited to hiring and collaborating practices; she also spoke highly of the notion of welcoming in the uncertain and worrying current threat environment.

"Ransomware is the best problem cybersecurity has faced in years … because we can't ignore it." said Wheeler. "[The problem of] ransomware can't be hidden."

DEEP speakers succeeding Wheeler picked up her calls for going outside of one's comfort zone in InfoSec practice. Dan Ariely, a psychology and behavioral economics professor at Duke University and author of several books on "irrational" behavior, immediately followed Wheeler's talk with one of his own -- "Now and Later: The Problem of Self Control" -- about how to overcome the fact that engaging in long-term beneficial behavior (for cybersecurity purposes or otherwise) is uncomfortable.

"We know what's the right thing in principle; it's not the most fun thing in the moment," observed Ariely. "I know I should have a really complex password -- but it's not fun to do right now."

Ariely recommended overcoming the uncomfortable tasks that go with good security practices by using "reward substitution" -- a gamification-like methodology that adds additional and more "immediate" feedback to users in the form of reward and or punishment as an incentive for greater security.

"Think about things that have to do with security. They are probabilistic and they are delayed." said Ariely. "In the short-term, we often regret more actions than inactions, but in the long term we often regret more inactions than actions."

"What we tried to create here is a different point of view," summed up Lior Div, CEO of Cybereason, in his closing remarks at the conference. "If we keep doing the same thing that we have for the past 20 or 25 years, we are going to fail."

Related posts:

Joe Stanganelli is founder and principal of Beacon Hill Law, a Boston-based general practice law firm. His expertise on legal topics has been sought for several major publications, including US News and World Report and Personal Real Estate Investor Magazine.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file