Sleepless at 2 a.m. What's keeping CISOs up at night?
They may blame the cat, the coffee or the chardonnay, but the truth is that work awakens most chief information security officers (CISOs) several times a week. When we consider their diverse responsibilities for risk management, crisis management and change management, CISOing is a stressful role these days.
Arguably the top ongoing concern from CISOs is, "I don't know who is already in my network." A close second is, "I don't have the staff and skills to figure this out." The traditional security balance of people, process and technology is being redesigned as CISOs work to re-balance investment away from countermeasures (technical controls) to enable incident identification, investigation and response.
Improving the efficiency of incident management is a major challenge, according to a new Enterprise Strategy Group (ESG) survey, sponsored by McAfee and other technology vendors, that uncovered the impediments to security analytics and operations. After total cost of operations (a reflection of people, process and technology), the next four challenges involve time, skills and operationalization of expertise.
These hurdles are all more problematic than writing a check for new products. They require re-thinking of security architecture and organizational design. For instance, according to ESG, 80% of organizations use more than ten tools for security operations and analytics. A whopping 40% use more than 25 tools. This cornucopia of technology creates complexity, integration expense, and, inevitably, process friction.
Want to learn more about the tech and business cases for deploying virtualized solutions in the cable network? Join us in Denver on October 18 for Light Reading's Virtualizing the Cable Architecture event – a free breakfast panel at SCTE/ISBE's Cable-Tec Expo featuring speakers from Comcast and Charter.
CISO as change agent
Shifting from a prevention-centric, turnkey tools security model to a process, people-enhanced lifecycle security model is a change management challenge. It demands today's CISO plays several different roles in reshaping the security function:
Coach: "Detect and correct" functions are far more process-intensive and knowledge-centric than tools-centric preventative measures. Organizational processes need to be defined, vetted, formalized and maintained, and that takes time, willpower, motivation and a committed team. Imagine training a team for a marathon, and you have the right idea.
Marriage Counselor: Sixty-six percent of companies surveyed by ESG are moving from a siloed model with different individuals using different tools, toward a more consolidated and integrated approach for security analytics.
Mediator: Companies already struggle with maintenance processes such as patching and vulnerability management, where security requirements often conflict with (and lose to) IT processes and policies. Now, to support the visibility and collaboration required for rapid and accurate incident response, CISOs need to break down more organizational barriers, influencing far beyond their direct reports.
Crisis manager: Every few months a dialogue-changing industry attack happens. If your business is affected, the security operations teams draw on operational IT for surge and suppression (which is where enabling collaboration becomes critical). If your company isn't affected, your next action is to prove that the company isn't vulnerable to the problem. Board members and executives expect business impact assessments while the operation is underway, contributing to pressure.
To support this imposing set of skills and strengths, many companies now look outside the technology career track to people with business, legal, communications and process management experience. Often, that decision triggers a further change management challenge: retention. In this market, cybersecurity experts can get a new job in days. Newcomer CISOs must ensure they reassure, motivate and respect existing staff, not simply because they are hard to replace [the same ESG survey indicates that 81% of respondents find recruiting and hiring cybersecurity talent to be either somewhat or extremely difficult], but in order to understand the current systems, processes and policies and why they exist. That wisdom prevents unintended consequences that can cripple business-critical systems, since security systems must be adapted while the business remains operational.
Looking back at this list, it's clear CISOs have a tough and delicate task in front of them. Like parents of a newborn, they are doomed to lose a lot of sleep along the way. But recognizing the scope and nature of the challenges will help each survive and thrive.
Barbara G. Kay, CISSP, is senior director of product and solutions marketing for McAfee. She leads security operations marketing, which is responsible for the threat intelligence and analytics solutions, as well as the security management platform that enables optimized security monitoring, threat detection, and response.
5G technology holds a good deal of promise for businesses, from expanded IoT capabilities to new ways to reach customers. The downside is that these networks require a new security approach, which InfoSec teams need to start thinking about now.
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.