Most organizations have struggled for years with just cleaning and prioritizing security alerts generated from numerous point products. The value proposition for SIEM products was couched in terms of correlation and prioritization, but SIEM has only succeeded in checking a compliance box without addressing the problem of advanced persistent threats. Stopping targeted attacks in the shortest time possible is now the top priority for advanced security solutions. Read the tips HERE
Every Chief Security Officer, CISO, and risk manager I know believes that their security and risk operation has strengths and weaknesses; in some areas best practices reign supreme, and in others the blunders threaten catastrophe. If managing risk were merely a matter of crafting great policies, we’d read about very few security failures indeed. Unfortunately, managing risk and security always plays a wildcard: the security personnel. How can we ensure that our security teams are putting their best efforts toward the objectives of the department and the business?
I am a guest blogger at a number of other sites. Here is a sampling a some of my recent posts.
The greatest threat to data is also the least studied
Physical loss of information was difficult to quantify, so said the editors of the 2014 Verizon Data Breach Investigations Report (DBIR2014) that came out this month. That imprecision is why your cyber security precautions mean squat against the gargantuan physical risk you face.
The report, anxiously awaited each Spring, this year included a summary of ten years of breach data. Among the findings is a section on Physical theft and loss. The editors described physical loss of information not sexy and “cyber-y,” and the numbers about this type of information leakage a little iffy. However, they rightly point out that physical loss is among the most common causes of data loss/exposure.
In short, they claim that one of the most common types of information loss is also the least measurable. Read it here
Balanced Scorecard for Security
Security executives who’ve used the Balanced Scorecard over the years, set their IT budgets by first determining the strategic role that security will play in the organization, then established a companywide funding level that enables security programs to fulfill that objective. Since the first step in implementing a Balanced Scorecard starts with strategy, it follows that this can be an effective method for aligning security with that strategy. Read it here.
Target named its new CISO today. Brad Maiorino will fill a newly created post called senior vice president and chief information security officer. When the Target search began, I shared the comment with several other security analysts wondering who would want that job. Apparently, Mr. Maiorino, who comes from General Motors and General Electric where he held similar positions, wants it. I imagine he feels excited about the opportunity to rebuild a security program with a substantial budget and likely a wide latitude. Plus, any breaches occuring in the first six months or so could easily be blamed on the previous administration. That gives him a year of smooth sailing and liberal spending. After that, the rubber hits the road and he will be on trial more than most CISOs.
It’s time to register for my upcoming GigaOm Research webinar. The Modern Perimeter & More – countering Advanced Security Threats.
Time for Spring cleaning – but watch out for 2nd hand office equipment. Here is some of my work with McAfee and DePaul University.
Speaking of Spring cleaning and discarded data, I recalled my dumpster diving research.