Modern field guide to security and privacy

In cybersecurity, it's (almost) all about the people

In cybersecurity as in life, hammers don’t drive nails on their own. It’s all about the people behind the tools.  Here are the three things enterprises need to do to unleash the power of their analysts.

When a cyber-incident occurs, there is an almost universal reaction to try and prevent a future breach by going on a shopping spree for the latest security gear.  The sheer number of white papers, conferences and PowerPoint decks touting new tools and blinking lights causes many organizations to fixate on these seemingly easy fixes while ignoring the most fundamental aspect of their enterprise security.

That fundamental? Technology alone can’t defend your network: it’s all about the people.  

That’s not to say that technology isn’t important. On the contrary, a comprehensive technology strategy is critical to success.  Whether you’re employing firewall defenses, endpoint monitoring software, network sensors, or any number of other important defensive approaches, the technology matters.

But hammers don’t drive nails on their own.

Here’s an example: in many organizations, cyber analysts don’t do much actual analyzing. Yes, they operate systems. But too often, analysts end up as button pushers and watchers of lights. When was the last time an analyst did custom work (such as advanced signature or correlation scripts) for a technological tool in your organization? Rest assured, the good ones want to — but are they empowered to do so?

And if they are empowered, how seamless is it to mitigate, or clean up, a threat? For large enterprises, particularly, the reality is that approving such custom analytical work can be difficult to the point of institutional paralysis. When your core analysts see a pressing need for mitigation but the pathway to get such changes approved moves glacially, the time disparity between recognizing a threat and being able to do something about it only serves the bad guys.

Here’s a more specific, but perhaps more universal, example: firewall logs. Ask five, ten or 100 organizations if they capture and store firewall logs. Rest assured, all will answer “yes.” Second question: how many organizations correlate those logs with other data feeds, learn from them, and make relevant changes to their network defenses? The affirmative responses go way, way down.

Why does this happen — and what should we do about it?

No organization is trying to put the brakes on their cybersecurity. The sometimes-painful reality is a reflection of the day-to-day needs of network defense and, particularly, that network defenders are always operating in “real time.” For a global enterprise that is already operating and defending 24/7, making fundamental transformations (no matter how essential) is daunting — but it can (and is) being done, effectively, efficiently, and with compelling benefits.

Getting there is done best by focusing on three pillars — albeit all of them from a people-centric perspective.

First is process.

Knowledge management is key. Analysts connected with one another across the network can build off each other instead of duplicating their efforts. A good knowledge management system can also reduce training time for new analysts, as they are able to review how their predecessors solved problems. Think of it as being able to see the steps someone took to answer a calculus question versus just the final answer. It’s not only easier to learn from the former but being able to follow the steps to the solution has the additional benefit of making it easier to discover where errors may have occurred.

Second are skills.

Don’t focus solely on certifications. Instead, focus on the mindset and the motivation. The myopic focus on certifications leads many organizations to recruit a workforce with very similar backgrounds. Look for diversity across your team and exploit that diversity to your advantage. Encourage people to find their niche. Are they masters at pulling code apart? Are they developers that want to constantly innovate new monitoring scripts? Or are they type that can see the patterns in complex data? As long as it is focused on a common goal, letting people pursue their passion rarely backfires.

Third are tools — because nails don’t hammer themselves, either.  

Focus on the right tools to allow analysts to practice their craft. Analysts should drive the tools — and not vice-versa.  After a cybersecurity incident, many organizations spend millions on tools only to find that, within a few months, those tools have been relegated to the shelf. Take the time to identify the gaps that exist in your company, look for your visibility gaps and ask your analysts where they have bottlenecks. Only then look at what technology makes sense.  The answer may be reconfiguring a tool you already own or making a strategic investment to fill a gap rather than clearing out the trade show floor and installing a dozen new boxes that go “bing.”

What’s next?

“Calls to action” often make a case for spending more on this tool or that technology. I fully believe that most security organizations are under-resourced and that spending more would always be nice. But before you spend the next dollar on a blinking box, consider that a recent Ponemon Institute survey of IT leadership in North America revealed that 90 percent answered “yes” when asked if their organization scrapped, or never used, security technology they purchased. Rather than investing in such “shelfware,” look at your people first and how they can be leveraged most effectively. Your networks — human and technological — will benefit.

Lawrence “Guy” Delp is the cyber and data analytics engineering director for Lockheed Martin. Delp leads a global team of subject matter experts specializing in computer network defense, information operations, data analytics and full spectrum cyber capabilities. Previously, Delp was the Program Manager for the DISA GSM-O Network Assurance Program leading a global team of cyber security analysts that transformed the computer network defense mission for DISA and its customers across the largest DoD networks. Delp received his bachelor’s degree in Computer Science from Embry-Riddle University and a Masters in Systems and Industrial Engineering from the University of Florida.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to In cybersecurity, it's (almost) all about the people
Read this article in
https://www.csmonitor.com/World/Passcode/2015/1007/In-cybersecurity-it-s-almost-all-about-the-people
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe