• Home
  • ISBUZZ-JOBS
  • Partnership Enquiries
  • Free Resources
  • Training
    • IT Governance
    • TrainACE
  • Events & Conferences
  • Directory
    • Associations
    • Vendors

Information Security Buzz

Connecting Infosec with News

Alienvault-showplace-logoinfosec company showplace
  • News
  • Hacker News
  • Security Articles
  • Study
    • Research
    • Survey
  • How To
  • Expert Panel
    • Expert Answers
    • Biographies
  • Security Videos
  • Security Education
Home » Time for TEA

Time for TEA

on September 4, 2014

In your opinion, what are 3 key elements to succeed in a positive security culture and what tips can you provide to implement change, successfully?

I’ve taken inspiration for my answer from an ex-CISO of mine, Adam Stanley (actually a CIO/CTO by trade, but he bravely took on both roles while recruiting). These are the three elements, known collectively as “TEA”, he worked hardest to embed in the IT and security culture of our organization:

FREE Download: CISO Data Breach Guide: How to reduce risks and overall cost by increasing automation

–     Trust,
–     Empowerment, and
–     Accountability

Taking those components and translating them into concrete actions, these are my tips:

–     Trust – Bridge the language barrier with superb, accessible coms and security training. This should be tailored for C-Levels, operational staff and in-between groups with distinct sub-cultures. Distrust is a natural response to rules and regulations that are imposed in a language you don’t understand, a sentiment often compounded by weak justifications that make no business or personal sense. By contrast, understanding quashes prejudice and opens the door for respect and trust – essential ingredients when trying to embed constructive consideration of security throughout an organisation.

–     Empowerment – Security departments are a lot like legal teams (but often not so well paid, resourced or respected). They mainly have very flat structures, with managers trying to motivate and develop a team of highly qualified peers. You can’t retain these kind of people without giving them the power to use their hard-won knowledge and experience. The dramatic skills shortage in the industry will take care of that.

Consistently demonstrate value-added to the board, welcome challenges to the status quo, soften barriers between layers of management and develop staff to move beyond security silos into business unit aligned roles (if those positions match their particular skill sets). CISOs are going to have to be smart about the way they structure security teams in the future. No one will stay in a job where attempts to improve things are ignored and promotion is never a possibility.

–     Accountability – Spend time thrashing out a rock solid risk RACI and confidently communicate security service limitations and dependencies. The biggie? Things WILL break or be broken. Leaving the board in denial about that, confused about risk ownership and clueless about the real complexity and cost of the job, destroys credibility.

How often does a JFDI order get handed down when something is delayed by security concerns? Security is everyone’s responsibility, but the CISO still gets roasted when a known vulnerability is exploited. A vulnerability that is still there because mitigation plans weren’t approved. It’s a typical result of the boom/bust security budget cycle. Incident-generated fear secures funding; then when things are quiet, money is diverted to projects with an easier-to-prove ROI.

If you don’t manage expectations about accountability, that wheel never stops turning. Networks grow unchecked on shaky security foundations. Conversely, if you do embed this awareness, the reputation of the security function will improve dramatically and give everyone a fighting chance to create an effective, longer-term security strategy.

There are many ways to improve security culture, and all of them have people at their heart. If I had to pick one of the three things above to prioritize, it would be accountability. While people don’t see security as their responsibility and don’t understand why it makes business sense, nothing will change.

Sarah Clarke | @S_Clarke22

To find out more about our panel members visit the biographies page.

Please Share:

  • Tweet
  • Share on Tumblr
  • More
  • Pocket
  • Print
  • Email

Related

Filed Under: Expert Answers, Expert Panel, News Tagged With: C-level, expert answer, RACI, Sarah Clarke, Security Culture, security training, trust, vulnerability

HOT CYBER SECURITY JOBS

  • Cyber Security Architect

  • IT Forensic Investigator

  • FSS Security CISO Advisor

  • Cybersecruity Attorney

  • Popular
  • Latest
  • Today Week Month All
  • The IoT and the Smart Technology Wave The IoT and the Smart Technology Wave
  • Harvard Encryption and IoT Harvard Encryption and IoT
  • Clean Out your Computer Day Clean Out your Computer Day
  • Hacking Motorola Cloud Security Camera to Watch the Watchers Hacking Motorola Cloud Security Camera to Watch the Watchers
  • The Rise of the Digital Ransomware Business The Rise of the Digital Ransomware Business
  • Hacking Motorola Cloud Security Camera to Watch the Watchers Hacking Motorola Cloud Security Camera to Watch the Watchers
  • Clean Out your Computer Day Clean Out your Computer Day
  • Council Hit by Ransomware Attack Council Hit by Ransomware Attack
  • Security Issues with Connected Toys Security Issues with Connected Toys
  • Harvard Encryption and IoT Harvard Encryption and IoT
Ajax spinner
My Tweets

FBF ▪ Powered by ®Google Feedburner

Upcoming Conferences

IP-EXPO-300x250

WELCOME TO INFORMATION SECURITY BUZZ

Information Security Buzz is an independent resource that provides the best blogs, opinions and news for the information security community. Collated from security experts and industry leaders, content is carefully selected to provide you with the latest threat trends, insights, practical solutions, hot topics and advice from around the globe.

  • 
  • 
  • 
  • 
  • 

RESOURCES

ADVERTISERS

Media Pack

USER CENTRE

About Us
Contact Us
Article Submission
RETURN TO TOP

Copyright © 2015 Informationsecuritybuzz.com All Rights Reserved

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.