Updated on April 16, 2016
To understand why online systems are plagued with seemly endless security incidents requires a closer look into today’s security landscape. Let’s look first to understand the vulnerable systems criminals exploit. Top security company WhiteHat says it best on their home page.
According to WhiteHat web applications are the greatest risk area. Next WhiteHat says, “…most security budgets are spent on securing and monitoring the perimeter and endpoints”. According to the FBI 2014 Internet Crime Report, “…IC3 received 269,422 complaints with an adjusted dollar loss of $800,492,073…”, keep in mind this is US losses, not global.
“…IC3 received 269,422 complaints with an adjusted dollar loss of $800,492,0731…”, FBI 2014 Internet Crime Report
Aside from the claims and statistics, it does not take a security expert to understand the global force behind the online movement. Virtually every product and service is moving online and it stands to reason the criminals and crime are following the money.
Let’s change gears, let’s look into background on today’s top security executive the, Chief Information Security Officer (CISO). The following is Digital Guardian[INFOGRAPHIC] infographic for Fortunes 100’s top CISO’s.
The infographic tells us CISO’s are predominately male, well educated, hold various security and audit certifications. In short, nothing particularly remarkable outside of our expectations but take a look at the following, 59% of CISO’s have IT work background with only 13% in programming/engineering experience.
Fortune 100 CISOs are not well equipped with the skills necessary to defend today’s vulnerable web applications
Makes sense, for years IT leaders have been successfully defending permitters with firewalls. In all fairness, firewalls will always be valuable but they have not proven as effective defending online applications as well as IT infrastructure. Indications are Fortune 100 CISOs are not well equipped with the skills necessary to defend today’s vulnerable web applications. Let’s look at some of the reasons why.
Writing software code, software architecture, debugging, understanding the battery of tools, is an entire domain of expertise. Can programming be learned like any other challenge? Of course, but let’s give programmers some credit, application development is an entire domain of knowledge and takes takes years to master. Once that domain is mastered, learning to think like an attacker, breaking systems, secure coding techniques, secure coding libraries, dynamic and static analysis security tools are, in all fairness, is an entire new domain of expertise to master and not taught in most universities. A top defender of software and secure software designer is a unique skill set. This is why those that break into systems (e.g., pentesters) or secure traditional IT infrastructure don’t necessarily make the best application defenders.
Attacks occur where you least expect them and it’s often frustrating to newcomers in the application security profession
To give some idea of the learning challenges, learning basic programming principles like writing a “Hello World” program in Java will take about 10 minutes of time. Learning object oriented design techniques principles, some months. Learning the various Apache and open source packages you need to be competitive in a business environment can take years. Understanding how to defend all that technology takes years of working through incidents, developing the security mindset, understanding the tools and techniques. A strong technical leader requires mastery of two domains, software development and security. If you wanted a leader for security engineering this is all you would need but you don’t, you want a CISO. Now you need someone who also knows how to frame security challenges to smart executives and board members that may not be very technical. Strong CISO are rare individuals in high demand.
Today security is largely a software quality problem that can’t be addressed with the next vendor security-in-box-solution. Software security is a business and engineering quality problem – not an act of God. Software code must be designed, built, and delivered securely. Each step in the software development process, inception, architecture, development, testing, deployment, sunsetting, is important in the overall solution quality and historically entirely within the domain of software engineering groups. Let’s face it, software engineering leaders don’t necessarily appreciate security advice around how to build systems. Especially when the suggested security quality improvements reduce execution tempo which is closely related to performance based compensation.
Today security is largely a software quality problem that can’t be addressed with the next vendor security-in-box-solution. Software code must be designed, built, and delivered securely
Significantly reducing business risk depends on the CISO’s ability to influence and win the support of software developers, development leaders, business executives, and board members. Even a CISO with the best background and skills may not be able to influence positive code quality security improvements. A CISO is not an army of one. A knowledgeable CISO will fail without the proper support across business constituencies. This is because security is everyone’s job, not only the job of the CISO and their staff. Influencing systemic positive change throughout an organization is difficult but it begins with role dependent education. Today’s CISO’s must be as comfortable reviewing and recommending security architecture to a developer on the whiteboard as explaining business implications of security vulnerability to corporate boards. CISO’s must explain why engineering quality processes must be improved and recommend specific improvements when requested. CISO’s with best blend of technology and business experience have the best chance for improving software code quality and influencing the most positive changes to security and winning respect of developers.
As our most valuable assets are brought online as Internet web applications, criminals abscond with our data while companies are busy tweaking firewalls. Many companies are squandering security investments prodigiously in the wrong areas. Indications are Fortune Top-100 CISO’s don’t have the best blend of skills and experience to defend software systems – the primary weakness.
The trend is that all executives share security responsibility in a significant security incident so the value of a knowledgeable security executive should not be underestimated
The best CISO defenders of tomorrow will be those with experience coding/programming, designing, shipping software products and services. If a security leader with a development background is not available – build one. Find a top engineering leader and begin building the security mindset. Send them to security conferences where executives congregate like, Gartner IT Security Summit. Understanding business implications of security, executive concerns around security, and how to communicate with executives are essential. Send them to SANS Institute to learn how to break software applications. Theory is helpful but hands on skills are essential. Attend security conferences like Blackhat, DEFCON, and others. It can take years to find the best leader and build out a team. Begin now, by investing in your own organization and growing some organic talent. The trend is that all executives share security responsibility in a significant security incident so the value of a knowledgeable security executive should not be underestimated.