Infosecurity Professional Magazine Issue 20
Infosecurity Professional Magazine Issue 20
Infosecurity Professional Magazine Issue 20
org
KEEPING UP WITH
Nova Southeastern University admits students of any race, color, sexual orientation, and national or ethnic origin. Nova Southeastern University is accredited by the Commission on Colleges of the Southern Association of Colleges and Schools (1866 Southern Lane, Decatur, Georgia 30033-4097, Telephone number: 404-679-4501) to award associates, bachelors, masters, educational specialist, and doctoral degrees.
Information Security
Computer Science Information Systems
Educational Technology
Information Technology
issue 20
2012
VOLUME 4
18
10
COVER PHOTO BY COLIN ANDERSON; ABOVE ILLUSTRATION BY MICHAEL AUSTIN
[features]
Keeping up with Next-Gen Risk
The risk-management model is changing rapidly, as technology, data, and security regulations grow.
BY PETER FRETTY
3 4 6 20 22 24
[alsoinside]
Executive Letter From the desk of (ISC)2s Global Communications Manager, Sarah Bohne. Views and Reviews Highlights from (ISC)2s event moderator, Brandon Dunlap. Member News Read up on the latest happenings with (ISC)2 and its worldwide members. Q&A Patrick C. Miller, founder, president and CEO of Energy Sector Security Consortium, Inc. Chapter Passport Chapter Leaders Convene in Philadelphia, Penn., U.S.
Moderators Corner
14
FYI
18
Voices of Thanks
InfoSecurity Professional is published by IDG Enterprise Custom Solutions Group, 492 Old Connecticut Path, Framingham, MA 01701 (phone: 508 935-4796). The information contained in this publication represents the views and opinions of the respective authors and may not represent the views and opinions of (ISC)2 on the issues discussed as of the date of publication. No part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose, without the express written permission of (ISC)2. (ISC)2, the (ISC)2 digital logo and all other (ISC)2 product, service or certification names are registered marks or trademarks of the International Information Systems Security Certification Consortium, Incorporated, in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. For subscription information or to change your address, please visit www.isc2.org. To order additional copies or obtain permission to reprint materials, please email [email protected]. To request advertising information, please email [email protected]. 2012 (ISC)2 Incorporated. All rights reserved.
ISSUE NUMBER 20
INFOSECURITY PROFESSIONAL
executive letter
FROM THE DESK OF THE (ISC)2 GLOBAL COMMUNICATIONS MANAGER
SARAH BOHNE, GLOBAL COMMUNICATIONS MANAGER, SAYS (ISC) 2 ANTICIPATES SIGNIFICANT GROWTH ON MANY FRONTS IN SUPPORT OF CYBER SECURITY PROFESSIONALS.
AS THE GLOBAL SHORTAGE for cyber security professionals continues unabated, (ISC)2 is building programs to enhance the workforce of today and foster the workforce of tomorrow. By inspiring a culture of cyber security responsibility within both professional and local communities, a workforce is emerging that will be able to adapt and respond to evolving threats and challenges. Through programs like (ISC) Chapters, the (ISC) Foundation Scholarship and Safe and Secure Online programs, the networking, mentoring, professional development, and public education opportunities that are critical to ensuring a safe and secure cyber world are available to more prospective professionals than ever before. The Chapter program, which began just 14 months ago, now consists of more than 70 local chapters around the world. More importantly, we anticipate considerable Chapter growth (hopefully 50 new chapters) in 2013. The Chapters are designed to meet the professional development, community, and networking needs of our membership at a local level. The Chapters are also the launch pad for our efforts to help fill the professional pipeline. In September, we announced a NextGen program aimed at attracting new people to the industry and providing opportunities for education, networking and mentorship, which dovetails with the mission of many (ISC) Chapters. Currently, nine of them have designated a NextGen Liaison who will program events and sessions aimed at newcomers of any age. Although the content will be driven by individual chapters, (ISC) will facilitate the programs and provide support materials. The program will be expanded to all interested chapters in early 2013, and we encourage the participation of experienced professionals who are interested in mentoring. Scholarships are another way were helping fill the industry pipeline: the (ISC) Foundation granted US$120,000 in undergraduate and faculty scholarships in 2012 and will increase that to US$145,000 in 2013. Cyber security awareness is a large component of
ISSUE NUMBER 20
INFOSECURITY PROFESSIONAL
moderators corner
VIEWS AND REVIEWS FROM (ISC)2'S EVENT MODERATOR
Management Team Elise Yacobellis Executive Publisher 727-683-0782 n [email protected] Timothy Garon Publisher 508-529-6103 n [email protected] Marc G. Thompson Associate Publisher 703-637-4408 n [email protected] Amanda DAlessandro Corporate Communications Specialist 727-785-0189 x242 [email protected] Sarah Bohne Global Communications Manager 616-719-9113 n [email protected] Sales Team Jennifer Hunt Events Sales Manager 781-685-4667 n [email protected] Lisa O'Connell Regional Sales Manager 781-460-2105 n [email protected] IDG Media Team Charles Lee Vice President, Custom Solutions Group Alison Lutes Project Manager Joyce Chutchian Editor 508-628-4823 [email protected] Kim Han Art Director Lisa Stevenson Production Manager
A DV E R T I S E R I N D E X ASIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . 5 (ISC)2 . . . . . . . . . p . 2; p . 8; p . 21; Back Cover Microsoft . . . . . . . . . . . . . . . . . . . . . . . . . p . 12 NOVA Southeast . . . . . Inside Front Cover RSA Europe . . . . . . . . . . . . . . . . . . . . . . . p . 23 For information about advertising in this publication, please contact Tim Garon at tgaron@isc2 .org .
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
ASIS INTERNATIONAL
SeMinar and exhibitS
59th AnnuAl
September
2427
COLOCATED EVENT
fy
D O YO U K N O W S O M E O N E
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
Congratulations to the 2012 (ISC)2 U.S. Government Information Security Leadership Award recipients
(ISC) 2 IS PROUD TO PRESENT the recipients of our ninth annual U.S. Government
Information Security Leadership Awards program. CATEGORY: COMMUNITY AWARENESS AWARD RECIPIENT: The U.S. Federal Aviation Administration (FAA) Awareness, Training and Evaluations Division Team, led by Nancy Hendricks, CISSP, information systems security specialist PROJECT: The AIS-200 Team achieved quantifiable results in support of various administrative requirements, including a six-month campaign to ensure that at least 95 percent of the user population completed annual awareness training. CATEGORY: FEDERAL CONTRACTOR AWARD RECIPIENT: The U.S. Department of Defenses Joint Capability Technology Demonstration (JCTD) Adaptive Red Team, led by David Rohret, CEH, Security+, CHFI, ECSA/LPT, CNDA, senior principal systems engineer, CSC PROJECT: In response to a request to replicate how real-world hackers, cyber armies and cyber criminals would attack the DoD, the JCTD ART developed a process for applying goal-oriented scenarios through the adversarys eyes, attacking and assessing from every approach to determine the most likely attack vector based on the greatest impact. CATEGORY: PROCESS/POLICY AWARD RECIPIENT: Janet Stevens, PMP, chief information officer, USDA Food Safety and Inspection Service (FSIS), Information Assurance Division (IAD) PROJECT: Janet has dedicated herself to ensuring that every member of the FSIS community, from security officers to office staff, is aware of cyber security. Through an innovative use of social media and contributions to organizational publications, Janet provides her agency with in-depth explanations of cyber security issues and practices, and updates on the latest IAD news. CATEGORY: TECHNOLOGY IMPROVEMENT AWARD RECIPIENT: The U.S. Air Forces Military Satellite Communications (MILSATCOM) Systems Directorates Host Based Security System (HBSS) Pilot Integration Team, led by Steven Martin, CISM, information assurance manager PROJECT: By formulating, documenting and completing a proof of concept as a pathfinder model for future implementation, the team integrated the HBSS baseline on a Space Mission System in less than two months. CATEGORY: WORKFORCE IMPROVEMENT AWARD RECIPIENT: The U.S. Army Reserves Information Operations Command (AROIC) Cyber Warrior Training Development Team led by Col. John Diaz, CISSP, CRISC, professional engineer and commander PROJECT: This 10-person team implemented a training strategy that systematically trains and transforms AROIC soldiers into elite, combat-ready cyber warriors who are called upon to protect, monitor, analyze, detect and respond to unauthorized activity on the Armys information systems and computer networks.
Study on the GO
S T U DY I N G F O R T H E C I S S P
credential has never been more convenient. The first four domains (Access Control, Telecommunications & Network Security, Information Security Governance & Risk Management, and Software Development Security) of the Guide to the CISSP CBK, Third Edition are now available in iBook format. Now you have the flexibility to choose only the domains that you need while studying from the convenience of your iPad, iPhone or iPod.
ISSUE NUMBER 20
Colocated with
S b T d Submit Today
September 24-27
Chicago, IL McCormick Place
8
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
SECURITY CONGRESS
Giving Corner
T H E PA S T Y E A R H A S B E E N A P R O D U C T I V E Y E A R ,
the lives of so many people worldwide. With every experience, whether its determining scholarship recipients, brainstorming for new Safe and Secure Online programs, or expanding our volunteer opportunities, we find that we are able to improve upon each existing program and strive for more outreach, service, and enrichment the next time around. Our (ISC)2 Foundation Committee comprises board members and regional advisory board members worldwide. It was formed to improve the impact our programs have on members, on vulnerable publics, and on the industry as a whole. They are also tasked with helping the Foundation gather the human and financial resources needed to boost program impact, and to form useful strategic alliances.
SCHOLARSHIPS
The (ISC)2 Foundation Scholarship program is growing faster than ever. Thanks to the generous donations of our members and from the corporations who match donations, this year we awarded four scholarships to women in Tanzania, Taiwan, Singapore, and the U.S. We also awarded exam vouchers to 11 faculty members from around the world to increase the knowledge level of those charged with educating the future information security workforce. Remember, many of our scholarship recipients would not have the opportunity to remain in school without the help of members donations, and corporations who have charitable gift-matching programs. Be sure to be on the lookout for our annual appeal email. You could make a big (secure) difference in many lives and many ways by donating to support scholarships or the Safe and Secure Online program in 2013.
For more information or to donate, visit https://www.isc2cares.org. Happy New Year! Julie Peeler Director, (ISC)2 Foundation
ISSUE NUMBER 20
INFOSECURITY PROFESSIONAL
RISK
The model of risk management is quickly changing as technology, data, and security regulations increase.
10
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
MANAGEMENT
In fact, the formula for calculation (risk = likelihood x impact) is time-tested, universally accepted and relatively simple. However, in todays data-laden, tech-driven world, the landscape is altering with significantly more compliance regulations as well as an increased number of threats. While fundamentals have not changed, what has changed is that there are more opportunities to exercise risk transference, which means there are more opportunities to push your risk burden onto someone else, explains Ben Tomhave, principal consultant with Overland Park, Kan., U.S.-based governance, risk management and compliance solution provider LockPath. To do so effectively, however, means having a sharp legal team that can work to ensure that the contract has appropriate provisions to accomplish a risk transference objective, as well as strong brand management and customer rapport to help defuse any sort of negative flashback that may ensue from a security incident at one of your providers, he says.
INFOSECURITY PROFESSIONAL
11
A CISO can only determine the organizations security risk level by performing a true security risk assessment that focuses in on determining the actual security risks to the organization, explains Doug Landoll, author of The Security Risk Assessment Handbook. This can be accomplished by improving the standard practice of dividing the controls among those responsible and sending out a questionnaire seeking those in charge of the controls to somehow give an honest representation of their strength. According to Landoll, an improved data gathering component of the security risk assessment would seek information about controls using the five key data-gathering methods: review documents, interview key staff, inspect controls, observe behavior and test controls. This assessment should provide the CISO with the information needed to create a near-term and long-term security strategy for the organization. Whether conscious or not, there is a strong human tendency to make the data support our beliefs or desires, he says. All too often, a security risk assessment is merely a paper exercise used to support the already-determined strategy. Of all the responsibilities of the CISO, setting the security strategy based on corporate objec-
tives and the realities of the current threat environment and existing controls is the most important.
Find the answer with the free Cloud Security Readiness Tool.
A short survey and custom report helps you understand and improve your current IT state, identify industry regulation and compliance requirements, and evaluate the benefits of cloud adoption. www.micosoft.com/trustedcloud
12
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
audit, the monitoring and detection capabilities available, access to reports, the ability to conduct an incident or forensics response, and the ability to ensure that your corporate policies are being enforced.
The best risk management solutions use automated testing tools to help fill the gaps left by audits, as well as to integrate into often-overlooked areas like the development environment and developer activities.
risk register doesnt require a fancy, proprietary application, although many such products exist; it can be managed effectively using a spreadsheet or a consumer database tool, but needs to contain the basics for each asset including an identification of individual threats, the likelihood and impact of each of those threats occurring, mitigation and contingency, he says. Of course, a risk register is useless without having a comprehensive understanding of all information assets and what theyre worth. Its the lack of this critical information that allows exploited vulnerabilities to go so long before theyre detected in many environments. According to Tomhave, the best risk management solutions use automated testing tools to help fill the gaps left by audits, as well as to integrate into often-overlooked areas like the development environment and developer activities. A risk management program should have insight into the monitoring and detection system to help provide oversight and governance to the operational teams as part of keeping the business aligned to the risk strategy, he says. Its also important to remember that help doesnt necessarily mean an expensive third-party vendor, explains Linkous. For instance, the federal government offers free resources to help organizations get a handle on information risk through the National Institute of Standards and Technology (NIST). Specifically, risk management models (NIST SP800-37), security controls frameworks (NIST SP800-53), and technical recommendations (NIST FIPS publications) for implementing specific security controls such as authentication and encryption are quite extensive. Peter Fretty is a freelance business and technology journalist based in Michigan.
ISSUE NUMBER 20
INFOSECURITY PROFESSIONAL
13
From To
FAIRY TALES
TEACHING MOMENT:
INFO SECURITY
Telling stories can help users and IT professionals retain important security information.
by KERRY ANDERSON
14
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
used story telling as a way to relate information. Stories can be used to teach ethics, relate examples of behavior and their consequences, communicate information, and provide entertainment as well. Storytelling has been used as a method of teaching, both formally and informally, even before written language existed1.
Storytelling offers many benefits, including using it as part of instruction in formal classes or training sessions. The reason: stories are fun; stories can effectively share knowledge in diverse groups; stories make it simple to communicate a message; and stories make the message more memorable.2 For several years, I ran a study group for various security certification examinations. Years later my participants would tell me that they remembered a 3-year-old concept because of a story I associated with it, such as my three year nephew attempting to send my manager an email using my VPN connection on my unlocked laptop (lesson: always lock your screen). The more vivid the image in the story, the better chance we have of remembering it. 4. Instructors can put their own personal twist on the basic presentation 5. Most of the well-known tales can be used to teach basic end-user security concepts or more advanced security mechanisms 6. A learning activity using another fairy tale to evaluate it for security themes could be used as a follow-up to the initial lecture portion of the session So Ive taken the liberty to analyze some popular fairy tales with the objective of developing various information security themes for use with basic end-users and advanced technology practitioners.
1. Cinderella
I have had the pleasure of hearing Ira Winkler, the well-known information security expert and speaker, present at various conferences. He is a master of memorable presentation themes, such as "Everything I Need To Know About Security, I Learned From Watching Star Trek" and the use of the Wizard of Oz" story to discuss computer and network security. We can relate to these popular cultural images, and they make the concept easier to recall even years later. Six years later, I can still recall significant portions of Mr. Winklers presentations. It recently occurred to me that storytelling might serve as a vehicle for exploring information security themes and serve as instructional tools for conveying best practices. Using fairy tales as a teaching tool affords the following advantages, in addition to the basic benefits of using storytelling as an instructional mechanism: 1. Most individuals are familiar with the stories. 2. The stories lend themselves to vivid imagery by the teller. 3. It is an innovative approach to teaching security knowledge.
Mistreated stepdaughter is forced into a life of drudgery by evil stepmother and stepsisters. She wants to attend a royal ball to meet the handsome prince in search of a bride. However, she has no means to go until her fairy godmother transforms her ragged attire into a gorgeous gown with glass slippers. Unfortunately, the spell only lasts until midnight. She meets the prince and it is love at first sight. As midnight approaches, she flees and leaves behind one of her glass slippers. The prince hatches a plan to use the slipper to locate her by trying the slipper on all the maidens in his kingdom. It does not fit anyone but Cinderella because of her tiny feet. The shoe fits. The prince married her and they live happily ever after.
POTENTIAL SECURITY THEME(S)
Biometrics: The prince used a unique physical attribute to identify Cinderella. He searched his kingdom for a match, but only Cinderellas foot fit the tiny slipper. Perhaps the fairy godmother used some unique attributes of Cinderellas foot to create a slipper that would only conform to her foot, therefore
ISSUE NUMBER 20
INFOSECURITY PROFESSIONAL
15
trail of breadcrumbs to find their way back home, and lived happily ever.
POTENTIAL SECURITY THEME(S)
Both the third little pig and an organization need to practice defense in depth. The third little pig developed the scalding kettle defense to protect against an indirect attack that bypassed his primary brick house protection layer.
excluding all other potential maidens. Access Restrictions Based On Time: Cinderella is only able to access resources based on a specific period, i.e., prior to midnight. After that time had passed, she lost control of the assets, such as the pumpkin coach. Social Engineering/Penetration-Testing: Cinderellas regal garb allowed her to gain access to the castle and the event (ball). Her appearance allowed her to blend with the invited guests. In some versions of the tale, such as the popular television version, the prince assumes Cinderella is a princess and she does nothing to discourage that perception. If Cinderellas intention had been more nefarious, she could have used her ruse to steal assets, such as battle plans for a war or the royal jewels. She could even have injured attendees of the ball.
Biometrics: Hansel and Gretel used breadcrumbs as a navigation aid to retrace their steps. The term breadcrumb is commonly used for mechanisms that allow users to keep track of their locations within programs or websites. Tracing: Paths that messages take on networks can be traced from the initial source through many servers they took to reach the final destination IP address. Generally, on the Internet, everybody can be traced, no matter what they do or where they go because IP addresses are left on every server and every computer communicated with. While cyber criminals may use different techniques, such as anonymizer/ anonymous proxy to attempt to make activity on the Internet untraceable, many forensic experts may still be able to determine their activities. False Metrics: The old woman uses Hansels finger as a metric for how effective her efforts to fatten up the siblings is going. Hansel is able to substitute a bone for his finger and provides a false metric for the old womans monitoring efforts. Hackers often alter (or delete) logs and other monitoring files to disguise their real activities. The old woman is visually impaired, making it easier for Hansel to pull off his ruse. Sometimes, despite having the proper metrics and/or logs, an information security practitioner can fail to identify abnormal activity because they are myopic (shortsighted) and focus on specific risk areas. Social Engineering: The old woman lures the siblings into her home with food and kindness, but her intentions are malevolent. This is a social engineering technique called reciprocation3 in which the social engineer offers something of value, such as food, to solicit a behavior based on gratitude, such as staying and visiting with a person. When an individual receives something of value from people, we tend to want to reciprocate, often by complying with their requests.
Hansel and Gretel were a brother and sister in search of food. They used a slice of bread to mark a path back to their home by leaving a trail of breadcrumbs. The siblings came upon a gingerbread house and partook of its tasty structure without permission. The owner, a kindly looking old woman, invited them in. She fed them. Hansel and Gretel did not initially realize that the old woman was fattening them up so she could eat them. The old women used the childrens finger to determine if the siblings were ready for slaughter. Hansel substituted a bone for a finger to fool the old women who had poor eyesight. The children eventually escaped after pushing the old woman into the oven. They took her jewels and food, then used the 16
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
Three little pigs went out into the world to seek their fortunes. They needed appropriate housing. The first little pig used straw to construct his house because it was the easiest thing to do. The second little pig constructed his house out of sticks because it was easy to do, but a little bit stronger than straw. The third little pig considered security in his construction and used bricks to build his home. A big, bad wolf, who loved to eat little pigs, lived nearby. The wolf ordered the first little pig to let him in his straw house, but the little pig balked at the request. The wolf blew the house down. Then the wolf ordered the second little pig to let him in his house made of sticks, but the little pig balked at the request. The wolf blew the house down. The wolf then came to the third little pig and his brick house. The wolf ordered the third little pig to let him in, but the little pig balked at the request. The wolf huffed and puffed. However, try as he might, he could not blow down the brick house. The wolf decided to climb
onto the roof and crawl down the chimney. However, the pig had seen him him climbing onto the roof, so he boiled a large kettle of water in the fireplace. The wolf landed in the kettle of water, and was boiled to death. The third little pig lived happily ever after.
POTENTIAL SECURITY THEME(S)
Construct Strong Defenses: Defenses have to be appropriate to protect again known threats. The first and second little pigs should have constructed defenses adequate to withstand the known attack type used by the big bad wolf, his huffing and puffing. They both were eaten because they used weak defenses, namely straw and sticks, because they were easy, available, and likely cheap. Beware the Porous Perimeter: Even strong primary defenses may have some weakness necessary to sustain life or business activities. This is the porous perimeter. The third little pig needed to have a chimney to cook his food and heat his home. However, the chimney created a chink in the otherwise strong defense of his home. Luckily, the third little pig was aware of this risk and had a strategy to defend against attacks on this potential vulnerability.
Use Defense in Depth: You cannot depend on one defensive layer for complete protection from attackers. It is similar to depending totally on an enterprise firewall to defend against all cyber attacks without considering sidechannel attacks against mobile devices or web applications. Both the third little pig and an organization need to practice defense in depth. The third little pig developed the scalding kettle defense to protect against an indirect attack that bypassed his primary brick house protection layer.
There are numerous ways to relate cultural knowledge to information security concepts. Fairy tales offer some widely known stories and provide the strong visual imagery to increase the potential for long-term retention of learning. As an adjunct college instructor and trainer for more than a decade, I frequently use examples based upon literature and entertainment to illustrate a point and make the concept more memorable. For example, when discussing the need to understand requirements before implementing security architecture, I often describe an episode of classic Star Trek called The Cage. In it a disfigured woman explains her appearance by saying, They rebuilt me. Everything works. But, they had never seen a human. They had no guide for putting me back together. It is possible to utilize this approach across visual, auditory, and kinesthetic learning styles4.
CLOSING THOUGHTS
Other approaches, such as demonstration, games, and video work well, but stories seem to work best. Once I explored the potential securityrelated themes that can be drawn from a story, I was pleasantly surprised by the amount of ideas that a single story generated.
Like many practitioners, I am always seeking innovative ways to relate information security concepts to avoid the perception that the material is dry. In the past, I have integrated stories from my own experience, as well as those of other practitioners. I favor stories with strong visual impact or unusual elements. I also include news stories related to the topic under discussion because they can act to illustrate both weak and best practices in information security management. Other approaches, such as demonstration, games, and video work well, but stories seem to work best. Once I explored the potential security-related themes that can be drawn from a story, I was pleasantly surprised by the amount of ideas that a single story generated. Initially, I had only one security concept per story, but I wound up with several concepts for each fairy tale I explored. There is a reason that these stories have lived on through the generations and why they remain relevant today. Kerry Anderson is a CISSP-ISSAP, ISSMP, CISA, CISM, CGEIT, CRISC, CFE, CSSLP, CCSK, MSIA and holds an MBA.
1 2
Egan, K. (1989). Teaching as storytelling. Chicago: University of Chicago Press Sole, D. and Wilson, D. Storytelling in organisations (2002) 3 Influence: The Psychology of Persuasion by Robert B. Cialdini (December 2006) 4 www.ldpride.net/learningstyles.MI.htm#Kinesthetic%20Learners:
ISSUE NUMBER 20
INFOSECURITY PROFESSIONAL
17
Filling the
(Soft) Skills
Gap
A balance of technical and soft skills opens doors to career advancement. COLLEEN FRYE
by
YOUR TECHNICAL SKILLS MAY OPEN THE DOOR TO AN INFOSEC CAREER, but
your soft skills will keep the door open to career advancement. Soft skills refer to a persons Emotional Intelligence Quotient (EQ), a cluster of personality traits and attributes such as verbal and written communication skills, conflict resolution and negotiation skills, listening skills, empathy, and more.
A signpost for EQ career trajectory typically comes at the three- to seven-year mark, says David Garcia, an executive recruiter in the Columbus, Ohio, area specializing in information security, information protection and IT audit. Thats where people need to decide what they want to do when they grow up. If you want to remain in a purely technical role, no harm, no foul. However, he tells recruits, if they want to get promoted, they will need soft skills. If youre happy with a technical role, it will largely limit a path to management if you dont have soft skills, says Jack Daniel, technical product manager at Tenable Network 18
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
Security. Thats OK, he adds, but it does limit your options, and you have to stay on top of your technical skills so you can continue to find jobs and grow in your position. This balance of hard or technical skills with soft skills does not just apply to career advancement in infosec. In many fields at the entry level, technical skills will help open the door, possibly even more than soft skills, depending on the field and what is needed, says Lisa Prior, principal at Newton, Mass., U.S.-based Prior Consulting LLC, a firm that specializes in organizational and leadership effectiveness. But what we know is that after 10 years in a career, soft skills or skills
of emotional intelligence begin to matter more and technical skills become somewhat less important. According to the 2012 Talent Shortage Survey from ManpowerGroup, employers from around the world cited the top reasons for the difficulty in filling jobs as lack of available applications or no applicants (33%), lack of technical competencies or hard skills (33%), lack of experience (24%), and lack of employability skills or soft skills (18%). In the Americas, 15% of employers reported that applicants lack soft skills or employability skills. The top soft skills todays employees are lacking, according to U.S. employers, are enthusiasm and motivation, professionalism (personal appearance and punctuality), interpersonal skills, attention to detail, collaboration and team work ability, and flexibility, adaptability, and agility. Industry observers agree that the infosec field does tend to have a shortage of soft skills. We mention this quietly in the background; there is a sort of a nerd factor, says Bill Sieglein, founder and CEO of CISO Executive Network. We meet folks who are very talented in infosec, but in roundtables you can quickly identify who will rise and who will hit a ceiling. They communicate in a nerdy fashion and business doesnt understand. So what exactly are employers looking for? For CISOs, says Sieglein, Number one is the ability to communicate with business leaders, to translate complex security language to business language. The second is team skillsyou cant be a lone wolf. You have to rely on people across the company and communicate with staff. For infosec staff, it depends on the role, Garcia says. Some are very technical, such as reverse-malware engineering. The perfect person probably has a database background, hardcore software development skills, and has moved into security. But for someone responsible for PCI certification, he says, they not only have to have hard technical skills like encryption, but theyll be communicating on a daily basis to both technical and nontechnical people. The CISO interviewing them should be picturing them talking to business units or talking to the team that works for CIO. So they have to speak well, and write well. Daniel agrees. Public speaking and writing has a real impact on your career path. One of the ways you build up a reputation in the field is by writing, whether thats white papers, technical writing, blogs, webcasts or podcasts. He says infosec professionals can also hone writing and speaking skills at their local ISSA chapters or at regional conferences. Other key soft skills include being a good listener and possessing the ability to work well with others, Sieglein says. A sense of humor can also be valuable for those in publicfacing roles, says Daniel. Humor is part of the way you can soften a situation, he says, but warns, a little humor goes a long way, but it can be completely overdone. What an employer looks for is a fit for their culture, says Prior. If humor is part of that organizations culture, then its a quality theyll look for. The more desirable things are how you are at getting along with others, how effective you are at
managing conflict. And that, she says, can come down to self-awareness. Self-awareness is one of the most important career skillsthe ability to understand how youre perceived in the workplace is critical to your success. Also, she says, do you take the initiative and have responsibility and ownership for resolving issues without a lot of direction? Do others come to you as the go-to person? Early in a career, those are skills that are important, and a characteristic that endures. For David M. Jacquet, president of InfoSecGroup, an infosec services consulting company in Portland, Maine, the bottom line for soft skills is, someone who knows how to interact with people. He adds, A lot of my guys talk to boards of directors; they cant be geeking out soft skills have got to be there. Colleen Frye is a freelance writer and editor in Franklin, Mass., U.S.
ISSUE NUMBER 20
INFOSECURITY PROFESSIONAL
19
Q&A
20
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
CHAPTERS
chapter passport
MEMBERS CONNECT AND COLLABORATE
professional community. Sarah Bohne, (ISC) global communications manager, presented two of the initial chapter pilot programs: Executive Writers Bureau (EWB) and the NextGen program. Upon successful completion of the pilot phase, these programs will be expanded to advisory boards and chapters in other regions. (For more details, contact Sarah at [email protected].) Officers from the New Jersey, Philadelphia, and Sacramento (U.S.) Chapters served on a panel and presented their chapter programs and activities. In addition, they answered questions from the audience and provided advice. Officers enjoyed learning about experiences from other officers and were excited to learn about new programs. Heres what some of the attendees had to say: Thank you very much for organizing such a fantastic meeting for the people! We look forward to providing more input and efforts to the local chapter and the corporate work as well! Ron Zhang, New Jersey, U.S. Chapter Meetings like this, where chapters can discuss their problems, achievements, and possible solutions, go a long way in helping us all to succeed. Marc Noble, National Capital Region Chapter I really enjoyed the Leadership Meeting! It was good to see all of the energy and start-up information presented. Darren Singleton, Nashville, Tenn., U.S. Chapter
Download a copy of the (ISC) 2 Chapter Leadership Meeting presentation slides or watch videos at: www.isc2.org/chapter-leadership-2012.aspx.
Additional leadership meetings will be held in 2013. Visit (ISC) Chapters for more details.
22
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
Security in Knowledge
Save $400
Register Now!
www.rsaconference.com/isc2
Global Diamond Sponsors Global Platinum Sponsors Global Gold Sponsors Platinum Sponsors Silver Sponsors
Gold Sponsors
global insight
INTERNATIONAL INFORMATION SECURITY PERSPECTIVES
not only because they are the hands-on-operationalrelated ones the easiest and quickest ones to implement in comparison but business wise, they are the ones that allow you to present metrics and return on investment to management. After all, big shot executives like that, right? Many would argue that awareness is hard to implement because of the lack of support from management. Thats a tragic truth. Following is a list of suggested tasks for revitalizing or beginning awareness initiatives in your organization: Include strategic numbers in policies. Now that the company has agreed to implement a security program in the organization with no awareness budget of course be sure to include one or two subsections pertaining to awareness. For instance, in the Acceptable Information Resources Use Policy, make sure to include instructions for employees to turn off their PCs after a shift is over if its not necessary to leave it on. Screen savers to the rescue. If theres support for a security program within a company, a domain is likely already in place. Talk to the IT department and use your domain policies to set up the companys screen saver. Be creative with your messages! Use email. Send email messages to everyone in the company. Try to send insightful, but most of all, short messages. And it is not SPAM if you get consent from management and believe me you will if you ask them to base their decision on the fact that those messages a) could potentially save the company from an incident and b) they wont add a penny to the budget. Use the phone system. This is a long shot but worth a try. Record awareness tips to include on the phone system when calls are place on hold. Talk in person. Maybe you wont have time to prepare a 30-minute presentation about awareness, but EVERY time there is an opportunity, talk about safe practices and the importance of protecting the companys assets. Pedro D. Navarro, CISSP, coordinates PCI-DSS compliance and IT Incident Response for Asociacin Cibao de Ahorros y Prstamos, a financial institution in the Dominican Republic.
24
INFOSECURITY PROFESSIONAL
ISSUE NUMBER 20
FREE
Receive a new webcast each week.
(ISC)2 members must stay current in the evolving world of software security. This series of webcasts will provide you with a new webcast each week focusing on securing a different phase of the software lifecycle. It will show you what security measures need to take place at the beginning in the requirements phase, how security must be built in the design phase, and how to test if the application is resilient enough to withstand attacks in the testing phase. Also, this series will feature a webcast on the value of the CSSLP and how to study for the exam.
(ISC)2