Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives //

Carbon Black

9/13/2016
01:01 PM
Rick McElroy
Rick McElroy
Partner Perspectives
50%
50%

Lets Get Smarter About Security By Working Together

We all need help, and only by working together can we move the needle on security.

I know, I know. It’s another teamwork quote.

As a collective information security group, we know that we need teamwork, but it often feels like we aren’t a single team rowing together. We have a common cause. We preach working together with IT and the business to achieve security goals. But we still aren’t working together as well as we could be.

I travel all over the country and meet with information security teams on a regular basis. From large to small, companies are struggling to do everything. It amazes me how often we are not talking to each other. Within verticals, information security teams still are not working together to solve shared security problems. We are solving the same problems and challenges that have been solved hundreds of times by other teams, yet we try to solve them alone.

Why do we choose to silo information so that our individual programs can “ensure” security, but we’ve given nothing back to the community as a whole? We’ve done nothing to drive down shared risk of similar business models. When one of us gets better, all of us should get better.

CISOs have gotten better about meeting to discuss challenges. They have roundtables and meet on a regular basis. This needs to trickle down to team members; individual team members are still assigned work that they are expected to solve alone.

My question to all of us is “Why?”

Why are we still not talking to teams from competitors and others with the same challenges? Is it that we are too paranoid? Is it that we are afraid we will get fired for talking to “the other team”? Or is it that we put blinders on, put our heads down, and solve things alone to be the hero?

Unlock The Collective Brainpower

I am not quite sure what all the reasons are, but I do know it’s hurting us. I learn things whenever I meet with teams. Very cool things. Things I never would have thought of when I was leading programs. I see unique solutions that solve real challenges, but they remain inside the walls of the individual organizations. It’s been said before, but if we are not unlocking the combined brainpower of all individuals in our profession, we will continue to lose.

We pay “experts” crazy amounts of dollars to advise and architect, but maybe the architects at the company that shares a parking lot have free advice that is just as effective (maybe more so since they sit in the same seat as you). A cup of coffee, lunch, or a beer are really cheap ways to entice teams to meet up.

We spend so much time with our heads down working or studying for the next certification that we aren’t taking to time to talk and share. We think that ISACs (information sharing and analysis centers) and vendors will solve this problem for us, but they won’t. Until we adopt a better mindset as information security professionals, we will continue to lose.

We need to talk to each other. We need to share good processes. We need to talk about what tech works and what doesn’t. We need to share our fixes, our code, our wisdom and experience.

I challenge all of us to open up a bit. You don’t need to talk about business strategy or the next product your organization is putting out. Talk about the challenges that are the same. Talk about the threats, the risks, and the solutions. Share more and open up.

It’s what I love about events like Black Hat and DEF CON -- sitting around talking to people smarter than me who have solved challenges in really interesting ways. Talk about how you solved a problem or where your head is as you look toward the needs of your organization. Maybe you wrote a cool parsing script or some rad automation. That’s awesome. Pass the knowledge on. We all need help, and only by working together can we move the needle on security. I almost guarantee the struggles are real and generally the same. Let’s all wise up together.

Rick McElroy, Head of Security Strategy for Carbon Black, has 20 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. He has held security positions with the US Department of ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...