Partner Perspectives //

Carbon Black

9/13/2016
01:01 PM
Rick McElroy
Rick McElroy
Partner Perspectives
50%
50%

Lets Get Smarter About Security By Working Together

We all need help, and only by working together can we move the needle on security.

I know, I know. It’s another teamwork quote.

As a collective information security group, we know that we need teamwork, but it often feels like we aren’t a single team rowing together. We have a common cause. We preach working together with IT and the business to achieve security goals. But we still aren’t working together as well as we could be.

I travel all over the country and meet with information security teams on a regular basis. From large to small, companies are struggling to do everything. It amazes me how often we are not talking to each other. Within verticals, information security teams still are not working together to solve shared security problems. We are solving the same problems and challenges that have been solved hundreds of times by other teams, yet we try to solve them alone.

Why do we choose to silo information so that our individual programs can “ensure” security, but we’ve given nothing back to the community as a whole? We’ve done nothing to drive down shared risk of similar business models. When one of us gets better, all of us should get better.

CISOs have gotten better about meeting to discuss challenges. They have roundtables and meet on a regular basis. This needs to trickle down to team members; individual team members are still assigned work that they are expected to solve alone.

My question to all of us is “Why?”

Why are we still not talking to teams from competitors and others with the same challenges? Is it that we are too paranoid? Is it that we are afraid we will get fired for talking to “the other team”? Or is it that we put blinders on, put our heads down, and solve things alone to be the hero?

Unlock The Collective Brainpower

I am not quite sure what all the reasons are, but I do know it’s hurting us. I learn things whenever I meet with teams. Very cool things. Things I never would have thought of when I was leading programs. I see unique solutions that solve real challenges, but they remain inside the walls of the individual organizations. It’s been said before, but if we are not unlocking the combined brainpower of all individuals in our profession, we will continue to lose.

We pay “experts” crazy amounts of dollars to advise and architect, but maybe the architects at the company that shares a parking lot have free advice that is just as effective (maybe more so since they sit in the same seat as you). A cup of coffee, lunch, or a beer are really cheap ways to entice teams to meet up.

We spend so much time with our heads down working or studying for the next certification that we aren’t taking to time to talk and share. We think that ISACs (information sharing and analysis centers) and vendors will solve this problem for us, but they won’t. Until we adopt a better mindset as information security professionals, we will continue to lose.

We need to talk to each other. We need to share good processes. We need to talk about what tech works and what doesn’t. We need to share our fixes, our code, our wisdom and experience.

I challenge all of us to open up a bit. You don’t need to talk about business strategy or the next product your organization is putting out. Talk about the challenges that are the same. Talk about the threats, the risks, and the solutions. Share more and open up.

It’s what I love about events like Black Hat and DEF CON -- sitting around talking to people smarter than me who have solved challenges in really interesting ways. Talk about how you solved a problem or where your head is as you look toward the needs of your organization. Maybe you wrote a cool parsing script or some rad automation. That’s awesome. Pass the knowledge on. We all need help, and only by working together can we move the needle on security. I almost guarantee the struggles are real and generally the same. Let’s all wise up together.

Rick McElroy, security strategist for Carbon Black, has more than 15 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. He has held security positions with the U.S. Department of ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3965
PUBLISHED: 2019-03-23
Hospira Symbiq Infusion System 3.13 and earlier allows remote authenticated users to trigger "unanticipated operations" by leveraging "elevated privileges" for an unspecified call to an incorrectly exposed function.
CVE-2016-10743
PUBLISHED: 2019-03-23
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
CVE-2019-9947
PUBLISHED: 2019-03-23
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string or PATH_INFO) follo...
CVE-2019-9948
PUBLISHED: 2019-03-23
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
CVE-2019-9945
PUBLISHED: 2019-03-23
SoftNAS Cloud 4.2.0 and 4.2.1 allows remote command execution. The NGINX default configuration file has a check to verify the status of a user cookie. If not set, a user is redirected to the login page. An arbitrary value can be provided for this cookie to access the web interface without valid user...