Cover image for CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
Title:
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
Personal Author:
Publication Information:
Boca Raton : CRC Press, 2009
Physical Description:
xxxi, 282 p. : ill. ; 25 cm.
ISBN:
9781420089103

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010202462 HF5548.37 C64 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations. While these items are very important, they are only half of the equation necessary to ensure security success. CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives presents tools that empower security practitioners to identify the intangible negative influencers of security that plague most organizations, and provides techniques to identify, minimize, and overcome these pitfalls.

The book begins by explaining how using the wrong criteria to measure security can result in a claim of adequate security when objective assessment demonstrates this not to be the case. The authors instead recommend that organizations measure the success of their efforts using a practical approach that illustrates both the tangible and intangible requirements needed by a healthy security effort.

The middle section discusses the root causes that negatively influence both a CISO and an organization's ability to truly secure itself. These root causes include:

Employee apathy Employee myopia or tunnel vision Employee primacy, often exhibited as office politics The infancy of the information security discipline

These chapters explain what a CISO can do about these security constraints, providing numerous practical and actionable exercises, tools, and techniques to identify, limit, and compensate for the influence of security constraints in any type of organization.

The final chapters discuss some proactive techniques that CISOs can utilize to effectively secure challenging work environments. Reflecting the experience and solutions of those that are in the trenches of modern organizations, this volume provides practical ideas that can make a difference in the daily lives of security practitioners.


Author Notes

Mike Gentile is on a mission to change the status quo in Information Security as we know it. His goal is to translate the discipline from one that is often misunderstood, inefficiently applied, and painful to one that is seamless, collaborative, and repeatable in organizations across the globe. Delphiis is the encapsulation of this mission.Mike brings balance of business acumen and technical skill-set anchored by years in the field and his core focus over the past 15 years has been his practice, Coastline Consulting services. As the Founder and President, Coastline has developed enterprise security programs for countless leading public, private, and government organizations, including many within the Global 1000 and Fortune 500. During that time he also became Co-Founder and Editor for CISOHandbook.com, the leading portal for security leaders.As a researcher, Mike has contributed numerous publications within the Information technology, project management, and security communities. He is also a senior researcher with Computer Economics in the Information Security domain and has written articles for the ISSA Journal, Computer Economics, RSA Conference and Secure World Expo.

As a writer he is the co-author of The CISO Handbook: A Practical Guide to Securing Your Company as well as CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives. The CISO Handbook is used as course material for numerous advanced education and Master's programs on security leadership around the world.Mr. Gentile serves on multiple advisory boards, including being on the Board of Advisors for Savant, a malware protection company, as well an active member of the RSA Program Committee since 2009.

Mr. Gentile is a sought after speaker on security, project management, and information technology topics. For the last 3 years he has been a top rated speaker at RSA, the most prestigious security conference in the United states and has been keynote speaker for the CXO Summits conference series. He has also presented over the years for the Project Management Institute, Secure World Expo, ISSA, Symantec, and many more.Mike lives in Southern California with his wife Tiffany and their two boys.


Table of Contents

Forewordp. xi
Acknowledgmentsp. xiii
About the Authorsp. xvii
Overviewp. xxi
Chapter 1 What's Not Rightp. 1
Overviewp. 1
What Is Security?p. 3
Why Is All This Important?p. 6
Measuring Securityp. 8
Security Program Strategyp. 8
Mission and Mandatep. 11
Security Policiesp. 14
Roles and Responsibilitiesp. 16
Training and Awarenessp. 19
The Security Risk Project Portfoliop. 21
Other Methods of Measurementp. 23
Security Constraints (Apathy, Myopia, Priamcy, and Infancy)p. 29
The Con of Securityp. 35
Conclusionp. 39
Chapter 2 True Security Modelp. 41
True Securityp. 41
Part I The Tangible Elements of True Securityp. 42
Part II Modeling the Intangible Elements of True Security (The Hard Part)p. 43
The Two "Step-Children" Groups of the Modelp. 47
Tying It All Togetherp. 49
True Security Summaryp. 51
Using the Modelp. 51
Introduction to Systems Theoryp. 53
Components of Systems Theoryp. 53
Overlaying Security onto Systems Theoryp. 54
Putting It All Togetherp. 55
Summaryp. 57
Chapter 3 Apathyp. 59
Overview-What We Are Going to Coverp. 59
Causesp. 60
Causes of Apathy in Humansp. 60
Causes of Apathy within a Systemp. 62
Causes of Apathy within an Organizationp. 64
Causes of Apathy within a Security Programp. 69
Equilibrium of Accountability and Authorityp. 75
Security Interaction Points within an Organizationp. 76
Eating the Elephant in One Bitep. 78
Missing Tangible Items of a Security Programp. 79
Communication-The "Why"p. 79
Causes of Apathy Section Summaryp. 80
Cause and Effect of Apathy on the True Security Modelp. 80
Apathy and the True Security Modelp. 82
Apathy and the Board of Directorsp. 83
Apathy and the Executive Teamp. 84
Apathy and Middle Managementp. 86
Apathy and the Supervisory Teamp. 86
Apathy and Employeesp. 87
Apathy and Consumersp. 88
Effects Summaryp. 89
Solutions to Apathyp. 89
Security Solutionsp. 92
Chapter Summaryp. 96
Chapter 4 Myopiap. 97
Overviewp. 97
Causes of Myopia within an Organizationp. 103
History and Myopiap. 104
Complexity of Systemsp. 105
Those Who Perform the Workp. 106
Professional Fraudp. 108
Knowledge Managementp. 109
Causes of Myopia within a Security Programp. 110
What Is Security?p. 111
Techno-Centric Securityp. 111
It's a Game of Inchesp. 112
Pedigree Mattersp. 113
The Generalist versus the Specialistp. 113
No Hablas Securityp. 114
Life is a Wheelp. 114
Buyer Bewarep. 115
Security Trainingp. 116
Causes of Myopia Section Summaryp. 116
Cause and Effect of Myopia on the True Security Modelp. 118
Myopia and the True Security Modelp. 118
Myopia and the Board of Directorsp. 119
Myopia and the Executive Teamp. 120
Myopia and Middle Managementp. 122
Myopia and the Supervisory Teamp. 122
Myopia and Employeesp. 123
Myopia and Consumersp. 123
Effects Summaryp. 125
Solutionsp. 125
Security Solutionsp. 126
Chapter Summaryp. 134
Chapter 5 Primacyp. 135
Overviewp. 135
Primacy Tune-Upp. 136
Causes of Primacy within an Organizationp. 141
Organizational Culturep. 141
Causes of Primacy within a Security Programp. 148
Walk Softly in the Land of the Giantsp. 153
Summaryp. 153
Cause and Effect of Primacy on the True Security Modelp. 155
Effects of Primacyp. 155
Solutionsp. 160
Security Solutionsp. 163
Step #1 Assess Your Own Situationp. 163
Step #2 What's in The Message?p. 165
Step #3 Be Gentle with Your Knowledgep. 168
Step #4 Power Flows from the Topp. 169
Conclusionp. 170
Chapter 6 Infancyp. 171
Overviewp. 171
Infancy within an Organizationp. 181
Summaryp. 184
Infancy within a Security Programp. 184
Nature of Securityp. 185
Lack of Credibilityp. 185
Pedaling Doom (or How Chicken Little Found His Calling in Security)p. 187
Summaryp. 187
True Security Model and Infancyp. 189
True Security Modelp. 189
Board of Directorsp. 190
Executive Managementp. 191
Middle Managersp. 191
Supervisory Teamp. 192
Employeesp. 193
Consumersp. 193
Summaryp. 195
Security Solutionsp. 195
First Things Firstp. 198
No One Likes Big Brotherp. 199
Find Good Sourcesp. 199
Do Not Blindly Trust Sources Just Because They Appear Authoritativep. 199
Educate Yourself and Then Teach Othersp. 201
Organize Your Messagesp. 202
Be Patientp. 204
Summaryp. 204
Chapter 7 Tying It All Togetherp. 205
Tales from the Security Consultantp. 205
Overviewp. 206
Warning: Awareness and Comprehension of Previous Chapters Are Necessary to Read Past This Pointp. 208
How to Measure Constraints within Your Environmentp. 209
Localized Security Constraint Identificationp. 209
Identification of Security Constraints within the True Security Modelp. 211
Summaryp. 214
GAP the True Security Modelp. 214
The Tangible Elements of the True Security Modelp. 215
Measuring the Intangible Elements of the True Security Modelp. 216
Organizational GAP Analysis within the True Security Modelp. 218
Summaryp. 220
Filling the Gapp. 220
R.E.A.P.-Security Success Modelp. 220
Final Stepsp. 231
Summaryp. 233
Chapter 8 Closing Thoughtsp. 235
The Final Tale from the Security Consultantp. 235
Concept 1 Recognize That the Security Constraints Are What Leads to All of the Failures on Security Initiatives and in Security Programsp. 236
Concept 2 Be Reasonable in Your Approach to Mitigate the Security Constraintsp. 236
Concept 3 True Security Is an Idealp. 236
Concept 4 Treat Security Personallyp. 237
Summaryp. 237
Appendixp. 239
Exercise 8 Apathyp. 239
Exercise 9 Apathyp. 240
Exercise 10 Myopiap. 242
Exercise 11 Myopiap. 243
Exercise 12 Myopiap. 244
Exercise 13 Primacyp. 245
Exercise 14 Primacyp. 246
Exercise 15 Primacyp. 247
Exercise 16 Infancyp. 248
Exercise 17 Infancyp. 249
Exercise 18 Tying It All Togetherp. 250
Exercise 19 Tying It All Togetherp. 253
Exercise 20 Tying It All Togetherp. 257
Exercise 21 Tying It All Togetherp. 260
Exercise 22 Tying It All Togetherp. 263
R.E.A.P. Templates: Exercises 24 to 30p. 266
Referencesp. 271
Indexp. 273