• HOME
  • SERVICES
    • CYBER SECURITY
    • RISK MANAGEMENT
    • DATA PRIVACY
    • PROCESS IMPROVEMENT
    • CHANGE MANAGEMENT
    • TRAINING
  • ABOUT
    • ADVANTAGES
    • METHODOLOGIES
    • A + RESULTS
    • CLIENTS
    • SPEAKING/WRITING
    • MISSION-VISION-VALUES
    • TEAM
    • PRESS RELEASES
  • CONTACT
  • BLOG
  • PODCAST

3 Key Points From “Unsecurity” By Evan Francen

6 years ago
abstractfwd1987
No Comments

National author, speaker, consultant, and entrepreneur Evan Francen got into information security long before it was cool and buzzing in the media, and long before every so-called IT consultancy started chasing the money. In fact, he and I both dislike the money chasers. He and his growing consultancy, FRSecure are for-profit, but they don’t do it for the money.

Fig 1., Evan Francen, 2019.

Like a patriot who delays college to join the army amid dire national conflict, Francen offers a fact-based call to arms to fix the broken cybersecurity industry in his 2019 book “Unsecurity”. Having known him and his company for a few years, and having read the book and many on this subject, this content is worth sharing because too few people write or talk about how to actually make this industry better. Here are my three unbiased key points from his book:

1)    We’re Not Speaking the Same Language:

Fig 2., Evan Francen, 2019.

Francen opens his book with a lengthy chapter on how poor communication between cybersecurity stakeholders exacerbates trouble and risk. You can’t see or measure what isn’t communicated well. It starts because there are five main stakeholder groups who don’t share the same vocabulary amid conflicting priorities.

a)    IT: Speaks in data tables and code jargon.

b)    Cyber: Speaks in risk metrics and security controls.

c)     Business: Speaks in voice of the customer and profits.

d)    Compliance: Speaks in evidence collection and legal regulatory frameworks.

e)     Vendor: Speaks in sales and marketing terms.

Ideally, all these stakeholders need to work together but are only as strong as the weakest link. To attain better communication and collaboration between these stakeholders, all must agree on the same general security framework best for the company and industry, maybe NIST CSF with its inferred definitions or maybe ISACA Cobit. However, once you pick the framework you need to start training, communicating, and measuring against it and only it –going with its inferred definitions.

Changing frameworks in the middle of the process is like changing keys in the middle of a classical song at a concert – don’t do it. That’s not to say that once communication and risk management gets better, that you can’t have some hybrid framework variation – like at a jazz concert. You can but you need proof of the basic items first.

Later, in the chapter Francen describes the communication issue of too many translations. That’s too many people passing the communication onto other people and giving it their spin. Thus, what was merely a minor IT problem ticket turns into a full-blown data breach? Or people get tied up arguing over NIST, ISSA, ISACA, and OWASP jargon – all the while nothing gets fixed and people just get mad at each other yet fail to understand one another. Knowing one or two buzz words from an ISACA conference or paper yet failing to understand how they apply to NIST or the like does not help. You should be having a framework mapping sheet for this.

The bigger solution is more training and vetting who is authorized to communicate on key projects. The issue of good communication and project management is separate from cybersecurity though it’s a critical dependency. Organizations should pre-draft communication plans with roles and scope listed out, and then they should do tabletops to solidify them. Having an on-site Toastmasters group is also a good idea. I don’t care if you’re a cyber or IT genius; if you can’t communicate well that’s a problem that needs to be fixed. I will take the person with much better communication skills because likely they can learn what they don’t know better than the other. 

2)    Overengineered Foundations:

In chapter two, Francen addresses “Bad Foundations”. He gives many analogies including building a house without a blueprint. However, I’m most interested in what he says on page 76:

  • “Problem #4 Overengineered Foundation – too much control is as bad as too little control, and in some cases, it’s even worse than no control at all.”

What he is saying here is that an organization can get so busy in non-real world spreadsheet assessments and redundant evidence gathering that their heads are in the sand for so long that they don’t see to connect the dots that other things are going array and thus they get compromised. Keep in mind IT and security staff are already overworked, they already have many conflicting dials and charts to read – amid false alarms. To bog them down in needless busywork must be weighed against other real-world security tasks, like patch management, change management, and updating IAM protocols to two-factor.

If you or your organization have an issue figuring this out, as Francen outlines, you need to simplify your risk management to a real-world foundational goal that even the company secretary can understand. It may be as simple as requiring long complex (multicharacter) passwords, badge entry time logs for everyone, encrypting data that is not public, or other basics. You must do these things and document that they have been done one at a time, engraining a culture of preventative security vs. reactive security.

3)    Cultivate Transparency and Incentives:

In chapter five, “The Blame Game” Francen describes how IT and business stakeholders often fail to take responsibility for security failings. This is heavily influenced by undue bias, lack of diversity, and lack of fact-based intellectualism within the IT and business silos at many mid-sized and large organizations. I know this is a hard pill to swallow but its so true. The IT and business leaders approving the bills for the vendors doing the security assessments, tool implementations, and consulting should not be under pressure to give a favorable finding in an unrealistic timeframe. They should only be obligated to give timely truthful risk prudent advice. Yet that same advice if not couched with kid gloves can get a vendor booted from the client – fabricating a negative vendor event. Kinda reminds me of accounting fraud pre-Sarbanes Oxley.

The reason why is because risk assessors are creating evidence of security violations that the client does not agree with or like, and thus you are creating legal risk for them – albeit well justified and by their own doing. From Francen’s viewpoint, this comprehensive honest assessment also gives the client a way to defend and limit liability by disclosing and remediating the vulnerabilities in a timely manner and under the advisement of a neutral third party. Moreover, you’re going to have instructions on how to avoid them in the future thus saving you money and brand reputation.

Overall, transparency can save you. Customers, regulators, and risk assessors view you more positively because of it. That’s not to say there are not things that will remain private because there are many, trade secrets, confidential data, and the like. My take on Francen’s mention of the trade off’s between transparency and incentives in a chapter called “The Blame Game” is that it’s no longer acceptable to delay or cover up a real security event – not that it ever was. Even weak arguments deliberately miscategorizing security events as smaller than they are will catch up with you and kick your butt or get you sued. Now is the time to be proactive. Build your incident response team ahead of time. It should include competent risk business consultants, cyber consultants, IT consultants, a communication lead, and a privacy attorney.

Lastly, if we as an industry are going to get better we’re going to have to pick up books, computers, pens, and megaphones. And this book is a must-read! You can’t be passive and maintain your expert status – it expires the second you do nothing and get poisoned by your own bias and ego. Keep learning and sharing!

Previous Post
The Six Most Impactful Cyber and Business Tech Trends of 2019 and What it Means for 2020.
Next Post
Charles Schwab, Chase, Wells Fargo, and others Use New Voice IAM Biometrics Technology

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

The reCAPTCHA verification period has expired. Please reload the page.

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.
X
LinkedIn

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.

Recent Comments

  • Abstract Forward Partners with Ignyte on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Abstract Forward Partners with Ignyte | Ignyte Assurance Platform on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Social Tech CEO Jimmy Chamberlin Rejoins Smashing Pumpkins
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Prince and Purple Rain 30 years later: Business and Music Innovation
  • brianfpennington on Demystifying 9 Common Types of Cyber Risk

Archives

  • November 2023
  • January 2023
  • June 2022
  • April 2022
  • January 2022
  • June 2021
  • December 2020
  • August 2020
  • March 2020
  • January 2020
  • August 2019
  • March 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • December 2017
  • November 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • July 2016
  • May 2016
  • March 2016
  • February 2016
  • August 2015
  • June 2015
  • February 2015
  • January 2015
  • December 2014
  • August 2014
  • May 2014
  • April 2014

Categories

  • 2016 election hack
  • 2016 tech review
  • 360 net lab
  • 80s music
  • Alternative music
  • Amazon
  • Android
  • apple
  • arlines hack
  • artificial intelligence
  • Billy Corgan
  • Bitcoin security
  • british airways breach
  • Business
  • business analysis
  • business continuity
  • Chinese hackers
  • cloud computing
  • CoinHive
  • Coronavirus malware
  • COVID-19 scams
  • crypto mixing
  • Crypto Money Laundering
  • crypto-jacking
  • currency
  • cyber insurance
  • Cyber Security
  • cyber security framework
  • Cyber-Espionage
  • Cybersecuity summit
  • data back up
  • data breach
  • Data Exfiltration Detection
  • data security
  • Denial of Service (DoS) Attacks
  • Direct x12
  • disinformation
  • drones
  • election security
  • equifax breach
  • esports security
  • EU Privacy
  • FDIC
  • federal reserve
  • GDPR
  • gdpr test british airways breach
  • google glass
  • Google Mandiant
  • grc
  • GroupOn
  • iam
  • Ignyte Assurance Platform
  • iphone
  • Jimmy Chamberlin
  • leadership vs. management
  • LinkedIn
  • Live Streaming
  • LiveOne
  • Lumia Phone
  • management consulting
  • Microsoft
  • microsoft azure
  • Microsoft Continuum
  • MikroTik Routers
  • MN Start-Up
  • mobile os
  • mobile web
  • NASA
  • navy cyber hack
  • net neutrality
  • network intrusion
  • OpenStack
  • PBS Frontline
  • personal aircraft
  • phone market share
  • Prince: R U Listening
  • project management
  • Project Sparta
  • Purple Rain
  • Rackspace
  • ransomware
  • ransomware removal
  • retail
  • risk management
  • Salesforce
  • self driving cars
  • small business
  • small business cyber security
  • Smashing Pumpkins
  • SME Infosec
  • Social Media
  • socrates
  • sony pictures
  • stalkerware
  • Stuxnet
  • target
  • Tech Year In Review
  • third party risk management
  • Unit 61398
  • vendor risk mgmt
  • video surveillance
  • Web App Attack
  • WEP vs WPA2
  • Windows 10

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

All rights reserved © 2018 to present. Abstract Forward Consulting, LLC. Privacy Policy | Terms of Service | Web Accessibility | Sitemap.