Jeff Bardin doesnโt sound like an angry man, perhaps because he has a cold.
But on the line three days ago from California the U.S. security consultant sounds terribly resigned at how chief information security officers are treated โ at least in his country.
What prompted my call was his column last month for an IT security Web site where he protested that CISOs are scapegoats for security problems that arenโt their fault. I wanted him to expand on that.
โItโs not a thankful environment,โ he tells me, which is why he isnโt a CISO any more. โItโs a constant battle against traditional culture, itโs a battle where they (other staff) see you as a person of โNoโ โ and thatโs not true, itโs โYes, but this way.’โ
Bardin has 27 years of experience in IT security, including a year as director of the office of risk management at EMC, vice-president and chief security strategist for consulting firm Xa Systems and an intelligence officer for an army battalion that served in Afghanistan. Heโs is now chief intelligence officer for Treadstone 71, a Washington, D.C.-area consultancy he formed with his wife that does risk analysis, benchmarks an organizationโs information security and network security and teaches customers how to comb social networks for signs of an attack.
Most CISOs, he complains to me, still reports to the CIO. โThat is a major issue and a problem, because the CIO is under all kinds of pressure to deliver new features and functionality, and that does not always include security. So security takes a back seat to the features and functionality thatโs coming down from the business, and the business doesnโt always get to see or hear the security issues because theyโre embedded within IT.
โIn addition they still see it as purely a technical issue, and itโs notย โ itโs an information issue. And information is all over the corporation.โ
So, he continued, many CISOs are cautions when talking to their CIOs, fearing they may be fired for trying to push an agenda counter to the CIOโs strategy, or that they may get shut out of certain conversations, โwhich Iโve seen over and over.โ
What will it take to elevate the role of the CISO?
โI would have thought that after all these years and all the different breaches things would change,โ he replied, โbut we still continue to double down on the technologies that are not protecting us, we double down on the same organizational structures.
โI think itโs going to take time to weed out the current batch of CIOs and change the model where any CIO must have three to five years as a CISO before they can actually become a CIO,โ and organizations understand information security is not just a technical issue.
โIโm just not sure how to get peopleโs attention on this to make them realize this cannot be embedded down into where it is today, itโs canโt be just a subset budget-wise, and that CIOs have to be measured on information security if theyโre breached theyโre fired. Iโve only seen a few CIOs fired.โ
As a consultant he has recommended customers change their structure. โMany times they say โOK, but we need to mature the program first.โ Thatโs fair, he said, but inevitably nothing happens.
Some of that he blames on CIOs who fear the CISO will say something to the C-suite that makes them look bad. ย Chief executives might not want another person in the C-suite, I suggest. There are other ways, Bardin replies โ having the CISO report to the chief operating officer, for example, or the audit. But his point is the CISO should have a separate budget based on assessing corporate risk, and not on technology.
With an outlook that, I tease, how does he get out of bed in the morning? Bardin laughs. โAs a consultant, I donโt own it,โ he says. โThey donโt have to take my advice.โ
On the other hand, he also faults some IT people for being ambitious enough to inflate their resumes or Linkedin accounts to become CISOs.
โThere are a few in very large Fortune 100 companies,โ he says, who have managed to get by HR background checks. Some say they drove a project, when they were only a team member, or have created โphony metricsโ on performance, or created a title like director of cybersecurity when they were only a IT director. โIt does a disservice to the CISO who has really worked to get there.โ
Bardin also believes that too many organizations rely on defensive strategies โ defence in depth, looking for evidence of penetration along the kill chain โ rather than go on offence.
Security pros should be involved in cyberintellignce to learn who the organizationโs adversaries are. By penetrating their online forums and gather information passively on their skills and tactics are organizations can build their defences.
And, he adds, if necessary, they can go on a pre-emptive strike if necessary.
โIโm advocating โ and this usually stirs up a lot of conversation โ that corporations do this. How they do it, and what their liability is and whether they ask a third party to do it for them, this is their business. Thereโs ways to make sure thereโs complete anonymity, itโs offย your corporate network, youโre using methods to hiding the IPs where itโs coming from. But if you donโt sling back at these folks theyโre going to continue to come back and hit you.โ
Related Download
Sponsor: Jolera
Under the hood
Download this paper to read how Jolera can solve your data protection challenges and find out what the right tools are to implement in your IT department.
Register Now