Penetration testing is an exam that cyber security experts tout for finding out the true strengths and weaknesses of an organizationโs personal and technology defences.
However, if your organization doesnโt have a mature security program pen testing is a waste of time and money, two veterans warned infosec pros Tuesday at the annual SecTor cyber security conference in Toronto.
It was one of dozens of pieces of advice presenters Tim West, chief risk officer of Saint Louis-based Atredis Partners, and Mark Baseggio, a Toronto-based security consultant gave that CIOs, CISOs and purchasing officers could find handy.

In an interview later West and Baseggio expanded on this and other points.
โIf you have a very immature security program and you know it โ which most clients do โ then thatโs a very clear indication you should probably put your money into the building blocks that make you secure rather than a shot in the dark,โ said Baseggio. โYou already know your network is insecure because you havenโt put any effort into it.โ
Hiring a consultant to do a pen test โbecause itโs a popular thing โฆ youโre just not going to get that much value,โ agreed West.
Also, they advise not investing in a pen test if the organization doesnโt have a threat model and understand the threats it regularly faces. That leads to disagreements on whether a particular test is relevant to the company. โIf you donโt know what matters to you from a security perspective how are you making decisions to invest in security?โ asks West.
โPeople jump to the gun on scoping the pen test based on โYou got Web apps? Do you want phishing? How many IPs do you have? What kind of apps were you testing?โ said West.โ But the questions should be what are the types of attacks that are relevant to your business. That will lead to which applications to test, which subnets, which users if social engineering is being used.
The biggest mistake organizations make when looking for a pen testing service is โbuying based on factors that arenโt necessarily related to value โ buying based on brand, size, or other things that in our industry donโt directly deal with buying from an expert,โ said West. Itโs easy to buy from a large IT or financial accounting firm, he said, but that comes at a cost. โWithout really scruitinizing and trying to understand the marketplace its easy to make bad decisions.โ
Similarly, they advise not hiring a pen testing firm if you donโt have a threat model.
Look for experts that will try to solve the particular problems the organization has. โUltimately when youโre buying security consultancies what matters is the people that are going to be on your project,โ West said, โwhich is as important if not more than the name on front of the page.โ
โRegardless of size (of the contracting firm), know who is going to do the project and vetting that individual is going to get you the biggest bang for the buck.โ
And donโt forget to check the consultantโs references, West and Baseggio add. โItโs bothersomeโ that few clients do,โ said West.
Ideally the consultant will offer three reference customers that are in a similar industry with a similar testing project. โWith the weeks and hours that you spend in the procurement process, the referral activity probably takes you two hours of your life at most and itโs the most valuable two hours you can spend.โ
And donโt worry about candor, says West. Most CIOs when talking one on one are โwildly open.โ
Ask what went well, what went poorly, did they stay on budget, manage expectations well, did they communicate well, did the deliverables meet expectations, how much value did you get, would you spend that amount again.
Most organizations wrongly believe a pen test is a pass/fail exercise, they said โ and worry that a โfailโ could damage a regulatory compliance audit. The problem is the organization doesnโt have a risk management program or an understanding of risk in general for security, West said, so any โfailโ in the report can lead to argument because the organization sees it as a sign of weakness. โIn reality everyone has information security risk today,โ says West, โit just depends on how youโre managing it.โ
The consultant has to make clear there will be vulnerabilities found, agreed Baseggio. โPen testers donโt always frame vulnerabilities properly,โ he admitted. โSometimes we put high on this and make it seem like itโs the end of the world, but in the context of their business itโs not really that important.โ
For more information see theย Penetration Testing Standard.