<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Random thoughts: security controls and the effectiveness in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Random-thoughts-security-controls-and-the-effectiveness/m-p/28038#M3458</link>
    <description>&lt;P&gt;Recently I have been traveling in parts of Europe, both in EU and non-EU countries, and certainly noticed the different security controls and variations at airports and entries.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This makes me wonder, in the practices of information security, do we really know the actual effectiveness of various types of controls, be it access, physical, logical, layered, etc., etc.? Are some of the security controls deployed just to meet the regulatory requirements, to make us feel secure, or to have a job security / CYA, or what?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just curious ...&lt;/P&gt;</description>
    <pubDate>Fri, 13 Sep 2019 16:06:47 GMT</pubDate>
    <dc:creator>Chuxing</dc:creator>
    <dc:date>2019-09-13T16:06:47Z</dc:date>
    <item>
      <title>Random thoughts: security controls and the effectiveness</title>
      <link>https://community.isc2.org/t5/Industry-News/Random-thoughts-security-controls-and-the-effectiveness/m-p/28038#M3458</link>
      <description>&lt;P&gt;Recently I have been traveling in parts of Europe, both in EU and non-EU countries, and certainly noticed the different security controls and variations at airports and entries.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This makes me wonder, in the practices of information security, do we really know the actual effectiveness of various types of controls, be it access, physical, logical, layered, etc., etc.? Are some of the security controls deployed just to meet the regulatory requirements, to make us feel secure, or to have a job security / CYA, or what?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just curious ...&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2019 16:06:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Random-thoughts-security-controls-and-the-effectiveness/m-p/28038#M3458</guid>
      <dc:creator>Chuxing</dc:creator>
      <dc:date>2019-09-13T16:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: Random thoughts: security controls and the effectiveness</title>
      <link>https://community.isc2.org/t5/Industry-News/Random-thoughts-security-controls-and-the-effectiveness/m-p/28043#M3459</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;I presently work at a University, and I've noticed that physical security is treated lightly at most levels --- from entering the campus main gates, where the security guards won't bother to check if you're an employee / student, to entering the IT office, which doesn't even have a physical Access Control system! (I've conveyed the risk of this to management multiple times.)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;On the other hand, the regulatory authority is more concerned about the cyber-security&amp;nbsp;threats, and provides us with the controls to apply for this. The last time they did this was in May, and just last week they asked us to update them on our compliance&amp;nbsp;status. (I provided the requirements to our team)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;In this situation, management asked me about the Cyber-security&amp;nbsp;controls --- rather than the physical controls.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this scenario, we see CYA followed at multiple levels: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;I respond to ALL the risks I perceive, providing management with an analysis, recommendations &amp;amp; treatment options.&lt;/LI&gt;&lt;LI&gt;Management treats SOME of the risks, prioritizing controls required for regulatory compliance.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(This is a government-funded educational institution; of course, things may differ at private organizations)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2019 20:19:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Random-thoughts-security-controls-and-the-effectiveness/m-p/28043#M3459</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2019-09-13T20:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: Random thoughts: security controls and the effectiveness</title>
      <link>https://community.isc2.org/t5/Industry-News/Random-thoughts-security-controls-and-the-effectiveness/m-p/28058#M3461</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/323397747"&gt;@Chuxing&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;... This makes me wonder, in the practices of information security, do we really know the actual effectiveness of various types of controls, be it access, physical, logical, layered, etc., etc.? ...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;For some controls, yes, for others, maybe not. The whole reason the &lt;STRONG&gt;&lt;A href="https://www.cisecurity.org/controls/cis-controls-list/" target="_blank" rel="noopener"&gt;CIS Top 20&lt;/A&gt;&lt;/STRONG&gt; exists to to advise folks on prioritizing their security controls implementation (translation: budgeting for) based on getting the highest level of effectiveness for the investment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/323397747"&gt;@Chuxing&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN&gt;...Are some of the security controls deployed just to meet the regulatory requirements...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Yes, most definitely. See the entire range of efforts in the U.S. government to meet the requirements of &lt;EM&gt;&lt;A href="https://www.dhs.gov/cisa/federal-information-security-modernization-act" target="_blank" rel="noopener"&gt;FISMA&lt;/A&gt;&lt;/EM&gt; by implementing the NIST&amp;nbsp;&lt;EM&gt;&lt;A href="https://csrc.nist.gov/projects/risk-management/risk-management-framework-(RMF)-Overview" target="_blank" rel="noopener"&gt;Risk Management Framework&lt;/A&gt;&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/323397747"&gt;@Chuxing&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN&gt;... Are some of the security controls deployed just ... to make us feel secure, ...?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Absolutely! Bruce Schneier has for years been warning us about the dangers of relying on &lt;EM&gt;&lt;A href="https://www.schneier.com/essays/archives/2009/11/beyond_security_thea.html" target="_blank" rel="noopener"&gt;security theater&lt;/A&gt;&lt;/EM&gt;&amp;nbsp;to protect us..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/323397747"&gt;@Chuxing&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN&gt;... Are some of the security controls deployed just ... to have a job security / CYA, or what?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Without a doubt. Especially in large bureaucracies, being able to point to having done &lt;EM&gt;something&lt;/EM&gt;, even if not at all effective, may save the job of more than one employee.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;We had a huge data breach! Why shouldn't I fire you?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;I did everything I could. ! I hired three specialists with CEH and I contracted an outside penetration tester every year!&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Still curious?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Sep 2019 16:30:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Random-thoughts-security-controls-and-the-effectiveness/m-p/28058#M3461</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-09-14T16:30:33Z</dc:date>
    </item>
  </channel>
</rss>

