Hi All
According to a PWC report, the C-Suite Executives are the greatest risk? What do you think?
Do you concur or do you have another perspective?
Regards
Caute_Cautim
@ervinfrenzel Thank you for sharing that. I have not heard quite that perspective before and appreciate it. My degree is in computer technology. When I was in college, the only class available was data security. I have been working in the field most of my life and was when took that class; so I can't really evaluate what is happening in colleges now first hand but cringe at degrees in informatics (just the name not the curriculum have seen) although is a good concept as is maybe more STEAM than most. Then if memory serves me, they started calling it information security, then information assurance (my least favorite nondescript term), and then finally cybersecurity which I think is a much more fitting and accurate description. I was very hands on in the early years of my career but am probably better classified as theory now. As you kind of alluded to many skillsets are needed for effective defense in depth. We don't want the mechanics flying the planes. I respect others with different skillsets than my own; we all need to respect each other and work together for our efforts to be effective. I watch the shift left movement. I like the philosophy that security should be baked in, but agile processes do not seem to fit well with legacy systems in the attempts that I have seen at it. I do call it SecDevOps; I tell them that security is that important. Unfortunately security is not a profit center, and we know that and have to be a little noisy about it. I do like that ISACA aligns security under the CEO and not the CIO to get better visibility and maybe less IT bias. I think that is the only place that have seen that assertion made. As I remind our folks, even with everyone's efforts for secure systems and infrastructures, it is usually physical security that undoes that in major incidents. I definitely enjoyed the different take on this.
Unfortunately, I have worked in both industry and held post secondary roles for most of my adult post military life - so I have watched it from both inside and outside of the industry at all times. Most of us are used to the business perspective but fail to recognize that is what is said. For instance, when I speak to a CEO, COO, CFO etc., typically when I say security their first thought is compliance which has really nothing to do with what we do, but that is their go to. I wrote a paper not so long ago you might enjoy, sent it through the ISSA journal in October of last year. So technically SecDevOps is not actually the same as DevSecOps - it depends upon which has the most emphasis within the organization. We've been working on an entire series that describes the different roles of technical, technical security, and cybersecurity - it's really important within our professions and pretty important within the business realm. Just like we don't ask the average IT worker to build our web pages, or the average programmer to configure a Cisco ASA firewall - the rest of the world will eventually need to know we are not the same. Just as the HR "or" statement from the 1990's involving education and experience turned into an "and/or" statement because someone figured it was a better plan during the mid to last part of the 200X decade - this has now evolved into an "and" statement almost exclusively for HR job announcements.
I remember my first jobs post military were "or", certification, experience, or college degree for tech and security jobs. I had worked in the civilian sector over the weekends/evenings for about 10 years (while on active duty). I was a bit ahead of the power curve, by 2000, the announcements were certification, experience, and/or college degree. Now I see graduates faced with "certification, experience, and college degree".
In 2001 I was an information security manager, and remember having to discuss with HR why they needed to ensure they included the "or". They were busy attempting to removing back then. I had to explain that by removing "or" it excluded many qualified candidates - this continues til today.
The problem really is that many C-suiters do not understand the history of how we got here, so they cannot undo the changes that have sidetracked us. That is the importance of understanding the differences between the securities.
For your viewing pleasure:
@vishybear something to think about is that our "C" suiters are often allowed to run amuck. For instance in the EU, the Helse Sor-Ost breach, the CEO was the founder and was held responsible for the data breach. The organization was just about bankrupted and the CEO was charged and held personally responsible for it. During an interview, he asked why the IT staff were not held responsible, but the bottom line is that he was the one in charge. That was the final verdict of the court, although he repeatedly tried to blame staffers.
The CEO will never work in healthcare or as a leader of an org again - and he shouldn't. Do I believe the IT staff share some responsibility? YES. Should they have really pushed to enlighten the leadership? YES. Should leadership pushed to really find out their status? YES. Have leaders pretended for years that they were clueless? Again a resounding YES.
The CEO as the founder and medical practitioner made less than a 10% of what a hospital director makes here - yet he got time and fines, etc. This goes back to our leadership being allowed to run amuck. When you have someone who can exist without having a checks and balances, then expect them to run like they are unchecked.
@nkeaton Thank you ma'am. It's funny you say that as it seems we might be missing the boat (from our Veterans and new members perspective). I have a good many students who are modern vets, and while traditionally vets fell into security and teaching - many are opting not to go into our career pathways. I have several of the charts, one for each of the primary vendors (ISC2, EC Council, CompTIA, etc.), and they all work out the same way. Originally, each vendor "recommended" a learning period to master the required skills prior to sitting for the exam. HR folks just took the learning period as gospel, partially because they didn't understand the certification process, partially because they didn't take the time to ask for explanation, and part of it was because we didn't take the time to explain it to them.
My HCISPP expires roles to emeritus this month, I too wish we hadn't retired it. We finally looked at identifying healthcare as a key infrastructure, then we immediately retired the cert? I took (and passed) the CCSP but I did not appreciate it as much as the HCISPP, the CCSP was somewhat comparable with the old Cloud Essentials (although slightly updated).
You are extremely correct on we have to keep it in the spotlight and keep training replacements. That is part of the reason I go out of my way to identify the component technology securities. It is significantly harder if we try to recreate the ocean than if we identify how to recreate water. In keeping it simple, we can train many more than we can by trying to complicate the devil out of it.
@ervinfrenzel I really like that analogy and may find a place to use it. While I have never discussed this with anyone at ISC2, I am guessing that the numbers of people certified may make a difference on whether a certification is considered worth updating and retaining by an organization. They did rebranding and added frameworks to the CAP, now CGRC, which had low numbers. The former concentrations are now kind of rebranded as ISC2 no longer calls them concentrations and no longer have the requirement for a CISSP. My CCSP kind of started my last certification run. I rescued an exam voucher from one of our people that was going to just let it expire. I passed that and decided that maybe I would try the CISSP. I had been happy for years with my CAP and SSCP and a couple of CompTIA certifications. As far as the certification that I am the most proud of, I guess that would be my ISSEP since it is historically one that people have difficulty passing and not many have. I know that my experience has a huge factor. I am also very proud of my ISSMP, but it was sort of a natural extension of my CISSP and CISM. Now architecture seems to be a weaker discipline for me and not sure whether will pursue the ISSAP. I have zero left to prove to myself but always eager to learn. I have taught a few college classes, but I know that I do better one on one with people and am maybe a little too empathetic to consider that a good pathway for me. Thank you for sharing that. I like to be very aware of what is going on around us. I have zero problem reminding our folks of that. Like I tell them a lot If something is easier to use, then you are probably giving up some security.
@nkeaton If I remember correctly the CAP was an entry level for many of the govt roles in GRC, which did make sense as many govt folks did not have sufficient time to gain initial CISSP certification. Just prior to the CAP >> CGRC change the U.S. mandated was an entry level "Associate" which ISC2 quickly jumped on. Only recently has ISACA made a move to the "Associate CISM" and EC Council to the "Associate CCISO". Originally, EC Council offered the EISM (EC Council Certified Information Security Manager). After reading through the ISACA materials on the Cybersecurity Fundamentals, I will pass on the ISACA chain.
I do believe the ISSMP and ISSAP are pretty natural extensions for the CISSP, not so sure for the ISSEP though, it should be an extension for CSSLP but doesn't seem to naturally fit there. I'm actually surprised that ISC2 didn't seek CSA partnership on the CCSP to improve it's acceptance rate and overall relevance to the market. I know it is a bit of a small thing, but the more we can combine and bring together vendors for better overall acceptance, the stronger our career pathways. Universal acceptance is always a plus in our fields.