Company
Title
Fortune 500 Rank
Biographical Info
City
State
CISO Forum Summary: The Viability of Passwordless Authentication
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed the viability of passwordless authentication.
The desire is high to achieve Passwordless Authentication, but there appear to be very few Passwordless solutions that achieve the level of security required for the broad needs of a large enterprise.
Our discussion revolved around password best practices and what technologies are available to reduce the burden of managing and securing passwords.
Initial Questions to Consider:
What is Password Integrity:
Biometrics:
Multi-Factor Authentication (MFA):
Challenges to Implementing MFA
Zero-Trust
Could a Personal Mobile Device be used for Passwordless Authentication?
Unhappy Path:
Security on OT Systems:
YubiKey Authentication:
Challenges of YubiKey’s:
Other Emerging Technologies:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your password authentication activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Establishing a Baseline in your Security Program
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to create a baseline to move your program forward.
Frameworks for establishing a baseline in your program:
Challenges with Establishing a Baseline
Assessing a Baseline on Employees:
“Security is everyone’s responsibility, but not everyone knows their responsibility.”
Assessing a Baseline for Vendors:
Tools & Technology that Help:
Other Best Practices:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Establishing Meaningful Metrics in your Security Program
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to create better metrics to move your program forward.
Below are perspectives from 18 Security Leaders who provided input on the following questions:
What metric has helped drive your program forward the most?
What technologies are used to help drive better metrics?
What are the most useless metrics to track?
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Executive Forum Summary – Best Practices for Managing a Hybrid Security Team
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to better manage a hybrid/remote team.
Challenges with Hybrid/Remote Teams:
WFH and/or BYOD Policies:
Suggestions:
Connectivity and Bandwidth Challenges:
Hiring Hybrid & Remote Talent
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Best Practices for Red Teaming
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to improve their security programs through the use of red teams. Here is a summary of their top tips or suggestions on how to select and create better red teaming engagements.
Selecting a Red Team:
Here are some perspectives on how to select a red team.
Scoping/Contracting a Red Team:
Here are some perspectives on how to scope out and contract a red team engagement.
Why you SHOULD NOT do Red Teaming:
Why you SHOULD use Red Teaming:
Simulation instead of Red Teaming?
Different Approaches:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO EXECUTIVE FORUM SUMMARY: IAM BEST PRACTICES
Every month, Fortify Experts holds CISO Executive Forums discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on establishing best practices around Identity Access Management (IAM).
HERE ARE THE BIGGEST IAM CHALLENGES FACING LEADERS:
WHERE CAN WE MAKE THE BIGGEST IAM IMPACT THE FASTEST?
EXPERIENCE WITH ONBOARDING/OFFBOARDING PROCESS:
IS THE GOAL OF IAM TO GET TO ZERO-TRUST AND IS THAT A COMMON GOAL?
Tools and how they how helped but has also exposed lack of skill in other areas:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to better prepare against the threat of ransomware.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Measuring Success Through Metrics
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to measure the success of your security program?
As a CISO, “You want to be able to tell a story, so what story are you telling.” The key question is, “How are you using those metrics?”
You should be asking, “What is my priority here?” every time you develop a metric. This is the question that every business person and every executive is always asking as they are allocating resources.
Metrics:
KEY POINT: Metrics can change based on the behavior that needs to change. Larger vs. Smaller companies, regulated vs. non-regulated, immature vs. mature, technology vs non-tech dependent, all play into which metrics boil up to be critical to measure. There is no one size or one set of metrics that fits all.
CIA TRIAD:
The CIA Triad can be used as a foundation for Metrics: https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA#:
KEY POINT: In the CIA Triad, availability is probably the highest most scrutinized piece to keep data flowing, followed by integrity of data from an operational standpoint. There’s an assumption that privacy that’s probably going to help drive confidentiality.
Most Useless Metrics:
A lot of Metrics create a “So What?” Here are some of metrics that leaders have been asked to provide but can have little actionable value:
KEY POINT: Instead just posting up metrics when asked, focus on high value metrics. Those are the ones that lead to a decision point and drive change.
Operational metrics are useless without the business context behind them.
Phishing Training (often provided by the Phishing tool):
Cloud:
Track Ugly Metrics:
KEY POINT: Measuring the Ugly Metrics in DevOps helps teams focus on the stuff that really matters and less on the stuff that doesn’t and moves a really unstable state towards a stable state.
Other Operational Metrics:
KEY POINT: Push to hire a cyber expert on the Board to help sell the importance.
KEY POINT: Only track 3 to 4 things that are the most important to the business. More than 5 is too much.
Mike Davis shared his detailed report on NIST based Cybersecurity Metrics. You can download, use and modify this document: (Scanned Safe) – NIST Scorecard https://fortifyexperts.com/wp-content/uploads/2021/04/CISO-Scorecard-_-Security-Metrics-Approach-Mke-Davis.docx
KEY POINT: Aligning your operational metrics to NIST categories can be valuable because it allows the operational metrics to translate easier to your risk metrics.
KEY POINT: Move towards a risk-based vulnerability model from a “critical” model.
Other Benchmarking Tools:
KEY POINT: SecurityStudio – Combines CMMC, NIST CSF, PCI into one simple assessment, plus has automated 3rd Party Assessment Tool and a free Employee Assessment and training tool – Request Demo via Fortify Experts
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to improve your security program.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Implementing Zero Trust
Since the SolarWinds breach was discovered in December 2020, the security industry has been hyper-focused on how much exposure an organization may have – even when there is perceived to have a trusted and secure relationship.
“Are we trusting our vendors too much?”
The question being asked is, “Are we trusting our vendors too much?” One CISO said, “Vendors want us to accept them as blind trust.“ If SolarWinds was using a Zero Trust model with Multi-Factor Authentication (MFA) or another authentication method, they would not have likely been breached.
In our CISO Forum, we discussed how security programs need to thoroughly evaluate their 3rd party vendors through better assessments and more robust contracts. One recommendation was to ensure the vendor agreements have policies that bind them with indemnification clauses and hold them accountable to protect your data. If there are financial consequences, they will be more motivated to provide you with a secure environment.
So who can you trust? The answer is quickly moving toward – No one. No 3rd party, no person, no machine, no connection, and no application. Hence, the reason Zero Trust is now the newest security buzzword.
In February 2021, the NSA published a succinct paper called Embracing A Zero Trust Model which defines Zero Trust as:
Zero Trust is a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy based on an acknowledgment that threats exist both inside and outside traditional network boundaries.
It is a data-centric security model that allows the concept of least privileged access to be applied for every access decision, where the answers to the questions of who, what, when, where, and how are critical for appropriately allowing or denying access to resources.
“Zero trust is a state of mind.”
Traditionally, data centers were protected, walled off mainframes, and those accessing the data were within the walls of the same building or at least on a dedicated secure connection to the mainframe.
Now, we are moving critical and confidential data out of those buildings as fast as we can to the cloud which is owned by someone else. However, many businesses still have the old mindset that their traditional identity and role-based access management should still be adequate.
“We have always done it that way” is no longer a valid argument when you move to the cloud and now you are exposing your source code, build pipeline, critical customer data, and much more. Development teams who have worked behind the firewall and have always assumed they were protected will now have their code exposed to the best hackers in the world.
Zero Trust must be designed into everything …
Zero Trust must be designed into everything and may not even be achievable for many firms. It really needs to be designed holistically to evaluate the entire enterprise application architecture, the identity access systems, and all the assets.
A risk framework should be used to understand where the highest risks are and where the initial focus and investment should take place. For most organizations, this is a true paradigm shift that impacts their entire approach if it is done correctly.
In planning for Zero Trust, leaders need to project three years out to predict where Zero Trust needs to be then. It is a long initiative, that frankly, many CISOs won’t be around to see the full lifecycle of the implementation.
The NSA recommends a Zero Trust Mindset should take into consideration:
Several leaders described executive resistance to supporting another large security initiative. However, leaders said developing organizational awareness and educating executives was critical to gaining support. The NSA Zero Trust Model may help evangelize this as they strongly recommend Zero Trust be considered for all critical networks.
5 Step Model for how to get to Zero Trust:
In the design phase, it was recommended to use a tool like Ardoq (a Visio alternative) for Enterprise Architecture (EA) to map all asset inventory, communication ports, and access points to thoroughly understand those interrelationships.
With an EA map, the security team can begin working with the business teams to understand and define:
Design Advice from leaders:
Advice on Vendor Selection:
Achieving a robust Zero Trust program will require the use of multiple technologies. Here are some words of advice from leaders when evaluating and selecting Zero Trust vendors.
What tools are advancing Zero Trust?
Here are solutions that were mentioned in our CISO Forum as ones to consider when planning and evaluating Zero Trust technologies.
Conclusion:
Deploying a Zero Trust framework is not easy. While it may not seem as difficult to achieve with new cloud-based applications, it can be a huge challenge when you consider the entire enterprise including all data, legacy applications, vendors, users, and devices.
Focusing on education, using a risk-based methodical approach, and showing wins along the way will increase the level of support and success for achieving Zero-Trust within your organization.
One leader proclaimed, “This just shows we will never be done with security.”
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to improve your security program.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO FORUM SUMMARY: Is there a Silver Bullet to Thwart Ransomware?
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security programs. Here is a summary of their top tips or suggestions on how to thwart ransomware.
15 years ago ransomware was not on at the organizational level that it is today, but now ransomware is more than just advanced malware, it is now threat actors going in and gaining command and control inside networks for the sake of a big payday.
One CISO recently had 22 of its partners hit by ransomware in a single year.
That raised these questions:
Their focus is now to bring consistency to their visibility, tooling, and entering the response process. His concern is that outside entities will be targeted to specifically reach into other targets like us.
Being a large company leaves them vulnerable to attacks. He said, “You may have intelligence analysts who track and keep a record of internal events, but outside of the corporate infrastructure, the gates are not being watched as closely. Relying on subsidiaries to do that may need to be addressed.”
Lessons Learned:
One CISO was hired after a ransomware attack. The company that hired him had the tools for ransomware, but no strategy for dealing with the problem. The effects of the attacks were a lot of downtime and production slowed down, but there was not any data extortion for either one of the attacks he experienced. However, he gained a lot of knowledge through the process:
Lessons Learned:
What is the legality of paying the ransomware?
One CISO said they struggled to decide on whether they should pay off ransomware and possibly go into the territory of money laundering. One consulting firm CISO said they have tried tackling this fear with their customers, plus, have had to coach them after they paid it.
To pay or not to pay…
What has been the most effective thing you have done to reduce ransomware exposure?
All agreed that email phishing is the biggest vector by far.
What about Cyber Insurance?
What are ways technology has helped recover from ransomware attacks?
It’s less about technology and more about your process in the visibility of your security operations. Technology only supports the process. The important thing is comprehensiveness in management. This CISO was very big on optimizing the technical controls. His suggestions include:
CAUTION: New Threat Vector:
Other Resources:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to better prepare against the threat of ransomware.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
“Part of the CISO role is to be looking toward the future and seeing past the current hot news or operational health dashboard. Solving today’s issues will not help you a year from now. You must be very good at solving today’s reactive challenges along with taking the time to prepare and predict for what is coming in the future.” Walt Czerminski – CISO
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to Create a Higher Performing Security Teams.
Chief Information Security Officers (CISO) are often technical experts and can be easily enamored by technology. The allure of the latest sexy visual dashboard or newest analytics can be a draw for the sake of being cool technology. However, it may not solve relevant business issues facing the unique business challenges that the security team is there to serve.
Therefore, the security leaders we interviewed recommended starting by understanding the business strategy. By partnering with each Business Unit (BU), leaders can begin to develop how their security program can enable the BU not disable them. Several leaders suggested that a robust security program could even become a competitive advantage for each BU. The program might be able to win the trust with new customers or offer enhanced security solutions to existing customers.
Several security leaders discussed how implementing the NIST cybersecurity framework allowed their BUs to promote this additional level of data security as a competitive advantage. With all the news about 3rd party data breaches, applying additional levels of security and controls could attract more business.
Although proven and thoroughly tested, NIST is not the only framework to leverage. Depending on the industry, other security frameworks have specific expanded controls such as CIAQ cloud security assessment, S2-Scored Risk Assessment, Cybersecurity Maturity Model, or a whole host of other financial industry standards. Some of these may be required within that industry or they could provide a competitive advantage even if they are not required.
Synergize the security program’s mission with the broader vision and mission of the business.
Different BU may place a higher level of importance on remote access, systems sustainability, elevating technical competency, data privacy, cloud technologies, product security, compliance, or even insider threats. Therefore, understanding their independent risk profile is essential to begin defining specific goals and baseline security controls for each BU.
While many of these attributes will be common across BUs, the attention to specific BU goals can be leveraged to provide the financial support and resources to ensure those goals and metrics are achieved.
Then develop appropriate metrics in concert with the BUs to measure progress against those goals. “How to Measure Anything,” by Doug Hubbert, is a suggested read to help quantify risks and turn business goals into quantifiable metrics.
To hold all parties accountable, those metrics should be available to everyone – the security team, the business units, and the executive board.
With a clear data-driven vision, the security team and business can get behind a unified mission and purpose to help improve the security posture across the organization. Managing through metrics provides clarity on what is currently being accomplished and how much progress has been accomplished over time.
With over 90% of cyber attacks still coming in through employees’ devices, successful security leaders often discuss how creating a security-focused corporate culture can be more impactful than developing the most complete strategy, deploying the latest sophisticated AI technology, or even having the highest performing security team.
Security strategies often fail when the business culture does not support them or see the intrinsic value of the strategy. However, by creating an army of cyber-vigilant employees who are deputized to help the security team perform, the program as a whole will be more effective.
Culture Trumps Strategy Every Time.
Start at home. One method of creating an effective business-focused security culture is to make it personal. First, raise personal awareness of the dangers and risks of not being digitally safe at home. Then, teach the employees how to protect themselves and their families at home. Since, work is now at home for many people, raising personal safety awareness at home will more naturally raise employees’ safety awareness at work.
Personal Security Assessments. More firms are now requiring employees to complete safety awareness training before they are allowed to work from home. One such free tool is the www.s2me.com security assessment which walks individuals through the risks associated with connected devices such as routers, mobile devices, connected TVs and appliances, etc. It also gauges employees’ current security practices such as password use and storage, backups, and data recovery capabilities.
This assessment helps them evaluate how secure their personal practices are, how secure their network is, how it could be compromised, and where vulnerabilities may be introduced into their systems. The assessment provides an objective score and recommendations on how to improve their security score. In addition, the S2 tool monitors the user’s email for them and will notify them when it shows up in possible breach reports.
S2 also has a corporate version called S2Teams which allows companies to send out these assessments to employees and then anonymously aggregate results back to the security team to help them understand where security training is needed the most.
Some employers are also providing employees with tools such as password managers like LastPass so they can more securely manage their personal and business passwords.
Take it to the Office. ExxonMobil went as far as creating internal infomercials showing a character called, “One Click” which took a humorous approach to show how one wrong click could take down the whole company and bring the wrath of his co-workers down upon him.
Provide a carrot and a stick. Many firms have deployed email phishing training tools such as PhishMe (Confense.com) or KnowBe4.com which is more of an entire security training platform. Companies can provide a carrot to employees by rewarding them for reporting phishing attacks, or by not being fooled by them. Conversely, for employees who are not diligent and careful, the company can provide additional training or even disciplinary actions including termination if the employees continue to be digitally careless.
Create Security Evangelists. Some security leaders engaged business users and taught them how to test for vulnerabilities within their own systems. This raised their security awareness level and helped them become security evangelists within their business units.
By engaging all employees to protect their own personal digital assets, it will translate to protecting the company’s digital assets. Building a security culture mindset of “See something, say something” helps the business users become part of the solution and not part of the problem.
Make it Ok to fail. Face it, we will fail at protecting all of our data.
Bad guys are better resourced than we are, so we will always be playing catch up.
At some point, no matter how good we are, someone will click on the wrong link, data will get shared without our permission, and most likely our passwords will get exposed by one of the hundreds or thousands of technology firms we use every day to conduct our digital lives.
Security leaders need to communicate to the team, to the business, and to the board that failure is part of the process. Success will follow failures. Great leaders don’t focus on those failures. They learn from them. Leaders tell us, it is more important to be consistent in your approach and doing the next right thing to drive long-term results.
An example of how to turn failures into success is how one becomes good at a video game. There are no user instructions on how to play a new game such as Mario Bros, Fortnite, Call of Duty, Overwatch or most other video games. So how do you become good at these games? You die a lot! You learn from each failure and you keep trying new things until you make it further in the game.
Since things do not always go right on a security team, leaders need to create an environment where employees know that they will be protected if the team experiences a failure or breach.
Communicate that “We all make mistakes” and admit when you mess up as well. When a leader shows a high degree of vulnerability, it sets the example of how the team needs to respond when they mess up. Being authentic creates the space for people to approach you when they recognize their own failures instead of hiding them.
Due to the sting of a failure, we often learn more from our failures more than we do from our successes.
As hard as it may be, displaying a normalized reaction, even during failures or stressful times, can reassure employees. Great security leaders encourage their employees to keep trying new things. If they are not occasionally failing, then they are likely not pushing themselves enough.
Highly effective security leaders create a culture that encourages employees to think for themselves. Much like creating a safe place to fail, creating a psychologically safe work culture helps empower employees so they can accomplish what is needed to be done without constant oversight.
Employees need to be empowered in their own area of responsibility so they can take ownership of that specialty. We don’t want robotic employees. The goal is to build employee’s confidence so they make better decisions on their own.
One leader suggested that if an employee asks, “What should I do in this situation?” Put it back on them, “What would you do if you were in my shoes?” Even if the answer is not exactly what you would do, if it is acceptable enough, then let them do it. This will help build an employee’s confidence, trust, and better decision-making.
In a culture where there are public criticisms, employees will avoid stepping out of their comfort zone and only do what they are told. They will be less willing to offer up creative solutions which could lead to better ways to evaluate data or streamline processes for fear of criticism.
When giving feedback, criticize in private, praise in public.
By sharing what you can with the team on the challenges you face as a leader, it can help them buy into more ownership in the solution. While it is not a democracy, often encouraging collaboration will provide fresh ideas and let the team feel more empowered.
One leader encouraged his security team time to take several hours a month to work on creative pet projects which could be useful to the firm. More often than not, those projects would be implemented. Whether it is 2 hours per week or 2 hours per month, it could pay off in dividends.
By creating a psychologically safe culture that encourages employees to exercise their creative side, they get the opportunity to feel important by becoming part of the solution. This encourages them to continue to become more independent and think more creatively.
To keep up with the constantly changing threat landscape, every security team needs to be constantly learning and adapting. Leaders need to be able to evaluate a team’s current strengths and weaknesses both individually and holistically.
Several security leaders suggested creating fundamental blocks of training, where everybody takes the same baseline training when they join the team to provide some level setting. Then build role-based tracks with more specialized training for specific roles.
In addition, understanding an individual’s career interests and goals will help you map additional training to foster their growth and long-term job satisfaction.
Here are several good tools for skills assessment, training, and suggested career path options:
One of the best-known security training organizations is SANS (www.sans.org), but it is expensive and can be like drinking from a fire hose.
Here are some other examples of inexpensive or even free training:
One leader requires his employees to block out time on their calendars every week so they can dedicate it to reading and continued education. Especially in cybersecurity, training increases job performance and satisfaction, plus reduces attrition because employees are stimulated intellectually and feel valued.
One highly-effective technique to accelerate competency is to create formal mentorships between junior resources and more senior resources within the security team. Training fades within a few weeks so it is better to pair someone up with a mentor to help apply the training in real-world scenarios. The senior resource is held accountable to answer any and all questions, and to raise the level of competency of the junior resource.
Mentoring provides a growth opportunity for both parties.
As cybersecurity becomes more of a business-focused problem instead of a technical problem, improving soft skills is essential to the success of the team. Soft skills will also drive more employee advancement up through the ranks.
Mentoring helps senior resources develop communication, teaching, and leadership skills. It also helps reduce the egos of these more knowledgeable employees which leads to a more inclusive work environment.
Another effective technique used by successful security leaders is to partner up team members with mentors from other departments. This accomplishes multiple goals.
Mentorships both inside and outside of the security team can accelerate employee growth and job satisfaction for both the mentor and the mentee.
Security teams always experienced stress. After Covid hit, the stress level on most teams exploded. People, devices, and data went remote which had not been remote before. Most security teams had to put in overtime to catch up with securing, people, assets, and data.
Even though environments may have settled some, focusing on the mental health of employees is still critical. Being aware of an employees’ personal situation and tuning in to their level of stress will help you identify those who need additional emotional support or maybe even need time off to recharge. Engaging employees at the personal level can have long-term benefits by creating more loyal employees.
Some leaders schedule a weekly coffee check-ins or virtual happy hours to provide the opportunity to have informal conversations. This can give them the outlet they need to fulfill the absence of interpersonal relationships they miss by not being in the office.
Creating real relationships with employees drives loyalty, performance and tenure.
One leader takes remote walks with employees. She schedules a Facetime call with an employee and then they both go for a walk in their separate neighborhoods all while carrying on their check-in conversation.
Since employees were working overtime, one leader suggested employees take off 90 minutes per week during work hours to do something for themselves. Then on Friday they shared what they did. Another leader forbade meetings on Friday so everyone could focus on their own work.
A leader also described how he brought in various self-improvement coaches via Zoom to stimulate thoughts and mental improvements.
Creating space for employees to know they are valued and individually important to the team, allows them to recover faster when they are down, and thrive more when things are good.
Security leaders are always studying and trying to anticipate the behaviors of threat actors.
Effective security leaders use that same skill to anticipate an employees’ needs, their unique motivators, what situations create stress for them, and how to optimize their work environment and assignments to maximize their performance.
There are several tools that can help reveal these nuances to accelerate a leaders’ understanding of how best to motivate his or her team.
One of the easiest ways to gain this insight is to conduct employee behavior assessments such as a Birkman Behavior and Occupational Assessment. A behavior assessment is much more in-depth than a standard personality test such as a Briggs-Myers, DISC, Predictive Index, etc. Those generally focus only on the outward personality people want you to see. The Birkman looks deeper into what motivates someone at their core, how they stress, why they have communication challenges with certain people, and what their occupational passions are.
Leaders can leverage this behavioral training by also using it to elevating the teams’ emotional IQ. Creating self-awareness often is the first step to self-improvement.
It also allows you to train employees to become more aware of the differences in how others approach situations creating a more inclusive and creative culture. Creating co-worker awareness helps the team appreciate these differences and even value them. The more in tune the team is with each other, the better they will communicate and work together.
Teams with higher emotional IQ seek out more diversity of thought because it makes the whole team stronger. This creates teams that are more diverse, inclusionary, creative, and productive.
Teams that understand that “diversity of thought” is a strength, thrive and produce more.
Fortify Experts has developed a shortcut to quickly accelerate the team’s emotional IQ by creating an Employee Operating Manual for each team member. This one page summary helps accelerate on-boarding, communication, productivity, and job satisfaction. It immediately allows managers and teammates to know them as if they have been working together for years and helps the team understand how to best work with the individual to create less conflicts and more productivity.
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to create a higher performing security team.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IronMan Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward