Company
Title
Fortune 500 Rank
Biographical Info
City
State
CISO Forum Summary: The Viability of Passwordless Authentication
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed the viability of passwordless authentication.
The desire is high to achieve Passwordless Authentication, but there appear to be very few Passwordless solutions that achieve the level of security required for the broad needs of a large enterprise.
Our discussion revolved around password best practices and what technologies are available to reduce the burden of managing and securing passwords.
Initial Questions to Consider:
What is Password Integrity:
Biometrics:
Multi-Factor Authentication (MFA):
Challenges to Implementing MFA
Zero-Trust
Could a Personal Mobile Device be used for Passwordless Authentication?
Unhappy Path:
Security on OT Systems:
YubiKey Authentication:
Challenges of YubiKey’s:
Other Emerging Technologies:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your password authentication activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Establishing a Baseline in your Security Program
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to create a baseline to move your program forward.
Frameworks for establishing a baseline in your program:
Challenges with Establishing a Baseline
Assessing a Baseline on Employees:
“Security is everyone’s responsibility, but not everyone knows their responsibility.”
Assessing a Baseline for Vendors:
Tools & Technology that Help:
Other Best Practices:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Establishing Meaningful Metrics in your Security Program
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to create better metrics to move your program forward.
Below are perspectives from 18 Security Leaders who provided input on the following questions:
What metric has helped drive your program forward the most?
What technologies are used to help drive better metrics?
What are the most useless metrics to track?
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Executive Forum Summary – Best Practices for Managing a Hybrid Security Team
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to better manage a hybrid/remote team.
Challenges with Hybrid/Remote Teams:
WFH and/or BYOD Policies:
Suggestions:
Connectivity and Bandwidth Challenges:
Hiring Hybrid & Remote Talent
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Best Practices for Red Teaming
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to improve their security programs through the use of red teams. Here is a summary of their top tips or suggestions on how to select and create better red teaming engagements.
Selecting a Red Team:
Here are some perspectives on how to select a red team.
Scoping/Contracting a Red Team:
Here are some perspectives on how to scope out and contract a red team engagement.
Why you SHOULD NOT do Red Teaming:
Why you SHOULD use Red Teaming:
Simulation instead of Red Teaming?
Different Approaches:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO EXECUTIVE FORUM SUMMARY: IAM BEST PRACTICES
Every month, Fortify Experts holds CISO Executive Forums discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on establishing best practices around Identity Access Management (IAM).
HERE ARE THE BIGGEST IAM CHALLENGES FACING LEADERS:
WHERE CAN WE MAKE THE BIGGEST IAM IMPACT THE FASTEST?
EXPERIENCE WITH ONBOARDING/OFFBOARDING PROCESS:
IS THE GOAL OF IAM TO GET TO ZERO-TRUST AND IS THAT A COMMON GOAL?
Tools and how they how helped but has also exposed lack of skill in other areas:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to better prepare against the threat of ransomware.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Measuring Success Through Metrics
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to measure the success of your security program?
As a CISO, “You want to be able to tell a story, so what story are you telling.” The key question is, “How are you using those metrics?”
You should be asking, “What is my priority here?” every time you develop a metric. This is the question that every business person and every executive is always asking as they are allocating resources.
Metrics:
KEY POINT: Metrics can change based on the behavior that needs to change. Larger vs. Smaller companies, regulated vs. non-regulated, immature vs. mature, technology vs non-tech dependent, all play into which metrics boil up to be critical to measure. There is no one size or one set of metrics that fits all.
CIA TRIAD:
The CIA Triad can be used as a foundation for Metrics: https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA#:
KEY POINT: In the CIA Triad, availability is probably the highest most scrutinized piece to keep data flowing, followed by integrity of data from an operational standpoint. There’s an assumption that privacy that’s probably going to help drive confidentiality.
Most Useless Metrics:
A lot of Metrics create a “So What?” Here are some of metrics that leaders have been asked to provide but can have little actionable value:
KEY POINT: Instead just posting up metrics when asked, focus on high value metrics. Those are the ones that lead to a decision point and drive change.
Operational metrics are useless without the business context behind them.
Phishing Training (often provided by the Phishing tool):
Cloud:
Track Ugly Metrics:
KEY POINT: Measuring the Ugly Metrics in DevOps helps teams focus on the stuff that really matters and less on the stuff that doesn’t and moves a really unstable state towards a stable state.
Other Operational Metrics:
KEY POINT: Push to hire a cyber expert on the Board to help sell the importance.
KEY POINT: Only track 3 to 4 things that are the most important to the business. More than 5 is too much.
Mike Davis shared his detailed report on NIST based Cybersecurity Metrics. You can download, use and modify this document: (Scanned Safe) – NIST Scorecard https://fortifyexperts.com/wp-content/uploads/2021/04/CISO-Scorecard-_-Security-Metrics-Approach-Mke-Davis.docx
KEY POINT: Aligning your operational metrics to NIST categories can be valuable because it allows the operational metrics to translate easier to your risk metrics.
KEY POINT: Move towards a risk-based vulnerability model from a “critical” model.
Other Benchmarking Tools:
KEY POINT: SecurityStudio – Combines CMMC, NIST CSF, PCI into one simple assessment, plus has automated 3rd Party Assessment Tool and a free Employee Assessment and training tool – Request Demo via Fortify Experts
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to improve your security program.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Implementing Zero Trust
Since the SolarWinds breach was discovered in December 2020, the security industry has been hyper-focused on how much exposure an organization may have – even when there is perceived to have a trusted and secure relationship.
“Are we trusting our vendors too much?”
The question being asked is, “Are we trusting our vendors too much?” One CISO said, “Vendors want us to accept them as blind trust.“ If SolarWinds was using a Zero Trust model with Multi-Factor Authentication (MFA) or another authentication method, they would not have likely been breached.
In our CISO Forum, we discussed how security programs need to thoroughly evaluate their 3rd party vendors through better assessments and more robust contracts. One recommendation was to ensure the vendor agreements have policies that bind them with indemnification clauses and hold them accountable to protect your data. If there are financial consequences, they will be more motivated to provide you with a secure environment.
So who can you trust? The answer is quickly moving toward – No one. No 3rd party, no person, no machine, no connection, and no application. Hence, the reason Zero Trust is now the newest security buzzword.
In February 2021, the NSA published a succinct paper called Embracing A Zero Trust Model which defines Zero Trust as:
Zero Trust is a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy based on an acknowledgment that threats exist both inside and outside traditional network boundaries.
It is a data-centric security model that allows the concept of least privileged access to be applied for every access decision, where the answers to the questions of who, what, when, where, and how are critical for appropriately allowing or denying access to resources.
“Zero trust is a state of mind.”
Traditionally, data centers were protected, walled off mainframes, and those accessing the data were within the walls of the same building or at least on a dedicated secure connection to the mainframe.
Now, we are moving critical and confidential data out of those buildings as fast as we can to the cloud which is owned by someone else. However, many businesses still have the old mindset that their traditional identity and role-based access management should still be adequate.
“We have always done it that way” is no longer a valid argument when you move to the cloud and now you are exposing your source code, build pipeline, critical customer data, and much more. Development teams who have worked behind the firewall and have always assumed they were protected will now have their code exposed to the best hackers in the world.
Zero Trust must be designed into everything …
Zero Trust must be designed into everything and may not even be achievable for many firms. It really needs to be designed holistically to evaluate the entire enterprise application architecture, the identity access systems, and all the assets.
A risk framework should be used to understand where the highest risks are and where the initial focus and investment should take place. For most organizations, this is a true paradigm shift that impacts their entire approach if it is done correctly.
In planning for Zero Trust, leaders need to project three years out to predict where Zero Trust needs to be then. It is a long initiative, that frankly, many CISOs won’t be around to see the full lifecycle of the implementation.
The NSA recommends a Zero Trust Mindset should take into consideration:
Several leaders described executive resistance to supporting another large security initiative. However, leaders said developing organizational awareness and educating executives was critical to gaining support. The NSA Zero Trust Model may help evangelize this as they strongly recommend Zero Trust be considered for all critical networks.
5 Step Model for how to get to Zero Trust:
In the design phase, it was recommended to use a tool like Ardoq (a Visio alternative) for Enterprise Architecture (EA) to map all asset inventory, communication ports, and access points to thoroughly understand those interrelationships.
With an EA map, the security team can begin working with the business teams to understand and define:
Design Advice from leaders:
Advice on Vendor Selection:
Achieving a robust Zero Trust program will require the use of multiple technologies. Here are some words of advice from leaders when evaluating and selecting Zero Trust vendors.
What tools are advancing Zero Trust?
Here are solutions that were mentioned in our CISO Forum as ones to consider when planning and evaluating Zero Trust technologies.
Conclusion:
Deploying a Zero Trust framework is not easy. While it may not seem as difficult to achieve with new cloud-based applications, it can be a huge challenge when you consider the entire enterprise including all data, legacy applications, vendors, users, and devices.
Focusing on education, using a risk-based methodical approach, and showing wins along the way will increase the level of support and success for achieving Zero-Trust within your organization.
One leader proclaimed, “This just shows we will never be done with security.”
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to improve your security program.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO FORUM SUMMARY: Is there a Silver Bullet to Thwart Ransomware?
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security programs. Here is a summary of their top tips or suggestions on how to thwart ransomware.
15 years ago ransomware was not on at the organizational level that it is today, but now ransomware is more than just advanced malware, it is now threat actors going in and gaining command and control inside networks for the sake of a big payday.
One CISO recently had 22 of its partners hit by ransomware in a single year.
That raised these questions:
Their focus is now to bring consistency to their visibility, tooling, and entering the response process. His concern is that outside entities will be targeted to specifically reach into other targets like us.
Being a large company leaves them vulnerable to attacks. He said, “You may have intelligence analysts who track and keep a record of internal events, but outside of the corporate infrastructure, the gates are not being watched as closely. Relying on subsidiaries to do that may need to be addressed.”
Lessons Learned:
One CISO was hired after a ransomware attack. The company that hired him had the tools for ransomware, but no strategy for dealing with the problem. The effects of the attacks were a lot of downtime and production slowed down, but there was not any data extortion for either one of the attacks he experienced. However, he gained a lot of knowledge through the process:
Lessons Learned:
What is the legality of paying the ransomware?
One CISO said they struggled to decide on whether they should pay off ransomware and possibly go into the territory of money laundering. One consulting firm CISO said they have tried tackling this fear with their customers, plus, have had to coach them after they paid it.
To pay or not to pay…
What has been the most effective thing you have done to reduce ransomware exposure?
All agreed that email phishing is the biggest vector by far.
What about Cyber Insurance?
What are ways technology has helped recover from ransomware attacks?
It’s less about technology and more about your process in the visibility of your security operations. Technology only supports the process. The important thing is comprehensiveness in management. This CISO was very big on optimizing the technical controls. His suggestions include:
CAUTION: New Threat Vector:
Other Resources:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to better prepare against the threat of ransomware.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – 3rd Party Evaluation & Monitoring
Suggested Best Practices:
Responding to 3rd party vendor requests:
One CISO recommend not to share:
How do you manage and send out 3rd party assessments:
Tools to push out 3rd party assessments:
Workflow / Survey Automation Tools to develop your own custom assessment tool:
Use a 3rd Party to evaluate 3rd Parties:
3rd Party Evaluation Services:
Frequency of 3rd Party Reviews or triggers for new reviews:
Impacted by SolarWinds?
How quickly do you implement upgrades and updates?
Tools to help evaluate 3rd party web, software, patches, & upgrades:
Involving Security in the vendor agreement process:
What to do when a Vendor doesn’t pass an established level of scrutiny?
Do you help raise the level of competency of vendors?
Upcoming Trends:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to improve your security program.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward