Focus on People to Improve Cybersecurity
BOTTOM LINE UP FRONT:
Information technology (IT) is first and foremost a human endeavor. It’s a tool, one created by humans, run by humans, and that supports human needs. For the cybersecurity community, focusing on the basics means putting the human at the center of the solution. The basics we need to focus on are:
Leadership
We are in a leadership crisis throughout American society.
My late father-in-law worked for IBM for decades. When the late 1980s hit, companies like IBM who groomed you for a lifelong career faced new realities. Many flattened and entered our current world of a rotating workforce. Before this change, he said, companies would develop their employees, an investment in their future labor force. When the new realities hit, he said, much of that development was jettisoned.
Today, much of organizations’ training focuses on short-term necessities, like properly filling out your time card. The kinds of development training my father-in-law talked about are now provided via online courses that you can take when your really important work is finished, that is, almost never. Development is relegated to perfunctory quarterly reviews and annual appraisals, usually tied to the end of the fiscal year.
Yet, almost everyone can readily pick out an example of someone they know who was in over their head. In 1969, Dr. Laurence J. Peter and Raymond Hill wrote a book called “The Peter Principle”. The principle held that in everyone’s career, they progress through positions in which they are entirely competent, moving from one rung of the ladder to the next, until one day...they’re not competent. They have reached their point of “final placement”.
With less workforce development across organizations, the Peter Principle is becoming increasingly common.
Over my three-decade career of leading in the military, government, academia, and private sector, there are two things I have observed:
As Peter describes, higher leaders either looked away to avoid embarrassment, “kicked them upstairs” exacerbating the situation, or simply kicked the person to the curb, often with the obligatory “performance improvement plan”.
When a key person in the organization struggles, it affects all those around them, both directly and indirectly.
Every member of the cybersecurity team must be a self-contained individual, versed not only in technical skills, and abilities, but personal and professional attributes, as well. An individual contributor must be a leader even if they are only leading themselves, mentoring others, leading incident response or heading up ad-hoc work groups. The importance of informal leadership quality
As Peter Drucker once said, “Culture eats strategy for breakfast.” Changes in culture require the buy-in of informal leaders.
As the cybersecurity professional moves into higher roles, they must understand where they now fit in to the organization, and the leadership and managerial levers available to them at that new level. A supervisor must not only ensure their people can employ their technologies, but that their professional development
As Sir Richard Branson once said, “Train people well enough so they can leave. Treat them well enough so they don’t want to.”
Recommended by LinkedIn
Synergy
The American Heritage Dictionary of the English Language says synergy is “the interaction of two or more agents or forces so that their combined effect is greater than the sum of their individual effects”.
The cybersecurity organization is more than the analyst in the security operations center (SOC) staring at the monitor on the wall. Those in other parts of the organization must set the stage for the SOC to prevail at the point of attack. When attackers gain a foothold, a synergistic, combined effort limits the damage and enables the organization to recover gracefully.
In fact, while the attacker initiates the attack, the organization controls the engagement area. They get to prepare. If the U.S. Army were to prepare the defense of a piece of terrain, engineers would emplace obstacles like tank traps and concertina wire, artillery would decide ahead of time where they target their weapons, and the area would be subject to aerial and ground surveillance and reconnaissance. If prepared well, like Harry and Marv in Home Alone, the attacker would have to play the defender’s game. This kind of cross-functional effort is synergy.
This requires not only technical but social skills, like emotional intelligence
We simply aren’t talking about these skills in our field today.
Risk-Centered Mindset
Risk management is determining who or what may do something bad, what weaknesses may enable them to do it, and the potential bad results to the organization's mission. Then it's about doing something about it...pragmatically, rationally, within resources limits.
Sun Tzu said, “To be prepared everywhere is to be strong nowhere."
Each member of the organization has about 1,900 hours a year of work time.
We can’t eliminate all cybersecurity risks. Acculturating a risk-management mindset throughout the organization empowers each team member to make effective trade-offs within their scope of responsibility. When we prioritize synergy, there is a general consensus of risk leading to better prioritization, and the mutual trust to act upon those priorities. Now cybersecurity is not such an intractable problem, but an elephant that can be eaten one bite at a time, mitigating the most severe risks first within the resources available.
Wrapping Up
Read the other installments in this series at The Cyber Success Vector™ Article Series.
© 2024 GrayVector LLC, all rights reserved.
The preceding work contains the opinions of the author, and do not represent those of any other person or organization.
References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by GrayVector, LLC, or the author.
NO WARRANTY. THIS MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. GRAYVECTOR, LLC, AND THE AUTHOR MAKE NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. GRAYVECTOR, LLC, AND THE THE AUTHOR DO NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.
Senior Director of Public Sector Channels and Alliances (FED & SLED) at Elastic (Twitter: @depeekii)
6moGreat article, Doug! Thanks for sharing!
LinkedIn Top Executive Leadership Voice - I help leaders maximize cybersecurity awareness, ensuring employees are completely engaged, educated, and empowered by using motivational keynote-style instructor-led sessions.
6moTotally agree! IT is fundamentally about people, and prioritizing their development is key. Building strong leaders, fostering true synergy, and embedding a risk-aware culture are essential steps. Training and nurturing our teams should be a continuous process, not just a checkbox. In cybersecurity, this human-centric approach ensures robust defenses and a more resilient organization. Let's focus on growing our people to secure our future!
Marketing Director at Carlton PR and Marketing ~ Director of Partnerships for Raíces Cyber Org, Events Lead for WiCyS People with Disabilities and Caregivers
6moGreat piece!
Sr. Vice President of Business Development
6moDoug, I always love reading your article. I agree with you that we need to focus on people as we should know that social engineering attack is the easiest and cheapest to exploit.
Retired Senior Civil Servant/Retired Senior NCO
6moDoug, I enjoyed reading your article. As someone who led a large IT organization though 3 significant breaches, I can relate to the message. When the breach happens (it's not if, but when), executives are increscent on getting as much information to satisfy their bosses or the board. While information does need to flow, the executives need to allow the team to work through the issue and focus on taking back the terrain. Once the breach is identified, impacts assessed, and fixes put in place, this is the time for executives to work with all parts of the organization to implement the culture and mindset you map our in your article. As we all know, it cost 10x the $$ to clean up a breach as it does to prevent it.