Avoid The Information Security Squirrel

"My master made me this collar. He is a good and smart master and he made me this collar so that I may speak. Squirrel!"  

In the Pixar film Up, squirrels frequently distract Dug the talking dog. In our space, we are frequently distracted by technology. "I am a good and smart security professional; I must protect my enterprise so that we are secure. APT defense in a box!"  

The expo floors at industry events such as the RSA Conference and Blackhat contribute to this. Signage touts the next great piece of technology that will solve all of our security problems. We allow Big Data, security analytics, threat intelligence, and APT defense in a box to distract us.  It is easy to do; there is no shortage of challenges for today’s security and risk professional. The threat landscape is overwhelming. We have problems recruiting and retaining the right staff.  Day-to-day operational duties take up too much time. Our environments are complex, and we struggle to get the appropriate budget.

These “security technology du jour” solutions are very appetizing.  They compel us much like IDS, IPS, and SIM did in the past. We want and need the “easy” button.  Sadly, there is no “easy” button and we must understand that threat protection doesn't equal a product or service; there is no single solution. Technology alone isn't the answer we are looking for. 

In my latest research, “Seven Habits Of Highly Effective Incident Response Teams,” I discuss how successful Incident Response teams avoid infosec squirrels, and don’t focus exclusively on technology.  The foundation of successful Incident Response is effective staff that are augmented with technology and enabled by process and oversight.  Possessing the latest technology without staff that is able to properly leverage it is like owning a sports car with an empty tank of gas that you have no clue how to drive.  Understanding technology benefits and limitations is one habit of effective Incident Response teams.  Here is a preview of the other six steps I discuss in the research:  

Please let me know what you think and feel free to leave comments. 

Comments

Yup..

Good post, Rick.

As a vendor of security technology I absolutely agree - the temptation to slap on a "Best Thing Since Sliced Bread" sticker to every security tool is considerable. In the end, what works best is to try to put technology and process in perspective - and avoid the hype. Security buyers are usually highly informed and deeply skeptical of vendor claims. (As they should be.)

I see it happen - vendors claiming that any tool is the silver bullet to eliminate threats - and in the end it reflects badly on everyone - eroding trust and making it hard to cut through the noise.

As an industry we sometimes just need to stop, take a deep breath, and absolutely stop chasing after whatever new squirrel catches our eye.

Agree, take a breath. Also

Agree, take a breath. Also look at your existing portfolio and see what you aren't using. I suspect most orgs use <50% of the capabilities they already own.

Good point on the not using existing tech

I need to add that to my talk! :-)