I've known David Greer for over 25 years and have always enjoyed his intelligence, good humor and creativity. I’ve known David Greer for over 25 years and have always enjoyed his intelligence, good humor and creativity. And Stephen Northcutt is so widely published, cited and respected in our field that I had trouble deciding which of his many Web sites to cite. It is a great pleasure to publish Greer’s interview of Nortcutt in two parts. Everything that follows is by Messrs Greer and Northcutt with minor edits.* * *Many information security professionals are overwhelmed with the technical issues they must deal with. But technical solutions must operate in a business environment that deals with customers, partners and other stakeholders. I interviewed Stephen Northcutt, president of the SANS Technology Institute, a leader in information security training, and discussed the relationship between information security and business strategy.DG: How do you see information technology (IT) security and the broader issues how user and customer experience relate to business strategy? SN: One course that I teach is information security for managers. On one of the very first slides, the point that I try to make is that you’ve heard frustrated business people say you guys have got to align your security programs with the needs of the business. One of the questions I ask right then is, “Do you guys even know your organization’s mission statement?” I typically see 10% or so of the class that can.DG: I’ve had trouble finding how information security can enhance business strategy. The focus seems to be on the technology and how it is applied to the broader business issues. What are your thoughts? SN: The people that I follow on twitter have been posting a whole lot of posts with a little bit of technology but a lot of business comments as well. Our latest newsletter is called SANS ExecuBytes and it covers leadership as well as technology. What really impresses me are people who write and say, “I printed it out and gave it to my boss.”DG: While searching for thought leaders on IT security and business strategy, I found your Web page on Security Thought Leaders. The thought leaders that you mentioned seemed to be biased to the technical side. The interviews that I read were deep into the technical problems as opposed to the broader strategic issues I thought should be there. What is the background for your Security Thought Leaders?SN: One of my goals for the project is to introduce people that you wouldn’t ever hear of otherwise. There are some people who’ve done some truly amazing things such as Bill Worley. Bill was one of the architects of the Itanium and when he retired from HP his wife made him go in the basement so he didn’t bother her all the time. He went in the basement for a year and wrote a new operating system that runs over Itanium. It’s a micro operating system, so it runs a lower risk attack surface. Bill may or may not succeed and his company [which provides DNSSEC solutions to government, enterprise, and service providers] may or may not succeed, but what a great story!DG: Who else stands out on from your leadership interviews?SN: I don’t know if you’ve ever heard Gene Kim speak. I want to encourage you to pick up on one of his Webcasts. He is really concerned about good practice in organizations. He is cofounder of the IT Process Institute. Even though he is co-founder of Tripwire, the configuration-management software company, he almost never talks about Tripwire. He talks about organizational process.All of the thought leaders who have started a company created a kind of aspirin for a particular kind of headache. That’s certainly their common story, but now that they are running a business, they find that life is far broader. You bring people like that in to close the big sales to customers but then the customers start telling them what the real problems are. DG: It’s a constant challenge to balance the security risk of IT security solutions vs. the usability to employees, customers, and partners. Do you have a set of guiding principles that IT security professionals can follow to provide perspective on the balance?SN: Start with the SANS Top 20 Critical Security Controls. The idea behind the Top 20 was to actually deal with things that are provable – you can prove that you can break in using these vulnerabilities. We took a bunch of penetration testers and got them to break in; afterwards, we analyzed what went wrong, figured out what we needed to do to fix the problems. One of my favorites is No. 11 (“Account Monitoring and Control“); another is No. 9 (“Controlled Access Based on Need to Know“). As I cover security news, I find that so many of the problems come down to access control. It’s just crazy and I suppose there is some technology but it’s mostly process.[More of the interview in part 2 next time.]* * * David Greer has a background in software engineering and specializes in launching and growing emerging companies. Stephen Northcutt is president of the SANS Technology Institute and the author of many books and articles on security. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe