Security consultant and founder of Jennifer L. Bayuk LLC, formerly senior managing director, CISO, Bear Stearns The 2011 CSO Compass Award winners discuss prioritizing investments, learning lessons the hard way, and much moreJennifer Bayuk likes to say that “any job in information security, I’ve had at least once.” Currently an independent consultant and program director of the Systems Security Engineering program at Stevens Institute of Technology, Bayuk has previously been a CISO, a security architect, a manager of information systems for internal audits, a security consultant and auditor for one of the big four auditing companies, and a security software engineer at such industry giants as Bear Stearns and AT&T Bell Labs. Bayuk frequently publishes on information security and audit topics and has lectured at such organizations as ISACA, NIST and the Computer Security Institute.CSO: What was the most difficult or rewarding accomplishment of your career? Jennifer Bayuk: The most difficult and rewarding is the graduate curriculum I developed in systems security engineering at the Stevens Institute of Technology. I’ve always looked to security architecture as the ultimate solution to the majority of enterprise security problems, but when I had to sit down and teach others to do it, there was almost no material. I had to create a lot of it, and I had to make it comprehensible to others in a way that aligns well with what an engineer typically learns in engineering school. I couldn’t just say, “This is how you do security,” without making sure students were firmly grounded in the concepts that others are using in engineering. More lessons from the 2011 CSO Compass Award winners Jamil Farshchi, CISO Los Alamos National Labs Jennifer Bayuk, consultant and former CISO William Phillips, CNA David Komendat, Boeing Dwaine Nichol, City of Toronto Andy Ellis, Akamai Graduates have the ability to recognize and plan enterprise security architecture in a way that integrates with the rest of the technology in the enterprise. In computer science, the focus is often software and not how the whole system works. But system security engineers see problems in security as systemic issues, not just a vulnerability here or there.What has been the biggest change to the CSO role in the past few years? CISOs today are often charged primarily with compliance rather than security, but they are still expected to perform the security role. Yet metrics for compliance are different from those for security. Security has been perceived as a cost center, and there are a lot of challenges to showing what our value is. You might spend $5 million or $50 million on a security program and still get hacked. But in systems security engineering, we’re starting to use metrics that show whether security spending is effective, and we make use of validation tests to see if you’ve built the system right and if it works. If you don’t have these metrics, you can’t show that you’ve achieved your goals.What we teach in systems security engineering is that every system has its own measure of validity, and the key to being successful is to find it. And it will be a construct, not one thing that you measure or one test you do every year.Can you name one of the biggest mistakes you’ve made during your security career and what you learned from it? Bringing down the system while running a penetration test. Everyone does it once, but no one believes it will happen to them. The reason is, we expect the system to act as it did before, but every system and situation is unique. Even if it looks like the same operating system and the same type of application, until you know how the system works, you shouldn’t be testing the security. It’s something a lot of people experience, but not everyone learns the same thing from the experience.[Also see Bayuk’s articles Information systems audit: The basics | How to write an information security policy]What are your fail-proof principles of security leadership? Trust no one. I learned that from my mentor at Bear Stearns, Pat Ripley. As a design tool, it’s a very sharp knife—it helps you figure out how to design a system or project when you don’t know who’s going to be running it. You can’t assume an operator is trusted, so you build checks and balances into the system and ensure it’s operable with segregation of duties in place. If you’re very trusting, you won’t be good at security. People in security are naturally critical thinkers and maybe on the paranoid side.Second, know how things work. If you don’t, you don’t know how to secure them.What will be (or do you think should be) the next big topic in the security field? Nation-state-sponsored organized crime like the Russian Business Network. This type of situation is getting more rampant, and business is not prepared for it at all. Even if we fix everything we can in the United States, other countries’ laws are different. All aspects of organized crime can be done with computers, like cyberespionage or sabotage. It’s more reality than science fiction. The headlines are increasing, but there’s a low level of awareness. What is the most over-hyped topic in the security field? Compliance. If you’re doing security well, compliance should come naturally. But if you’re just aiming for compliance, it doesn’t mean you’re doing security right. Always start with security, and then let your auditors determine whether you’re compliant. Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe