CISOs should think about privacy, culture, and 3rd party relationships Nearly every day, some security vendor reaches out to me describing how its products and services could have prevented the Edward Snowden public-disclosure of NSA surveillance programs. These vendors talk about strong authentication, privileged account auditing, sensitive data controls, etc. Yup, old Ed stirred the security pot in the vendor community but security professionals are also paying attention. In working with Vormetric on its 2014 Insider Threat Report, ESG research discovered that 45% of enterprise security professionals say that the Edward Snowden incident (i.e. his public disclosure about the NSA and its PRISM program) changed their organizations’ perspective on insider threats.So everyone is focused on sensitive data discovery, classification, security, and monitoring. From a security perspective, that’s a very good thing, but it seems to me that some other important Snowdenesque issues have been virtually ignored. Yes, sensitive data security is critical, but CISOs need a perspective on privacy, culture, and business in addition to strong authentication, encryption, and logging. In my humble opinion, CISOs should think through the whole Snowden affair and ask themselves and their organizations the following questions:1. Does your organization have any business processes that could be perceived as an invasion of privacy? Clearly, Mr. Snowden believed that the NSA was doing so; to the point that he was willing to publicly-disclose the practice in spite of great personal risk. If your organization is keeping close tabs on employees, monitoring employee Facebook accounts, conducting background checks, or selling customer data to 3rd parties, you may want to assess whether these business processes may be seen as offensive by some or a large number of your employees. If so, you are likely at risk for a Snowden-like event. 2. Does your organization employ a large number of “millennials?” According to a poll conducted by Time magazine, 70% of those aged 18-34 thought that Snowden did a good thing in disclosing the NSA surveillance program as compared to 50% for ages 35-54, and 47% for those aged 55 and over. A Pew Research poll provided similar results. Millenials are known to be optimistic, tech savvy and team players, but also somewhat fickle, narcissistic, and suspicious. They are also highly connected to social media in numerous forms (like Anonymous which had 4chan, Encyclopedia Dramatica and other social sites). Corporate executives (led by HR) should understand how their organization’s mission and operating procedures align with the millennial mindset. If it is out of balance, it shouldn’t come as a surprise when sensitive corporate secrets find their way to Facebook and Twitter.3. Does your organization have proper oversight over trusted contractors? While Edward Snowden’s name has become commonplace, journalists have all but ignored the fact that Eddie was not an NSA employee. Rather, Snowden worked for Booz Allen Hamilton, an NSA contractor (aka “Beltway Bandit”). Why isn’t Booz Allen being dragged through the mud in all this? Beats me because it should be. This brings me to my last question about trust and oversight when it comes to 3rd party contractors. It appears that Snowden was treated as an employee rather than a contractor – big mistake. Yes, there is a certain amount of trust inherent in outsourcing but CISOs should embrace the old security adage, “trust but verify.” In other words, monitor and review everything 3rd parties do on your behalf.The security aspects of the Edward Snowden/NSA tale have captured the world’s attention but this is really only half of the story. Smart organizations should also ponder the associated privacy ramifications, think about which groups they may be offending, and figure out whom they can and cannot trust. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe