Americas

  • United States

Asia

Oceania

There is no substitution for in-house security professionals

Opinion
Nov 25, 20144 mins
Data and Information SecurityData BreachIT Leadership

It's not about adequate versus inadequate cyber security professionals

This post is not about adequate versus inadequate cyber security professionals. Instead, it’s an argument for how critical it is to employ full-time in-house cyber security professionals who are dedicated to the constant needs of one organization, versus outsourcing cyber security to a third-party managed security service provider (MSSP) and/or consulting organization.

I have always been of the opinion that if one wants to gauge an organization’s dedication to the protection of information, they should be asking how many full-time employees are on the payroll that are dedicated to cyber security?

If the answer is none, or if the employees are part-time and have other IT responsibilities, they should look critically at the additional information that this organization provides. This is particularly important for organizations that are highly regulated and/or are common targets of cyber criminals.

In a recent debate that I had with other industry leaders regarding this topic, some argued that their organization could effectively outsource the cyber security function.

As those in IT are more than aware, anything can be outsourced. But we really have to start asking ourselves how effective that would be for such a critical function tasked with protecting the organization’s information? Do you really want to leave that with an outsider?

I have been in this business for over two decades and have worked on both sides of the fence. I know firsthand that there is absolutely no substitute for sitting day in, and day out, with the other functions of an IT organization.

The limitation of a third-party consultant is not knowing or at least not having in depth knowledge of your “unique” and “customized” systems, network, applications, and most importantly the culture.

Even if a third-party dedicates a resource to the organization and they come in on a periodic basis, it just isn’t as effective as having someone there dedicated to the organization, someone who has skin in the game.

This is primarily due to the ever-changing fluid nature of technology and the staggering amount of changes that take place within an organization on a daily basis, whether it is regarding technology, the general direction of IT.

Where the argument for in-house dedicated professionals really pays off is where it counts the most, and that is in the event of an actual breach. In-house professionals are on call and ready to respond in a moment’s notice should something occur.

However, most importantly, the in house staff already understands the environment, the firewalls, switches, and everything about the architecture that’s necessary to quickly and effectively minimize damage to the company. They are always on and are constantly monitoring your systems for suspicious activity. 

Often the difference between a breach and compromise (which can and should be mutually independent of one another) is how quickly and effectively you are able to detect, mitigate, and communicate what is happening. This is absolutely dependent on real-time zero-day knowledge of your technology environment. Now is not the time for a learning curve!

I want to be clear that I am in no way saying that there is not a role for external security help in building an effective cyber security program or responding to incidents.

As a matter of fact, it is imperative that you augment your program with specialists that provide specialized tools, extensive knowledge, different perspectives (fresh eyes often provide extreme value), and expertise that they have learned in working with a variety of companies. Especially in areas such as threat intelligence, incident response, and validation testing, to name just a few examples.

So let’s stop fooling ourselves and take this epidemic of Cyber Security seriously.  Today, Security is a cost of doing business and we cannot effectively protect our organizations from the advanced capabilities of the criminals with just technology controls and consultants.

Contribute to the advancement of the cyber security profession and entrust your program to someone who is going to be thinking about your organization’, and only your organizations, security when they wake up in the morning, throughout the day, and when they go to sleep at night, because you can guarantee that the bad guys are. Invest in the people – it’s important to have a team dedicated to security in order to promote a much lessened risk posture for your organization.

scottangelo

Scott M. Angelo is K&L Gates' global chief information officer responsible for strategic technology planning and direction, architecture, operations, business resilience, and cyber security.

Scott is a global IT executive with 26 years of experience in the design, implementation, and transformation of enterprise-wide information technology and risk management programs. He has extensive experience addressing complex data privacy and regulatory compliance issues in high transactional business environments.

Scott previously served as corporate vice president and chief information officer for Diebold, Incorporated where he formerly served as vice president and chief security officer. Scott held other senior technology management positions with Ernst & Young LLP, the Defense Advanced Research Projects Agency (DARPA), the National Aeronautics and Space Administration (NASA) Special Programs Office and McDonnell Douglas Corporation. He served as a military intelligence officer in the U.S. Army Reserve from 1986 through 2001.

The opinions expressed in this blog are those of Scott Angelo and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.