James Jardine lays out his approach to get security integrated earlier into development by enhancing existing processes over advocating for security research The way we advocate for better security impacts our success.What happens if you suggest your organization subject itself to security research? What sort of reaction do you think you’ll get? Better, how would you define and explain it? Why?Contrast that to suggesting you enhance existing processes with stronger security measures — tailored to the needs of the organization. It’s a stronger approach. It leads to better integration of security. Imagine actually including security sooner in the process?James Jardine (LinkedIn, @jardinesoftware) of Jardine Software penned a post last week laying out the difference (read it here). His take on the distinction between security research and testing lays out our opportunity. In fact, I see it as a way to speed up support for security research and other programs aimed at making it better for all of us. Here are five questions with James about why the concept matters and how you can take advantage of it.What inspired your recent article about the definitions of words and the impact on our efforts in security?I read a tweet supporting the FDA push for medical device makers to allow security research. It caused me to step back to think about the phrase “security research.” Further, what does it actually mean to allow more security research? Given known issues with security protocols, devices, and applications, is what we need more research? Instead of research, what if the statement read “FDA pushing for medical device makers to adopt stronger security testing”?The security industry struggles to define security research. We offer “bug bounty” programs. Both offer value and introduce confusion. Businesses who seek better security know what QA is. They have programs to test and ensure a desired level of quality. Instead of focusing on research and bounties. If we focus on language and concepts they already have, we get more traction.When looking at security research versus testing, what is the problem we’re trying to solve? What is the business need?Security is a young field. It is still confusing to a lot of people. Defining security research is more complex. We’re debating it in the industry. In my view, security research plays a valuable role in identifying new challenges and advancing solutions.Once the bug, vulnerability, or like is defined and validated, looking for it is the role of testing. Following established processes and methods to look for known potential defects within specific instances. For example, a medical device manufacturer could test for identified flaws for that type of device. This includes both common problems known to impact the class of device (like insecure transmissions or default passwords as well as anything specific to the device itself.The business seeks quality. They don’t want to produce devices with known defects. Research identifies what testing looks for. This way research benefits the industry. And testers make sure the products meet the standard.It comes down to quality. Do companies view testing different than research? Is this something we can exploit to improve security?Organizations are under pressure to provide competitive solutions at reasonable prices. Companies care about security. They invest in and proudly tout their quality assurance programs. Many of these same companies invest in research — commonly called research and development. Here’s the difference: research (and development) is a bet. It’s an investment in the future. Or several investments. The hope is for some small amount to pay off. Testing is about today. Ensuring the current code, products, or solutions meet an established standard.What, then, is the push for security research asking for? While it’s not consistent, it appears that we seek protections to look for security issues without legal repercussion. While valuable in a broad sense, it’s not the same as incorporating security into existing testing processes.Is it easier to include security into the testing process than trying to launch a new research-focused initiative?It sure is. While each organization is different, it is often easier to incorporate security into the established testing process than it is to introduce a new security program. Even better, it means introducing security into the process earlier — with distributed ownership. It means security is integrated instead of a separate program.Typically, in-house security teams are small in comparison to the development and testing teams. Most of the organizations I consult with are lucky if they have five people on their security team capable of supporting testing. Those same organizations have between 50 and 150 people focused on QA testing. Empowering those testers is a better way to improve security in the organization. This has the added benefit of making it easier to incorporate third-party resources and external programs. For most this means penetration testers, external code review, and even bug bounty programs. Leveraging the existing program creates natural opportunities and defined situations where the additional experience and ability is welcomed — not fought.How can a security leader get started?Communication and understanding are the two biggest factors when getting involved with the application teams. This isn’t a situation to demand security involvement. Treat it like an opportunity to figure out how to help someone else solve their problem. Most application teams lack deep information security experience. Start by understanding how your solutions are designed, written, and tested. Learn about their pressures. Figure out how they get compensated.Once you understand the environment, identify where, when, and how to introduce security. Plan to start small and support incremental steps. Realize that each step is an improvement for security where everyone benefits. A good starting place is handing off control and use of your security testing tools. Ease the transition — for your peace of mind, and theirs. This is a step that puts the power and responsibility closer to the source. As you continue to support them, you’ll be amazed at the depth of their questions. Plus, it frees up your team to go focus on other areas of value.As you partner with your development and testing teams, look for opportunities to train. Consider the external resources that benefit the process. Imagine the power of those teams making the request — with your counsel — instead of security requiring it.This is a dramatic way to increase security within your organization as a leader. Related content opinion Want to be a better security leader? Embrace your red team CyberArk CEO Udi Mokady lines up for a Security Slap Shot on the need for security leaders to be productively paranoid. By Michael Santarcangelo Sep 29, 2017 4 mins Risk Management Vulnerabilities IT Leadership opinion To combat phishing, you must change your approach Kevin O’Brien, CEO of GreatHorn, discusses why employee training isn't effective in combatting phishing and what companies should do instead. By Michael Santarcangelo Sep 27, 2017 7 mins Phishing IT Leadership opinion Are you ready for ‘Moneyball’ security? Mike McKee, CEO of ObserveIT, lines up for a Security Slap Shot on the benefits of an evidence-based approach to security. By Michael Santarcangelo Sep 20, 2017 4 mins IT Leadership opinion Your security scars are the key to innovation Ben Johnson, CTO and co-founder of Obsidian Security, lines up for a Security Slap Shot on driving innovation in security and business based on experience. By Michael Santarcangelo Sep 14, 2017 4 mins IT Strategy Careers IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe