Google does it, so can you. Stop dealing with IT security problems when they happen; start addressing the root cause. Credit: Laurence Dutton / Getty Images As security threats become more prevalent across organizations, solutions must have buy-in across the enterprise – not just within the IT department. Equally importantly, organizations must stop addressing problems as they emerge and start being more proactive about undermining those problems before they cause damage.Those were the key takeaways in a presentation by Parisa Tabriz, a director of engineering from Google. Tabriz spoke at the August Black Hat US 2018 conference in Las Vegas. In the session, the underlying theme was that security professionals must do whatever they can to incentivize firms to make better and more secure products.It’s surprising, but there are a mere 20 or so companies in a position to influence us globally because they make the operating systems, mobile devices and so on that we all use and rely on. Those companies, therefore, are truly the only ones in a position to influence the direction of security that will affect billions of people.To that end, Tabriz explained what Google is doing to improve security. She used the analogy of security experts playing the carnival game “Whack-a-Mole,” responding to threats only after they’ve emerged. Real progress comes from a more collaborative, and strategic approach to defense. She recommended three ways forward: Tackle the root causePick milestones and celebrate to stay motivatedBuild out your coalition of supporters outside of securityTackle root causeThe automotive industry has historically used the so-called “5 Why’s” method to understand the cause and effect behind problems encountered in its processes. That same method should be applied to the security space, Tabriz said.For example, if someone discloses a code vulnerability, certain questions should be applied to the incident: Why did this bug lead to Remote Code Execution, or some other exploitation?Why didn’t we discover it earlier?Why don’t we have tests for these kinds of problems?Why does it take so long to create updates?Why does it take five weeks to test a security fix?This methodology will help organizations get to the root cause of problems, Tabriz said.She also gave practical examples of what Google is doing in determining root causes.Among Google’s initiatives is what they term “Project Zero,” which is aimed at making zero-day attacks harder – that is, an attack that happens the same day that a vulnerability is discovered.Google is increasing its understanding of offensive security to inform defensive strategies, to get past one-off “Whack-a-Mole” defenses. This increased understanding will lead to structural improvements and security for the world, Tabriz noted.Vendor response to fixing security issues has varied widely, she said, and responses have not always been in favor of end user security. Regardless, because of Project Zero, Tabriz said that vendors handles 98% of fixes within 90 days of being notified.Tabriz maintained that greater cooperation is needed for better defense. With many more security experts tackling the root causes of security problems, the cost for bad actors to build exploitations among high value targets is increasing. Despite this progress, real change can result in pushback and commotion, Tabriz said. Root causes can be hard to solve, so the heavy collaboration required also demands adept management skills and a thick skin. Pick milestones and celebrateTabriz noted that Google is moving Chrome away from HTTP to HTTPs (HTTP Secure). Without HTTPs, she said, no one can have confidence in security or privacy of anything sent over the web. Making the transition to HTTPs will lead to a web that is secure by default.Understandably, a change of this magnitude must be both gradual and intentional, Tabriz said. The HTTPS migration therefore has involved strategically picking milestones, and celebrating progress along the way, to give the implementation a sense of momentum.Today, 87% of pages in loaded in Chrome happen over HTTPs, and 77% of traffic on Android is loaded over HTTPs.By breaking down the project into more manageable milestones and finding ways to celebrate those milestones, a company can develop the kind of support required for a large scale implementation, Tabriz said. Build coalitionsTabriz also recommended that organizations build out their coalitions in creating security processes. Threats and solutions are often clear, she said. You can’t detect the exact form of the threat, but you have to be proactive in how you isolate and contain future threats, which demands working together in getting to the appropriate levels of containment.Despite good faith efforts to improve security, Tabriz noted that there are potential challenges in implementing solutions – including management killing the project. Delays and holdups will happen at the management level, she said, and to overcome objections you have to become skilled at voicing the value proposition behind the initiative. To see real progress in your security protections, you need to create champions outside of the IT department.Similarly, a project may end up lacking peer support, which means that to get to the finish line you must learn to be a good team player. Tabriz recommended open communication about changes you plan to make; this will increase buy-in and decrease surprises along the way.In short, an organization needs to know it can rely on everyone to clear the path toward a safer future – and to stop playing “Whack-a-Mole” with its security. Related content opinion 5 factors affected by disbanding the Defense Information Systems Agency Government needs to make tough budgeting decisions, and closing agencies is up for debate. But cutting the Defense Information Systems Agency (DISA) could have a potential impact on national security. By Lloyd McCoy Sep 12, 2018 5 mins Cyberattacks Security opinion AI Wars: relax, it’s not the end of the world The profound implications of AI and machine learning on security are not lost on governments. By Lloyd McCoy Aug 20, 2018 5 mins Machine Learning Security opinion How agencies learned to stop worrying and love the blockchain A little uncertainty is a small price to pay for the promise of better security. By Lloyd McCoy Jun 21, 2018 4 mins Government IT Government Technology Industry opinion The GDPR initiative and how it affects US government and industry Don't make the mistake of thinking the GDPR regulation only affects our friends and neighbors overseas. There may be real implications here at home. By Lloyd McCoy Jun 05, 2018 5 mins Regulation Government Technology Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe