SlideShare a Scribd company logo
1 of 1
Download to read offline
Perspective
                                                                                   are needed to deal with the new             Open source is your friend. If
                                                                                   security technologies that will find     you asked someone 10 years ago if
                                                                                   widespread adaptation in 2011. Be       you could have “no zero” for secu-
                                                                                   it social media, cloud computing,       rity software with a strong secu-
                                                                                   videoconferencing and more—these        rity program, you would have been


B ack to B asics                                                                   technologies must have security
                                                                                   standards upon which they can be
                                                                                   built. Lack of standards means that
                                                                                   security will eventually have to be
                                                                                                                           laughed at. Today, no one is laugh-
                                                                                                                           ing at open source security software
                                                                                                                           and tools. The essential benefit of
                                                                                                                           open source is not necessarily that


O n I Securty
     T       i                                                                     retrofitted. The significant prob-
                                                                                   lem there is that any sort of retrofit
                                                                                   is always a much more expensive
                                                                                   endeavor than had it been done cor-
                                                                                   rectly in the first place.
                                                                                                                           it is free; rather, that organizations
                                                                                                                           that use open source generally un-
                                                                                                                           derstand their problems better. They
                                                                                                                           take a more tactical approach to se-
                                                                                                                           curity fixes by using open source.
As information security stresses increase, remember the                                Demonstrate the value of securi-        When combined with a highly
fundamentals. And make sure your CISO is really smart.                             ty with technical and financial met-     technical staff, my experience is that
                                                                                   rics. Your CEO, COO, CFO, and           banks that have embraced an open
BY BEN ROTHKE                                                                      executive board don’t care if you       source security program generally
                                                                                   use Check Point or Juniper. What        have a much better understanding
ONE OF THE MEMORABLE QUOTES FROM          rity? If not, you don’t have informa-    they want to know is how effectively    of their core security issues, as op-
the movie Bull Durham was: “This          tion security. If there is no security   the bank is protected. Communi-         posed to blindly throwing tools at
is a very simple game. You throw          oversight, kiss your data goodbye.       cate that the bank’s risk exposure      the problem.
the ball, you catch the ball, you hit         If your chief information secu-      is in check. If you can demonstrate         Not that open source is a pana-
the ball.” Information security is like   rity officer (CISO) is not at least as    to the executives that the security     cea. When open source tools are de-
baseball—you encrypt the data, you        smart as your CFO, then you will         group uses mature risk frameworks       ployed and configured incorrectly,
decrypt the data, you use the data.       have much less control over your         to manage the bank’s risk posture,      they can introduce more risks than
    As 2011 starts, the key to data se-   data. Given that data is the life-       you’ll have won them over.              they stop. But banks that realize that
curity is to focus on both the secu-      blood of many organizations, the             Scare them, but don’t FUD           open source can be their friend and
rity fundamentals and look to new         lack of an effective CISO can be         them. Once again, you can assume        embrace it are generally those that
technologies. Here are some of the                                                                                         truly “get” information security.




                                     “
fundamentals:                                                                                                                  Know the hot security technolo-
    Governance and oversight. Why
do many enterprises place their
                                          G iven that data is the lifeblood of                                             gies for 2011. Core security technol-
                                                                                                                           ogies such as firewalls, encryption
laser toner cartridges in a locked        many organizations, the lack of an                                               and intrusion detection will con-
room? Everyone knows that even
with all of a bank’s dedicated em-
                                          effective CISO can be information                                                tinue to be needed in 2011. As well,
                                                                                                                           some of the hot security technolo-
ployees, a few bad apples can make        suicide                                                                          gies for this year include those that
a lot of expensive office supplies dis-                                                                                     enable banks to secure corporate
appear quickly. But are the terabytes                                                                                      data on iPads or iPhones; protect
of a bank’s data adequately locked?       information suicide. Only an indi-       your board members are very in-         against targeted attacks—the recent
If not, a ten dollar USB thumb            vidual with strong business savvy        telligent to have been appointed to     Stuxnet malware attacks show that
drive can download unimaginable           and security knowledge can oversee       such executive leadership positions.    targeted attacks are growing, and
amounts of corporate proprietary          security planning, implement poli-       So don’t use fear, uncertainty and      banks need a way to avoid them.
and sensitive confidential data.           cies and select measures appropri-       doubt, but instead, let them know       Social media control: banks such as
    Where does the security buck          ate to business requirements. That       that it is no longer “their mother’s    JPMorgan Chase, Citi, US Bank, and
stop? The reason a bank has a CFO         person is the CISO. Make sure your       network.”                               others have created corporate pages
is to ensure the management of            firm has one.                                 The threats facing most networks    to interact with their clients; other
financial risk, in addition to effec-         Security standards. They say          today are significant. The Yankee        banks will look for security controls
tive financial planning. Just as your      about Chicago that if you really hate    Doodle virus of the 1990s did noth-     to ensure they can use social media
finances need a smart person to be         the weather, just wait an hour, and it   ing but annoy you. But today’s at-      without the security risks.
on top of them, so too does your          will probably have changed by then.      tacks are targeted and stealthy. If     Ben Rothke CISSP, CISA is a senior
data. Even if your data is locked, is     Computer security is like Chicago        you are a Fortune 500 organization      security consultant with BT Professional
there a person who’s charged with         weather—it’s dynamic and there are       and not discovering at least two at-    Services and the author of Computer
overall governance and oversight          always new threats on the horizon.       tempted attacks per week, then you      Security: 20 Things Every Employee
around all things information secu-       Strong corporate security standards      need a better monitoring program.       Should Know (McGraw-Hill).


                                                                                                                     FEBRUARY 2011 BANK TECHNOLOGY NEWS 31

More Related Content

More from Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
 
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke   Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke   Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssBen Rothke
 
Ben Rothke RSA PK 2010
Ben Rothke   RSA PK 2010Ben Rothke   RSA PK 2010
Ben Rothke RSA PK 2010Ben Rothke
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security PostureBen Rothke
 

More from Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke   Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke   Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
 
Ben Rothke RSA PK 2010
Ben Rothke   RSA PK 2010Ben Rothke   RSA PK 2010
Ben Rothke RSA PK 2010
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Back to basics on it security - Ben Rothke

  • 1. Perspective are needed to deal with the new Open source is your friend. If security technologies that will find you asked someone 10 years ago if widespread adaptation in 2011. Be you could have “no zero” for secu- it social media, cloud computing, rity software with a strong secu- videoconferencing and more—these rity program, you would have been B ack to B asics technologies must have security standards upon which they can be built. Lack of standards means that security will eventually have to be laughed at. Today, no one is laugh- ing at open source security software and tools. The essential benefit of open source is not necessarily that O n I Securty T i retrofitted. The significant prob- lem there is that any sort of retrofit is always a much more expensive endeavor than had it been done cor- rectly in the first place. it is free; rather, that organizations that use open source generally un- derstand their problems better. They take a more tactical approach to se- curity fixes by using open source. As information security stresses increase, remember the Demonstrate the value of securi- When combined with a highly fundamentals. And make sure your CISO is really smart. ty with technical and financial met- technical staff, my experience is that rics. Your CEO, COO, CFO, and banks that have embraced an open BY BEN ROTHKE executive board don’t care if you source security program generally use Check Point or Juniper. What have a much better understanding ONE OF THE MEMORABLE QUOTES FROM rity? If not, you don’t have informa- they want to know is how effectively of their core security issues, as op- the movie Bull Durham was: “This tion security. If there is no security the bank is protected. Communi- posed to blindly throwing tools at is a very simple game. You throw oversight, kiss your data goodbye. cate that the bank’s risk exposure the problem. the ball, you catch the ball, you hit If your chief information secu- is in check. If you can demonstrate Not that open source is a pana- the ball.” Information security is like rity officer (CISO) is not at least as to the executives that the security cea. When open source tools are de- baseball—you encrypt the data, you smart as your CFO, then you will group uses mature risk frameworks ployed and configured incorrectly, decrypt the data, you use the data. have much less control over your to manage the bank’s risk posture, they can introduce more risks than As 2011 starts, the key to data se- data. Given that data is the life- you’ll have won them over. they stop. But banks that realize that curity is to focus on both the secu- blood of many organizations, the Scare them, but don’t FUD open source can be their friend and rity fundamentals and look to new lack of an effective CISO can be them. Once again, you can assume embrace it are generally those that technologies. Here are some of the truly “get” information security. “ fundamentals: Know the hot security technolo- Governance and oversight. Why do many enterprises place their G iven that data is the lifeblood of gies for 2011. Core security technol- ogies such as firewalls, encryption laser toner cartridges in a locked many organizations, the lack of an and intrusion detection will con- room? Everyone knows that even with all of a bank’s dedicated em- effective CISO can be information tinue to be needed in 2011. As well, some of the hot security technolo- ployees, a few bad apples can make suicide gies for this year include those that a lot of expensive office supplies dis- enable banks to secure corporate appear quickly. But are the terabytes data on iPads or iPhones; protect of a bank’s data adequately locked? information suicide. Only an indi- your board members are very in- against targeted attacks—the recent If not, a ten dollar USB thumb vidual with strong business savvy telligent to have been appointed to Stuxnet malware attacks show that drive can download unimaginable and security knowledge can oversee such executive leadership positions. targeted attacks are growing, and amounts of corporate proprietary security planning, implement poli- So don’t use fear, uncertainty and banks need a way to avoid them. and sensitive confidential data. cies and select measures appropri- doubt, but instead, let them know Social media control: banks such as Where does the security buck ate to business requirements. That that it is no longer “their mother’s JPMorgan Chase, Citi, US Bank, and stop? The reason a bank has a CFO person is the CISO. Make sure your network.” others have created corporate pages is to ensure the management of firm has one. The threats facing most networks to interact with their clients; other financial risk, in addition to effec- Security standards. They say today are significant. The Yankee banks will look for security controls tive financial planning. Just as your about Chicago that if you really hate Doodle virus of the 1990s did noth- to ensure they can use social media finances need a smart person to be the weather, just wait an hour, and it ing but annoy you. But today’s at- without the security risks. on top of them, so too does your will probably have changed by then. tacks are targeted and stealthy. If Ben Rothke CISSP, CISA is a senior data. Even if your data is locked, is Computer security is like Chicago you are a Fortune 500 organization security consultant with BT Professional there a person who’s charged with weather—it’s dynamic and there are and not discovering at least two at- Services and the author of Computer overall governance and oversight always new threats on the horizon. tempted attacks per week, then you Security: 20 Things Every Employee around all things information secu- Strong corporate security standards need a better monitoring program. Should Know (McGraw-Hill). FEBRUARY 2011 BANK TECHNOLOGY NEWS 31