STE WILLIAMS

Secrets of a Highly Productive CIO-CISO Relationship

The dynamic between CIOs and CISOs has evolved along with the technology. How can they ensure they’re on the same page while driving value?

The ever-changing dynamic between the CIO and CISO is subject to several factors: personality differences, new technologies, length of time working together, and communication between the business and IT teams.

For a duo in charge with keeping the organization connected, productive, and secure, a strong relationship is crucial. How can they build and maintain one as organizations adapt to the future of tech?

Over the past five years, cybersecurity has gained “significant visibility,” says Jason Clark, general partner at SixThirty Ventures and chairman of the Security Advisory Alliance. “It’s part of the discussion, part of news every day,” he says. “That itself has shifted the nature of the relationship.”

Five years ago, he says, CIOs often didn’t know how CISOs were doing their jobs. The CIO had more of an operational role in running the organization. The CISO questioned their decisions, telling them what not to do. This put stress on the CIO and led to a poor working relationship.

“There was a lot more contention between the various IT groups, business, and security, because security viewed everything as a risk,” Clark explains.

Over the years, the CISO’s role has matured, he continues. Now, instead of solely focusing on stopping security threats and cybercriminals, he or she also act as a business leader. The position has evolved to include the landscape of the entire organization, which has affected the CISO’s relationship with the CIO.

How can CIOs and CISOs build an optimal working relationship? Steve Hassell, former CIO of Emerson Network Power/Emerson Electric, advises setting metrics for success, and using absolute data that can be measured. Both leaders are held accountable for these metrics, giving them incentive to productively work together and achieve them.

Clark agrees, emphasizing the importance of being aligned on business outcomes and driving value with people, processes, and technology. He also advises ensuring all business and IT pros are speaking the same language when discussing problems and solutions to avoid frustration.

Healthy Tension

There is still tension between the two, Hassell says, but it’s a key part of this dynamic. The CIO and CISO don’t need to agree on everything. In fact, it’s better if they don’t.

“Almost every good thing that happens in business is due to tension,” he says.

Tension can be healthy. When the CIO and CISO disagree on a decision, the solution is usually somewhere in between. This opens up a conversation about different routes to take and ultimately creates value for the business as the two sides find a balance.

[Hear Clark and Hassell give tips on how to improve the CIO-CISO relationship during their session at Interop ITX on Wednesday, May 17, at the MGM Grand in Las Vegas. To learn more about other Interop Security tracks, or to register, visit the live links.]

Ultimately, says Hassell, a strong relationship is built on respect. The CIO and CISO must realize they will often view situations from different perspectives. If each is stubborn to prove they are right, they’ll never work well together.

Handling New Tech

CIO and CISO teams will face many major choices as their organizations introduce cloud services, mobile, IoT, and other new technologies the IT team doesn’t always control.

Clark explains how cloud technology, in particular, is drastically changing the environment. Security teams have bought several different technologies. Businesses invest millions of dollars, and months of time, to deploy them.

Today, the cloud enables the same teams to get the same product and deploy it globally, fully scalable, at a lower cost because they only pay for what they use. All of a sudden, their four- to six-month integration period is cut down to 15 minutes.

“[Cloud] is going to change the way that everyone think about these services,” he predicts. “It could drive CISOs out of operations and more into strategy and risk, where they become more of a risk officer.”

The “bulk innovation of technology” could have an interesting effect on the CIO position, says Hassell. He expects it may grow into a broader business role because the CIO will be responsible for mediating technology across the organization. In some cases, the CEO could become the CIO.

“Increasingly, the requirements of the CEO are becoming harder because the job is getting so broad,” he says.

Related Content:

Kelly is an associate editor for InformationWeek. She most recently reported on financial tech for Insurance Technology, before which she was a staff writer for InformationWeek and InformationWeek Education. When she’s not catching up on the latest in tech, Kelly enjoys … View Full Bio

Article source: http://www.darkreading.com/careers-and-people/secrets-of-a-highly-productive-cio-ciso-relationship/d/d-id/1328432?_mc=RSS_DR_EDT

Git sprints carefully towards SHA-1 deprecation

Following the February controversy over whether or not Google’s SHA-1 collision broke Git, its community has taken the first small steps towards replacing the ancient hash function.

For context: the Chocolate Factory last month produced the first reproduceable SHA-1 collision needing relatively* low computing power – something that renders a hash function obsolete since it’s no longer possible to prove that (for example) a hashed document is unique.

For some years, the crypto community’s standard advice has been “get rid of SHA-1”, and that led to criticism of Linus Torvalds’ famous Git version control system for holding onto it.

Torvalds’ response was that SHA-1 is used for version control, not security, so while replacing it is a good idea, it’s not sky-falling urgent.

However, he kicked off discussion among the Git developer community early this month by asking how SHA-1 can best be replaced.

It’s not a trivial “out with the old, in with the new” exercise, as Torvalds’ request for comment states: it has to happen with minimal disruption to developers who depend on Git, Git itself has to stay maintainable throughout the transition, and in the end, the community will need “a generalised repository conversion tool”.

The commits are now landing apace in the Git repo, and it’s sparked a lively discussion about which hash should be the successor (the Git devs have settled on SHA3-256). ®

*Bootnote: “Relatively low” by the standards of crypto-cracking. 6,610 years of processor time is still, admittedly, more than most people have at their disposal. However, the history of cryptography warns us that attacks become more efficient very quickly. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/20/git_sprints_carefully_towards_sha1_deprecation/

Atlassian admins, your Struts 2 patch has landed

Atlassian has joined the growing list of vendors to patch its products against the Apache Struts 2 vulnerability.

Atlassian is one of many downstream vendors to need a patch, and the company has announced its Bamboo, Crowd, and HipChat Server products now have fixes available.

In Atlassian Bamboo, the bug affects versions 5.1.0 to less than 5.14.5 and versions 5.15.0 to less than 5.15.3. Attackers could exploit the Struts 2 bug to execute arbitrary Java code on a target without authentication.

Bamboo fixes are in 5.15.3 (recommended) and 5.14.5.

Atlassian Crowd users need to install version 2.9.7, 2.10.3 or 2.11.1 to plug the bug in their system, and all versions of the HipChat server lower than 2.2.2 need the fix.

The company notes that it has already patched its cloud services.

The Struts 2 bug is a zero-day that was under active attack when it was disclosed: a malicious Content-Type value crashed the framework and gave the attacker remote code execution rights.

One of the earliest public victims of the bug was the Canada Revenue Agency, which had its Web server attacked, but took it offline before the attackers reached any personal data.

Atlassian’s advisory is here. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/20/atlassian_admins_your_struts_2_patch_has_landed/

McDonalds India’s delivery app was a golden honeypot

McDonald’s India has ‘fessed up that its app spaffed personal data to all and sundry and has urged users to install an update.

Over the weekend, a post at Medium said the company’s McDelivery app in India was leaking user data through a misconfigured server.

The leaks, disclosed by payment security company Fallible.co, “includes name, email address, phone number, home address, accurate home co-ordinates and social profile links”.

Fallible reckons as many as 2.2 million users’ accounts were at risk.

The post explains that a curl request to the http://services.mcdelivery.co.in/ProcessUser.svc/GetUserProfile API endpoint served up user data without authentication.

Since that endpoint was configured to serve user data without authentication, The Register presumes the app had to be updated so the endpoint could be secured.

McDonalds India gave the usual “value your privacy” explanation and told media outlets financial data like credit card numbers wasn’t exposed – which means only sufficient data to mount a workable identity theft attack was leaked.

Fallible says it first notified McDonalds India of the issue in February, and made the disclosure on March 18 because the company didn’t offer so much as a “would you like fries with that” in response to its approach.

According to The Hindu, a user has already mounted a complaint under India’s data protection laws against the company. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/19/mcdonalds_india_data_leak/

Cisco reports bug disclosed in Wikileaks’ Vault 7 CIA dump

It looks like Cisco won’t be chasing up a partnership with Wikileaks: it’s combing the “Vault7” documents itself, and has turned up an IOS / IOS XE bug in more than 300 of its switch models.

The vulnerability is in the Cisco Cluster Management Protocol (CMP) in IOS and IOS XE. The protocol passes around information about switch clusters using either Telnet or SSH.

The bug is in the default configuration of affected devices, even if the user doesn’t have switch clusters configured, and can be exploited over either IPv4 or IPv6.

It’s a two-fold bug: first, the protocol doesn’t restrict CMP-specific Telnet to local communications, instead processing commands over “any Telnet connection to an affected device”; and second, malformed CMP-specific Telnet options are incorrectly processed.

“An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device”, Cisco’s advisory states.

The bug affects 264 Catalyst switches, as well as 51 industrial Ethernet switches and three other devices, if they’re running IOS and configured to accept Telnet connections.

Until fixes are available, Cisco says Telnet should be disabled in favour of SSH.

Cisco’s advisory doesn’t tell us if it’s aware of exploits using the flaw. If they are discovered, this is very substantial news because The Reg expects there are tens of thousands, if not hundreds of thousands, of these devices installed around the world. And all look to have been at the CIA’s mercy for an unknown period of time. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/19/cisco_goes_public_with_its_first_vault7_response/

Brit firm lands £58m EU spy drone ‘copter contract

A British firm has won a contract with the EU to supply border control surveillance helicopter drones.

Martek Marine boasts that the £58m EU Maritime Safety Agency contract will see its products being used for “border control activities, search rescue operations and monitoring of pollution, as well as the detection of illegal fishing and drug and people trafficking”.

As well as the “compact” drones themselves, Martek will be supplying the pilots, the mission control systems and ground crew.

Its drones are usually deployed from a nearby ship and then beam back live video and unspecified “sensor” data, according to a company statement.

Martek itself does not actually appear to be a drone firm, instead offering various maritime-focused technological ideas such as telemedicine and systems monitoring.

“The chosen specification of drones under the EMSA contract are of compact design, making them extremely manoeuvrable in addition to having the ability to start and land vertically from both shore and vessels,” says its statement. On its website is a picture of an unspecified helicopter drone which El Reg believes is a High Eye HEF 30-series drone, as built by a Netherlands firm.

High Eye’s product page for the HEF 30 series includes details of a tracking antenna with a claimed 50km range, a variety of infra-red sensors and cameras that can be fitted to gimbal mounts, and an off-the-shelf LIDAR system for 3D mapping.

It’s likely that these drones will be used on quasi-civilian ships registered to EU states, particularly in border control operations in the Mediterranean. As the troubled political project makes faltering steps towards building its own armed forces, in the face of an equivocal US commitment to NATO, it makes sense for the wannabe superstate to start acquiring surveillance capabilities that aren’t reliant on member states agreeing to lend them only with limiting conditions attached to their use. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/17/brit_firm_wins_eu_maritime_drone_contract/

Friday security roundup: Secret Service laptop bungle, hackers win prizes, websites leak

Friday is usually a good day to bury bad news and there are a number of stories bubbling under before we all head out for the weekend.

The US Secret Service has admitted that one of its agents’ cars had been broken into by persons unknown, and a laptop was stolen, along with other items. The laptop reportedly contained floor plans for Trump’s New York home, and details of the FBI’s Clinton email server probe, but the Secret Service said that there was nothing to worry about – no classified information was allowed on the machine.

“Secret Service-issued laptops contain multiple layers of security including full disk encryption and are not permitted to contain classified information,” the agency said.

“An investigation is ongoing and the Secret Service is withholding additional comment until the facts are gathered.”

That might be true for now, but over at the CanSecWest security conference in Vancouver the hackers were winning big in its annual three-day Pwn2Own competition. On Thursday, hackers cracked Ubuntu, Adobe Reader, and Safari and netted themselves $233,000.

On Day Two of the competition, another $340,000 was scooped in prize money by hackers taking down Flash, Microsoft’s Edge and Windows operating system, macOS, Firefox, and Apple’s Safari. As part of the competition, software houses get the vulnerabilities, so hopefully the Secret Service has a good update policy.

Finally there were a couple of reported security issues – nothing on the level of JP Morgan, but annoying nevertheless. Social media app Wishbone, which lets people generate their own polls, has been cracked by people unknown and 2,326,452 full names, 2,247,314 unique email addresses and 287,502 cellphone numbers were leaked online.

If you’re concerned that you may be one of the people, you can check online. The database has been added to the excellent Have I been pwned? website, and if you have registered with Wishbone it’s a good idea to change your password anyway.

The makers of the Soundwave app has also had bad news for customers. The app maker, which was bought by popular Spotify last January, reports that if you were an early adopter of the app then you may have some problems.

It appears that a server containing production customer information was used on a test bed system, and that suffered a security breach. User names, email addresses, gender, date of birth and MD5 hashed passwords were exposed, but unless you receive a notification from Soundwave then you’re probably OK.

Have a great weekend and stay safe. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/18/friday_security_roundup/

News in brief: GCHQ hits back in ‘wiretap’ row; Uber still needs humans; Intel call to bug-hunters

Your daily round-up of some of the other stories in the news

GCHQ slaps down wiretap allegations

GCHQ, Britain’s intelligence centre, issued a rare rebuke to accusations that it had helped President Obama wiretap Trump Tower, saying the allegations were “nonsense”.

The allegations were made by an analyst and former New Jersey judge Andrew Napolitano on the Fox and Friends TV network earlier this week, and cited by Sean Spicer, the White House spokesman, in support of the President Donald Trump’s tweeted allegation that Obama had tapped his phones during the election last year.

GCHQ, which otherwise never comments on matters of security, came out fighting, saying: “Recent allegations made by media commentator Judge Andrew Napolitano about GCHQ being asked to conduct ‘wiretapping’ against the then president-elect are nonsense. They are utterly ridiculous and should be ignored.”

Uber likely to need humans for a while yet

Self-driving cars have some way to go before they can do away with the need for a human standing by to intervene, if data from Uber is anything to go by.

Recode obtained an internal test report from Uber, which revealed that while its 43 cars had driven an impressive autonomous 20,354 miles in the week ending March 8, humans had to take over once every 0.8 miles driven.

Reasons for the human taking over included things like the car being bamboozled by unclear road markings, or missing a turn or bad weather preventing the system from working properly.

Bug-hunters, Intel wants you

Bug-hunters, add Intel to your list of vendors who will pay you for finding and disclosing problems with its products.

The processor company has launched a bug bounty programme that will pay up to $30,000 for flaws found in its software, firmware and hardware, with critical vulnerabilities in hardware offering the highest rewards.

Intel said: “We want to encourage researchers to identify issues and bring them to us directly so that we can take prompt steps to evaluate and correct them, and we want to recognise researchers for the work they put in when researching a vulnerability.”

Intel’s web properties, third-party products and its Intel Security products aren’t part of the scheme, which is the first the Santa Clara company has done.

Catch up with all of today’s stories on Naked Security


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/TAzkDJnzEqo/

If Friday’s an 0-day, what about the weekend? [Chet Chat Podcast 260]

Sophos Security Chet Chat – Episode 260 – March 17, 2017

Join Sophos security experts Chester Wisniewski and Paul Ducklin for the latest episode of our regular security podcast.

In this episode

If you enjoy the podcast, please share it with other people interested in security and privacy and give us a vote on iTunes and other podcasting directories.

Listen and rate via iTunes...
Sophos podcasts on Soundcloud...
RSS feed of Sophos podcasts...


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/tJ7n2i6Uato/

If Friday’s an 0-day, what about the weekend? [Chet Chat Podcast 260]

Sophos Security Chet Chat – Episode 260 – March 17, 2017

Join Sophos security experts Chester Wisniewski and Paul Ducklin for the latest episode of our regular security podcast.

In this episode

If you enjoy the podcast, please share it with other people interested in security and privacy and give us a vote on iTunes and other podcasting directories.

Listen and rate via iTunes...
Sophos podcasts on Soundcloud...
RSS feed of Sophos podcasts...


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/tJ7n2i6Uato/