Information Security News
Cyberattacks getting bigger, more frequent
Hackers penetrated the computer systems of JPMorgan Chase & Co., the country's largest bank, stealing names, email addresses, postal addresses and phone numbers over the summer of 2014. The theft of personal information from 76 million households ...
A long time ago I was given advice from a non-security professional that is among the best and most influential I have received in my security career - Get wisdom as cheaply as you can. I was encouraged to learn from the mistakes of others as a means to avoid the full pain of what they were forced to experience.
There are so many places where you can get your lessons learned without having to suffer through an outage or a security incident. You can learn from news articles or breach disclosure reports such as the Verizon Data Breach Investigations Report(http://www.verizonenterprise.com/DBIR/) and Mandiant M-Trends (https://www.mandiant.com/resources/mandiant-reports/). Create case studies based on these sources that your incident response team can use to conduct tabletop exercises. This preparation exercise will help you determine if your prevention and detection capabilities would be effective if faced with these scenarios
To get you started, here is an example when I failed. I thought it would be a good idea to scan a special internal network segment unannounced with unauthorized equipment. This caused a full and unplanned incident response. I discovered what happened and quickly notified the team of what I did and how sorry I was for causing thisincident. Most everyone was gracious and everyone was relieved this was not a real incident. I have not forgotten this lessonand have since put checks in place to make sure it does not happen that way ever again. In addition to learning to only use authorized scanning equipment, I learned the importance of notifying all impacted system and application owners before performing any scans.
Learn from the misfortunes of others. By getting wisdom as cheaply as you can, you are given the opportunity to not have to learn the hard way. What lessons have you learned and how have you applied them? Feel free to share using our comments section.
securityeverafter at gmail dot com