There I was at an information security expo. Information security silver bullets is a booming business. There are several of these a year in every major metro. They’re day-long, or multi-day events, with dozens of vendors and multiples more attendees. The number of risks, threats, tips, tricks, secret weapons, silver bullets, products, and services represented and featured is overwhelming.
The breadth of offerings is mind-boggling. Some are nearly identical, and some claim to be the one big thing — all you need. In the fine print, most only work with a specific subset of your business, and they conveniently fail to recognize you have both Windows AND Linux systems in operation.
The number and breadth of information security professional certifications is equally amazing, and most require continuing education. Attendance at pitch-fests and vendor sales demos may be counted as continuing education.
On the surface, it seems if we are able to identify and assemble a portfolio of these secret weapons and silver bullets, all will be well. To realize the dream, we then must install and configure them correctly, monitor and manage them, upgrade and patch them, build and sustain business processes to do these things, and continue to fund and continuously improve them. Easy, right?
This Is Hard
In reality, businesses buy enterprise solutions like the above with gusto. While budgets still apply, the cost of many of these products and services through modern pricing schemes is actually pretty small and reasonable. The thing is, it’s way easier to license a solution or buy a product than it is to consistently do all the “easy” things in the paragraph above this one. We license the product. Heck, we may even have or hire a bright staff member who knows how to use it and is willing to take on implementation and ownership. We may even double up and pay for some training, or hire the vendor to help install, configure, and transition management to the internal owners — due to budget, time, and staffing constraints, this works better some times than others.
In the end, all the standard constraints apply.Often, the full set of product features is not implemented due to time or staffing constraints. The list of opportunities, features, and business requests is far longer than the team can implement in any given business cycle. Staff will turn over and rarely hands off the program fully to their replacements. Budgets commonly require functional managers to cut cost annually and “do more with less”. Corners are cut — temporarily. Temporary corners become a list of projects to be done over a business lull or holiday “slowdown”, which never comes. Project lists become risks reported to senior managers. Risks become budget requests.
At least we can tell the auditors we have the product installed. Maybe they won’t ask any more questions. If they do, we’ll take an audit finding, then put the work in our budget request for next year.
Hopefully we won’t have a major security incident. Well, if we do, at least we can say we did something beforehand.
Consider And Act
- What silver bullets have you or your company acquired?
- If you own a silver bullet, are you realizing all the value you envisioned?
- What is necessary to increase ROI?
- If you had to do it all over again, what would you do differently?
Also published on Medium.