PCI Engagement vs. PCI Compliance


Engagement vs. Compliance
Compliance is often necessary and in certain circumstances it is required. This article isn’t trying to imply otherwise, or trying solve the complex compliance and regulatory debate on every issue. This article is about the power of words and the fact that how you say something definitely matters. It encourages thinking and approaching things related to Information Security differently.
The word compliance has all kinds of negative connotations that can by its very nature turn people off from doing the very thing that the word attempts to accomplish.
The definition of compliance according to Dictionary.com (paraphrased)
1. “The act of conforming.” 2. “Yield especially in a weak and subservient way. “
3. “Conformity”

Daniel Pink, in his book “Drive, the surprising truth about what motivates us” touches on this simple yet amazing phenomenon. Many of these ideas in this article are gleamed from this book, which is highly recommended reading. See this article for a brief explanation. http://enviableworkplace.com/motivation-3-0-%E2%80%93-from-compliance-to-engagement/
Pink’s research found that “50% of employees are not engaged at work and 20% are actively disengaged and the cost of all this disengagement amounts to about $300 billion a year in lost productivity.” Why build an Information Security program around a word that by it’s own definition, encourages disengagement. People will do the bare minimum and will be disengaged. Productivity will have a strong potential to decrease using this approach. I believe the engagement approach will not only allow all the compliance requirements to be met, but will create a much more secure environment. I also believe it will actually “motivate” staff to be more excited about integrating security measures into their day to day activities and responsibilities, which will benefit the organization greatly, saving time and money.
Another important point is PCI Compliance alone doesn’t equal security. Organizations “like 7Eleven, Hannaford Brothers and Heartland Payment Systems all experienced breaches, while they were PCI compliant but they still had a huge SQL injection vulnerability that was exploited by the attacker to gain access to over 130 million credit cards.”
This is evidence that compliance doesn’t necessarily equal good security. While that is the reality, it is still often required and necessary to do. As Security Professionals, we have to be careful not to ignore regulatory compliance all together as it is not going away anytime soon and it would be irresponsible to ignore it. If anything it is getting more prevalent in all sectors across the board, even including the non-profit organization. The problem is making compliance the ultimate goal. The goal should be “engagement of all stake holders” to “own” their part and see the benefit of following through on and embracing security initiatives because it will ultimately benefit them and the organization.
This model has a greater potential to exceed compliance requirements, will cost less, will enhance the business and will increase security at the same time.

Persistence + Excellence = Amazing

I saw this at Walt Disney World recently and it gives a brief glimpse into the type of person he was.

We can learn a lot from this quote. I am going to try to dissect it a little and explain what I got from it:

First, he says you have to "Get" a good idea. This means consciously contemplating ideas that haven't been done before, or haven't been done in a particular way. This is proactive thinking out of the box.

Second, he says to "stay with it, dog it, and work at it until it's done". This is simply finishing what you start, when you get a dream or a vision, be sure to stick with it until it is done! This is proactive acting out the box.

Thirdly, "and done right". Walt Disney was an example of a man who strived for excellence. It's not enough to just get stuff done, we all can do that. The difference is in doing things "right"! This is proactive excellence!

We can all learn from Walt's example. Be purposeful today!

Ghost in the Wires (Kevin Mitnick) Review

I recently finished Kevin Mitnick's new memoir book "Ghost in the Wires" and was very pleased with it!

Not only do I think that it could make an excellent "Catch Me If You Can-esque" type of movie, but it showed that information security is very difficult when you are up against someone who is skilled at using Social Engineering tactics to exploit arguably the weakest link in the information security chain - people.

One of the best hacks included in the book is when Kevin M. Social Engineers his way to talk to another high profile convicted hacker Kevin Poulson who is serving time in a high security prison. He calls him on the Attorney-Client privileged phone line in the high security prison while Kevin M. is still a fugitive on the run! I won't go into how he pulled this off, but it was pretty dang slick!

Reading this book, made me want to focus more on training people, rather than getting caught up in all the technical counter measures. Don't get me wrong, the technical side is still very important, but all the technical countermeasures in the world don't mean anything if someone can Social Engineer a privileged user to give them their user and password information.

So many Info Sec Professionals focus on zero day exploits, firewalls and IDS. Again, I want to stress that I'm not saying that those things are not important and necessary, but so often Info Sec Pros pay less attention to training the end users on best practices and different innocuous ways that someone can skillfully gather critical information from them. I think training people has the potential to yield better long term Information Security program success.

This real world memoir of the world's most wanted hacker shows that Social Engineering is probably still the biggest threat to information security and organizations around the world.

You can pick up Kevin's book at http://www.amazon.com/Ghost-Wires-Adventures-Worlds-Wanted/dp/0316037702 


Here is a link to read some excerpts from the book. 



Rethink what you thought you knew about Password Security

I saw this on xkcd.com recently and think it really makes sense. If a password is going to be cracked it will most likely be done by a machine, yet "we have been trained to make passwords that are difficult for humans to remember and easy for machines to guess".

I think it's time for people to start thinking differently and use "pass-phrases" instead of passwords. This will also require developers of websites/applications/etc to not have a limit of length on their passwords and not require all the funky symbols and punctuation that gets us confused and doesn't necessarily make us more secure.

Here is the link to the original website that had this comic. http://xkcd.com/936/