Infosecurityprofessional Novdec2016
Infosecurityprofessional Novdec2016
InfoSecurity
PROFESSIONAL
A Publication for the (ISC)2 Membership
NOVEMBER/DECEMBER 2016
WHAT LIES
BENEATHThe Shadowy Side of IT
See graduation rates, median student debt, and other information at www.capellaresults.com/outcomes.asp.
DEPARTMENTS
4 EDITORS NOTE
What Kind of
Information Security
Professional Are You?
BY ANNE SAITA
6 EXECUTIVE LETTER
(ISC)2 Examinations to
Carry More Weight
BY DR. CASEY MARKS
8 FIELD NOTES
Americas ISLA winners
announced; top-paying IT
There are numerous ways
jobs in 2016; cheers for
budget. PAGE 21
FEATURES
14 MEMBERS CORNER
Why Your Legacy
Network IDS/IPS
Needs to Be
TECHNOLOGY Replaced NOW
27
BY RODRIGO CALVO
CENTER POINTS
Raising Awareness,
Scholarships and
PROFESSIONAL DEVELOPMENT Opportunities for
21
Future Cybersecurity
Its Not Just Who You Know Professionals
or maybe it is. Expand your professional potential by building a BY PAT CRAVEN
Personal Learning Network. BY KERRY ANDERSON
28 5 MINUTES WITH
Tushar Gokhale
PROFESSIONAL DEVELOPMENT
The Mumbai, India,
InfoSecurity Professional is produced by Twirling Tiger Media, 7 Jeffrey Road, Franklin, MA 02038. Contact by email: [email protected]. The information contained
in this publication represents the views and opinions of the respective authors and may not represent the views and opinions of (ISC)2 on the issues discussed
as of the date of publication. No part of this document print or digital may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any
form by any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose, without the express written permission of (ISC)2. (ISC)2,
the (ISC)2 digital logo and all other product, service or certification names are registered marks or trademarks of the International Information Systems Secu-
rity Certification Consortium, Incorporated, in the United States and/or other countries. The names of actual products and companies mentioned herein may
be the trademarks of their respective owners. For subscription information, please visit www.isc2.org. To obtain permission to reprint materials, please email
[email protected]. To request advertising information, please email [email protected]. 2016 (ISC)2 Incorporated. All rights reserved.
RE TURN TO
InfoSecurity Professional 3 November/December 2016 CONTENTS
Editors Note
WHAT KIND OF INFORMATION (ISC)2 MANAGEMENT TEAM
SENIOR MANAGER,
SECURITY PROFESSIONAL ARE YOU?
O
MEMBERSHIP MARKETING
AND MEDIA SERVICES
Jessica Hardy
727-785-0189 x4063
[email protected]
F ALL THE EXCELLENT advice delivered during a Security EXECUTIVE PUBLISHER
Congress session on building and retaining security teams, Timothy Garon
the piece that stood out most to me came from Deidre 508-529-6103
[email protected]
Diamond, founder and CEO of Cyber Security Network.
Her secret tool to hold on to good employees: kindness. SENIOR MANAGER,
CORPORATE COMMUNICATIONS
Its the number one thing that everyone wants from an employer, Diamond
Maria Forrest
says in an abbreviated transcript of the session published online. 727-201-5759
If kindness is all it took to keep top talent, youd think no one would leave. [email protected]
But, it turns out, compassion and consideration become more scarce as people MEDIA SERVICES COORDINATOR
rise in rank. UC Berkeley psychology professor Dacher Keltner discovered that Michelle Schweitz
as people gain power or privilege, they are less likely to demonstrate empathy, 727-785-0189 x4055
[email protected]
collaboration and openness toward othersnot just in politics and professional
sports, but in the workplace too. SALES TEAM
How can you tell if you practice empathy, gratitude and generositythree
EVENTS SALES MANAGER
cornerstones of kindness? Consider your own behavior toward your colleagues Jennifer Hunt
and direct reports. Studies show that people in position of corporate power are 781-685-4667
three times as likely as other employees to interrupt [email protected]
coworkers, raise their voices, and say insulting things REGIONAL SALES MANAGER
at the office, Keltner writes in the October issue of Lisa OConnell
781-460-2105
Harvard Business Review.
[email protected]
And the result? In a recent poll of 800 managers
and employees in 17 industries, about half the respon- EDITORIAL ADVISORY BOARD
dents who reported being treated rudely at work said Carlos Canoto South America
they deliberately decreased their effort or lowered the Tushar Gokhale U.S.A.
quality of their work in response, Keltner reports. Javvad Malik EMEA
This gives credence to Diamonds recommendation J.J. Thompson U.S.A.
and should serve as a warning to anyone in, or seeking, Elise Yacobellis (ISC)2
a senior-level position, today or 10 years from now. If you
arent already, learn how to listen earnestly to others. TWIRLING TIGER MEDIA
Deliver thoughtful thank yous. Acknowledge good EDITORIAL TEAM
Anne Saita, editor-in- EDITOR-IN-CHIEF
work and those who did it. Give praise generously
chief, lives and works Anne Saita
in Southern California. (and genuinely).
[email protected]
She can be reached at Do this for both your present you and your future
[email protected]. you. After all, as the famous saying goes, Be nice to ART DIRECTOR & PRODUCTION
Maureen Joyce
those you meet on the way up, for they are the same [email protected]
people youll meet on the way down.
MANAGING EDITOR
ANNE SAITA Deborah Johnson
PROOFREADER
Ken Krause
Rob Andrew Photography
ADVERTISER INDEX
For information about advertising in this publication, please contact Tim Garon at [email protected].
Twirling Tiger Media is
Capella.................................................................... 2 (ISC)2. ....................................................................12 certified as a womens
business enterprise by the
RSA.......................................................................... 5 Center for Cyber Safety & Education............13 Womens Business Enterprise
National Council (WBENC).
(ISC) . ..................................................................... 7
2
(ISC)2. .................................................................. 20 This partnership reflects (ISC)2s commitment
to supplier diversity.
Pearson...................................................................9 Twirling Tiger Media........................................ 29 www.twirlingtigermedia.com
RE TURN TO
InfoSecurity Professional 4 November/December 2016 CONTENTS
ATTEND RSA
CONFERENCE 2017
FOR LESS!
(ISC)2 EXAMINATIONS
TO CARRY MORE WEIGHT
RE TURN TO
InfoSecurity Professional 6 November/December 2016 CONTENTS
Member Benefits
Are you getting the most out of your (ISC)2 membership? Whether you are looking for CPEs to
maintain your certification, avenues to network with your peers, or resources to help you stay on
the cutting edge of information security, your membership provides these benefits and more.
VIEW BENEFITS
www.isc2.org/member-benefits.aspx
Member Discounts
(ISC)2 continues to strive to partner with industry leading organizations to deliver discounts to
provide more value to your membership. These help you stay relevant in your career, introduce
you to the top resources, and help you save money and time.
VIEW DISCOUNTS
www.isc2.org/member-discounts.aspx
FIELD EDITED BY DEBORAH JOHNSON
T
Shekhar Bose,
president of the
HE SIXTH ANNUAL Americas Information Security Leadership (ISC)2 Bangalore
Awards (Americas ISLA) were presented at the 2016 (ISC)2 Security Chapter in India,
Congress in Orlando. Americas ISLA, part of (ISC)2s Global Awards died unexpect-
Program, recognizes the achievements of outstanding cybersecurity edly on Sept. 3,
professionals who have led a workforce improvement initiative, program or proj- 2016.
ect in Central, North or South America. An (ISC)2
Jim Davis, the creator of Garfield, provided the keynote address during a ban-
member since
quet ceremony. Garfield, the iconic cartoon cat featured in the Garfield & Friends
June 2007, Bose
series, is the spokescat for the Center for Cyber Safety and Educations Safe and
was the founding
Secure Online program.
president of the
We are excited to honor the Americas ISLA recipients once again this year,
says (ISC)2 CEO David Shearer. These professionals are advancing our industry Bangalore Chapter. With his and
and truly making a difference in the cyber world. the chapter officers efforts, the
The 2016 Americas ISLA winners are: Bangalore Chapter grew from 43
members in 2014, to 63 mem-
Senior Information Security Up-and-Coming Information bers in 2015. In an interview for
Professional Security Professional the March Chapter Connections
Diego Andres Zuluaga Urrea, Jennifer Chermoshnyuk, Paralegal, online newsletter, Bose spoke of
Information Security Officer, Davis Wright Tremaine LLP (U.S.A.) wanting to increase the chapter ac-
ISAGEN S.A. (Colombia) PROJECT: Continuing Legal tivities by providing more member
PROJECT: Colombian Energy Education Program benefits to the local community.
Sector Cyber Security Improvement His energy and enthusiasm will be
Community Awareness greatly missed.
Information Security Practitioner Sandra Toner, Senior Technical He is survived by his wife and
Mack Bhatia, Senior Practice Specialist, ICF International (U.S.A.) daughter.
Director, Enterprise Integration PROJECT: Online Cybersecurity
(U.S.A.) Awareness Tools
PROJECT: Enterprise Integration
CPEs
SOC 2 and SOC 3 Compliance For more information on the Americas ISLA
program, please visit www.isc2.org/aisla.
RE TURN TO
InfoSecurity Professional 8 November/December 2016 CONTENTS
100% Online Master of Science in Cyber Security
ONLINESECURITY.MARYVILLE.EDU/STARTTODAY
FIELD NOTES
RE TURN TO
InfoSecurity Professional 10 November/December 2016 CONTENTS
FIELD NOTES
9
PITTSBURGH HIGH SCHOOL
STUDENTS TACKLE THE
DARK SIDE OF CYBER
Highest
Paying
IT Jobs
(2016)
Pittsburgh-area high school students participate
in a kinetic exercise assisting a U.S. Navy Seal
team in a hostage rescue operation.
Cloud computing
Average Annual
Salary (USD)
$115,826
attacks, malware, and its cousin, ransomware. They learned how to protect
IT architecture $113,499
computer systems using the latest Windows and Linux security tools and
techniques and state-of-the-art network simulators. IT security $104,949
(ISC) board member Dave Kennedy from the security firm TrustedSec spoke
to the teens about his early days of hacking. Business
For the hostage rescue exercise, students, assisting a Navy SEAL team, hacked technology $101,663
into the power grid and disabled the building lights where hostages were, and Java developers $99,763
at the same time defended their drone infrastructure from attacks, all the while
providing cyber support for the SEALs. Project/program
The competition event, co-hosted for the second year by SEIs CERT Division, management $98,607
featured US$1,500 in prizes provided by TrustedSec.
Data warehousing/
This competition reflects the commitment of the SEI, (ISC)2 and TrustedSec
business
to providing opportunities for STEM education and experiences to young people,
intelligence $93,522
said Chris May, technical director of the workforce development team in the SEIs
CERT Division. Events like these help address a gap in teen education and inspire Business
the next generation of cybersecurity professionals. application
Jonathan Frederick, cybersecurity exercise developer for the SEIs CERT development $92,037
Division and vice president of the Pittsburgh Chapter of (ISC), added, Since
its inception, our chapters primary focus has been to provide outreach to the Voice engineering $91,489
Pittsburgh region. IT security professionals from businesses throughout the area
Source: 2016 IT Skills and Salary Survey
collectively realize the importance of educating our successors. Global Knowledge, http://images.globalk-
For more information on this event visit http://isc2chapterpittsburgh.com/, nowledge.com/wwwimages/pdfs/2016_
https://www.trustedsec.com/, http://www.cert.org/. SalaryReport.pdf
RE TURN TO
InfoSecurity Professional 11 November/December 2016 CONTENTS
FIELD NOTES
MEMBERS
Download Your
Certificate DIGITALLY
Download my certificate
RE TURN TO
InfoSecurity Professional 12 November/December 2016 CONTENTS
www.isc2cares.org
Its easy to see that teachers, librarians, and media specialists need more quality
information and resources to address cyber safety in the classroom and at school!
We believe everyone has the right to access the internet without fear of compromising
their safety or identity. However, in the Centers 2016 study of children grades 4-8 we
found a few alarming results:
62%
Went to adult
40%
websites after Have connected with
a search or chatted online with
strangers
11%
programming online Met a stranger
in person after
meeting online
49%
Are online at 11pm
or later on school
nights
RE TURN TO
InfoSecurity Professional 14 November/December 2016 CONTENTS
TECHNOLOGY
WHAT LIES
BENEATH BY JAMES HAYES
RE TURN TO
InfoSecurity Professional 16 November/December 2016 CONTENTS
Shadow IT Security
Management To-Do List
ing that they can only get answers when they ask the right
questions, [so] they are now asking their business leaders
[directly] about IT that is happening outside of normal
channels.
These communication shortfalls do not, of course, nec-
essarily mean that certain shadow services buyers are also
procuring their own security solutions: 52 percent of 1,200
business surveyed in an April 2016 report on cloud security
by Santa Clara, Calif.-based Intel Security still expect IT
to secure their unauthorized department-sourced cloud
services.
CONFLICT OF INTERESTS?
A further complication is the possibility that a cloud Ascertain the degree of understanding of
service provider is working at the same time both over shadow IT risk at C-suite level, and ensure
the counter with a clients IT department and under the that senior executives have access to guid-
radar with separate business unit contacts. ance that informs both sides of the pro/anti
The scope for confusion is obvious, says Skyhigh arguments.
Networks Hawthorn. Some cloud providers business
models include promoting a free service to users, after Ensure that any recommendations or proofs
provided in favor of shadow IT are balanced
which they approach the users IT departments to show
against reliable and quantifiable informa-
them how many users they have, in an effort to justify it
tion about verified security risks, and are
becoming a paid service.
set forth in the broad context of possible
Having two or more routes to market can muddle outcomes in the event of a problem.
matters, potentially leaving the company to pay for more
licenses than it requires, Hawthorn warns. Review enterprise IT procurement policies
Some of the more dangerous shadow IT scenarios to identify any causes of delay that could
we have seen have involved business leads creating their be eliminated, providing end users with
own internal application development teams, and launch- a valid excuse for localized IT purchase
ing apps in cloud-hosting environments with little or no decision-making.
involvement by the IT department, says Ben Desjardins, Ensure that standard IT procurement pro-
a Washington, D.C.-based security solutions director at cedures are communicated throughout the
Radware. Some will even argue that SaaS providers may enterprise, eliminating any possibility that
be better at securing data than their organizations own IT shadow IT consumers can claim that they
team. had not been made aware of official proce-
Desjardins point underscores the fact that enterprise dure toward new product acquisition.
shadow IT is not confined to business workgroups; indeed, Develop enterprise IT procurement policies
according to a 2013 report from Frost & Sullivans strate- and guidelines that contain provision for
gic forecasting practice, Stratecast, IT staffs use a higher end-user requests for non-standard tech-
number of non-approved SaaS applications than their col- nology to be speedily brought under full
leagues. It appears that, in acting as the guardian of corpo- consideration by the information security
rate technology, the IT department considers itself exempt, function.
writes report author Lynda Stadtmueller at Stratecast.
Communicate information about potential
security risks of unauthorized IT procure-
KNOW THE RISKS ment, supported by examples and by com-
mentary from directorate heads in the legal,
It is important when seeking insight into degrees of shadow
financial and governance departments.
IT risk to distinguish between the liabilities of shadow IT
per se, and those liabilities arising as a direct consequence James Hayes
of shadow IT deployments, says Contexts Wright. The real
challenges that shadow IT raises, such as lack of control
RE TURN TO
InfoSecurity Professional 17 November/December 2016 CONTENTS
over system configurations and failures in asset manage- example, an organization might have fully aligned to the
ment, are common information security manager worries. Microsoft stack, including .NET web applications, based on
Michael Hack, SVP EMEA operations at Ipswitch, Internet Information Services and SQL server hosted in the
based in Lexington, Mass., has no doubt that shadow IT is Azure cloud infrastructure, Wright explains. If a [busi-
a significant and persistent risk for information security ness] team were to deploy an application based on PHP,
management, but is one that is often underplayed because MYSQL and Linux into an Amazon AWS environment, they
it is seen as a creeping problem [that] does not impact on would then need to manage an entirely different stack of
the business in the same dramatic, headline-grabbing way technologyand all of the complexity involved.
that a debilitating virus or major data breach does.
Theres an element of reverse polarity at play here,
Hack suspects, because market studies have indicated that
internal threats arising from human error or misjudgment If a [business] team were
(and many would regard shadow IT activity as such) remain
at the top of the list of cybersecurity headaches for orga-
to deploy an application
nizations of all types and sizesand indeed pose a more
acute threat than external menaces such as viruses and
based on PHP, MYSQL and
intrusive attacks. Linux into an Amazon AWS
Shadow IT apps are [usually] installed with the best
of intentions, and a desire to improve business efficiency, environment, they would
Hack says. This means they are not ranked as highly on
the information security risk scale as Trojans, for instance,
then need to manage an
or other kinds of malware. But their risks are potentially
as devastating, particularly when it comes to a companys
entirely different stack of
ability to comply with constantly changing data privacy and technologyand all of the
protection laws or to thoroughly encrypt its data.
complexity involved.
MICHAEL HACK, SVP EMEA operations, Ipswitch
THE DANGERS LURKING IN THE SHADOW
The adverse impacts of a security incident arising from a
shadow IT deployment can be generally assigned to three Should the respective business team move on, respon-
groups. The possibility that shadow IT could provide an sibility for this can fall back to the core IT department,
entre to external cybersecurity threats is, of course, a crit- resulting in systems where no one within the organization
ical concern, but ways in which proliferating, unsanctioned has the technical capability to manage them, Wright says,
technology might introduce additional security-related and where existing data security standards, processes and
problems also need to be factored into any risk assessment. policies cannot be applied, (because) they are tailored for
a different platform: Thus, an upfront saving in time and
1. Endangering the System money to deploy quickly can lead to significant ongoing
Best IT management practice is about ensuring that opti- expenses further down the line.
mal performance value is derived from IT assets in order
to maximize returns on investments (ROI). Any factors 2. Challenging Security Regulations
that put technological well-being at risk and hamper IT Shadow IT can negatively impact regulatory compliance
management should necessarily be regarded as threats to and legislative requirements that all businesses are now
infrastructural stability and performance, some systems subject to. In Europe, the impending European Commission
experts believe. General Data Protection Regulation (GDPR) intends to
Use of non-approved software can have a number strengthen and unify data protection for people within the
of adverse effects on the network [it runs over], says European Union. It also addresses export of personal data
Ipswitchs Hack. [Such software] can consume a large outside the EU, so it will affect companies and other orga-
amount of bandwidth, for example, which in turn slows nizations around the world.
down the network, and can cause compliance and data
sharing issues. 3. Creating Breach Opportunities
Shadow IT at its most unrestrained can result in The possibilities of breaches of IT systems, resulting in
unmanageable systems, warns Contexts Wright: For infiltration of an enterprise computing resource, data theft,
RE TURN TO
InfoSecurity Professional 18 November/December 2016 CONTENTS
denial or impairment of service, and the installation of that might have no direct touch on the main enterprise IT
malware (such as ransomware) are well known. A high systems.
proportion of cloud apps have been found to be not enter- Cloud services make it harder to discover unofficial
prise-ready, lacking the baseline security, audit and certi- systems associated with a company as they often do not
fication capabilities required for workplace use. Unsecured reside within the companys own network space, says
applications could be used for months without the employ- Wright, making it harder to discover using common
ees who set them up being aware that their cost-effective inventory management or network scanning processes
self-sourced application has been compromised from day and tools.
oneeven the details of the credit card they used to make RES Softwares Buchanan agrees. Based on conversa-
the purchase online have likely been filched. tions we have with customers, it is becoming increasingly
A data breach resulting from a shadow IT instance will difficult for security professionals to discover and keep
result in financial liabilities affecting the organizations track of the shadow IT usage in an organization. This is
bottom line, warns Gartners Brian Lowans: Liabilities can largely due to the [the closer coupling of] cloud and mobile,
be very large due to a mix of costs that include notification as individuals, and indeed department leads, can now easily
penalties, auditing processes, loss of customer revenue, go to a cloud service and leverage their tools and services.
brand damage, security remediation and investment, and Adds Ipswitchs Michael Hack: Monitoring shadow IT
cyber-insurance. deployment and use on corporate networks is [now] one
of the main reasons that infosecurity professionals need a
fully integrated and multifunctional network management
WHO IS RESPONSIBLE FOR tool.
THE SHADOWS RISKS? Network monitoring tools that can help safeguard the
The question remains: Who takes the flak when shadow networks performance, monitor the availability of appli-
is at fault? If a business team has ignored company cations and prevent misuse, continue to evolveand even
processes in order to deploy systems in contravention of advance into the realms of bots, artificial intelligence and
company policy, then its likely they will bear the brunt of machine learning. But right now, network-monitoring solu-
any immediate fallout, suggests Contexts Wright, but tions that make use of advanced visualization technology
any resulting data breach is a problem for staff across an are already coming onto the market. The best of these solu-
organization. Information security will likely end up tions can intuitively map the user experience directly to the
having to find time to deal with the outcome in either case, environment that the IT team originally created, allowing
distracting them from scheduled work that might be of team members to easily understand irregularitiessuch as
greater importance. shadow IT deployments.
The risks of shadow IT are quantifiable: the risk of Corralling shadow IT into a more managed context
breach, of noncompliance, of IT failure, of lack of control, calls for revised terms of engagement between the business
says Nathan Dornbrook, CTO at Glasgow, U.K.-based ECS. and the IT team, suggests David Emm, principal security
The risks of not using shadow IT are also quantifiable researcher at Kaspersky Lab based in Woburn, Mass. One
cost and time[the difference being that] these risks can of these could include new reciprocal ground rules designed
be managed. Ultimately, business risk is owned by the to get the message across that security policies have a
business, not by IT, so violators of these policies need to be critical purpose, and exist to protect all staff from threats
handled by the business. of which they probably have limited comprehension.
In todays business world we have always-on staff
conducting business with an assortment of devices and
ITS OUT THERE SOMEWHERE solutions, Emm says, so businesses must be able to apply a
How big of a problem is shadow IT? How widespread is security wrapper around each employeewhatever device
its use? How can it best be managed? These questions they use and wherever they work. To do this, the informa-
and more pose a challenge to information security profes- tion security team must be able to see what is being done,
sionals seeking to introduce better security management manage staff and devices throughout the organization, and
over shadow IT. Up until now, IT managers could detect protect corporate datawherever its held.
evidence of use of unauthorized cloud apps and service
through usage pattern alerts, email monitoring and traffic
logs. But it is getting harder for IT to detect the use of rogue JAMES HAYES is a freelance writer based in the United Kingdom.
SaaS, as shadow-minded users have become more covert His first feature on car hacking appeared in the January/February
especially given the increase in mobile enterprise platforms 2016 issue.
RE TURN TO
InfoSecurity Professional 19 November/December 2016 CONTENTS
Have confidence
in your cloud security knowledge.
Become a CCSP and lead your organization to the cloud.
TION MA
I CA GA
IF
RT
ZI
2016
NE
CE
TOP CERT
CCSP tops The Next Big Thing list as
CCSP the #1 certification survey respondents
plan to earn in 2016
H
G
T
E
NE H IN
XT BIG T
brought
Copyright 2016 (ISC) Inc. All Rights Reserved.
PROFESSIONAL DEVELOPMENT
WHO
ITS NOT JUST
YOU
KNOW
RE TURN TO
ILLUSTRATION BY ROBERT PIZZO InfoSecurity Professional 21 November/December 2016 CONTENTS
constantly attempting to control the proliferation of poten- in your field. For some, this might mean expanding beyond
tial insecure technology implementations, such as cloud their normal comfort zone and putting more of themselves
storage or BYOD, without appropriate controls or policies out thereby commenting on blog posts or articles, and
in place. attending more networking events. It all begins with estab-
Most of us already have a means of finding expert advice, lishing your professional presence, both in the physical and
whether through publications, social media or conferences. virtual worlds.
But how many of us have actually established bona fide
plans to build and nurture a professional network that incor- Participate in local professional organizations. Attend
porates the most popular ways of connecting with peers? local chapter meetings or events of professional associations
several times annually at least. Monthly meetings are often
free or low cost. Events frequently offer member discounts.
WHOS IN YOUR PERSONAL NETWORK? Get there early to network with peers, and stay for optional
Many cybersecurity practitioners face challenges to their post-event activities when possible.
professional development, most commonly the cost of Make it a point to carry an ample supply of business
materials and outside training and the time away from the cardsone from your current employer, and one with a
office or home. A Professional Learning Network (PLN), more personal touch that includes your personal mobile
also referred to as Personal Learning Network, can provide phone number and email address, as well as any relevant
development opportunities close to home and at minimal social media profile links. Building a PLN is a lifetime
(if any) cost. investment in your career, so consider what you want to
Practitioners design their PLN to achieve a goal: become do well beyond your current position and use the personal
better at what they do, or what they want to do. Social business cards if your employer has strict rules for email
media tools, such as Facebook, Twitter and LinkedIn, let and internet use done on company time. The bonus to these
(ISC)2 members connect with other professionals who inexpensive personal business cards: the contact informa-
share a common interest or passion in cybersecurity, and tion typically stays current even if you change jobs.
exchange ideas and possible collaborations. Additionally,
we have former classmates, current and past coworkers, Develop your social media profile. First, make sure
and members of professional organizations that we can con- your chosen social media profile is easy to find via an
tact on a somewhat regular basis. And thats importantto internet search using just your name. Dont skimp on the
nurture a network, you need to keep in touch, though descriptions sections. Your social media profile can be the
frequency rates may vary. equivalent of the elevator speech, essentially a 30-second
This brings up an important pointand distinction for promotion about you. People form an instant impression
those formally creating a PLN versus just becoming more based on what, and how much, information you provide. It
social. We learn from exchanging new ideas, knowledge is a good idea to invest in a professional photo and a fully
and different attitudes that stimulate learning and profes- developed profile by listing relevant experience, certifi-
sional growth. It is not a one-way relationship. An enduring cations, education and other accomplishments, such as
PLN requires communication and assistance flow in both publications where youve contributed. LinkedIn features a
directions. If a practitioner fails to return support to others profile strength-rating system that can be used as a model
within their PLN, members of the PLN may become reluc- when assessing your profiles on other social media sites.
tant to engage in the relationship in the future.
Blog. If you are a proficient writer, consider creating a
blog. Blog posts can be short pieces on a timely topic that
LOADING THE PLN interests you, and are an excellent way to both develop and
Designing a PLN requires a customized approach. It is display your expertise. Great blog posts can grab others
essential to diversify the composition of a PLN. The prac- attentions and be shared via Twitter, Facebook, LinkedIn,
titioners might seek out potential contacts across many and other popular social network platforms.
specializations, including relationships with individuals in
cybersecurity-related disciplines and other fields, such as Contribute articles to publications. If writing is your
education and human resources. Sometimes the best way to passion, consider submitting an article to a professional
learn from others is to engage others whose industries are associations magazine, newsletter or peer journal. In
not in competition. addition to publishing your piece, these publications also
There are a variety of tactics to build a core PLN under typically allow you to include your blog or personal website.
the overarching strategy of better connecting with experts Every publication has its own writer guidelines, so be sure
RE TURN TO
InfoSecurity Professional 22 November/December 2016 CONTENTS
LEARN MORE
Personal Learning Networks are not new, but they
are an emerging concept among technologists after
years of development by formal educators. Here
are some online resources to get you started on
to review those before you submit a work. building a robust roster of e-learning opportunities:
RE TURN TO
InfoSecurity Professional 23 November/December 2016 CONTENTS
PROFESSIONAL DEVELOPMENT
Playing by the
BOOK
HOW AN (ISC)2 MEMBER CREATES CHILDRENS
BOOKS ALSO MEANT FOR THEIR ELDERS. BY CHRIS GRECO
CYBERSECURITY CAN SEEM relatively complex to children. But this convenience comes with risks, from privacy
I know from experience that our youngest members of intrusions to identity theft, cyberbullying and even extor-
Photograph: Thinkstock
society view technology from a convenience standpoint tion. That is the reason childrens books on cybersecurity
being able to connect with others, or collect information are both wanted and warranted in this age of cyber first,
at the touch of a button. This is a generation of texters, not consequences second.
talkers, who rarely use a smartphone to actually make a As an author of a series of childrens books on cybersecu-
call. Instead, they are adept at using more modern methods rity, I can attest that these publications are neither simple
to communicate using social networking tools. nor straightforward to produce, but they also are one of the
RE TURN TO
InfoSecurity Professional 24 November/December 2016 CONTENTS
most satisfying and reward- first one, on passwords,
ing ventures that I have ever was something that we all
accomplished, besides helping encounter. For most of us, its
my wife raise our two children, a simple task to generate a
of course. password, which is why there
are tons of easy passwords out
there to break.
GETTING READY I wanted to ensure I got
TO LAUNCH the point across that pass-
When I first started writing words are the keys to your
and illustrating cybersecurity padlock of information you
books for children, I wanted want to keep secret. Keep in
to ensure that the character mind, we are dealing with
would be someone who chil- an age in which schoolyard
dren would enjoy listening to, friendships are frequently
as well as learning from. cemented over sharing
Granpappy Turtle fulfills secrets.
both needs. This is one illustration that, with a narrative, helps In some cases, I have
He understands how to explain how a computer user downloads information heard of children giving away
from the web.
speak to the generations that their passwords to their best
followed him, by asking good, friends. Although I can
focused questions. The character is the right blend of understand how you want to trust people, the best friends
inquisitive and knowledgeable to work for these types of in a childs life change, sometimes daily, and that can lead
books. to someone who is not a friend getting the password. From
While the character was important, the content was key. there they can wreak havoc on the childs social networking
I wanted to present a book that parents could read to their site, posting comments or pictures that seem like they are
children, or that children could (eventually) read them- coming from the child. In todays world, the lines between
selves to provoke thought. As a parent, I can tell you that real life and online personas is blurring, so what is said
my children might listen to what I say, but they listen to online can easily spill into the real world and cause need-
another adult with much more attention. The same is true less friction and fractures.
with Granpappy Turtle and the characters that surround My book, therefore, had to address both the password
him. structure and content in easily understood terms, and
As for the content of the books, I am still exploring the underscore why it is essential to keep passwords secret
tone and volume of the written language that grabs chil- all this with colorful pictures.
drens attention. I try to share my books with friends and
their children to get feedback on the content and then use
that feedback to refine the message. WHY CHILDRENS BOOKS
The books that I write are not for early elementary Someone once asked me why I write childrens books rather
school age, but more for 8- to 10-year-old children. I have than books for adults. I had to smile since I actually write
found that 9-year-old children thoroughly enjoy the books childrens books for adults. I know that, as an adult, I used
and do not feel challenged by the language. At a recent to read books to my children at bedtime, as well as review-
book festival, I had a 9-year-old pick up one of my books ing them before I read them.
and read it so well that I was sure that my age range was I often found the books were as educational for me as for
appropriate. them, and I hope my books may also spread education by
In addition to the content of the book, the venue is the parents reviewing the book prior to reading it to their
also important. I tried narrating some of my Granpappy children. I also expanded my offering to e-books, which
Illustration: Chris Greco
Turtle books on shared video websites like YouTube, but helps the parent (or any adult) download the book and then
the results have been mixed. I am still experimenting with use their mobile device to share it. I feel that this is the
all of these aspects of childrens book writing to see which epitome of informing people about cybersecurity: using
ones work and which ones dont, but the journey is well technology to teach it!
worth the work. I have learned a lot by creating Granpappy Turtle books.
The topics for the books were no easy task either. The In exploring the subject for my first book, I learned that
RE TURN TO
InfoSecurity Professional 25 November/December 2016 CONTENTS
Becoming an author also has led me to present cybersecurity
concepts at senior centers, where elder citizens, which I have
named Silver Hats, can also learn from Granpappy Turtle
about how to not fall for online scams and fraud.
some of the password techniques I have used in the past to Turtle books including a two-part series on cybersecurity
reduce my risk did not actually reduce my risk at all, and I (the first part is out now and the second part is coming).
am a computer security professional! Becoming an author also has led me to present cybersecu-
The research that I have done to make these books as rity concepts at senior centers, where elder citizens, which
factual as possible, while surrounding them with turtle I have named Silver Hats, can also learn from Granpappy
characters, mixes the real and the imagined so that chil- Turtle about how to not fall for online scams and fraud.
dren can adopt the character as someone that gives them This, along with the writing and illustrating of other
information to keep them safe. non-cybersecurity related Granpappy Turtle books, helps
I hope that through my make-believe characters and me to give back to the computer security community.
handy delivery formats, both reading and concepts of cyber-
security are a little more enjoyableand prompt the actions
we want children to take to become safer online. CHRIS GRECO, CISSP, is a senior consultant/trainer with Greco
I am continuing the storytelling with more Granpappy Techknowledgee (GRECTECH) (www.grectech.com).
RE TURN TO
InfoSecurity Professional 26 November/December 2016 CONTENTS
CENTER POINTS Pat Craven is the director
of the Center for Cyber
Safety and Education
FOCUSING ON EDUCATION and can be reached at
AND RESEARCH INITIATIVES [email protected].
CHAPTER CHALLENGE
WINNERS
This year also saw the introduction
Richmond-Metro Chapter
USD$1,500
Online spokescat. But that isnt all of a new three-year partnership FUTURE CHALLENGES?
weve been working hard on this year. with Raytheon. The technology Does your U.S.-based chapter want
In addition to achieving record- organization is now providing two to provide local high school students
shattering participation in this USD$10,000 scholarships along with with scholarships? A new fundrais-
years Global Information Security a paid summer internship for two ing period opens on November 1
Workforce Study, we have revitalized aspiring female cybersecurity profes- and runs until July 31, 2017. Thats
our scholarship programalso to sionals. We are so excited Raytheon nine months of fundraising, and
great success. is providing a model program that we have all the tools you need to
This year, with your support, we we hope inspires other companies help. Chapters will have their own
are providing some USD$150,000 committed to diversity within infor- personalized donation pages, where
in educational scholarships to help mation security. the chapters scholarship can be
prepare the next generation of But the achievements dont stop promoted on social media sites and
cybersecurity professionals. Last year there. This year we challenged three funds can be collected online. (ISC)2
66 students applied for financial aid; (ISC)2 chapters to pilot a new effort will also help you get the word out
this year we received 511 applica- to provide scholarships to high school by emailing (ISC)2 members in your
tions for our womens, graduate and students in their communities. The local community. Its easy, and a great
undergraduate scholarships. Of those results are in! The following chapters way to help impact future cybersecu-
seeking aid, 61 percent of applicants met the (ISC)2 Chapter Scholarship rity professionals.
were female and 56 percent were Challenge by raising at least Join in the fun and make a dif-
born outside the United States. Of USD$1,500 in funds and expanding ference! Email us at scholarships@
the 42 scholarships award, 22 (52 opportunities for high school students isc2.org for more information on how
percent) went to females and 20 in their communities. Here are their you, your chapter, or your company
(48 percent) to males. fundraising totals as of October 1: can play a part in preparing the next
Applications for next years Austin Chapter USD$3,409 generation of information security
women, graduate and undergraduate Tampa Bay Chapter USD$3,000 professionals.
RE TURN TO
InfoSecurity Professional 27 November/December 2016 CONTENTS
5
MINUTES WITH
TUSHAR GOKHALE
Tushar Gokhale lives in Dallas, Texas, but grew up in
Mumbai, India. The cybersecurity specialist has been
part of (ISC)2 for more than two years and is the newest
member of our Editorial Advisory Board.
EDITED BY ANNE SAITA
That includes doing my small part to
When did you know you wanted a to an information security specialist help nurture others in the informa-
career in information security? was the biggest hurdle. It was more tion security profession. Im proud
After I completed my bachelor difficult than I thought it would be. to have earned a masters degree in
studies in electronics and telecom- Further, elevating my career path by information security, continue to
munication engineering, I started focusing on being a technology secu- advance in my professional career,
working as a network and communi- rity professional to business security and volunteer as a peer reviewer for
cation engineer. I worked on several professional was another challenge. academic and professional secu-
network design and technology rity journals and magazines. Ive
projects, such as implementation of Youre originally from India. What also been an instructor for secu-
routers, firewalls, intrusion detection part of the nation are you from,
rity courses, judged cybersecurity
and prevention systems, etc. At that and how has living in India, and still
contests, and held other roles that
visiting, impacted your career?
juncture, I decided to start learning I believe contribute to making our
more about information technology I am from Mumbai (often termed community and industry better.
security and eventually pursued a the financial capital of India), which
career in information security. is located in western Indias state of What do you believe are some mis-
Maharashtra. There is always huge conceptions about the cybersecurity
After realizing that was your chosen demand for great talent across all workforce in India?
path, how easy or difficult was it to sectors and industries in Mumbai. Not only India, but a majority of
gain entry? I started my professional career in developing nations still consider
I must say, it was a little difficult. Mumbai and later moved to the cybersecurity as only a technology
Specifically in India, I remember United States to pursue a formal challenge. Also, another misconcep-
information security was considered education in the field of information tion is that only those with a tech-
a branch of IT and a potential can- security. My information security nology background and significant
didate for information security was professional contributions to the amount of technical experience can
expected to be best at information financial and insurance sector in advance to a career in cybersecurity.
technology most times. An entry-level Mumbai provided the groundwork for This may not be always true. While
career as an information security my current work in the United States cybersecurity could still be technical
professional was a little difficult, as in and internationally. I believe the at its core, in wider context it is a
most industries and sectors, security more diverse and international your business challenge and overlaps with
concepts and security implementa- experience is, the more rewarded you governance, risk, compliance and
tions were considered child projects are. business in addition to technology.
of IT implementations.
What are you most proud of accom-
What have been your biggest hurdles plishing with the group to date? An expanded version of this interview
in your current career? Every achievement and contribution will appear in the December issue of
I make to the information security Insights, a companion e-newsletter
Transitioning my career from a net-
for the (ISC)2 membership.
work and communication engineer community makes me feel satisfied.
RE TURN TO
InfoSecurity Professional 28 November/December 2016 CONTENTS
Why blow your budget on piecemeal, ad hoc content generation?
Drive profitable audience action with our services, which will be on brand with your
companys marketing goals.
Articles Infographics Publications
Blogs Inspirational Quotes Social and Digital Media
Case Studies Leadership Guides Sponsored Content
Content Marketing Magazines Success Stories
Custom Content Newsletters Web Content
eBooks Press Releases White Papers and more!
TWIRLING
For how our team of experts can serve you, please contact
Bob Ostrow at [email protected].
TIGER media
creators of content you
can sink your teeth into
Twirling Tiger Media is certified as a womens business enterprise by the Womens Business
Enterprise National Council (WBENC) and federally designated as a Women-Owned Small
Business (WOSB). twirlingtigermedia.com