Month: December 2009

When Sensationalism Trumps Facts

duhBy now, everyone has heard about the malicious DNS hijacking of twitter.com by those clamining to represent the “Iranian Cyber Army”. Seeing this news spread, journalists have invented an enemy and laid blame based on…facts? No…wait…facts are defined as “Knowledge or information based on real occurrences”. Unfortunately folks, the only thing tying this back to “Iran” is the name of the gropu responsible for the redirect and the subsequent message announcing the “attack”.

This is sensationalism plain and simple. Here are some examples of the sensationalist headlines and some excerpts from the articles:

Iranian hacker attack: What will it cost Twitter?

Thursday night’s cyber attack against the Twitter microblogging service was no routine assualt to bring down a website. It was a sophisticated online blitz –perhaps part of an online Iranian cybercampaign – that could prove costly for social media networks.

A “blitz”…wow…sounds dangerous. “Part of an online Iranian cybercampaign” to what, prevent Americans from sending important updates like “LOLZ, dude failed hiz last exam big time.” thus, disrupting national security?

Twitter Hack: Part Of Broader Iranian Strategy

The attack last night on Twitter was clear retribution for the role that the service played during the [post-Iran election] demonstrations, and the role that it continues to play today. We have spoken to a number of sources overnight who have told us that the Iranian Cyber Army, unlike other groups with similar national monikers, is a group name that is to be taken literally ie. it is an Iranian government group. Little is known about how the group operates, but previous attempts to shut off Iranian citizens from Twitter and other web services demonstrate that Iran has the capability and will to use almost any means to control the flow of information on the web both within and outside of its own borders.

“Clear retribution” based on…..well, you remember the elections right and how it pissed off the Iranians….well they have computers…..and the attackers called themselves “Iranian” so…BOOM…there you go! We’ll put this one in the FACT column for sure.

I could have gone further with this post but the other articles I found were just too stupid note.

Information Security D-List Interview: Michael Santarcangelo

santaToday’s interview is with Michael Santarcangelo. Affectionately known “Santa” to his friends, Michael truly is a catalyst when it comes to changing how people think about information security. He’s helped me throughout my security career and has talked me down during my pre-exam “freak out” sessions on more than one occasion.

Q: Tell us a little about yourself.

I love to learn, connect, and share.

I am a catalyst.

I used to state, apologetically, that I was a “jack of all trades, master of none.” Then I would explain I was a renaissance man – less apologetic. But a few years ago I realized that I am a catalyst, and I no longer apologize.

I’m direct. Candid. And with a good knowledge of self, I am what you see. After watching people tell lies, play games and “work angles” early in my career, I decided against that approach. As a result, I am me.

In my practice, I connect with people, ask questions and share stories that shift thinking and create situations that inspire behavior change. I focus on the positive – acknowledging the good work of the users, amplifying their actions and revealing to them they have the power – and the responsibility – to act to protect information.

Q: How did you get interested in information security?

I asked too many questions.

I was working with Accenture (back in the days before it was Accenture) and on a project where I kept asking questions – about things like pricing spreadsheets being kept on shared drives. This was before “security” existed, so my reward for asking the question was to figure out a solution. When I did, the partners would take me out to nice dinners. It was perfect – I worked around the clock, got fed and learned.

In two years, I probably worked roughly 4-5 years worth of hours, but it was worth every minute. From there, I joined the newly formed global security team and the rest has been a great experience.

Q: What is your educational background (e.g. formal schooling, certifications, self-learning, etc.) and did it add value to your information security career?

My formal training is Policy Analysis (now called policy analysis and management) from the school of Human Ecology at Cornell University. It’s hard to explain why I chose the major when I did – but looking back, it was a perfect fit for me. In fact, I think more people need to study and become human ecologists.

Human Ecology is considered a “hard social science” – the power is in the blend. The foundation is economics, statistics and other “hard science.” It’s then amplified and improved with the addition of sociology, psychology, business, personal finance and other elements that allow human ecologists to draw on multiple disciplines to solve complex problems.

This translates into the tools and experience to understand policy, economics, people and technology. Better, I can then analyze and explain what I know in an applied way – to get results matched to the situation. And I continue to learn!

As to the balance of my learning – I am curious about everything and am a lifelong learner. Every topic literally fascinates me, and I learn from anyone any everyone.

At one time was a top-rated lead instructor for the CISSP® — and even helped refine and improve a substantial portion of the Common Body of Knowledge. That experience allowed me to develop deep and broad PRACTICAL skills in the entire field of information security (spend enough years explaining leads to as many years doing). As a result, I have good knowledge of the field – especially the fundamentals — but also the realization that my niche now is to connect the right people together while focusing on the human element.

Once I earned the opportunity to join the National Speakers Association, I took the responsibility of being a professional speaker seriously. Professional speakers are hired to get results – so now I dedicate a good portion of time to mastering – and teaching others – the tradecraft of effective communication. I believe the real challenge for most security professionals is communication – and developed some seminars and support materials to be refined and improved in 2010.

As a human ecologist, I’m finally in a place to blend my skills to enhance my skills. In the process of my learning, I connect and share. The cool aspect of this is that the more I share, the more I learn.

Q: What did you want to be when you grew up? Would you rather be doing that?

I always wanted to run a business that helped people. I love what I do – and the way we’re about to do it, so I’m thrilled.

Q: What projects (if any) are you working on right now?

I am in a constant state of thinking, which means I have some projects going on. The big project is just starting – we have rented our house out (instead of selling it) and are heading out to travel North America by RV for the next few years.

We have dubbed our effort “Catalyst onTour” – as we will continue to meet our clients, literally, where they are to influence change.

Beyond traveling to meet, learn, listen and share, we have a different approach to seminars we’re going to unveil in 2010, as well as a few other ways to change the way people protect information that need a bit more time to distill and prepare.

Q: What is your favorite security conference (and why)?

I haven’t really found one that compares to the conferences I have experienced in professional speaking circles. I do enjoy the “hallway” interaction that happens at the security conferences and will advance some small suggestions for the future.

In the meantime, when we travel the country, we invite people to come to our house, enjoy a beverage and sit around the fire to catch up – real campfire chats. I hope you and I get to sit around the fire in 2010.

Q: What do you like to do when you’re not “doing security”?

First and foremost is time with my family. In that process, we like to learn, engage, share – lots of reading, museums, etc.

Q: What area of information security would you say is your strongest? What about your weakest?

As a former CISSP instructor who devoted 6+ years to developing and improving the profession, I have an unusual breadth and depth – and interest set. My strength is absolutely in applying what we know in a way that works in harmony with the power of people – the so-called elusive human element.

My weakest is programming; I understand and appreciate programming, but I’m not a coder and don’t want to be. However, that doesn’t mean I don’t like application security… since it requires people. Just don’t ask me to code or look for application vulnerabilities.

Q: You’ve spoken to people all over the country about managing risk. What, in your experience, is managements most common misconception of “risk”?

I think the biggest misconception of risk lies with security professionals – and what I call “risk reaction.” Our focus, our thought process leads to situations where we see and realize things before others, and that leads to a state where we focus on threats, vulnerabilities and risks more than others.

I think we have a lot to learn from business leaders, decision makers and influencers about the real risk of the organizations.

Q: Tell us a little bit about your book and how it ties into your philosophy on life and security.

When I wrote Into the Breach: Protect Your Business by Managing People, Information and Risk, I had started to look deeper into some of the notable breaches happening – and asked a simple question, “what if breaches are only symptoms?”

The reality is that breaches – which take a lot of attention and capture a lot of money – are only symptoms. If we continue to do what we’ve been doing, we’ll keep getting what we’ve been getting.

My book is for executives to reconsider the challenge with a strategy for their success.

The central element is that individuals must take responsibility for their actions, and be held accountable. I think this is true in life as well as security – so this book does capture some initial thinking on my approach to a lot of things.

What I enjoy is learning about how people who have implemented the guidance not only solve their “security” challenge, but how they adapt it to do more. It excites me, since that was the purpose.

I have more information about the book and a special offer here: http://www.securitycatalyst.com/into-the-breach/team-inspiration-edition/

Q: What advice can you give to people who want to get into the information security field?

Ask questions. Seek answers. Share.

This is part of the reason we started the Security Catalyst Community. And that’ll be coming back stronger in 2010 – with a mentoring component. I’m a fan of the journeyman process, and a bit leary of people who have advanced degrees in security/assurance – but lack the practical, hands-on approach marked with scars, mistakes and the essential components of learning.

To be clear: I think cert programs and advanced degrees are important.

But I evaluate practitioners and professionals on what they can do – including how they can connect with real users/people and communicate. Those that have had their feet to the fire perform better than others.

So if someone is asking for advice, I suggest they find a blend:

  • get a mentor
  • get broad and diverse experience
  • get advanced schooling in the area of their passion/interest

Q: How can people get a hold of you (e.g. blog, twitter, etc.)

website: http://www.securitycatalyst.com
phone: 518.207.3453
email: securitycatalyst@gmail.com
twitter: twitter.com/catalyst
linkedin: linkedin.com/in/securitycatalyst

Heading to ShmooCon 2010!

Well it looks as though the stars have aligned and I’ll be heading to my very first ShmooCon! I’m really excited as I get to see friends and colleagues I either haven’t seen in a while or that I’ve yet to meet in real life. If you’er going to be there then come find me and say “Hello”.

Note: I’m not very good with names/faces (just ask Rob) so just look for the guy who looks like the following picture and introduce yourself (P.S. beers make him calm and approachable):

ANDREW!!!!!!!

Scroll to top