2017: “How did this happen?”
This picture was published by the Reno Gazette-Journal

2017: “How did this happen?”

Audit & Challenge article 10: Leadership

Shadow Brokers, Wanna Cry, "The Year of Vehicle Attacks", WikiLeaks: CIA, Manchester, Equifax, Las Vegas, Sutherland Springs… 

This has been a frustrating year for the security industry with unprecedented incidents having a massive global impact. Some of these are easily understood while many of them are difficult to forecast, and prevent. I’ve often seen these types of responses from the security community.

Shock: How do we train people to address this? How do we stop this?

Knee-Jerk: How could they have not seen this coming? They should have…

Backlash: To the people who are criticizing: where were all these insights before this event?

If we are reacting this way, its no wonder the organizations we serve are unsettled as well. We need a consistent process for evaluating security incidents. This is a tool for drawing meaningful conclusions and lowering organizational anxiety. 

Here are the basics of my approach.  

Risk Assessment

You must choose. We cannot mitigate all the risk in the world. We must choose which risks make sense to address and which do not. Explanations must be documented and discussed with the stakeholders who own the risk.

The world changes over time. What we accept as a reasonable risk today, is different from what is acceptable next year, or maybe even tomorrow. We need to understand the nature of risk and forecast how it may change in the future. This will create a common platform for stakeholder education and future conversations.

Risk is like water. As you treat risk in one area, it moves or causes ripple effects in others. Once a mitigation strategy has been implemented, the risk needs to be re-evaluated to understand what unintended consequences were produced.

There is always residual risk. After a risk management plan is executed, this needs to be measured and and explained to the risk stakeholders.

Define success and failure. As humans, we tend to think irrationally out of fear. We need to understand what failure actually is. Security incidents don’t automatically equate to security failure. Sometimes a successful outcome is not neat and tidy. There is a reason your organization is spending their money on security services. 

Security programs cannot fail solely based on the actions of aggressors.

Instead, understand and document the point at which Detection, Recognition, and Response are successful and at what points these elements begin to fail. Document and set the correct expectations within your organization.

Post Incident Review Process

I believe in Post Incident Reviews. We conduct them all the time. Small incidents, big incidents – even when something weird happens; I’ll review it with the team to identify the lessons learned and ensure our policies were adequate. 

These reviews are a critical component of my “people strategy.” If you only review incidents which result in disciplinary action, your people will not trust you. Mistrust tends to create integrity issues. On the other hand, if you review all kinds of incidents, your teams become owners of the program. They participate in policy and decisions. Reviewing their work becomes a normal operational procedure.

Organizational stakeholders benefit as well. Your programs are perceived as calm and well managed. You can stop knee-jerk reactions in their tracks while you work through your normal process. 

Once allowed, knee-jerk reactions are the death of every security program. They are a cancer of expectations which will grow inside your organization. A well-developed review process, in addition to strong, calm leadership, will bring order and insight to the discussion.

To be effective, rules need to be established to govern the Incident Debrief process. Here are mine:

Rule 1: Understand the facts and timeline of the incident. Rule out bias and emotion from this process by noting inference and opinion.

Rule 2: Measure the totality of the incident against the policies and understanding of risk that existed when the incident happened. This is the only way to be fair to the people involved. We can never apply today’s understanding of risk to yesterday’s incident. Frustration and mistrust will follow.

Rule 3: Focus on policy, process, and professional development. As humans, we feel a need to find a culprit. We already have one, the aggressor. Focusing on development uncovers what could be done in the future while still meeting the needs of the business. 

In the Codes of Conduct for my teams, I write the following into policy:

Problems are opportunities to be excellent. Someone does not  always need to be at fault. We succeed and fail as a program. We are committed to the professional development of one another.”

Rule 4: If negligence is uncovered, it should be dealt with separately. Incident Debrief is a development process, not a disciplinary process.

This is how I approach Post Incident Review. It has served me well and I hope it is helpful to you. Let me know what you think!

Merry Christmas & Happy New Year!

Bob Mahler PMP, PMI-RMP

Free Range Project Manager ?? | Bold Extrovert ?? | Business Development ?? | Army Veteran ??? | Caffeine Powered ?? | Aka "Outbound Bob" ??????

7 年

Really great article! I like Rule#1, and removing the bias is probably the hardest part, especially after a risk becomes an issue. Nice work.

Tim Easton

Owner Castle Defense 360? IED Response Instructor, CSOS-I, Anti-Terrorism, Security Engineering, ATO II, SAS-AP

7 年

Great article that hits the most valid and vital aspects. Very spot on. Getting decision makers to understand is one of the biggest obstacles and getting them to be willing to write a check is another.

要查看或添加评论,请登录

Tim Wenzel, CPP的更多文章

  • Barriers to Entry

    Barriers to Entry

    I'm writing this article not as a complaint, but as an education opportunity for the Security Industry and others like…

    31 条评论
  • Communicating Through Transition

    Communicating Through Transition

    The Vanquishing Evil Management Initiative Pt. 3 This is the third in a series of collaborative management articles by…

    19 条评论
  • The Vanquishing Evil Management Initiative

    The Vanquishing Evil Management Initiative

    A collaborative Thought Leadership series by Andy Scantland & Tim Wenzel Article 2, Article 3, Article 4, V-article 5…

    6 条评论
  • Instinct & Common Sense

    Instinct & Common Sense

    In February of this year, the GSD team (Getting Security Done) put out a survey to CSOs on what qualities they most…

    16 条评论
  • 2019 Reading List

    2019 Reading List

    Over the last couple weeks, I’ve been thinking about 2019 and how I can improve as leader of people and programs…

    4 条评论
  • The Secret to Success

    The Secret to Success

    This has been a different kind of year for me for many reasons. Between talking to kids entering college, giving a…

    8 条评论
  • Happy Veterans Day!

    Happy Veterans Day!

    Growing up in rural Illinois left much to be desired. As early as grade school, I was dissatisfied with my surroundings.

    7 条评论
  • What are You Thankful For?

    What are You Thankful For?

    Audit & Challenge article 9: Leadership “The unlucky are nothing more than a frame of reference for the lucky. You are…

    2 条评论
  • Integrity... What is it Anyway?

    Integrity... What is it Anyway?

    Audit & Challenge article 8: Industry Values This is the third article about Industry Values during the Audit &…

    18 条评论
  • End User Security Technology Strategy, Part 2

    End User Security Technology Strategy, Part 2

    Audit & Challenge article 7: Security Strategy This is the second installment of a 3 part essay. If you missed Part 1…

    1 条评论

社区洞察

其他会员也浏览了