Cut Through the Data Clutter: Dealing with Information Overload
Its time to re-think our approach to measuring everything and cut through the volume to see again ...

Cut Through the Data Clutter: Dealing with Information Overload

Here’s a harsh reality: many seasoned cyber security professionals are drowning in a sea of data. They work in environments that create and reward complexity and struggle to come up for air.??

Recently, I spoke with a newly appointed CISO who shared a story that resonates across the industry.

They shared a typical scenario: A CISO arrives at a new company, eager to make an impact. Their first meeting is with a colleague who immediately unloads an avalanche of data, systems, and concerns. The sheer volume of information is overwhelming, and it’s clear that this isn’t just about data – it’s about people dealing with too much information.

This situation happens time and time again, and it’s not efficient or driving outcomes. We’ve become so focused on collecting data that we’ve lost sight of its purpose.

How does this happen? There are a few factors that contribute to this situation.?

Large enterprises deploy complex software solutions that generate endless streams of logs and alerts. While the intention is to gain visibility, the reality is often a cluttered landscape where critical insights are buried under mountains of irrelevant information.

Nowhere is this more evident than in vulnerability management . It’s one of those areas where data clutter has truly spiralled out of control. We’re inundated with vulnerability reports, each containing hundreds or thousands of potential issues. The sheer volume makes it nearly impossible to see the forest for the trees.

But here’s the thing: while we obsess over vulnerabilities within our defined scope, we often miss critical assets that fall outside our purview. This includes supply chain vulnerabilities and unknown assets we’ve failed to account for. We’re measuring what’s inside the box while completely overlooking what’s outside – and that’s where the real danger often lies.

I just read a fascinating paper by Calvin Nobles, Ph.D. and Nikki Robinson on “The benefits of human factors engineering in cyber security” . Their work highlights a crucial point: data overload and clutter directly correlate with the human factor in cyber security. It’s not just a technical problem; it’s a human problem.

As human beings, we tend to gravitate towards hard data because it gives us visibility. Moreover, people in organisations are inclined to collect more tools for various use cases — all producing output. Then, they need the “tool of tools” to integrate all the other tools. What do we get as a result of this? Clutter and information overload.

?Add to the clutter compliance requirements, and we get the perfect storm.??

?When we measure the wrong data or have too much of it, it’s very easy to lose our way. Then, we see burnout, stress, attrition, and breaches. As Shana Uhlmann warns, "we’re dealing with an aptitude crisis: learning how to use these tools, critically analyse them and use them well."

Further, in an exchange of texts we shared around this very point Shana adds; "If you are collecting data and don’t know how you will use it or if you don’t actually have resources to investigate, evaluate insights and action them, then you’re wasting money collecting it in the first place!"

?

Nobles and Robinson’s research emphasises the importance of understanding the “why” behind our data collection and analysis. Too often, we collect data simply because we can, without asking crucial questions like “So what?” or “Do we actually care about this?”

I’m reminded of the early days of aviation when pilots faced a similar challenge. As cockpits became more advanced, the amount of data presented to pilots increased exponentially. This led to information overload and, tragically, accidents. The solution? Clean design. Present only the most critical information, with the ability to drill down when necessary.

In cyber security, we need to adopt a similar approach. We must ask ourselves: What are the key indicators that truly matter? How can we apply the principle of subtraction to our data and processes? It’s not about having less security but focusing on what’s truly important.

?

Here are a few strategies I’ve found effective:

  1. Identify your “six-pack”. In aviation, the six most critical instruments are grouped together. What are the six most crucial metrics for your security posture?
  2. Embrace simplicity. Challenge the notion that more data always equals better security. Sometimes, less is more.
  3. Create space to think. In our rush to do more, we often forget the value of stepping back and reflecting. Make time for thoughtful analysis and discussion. Remember that doing nothing is not the same as achieving nothing.
  4. Focus on outcomes. Instead of measuring the volume of data collected, focus on actionable insights and improvements to your security posture.
  5. Consider the human factor . Remember that behind every dashboard and alert is a person trying to make sense of it all. Design your processes with the human element in mind.

?

I’m not advocating for removing all controls, but if you look at where most breaches come from, they often involve human decision-making errors. I’m not referring to phishing but rather to decisions about how technology is applied.

Technology is simply a tool that allows us to access and view information. However, if we don’t pay attention to warning signs or make poor decisions about technology use, we put ourselves at risk.

For example, a pilot who ignores terrain warnings while focusing on other tasks could fly into an object. Similarly, in the cyber world, we can face negative consequences if we don’t properly manage information overload.

Therefore, it’s crucial to cut through the data and focus on the most important information. By doing so, we can reduce the risk of cyber incidents and ensure that technology is used safely and effectively.

?

I’d love to hear your thoughts:?

-How do you balance the need for comprehensive data collection with the risk of information overload in your organisation?

-What strategies have you found effective in distilling large amounts of security data into actionable insights?

-How are you making sure tools are used efficiently?

?

Please share your experiences and insights in the comments, and let’s create space to think.


#informationsecurity #cybersecurity #ciso #infosec

Jane Frankland

Cybersecurity Influencer | Advisor | Author | Speaker | LinkedIn Top Voice | Award-Winning Security Leader | Awards Judge | UN Women UK Delegate to the UN CSW | Recognised by Wiki & UNESCO

2 个月

Dan, love how you're drawing parallels between aviation and cybersecurity! ;) In the world of cyber, it's all about accuracy rather than precision and cutting through the noise, right? Additionally, about ensuring you're measuring the right metrics, and not being afraid to reduce the data that you could collect from the tools available. It's about reducing risk rather than increasing it.

Dr. Tammie Hollis

Cybersecurity Strategy & Transformation | Manage Complex, High-Profile Risks | Build Scalable, Resilient Teams | Foster Culture of Risk Prevention & Protection | Collaborative & Transparent Leader | US Navy Veteran ??

2 个月

I’m so glad you and Calvin connected!

要查看或添加评论,请登录

Dan Haagman的更多文章

  • Right-Sizing Cyber Security Budgets: Why Less Can Mean More

    Right-Sizing Cyber Security Budgets: Why Less Can Mean More

    I'll say something you'll rarely hear from a cyber security provider: "Let's reduce your security budget." Recently, we…

    3 条评论
  • Risk as Opportunity

    Risk as Opportunity

    From Avoidance to Strategic Exploitation TL;DR Opportunity and risk are two sides of the same coin, while familiar…

    9 条评论
  • Tell Me Where Your Data Really Is

    Tell Me Where Your Data Really Is

    When it comes to data security, most organisations think they know where their sensitive information lives. The…

    4 条评论
  • The Future of GRC: Consistency, care, and the human factor

    The Future of GRC: Consistency, care, and the human factor

    TL;DR Regulation drives care. Without significant penalties, some organisations would not prioritise security or risk…

    12 条评论
  • Pen Testing: It's All a Matter of Scope

    Pen Testing: It's All a Matter of Scope

    Can you pen test your way secure? The answer is no — and it's all a matter of scope. While we've traditionally viewed…

    5 条评论
  • The Art of Risk Management

    The Art of Risk Management

    TL;DR Risk management has become overly focused on controls and metrics. Companies are losing sight of its true…

    12 条评论
  • AI vs MFA: The Spectrum of Security Controls

    AI vs MFA: The Spectrum of Security Controls

    With the emergence of artificial intelligence and other cutting-edge technologies, we're witnessing a fascinating…

    18 条评论
  • Data Overload: Causes, Challenges, and Strategies for Actionable Security Insights

    Data Overload: Causes, Challenges, and Strategies for Actionable Security Insights

    TL; DR More data is not inherently better. In fact, without the right tools, strategies, and skills in place, an…

    15 条评论
  • Maturing Our Cyber Security Programs

    Maturing Our Cyber Security Programs

    Cyber security is complex and often polarised by budget constraints, cycles of attention, and varying compliance…

    13 条评论
  • Is Your Data Safe While You Sleep?

    Is Your Data Safe While You Sleep?

    Cyber security isn't a 9-to-5 job. It's a relentless, 24/7 cycle that doesn't pause for weekends, holidays, or our…

    8 条评论

社区洞察

其他会员也浏览了