Personal responsibility in InfoSec industry
ChooseLife
Member Posts: 941 ■■■■■■■□□□
Hello,
Question to those of you who work as InfoSec Officers or in similar roles (full time for a single company, not consultants):
How much personal responsibility does working in InfoSec usually entail in North America?
Do you have legal or financial responsibility? What happens when a security breach occurs? In news I often read about CSO's of large companies stepping down after a major breach - are they getting fired or is it sort of moral codecs? How often does it happen (any breach, major ones, ones receiving media coverage) and is it the same for smaller companies? Are these individuals able to continue working in the industry?
I have the opportunity to move into a role of a security person for my current company. It's a smaller company (100 people) but growing and introducing new positions often. I have been with the company for some time as a server admin and have somewhat of a reputation of a security freak (which indeed I am). My boss stated we need a dedicated security person and hinted at me a couple of times in conversations.
I feel that if I want to move into InfoSec, this would be the perfect opportunity to make a smooth transition and get that first experience of full-time security person.
My concerns are that if/when a breach occurs, I could be made a scapegoat and get fired or sued, with diminishing chances of getting hired afterwards. My family generally does not want me to do InfoSec because they perceive at as an industry with high personal responsibility.
I am already doing a lot of server hardening, network/system security design work, certificate and encryption key management as part of sysadmin duties. I feel more or less comfortable about own technical abilities, but in other areas (processes and procedures, and general leadership as a security officer) still have a lot to learn.
Any comments and advice of seasoned professionals are welcome. In the current role, I am not afraid of being responsible for managing critical infrastructures, but the idea of potential legal and financial responsibility is much less comfortable.
Question to those of you who work as InfoSec Officers or in similar roles (full time for a single company, not consultants):
How much personal responsibility does working in InfoSec usually entail in North America?
Do you have legal or financial responsibility? What happens when a security breach occurs? In news I often read about CSO's of large companies stepping down after a major breach - are they getting fired or is it sort of moral codecs? How often does it happen (any breach, major ones, ones receiving media coverage) and is it the same for smaller companies? Are these individuals able to continue working in the industry?
I have the opportunity to move into a role of a security person for my current company. It's a smaller company (100 people) but growing and introducing new positions often. I have been with the company for some time as a server admin and have somewhat of a reputation of a security freak (which indeed I am). My boss stated we need a dedicated security person and hinted at me a couple of times in conversations.
I feel that if I want to move into InfoSec, this would be the perfect opportunity to make a smooth transition and get that first experience of full-time security person.
My concerns are that if/when a breach occurs, I could be made a scapegoat and get fired or sued, with diminishing chances of getting hired afterwards. My family generally does not want me to do InfoSec because they perceive at as an industry with high personal responsibility.
I am already doing a lot of server hardening, network/system security design work, certificate and encryption key management as part of sysadmin duties. I feel more or less comfortable about own technical abilities, but in other areas (processes and procedures, and general leadership as a security officer) still have a lot to learn.
Any comments and advice of seasoned professionals are welcome. In the current role, I am not afraid of being responsible for managing critical infrastructures, but the idea of potential legal and financial responsibility is much less comfortable.
“You don’t become great by trying to be great. You become great by wanting to do something, and then doing it so hard that you become great in the process.” (c) xkcd #896
GetCertified4Less - discounted vouchers for certs
GetCertified4Less - discounted vouchers for certs
Comments
-
afcyung Member Posts: 212ChooseLife wrote: »Hello,
Question to those of you who work as InfoSec Officers or in similar roles (full time for a single company, not consultants):
How much personal responsibility does working in InfoSec usually entail in North America?
Do you have legal or financial responsibility? What happens when a security breach occurs? In news I often read about CSO's of large companies stepping down after a major breach - are they getting fired or is it sort of moral codecs? How often does it happen (any breach, major ones, ones receiving media coverage) and is it the same for smaller companies? Are these individuals able to continue working in the industry?
I have the opportunity to move into a role of a security person for my current company. It's a smaller company (100 people) but growing and introducing new positions often. I have been with the company for some time as a server admin and have somewhat of a reputation of a security freak (which indeed I am). My boss stated we need a dedicated security person and hinted at me a couple of times in conversations.
I feel that if I want to move into InfoSec, this would be the perfect opportunity to make a smooth transition and get that first experience of full-time security person.
My concerns are that if/when a breach occurs, I could be made a scapegoat and get fired or sued, with diminishing chances of getting hired afterwards. My family generally does not want me to do InfoSec because they perceive at as an industry with high personal responsibility.
I am already doing a lot of server hardening, network/system security design work, certificate and encryption key management as part of sysadmin duties. I feel more or less comfortable about own technical abilities, but in other areas (processes and procedures, and general leadership as a security officer) still have a lot to learn.
Any comments and advice of seasoned professionals are welcome. In the current role, I am not afraid of being responsible for managing critical infrastructures, but the idea of potential legal and financial responsibility is much less comfortable.
I can't comment on what type of legal culpability the company you work for would try to levee against you. I would hazard unless you are a C level executive in the company that you ultimately aren't held responsible. You will probably see that as you delve into the Risk Management piece of Infosec that the people running the company will be making calculated decisions about what risks to mitigate and what risks aren't worth mitigating based on cost. Its not just about doing the technical side of computer security properly configuring servers/clients/networks but also policy issues on proper use of the companies private lan etc. I have found that as the lead information assurance manager for my location that I am an adviser to those tasked with making decisions. If we disagree on an issue I document it in case it comes back to bite us.
Even with an infinite budget for security it would be possible to breach your network. Simply because you can't control what the users on your network are going to do. They could fall victim to a phishing email that has an attachment with malicious code that exploits a zero day attack on the PC, allowing an adversary the ability to exploit the PC and potentially other areas of the network exfiltrating data and intellectual property. As the lead security guy it would ultimately be up to you to make a recommendation and up to the C-level executives to either implement your recommendations or accept the risk.
Not to say that you can't be fired. obviously if you fail to do the due diligence on issues arising at your location you could be let go, but that could happen in your current role so in my mind no reason to worry about what might happen.
Some lite reading : http://csrc.nist.gov/publications/PubsSPs.html NIST has a lot of good pubs on infosec
http://iase.disa.mil/stigs/index.html DISA puts out very detailed instructions for technical and policy implementation as well called Security Technical Implementation Guides. -
paul78 Member Posts: 3,016 ■■■■■■■■■■Sounds like a good opportunity. People "step down" usually because they are asked to. Its not different than a sales person that can't make quota. Or a sysadmin that never does backups. Its about how well you execute your function and the value you bring to the oganization.Just because there is a breach doesn't mean that the ciso is culpable. Security is a team sport. Just like customer service, etc. In a company.If I stop being a contributor - then I expect to be fired. Good luck on your journey.
-
paul78 Member Posts: 3,016 ■■■■■■■■■■Sounds like a good opportunity. People "step down" usually because they are asked to. Its not different than a sales person that can't make quota. Or a sysadmin that never does backups. Its about how well you execute your function and the value you bring to the oganization.
Just because there is a breach doesn't mean that the ciso is culpable. Security is a team sport. Just like customer service, etc. In a company.
If I stop being a contributor - then I expect to be fired.
Good luck on your journey. -
forestgiant Member Posts: 153If I stop being a contributor - then I expect to be fired.
I wish it were that clear cut. Reality is there's so much politics involved in a security breach. Company's image could go down the drain, loss of revenue due to customer exodus, or top dogs not wanting to look bad are just some of the reasons. Infosec is a delicate balance between security and convenience, sooner or later someone will accidentally or intentionally break something. Doesn't mean that the ciso and his/her staffs didn't do their job, it's just that we live in an imperfect world and once **** hits the fan the management would need to sacrifice someone to show investors they are doing something. -
paul78 Member Posts: 3,016 ■■■■■■■■■■forestgiant wrote: »Reality is there's so much politics involved in a security breach.
-
afcyung Member Posts: 212I agree with Paul78. Infosec is not just the CISO or equivalents job, its every ones job.
-
ChooseLife Member Posts: 941 ■■■■■■■□□□I appreciate all comments, though there seems to be some disagreement. Gives the insight into the industry.“You don’t become great by trying to be great. You become great by wanting to do something, and then doing it so hard that you become great in the process.” (c) xkcd #896
GetCertified4Less - discounted vouchers for certs -
paul78 Member Posts: 3,016 ■■■■■■■■■■ChooseLife wrote: »Gives the insight into the industry.
-
ChooseLife Member Posts: 941 ■■■■■■■□□□I'm in Canada so I'd imagine the practice is not very different here.
You are talking about the customer or other affect party being the plaintiff, but what about the unhappy employer? Say, if a breach occurs in a way that can be attributed to the security person's mistake or negligence, what are the chances of the company taking an action against the employee?your liability is limited to gross negligence and misconduct
So basically, I perceive InfoSec people to be at a higher risk of getting fired or otherwise be held personally liable than people in other professions, because of the impact their mistakes have. Three opinions expressed in this thread are not unanimous and so my doubts are not resolved yet...“You don’t become great by trying to be great. You become great by wanting to do something, and then doing it so hard that you become great in the process.” (c) xkcd #896
GetCertified4Less - discounted vouchers for certs -
ChooseLife Member Posts: 941 ■■■■■■■□□□Found this document, addressed directly to me
http://www.sans.org/reading_room/whitepapers/infosec/information-security-starting_33239Information Security: Starting Out
"...Going from technical guru to Information Security Manager can be a bigger step than
you might think. Taking on the role of IT Security Officer in an enterprise that treats
information security as an IT problem can offer many challenges and many opportunities
to learn. Each organisation is unique and identifying those approaches that do not work
is an important step forward in the journey to an effective information security program.
This paper is focused on delivering some broad guidance to the newly appointed
information security professional. A direct reflection of the author’s experiences, it
targets administrative areas that are often over looked by those with a strong technical
only background..."“You don’t become great by trying to be great. You become great by wanting to do something, and then doing it so hard that you become great in the process.” (c) xkcd #896
GetCertified4Less - discounted vouchers for certs -
afcyung Member Posts: 212ChooseLife wrote: »So basically, I perceive InfoSec people to be at a higher risk of getting fired or otherwise be held personally liable than people in other professions, because of the impact their mistakes have.
-
nicklauscombs Member Posts: 885ChooseLife wrote: »Can you elaborate on this one, plz? (we can insert a legal disclaimer here )
Security guy here:
There is so much grey area in this discussion but for simplicity's sake since you seem to want some sort of "real world" scenario that could be labeled as gross negligence here's my 2 cents (obviously not a lawyer). A simple scenario would be defiantly breaking company policies/procedures that causes inherent danger to the company (whether it be monetary, degrading of the company reputation, etc...). Something like posting proprietary information, device configurations, usernames/passwords out on the internet comes to mind (whether that be maliciously or something as innocent as to your personal email so you can look over them at home after work wouldn't matter if it breaks explicitly stated policy). I think you are getting too hung up on the technical security side without considering the business aspects of security. Businesses calculate risk to the organization and you better believe user error is in that calculation. Any business worth a damn and even ones who aren't are putting you in place (and paying you a salary) as a security employee to help them mitigate that risk and not for the reason of dumping all the blame on you when something goes wrong (if they wanted to do that they wouldn't need to make you a "security" person they would just do that to any employee who might be at fault). The bottom line is you are a cost to the company but they think by paying your wages you will help mitigate that risk to the point where your salary costs far less than any breaches that will happen.
Why not voice these concerns to your superiors? It seems like an open and honest conversation would be a good idea if you are this worried.WIP: IPS exam -
paul78 Member Posts: 3,016 ■■■■■■■■■■@nicklauscombs - great examples but you described misconduct. When I said negligence, that refers to things like allowing a web app to be deployed without a firewall or setting up new office space without locks on the front door.
@chooselife - hopefully the paper addressed your concerns. Like afcyung, I too am curious about your perception on personal liability. Like any other profession, with increasing responsibility in career advancement, there will always be additional accountability.