Sie sind auf Seite 1von 14

ANTI-SOCIAL

BEHAVIOR

The use of social-networking


platforms is on the rise,
increasing the risk of
data leaks

Also in this eBook:


• Underscoring Cloud Security Issues
• State of Cybersecurity Survey Results
• Today’s Essential Skills: What’s in Demand?
• Global Insight: Geographical Security Issues Overlap
UNDERSCORING
CLOUD
SECURITY
ISSUES
Cloud computing offers many benefits, but it’s
important to be aware of the security risks.
Troy Giefer explains.

loud computing has quickly transformed


from the latest buzzword to a trend that some of the IT indus-
try’s biggest players are taking seriously and a service in which
they are investing serious resources.
However, cloud computing has some significant security
risks that commercial and government users must address before
I LLU ST R AT I O N BY M I C HA E L M O R G E N ST E R N / T H E I S P OT

they commit to relocating their organizations’ data, applications


and services. Information security professionals need to under-
stand these risks as well as the potential benefits and the impact that cloud computing
may have on traditional security tasks and roles within the organization.
But first things first: What is cloud computing? In a traditional IT environment,
services, data and applications are typically located on the end user’s machine or on
servers within the corporate infrastructure. This infrastructure may be centralized
or distributed; however, the organization typically owns and controls access to the
majority of the computing resources and services.
In cloud environments, organizations relocate resources such as data, applications
and services to computing facilities outside the corporate firewall, which the end user
then accesses via the Internet. The cloud computing environment also provides orga-
nizations access to new services and applications, increased processing capacity, col-
laborative capabilities and managed services such as data backup and restoration,

ISSUE NUMBER 6 INFOSECURITY PROFESSIONAL 9


Reviewing the latest
sports highlights

Attending a Review
Seminar online

Put your time to better use. In pursuit of


your (ISC)²® certification, attend an Official
(ISC)² CBK® Review Seminar live online, in
person or on site. You’ll ready yourself for
an (ISC)² exam by refreshing your knowledge
in information security. You’ll also send a
message to peers and current employers that
you’re in this game for real.
Learn more at www.isc2.org/reviewseminar

Look for an (ISC)2 Authorized Education Provider.


and security—all on demand and at costs often below what
individual organizations can achieve.
Organizations must
cloud environments typically consist of enormous data be sure that their
centers operated by industry-leading organizations—ama-
zon, Microsoft, Google, for example—with resources that may
proprietary data
be distributed globally. they often offer massive economies of is adequately
scale, services over the Internet, pay-as-you-go cost models, PRoTecTeD as it
multi-tenancy and the use of virtualization technologies.
is TRansfeRReD
The Risks between the end
Information security professionals need to understand the
potential security risks associated with cloud computing early user and the cloud
in the planning stages to best mitigate the risks. data center.
Security was rated as the top concern for organizations
considering a cloud computing strategy in a September 2008
InformationWeek survey of 456 business technology profes-
sionals. respondents also identified security as the second
most important element when choosing a cloud vendor.
So, what are some of the specific security risks that orga- specific areas of a cloud for information at different classifica-
nizations will have to deal with when moving to a cloud com- tion levels, or for military or government use only.
puting environment? n Maintaining compliance. Public and private organiza-
n Protection of data in transit. organizations must be tions have regulations and standards that must be adhered to
sure that their proprietary data is adequately protected as it with regard to data privacy and protection. the data owner
is transferred between the end user and the cloud data center. must take appropriate actions to ensure the security and integ-
While interception of data in transit should be of concern to rity of the data—such as developing a security policy, auditing,
every organization, the risk is much greater for organizations ensuring that proper controls are in place and performing risk
utilizing a cloud computing model, where data is transmitted assessments. organizations considering a cloud vendor must
over the Internet. unsecured data is susceptible to intercep- be sure the provider understands the role it plays in assisting
tion and compromise during transmission. customers in meeting and maintaining compliance with gov-
Hackers can use packet sniffers to monitor traffic passing ernmental and commercial data protection and privacy laws.
through nodes between the sender and the receiver, or inter- n Data privacy. It is possible that a cloud provider has data
cept improperly secured wireless communications to conduct centers in foreign countries, where data privacy and security
session hijacking and man-in-the-middle attacks. the good laws differ, and that allow cloud administrators and law-
news is that most cloud vendors use secure socket layer (SSl) enforcement officials full access and control of end-user data.
or similar encryption protocols to secure data in transit. Data privacy risks also come into play during investigative and
n securing data at rest. In a cloud computing environ- forensic efforts. ask the cloud provider where your data will
ment, data from different organizations at different protection reside and the role it plays in incidents such as data spills.
levels may be stored in a shared environment. Providers must n Data availability and recovery. ensuring data availabil-
address the unique challenges this brings and demonstrate to ity and recovery is arguably the most difficult of the security
clients their solutions to these challenges. cloud providers are risks to mitigate because of the use of the Internet as the back-
responsible for maintaining separation of data as they pro- bone between your local infrastructure and the cloud pro-
mote the sharing of cloud applications and hardware hosted vider. connectivity issues may arise due to peaks in network
on virtualized images. usage along any point across the Internet over which neither
the very act of storing data in the cloud to improve avail- your organization nor your cloud provider has control. Inter-
ability and access from anywhere in the world substantially net outages caused by denial-of-service (DoS) attacks, natural
increases the number and types of threats to that data. orga- disasters or technical problems at an ISP will have a negative
nizations should ask their cloud provider what controls have impact on your ability to access data and services.
been implemented to defend against threats such as hackers, although cloud providers offer service-level agreements to
online crime, viruses and spyware. protect against substandard performance, these agreements
Some cloud vendors leave the decision to encrypt and the will apply only to vendor-controlled services, not Internet or
method of encryption up to the user, while others maintain ISP performance. also, while a contract with your cloud pro-
their own encryption-key infrastructure. Possible solutions vider may guarantee payment for vendor outages, what is the
that the end user can implement are authentication technolo- impact to your business if your data is not accessible?
gies, such as digital certificates and biometrics, while cloud Both cloud users and providers must be responsible for
providers could separate a customer’s data into individual maintaining adequate Internet access; this involves dual-
instances of applications—such as databases—or partition homed ISPs and putting proper protections in place to deal

Issue Number 6 InfoSecurIty ProfeSSIonal 11


with vulnerabilities. although cloud providers have data Providers can distribute antivirus software, personal fire-
backup and recovery procedures, an organization should wall applications, and whole-disk encryption technology to
maintain local backups of critical data in case of a temporary mobile users on demand or as required in specific situations—
loss of connectivity or, even worse, provider bankruptcy. such as at initial connection to the cloud environment. they
can also evaluate devices each time they connect to ensure that
Security BenefitS they have applied all security patches and fixes prior to access-
although there are inherent security risks to cloud comput- ing the cloud infrastructure. It is important to understand,
ing, there are many security benefits that may drive your orga- however, that outsourcing key security services does not com-
nization to adopt a cloud computing model. pletely relieve the security department from managing and
first, cloud providers can afford to implement and main- maintaining security for the local infrastructure.
tain best-of-industry security solutions and hire industry- Data backup in the cloud is an optimal solution for organi-
leading experts because they have paying clients. this is in zations with limited data center space or when there is a tem-
contrast to the battle raging in most organizations, where It porary need for access to increased amounts of data storage.
and security departments fight over a limited budget and criti- one word of caution: costs should be carefully weighed, as
cal security solutions get left on the negotiating table. most vendors charge for transfer of data into and out of their
data centers. this makes cloud computing best suited for stor-
age of static data accessed infrequently.
finally, organizations stand to benefit from a reduced risk
of data loss by storing corporate data in one central location
Information security that is accessible from anywhere in the world with Internet
professionals and access. this minimizes the need to store local copies of data on
fixed or mobile devices and reduces the risk of loss or theft.
IT leadership should
understand the impact to the organization
Information security professionals and It leadership should
impact that understand the impact that moving data, applications and ser-
moving data, vices to the cloud will have on security and traditional security
applications and roles. for example, organizational security policy will need
to be updated to account for third-party services offered by
services to the cloud cloud providers; system boundaries will expand to include the
will have on security architecture and services of cloud computing environments;
security and It staff will be freed from routine administrative
and traditional or security tasks that are outsourced to cloud providers.
security roles. likewise, the decision to move to a cloud computing
architecture may impact traditional security roles within the
organization. Security leadership should focus on enterprise
security outside the firewall and manage relationships with
primary cloud providers and subvendors. and security staff
additionally, large cloud providers often have the ability may spend less time on routine administrative tasks such as
to detect and defend against new malware and hacker attacks virus defense, patch management and email filtering, and
sooner than smaller, individual organizations. cloud provid- more time managing security solutions as cloud vendors pro-
ers process millions of transactions each day that originate vide managed security services.
from users globally, giving them global threat visibility and Information security professionals should become famil-
zero-hour malware detection capability. iar with technologies used by cloud providers, such as virtual-
the large-scale capacity and infrastructure offered by ization and aPIs, and the particular security strengths and
cloud vendors is an exceptional environment for fighting off weaknesses of these technologies. they should increase their
major threats such as distributed DoS attacks. the virtualized focus on areas such as protection of data in transit and the
environments deployed by most cloud vendors offer the flex- unique privacy and compliance issues raised by cloud com-
ibility to isolate portions of the cloud under attack and quickly puting versus in-house security concerns.
relocate services to avoid outages.
another cloud benefit is that organizations can avoid large Troy Giefer, CISSP, is an information assur-
investments in security resources by transferring some secu- ance consultant for an international consult-
rity responsibility to cloud providers. cloud vendors can pro- ing firm based in Virginia. He is involved in
vide 24/7 services such as firewall monitoring, intrusion detec- cloud computing research and the develop-
tion and prevention, email filtering and patch management. ment of cloud computing security offerings for
the vendor may also provide in-house forensic support. the government market.

12 InfoSecurIty ProfeSSIonal Issue Number 6


A Matter of Federal Security
C I S O s I n t h e U.S. government agencies and bureaus, gives vulnerabilities.
sector believe the global economic insightful overviews of how these ▪ CISOs’ top three priorities
crisis will increase information groups go about their work. It are: addressing threats to gov-
risks, according to a compre- takes a look at security tools and ernment data and information
hensive “State of Cybersecurity” technologies being used; success systems; improving cybersecurity
survey sponsored in part by (ISC)2. of information programs and governance; and meeting compli-
And as a result of these growing initiatives; and agencies’ ability to ance objectives.
threats, federal CISOs say there recruit and retain personnel. ▪ The top three technology
is pressure to quickly implement Other survey highlights: tools CISOs need are stronger
security solutions, which should ▪ 48 percent believe that intrusion detection and preven-
result in the ability to retain criti- external threats resulting in data tion; stronger authentication;
cal security employees. loss are the greatest risk to the and encryption.
The study, the first of its kind federal government, followed For a copy of the report, visit
among U.S. federal government by insider threats and software www.isc2.org/ciso.
data
leaks

AnTi-SociAl
Be hAvior
The threat Drip, drip, drip… That’s the sound of
level of social- confidential corporate data leaking out onto the
networking Web through social-media sites. Information secu-
platforms is rity professionals can’t ignore it any longer.
rising fast, The Brits love a good scandal, and this was a
writes good one. In April, a senior aide to England’s Prime
John Soat. Minister Gordon Brown was forced to resign after
emails written by him purportedly detailing plans
to humiliate his political rivals were made public.
In his resignation statement, Damian McBride
wrote: “I am shocked and appalled that, however
they were obtained, these e-mails have been put
into the public domain.”
However, it isn’t only politicians’ tion security professionals. DesigneD
information that is being leaked to the experts say a comprehensive It secu- to Leak
public. In a study called “risky Business: rity strategy must incorporate the use of the problem is straightforward. “Social
reputations online,” public-relations social media, and that this demands a media [platforms] are designed to leak,”
firm Weber Shandwick surveyed more reorientation to the Internet. Security says Mark rasch, a consultant with
than 700 senior executives last year. managers must stop thinking of Inter- Secure It experts and the former head
respondents ranked “confidential or net access in on/off, all-or-nothing of the u.S. Department of Justice’s com-
leaked info will appear online” as being terms and instead look on it as a series puter crime unit. the casual nature of
the top online risk to their companies’ of conversations to be monitored in real communication in social media and its
reputations. time and in context, with effective rules immediacy and informality, combined
confidential corporate data finding being applied. with the global reach of the Internet, con-
its way onto the Web isn’t new. But the Just as important, information secu- tributes to making social networks “the
rapid proliferation and popularization rity professionals must ensure that their world’s largest coffee klatch,” he says.
of interactive online platforms such as organizations’ written security policies It’s a klatch that’s growing. time
blogs, wikis, chat rooms and messag- spell out the appropriate use of social spent on social-networking sites has
ing sites such as twitter—collectively media and that employees are well- eclipsed time spent on email, according
known as social media—have upped aware of consequences for not follow- to a recent survey by market research
those stakes significantly for informa- ing those rules. firm nielsen online. and that includes

googling security The search giant


saves a lot
Gmail Mobile:
mobile phones are

and Privacy of information. increasingly being sold


with Gmail built in, and
Here’s what you if not, it can be down-
It’s no secret that Google retains search data and meta- should know. loaded. The questions to
data regarding searches—in fact, it’s quite open about ask: How uniquely does your
doing so. What’s unsure, though, is the long-term threat to mobile phone identify you as
information security and privacy. the user, and when was the
Let’s review Google’s elements. last time you changed your
sive, sublicensable, transfer- phone and your identifiers?
Google Search: This search who searched for that term, able, royalty-free, perpetual, Gmail Patents: Gmail’s
engine is gathering many which is identified either by irrevocable right to copy, Patent #20040059712
types of information about IP address or Google cookie distribute, create derivative emphasizes “serving adver-
online activities. Its future value. Conversely, if an IP works of, and publicly perform tisements using information
products will include data address or Google cookie and display such data. associated with email.” This
gathering and targeting as a value is given, Google can also Gmail: The primary risk allows Google to create
primary business goal. produce a list of the terms in using Gmail lies in the profiles based on a variety
All of Google’s properties— searched by the user of that IP fact that most users give of information derived from
including Google search, address or cookie value. their consent to make Gmail emails related to senders,
Gmail, Orkut and Google Orkut: Google’s social- more than an email-delivery recipients, address books,
Desktop—have deeply linked networking site contains service and enable features subject-line texts, path name
cookies that will expire in confidential information such such as searching, storage of attachments and so on.
2038. each of these cookies as name, email address, phone and shopping. This correla- Google Desktop:
has a globally unique identifier number, age, postal address, tion of search and mail can Google Desktop allows users
(GuID) and can store search relationship status, number of lead to potential privacy risks. to search their desktops
queries every time you search children, religion and hobbies. For example, email stored on using a Google-like interface.
the Web. Google does not In accordance with its terms third-party servers for more All word-based documents,
delete any information from of service, submitting, posting than 180 days is no longer spreadsheets, emails and
these cookies. or displaying any information protected by the electronic images on a computer are
Therefore, if a list of on or through the Orkut.com Communications Privacy Act, instantly searchable. Index
search terms is given, Google service automatically grants which declares email a private information is stored on the
can produce a list of people Orkut a worldwide, nonexclu- means of communication. local computer. Google Desk-

16 InfoSecurIty ProfeSSIonal Issue Number 6


the corporate environment. Many com-
panies are beginning to realize how “Social media [platforms] are
valuable social media can be in terms of
brand management and product mar- designed to leak.”
keting—and, in particular, for customer
service—as a way to establish close rela- — m a r k r a S c h , S e c u r e i t e x p e rt S
tions with valuable constituencies. on
top of that, social networking is a way of for sensitive corporate data. “Whistle- users are more likely to open an attach-
life for most of the emerging workforce, blowers can submit documents anony- ment they think is from someone in
guaranteeing its expanding use. mously and untraceably,” according to their group.
Data leaks in social media often are the site’s faQ list. Just as insidious, says Paul roberts,
inadvertent: a salesperson posting a tweet Social networks have opened a whole enterprise security analyst with the
about a new sales prospect or a developer new vector of attack for hackers and 451 Group, is the potential for social
sharing details on an industry blog. or criminals. Kaspersky lab’s most recent engineering. “employees might inad-
they can be intentional. the Website malware study finds that malicious code vertently expose data via their facebook
Wikileaks (wikileaks.org), which has distributed via social-networking sites is walls that the company doesn’t want
as its tagline “We help you safely get the 10 times more effective than that spread exposed,” he says. “even innocuous stuff,
truth out,” provides an online platform in email. the reason: trust. facebook like naming your boss, or where you

top 3 allows users to search such as employees, cowork- because Google in its privacy what happens to the privacy
across multiple computers. ers and customers—to store policies states that it records and confidentiality clauses in
GD3 stores index and copies their health records with IP addresses. your employee and customer
of files on Google’s servers for Google. Recently, CVS Care- So, what’s to stop Google contracts?
nearly a month. mark, along with Walgreens from analyzing all search data Another area of con-
Chrome: Chrome is and Longs Drugs in the from your organization’s net- cern for hosted email is the
Google’s browser. It’s avail- United States, agreed to allow works? What’s the difference potential of having to turn that
able for download today and Google Health users to import between analyzing flu trends data over to the government.
will eventually be installed on their pharmacy records. and “Top 100 search terms Google, Yahoo and Microsoft
new PCs. some of the risks it from XYZ Corp.”? Or what if have a history of comply-
poses include: Organizational Threats a company were to correlate ing with the united states’
• Every URL visited gets uninstalling these products regional threats from swine flu and foreign governments’
logged by Google or using competitive tools with search data from Google requests for information. If
• Every word, partial word can mitigate many of these Health/Prescription data and such data is turned over, how
or phrase typed into the loca- threats. but what about the then analyze the health of its much corporate security is
tion bar, even if you don’t click dangers to your organiza- employees and detect long- being eroded?
the Enter/Return button, gets tion? One example is Google term effects? Consider the amount of
logged by Google search with its Google Flu Overall, the most critical money and manpower dedi-
• Chrome sends an Trends (www.google.org/ threat is reliance on Gmail— cated to handling microsoft
automatic cookie with every flutrends). whether the setting is uni- Windows patches, viruses,
automatic search it performs Google has correlated flu versities, cities, companies or spyware and botnet detec-
in the location bar. data from the u.s. Centers countries switching to Gmail tion. Imagine the impact that
Android: Android is for Disease Control (CDC) en masse, or the newest reliance on Google products
Google’s operating system from 2003 to the present with employees in the organization could have on corporate
for cell phones. It retains its own search data. spikes using Gmail as their primary or privacy and security.
information about dialed in users’ searches about flu sole email platform.
phone numbers, received treatments correlated tightly Questions to ask your
phone-call numbers, Web with the CDC data. Flu Trends security team: How big is the Raj Goel, CISSP, is chief
searches, emails and geo- has demonstrated Google’s organization’s email archive? technology officer of Brain-
graphic locations at which the ability to analyze search data How many years of emails link International, an IT
phone was used. for a specific term or set of are saved? If your organiza- services firm. He is located in
Google Health: This terms. And it can retain this tion switches its email host- New York and can be reached
product allows consumers— data and where it came from ing service to Google Gmail, at raj@goel.com.

Issue Number 6 InfoSecurIty ProfeSSIonal 17


work or the name of the project you’re Picasa, Stumbleupon, tribe.net and Vid- the culture of the company. at a high
working on” can be compiled and used dler—to mention a few. Google, with its level, though, a social-media policy is
by hackers to gain access to a facility or to brand extensions, presents its own set of simple: Don’t be stupid. employees
an individual’s Pc, he says. problems in how data finds its way onto must use their heads when they’re social
Mobile technology also is problem- the public Internet (see sidebar, “Goo- networking, especially as representatives
atic. access to social networks via mobile gling Security and Privacy,” page 16). of their organizations.
devices nearly tripled last year, accord- that’s why context is so important. facetime has a clearly spelled out
ing to nielsen. twitter, with its 140-char- the idea is to “create rules around the Web 2.0 policy, says ceo ambwani. at a
acter limit, is the perfect platform for type of content [employees] can see or strategic level it goes like this: “Be mind-

“Employees might inadvertently expose data via their


Facebook walls that the company doesn’t want exposed.”
— Pa u l r o b E rt s , t h E 4 5 1 G r o u P

cell-phone users. the photo and video engage with,” says Dave Meizlik, direc- ful of what you’re communicating.” at a
capability of mobile phones represents tor of product marketing at Websense, tactical level, salespeople can’t talk about
a potential avenue to exposing propri- a Web monitoring and content manage- specific customers they’re working with
etary corporate data, both purposeful ment vendor. there are three impor- and developers can’t talk about particu-
and inadvertent. tant contextual indicators, he explains. lar projects or features they’re working
“When you understand the user, the data on, he says.
What’s and the destination, you can set policy a factor that should not be underesti-
Being said around those,” Meizlik says. “that allows mated is employee satisfaction. Security
addressing this security challenge you to set business intelligence controls professionals should encourage their
involves knowing what’s going out of but still enable business.” companies to conduct employee-sat-
your organization as well as what’s com- also, companies should track social- isfaction surveys and to take them seri-
ing in, says rasch. Instead of simply media sites for potentially compromising ously. Satisfied employees can be strong
blocking Websites, companies must be content. rasch calls this “open-source advocates for their companies in the
“appropriately monitoring what’s going monitoring,” and there are several prod- social media; unhappy employees are
out of the corporation and what’s being ucts and services that can follow every social-media time bombs.
said by people in the company,” he says. mention of a company’s brand or logo Information security professionals
there are a growing number of tech- in the blogosphere. usually these are can’t ignore the growing use of social
nology solutions attempting to address marketing tools, but information secu- media and the increasing threat level it
this problem, says the 451 Group’s rity professionals might want to employ represents. the security risks related to
roberts: “It’s a very hot area right now.” them, for instance, to seek wayward peer-to-peer networks are well-docu-
Most solutions have secure gateways intellectual property. this effort can be mented, yet many people might be sur-
that monitor Web traffic and keep track accomplished with tools as simple as prised to find out how prevalent P2P is
of social media as it evolves. “our core Google alerts or yahoo Pipes. in the corporate environment. face-
capability is our ability to understand time regularly polls the gateway devices
several thousand applications at the Policy installed at its customers’ sites. In its
egress level,” says Kailash ambwani, ceo Matters most recent survey of the 80 locations
of facetime communications, which Still, vendors themselves admit that represented, 94 percent have at least one
markets a Web monitoring and content technology alone won’t solve the prob- P2P end-point.
management system. lem. “technology is an enabler for good In terms of social-networking sites,
Part of the problem is that facebook, policy,” says Meizlik. that number is 100 percent. and that’s a
MySpace and twitter are only the best- companies must update their secu- lot of egress points.
known names in the social media; there rity policies to address the use of social
are many more, with a variety of pur- media. But what such a policy might John Soat is a freelance business and
poses, such as Delicious, friendfeed, entail depends, to a certain degree, on technology journalist based in Ohio.

18 InfoSecurIty ProfeSSIonal Issue Number 6


career corner professIoNal advIce for your career

Today’s Essential Skills


from certIfIcatIoNs to specIfIc securIty skIll sets,
louIse HarrIs reports wHat’s IN demaNd.

tends to hold more power.


another area of expertise in
demand is for Payment card Indus-
try Data security standard special-
ists. there is a strong demand for
experience in taking companies
through the compliance process,
provided that salary expectations
are not unrealistic. companies that
need quality employees to deliver
consultancy to corporate clients in
this area generally seek individuals
who have gained these skills per-
haps as part of a broader role and
are willing to specialize.
finally, skills that never go out
of fashion are soft skills. the ability
a survey By the computing technology Industry association found
to communicate and interact with
that expertise in security, firewalls and data privacy are considered the
people of all levels, getting them to
most important skills for It staff.
recognize risk and own the goals of
the survey, conducted world- the cIssP®, cIsa and cIsM— an information security program,
wide last year with more than 3,500 with employers most frequently often requires a high level of diplo-
respondents in 14 countries, found requesting the cIssP. macy. all the qualifications around
that security is clearly a key skill for less-experienced candidates are no substitute for the right inter-
It professionals. But what are the who show dedication and motiva- personal skills. Information secu-
most sought-after skills and quali- tion in gaining qualifications are rity professionals must strengthen
fications in the security sector? well-regarded by potential employ- their abilities and recognize that
Information security general- ers and are likely to have an edge doing so is as much a vital part of
ists who have come up through over applicants who haven’t started professional development as the
the experience-only route are down the certification route. seize next certification.
best advised to gain a recognized the time to enhance or attain cre-
information security qualifica- dentials wherever possible. Louise Harris is the director of Alder-
pHoto top by moodboard/corbIs

tion before looking for their next Information security special- bridge Network Recruitment, which
job. the further up the career lad- ists, most notably penetration has been providing
der these professionals climb, the testers and forensics analysts, are specialist informa-
higher the expectation will be that continually in demand by employ- tion security recruit-
they hold one or multiple certi- ers. In these cases, while relevant ment services across
fications. the most commonly certifications and qualifications Europe for more
sought-after qualifications are are desirable, solid experience than 10 years.

Issue Number 6 InfosecurIty ProfessIonal 23


global insight INTerNaTIoNal INformaTIoN securITy perspecTIves

Similar and Yet the Same


Though each geography has ITs securITy Issues, There
are maNy areas of overlap, wrITes peTe algar
another key driver in some parts of the world. how-
ever, this risk is perceived differently in different parts
of the globe. In some localities, terrorist threats to
security systems are new; in others it has been seen as
a new variant of a previous threat.
censorship, media regulation, industry self-regu-
lation and government regulations are also handled
differently in various parts of the world.

Sharing Common Ground


yet with all these differences, there are many things
information security professionals have in common.
We are in an uphill struggle to protect our organiza-
tion’s data, and we’re constantly trying to understand
InformatIon SecurIty haS to be one and predict the ever more ingenious ways the “bad
of the most interesting and diverse professions to guys” invent to attack our information resources.
work in right now. I see many differences, but there’s We are beginning to see some global standards
an increasing convergence as our profession matures. being adopted—for example, Payment card Indus-
the global nature of security adds further diversity try Data Security Standard for credit card payments.
with the inherent differences in language, culture also, the ISo 27000 series of standards is becoming
and regulation. established as an integrated criterion for information
security as well as for related areas such as business
All Regulation Is Not Created Equal continuity and risk management.
regulation has been one of the key drivers in devel-
oping information security in recent years. there What’s Next?
are obvious geographical differences in regulation I believe we will see a move from specific regulations
with limited application globally. the united States toward overall standards as the information security
has developed regulatory legislation such as the Sar- sector continues to mature. there will continue to
banes-oxley act and the healthcare Insurance Por- be specific local needs, and language and cultural
tability and accountability act (hIPaa). differences will continue to provide new views into
europe has strong privacy and data protection handling security.
regulations, but even these are not consistently It’s interesting and rewarding to work in a pro-
applied across the continent. Some regulations are fession that is still defining itself and its place in the
applied outside of their region of origin, others are world.
phoTo Top by george DIebolD

purely local. these differing regulations sometimes


present contradicting requirements in different ter- Pete Algar Dos Santos, CISSP, is a
ritories. thus it is often difficult for the information business security manager for a large
security professional to get it right every time. financial services and insurance pro-
the recent escalation in terrorism has been vider. He is located in Bristol, U.K.

24 InfoSecurIty ProfeSSIonal Issue Number 6


Lingering in the
breakroom

Recruiting pre-qualified
infosecurity pros

Act now. If you’re an employer looking for


IS professionals with unequaled (ISC)²®
credentials, go to our Career Tools site. You
can post your jobs - it’s free - or look over
the resumes of certified (ISC)² credential
holders. We have many. Your competitors
can talk all they want about hiring the best
employees, but you can do something about it.
Learn more at www.isc2.org/careers
www.isc2.org

Das könnte Ihnen auch gefallen