{"id":2563,"date":"2020-07-28T09:20:09","date_gmt":"2020-07-28T13:20:09","guid":{"rendered":"https:\/\/zzzptm.com\/wordpress\/?p=2563"},"modified":"2020-07-28T09:20:09","modified_gmt":"2020-07-28T13:20:09","slug":"does-security-require-imagination","status":"publish","type":"post","link":"https:\/\/zzzptm.com\/wordpress\/?p=2563","title":{"rendered":"Does Security Require Imagination?"},"content":{"rendered":"\n<p>I&#8217;ll open with my premise: if security&nbsp;<em>does<\/em>&nbsp;require imagination, then we&#8217;re in for trouble. So we&#8217;re going to need an answer for that&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/question\">question<\/a>, and I&#8217;m afraid the answer is &#8220;yes.&#8221; Let me explain&#8230;<\/p>\n\n\n\n<p>I was recently&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/chatting\">chatting<\/a>&nbsp;with a colleague about how I enjoy my job. I thought I was talking about my passion for security, but he heard differently. He heard how my imagination and curiosity were prerequisites for my successes. He pointed out, &#8220;If someone doesn&#8217;t have the intuition that you have, how is he going to do security successfully? He can fill out a requirements list, do an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/audit\">audit<\/a>&nbsp;checklist, follow&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/regulations\">regulations<\/a>, but how is a person without that imagination going to be able to go beyond that and really get security done?&#8221;<\/p>\n\n\n\n<p>In my role, I sometimes get a chance to deliver&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/training\">training<\/a>&nbsp;for the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/product\">product<\/a>&nbsp;I support at $VENDOR. In those classes, I always enjoy a good discussion, when the participants are lively and engaged. But that&#8217;s not every class I&#8217;ve taught. I&#8217;ve taught classes where I had to help winkle out the answers from the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/students\">students<\/a>&nbsp;with leading questions. I&#8217;ve had students that may have been innovative and clever, but who did not see their future at the company that paid for their training. Demoralized and discouraged, they had no interest in applying their wits and insight to their current employers&#8217; needs.<\/p>\n\n\n\n<p>So, we need imaginative *and* motivated&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/employees\">employees<\/a>&nbsp;to do security right. Great, that really tightens up on my premise. Adding that &#8220;motivated&#8221; adjective cuts deep into the &#8220;imaginative&#8221; group. The imaginative ones tend also to be ones that need the best motivations to stick with their roles in security, so that makes the effective&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-professional\">security professional<\/a>&nbsp;even more of an endangered species, if not an outright unicorn.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/peerlyst\/image\/upload\/c_limit,dpr_2.0,f_auto,fl_lossy,h_375.892,q_auto,w_455\/v1\/post-attachments\/imagination_nn5s6x\" alt=\"\"\/><\/figure>\n\n\n\n<p>I&#8217;m not going to go deep into the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/game-theory\">game theory<\/a>&nbsp;of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/career\">career<\/a>&nbsp;path decisions. If one threatens to quit over an issue at work, one either gets passed over for promotions and opportunities because one is seen as a short-timer, or that&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/threat\">threat<\/a>&nbsp;becomes stale if used more than once or twice. Therefore, one doesn&#8217;t threaten to quit, one simply quits and moves on. If firms want to retain the imaginative by keeping them motivated, then those firms have to be proactive.<\/p>\n\n\n\n<p>But back to those imaginative people&#8230; do firms really want to retain them? Those imaginative people can be high maintenance types, you know. Is it better to keep the &#8220;bread-and-butter&#8221; types on the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/payroll\">payroll<\/a>&nbsp;and let&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vendors\">vendors<\/a>, VARs, and outsourcers worry about managing the artistes of our profession? After all, we don&#8217;t need imagination all of the time. Quite a lot of work in security is simply painting by numbers. What are the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vendor\">vendor<\/a>&nbsp;best practice recommendations? Follow those. What are the regulatory requirements? Implement those. Maintaining&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/code\">code<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/blocks\">blocks<\/a>,&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ip-address\">IP address<\/a>&nbsp;assignments, switch configurations, application stores,&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/document\">document<\/a>&nbsp;libraries &#8211; you and I both know that there&#8217;s drudgery in those tasks, and any level 1&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/tech\">tech<\/a>&nbsp;with a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/runbook\">runbook<\/a>&nbsp;can handle them.<\/p>\n\n\n\n<p>So when, exactly,&nbsp;<em>do&nbsp;<\/em>we need the imagination? I know we need it when analyzing the data. Yes,&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/algorithms\">algorithms<\/a>&nbsp;can sort through quite a lot of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/noise\">noise<\/a>&nbsp;to get to the signal, but what does the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/algorithm\">algorithm<\/a>&nbsp;know about things it could not have been programmed to handle? Leave&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/zero-day\">zero-day<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/exploits\">exploits<\/a>&nbsp;aside, we have to know what to do when there&#8217;s a new production application in play! It takes imagination and initiative to think of what that new signal might be and who to ask about it so that it can be exempted from&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/blocking\">blocking<\/a>&nbsp;rules.<\/p>\n\n\n\n<p>We also need imagination after a breach. There&#8217;s&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/chaos\">chaos<\/a>&nbsp;and mayhem all around, and it takes some proper cleverness to think of all the other evil that could be taking&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/root-1\">root<\/a>&nbsp;as that chaos and mayhem distracts our attention. We need multiple imaginations here, not just one. Different eyes, different minds, different experiences can inform a broad range of responses that build off of each other.<\/p>\n\n\n\n<p>But before the breach, we could certainly use imagination in red and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/blue-teams\">blue teams<\/a>&nbsp;experimenting with both ways to&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/penetrate\">penetrate<\/a>&nbsp;and ways to mitigate. Someone has to ask the questions about the environment that lead to fuzz&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/testing\">testing<\/a>&nbsp;and investigations. There&#8217;s no way to put &#8220;think of something new&#8221; in a runbook, the human mind just doesn&#8217;t work that way.<\/p>\n\n\n\n<p>There&#8217;s also a call for imagination not on the technical side, but on the process and procedure side. We have to be creative in how we submit requests and apply for&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/resources\">resources<\/a>&nbsp;so that we don&#8217;t get shot down or delayed. This isn&#8217;t out of the box thinking &#8211; the people on the other end of the request will reject anything that doesn&#8217;t conform to their box. This is&nbsp;<em>inside&nbsp;<\/em>the box thinking, except with the ability to somehow merge normal spacetime into a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/singularity\">singularity<\/a>&nbsp;that allows for bypassing internal red tape while still, overall, complying with&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/corporate\">corporate<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/processes\">processes<\/a>&nbsp;and procedures.<\/p>\n\n\n\n<p>So, we&#8217;ve got a problem, as I mentioned at the outset. We need creative, imaginative people, and those types simply do not&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/grow\">grow<\/a>&nbsp;on trees. (In point of fact, no humans grow on trees, it&#8217;s something to do with our mammalian biology, as I understand&#8230;) And while we can encounter a few natural gifted visionaries in the wild, there simply aren&#8217;t enough to go around for all the needs of all the firms in the world.<\/p>\n\n\n\n<p>That leads to the question: can we teach people to be creative?<\/p>\n\n\n\n<p>And if so, who is responsible for that?<\/p>\n\n\n\n<p>While my&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/education\">education<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/experience\">experience<\/a>&nbsp;gives a firm &#8220;yes&#8221; to answer the first question, I&#8217;ve got no answer from experience to deal with the second. I would suppose that the firm that desires creative people needs to be about the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/business\">business<\/a>&nbsp;of teaching them, but I don&#8217;t see any programs that are geared for that. Let&#8217;s face it, most of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-training\">security training<\/a>&nbsp;deals with&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/learning\">learning<\/a>&nbsp;the tools, technical stuff. Where in our profession do we see training that gets people to think creatively?<\/p>\n\n\n\n<p>As I typed that, the answer came to me &#8211; look at our&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/end-user\">end-user<\/a>&nbsp;security training. We teach people&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/how-to\">how to<\/a>&nbsp;spot&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/phishing-attacks\">phishing attacks<\/a>,&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/social-engineering\">social engineering<\/a>, things like that. Not everyone passes that training brilliantly, but enough people do to show that it has value in and of itself, but also as creativity training. To successfully deal with a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/phishing-attack\">phishing attack<\/a>, for example, we tell people how to analyze certain data and evaluate it. We don&#8217;t provide a list of all possible bad links to click, but we do have a few short rules on how to spot them. And, unlike an algorithm, the human mind can adapt and extend lessons to new situations with ease.<\/p>\n\n\n\n<p>Maybe, then, we don&#8217;t have trouble. We just have a need to perhaps change our accounting rules and consider people as unique&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/assets\">assets<\/a>&nbsp;that can be improved, not identical&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/widgets\">widgets<\/a>&nbsp;that can be swapped interchangeably. But I can guarantee that it&#8217;ll take some imagination in order to close the imagination&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/gap\">gap<\/a>&nbsp;at where you work.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;ll open with my premise: if security&nbsp;does&nbsp;require imagination, then we&#8217;re in for trouble. So we&#8217;re going to need an answer for that&nbsp;question, and I&#8217;m afraid the answer is &#8220;yes.&#8221; Let me explain&#8230; I was recently&nbsp;chatting&nbsp;with a colleague about how I enjoy my job. I thought I was talking about my passion for security, but he [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2563","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2563"}],"version-history":[{"count":1,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2563\/revisions"}],"predecessor-version":[{"id":2564,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2563\/revisions\/2564"}],"wp:attachment":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}