- Assess whether current board culture, composition and agendas are fit for purpose in the current disruptive business environment.Assess the current team culture, composition, priorities, skills & competences, expertise, relationships, interests etc. with a view towards the future. How should the team evolve or adapt to changing circumstances, building on past successes and learning from failures?
Friday 19 April 2024
Systematically improving professional services
Thursday 18 April 2024
Measuring and managing ethics
KPMG's Soft Controls model caught my beady eye this week:
Thursday 28 March 2024
An evolutionary revolution?
"Mitigation and adaptation are required together to reduce the risks and impacts of climate change, including extreme weather events. Mitigation refers to actions taken to limit the amount of greenhouse gas emissions, reducing the amount of future climate change. Adaptation refers to actions taken to limit the impacts of a changing climate. Mitigation and adaptation together provide co-benefits for other environmental and social goals."
That paragraph by Lizzie Fuller, Climate Science Communicator for the UK's Met Office, plucked from another excellent digest of lessons learned from various UK resilience exercises and initiatives, obviously concerns climate change ... but it occurs to me that 'mitigate and adapt' might be a novel approach to information risks and impacts as well.
Wednesday 27 March 2024
Pragmatic ISMS implementation guide (free!)
Early this morning (very early!) I remotely attended an ISO/IEC JTC 1/SC 27/WG 1 editing meeting in London discussing the planned revision of ISO/IEC 27003:2017.
- 27003 is to be revised to align with the current 2022 releases of ISO/IEC 27001, 27002 and 27005:
- These changes are mostly minor aside from the new section 6.3 on ISMS changes.
Saturday 23 March 2024
Knit your own security metrics
"I saw your pragmatic book but I was confused on the way criteria and no’s were assigned. If you could guide will really help. I’m doing a RBI Based compliance assessment where regulator has asked for such metrics. Help would be really appreciated."
Here's my reply.
For guidance on choosing which metrics to take a look at and maybe score, I recommend Lance Hayden's book "IT Security Metrics" which describes the Goal-Question-Metric approach.
Tuesday 12 March 2024
A nightmare on DR street
A provocative piece on LinkeDin by Brian Matsinger caught my beady eye and sparked my fertile imagination today. I'm presently busy amplifying the disaster recovery advice in NIS 2 for a client. When I say 'amplifying', I mean generating an entire awareness and training piece on the back of a single mention of 'disaster recovery' in all of NIS 2. Just the one. Blink and you'll miss it.
Oh boy.
Anyway, Brian points out that recovering from disasters caused by 'cyber attacks' requires a different DR approach than is usual for physical disasters such as storms, fires and floods. Traditional basic DR plans are pretty straightforward: essentially, the plans tell us to grab recent backups and pristine systems, restore the backups onto said systems, do a cursory check then release services to users. Job's a good 'un, off to the pub lads.
Wednesday 28 February 2024
ISMS implementation project guidance checklist
Project definition, justification, scoping and planning
⬚ Study
the standards, in depth: complete lead implementer training if possible.
⬚ Study
the business, in depth, to understand its objectives, strategies, culture, governance
arrangements, existing information risk and security management etc.
⬚ If
the organisation has a defined, structured approach for this phase, use it!
⬚ Build
a business case that identifies and promotes the business benefits of the ISMS.
⬚ Look beyond ‘security’ and ‘compliance’ e.g. helping management to manage business risks, supporting/enabling other business initiatives and strategies.
Tuesday 27 February 2024
Mil-spec management lessons
"A calamity can often strike without warning. Whether it be generated by humans or a natural disaster, leaders need to be ready to direct their teams in the aftermath. In order to be ready for crisis, leadership skills, like any others, must be practised over and over beforehand. So the way you lead in the quiet times helps to build the skills you need when you have to dig deep."
That paragraph plucked from this month's impressive NZ Airforce newsletter about the military response to the devastating flooding caused by cyclone Gabrielle here in Hawkes Bay caught my beady eye this morning.
The idea of practicing incident management as well as incident handling or operations on relatively small incidents makes perfect sense.
Monday 26 February 2024
27001 & climate change
Like other ISO management systems standards, ISO/IEC 27001:2022 has just been amended to incorporate two small wording changes:
- “The organization shall determine whether climate change is a relevant issue” (clause 4.1);
- “NOTE: Relevant interested parties can have requirements related to climate change.” (clause 4.2).
Friday 23 February 2024
ISMS internal audit priorities
Sunday 18 February 2024
Mandatory documentation in ISO27001
1. ISMS
scope (Clause 4.3);
2. Information
security policy (Clause 5.2);
3. Information
security risk assessment procedure (Clause 6.1.2);
4. Statement
of applicability (Clause 6.1.3 d);
5. Information
security risk treatment procedure (Clause 6.1.3);
6. Information
security objectives (Clause 6.2);
7. Personnel
records (Clause 7.2);
8. ISMS
operational information (Clause 8.1);
9. Risk
assessment reports (Clause 8.2);
10. Risk
treatment plan (Clause 8.3);
11. Security
measurements (Clause 9.1);
12. ISMS
internal audit programme and audit reports (Clause
9.2.2);
13. ISMS
management review reports (Clause 9.3.3);
14. Records of nonconformities and corrective actions (Clause 10.1).
Sunday 11 February 2024
Innovative approaches to ISO/IEC 27001 implementation
This week I've read an interesting, inspiring piece by Robin Long exploring the costs, benefits, approaches and strategic options for implementing ISO27k.
I like Robin's idea of trying things out and banking some 'security wins' before committing to a full implementation. A full-scope ISMS is a major commitment requiring strong understanding and support from management, requiring a high degree of trust in the team and CISO/ISM/project leader as well as the [planned] ISMS. Demonstrating and celebrating security wins is a good way to build trust and sustain it, once the ISMS is running.
Sunday 17 December 2023
Categorised plans
Prompted by a thread on the ISO27k Forum, I've been contemplating the categorisation planning process I mentioned in yesterday's blog.
Saturday 16 December 2023
Assessing upstream supply chain information risks
Risk assessment criteria
Friday 15 September 2023
Checklust security
Patrick says:
"There are 70 questions that can be asked to determine whether an enterprise has most defensive principles covered and has taken steps to reduce risk (and entropy) associated with cybersecurity. If you can answer “Yes” to the following 70 questions, then you have significantly reduced your cybersecurity risk. Even so, risk still exists, and entropy must be continuously monitored and mitigated. There is no specific number of layers that can remove all risk, just as there is nothing in the physical universe that does not experience entropy."
Thursday 10 August 2023
Hyperglossary published!
- Information risk
- Information security
- Cybersecurity (IT/Internet security)
- ICS/SCADA/OT security
- Artificial Intelligence
- Privacy, data protection, personal information
- Governance
- Conformity and compliance
- Incidents
- Business continuity
- and more.
Friday 28 July 2023
Using security enquiries by customers as a security metric
"If your organization has customers that ask you to complete questionnaires before engagement, track those against logos added or better revenue brought in. You’re now tracking your return on investment and a key risk of if your security is not good enough, those are the businesses you loose.Do the same with each customer that asks for your ISO certification or SOC 2 report.You have an excellent metric that allows you to track that return on investment and shows security as a revenue generating part of the organization.My organization’s last quarter internal company meeting had the Senior Revenue officer publicly acknowledge and thank InfoSec for our role in landing their biggest customer.It doesn’t get much better than that."
Thursday 27 July 2023
Hyper-glossary nearing completion (?)
My next book will be a 'hyper-glossary' of terms relating to information security, including closely related aspects such as information risk management, governance, compliance ... and more ... and there's the rub: I'm struggling to catch up/keep up with developments in the field, not least because of the rate at which novel concepts are introduced and new terms are coined.
Here's an example of a definition originally added a couple of years ago and most recently amended today:
There I've defined "Deep fake", one of several terms washed up in the AI tsunami. The underlined terms are hyperlinked to their definitions ... and so on forming an extensive web within the document.
Monday 17 July 2023
The biology of bias
'Bias' is generally considered a negative human trait with both practical and ethical implications. Paradoxically, however, that negativism can itself be considered a form of bias. Bias can - sometimes - be positive, beneficial, even necessary, and is to some extent an inevitable consequence of our biology.
In Darwinian terms, 'cognitive bias' comprises a fairly diverse set of behavioural traits that have evolved over the millennia, such as:
- Confirmation bias: a tendency to seek out and place greater emphasis on information that appears to confirm what we already believe, while avoiding, ignoring or downplaying contradictory information;
- Anchoring bias: initial information (no matter how accurate) provides a basis for comparing and evaluating further information;
- Observation bias: the mere fact that something is being observed, investigated, discussed, measured, focused-on etc. increases its apparent importance or value;
- Balance bias: humans are curiously obsessed with achieving balance, equilibrium, parity, fairness, moderation, neutrality, centrism etc. in all manner of situations, despite 'balance' generally being a costly, fragile, often temporary and potentially risky state - in other words, imbalance (a.k.a. bias) is natural whereas balance is unnatural and takes effort, but for some strange reason we seek, strive for and value it anyway.
The fact that these traits exist today strongly suggests that they confer evolutionary advantages. Biases evidently have their biological utility and value, helping biased individuals survive, prosper and procreate somewhat more efficiently than the unbiased.
I repeat, bias (imbalance) is natural.
Pro services under attack
Among all the other bad news in the excellent Cy-Xplorer 2023 report from Orange Cyberdefense, this nugget of threat intelligence poked me in the eye:
I've become increasingly concerned about the information risks relating to professional services in recent years. They seem obvious targets for malicious cyber attacks, given: