How did the security ecosystem allow for the kind of attack we have seen with SolarWinds?
I think you're absolutely right. I think this is going to get us out of the compliance checkbox business that TPRM has become, and it's going to require a little bit more scrutiny of critical vendors. You cannot do high level scrutiny of all your vendors, but vendors that are going to have a much wider footprint in your environment or vendors that have access, your scrutiny level is going to be a little bit deeper. So I think there's going to be a little bit of a maturity growth that's going to come over there.
Asset management is not glamorous, it's not fun but it's critical. I do advisory work for a lot of companies and company I do advisory work for and we were doing a review of their NIST CSF Framework. They have all their maturity scales and all that stuff and they've been on the five year journey, they're getting to three on their maturity scales and we're doing a deep dive on it. And their vulnerability management score was at a 3.8 out of four, on the one to four scale. Asset management was 1.7 out of four. I'm like, "I'm sorry, you can't have a near-perfect vulnerability management capability without having an asset management capability. This is complete horse shit." And you know who had actually done all the work? To do that they spent hundreds of thousands annually to have EY do this. I'm like, "I would go beat them to death that they didn't cross-correlate those things. And now you've got a false sense of security and a false sense of control."
If you stop counting, then they're not there. If you just, don't test it, the virus or malware isn't there.
And of course the CISO who I'm beating the crap out of, because somebody else in their management chain asked me to provide some perspective, he goes, "Well, that's just the scope of the things that we know." And I'm like, "Well, that's stupid. It should be deprecated relative to the reach that you have." It's like, "You can't give yourself a pat on the back for that when it might only be 50% of the total assets. But you're telling me right now you have no idea what the total assets are."
Content you might like
crowd strike38%
sentinel one56%
carbon black5%
cynet0%
Yes - Maine did the right thing. There are too many security risks with free versions of these tools. Not enough copyright or privacy protections of data.30%
No, but.... - You must have good security and privacy policies in place for ChatGPT (and other GenAI apps). My organization has policies and meaningful ways to enforce those policies and procedures for staff.53%
No - Bans simply don't work. Even without policies, this action hurts innovation and sends the wrong message to staff and the world about our organization.12%
I'm not sure. This action by Maine makes me think. Let me get back to you in a few weeks (or months).3%