Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

The Importance of Security Frameworks

I’m often asked why I run a team entirely dedicated to researching, developing and implementing various program frameworks – when so many security organizations get by just fine without them. However, the phrase “get by just fine without them” is part of the answer. The challenge with helping security leaders and professionals understand why what they’re doing requires a model to follow when there are few visible consequences to simply winging it.

I’m often asked why I run a team entirely dedicated to researching, developing and implementing various program frameworks – when so many security organizations get by just fine without them. However, the phrase “get by just fine without them” is part of the answer. The challenge with helping security leaders and professionals understand why what they’re doing requires a model to follow when there are few visible consequences to simply winging it.

First, let us acknowledge that information security is a relatively new discipline that is probably just under thirty years old. Compared to the rest of IT and other things non-computer related the industry is still in its infancy. As the profession matures though, effective leaders are sharing the successes and struggles they face and developing patterns for others to follow. These patterns move from word of mouth and tribal knowledge to formal, industry-supported frameworks.  

Security frameworks are designed to provide a reference for those designing various programmatic security mechanisms in order to make sure we benefit from collective successes and failures of the broad community.

Why You Need a Cyber Security FrameworkDeveloping a framework is a lot like asking a collection of your thousand closest friends (Fortune 1,000 companies) to agree on ordering a pizza. At the point where you’re developing a model or framework that’s meant to provide broad assistance, you’re not trying to find commonalities so that everyone is happy. You’re instead trying to define a framework which makes the least amount of people completely grumpy. Think about if you were put in charge of setting up a race. Just about everyone will agree that you’d need a start and a finish, but everything in between is up for debate.

So, let’s look at why I believe frameworks are the answer to many of the problems plaguing security organizations. The two major challenges I believe are repeatability and benchmarking. Security organizations struggle to repeat the successes of their contemporaries and peers – especially since every enterprise feels like a special snowflake. Benchmarking is something our industry is waking up to as board executives start to compare notes across enterprises in which they participate.

Think about building a cyber threat intelligence (CTI) program at a Fortune 1,000 company. How do you design a program that can be effective at your financial services company while leveraging lessons learned and successes your peers have experienced at healthcare companies? Additionally, how do we avoid being product-driven and create programs that can have interchangeable parts? The answer:  implement a cyber threat intelligence framework that dictates the core functional pieces that every CTI program needs (what) while leaving the details to individual use cases (how). This creates flexibility while simultaneously holding standards and allowing for comparisons (benchmarking) across various market verticals.

A model that starts with outcomes allows you to understand the goals you’re building towards, which addresses effectiveness. You can achieve outcomes through building a set of capabilities across a defined model of functional, core and elements. These capabilities are built through a set of activities which require resources (people, processes, technologies) to operate.

If your desired outcome is to beat Nico Rosberg’s world championship Formula One team, you’re going to need a framework. You already have your desired outcome, so now let’s get the functional elements, or building blocks.

The basic building blocks are tires, engine, car, mechanics, engineers, owners, media relations and a million other components. Next, you can take your building block—mechanics, for example—and ensure they have the capability to change four tires in under 2.8 seconds. In order to develop that capability, you’ll need at least 12 mechanics, tires, air tools and so on. These are your resources. Last but certainly not least, you’ll need to figure out how to measure whether you’ve been successful at beating Nico Rosberg’s AMG Petronas racing team.

In the real world, measurements appear simple—in this case, track lap times. But in the digital program development world there are many iterations of potential measurements, and few of them are expressive and repeatable enough to be business relevant.

So, how do you build an effective CTI program? Start by determining what you want your outcomes to be. From there, you can take the functional building blocks and figure out what capabilities you need to develop to support your outcomes. Then, draft up the activities and resources you’ll require to build up those capabilities. Last, figure out how to measure it all. It’s as simple as that.

Except it’s not. My team spends thousands of hours studying companies and how they operate, and then builds models from this carefully observed and analyzed data. I encourage you to find a framework that fits your organization’s program requirements, business profile and specific needs. Find a framework, adopt it and stick to it. The framework you start on today may be the way you justify budget requests, additional headcount or a promotion tomorrow.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Funding/M&A

Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.