A Window into Darkness: The Infosec Playlist
Spoiler Warning: this post contains no useful information
Many people ask me almost on a daily basis. “Hey, Not a Security Guru, tell us what it is that keeps you occupied during the day, what it is that keeps you awake at night and how is it you’re such a handsome fella even with all that pressure”.
OK, the previous statement is a lie. I haven’t been asked that on a daily basis. I’ve been asked that at least twice. In my lifetime.
But the rest is absolutely true.
At least some of most of it.
But I digress.
And so I find myself sometimes having a difficulty explaining the job to people outside the security industry, and especially people who are not technical.
These days, largely thanks to Swordfish, Scorpion and Mr. Robot most outsiders think that security professionals:
- Always wear a hoodie (and that our rank in the guild is presented by how ornament is the hoodie)
- Can hack into the Pentagon while drinking a bottle of Merlot in less than 30 seconds
- Need at least 8 screens arranged in a semi-circle in order to perform complex tasks.
I feel bad telling them about the harsh truth. The manual scripting. The KPIs. The KRIs. The never ending budget sessions. Explaining to people that “yes security is a real concern and the fact that your Facebook account now spawns ISIS propaganda should be a proof of that”. The Firewall change approvals, the Flash patching (GOD DAMN IT! THE FLASH PATCHING! MAKE IT STOP ALREADY!). It seems so much like not fun even though we like our jobs.
We really do.
So instead of sitting down with an interested party look calmly in their eyes and rave about Flash patching (OH GOD! MAKE IT STOP! MAKE IT STOP!) I’ve decided to describe typical Infosec management assignments via a playlist. I call it… SONG OF ICE AND FIRE ahem, A WINDOW INTO DARKNESS
(technical note: the following is based on Spotify links that may or may not work on your browser. Browsers with DNT enabled on them will get a big ugly warning from Medium before the content is displayed. Click it. Click it like you mean it. Click it like it’s a phishing email)
Prologue: where our hero describes the essence of Information Security:
Hiring Personnel in a World Missing Thousands of Experts
Being called by a recruiter:
Bonus Track: when your employees leave you for someone who pays four times what you offer and gives them a Ferrari as a company car
Approving new Security Projects
Mission Statement
Scare tactics, reminding of previous incidents
Bonus Track: Your project is approved
On the painful transfer from IT Security to Cyber Cyber
The Seven Stages of a Security Incident:
- Incident identification, classified as a PRIORITY ONE EVENT
2. Calming down the team and management, avoiding knee jerk reactions
3.Privately panicking when no one is there to see:
4. Incident Containment
5. Eradication:
6. Recovery:
7. Root Cause Analysis:
Summarizing the constant state of mind of the Infosec professional:
Uber bonus track: patching Flash one last time (OH MY GOD ADOBE WHY?! WHY?!)
There you go boys and girls, next time someone asks you what a typical day in your professional life looks like, just tell `em that you’re getting into the office, put a grim face on, put a pair of your favorite headphones on (NOT BEATS) and you just headbang until your manager comes over and asks you if you need the day off.
You’re welcome.
