Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - DirecTV debuts 3D Channel (dvice.com)

Rickinhd writes: DirecTV is launching satellite that will allow it to broadcast a new channel with 3D programming.
Book Reviews

Submission + - Book review Enterprise Security for the Executive (amazon.com)

brothke writes: If Shakespeare were to write an information security tragedy, it would not be titled Hamlet, rather Bayuk. The story of Jennifer Bayuk is tragic in that she spent a decade as CISO at Bear, Stearns, building up its security group to be one of the best in the business; only to find it vaporized when the firm collapsed and was acquired by J.P. Morgan Clearing Corp. After all that toil and sweat, Bayuk was out of a job. (Full disclosure: Bayuk and I have given a presentation together in the past, and I did get a copy of this book for free.)

While the information security engineering group that was at Bear, Stearns is no more, Bayuk has taken her vast expertise and put it in a great new book: Enterprise Security for the Executive: Setting the Tone from the Top. While many other books equate security with technology, and are written for technologists; Bayuk writes that information security is all about management control. And to the extent which a CxO controls assets, is the extent to which others can't use them in unexpected ways.

The book is written to help CxO's and business executives become familiar with information security concepts and techniques to make sure they are able to manage and support the efforts of their security team. This is an issue, as a big problem for the poor state of information security is that CxO's are far too often disconnected from their information security groups. No story is more manifest than that of when Heartland Payment Systems CEO Robert Carr blamed his PCI auditors for his firm's security problems. Carr is a perfect example of the type of person that needs to read this book. As an aside, for an excellent reply to Carr's kvetching, read what Rich Mogull wrote in An Open Letter to Robert Carr, CEO of Heartland Payment Systems.

While many CxO's think that security is about firewalls and other cool security products, it is truly a top-down management approach, and not a technology one. The book notes that the only way for information security to succeed in an organization is when management understands what their role is.

What is unique about the book is that Bayuk uses what she calls SHS (security horror stories). Rather than typical FUD stories, the horror stories detail systematic security problems and how they could have been obviated. By seeing how these companies have done it wrong, it makes it easier for pragmatic organizations to accomplish effective security by setting a strong tone from the top down.

Bayuk details the overall problem in the introduction and notes that many CxO's have wrongly spent significant amounts of money on security to avert security incidents; but have done that without any context of a greater information security methodology. The leads to executives thinking that security as nothing more than one long spending pattern.

Chapter 1 — Tone at The Top, notes that tone exists at the top, whether it is set or not. The tone is reflected in how an organization thinks about the things it really cares about. Employees can tell how a CxO cares about security by their level of personal involvement. Not that a CxO needs to be, or should be involved with minutia of firewall configuration or system administration; the key is rather that they are for example, championing the effective and consistent use of firewalls and how systems are securely administered.

In chapter 5 — Security through Matrix Management — Bayuk does a good job of detailing the various places that the security group can be placed in an organization. The chapter notes that there are as many ways to organize security as there are organization structures. Bayuk writes for example that if CxO's in a given organization are a tight-knit group, accustomed to close coordination, then it should not matter to which CxO the person managing information security reports to. If that is not the case, there may be multiple security programs that end up far too below the required C-levels that are needed for effective security. The chapter provides a number of different organizational scenarios, with requisite roles and responsibilities.

Chapter 5 closes with an important observation that a CxO should task the human resources department to put a line in all performance reviews whereby managers attest (or not) that the person being reviewed follows security policy. A CxO should fire people who willfully avoid compliance with security policy. Whatever tone at the top exists should be employed to make sure that everyone knows that the CxO is serious about the corporate security program. Such a tone clearly demonstrates an organization that is resolute about information security.

One thing that Bayuk does very well repeatedly throughout the book is to succinctly identify an issue and its cause. In chapter 6 — Navigating the Regulatory Landscape — she writes that if a CxO does not have management control over an organization, then the organization will fail the audit. It will fail because even if the organization is secure today, there is no assurance that it will be going forward. In addition, control means that the CxO will ensure that the organization is attempting to do the right thing. And in such cases, passing an audit is much easier.

Overall, Enterprise Security for the Executive is a fantastic book. It provides a no-nonsense approach to attaining effective information security. For those executives that are serious about security, the book will be their guiding light down the dark information security tunnel. In its 8 chapters (and a case study), the book focuses on a straightforward and plain-speaking approach to enable CxO's to get a handle on information security. As such, it is hoped that Enterprise Security for the Executive will soon find its way onto every executives required reading list.

Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know.

Submission + - Ascent of Dinosaurs Linked to Asteroid Impact, Too (sciencemag.org)

thomst writes: The latest results of a study led by Paul E. Olsen of the Lamont-Doherty Earth Observatory of Columbia University of elevated iridium levels at the 200-million-year-old Triassic-Jurassic boundary will be published in the May 17, 2010 issue of Science. (An earlier, more preliminary study of elevated iridium levels, tetrapod dinosaur footprints and skeletal fossils, and elevated fern spore levels — which Olsen, et al, characterize as a marker for recovery from mass extinction — was published in Science in May 2002. The abstract is free, and does not require registration to view. The full text requires a free registration on the Science website.) The forthcoming study will focus on the slight elevation of iridium levels in sedimentary deposits from the Triassic-Jurassic boundary (the increase in iridium density is only 2-3 times normal background levels, and it required the development of iridium coincidence nuclear spectroscopy to properly quantify). Predictably enough in a field where the theory that a meteor impact killed the dinosaurs, first proposed by Luis W. Alvarez in 1980 has yet to convince the intrinsic gradualist camp of its validity, the proposal is bound to have its detractors.

Space.com has a story explaining the major points of the forthcoming study in layman's terms.

Programming

Haskell 2010 Announced 173

paltemalte writes "Simon Marlow has posted an announcement of Haskell 2010, a new revision of the Haskell purely functional programming language. Good news for everyone interested in SMP and concurrency programming."
Music

Brian Eno Releases Second iPhone App 196

Brian Eno, or as he is known to many in my office, "God," has released his second iPhone App. A followup to Bloom, this one is called Trope and supposedly creates darker music. You create music by drawing shapes on the iPhone's screen.
Image

Transformers Special Edition Chevy Camaro Unveiled Screenshot-sm 299

roelbj writes "Automotive stories are few and far between on Slashdot, but today's news from Chevrolet might just make a few readers' mouths water at the chance to own their own Bumblebee. Today at Comic-Con, General Motors officially announced the 2010 Chevy Camaro Transformers Special Edition. The $995 appearance package can be applied to LT (V6) and SS-trim Camaros in Rally Yellow with or without the optional RS package."

Comment What about the other intelligent life paradox? (Score 2, Interesting) 713

The Fermi Paradox is very interesting. However it's not the only one. No one ever discusses the other one.

The earth is the one place we know is habitable for intelligent life. Life has existed for over 2 billion years. Why is there no evidence of previous intelligent civilizations on our planet?

Call it Allen's Paradox.

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...