{"id":234,"date":"2015-01-04T12:56:00","date_gmt":"2015-01-04T12:56:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2015\/01\/04\/get-wisdom-as-cheaply-as-you-can\/"},"modified":"2015-01-04T12:56:00","modified_gmt":"2015-01-04T12:56:00","slug":"get-wisdom-as-cheaply-as-you-can","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/get-wisdom-as-cheaply-as-you-can\/","title":{"rendered":"Get Wisdom as Cheaply as You Can"},"content":{"rendered":"
Happy New Year!<\/p>\n
I recently posted the below<\/a> on the SANS Internet Storm Center<\/a> site.<\/p>\n A long time ago I was given advice from a non-security professional that is among the best and most influential I have received in my security career – “Get wisdom as cheaply as you can\u201d. I was encouraged to learn from the mistakes of others as a means to avoid the full pain of what they were forced to experience.<\/span> Happy New Year! I recently posted the below on the SANS Internet Storm Center site. A long time ago I was given advice from a non-security professional that is among the best and most influential I have received in my security career – “Get wisdom as cheaply as you can\u201d. I was encouraged to learn from the […]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[21,18],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\n
<\/span>
There are so many places where you can get your lessons learned without having to suffer through an outage or a security incident. You can learn from news articles or breach disclosure reports such as the Verizon Data Breach Investigations Report (http:\/\/www.verizonenterprise.com\/DBIR\/<\/u><\/span><\/a>) and Mandiant M-Trends (https:\/\/www.mandiant.com\/resources\/mandiant-reports\/<\/u><\/span><\/a>). Create case studies based on these sources that your incident response team can use to conduct tabletop exercises. This preparation exercise will help you determine if your prevention and detection capabilities would be effective if faced with these scenarios<\/span>
<\/span>
To get you started, here is an example when I failed. I thought it would be a good idea to scan a special internal network segment unannounced with unauthorized equipment. This caused a full and unplanned incident response. I discovered what happened and quickly notified the team of what I did and how sorry I was for causing this incident. Most everyone was gracious and everyone was relieved this was not a real incident. I have not forgotten this lesson and have since put checks in place to make sure it does not happen that way ever again. In addition to learning to only use authorized scanning equipment, I learned the importance of notifying all impacted system and application owners before performing any scans.<\/span>
<\/span>
Learn from the misfortunes of others. By getting wisdom as cheaply as you can, you are given the opportunity to not have to learn the \u201chard way\u201d. What lessons have you learned and how have you applied them? <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"