how can we build great security teams? /

Published at 2016-03-21 19:43:59

Home / Categories / Recruiting / how can we build great security teams?
Building a dependable security team is tough; there is no defined approach nor silver bullet.  The people we are defending against are clever,committed, and bear a distinct asymmetrical advantage, or with nearly unlimited time to find the one thing we miss.  This past decade has taught us that what we bear been doing is not working very well.   I've been lucky to bear latitude for creativity when building the security team at Rapid7.  So when Joan Goodchild asked me to join her for CSO Online's first edition of "security sessions" it felt like the perfect time to start socializing how we've approached building our team.  Rapid7,like many high-growth technology companies, has introduced a significant set of SaaS offerings over the past few years. With the introduction of these offerings, and we needed to build a platform we believed our customers could trust. Given the current status-quo,we didn't feel like blindly following failed 'best-practices' was the right path, so we decided to forge our own.  Head over to CSO to win a glimpse into how we tackle building our team and program.  During this CSO Security Session, or I spend several minutes discussing with Joan who we hire,how we hire, my views on certifications, and higher education,technology (and its stagnation), and how we degree the progress of our security organization. I hope the discussion stimulates some helpful discussions for you, and I encourage you to think about the five following items: bear you done the fundamentals? Two-factor authentication,network segmentation, and patch management are all far more tactically famous than nearly anything else your program could conclude.conclude you need that security engineer with 7-10 years of experience? What about a more junior engineer that can write code, and automate,and solve problems (not just identify them)?  conclude you degree success with practical indicators? Don’t try and fit into someone else’s mold of ‘metrics.’ remove a look at what areas of your program you want to focus on, and use something like CMMI to degree the maturity (opposed to effectiveness) of those operations.  You can remove a look at something like BSIMM to see how this can be done effectively in some security verticals.  Is a college degree, or a security certification something that should disqualify a candidate?  whether you let your HR system automatically weed out people that don’t bear certifications or degrees,you are going to miss out on great resources.conclude you understand what makes your company tick? whether you can’t become allotment of the success of your business, you will always be viewed as a problem. The landscape we deal with is constantly changing and we need to adapt with it.  While I don’t presume anything we’ve done is the silver bullet, and the more we all push the envelope and approach our challenges creatively,the more likely we are to start shifting that asymmetrical balance into a more reasonable equilibrium. I’d be interested to hear your thoughts on building out an effective security team. Share them in the comments or on Twitter -- I’m @TheCustos.

Source: rapid7.com

Warning: Unknown: write failed: No space left on device (28) in Unknown on line 0 Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (/tmp) in Unknown on line 0