LevelBlue Completes Acquisition of Cybereason. Learn more

LevelBlue Completes Acquisition of Cybereason. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Manage Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings

What We Lack Most in InfoSec: Inherited Credibility

Ask any InfoSec person the following question:

What do you lack most in your job?

Can you predict the answers?  Of course you can.  Most InfoSec folks will answer that they lack money, and resources (also known as “people”).  Some of the more creative types will also mention that they lack time.

These are all good answers, but they don’t answer the question.  These answers indicate what most InfoSec people need, rather than what they lack.  What we lack in the InfoSec community is exactly what will allow us to fulfill those needs.

I was listening to a recent Lawfare podcast.  This episode featured a speech given by Chuck Rosenberg to law students at University of Virginia law school.  If you are unfamiliar with Chuck Rosenberg, he served as Chief Of Staff at the FBI under James Comey, as well as counselor to FBI Director Robert Mueller.  Mr. Rosenberg has an impressive history.  His speech was about leadership, but he mentioned something that made me consider the question “what do we lack most in InfoSec?”

Take the following scenario as an example.  An attorney for the Eastern District of the United States stands before a court, ready to present a case.  Once the court is called to order, the attorney introduces himself.  He will customarily stand, and say:

“Chuck Rosenberg, on behalf of the United States of America.”

Those words have implied power.  Not because it is Chuck Rosenberg saying them.  There is much more to it; those words carry inherited credibility.  Their power is derived from a storied institution of power.

Inherited credibility in InfoSec

Inherited credibility is what we lack most in InfoSec.  You can be the world’s most elite hacker, capable of popping a shell faster than anyone else in town, but you will only get odd stares if you walk into the CEO’s office boasting of that credential.  Most corporate cyber positions, from the security analyst, all the way up to the CISO, simply do not carry any inherited credibility.  This is mostly due to the newness of cybersecurity positions in most organizations. 

We may still be quite a distance from creating an inheritable empire.  According to a February 2018 report by the Council of Economic Advisers, there is still no common lexicon for categorizing malicious cyber activities.  This is especially true when discussing cybersecurity events.  If we have yet to develop a common language, we are still too far off from closing the credibility gap.

We may currently lack inherited credibility, but this puts us in a unique position, as we are the trailblazers who can build that inheritance for our successors.  If, however, you are working in InfoSec for your own self-aggrandizement, then you are sadly on a path to failure, but that is a broader subject.

Inherited credibility is what will move us from need to surplus.  (Perhaps “surplus” is a bit too optimistic, but you get the point.) 

The more important question you can ask yourself every day is:  How can I build the credibility that will give my successors the power to continue to grow this meaningful work?

ABOUT LEVELBLUE

LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo