Wednesday, 14 June 2006

Gnomedex 6.0I'm taking a quick break from my work-all-night-at-home mode, and I see that Chris says Gnomedex 6.0 is officially sold out in the main hall (you can still attend in the "cove" hall via video feed, though). It promises to be yet another good year for this Gnomedex show/conference/event (it will be my third). It's all happening June 29th through July 1st.

If you're attending this year, let me know (my email and mobile phone are over on the right side of the page) and let's catch up!

Also, the OPML of attendees' blogs is here.



Add/Read: Comments [0]
Geek Out | GnomeDex | Random Stuff | Tech
Wednesday, 14 June 2006 20:38:47 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Thursday, 08 June 2006

Maybe I should head to Chicago for a week.

According to Reuters, the Sheraton Chicago hotel's general manager, Rick Ueno, has devised a rather unique informal program for Crackberry addicts. Check in, hand your Blackberry over to Ueno, and detox for the rest of your time there.

Ueno... said the program which began Wednesday grew out of his own personal BlackBerry addiction. His one-step recovery was switching to a regular cell phone.

"I was really addicted to my BlackBerry. I had an obsession with e-mail," he told Reuters. "Morning and night. There came a time when I didn’t think it was healthy ... I quit cold turkey."

Ueno said he would take personal charge of any BlackBerrys or related devices guests want to surrender and place them in his office locked up until their return is requested. There is no charge.

"I run a hotel with over 900 employees and thousands of guests. I think I’m more effective. I feel better. I sleep better. My family likes it," he said of his post-BlackBerry life.

He might be onto something...



Add/Read: Comments [0]
Mobile | Tech
Thursday, 08 June 2006 13:22:03 (Pacific Standard Time, UTC-08:00)
#  Trackback

I've made three trips from Portland, Oregon (where I live) to Washington DC in the past month. I love DC, but that's enough for me for now. Especially when you add in all the other trips I've made in-between. Try expecting to fly from DC to Omaha, but getting to Chicago and finding out your flight to Omaha was cancelled, so you decide to fly to Kansas City and drive to Omaha. at 1 a.m., then five hours later you get back on a plane to fly to your next stop

Crazy. I have spent most of the past couple months on the road. Or in the air, as the case may be.

Anyhow, time for a couple days off, no matter how much I may be needed elsewhere, so I am heading up to Scranton, PA to catch back up with my friend, Mary Beth. Her brother's getting married at West Point this weekend so we'll be up that way for a couple of days. What a cool place to get married. He graduated there last year and is an officer in the U.S. Army in Arizona. It will be a fun weekend.

Then it's back home so my dogs and cat can stare at me in disdain again for a day or two. Heh.



Add/Read: Comments [0]
Personal Stories | Random Stuff
Thursday, 08 June 2006 05:34:10 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Wednesday, 07 June 2006

http://www.zachbraff.com/

Sure, he's had the Garden State blog going with an occasional post here and there for a while, but Zach Braff - one of the few actors I can actually stand to listen to (actually I think he's a rather good, decent, funny cool person) for more than five minutes at a time - has started a new blog with video and text entries. Check it out.

Needs RSS though.



Add/Read: Comments [1]
Blogging | Random Stuff
Wednesday, 07 June 2006 19:58:02 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Monday, 05 June 2006

A coworker sent me a link to a news article today, yet another one about a data breach from - you guessed it - a stolen laptop. This one was an auditor working for Ernst & Young and doing an audit of Hotels.com, and apparently the auditor (and I can't believe this) left it in his or her car and it was broken into and stolen.

So now, thousands of Hotels.com customers' personal data - meaning names, addresses and credit card information of about 243,000 people - is potentially in the hands of someone who could use it improperly. Oh, and by the way, my name is certainly on that list.

Up until today I was frustrated to no end with these events.

Now it's personal. Now I'm angry.

And get this: The theft occurred in February and Ernst & Young didn't notify Hotels.com until the first week of May. What??? And on top of that, customers were not notified until a few days ago. You've got to be kidding me...

This post contains some useful information about data breaches, packaged with a bit of a rant by yours truly about information security - or the serious lack thereof - in US companies and institutions. As a reminder, what I post here is my own opinion and not that of my employer or anyone else. I work in information and cyber security, and I care - a lot - about these issues.

There's a major attitude problem - let's call it a lackadaisical mentality - out there and it's high time someone did something about it. Lazy security means lots of helpless victims, and we're so far behind the 8-ball as a country it's downright scary. There's a fundamental "people problem" at the root of this, and no matter how much technology we throw at it, the analog physical and human components need to be addressed before any of the technical issues can be resolved.

The Privacy Rights Clearinghouse maintains an online chronology of data breaches with descriptions of each event, outlining any known data breaches that have occurred since February, 2005.

All told, as of the time I write this, there are 84,797,096 individuals whose identities are known to have been included in these data breaches. Banks, universities, health care providers, insurance companies, corporations, credit card providers... Lord only knows about the ones that have not been reported. Ugh, it's depressing. It's also ridiculous.

What bothers me the most is how often the term "stolen laptop" shows up in the list. What in the world are people doing with sensitive information stored on computers that can walk out the doors of all of these heavily regulated companies and institutions? It's insane from a security management perspective.

But then again, let's take a look at just how many US banks, universities, health care providers, insurance companies, corporations and credit card providers are certified under some kind of recognized information security management standard. Let's take the big standards - BS 7799-2 and ISO 27001 - for example.

BS 7799-2:2002 (in this case, the "BS" stands for "British Standards") has long been the recognized standard for overall security management, and the new ISO/IEC 27001:2005 international standard is basically BS 7799-2:2002 in an updated form. It's also related to ISO 17799, since we're throwing around fancy names. Ultimately it's all the same stuff, just renamed and reassigned. The 27001 standard represents a systematic approach to managing sensitive information so that it remains secure. It encompasses people, processes and IT systems.  It is used to determine and evaluate a company's security management framework and is internationally recognized as the gold standard for security.

If a company doesn't have a security management framework in place, not only is it unaware of what's happening in it's own walls, it doesn't really know whether or not it knows much of anything. Yeah, that's confusing. What you don't know is what will most likely kill you. Either way, it's negligent in this day and age not to be formally on top of information security, and that involves not just firewalls and technology, but risk assessments, people, processes, and an over-reaching management framework to ensure all the bases are covered.

Did he say "negligent?" Yes, negligent. And I mean it.

It's a lot of work to achieve and maintain the 7799/27001 certification and to hold up to ongoing audits, to be sure (just ask me or my coworkers about it some day, we live it), but it's not rocket science and for gosh sakes, IT'S IMPORTANT. And it's not about the actual certificate, it's about all the things that go into the process of getting the certificate and keeping it.

So, if you had to hazard a guess, how many agencies, institutions and companies in the United States do you think have this important and recognized certification?

Be prepared to be disappointed. Especially when compared to the number of certified organizations in other countries, like say Japan and India and Korea. Or pretty much any other developed country, for that matter. It's really quite pathetic.

Of the 2600+ organizations on the certificate register, there are only seven  (yes, that's "7") companies or organizations in the entire United States certified under ISO 27001, and only 39 have been certified in the US under BS 7799-2 and ISO 27001 combined. Keep in mind, there's overlap on the lists, as a number of companies (like ours) have converted from the British Standard cert to the ISO 27001 model, meaning we've been certified twice.

This table shows how many organizations are certified under either ISO 27001 or BS 7799-2 as of June 5, 2006. The term "organization" can mean any one of several things: companies, portions or divisions of companies, agencies, or various other other entities. I've left off most of the countries that have only one certified organization to save space.

Japan

1602

Brazil 

9

Slovenia 

2

UK 

244

Sweden

8

South Africa

2

India 

186

Spain

7

Armenia

1

Taiwan 

92

Turkey

7

Bahrain

1

Germany

57

Iceland

6

Chile

1

Italy 

42

Greece 

5

Egypt

1

USA 

39

Kuwait

4

Lebanon

1

And of the US companies, agencies and organizations on that list, only one of them is a bank (and even then it's only the information security team's component of the business). None of them are credit unions. None of them are insurance companies. None of them are health care providers. One of them is a university. A couple are government agencies - and not the same ones that have been in the news lately, that's for sure.

If you think about it (or search for it, for that matter), how often do you hear about information disclosure outside the United States? Sure, it happens, but seemingly not nearly as often. And why is it, I wonder, that in Japan there are so many certifications? ISO 9000 (the gold standard for manufacturing) is huge there, as well. 

The fact of the matter is that overall, companies and institutions in the US don't take security nearly seriously enough.

So - It's time to do something about this. Now, not tomorrow. It's already much too late, so we need to get moving. We're already in triage mode, friends.

What to do? To start, if you do business with any company that handles sensitive individual data, ask them about their security certifications. And don't accept just a SAS-70 certification as covering the bases - it only covers operations of the datacenter and has practically nothing to do with the rest of the company. Also, make sure you know specifically what any issued certifications actually cover - this is called the "scope" of the certification. Is it the entire company (usually it's not so you have to ask), or is it just a department or division? If the company is not formally certified, do they have a security management framework and a standard they follow?

Also, this is formal security management we're talking about. Don't accept lame responses like "we're covered under HIPPA" or "we get audited for Sarbanes-Oxley so that's all covered..." Sorry, that doesn't come close to cutting it. Neither of those auditing standards require a company to have a security management system in place, and neither come close to covering what's needed to ensure proper security standards are met outside of their narrowly focused scopes.

Get educated. Find out what needs to change. Demand change. Question systems that put the secrets in the hands of people who don't have a personal stake in the game. Do business wherever possible only with companies that are cognizant enough of security to formalize their program on a standard framework and which preferably have external certification of the results of that effort. I'm not kidding here. And yes - it can be done.

Unless you have a better idea (and feel free to share - comment away), that's what it will really take to create change - Market forces. We certainly can't count on the government to do anything about it - they'll just come up with vague, useless legal acts that almost always miss the mark and cost the business sector billions (take SARBOX for example). Individual action and demanding that companies get serious - and that they do so in a manner where they can be formally reviewed and held accountable - is the best real-world way to force change.



Add/Read: Comments [3]
IT Security | Safe Computing | Things that Suck
Monday, 05 June 2006 22:06:00 (Pacific Standard Time, UTC-08:00)
#  Trackback
Is it just me, or is it kinda strange (and maybe a little ironic) that "anti-freeze" and "coolant" are the same thing?

Add/Read: Comments [2]
Random Stuff
Monday, 05 June 2006 21:26:12 (Pacific Standard Time, UTC-08:00)
#  Trackback