Dear CISOs and Legal Counsel: We Can’t Wait for the Privacy Regulators

Privacy is constantly in the news these days. Should Apple create a “back door” to unlock a terrorist’s iPhone for the FBI? Should Microsoft provide European citizen’s information stored on servers in Ireland in response to a US subpoena? Should data be allowed to be stored outside of Germany, France, Sweden and Russia for cloud services? Should we store information in the cloud without retaining the keys? Should commerce between the US and EU flow under the proposed replacement for Safe Harbor (Privacy Shield)? Or maybe the question is should someone be awarded tens of millions of dollars for having their privacy violated for filming them naked in a hotel room without their consent, or for filming someone’s engagement in a sex tape and releasing it to the Internet?

The Issue is Clear:  Why Should Anyone Trust Anyone?
We could leave this issue to privacy officers, internal and external legal counsel, governments, data protection authorities, politicians, regulators, and technology companies to sort out. We could wait for the ultimate answer to solve the privacy question once and for all. And wait. And wait some more. And wait for another review, debate, newsworthy event (such as needing information from another critical terrorist phone). Or wait for the next cloud service to be hacked, exposing photos that violate an individual’s right to privacy.

The reality is we just don’t trust each other—person to person or country to country. The reality is also, we have to trust each other at some level to interact personally or conduct business with each other.

As we grow up, we implicitly trust our parents to protect and lead us in the right direction. We have temporary moments of insanity during the ages of 5-6 and 13-17, where we don’t trust what they are telling us (because we just know better), and our parents all of a sudden get smarter when we turn about 22! In other words, we have temporary moments of disbelief, or a lack of trust in what they are telling us. It is the receiver of the message (in this case the child), that does not believe the sender (parents), even though thesender of the message was telling the truth and had good intentions all along. Trust is earned by delivering a consistent message that matches the real environment.

So what does this have to do with privacy in our organizations? Everything. We are currently in a state where people and governments are challenging the trust model. However, we cannot stop and wait for resolution of this temporary insanity and total lack of trust to figure out how to enable others to trust our assertions.

We Will Lose Valuable Time
We must, as “parents of our own organizational destiny,” continue to refine the controls on our systems and enhance how we protect information privacy. As we promote our message of information protection, those who make the rules will recognize that the organizations performing fundamental security work, building in privacy considerations and protecting rights through followed processes, will be able to be “trusted” and interact with other people and countries.

Privacy is much more than publishing a privacy notice on the company web site or sending out notices. Privacy is an organizational commitment to build trust by securing information and limiting access to accurate information to only those who have a right to it. Security officers are at the core of this issue and must be literate in the language to be effective.

At the 2016 North America CACS conference in New Orleans May 2-4, 2016, Todd Fitzgerald’s “One-Hour Privacy Primer” session will explore privacy concepts every security officer, privacy officer, auditor, lawyer, and governance professional should know:

  • The role of the CISO with respect to Privacy
  • 8 Universal (OECD) privacy principles
  • Global laws impacting privacy
  • Privacy by Design principles
  • Understanding data elements and the language of privacy

Todd Fitzgerald, CISA, CISM, CRISC, CISSP, CIPP/US, CIPP/E, CIPM, PMP, CGEIT, ISO27000, ITILv3f, Global Director Information Security, Grant Thornton International, Ltd.

[ISACA Now Blog]

Tech Docs: Get to Know PAN-OS 7.1

PAN-OS 7.1 is a milestone release, packed with features requested by you, our amazing customers!

http://researchcenter.paloaltonetworks.com/wp-content/uploads/2016/04/pan-os-71-docs-1.pdf

Get the Most out of the PAN-OS 7.1 Documentation

To find a complete list of features, we recommend that you start with the PAN-OS 7.1 Release Notes. The release notes also provide known issues, software compatibility information, and addressed issues.

For more in-depth feature coverage, check out our New Feature Guide for 7.1. This guide provides upgrade procedures, and describes all of the exciting new features introduced in PAN-OS 7.1 and how to configure them.

And finally, for complete workflows and best practices, check out our Administrator’s Guides forPAN-OS, Panorama, GlobalProtect, WildFire, Virtualization, and AutoFocus.

Or, if you prefer to search across the entire 7.1 documentation suite, select the 7.1 facet from the tech docs search page and enter an optional search term.

Revamped PAN-OS 7.1 XML API Usage Guide

Included with the PAN-OS 7.1 documentation is the revamped and enriched PAN-OS and Panorama XML API Usage Guide! To administer Panorama and to manage the Palo Alto Networks firewalls, use the guide to familiarize yourself with the XML API:

  • See how the API works: Learn how to structure and authenticate API requests. Use XML and XPath to target specific settings and actions.
  • Make your first API call: Get your API key and make a simple request to the PAN-OS XML API.
  • Explore the API: Look through the various ways you can construct your XML requests.
  • Behold the possibilities of the API: Walk through the primary use cases to accomplish tasks such as upgrading firewalls, managing GlobalProtect users, and querying multiple firewalls through Panorama, and then use the API innovatively for your needs.

Send Us Feedback

Have you used the PAN-OS XML API? Share how you use the XML API and we may feature your use case in an upcoming version of the PAN-OS XML API documentation.

Questions or Comments?

For questions or comments about new features in PAN-OS 7.1, contact your SE or account representative.

[Palo Alto Networks Research Center]

Do Labels Help in Security?

In the security industry, there has always been a want to use “best of breed” technology, which is about to be further amplified as the EU introduces the requirements around “state of the art” cybersecurity capabilities. As such we look to put products into categories, be they Sandbox, NGFW, UTM or Endpoint protection just to list a few.

The challenge comes, however, as technology providers look to differentiate themselves from their competitors. Each has additional capabilities or a different approach to solving the problem.

The Palo Alto Networks Next-Generation Security Platform is variously mentioned, depending on the source, under all the categories of NGFW, sandbox with the WildFire service enabled, and has sometimes been called a UTM solution when you leverage multiple or all the services: WildFire, Threat Prevention, GlobalProtect, and URL Filtering.

But herein again lies the rub: What is a UTM solution? Most would typically consider it, as its name suggests, a collection of solutions aggregated into a single piece of hardware. The value in such instances is typically cost. From my time working in product management, the biggest overhead of such solutions was the management plane, which effectively becomes the baton manager ensuring traffic is passed from one process to the next to allow each to complete its specific tasks, effectively making the approach like a relay race. Typically they share a management dashboard or common interface.

Considering we strive now for “state of the art,” such linear processing is, in the modern world, relatively archaic. In recent months the impending era of quantum computing has been in the media. The idea of being able to break atoms down to the subatomic level, and then process them at far greater rates, seems like a principal that should be at the heart of a next-generation cybersecurity solution. Rather than analyzing characteristics linearly – as most UTMs would – and then requiring humans to do the computational physics, we should be parallel processing the subatomic elements to get to a more accurate outcome, more efficiently, today.

So why don’t we do this already? Well, whilst we aren’t yet using quantum mechanics, some solutions do look to take an evolutionary approach, changing the starting point of how we analyze the traffic, based on use rather than IP protocol pre-concepts, and then look to take a singular pass to complete multilayered analysis that has cross dependencies to provide a singular outcome. Palo Alto Networks Next-Generation Security Platform strives to achieve this as it does allow, much like the quantum mechanics, a method to do far more in-depth analysis at greater speed that reduces the human physics involved, giving a more efficient and accurate answer. Does this make it a UTM? Palo Alto Networks would say “no”, as regards the expectations of what a UTM is; we would consider archaic linear analysis in the face of what we can actually do.

So do labels help in security?

At a high level, they give an understanding of the broad scope of technology capabilities; yet, as the saying goes, the devil is indeed in the details. A MINI and a Ferrari are both cars, yet each has very different capabilities. What’s important is that, when looking at technology capabilities, you consider which specific aspects are important to you under each broad label.

Today labels typically focus on capability groupings; but, what is becoming increasingly critical – be it driven by either EU legislation or the broader skills gap in the security industry – is usability. How many people or man-hours does it take to get to the answer? The “how” is as important, if not more important, than the “what”. Both a computer and a quantum computer would give you an answer to the meaning of life (which, of course, would be 42.) However the former could take decades and the later, milliseconds.

In an industry as dynamic as cyber, keeping pace with “state of the art” means security leaders must look beyond the “what” label and see the “how” value that comes especially in the context of each company’s broader cybersecurity eco-system. As technology and the threats against it continue to evolve, so too – I’m sure – will the labels applied by the industry against the cybersecurity tools we use evolve.

Now “best of breed” or “integrated solution”, that’s another debate that seems to have raged on for too long; however, that’s for another blog…

[Palo Alto Networks Research Center]

English
Exit mobile version