The 1 Question a CSO+CIO Must Ask the Business to Secure their Job Before a Data Breach Happens

Raimund Genes is the visionary CTO leader of Trend Micro. I recently talked with him about all the topics listed above. One of my favorite points from our interview was:

To prevent losing your job after a data breach there is a question that must be asked to the CEO, COO, Board, VPs, Sr. Team, etc. before the breach happens?

  • You must show them your research of what the events are that will put you out of business.
  • Examples: Data breach, web server take down, DDOS, Ransomware
  • What is our risk appetite for each incident on a scale of 1-10?



Furthermore, he mentioned that you must have a Scientific Approach
You must take a scientific approach. I like this because similar to financial analysis there is no emotion. Facts are the facts. Before Tools or Human Element decisions are made you must perform a Risk Assessment for proper breach handling. Author Note – notice that it is not “if” a breach happens

  • Identify the risks and the appetite for absorbing these risks
  • Examples: Data breach, web server take down, DDOS, Ransomware
  • What is our risk appetite for each incident on a scale of 1-10?

Do you have a Written Incident Response Plan? – You must have this in place. Everyone on the team must understand the 2 minute drill. This should include the CMO, VP Sales, law enforcement communication, Customer communications, etc.

Raimund-Genes

Chief Technology Officer, Trend Micro

Raimund Genes brings more than 30 years of computer and network security experience to his position of CTO at Trend Micro. In this role, Mr. Genes is responsible for introducing new methods to detect and eradicate threats and to predict movements in the digital underground with his team of threat researchers. He is responsible for a team of developers and researchers around the globe who research and develop new core technology components to protect customers against digital threats under the Smart Protection Network umbrella. He is a well known security expert and frequent speaker at conferences, where he shares his passion for IT security with the audience. He is the author of many articles content security and publishes the video blog ctoinsights.trendmicro.com.


All methods of how to access the show are below:

If you enjoy the show, you can help us out by leaving a review on iTunes. Here’s How!


Summary Topics Covered 1

Hacking-Back vs Attribution| APT Attack vs Targeted Attacks| Mobility and Virtualization| Leadership and Team Innovation| Ethics and the Selling of Vulnerabilities| The Best Zero Day definition Ever| Options of How to Avoid Poisoning Your Phone| Geo fencing| The One Question that you need to ask to Prevent Losing Your Job after a Breach Incident| Who has the Worse Cyber Criminals China or Russia?| Pinball Machines and Teaching Kids How Things Work Versus Consuming Things |

Raimund explains that Geo Fencing is just a method to ensure that access to data is only possible within a certain environment. This could be achieved by reading the geo location of a device and stopping communication when out of range (legal issues in Europe might occur) or by simply only granting access while in an Intranet environment – that’s how hospitals use our Virtual Mobile Infrastructure.

He mentions three reports worth reading: The Bulletproof Hosting Report, The Deep Web Report, The Russian Underground Report

Innovation: “The Virtualization product we discussed was developed as a result of the Scientific Research innovation initiatives and is now called Safe Mobile Workforce. “

What is the difference between APT Attacks and Targeted Attacks and Cyber War?

  • It is important to get our nomenclature correct so we discussed this. Raimund also reviews his passionate views on this topic in his RSA Asia Pac talk. In his talk @3:50 he discusses when the word APT was used by US Airforce Colonel Greg Rattray to describe Nation State Attacks.
  • Defining the sophistication methods.
  • Defining the economics and differences.

Summary Topics Covered 2

  1. How Trend approaches the Dark Web
  2. How Research teams at Trend approach current threats
  3. The Average time between infection and finding the breash is more than 180 days.
  4. Should companies sell vulnerabilities? How should the process of remediating security vulnerabilities happen? Should you have to pay for it?
  5. Oracle CSO mentioned who had her blog post removed.
  6. Defining Zero-Day vulnerabilities – “not known to the effected vendor which is not known to the public but is known to the attacker.”
  7. Lawful interception
  8. The genesis of the mobile virtualization product that happened as a result of an innovation culture.
  9. Hacking back versus attribution research.
  10. Is it ethical to sell vulnerabilities?
  11. Partnering with law enforcement
  12. How Trend approaches Android vulnerabilities.
  13. ‘Scaling’ security enforcement
  14. Mobile devices and Raymond’s thoughts on Citrix, VMware| Centralized computing, EU versus US privacy
  15. How do you build a culture of innovation as it relates to developing products?

Bill Board Question: What’s one thing you would put on a billboard if you could place it in every city in the US? Answer – Raymond’s thoughts on education, learning, teaching, and building the next generation of Cyber Security Professionals. “Kids must learn how things work so they have a sense of what is happening.”

  • Pinball Machine Soldering and Teaching Kids How Things Work vs Consumption. Raimund says, “Kids must learn how things work so they have a sense of what is happening.”
  • Leadership and Team Innovation with developing products.
  • Why Education on security topics is key
  • Ethics and the Selling of Vulnerabilities

Resources Mentioned

Raimund can be found:

Bill is dedicated to your success as an IT Business Leader. Sign up/Subscribe for weekly podcast, CIO Mastermind and CISO Mastermind updates delivered to your inbox easily and effortlessly: Follow Bill on LinkedIn and Twitter.

Leave a podcast review here

How do I leave a review?