Cyber security teams need to be proficient at building new security
capabilities or maturing existing ones. Forgetting capability building means that
while your organization may be engaged in tons of activity, they may never be
on a path forward that ultimately reduces fire-fighting of disruptive security incidents.
However, for all of the benefits, capability building also brings friction for
users. With each new security tool or policy, there is some impact on how individual
users perform their daily work. Leaders not only feel their own friction but also
have to deal with the collective friction of their team as they try to achieve their
business objectives. The less regulated the industry, the stronger the pushback
over friction will be from leaders. With enough pushback in such industries,
projects might be paused post-deployment or not even started. The hard message
might be that everyone outside of the security team views this friction as a
negative.
Imagine a very different world in which cyber security teams
were incentivized to not just build capabilities, but to complete each project
with a plan and execution that causes the minimum amount of friction for users.
My personal preference would be to codify the accomplishment of low security friction
outcomes into “style points”. These wouldn’t be actual scores or points. The
only judges that matter are your users and your execs. As projects become more
difficult and complex, there will always be some level of friction and the
outcome would need to adjust to account for this friction. However, style
points may not be the closest metaphor. A similar but better metaphor might be
the system that figure skating used until 2005: there was a first score
indicating technical merit (usually the difficulty of the jumps) and a second
score representing presentation (artistry). Again, forget any detailed scores.
Let’s simply focus on the value proposition of the two categories.
I’m talking about artistry as part of making the org safely more
effective by mimizing friction of security tools or policies. Shouldn’t that be
part of the status quo in cyber security anyway? Sadly, it isn’t.