Wednesday, September 3, 2014

Will You Throw Up When Your Security Incident Hits The Evening News?

Reporting Security Breaches: Back in 2003 and Now.  What's  changed?


By Ed Higgins

In 2003, an article was posted that presented a hypothetical university security incident in which hundreds of thousands of historic student records and payment card information was compromised. The systems were in place (although nothing is 100%), the personnel were trained, but the study suggested that the university was not prepared to address the public when the story broke on the 6pm Evening News.

So, what has changed? Have laws and regulations been prescriptive enough to educate businesses, universities, and other establishments on their requirements to disclose the incident to the public?

Do entities know what to do when "it" happens? How to notify the victims? Do you notify the victims? You can't really hide it from the public it and keep it private, can you?  Did you know that for several years United States laws, such as California SB-1386, mandate disclosure of a security breach to potentially affected victims. No more head in the sand....


The depth and speed at which cyber crimes occur has significantly changed.  Formerly a form of crash-and-dash, today's cyber criminals operate more stealthy with better tools performing significant reconnaissance before they strike. No longer about fame [the notoriety of spray-painting a web page], these criminals carry out well planned, focused and financially motivated attacks, striking at the perfect moment.


The key to adequate incident response today is speed to identify, stop, and address the situation often using outside private investigators for independence as well as competence in the subject matter. This all has to happen much much much much faster than in the past. Bureaucratic organizations move aside!

Based on studying the incident response processes and situations during real-life actual incident investigations with hundreds of clients, I would suggest that we have a lot of work to do. We kinda need to reinvent our incident detection and response processes.


I hope you enjoyed this article, and I hope it was helpful.  


Until next time, "Watch Out For Yourself".

Ed




Friday, August 29, 2014

DCIM: Strategic and Intrinsic Value

The Role of DCIM Coupled with ITIL/ITSM 


By Ed Higgins


As a rule of thumb, the more integral your Data Center Infrastructure Management (DCIM) solution is to your existing critical management processes , the more strategic and successful your DCIM investment will be. The more flexible and integration-worthy the DCIM solution is, the larger the population of DCIM users (stakeholders) will be. When many stakeholders with diverse disciplines utilize DCIM to its fullest, by enabling those individual stakeholders to "work and think within their own disciple" yet share the work they do transparently to the other business stakeholders, the greater the consequential financial benefits will be from the DCIM for your enterprise business.

DCIM is a relatively new category of IT management and unfortunately it has many interpretations depending on which vendor you are talking to. By generally accepted researcher definitions, DCIM is defined as the integration of information technology (IT) and facility management disciplines to centralize monitoring, management and intelligent capacity planning of a data center’s critical systems.

Achieved through the implementation of specialized software, DCIM enables a common, real-time monitoring and management framework for bringing together formerly disparate management systems spanning the entirety of the IT and Facility infrastructures.

Analysts’ definitions vary and in general are very broadly defined which has created an atmosphere where new vendors are arriving every day with their own interpretation. Power strip manufacturers are claiming a stake in the DCIM market. So are diesel generator manufacturers. These are point-solutions and should be properly reconciled by the Analysts.  The DCIM market promised great growth. Couple this with the fact that the big power equipment providers and a few well-funded startups pay tens of millions of dollars per year to these analysts. Now you might see why there is so much confusion and conflict among the DCIM market.

Many potential DCIM customers start their research and investigation of available DCIM solutions in a very hands-on tactical mode. DCIM comes in all shapes and sizes, and in fact includes everything from sensors and power monitoring, to life cycle management suites. Each potential customer looks at the pieces that appear to have the most relevance to their management goals today. They start their DCIM journey looking for solutions that fit into their existing ways of doing business. New tools applied to obsolete approaches is a waste of your time and money.

Fortunately for astute customers, they are beginning to see the much greater opportunity and their former tactical thinking is quickly transitioning towards strategic value, wider audiences, and having broader impact on the entire picture in alignment with the requirements of the business.  We've seen a similar positive transformation in the storage market where tiered storage concepts are considered. The same transformation and cost-to-value appreciation is represented in the hot, cloud market.

Even the role of the CIO has transformed from a "deliver ALL services at ANY cost" approach to a cost-to-value approach, provide the right level of service, based on VALUE to the enterprise, where cost tolerance, resilience, reliability, longevity, growth and/or reduction are now vital criteria.

DCIM Becomes a Strategic Investment When Connected to ITIL/ITSM

We are beginning to see a fundamental shift in discipline and accountability. Everyone wants to look forward rather than backward, and relatively few are defending their previous methods. ITIL-like approaches (anything that enables discipline and accountability) are much more the operational standards in this new climate.  It is within these transformational shifts that DCIM thrives. DCIM solutions must complement and integrate with existing management applications and DCIM vendors cannot force their preconceived methodology upon any established enterprise.  Some DCIM solutions boast workflow and ticket management processes, which should infuriate the DCIM customer.  While most DCIM vendors can bring a lot of best-practices to customers, many have become so enthralled with their own ideals they make claims that they cannot back up.

IT Service Management or ITSM is the process-based practices intended to align the delivery of information technology services with the business needs of the enterprise.

DCIM when implemented strategically marries the physical infrastructure required to ITSM.

When DCIM is aligned closely with ITSM, it becomes embedded with change management.

When the role of DCIM is successful, then the gaps between facilities, IT and the business will radically close, the determination of "who pays the power/utility bill" will be self-evident, previously hidden areas for cost reduction become clear, planning and deployment operations become transparent,

DCIM directly supports optimization and transformation, which is already occurring across your IT structure whether you are part of the equation or not.

I hope you enjoyed this article, and I hope it was helpful.

Until next time,

Ed