By Abhay Bhargav . June 14, 2021 . Blogs

In some companies, Information Security and Risk consists of a large team of hundreds of professionals handling security and compliance risks across many countries. In others, Information Security is one of the many responsibilities of an IT Manager who handles everything from IT management, staffing and Project Implementation. Either way, Information Security is a critical facet of the modern enterprise that is riven with uncertainty and a growing list of possible threats. Building a solid information security team (own or outsourced) is critical.

I see everywhere, that people are facing a serious challenge with information security team. In my opinion, it’s not they don’t know how to get the right candidates, it’s that they don’t know what to look for in candidates when they are building their information security teams. According to the legendary author and eternal student of business, Jim Collins, its more important to get the right people on the bus and get these people to the right seats, rather than focus on what these people need to do. Good people, in the right mix tend to produce good – great results given the right environment.

Several CIOs and CISOs ask me that single question “What kind of people do I need managing our Information Security Team?” Well, that’s what I am about to address. I believe that these 3 types of people are key to making any information security team, super-successful.

The Tinkerer
The Tinkerer is my favorite character in any good Information Security Team. The Tinkerer essentially wrestles with Technical security issues. She sets up that SIEM product all on her own and starts monitoring events inside the network. She’s able to cull through complex application or system logs and identifies the root cause of a security incident. She’s able to script up a quick tool in Python/Ruby while performing an internal penetration test. She’s what we would all call, a Geek. The Tinkerer is one who possesses a wide and deep array of technical skills that she uses in information security. The Tinkerer is hungry for technology. She has passionate conversations with the technology teams and seems to have that unlimited energy and drive in “getting his/her hands dirty” with technology implementation. The Tinkerer is an invaluable asset to any Information
Security Team because they possesses the technical skills to cut through the crap and dig deep into any technical/technology oriented solution. I have observed that Tinkerers are great with Unix command line, probably have some scripting skills and have implemented just about any open source product you can think of.

The reasons why Tinkerers are so important:
• They do not just “listen to” vendors. They actively engage and get to the bottom of the vendor’s technology. They provide solutions often, when vendors can’t.
• They save you a ton of money. Don’t have the budget for that File Integrity Monitoring solution? Not to worry, the Tinkerer will scour through the Internet and would probably implement an open source solution with the same effect.
• Their passion would drive technology security. The Tinkerer is able to engage with ease with external penetration testers, internal penetration testers, network security personnel and application personnel. The Tinkerer is able to speak all of these diverse dialects with ease and ensure that security (atleast technically) is a top priority.

The Processifier
The Processifier is a unique, un-glamorous but highly important role in Information Security Management. Every strong Information Security team must rely on process, procedures and practices to succeed. This is where the Processifier comes in. The Processifier’s basic job is to streamline Information Security Processes at the company. She ensures that there is a strong process for most information security practices. She creates a strong risk management framework that defines the company’s information security growth year-on-year. She basically ensures that the bedrock of a strong information security practice is in place for the company to implement even when she’s not around. The Processifier is usually the sounding board for sane advice on any security-related practice. She keeps the other information security personnel in check by ensuring quality of standards and processes.

The reasons why Processifiers are so important:
• They create the foundation for a strong Information Security Practice. They create the practices, processes and documentation for the Information Security Practice, which is extremely important from a long-term perspective.
• The Processifiers provide the quality and consistency parameters for the Information Security Team to conduct its activities all through the year.
• The Processifier also handles initiatives like Security Awareness and Training that
is non-negotiable for a Security conscious company.

The Prophet
The Prophet is a unique role between business and information security. The Prophet is an Information Security Professional with a keen eye on the business. While the Processifier creates a risk management framework and the Tinkerer is technically adept, The Prophet’s job is to ensure that all of this applies and makes sense to the business. Business Risk is the Prophet’s business. She is the ultimate mediator between management and security scuffles. She advises the information security team on changing business risks and perceptions. She has the right connections to the right stakeholders inside and outside the business to provide Information Security with a unique perspective. She ensures that Information Security delivers immense business value and makes it
known. The Prophet is like the ultimate fixer for businesses and information security
teams because she can speak both tongues equally well.

The reasons why Prophets are so important:
• Popular perception is “Management is always at odds with Information Security”. With the prophet, management and information security are partners.
• Sometimes, Information Security tends to get lost in controls and technology. The Prophet is the essential element that points them in the most important direction of business risk.
• Prophets ensure that Management and Information Security meet in the middle. They are the diplomats of the security world, constantly ensure that the tug of war between these two diverse areas does not cause the rope in the middle to tear or break.

These people (listed above) do not always have to be different people. As a single IT Manager, you might have to wear all these hats. However, having the right mix of the Tinkerers, Prophets and Processifiers, your Information Security should be in great shape.

Abhay Bhargav

Abhay is an Information Security evangelist. He has authored “PCI Compliance, a Definitive Guide” published by CRC Press New York. Abhay is also a regular speaker in Industry events including OWASP, Oracle OpenWorld, JavaOne, ISACA, NASSCOM and so on. He has performed security assessments for enterprises across domains of Banking, ITES and Telecom and also led security assessments for the Payment Card Industry Compliance (PCI-DSS) as a QSA.

Want to get in touch with us?

Got Questions? We got you covered just contact us for further assistance