Infosec’s human face

Program Chairman Hugh Thompson closed the RSA Conference with a focus on the human side of information security.

It’s easy, as information security professionals, to get caught up in seemingly endless cycle of threats, critical flaws and technical wizardry employed by both the black hats and white hats. The closing session of RSA Conference 2015 avoided a technical or political recount of the infosec landscape.

As he does each year, Thompson started his keynote with a personal story - this year he spoke about a family holiday. During the holiday, the family takes a horse and buggy ride where the horse bolts. When the somewhat inexperienced buggy driver yells out “We’re gonna die”, Thompson realised the situation was somewhat dire.

As the situation continues, the horse eventually reaches a barricade with just the Pacific Ocean beyond. Fortunately, the horse stopped. The operator of the service, apologetically, offers to provide a fruit basket of some other goodwill gesture. Thompson’s mother asked for a voucher for another ride. The operator, was surprised and said yes to which Thompson’s mother yelled “Do you really think we’d ever go on another ride with you?”.

To this day, with his family, Thompson has a no horse policy.

The question this begs is “What happens emotionally when your company is hacked?”.

And what about the hacker? A poignant video by Hector, a former member of Anonymous, shattered many of the perceptions of the audience and look into the psyche and emotional impact of working as a hacker, seeking to bring down large organisations. Surrounded by family and friends who went to jail for their participation in drug trafficking, the hacker was largely alone and retreated into his computer.

He escaped into hacking with Anonymous when he became a parent unexpectedly and his grandmother died.

This picture dispelled many preconceptions of hackers as committed activist or online vandals. It pointed to a young man, facing exceptionally difficult personal circumstances that retreated to a world where he found solace and acceptance.

“They needed hackers and I needed someone who would listen,” he said.

Thompson then chatted with Dr Srini Pillay, a Harvard psychologist who talked about the psyche of hackers.

“When we talk about hackers, we talk about them as if they’re a homogeneous group,” said Pillay. “In reality, different people are motivated by different things”.

Pillay said that some of the common things amongst many hackers was a sense of detachment and loneliness. This isn’t just a “soft” characteristic. It can be observed in physiological differences when looking at brain scans that directly relate to particular behaviours.

On the other side of the equation, for parties that were hacked, Pillay pointed to further research that highlighted how conflict centres were stimulated causing them, in 75% of cases, to mis-predict what was going to happen during a security incident.

“When you are uncertain, you generally are biased to think the worse things are going to happen because your brain is telling you that,” said Pillay.

Given the significant focus many organisations put on incident response, this is a very important piece of data.

During the week, many people we spoke with questioned what Thompson’s final guest would be able to contribute to a discussion on security. But actor Alec Baldwin talked about what the recent Sony hack meant to the people directly affected. Having worked with the studio over many years, Baldwin had a lot to say about the incident.

Baldwin said, despite to nature of the entertainment industry and the hack, the effect on Sony was the same as any other business that has its operation interrupted. However, he was clear the impact on the screening of “The Interview” was more serious.

“What happens when people hack to control people’s speech,” asked Baldwin.

As a result of the Sony hack, Baldwin noted that there have been some marked behavioural changes across the entertainment industry.

“In a world were people would say we wanted an electronic trail of this conversation… there’s more ‘let’s discuss this offline’ now,” he said.

Whereas there was previously a desire to maintain paper and electronic records of conversations and decisions, Baldwin said more and more people are completing transactions verbally in order to mitigate the damage of any future hacks.

Join the CSO newsletter!

Error: Please check your email address.

Tags RSA Conferencesecurity professionalshackedChairman Hugh Thompsoninformation securityDr Srini PillaySony Hack

More about RSASony

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Anthony Caruana

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts