Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

5 Myths Holding Your Security Program Back

By Dan Geer
October 28, 2014

One could argue that cybersecurity is the most intellectually demanding profession on the planet. The rate of change is so great that no challenge is ever solved and no problem ever resolved completely. That said, security failures more often result from a lack of direction and focus, not of skills or resources.

These five myths were selected because they address pain points common to many organizations, and successfully addressing them will give reasonable assurance of some quick wins. In reviewing this list, continue to ask yourself how to apply the advice to your organization and its unique cybersecurity ecosystem. The myths endeavor to challenge you a bit on how you think about the difficulties we all face.

Myth #1: Security success depends on the level of control you have over your environment.

The Reality: It’s not about implementing more stringent controls. What’s more important is having better visibility into your organization’s data. The primary point of risk is anywhere data is in its motion. Just having controls everywhere is insufficient. If your controls fail, chances are you won’t even notice. Most organizations victimized by data breaches are discovered by a third party. 

My Advice: The shorthand advice here is: “Focus on data visibility, not the controls.” Controls can’t be effective without real visibility on data movement. This is the primary focal point for any successful security regime. With better visibility into what is happening to the data, the controls you develop will be more intelligent.

Myth #2: Effective data protection must start with a lengthy and complex data discovery and classification process.

The Reality: Data discovery and classification are important, but be practical. It’s disabling to your efforts to march step-by-step in a linear quest to attain the perfect schema. Discovery and classification are ongoing processes that are never complete. Continue to rely on them for mid-course corrections.

My Advice: Start with building a baseline set of protections based on data context. There are fewer kinds of context than there are types of data. Start with the assumption that breaches are inevitable and base your contextual hierarchy on where the critical IP resides. Focus on blocking or blunting the effect of an attacker’s potential malicious activities, which is most likely a small and reasonable number of potential actions. Combining context awareness with transfer visibility makes your data protection schema more scalable.

Myth #3: The goal of cybersecurity is to keep the bad guys out.

The Reality: In today’s interconnected world, what do “in” and “out” even mean anymore? Any external attacker who steals the credentials, authority and access rights of an insider can be considered “in.” Anyone who has access rights is a potential threat, including employees behaving badly.

My Advice: Designing data protection regimes around the “insider threat” by default also controls for an outsider posing as an insider. The outsider attack problem is solved as a side effect. The goal of this inside-out approach is to egress control: to keep the data from leaving. Don’t allow data movement in outbound network traffic go unnoticed.

Myth #4: Data surveillance means breaking employee trust and invading employee privacy.

The Reality: Surveillance doesn’t have to be an attack on employees’ privacy rights. It’s not about reading every email. Reading every email may identify single security incidents, but it won’t reveal the more powerful insight: patterns of data movement and their context.

My Advice: The proper level of acceptable surveillance is a matter of debate inside each individual organization. Event data can be collected without examining actual file contents. It can be anonymized yet descriptive of the types of users, files, repositories and applications involved. Defining responses based on context will help prioritize your surveillance efforts.

Myth #5: If you can secure your own environment, your data is safe.

The Reality: Any third party who can see your data is a potential risk, even though they have access rights. Any determined attacker knows how to work the data supply chain progressively from tertiary targets up to secondary and ultimately primary targets.

My Advice: A complex data supply chain calls for a collaborative approach between partners, suppliers and other stakeholders. Reach out to your peers at these organizations. Use a common language when discussing protection of your data. Try to run the same technology – that’s a consistent control. If you can, mandate adoption of security practices.

Final Thought

Security regimes age, while data’s value as a percentage of corporate valuation is only rising. As cryptographer, computer science and security expert Bruce Schneier so eloquently said, “complexity is the worst enemy of security.” Simplify by focusing on data, not individuals or networks. Pursuing data-centric data protection puts you in a better position to weather the withering rate of change in our industry.

KEYWORDS: cybersecurity myths data breach data security security conferences security myths

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan Geer is the Chief Information Security Officer at In-Q-Tel, a not-for-profit investment firm that works to invest in technology that supports the missions of the CIA and the broader U.S. intelligence community. Previously he was Chief Scientist at Digital Guardian (formerly Verdasys). Geer was a key contributor to the development of the X Window System as well as the Kerberos authentication protocol while a member of the Athena Project at MIT in the 1980s. Shortly after, Geer created the first information security consulting firm on Wall Street in 1992, followed by organizing one of the first academic conferences on electronic commerce in 1995. Geer is also the past president of the USENIX Association where he earned a Lifetime Achievement Award.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • artificial intelligence

    3 myths that can derail your machine learning program

    See More
  • security-center

    The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

    See More
  • Russia and Cyberattacks

    Debunking the 5 Myths of Sophisticated Cyber Attacks

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing