{"id":370484,"date":"2020-10-01T09:27:02","date_gmt":"2020-10-01T08:27:02","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=370484"},"modified":"2020-11-16T08:52:54","modified_gmt":"2020-11-16T07:52:54","slug":"fa1-the-power-of-trust-thoughts-on-security-in-the-digital-age","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/en\/work-productivity-en\/na\/fa1-the-power-of-trust-thoughts-on-security-in-the-digital-age\/","title":{"rendered":"The power of trust: thoughts on security in the digital age"},"content":{"rendered":"<p class=\"intro\">When you\u2019ve been working in digital security for a quarter of a century, as I have, people often ask what my number 1 piece of advice is to help businesses and organizations build trust with their customers and partners.<\/p>\n<p>My answer is always the same: \u201cDon\u2019t be creepy!\u201d<\/p>\n<p>I know it\u2019s a clich\u00e9 to use films as parallels, but there\u2019s a great example of what I\u2019m talking about in Minority Report. Forget about the film\u2019s overall premise, to predict when someone is likely to commit a crime before they do it. For me, the creepiest bit of the film is when Tom Cruise\u2019s character walks into a department store and they scan his eyeball and then tell him exactly what clothes he\u2019ll like. It might seem like a really good service, but it\u2019s creepy. And I think people are worried about creepy things.<\/p>\n<p>When companies talk about using advanced technologies like AI, an implication is that customer data can be used to profile people. So companies who do use AI have to do so with integrity and in an ethical way, so that people trust they\u2019re using it with good reason and to good ends. Overstep the line, and you lose that trust.<\/p>\n<p>My role is helping organizations to use technology in a way that builds trust. Here, I want to share some of the key things I think CISO\u2019s should consider when approaching security in the digital age.<\/p>\n<h2><strong>The importance of making trust leaps<\/strong><\/h2>\n<p>Someone who has influenced a lot of my thinking on trust is Rachel Botsman, in particular her concept of what she terms <a href=\"https:\/\/medium.com\/@rachelbotsman\/trust-leaps-bae279d841a\">Trust Leaps<\/a>. For Botsman, trust leaps are when people have to make a mental leap from the known into the unknown. These leaps are characterised by a particular emotion: uncertainty.<\/p>\n<p>When organizations move from on-premise to cloud-based infrastructures, they have to make a trust leap, which is to say: they have to confront uncertainty. So when we do make the leap to digital transformation, there needs to be enough information and visibility to make that leap as comfortable as possible.<\/p>\n<p>Those CISOs who embrace the move to the cloud are looking at hyper-scale cloud service providers like Microsoft and asking themselves questions like:<\/p>\n<ul>\n<li>Do I think that you as an organization are going to look after my data?<\/li>\n<li>Do I know that I&#8217;ve got control over that data when it&#8217;s there?<\/li>\n<li>Do I have visibility of what&#8217;s happening in the cloud service?<\/li>\n<li>Can I get an understanding of how you&#8217;re going to operate in the backend?<\/li>\n<li>Will I get visibility of risk?<\/li>\n<\/ul>\n<p>We do everything we can to answer these questions and more because we understand that moving to the cloud is a massive chasm of trust to leap over for some organizations. The more information and transparency we can give, the less daunting that leap will be. Because ultimately, trust comes down to people feeling they are in control, and that what they expect to happen, will happen.<\/p>\n<h2><strong>How transparency reduces the need for trust<\/strong><\/h2>\n<p>Transparency is a word that often comes up when we talk about trust. But something Rachel Botsman points out that really resonated with me is that transparency does not actually build trust. What it does is reduce the need for trust. By being transparent, you reduce the amount of unknown, so it&#8217;s less of a leap to make to trust.<\/p>\n<p>When it comes to security, having the right controls in place so you can see what&#8217;s happening, audit what happens and show engagement \u2013 all of that creates greater transparency, and so reduces the trust gap.<\/p>\n<p>But I also believe that under the right circumstances, transparency can actually be used to build trust. <a href=\"https:\/\/www.bbc.co.uk\/news\/business-48661152\">The Norsk Hydro data breach<\/a> is a great example of this in action.<\/p>\n<p>Norsk Hydro is a huge global aluminium manufacturer whose factories rely on digital technologies to power their machines. So when they were hit by a massive ransomware attack, it spelled potential disaster for both their production line and brand image. But their response saved them.<\/p>\n<p>When the attack hit, they held a public press conference. They were very transparent about it. They were transparent about the attack itself, the investigation, their engagement. So rather than the breach having a negative effect on their image, a lot of the commentary from people at the time was about the trust and respect they built in the industry because of the way they responded transparently to deal with it.<\/p>\n<p>That\u2019s a classic example of taking lemons and making lemonade with them. And it was made possible by being transparent, ethical, honest, and responsible with the trust of customers and partners whose data was put at risk.<\/p>\n<h2><strong>Taking responsibility for cyber security<\/strong><\/h2>\n<p>One of the characteristics of trust and privacy is that it is very emotional. To trust is to be vulnerable, and cyber criminals know that, which is why our trust is often the gateway they try to exploit to gain entry to our organizations.<\/p>\n<p>They will continue to succeed. Because people are people, and they will continue to make mistakes. It\u2019s easy to say \u201cIf you get a link, don\u2019t click on it.\u201d But security experts have to remember that the modern world has been set up to encourage people to click on links. So saying \u201cdon\u2019t click on the link\u201d is really saying \u201cdon\u2019t do the thing you\u2019ve been conditioned to do for the past 15 years\u201d. It\u2019s unrealistic, and I think security experts can be too hard on end-users, expecting them to behave in a way that isn\u2019t natural to them.<\/p>\n<p>The better response is to expect the breach and be prepared for it. That\u2019s how I operate: I expect criminality to exist. I expect humans to make mistakes. And I accept responsibility for trying to manage that equation and mitigate its impact.<\/p>\n<p>As I see it, technology is the greatest defence we have in this fight.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you\u2019ve been working in digital security for a quarter of a century, as I have, people often ask what my number 1 piece of advice is to help businesses and organizations build trust with their customers and partners. My answer is always the same: \u201cDon\u2019t be creepy!\u201d I know it\u2019s a clich\u00e9 to use [&hellip;]<\/p>\n","protected":false},"author":730,"featured_media":373838,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1829],"class_list":["post-370484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-privacy-en","specials-work-productivity-en","stories-how-can-i-work-secure","stories-working-secure-en","businessPriorities-modern-workplace"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/370484"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/users\/730"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/comments?post=370484"}],"version-history":[{"count":9,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/370484\/revisions"}],"predecessor-version":[{"id":396437,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/370484\/revisions\/396437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media\/373838"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media?parent=370484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/categories?post=370484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}