Category Archives: AoIS Interviews Series

AoIS Interviews Heather Deem, Part 2

Welcome to the second part of Art of Information Security’s interview with seasoned Information Security marketer Heather Deem (part 1 link). In the first part Heather discussed the importance of having reasonable time and resource expectations. In this part we will start off by discussing some low cost marketing techniques.

Erik: Are there any ‘free’ (but effective) marketing activities that organizations can pursue?

Heather:  All Marketing activities have some cost in terms of development or execution time, however, the following activities can be considered “free” or low cost:

Webinars: If the company has an internal content expert available to develop and deliver educational presentations (industry or technology focused, not vendor specific content), and if the company has an enterprise-level web conferencing subscription, the marketing team can host webinars for relatively free.  Partnering with channel partners for joint promotions can also help both companies educate and propel their prospects through the sales cycle.

By-lined or contributed articles: Developing industry-relevant articles for trade journals can be another relatively low cost activity to gain credibility and exposure.  Similar to webinars, this requires an internal content expert to develop the article and either internal PR or an agency to pitch stories to the media.

Erik: What have been some of the biggest misconceptions about marketing that you have experienced in your work with start-ups and growth companies?

Heather:  Two misconceptions spring to mind: the value of producing quality marketing materials, and the time and resources required to roll-out a program that has real impact.

I’ve seen companies who don’t hesitate to spend thousands of dollars to attend a tradeshow or who don’t bat an eye at an egregious entertainment bill submitted by sales, yet they balk or refuse to invest in a graphic designer to create a polished looking datasheet or direct mail piece, or refuse to spend time and money on developing the proper marketing materials for moving prospects and customers through the sales cycle.

The second misconception surrounds the required level of strategy, planning and resources required for successful marketing programs. Some executives underestimate the time required to plan a marketing program or what is required for execution in terms of personnel time, media lead time, engineering contribution to whitepapers, etc.

To develop truly integrated and impactful marketing programs, the marketing team needs to work through and understand the challenges faced by the sales team, the needs of the target market and align these key inputs to develop the appropriate campaigns to support the marketing goals.  Prior to executing these campaigns, companies typically need to develop new or update existing marketing materials to support these campaigns. The entire process can take a month or more.

Erik: So, how can organizations promote marketing and messaging into the culture so that everyone is involved?

Heather:  Establishing clear and effective marketing messaging and materials is the first step.  This includes both internal and external websites, datasheets and presentation content. For example, develop a concise positioning and messaging document for sales, channel partners and other company staff. 

I would also encourage the Marketing team to take advantage of all-hands meetings and either monthly or quarterly internal email updates to educate personnel on the latest marketing activities and messaging development. 

Marketing or corporate executives should also address any marketing challenges that surface and instruct employees on how to respond publically.  For example, if a known competitor is using under-handed sales tactics such as falsifying information about your company or product, executives should clearly indicate how sales and marketing is addressing the issue and reinforce that the corporate communication policy does not condone negative messaging or competitive bashing in retaliation.  Similarly, if a company is dealing with a sensitive press issue, employees should be educated on the appropriate public response. Even if they are not considered company spokespersons, they need to be educated on what or what not to say.

Erik: What do organizations need to do, to determine if their marketing is effective?

Heather:  The two exercises I would recommend are: mapping the marketing programs to the marketing goals for post-program evaluation and soliciting frequent feedback from analysts, customers and channel partners.

Prior to each marketing campaign, map the marketing goals to the campaign or activity and measure the actual results post-program.  This will typically require a pre-defined lead follow-up plan and collaboration between sales and marketing.  Metrics to include may be Cost per Lead, Response Rates, Website Hits, Lead Quality, Opportunities Developed, Opportunities Closed, etc.  Of course these efforts will only be as good as the level of accountability required of both marketing and sales to input and maintain prospect and customer data throughout the sales cycle.

Measuring the effectiveness of messaging and marketing materials can be achieved through feedback from the sales team, prospects/customers, channel partners, and analyst feedback.  It is very important to reach out to all of these audiences to gain a fresh perspective on your messaging and content from time to time.  If possible, try to incorporate feedback from each of these groups, since each group brings a unique perspective.

Erik: Heather, you have worked with a number of start-ups. How early in the genesis of a new organization should a marketing plan be developed? 

Heather:   Even if a start-up doesn’t have a dedicated marketing budget, a marketing strategy and plan should be developed before any customer facing activities are initiated.  If hiring a marketing professional (either employee or consultant) is not an option, then this effort can be lead by one of the executives.  The key is to develop a baseline strategy covering product pricing, positioning, messaging and the go-to-market strategy.  Even a rudimentary go-to-market strategy will serve as a foundation for guiding sales and developing marketing materials.  As the company goes to market and gains additional intelligence on customers and competitors and as product enhancements are rolled out, this strategy should be reassessed and revised.

In addition to the marketing strategy, an initial marketing plan should be developed.  While a marketing budget may not be established, you still need to devise a plan for the development of marketing materials such as the website, collateral (datasheets, solution overviews, technical manuals), presentations, whitepapers, demos, product packaging.  Factoring in public relations efforts, such as the development, the out-reach and the response to media and analyst relations should also be considered, even if the company is not planning a formal PR program.

Thought should also be given to how prospect and customer data will be managed.  Even if the company has yet to deploy a CRM system, it is important to plan an efficient process on how this data is maintained, how leads and customers are managed and how this data can be ported to a CRM solution in the future. If the strategy for  managing customer data is not instituted with the sales team from the get-go, management will never really gain solid data to support the business metrics and marketing will loose invaluable data for establishing and managing marketing programs.

Erik:  What are the first steps for companies, especially resource-strapped start-ups, to take in starting their marketing efforts?

Heather:  Refer to my answers regarding the top marketing activities and “nearly free” marketing activities.  Development of even a baseline marketing strategy, marketing plan and marketing materials assessment will go a long way in laying the foundation to drive effective yet budget conscious marketing programs. 

I will also offer a free one-hour “Ask the Expert-Marketing Consultation” to the readers of Art of Information Security blog.   During this session companies can jump start their marketing by gaining free marketing advice specific to their website or marketing plan and bounce ideas off a marketing expert who specializes in the IT Security industry.  Schedule your free session through the contact page at www.candescomarketing.com

Many Thanks to Heather !

Thanks for taking the time for the interview, and for the offer to Art of Information Security’s readers. I hope that it will help provide a more rounded perspective to folks we are struggeling with organizing or understanidng their marketing needs. 

Heather can be contacted through Candesco Marketing.

Cheers, Erik

AoIS Interviews Lee Kushner, Part 2

In the final part of our interview series with Lee Kushner (part 1), Information Security recruiter and career coach, we will jump right in with a discussion of Lee’s “7 Habits of Highly Effective Career Managers”.

Erik: I noticed from your web page that you recently delivered a presentation called “7 Habits of Highly Effective Career Managers”. Can you give us a flavor for what those habits are?

Lee:

  1. Talent or Great Skills
  2. Excellent Communication
  3. An effective network
    • Your network is only good if you can call on it and get a result
    • What are some effective giving strategies?
  4. A Professional Development Plan
  5. They Invest in Themselves
  6. Develop Their Own Personal Brand
  7. Possess Necessary Intangibles (perspective, patience, passion)

Erik: Ok, so how can someone reality check themselves about “having great skills”, or about the kinds of positions they “have great skills” for?

Lee: Talent is the one thing that is critical to being great at what you do, whatever that may be. Without talent, it is tough to achieve greatness. However, one talent could be something as simple as being the “hardest worker” or “never quitting until you figure it out”. The truth is that we are all talented at something – it is important to recognize what that talent is, cultivate it, develop it, and leverage it.

The questions I normally ask people is:

  • Tell me one thing that you do better than most people
  • Tell me the accomplishments that you are most proud of
  • If I asked your peers about your skills, what would they say was your best one

When you answer those questions, you usually come close to discovering your best skills or true talent.

Erik: Communication is one of those elusive soft skills. Many people think they are great communicators, but are so-so. Do you have any concrete advice?

Lee: Most people are lousy communicators because they do not believe that it is a skill. There are classes and courses on how to increase your vocabulary, to communicate with executives, to speak to subordinates, etc.

Ask people around you in your personal life, or anyone who can provide you with an honest answer (without repercussions) about your communication skills – that may be a good guide to see where you really stand.

Erik: “Effective Network” – I suspect that you mean something very specific…

Lee: I define an effective network as one that can be called upon on short notice and one that will provide you with a meaningful response to your query. Your network can be made up of co-workers, industry peers, specialists, mentors, and educators. An effective network also has to be willing to offer “candid” communication – be able to freely tell you when you are both heading down the correct path and the wrong one.

Erik: So, having a Linked In account isn’t enough?

Lee: No. Like anything, you get out of it what you put into it. Just clicking on a “Linked Invitation”  does not equal a trusted, meaningful relationship. It is quite the opposite.

Erik: I am very bad with names and faces, however I try to use conferences and large meetings as networking opportunities. One habit I have developed is to write clues to myself on the back of every business card I accept. I write things like, “met Jim at RSA 2008 on Expo floor”, ”Great network threat guy”, etc. Do you have any specific networking habits that you use?

Lee: What works for me is that I like to remember something that is unique about the person that is not necessarily job related: such as an outside interest, a college or university, or something personal. To me,  this allows a connection to be developed that is outside of how you would traditionally think of them, and then you can effectively remember other things about them. However, just because it works for me, does not mean it will work for all.

Erik: What does a Professional Development Plan look like, and whom should I share it with?

Lee:  My thought is that a Professional Development Plan has two parts. The first part represents your current career and the skills that you currently possess. The second part is your long term career goal, and the skills and experiences necessary to qualify for that particular role.

Really what you are doing is performing a “career gap assessment”.

Other components of a career plan should include research on how to attain these necessary skills, a timetable of sorts to actually acquire the skills, and an understanding of the sacrifices necessary to achieve them.

Your career plan should be shared with people who respect and care about you, both personally and professionally. Your professional network can consist of your mentors, your supervisor, your peers, and trusted outsiders. Those can include career counselors, career coaches, executive recruiters, etc.

On a personal level, you need to share this with the people that will share the benefits and suffer from the sacrifices. This is usually your immediate family. Sacrifices can inlcude travel, longer work hours, relocation, and the finances needed for career investments.

Erik: Is personal brand synonomous with reputation?

Lee: In many cases it is, however I think that a personal brand is much more difficult to come by. I mean, everyone has a reputation: some are good and some are bad. However, you traditionally have to work very hard to establish a well respected professional brand.

In today’s culture, professional branding means that you not only have to establish a respected reputation, but you also have to be known for something that makes you unique and your opinions and knowledge “sought after” and relevant.

Erik: Developing a brand is a long term investment. How do you do this so it is not viewed as a “job campaign”?

Lee: You are correct; developing a professional brand will not happen overnight. I believe that many people who have respected professional brands have an inner drive and passion for excellence. It is this passion that usually drives them on a daily basis, and they know of no other way to conduct themselves. My feeling is that if this behavior is viewed as routine and standard, it appears natural, and is only viewed as a job campaign by people who do not share the same level of professional drive or who feel threatened.

Erik: Necessary Intangibles?

Lee: Passion to me is number one. All successful professionals, regardless of field, have a passion for their careers and are driven by an inner quest for excellence.

Patience is another one. Too many people get caught up in the concept of how quickly they can advance, without realizing that they will miss out on the opportunity to learn more and develop their skills.

I think that someone’s work ethic is also a big differentiator. One of my favorite expressions is that the worst thing to be in life is lazy. Someone who is willing to put in the time, effort, and energy to achieve usually finds themselves in positions where they are given extra opportunities to demonstrate their skills.

Erik: Lee, what advice do you have for folks who are currently out of work and looking?

Lee: Two pieces of advice: The first is to “keep your head up” and do not get discouraged. The second is to take this time to reflect as to why you are currently in this situation, and begin to plan accordingly so that it does not happen to you again.

Erik: And for those who are worried about being displaced?

Lee: My best advice would be to be visible when it is time to be visible. This is the time where you have to outshine the people around you, take on additional responsibility, and demonstrate that you are not immune to the current economic conditions.

This is not the time to ask for additional compensation, additional training, or take extra vacation. This is the time to show that you are a team player, hard worker, and are loyal to your current employer.

If you feel that your displacement is imminent, then you should get your resume prepared and begin reaching out to your network to see if they know of good opportunities for someone with your skill set.

Erik: Are there any Career Management resources you could point folks to?

Lee: I will be frank in saying that unfortunately there are not many Career Management resources specifically targeted toward Information Security professionals. Mike Murray and I are hoping to change that at www.infosecleaders.com. We are planning to produce regular career-driven content specifically geared toward the Information Security community. The initial podcast series ”Career Incident Response” will be posted soon.

In addition, we should also be publishing and releasing the results of our Information Security Career Management series around the time of Black Hat and Def Con this summer. The survey is still open and can be found at www.infosecleaders.com/survey.

Erik: Lee, thank you for taking the time to participate in this interview. I know based on the response to Part 1 that this information is getting a lot of attention and that the Art of Information Security community has really appreciated it.

Lee: Our profession is growing and increasing in popularity. In the future, there is going to be increased competition for the best positions. It will not be enough to only be good; you will have to be better than your competition. It will be imperative to plan accordingly and make regular investments in your professional development to differentiate from your peers.

Many Thanks to Lee Kushner

If you have found this interview helpful, please consider participation in Lee’s professional development survey at www.infosecleaders.com/survey. He has a tremendous passion for helping Information Security professionals develop their careers, and for aiding employers in understanding how to attract, develop, and retain top talent. The survey is Lee’s way of reality checking the advice and council that he gives, and will be shared through his upcoming podcasts and speaking engagements.

Cheers, Erik

AoIS Interviews Heather Deem, Part 1

The Art of Information Security has the great pleasure of interviewing Heather Deem. Heather  is the driving force behind Candesco Marketing, and has extensive experience developing and executing marketing programs for Information Security firms. Given the current economy, Art of Information Security felt that there might be broad interest in Heather’s ideas and insights in marketing Information Security products and services.

For more than ten years, Heather has supported marketing efforts, from framing the strategy to executing on the fine details, for a wide range of technology companies including Websense, Finjan, MarkMonitor, F-Secure, and others. I met her at last year’s RSA conference at one of the networking events, and really appreciate her taking the time for the interview. Let’s jump right in…

Erik: How much of a corporation’s resources and energy (capital, time, etc.) should be reserved for marketing?

Heather:  Many companies underestimate the hours and timelines required for campaigns and programs.  Timelines of course vary depending on a company’s goals, budget, the team’s availability, and turn-around times, but in general, it is advisable to allow the following timelines:

Collateral Development: 3-4 weeks to develop a new datasheet, 1-2 weeks for datasheet revision, 4 weeks to develop a new presentation, and 2-3 months to gain customer approval and develop a case study.

Tradeshows: Reserve booth space about a year in advance in order to acquire the best booth location.  Begin planning 4-6 months prior to the event date.  Start development of booth messaging, collateral, and demonstrations at least 3-4 months prior to the show.  Direct mail campaigns, exhibitor service orders, logo’d giveaways, and advanced shipments should be completed about one month prior to the event.

Online Demand Generation Programs: The first step in planning your demand generation program is to define the target market and the offer.  Is the call to action going to be a whitepaper, webinar, podcast or other?  Creation of a new whitepaper can take 2-4 months; 2 months if outsourcing, 4 or more if using internal sources to develop.  For a webinar, you need lead time to engage and schedule your guest speaker, usually an analyst or customer.  Once the target market has been determined and the development of the offer has started, you need to identify the right media company for promotions. Most media sites typically require insertion orders to be placed 2-3 months out.  While some advertising sites have availability 1-3 weeks out, sites with reputable performance typically sell out key promotional categories or banner spots several months out.

Direct Mail Campaigns: Similar to the online programs above, you need to identify your target audience and offer, but will also need to determine the direct mail list for your campaign.  You may have a solid customer and prospect database for your targeted mailing or you may opt to rent or purchase a 3rd party mailing list.  In both cases, you should take the time to segment the list to the specific contact titles, verticals, or geographic areas which are most relevant to your targeted audience.  It is also worthwhile, especially if utilizing a 3rd party list, to confirm the contact information and the mailing address of each recipient.  Depending on the size and quality of your list, the process of scrubbing the list may take days or several weeks. This step is less necessary if you are mailing an inexpensive post-card, but quite necessary if you have developed a higher quality mail piece or offer.

Depending on your offer and the complexity of your direct mail piece, it may take 2 weeks to 1 month to develop content, design the graphical layout, and print the direct mail piece. You will need to allocate another 2-3 weeks for mailing house services and delivery.

The above examples illustrate very rough timelines, but hopefully provide a baseline for planning typical marketing projects. While I’ve worked on and successfully delivered similar projects within shorter timeframes, it is advisable to integrate ample timelines into your project planning to avoid rush fees, team pressure, and depletion of resources which may be needed for other team projects/goals.

Erik: What are the top marketing activities that every organization should make happen?

Heather:  Development of a Marketing Strategy & Plan, and Development of Marketing Materials & Tools.

While this advice sounds almost too simplistic to relay, I cannot tell you how many companies tend to overlook or half-bake their marketing strategy or plan, yet have high expectations of marketing activities which have been based on undefined goals and limited budgets.

Strategy: Identify your target market and develop your positioning, messaging, go-to-market plan, and marketing goals as these elements will serve as a tool for making informed decisions and will be the foundation for your marketing plan and materials.  Ensure that key decision-makers from executives to sales are aligned on these areas.  For example, based on the revenue goals, how many raw leads does marketing need to produce each quarter to support sales, and conversely, does sales have enough resources to appropriately handle follow-up for this volume of leads?

Plan: Based off the marketing strategy and goals, develop the tactical plan to meet the marketing objectives. This plan should include an estimated timeline and campaign results.  Identify if the allocated budget and resources will sufficiently meet the marketing goals.  If not, additional investments in marketing may be required, or the marketing goals may need to be readjusted.

Some companies may feel overwhelmed, not know where to start, or feel that their limited marketing funds don’t justify a full-blown marketing strategy or plan; however, in start-ups, where ever dollar and hour counts, planning is even more crucial as there is less margin for error or waste. Advance planning will strengthen the management of marketing by helping you stay goal-focused, adequately allocate resources, avoid spikes and dips in lead generation, and reduce gaps in your marketing materials.

Marketing Materials: This is one area that deserves more scrutiny. Organizations tend to focus more on lead generation and creating awareness, overlooking or undervaluing the necessity of creating and maintaining a proper marketing library of collateral and tools.  Frequent development and updating of marketing materials is vital to supporting the sales team and channel partners, and for propelling your prospects and customers through the sales cycle.

Almost every company has a datasheet, sales presentation ,and whitepaper, but many overlook other essential marketing materials like positioning briefs for the sales and channel team, ROI calculators, customer case studies, flash demos, and frequent development of new industry whitepapers or webcasts. These tools are like the oil that keeps the sales and marketing engines running smoothly and helps transport prospects through the sales cycle.

Look for Part 2

The second part of this interview with Heather will be posted in a few days. Stay tuned…

Cheers, Erik

 


AoIS Interviews Lee Kushner, Part 1

Given the current economic situation, professional development and job searching are on many people’s minds. As a result, I saw no better time to get perspective on these topics from a true industry insider.

Lee Kushner is the President of LJ Kushner and Associates, LLC, an executive search firm dedicated exclusively to the Information Security industry and its professionals.  For the past thirteen years, Lee has successfully represented Fortune 2000 companies, information security software companies, information security services organizations, and large technology firms in enabling them to locate, attract, hire, and retain top level information security talent.  Throughout his career, he has provided career management and career coaching to information security professionals at various stages of their professional development.  He is a regular speaker and industry contributor on topics that include career planning, interview preparation, and employee recruitment and retention.

Erik: With 13 years of recruiting Information Security professionals, how has your position as a recruiter changed and evolved?

Lee: When I began recruiting 13 years ago, not many people had ever heard of a recruiter who specialized in Information Security – so there was a great burden of proof on my part to demonstrate that I understood both the technology and the industry to candidates.  Information Security professionals are a skeptical bunch.  It was very important to establish credibility and earn trust, by only promising what I was able to deliver.

I believe that after 13 years, both my firm and I have established a solid reputation and credibility within the industry and among the professionals.   Most of the people that we have worked with, we have done so for quite a while, throughout their career development.    Many of those professionals have passed on their positive experiences to their peers – and our reach has expanded.

It is my hope that through the years of working in the industry we have been able to help elevate the recruitment profession and inspire a different response when people hear the terms “recruiter” or “head-hunter”.

Erik: I understand that Mike Murray and you are working on a podcasting series called “Career Incident Response”? What is that about?

Lee: Mike and I have been speaking on the topic of Career Management for quite some time at RSA Conferences, DefCon, and The Source Conference.  We came up with the idea for a “Career Incident Response” podcast series due to the fact that so many people were coming to us either because they were a victim of a layoff, felt that a layoff was imminent, or had witnessed bad things happening to their industry peers.

The Career Incident Response podcast series will be outlined like a training course.  It will provide a guideline to what people can expect – from items that include evaluating your work situation,  the personal and emotional impact of job loss, how to effectively search for a position,  how to prepare your resume, and some basic ways to address difficult interview questions.

Note: The Podcast Series is scheduled for release on or about May 15th, 2009 on  http://www.infosecleaders.com.  Art of Information Security will post an announcement when the release happens.

Erik: If someone is working with a recruiter, what should they be doing to get the most value out of that relationship?

Lee: I believe that the most important item is honesty, which is driven by trust.  People generally like to keep things close to the vest when they are engaged in a job search and become cryptic about things such as timetable, other opportunities, their current work situation, and compensation.  The more accurate information that a recruiter has, the better that they can help assist you.

The other thing is that people should work with recruiters that understand their profession and can provide them with something more than a job description.  It should be imperative that the recruiter has industry experience, no matter which industry you are in.

For example,  if I was a real estate attorney, I would want to work with recruiters that either placed attorneys, or ones that worked with real estate clients.

Erik: What are some signs that people are working with the wrong recruiter for them?

Lee: The biggest sign is when they do not add any value to your search process that goes beyond the current opportunity that they are working on.  Many recruiters comb job boards and social networking sites, looking for key words, without understanding how they fit in.

Information Security is not a “key word” business.  There are many different segments of our industry and it is comprised of many different skill sets.   If a recruiter cannot differentiate between these skills and how you fit, then you are probably working with the wrong one.

Erik: If you could communicate one thing to someone who is trying to manage their career, what would that be?

Lee: The one thing that I would stress would be to strive to differentiate from your peers.  The industry is going to become more and more competitive, and competition for the best positions is going to increase, being able to tell that story is going to be critical to achieving your long term career goals.

Erik: In your practice, what are some of the key differentiators that you are encouraging people to pursue?

Lee: I hate to be vague, but the best thing that I can tell anyone is to make consistent investments in their career and career development.  This can include certifications, training, personal development, career coaching, etc – but investing in yourself and your career is going to be critical to differentiating from your peers and competition.

I have three rules when addressing self investment:  

  1. Any investment in your career is a good one
  2. You get what you pay for
  3. If you do not invest in yourself, do not expect anyone else to

Erik: You in fact have been working on a Career Investment and Differentiation presentation. What are some of the key points you are trying to communicate?

Lee: The key point of this concept is that it is up to you – the individual – to manage your career.  You are the one that has to seek out guidance, and plan for your future.   Do not expect your company to do it for you – you will reap the ultimate reward – so you should plan on making consistent sacrifices to attain these goals.

Erik: So, how much overlap should someone expect between their employer-driven professional development and their personal professional development?

Lee: Whatever you can gain from your employer’s personal development plan – by all means get.  However, you should understand why the employer is providing you with that stipend – it is so that it benefits them – not you.   If there is overlap – consider yourself fortunate.

Do not be tied to your employer’s career development plans – because you most likely have different plans for your career than your employer.   Develop your own career plan – and understand your skill deficiencies and try to find ways to eliminate them .  

Erik: So, you are really proposing that people treat their career as an asset that requires ongoing maintenance, just like their 401 (k) or home?

Lee: I believe that it is not only important to work “in” your career, but to work “on” your career.

Investing in your career and your personal development is the most important investment that you can make – because it is the one that you have the most control over.  In addition, once you learn something and develop a skill, it cannot be taken away from you (unless you decide to neglect it).

You can make very effective arguments that career acceleration produces the most effective long term financial rewards and improves the quality of your life.

Stay Tuned for Part 2 (link)

In the second part of our interview with Lee, he will discuss his recent presentation entitled “The 7 Habits of Highly Effective Career Managers”.

Cheers, Erik

AoIS Interviews Michael Rash, Part 3

Michael Rash HeadshotThe Art of Information Security continues our interview with Michael Rash, Network Security expert and the driving force behind several open source security tools including PSADFWSnort, and FWKnop.

In Part 2 of the interview Michael discussed how network threats, and network counter measures have been evolving. He also touched on the development of his book. Here goes the final installment in this series…

Erik: What would be your recommendations for folks who are adopting Linux (either enthusiasts or corporations) in terms of properly protecting their hosts and networks from network attacks?

Michael: I think that deploying host and network firewalls is a great first step here, and iptables functions admirably. Many people in corporate environments are concerned about the questions of performance, manageability, scalability, and support, and iptables together with some third party software have decent answers to these concerns. For example, the fwbuilder project provides good graphical support for the display and manipulation of iptables policies, and large Linux distributions such as Red Hat and SuSE offer commercial support.

Beyond having proper firewalls deployed, intrusion detection systems are a critical piece to point the way to attempted (and sometimes successful) compromises. Also, strong security mechanisms such as SELinux can provide a powerful barrier to attempted malicious usages of hosts. Finally, patch early and patch often.

Erik:  Do you have any tool or reference recommendations for debugging IP tables firewalls?

Michael: For debugging iptables policies and maintaining tight controls on the type of packets that are allowed to traverse those policies, one of the best techniques is to use tcpdump either on the end points or on the firewall itself (and these may be the same system) and watch how network traffic is allowed to progress. For example, a SYN packet to a port that is filtered will not respond either with a SYN/ACK or a RST, and seeing this behavior with tcpdump is quite easy. At the same time, understanding where in an iptables policy packets are getting dropped (or otherwise messed with) is usually made clear by watching how packet and byte counters are incremented on particular iptables rules. Use ‘iptables -v -n -L’ for this, and couple this with the ‘watch’ command to see how things change. Beyond this, if you have a kernel compiled with support for the iptables TRACE target, then you can use an iptables TRACE rule that causes all packets hitting this rule to be logged. Lastly, for really advanced debugging of iptables code itself, the nfsim project provides a simulator for running Netfilter code within userspace (and hence the ability to test code before running it within the kernel itself where a bug can have dire consequences). The nfsim project can be found here:

http://ozlabs.org/~jk/projects/nfsim/

Erik: So, you obviously are deeply connected to all things Network IDS/IPS. What kinds of trends have you seen in 2008? Were there any new attack styles that surprised you? Do you have any ideas about what 2009 may hold?

Michael: Well, 2008 will certainly go down in history as the year that people were forced to really pay attention to DNS by the Kaminsky attack. One thing Dan did really well is make it clear just how important DNS is for literally everything on the Internet, and how a flaw there has implications that are difficult to over estimate. Online banking, acquiring SSL certificates, SMTP, “forgot my password links”, and countless other infrastructures depend on DNS information being correct. But, then there were also serious issues in 2008 with BGP and with SSL, so if there was any trend in 2008 I would say that it was the year of security flaws in big Internet infrastructures. In 2009, it will be interesting to see whether this trend remains true for as-yet undiscovered vulnerabilities in other important systems.

Erik: Has your support for open source helped you professionally?

Michael: Absolutely. My current position as a Security Architect on the Dragon IDS/IPS developed by Enterasys Networks is a role that my open source work helped me to acquire. Many forward looking innovations are created by the open source community, and understanding this community helps to guide many companies and the products they develop. Companies are recognizing the power of open source software more and more, and this translates to better professional positions for open source developers and technology enthusiasts.

Many Thanks to Michael !

Thanks a ton for the time and energy you put into this, the first of what I hope will be many, interviews with notables from around the Information Security community.

Thanks, Erik

AoIS Interviews Michael Rash, Part 2

Michael Rash Headshot

The Art of Information Security continues our interview with Michael Rash, Network Security expert and the driving force behind several open source security tools including PSAD, FWSnort, and FWKnop.

In Part 1 of the interview Michael discussed how he came to be involved in Network Security and Intrusion Detection system design. Here in Part 2 we get a little deeper into Michael’s philosophy on Network Intrusion Protection and discuss more open source tools that he is involved with the develop and support of.

Erik: How do you see network based attacks changing ?

 Michael: Over time, I think network based attacks will continue to be more automated and therefore accessible and deployable by more people. When it comes to educating oneself on the details of network insecurity, excellent projects such as Metasploit, Nessus, and Nmap point the way – and this is essential also for people trying to defend networks too. We will see more attacks delivered over IPv6, and we will see ever more clever ways to exploit the natural tendency of people to trust data in ways they shouldn’t. For me as a person trying to protect networks, the later is the most worrisome. A good example of a new and clever attack is “in-session phishing” as described here (Arstechnica link).

Erik: The firewalls that I run are utilized as host based protection. As you see network security becoming increasingly important, do you see the firewall “concept” become a hybrid of network protection layered over host based network controls?

Michael: With good firewall implementations (such as iptables) that do not place undue burdens on network processing that takes place on hosts, I do believe that firewalls will be viewed more and more as an essential protection mechanism for the host. The network perimeter will also continue to be an important deployment point for large firewalls to enforce global policy, but limiting the damage a successful exploit against an internal system is a problem that such an external firewall is not well-suited to address. Having a hardened network security stance on each host can provide an important benefit in this area. Further, as firewalls offer more application layer processing features, hosts can deploy customized policies that define sets of application layer data (derived from Snort rules) that are unfit for communicating with local sockets.

There are challenges though regarding managing all of those host-level firewall policies, and this is where some patience and scripting ability can play a roll.

Erik: And then came FWSnort? What were the principles that drove the development of FWSnort ?

Michael: The fwsnort project was inspired originally by the snort2iptables script written by William Stearns. This was back in the Linux 2.4 days when the string match extension was still distributed within the patch-o-matic system from the Netfilter project. Being interested in intrusion detection and firewalls at the same time, it was a goal of mine to see how far iptables could be taken in the direction of detecting (and blocking) malicious traffic. The snort IDS had a well-developed signature language, and at that time the signatures were still free and released under the GPL. So, it was natural to try and extend the snort2iptables code, and fwsnort was created.

The main goal of fwsnort is to use facilities provided by iptables to recast Snort signature sets within iptables policies. A clean translation is not always possible particularly with complex Snort signatures that use regular expression matching (because no regex engine is available to the iptables code running in the kernel), but many Snort signatures can faithfully be translated.

 Erik: Was your vision that PSAD and fwsnort teamed up as host IDS dynamic duo, or more as services that strengthen network firewalls?

Michael: Ideally I would say both here. The difference between the two types of deployments is negligible from psad and fwsnort’s perspectives – both can be deployed just as effectively against the iptables INPUT chain (for packets directed at the local system) as the FORWARD chain (for packets directed through a network firewall). The effect of not deploying host firewalls is that the outside of the network may be protected by a crunchy shell, but the inside is a chewy center. If any system can be compromised internally on such a network, an attacker is presented with few barriers to additional actions once the perimeter is breached.

 Erik: But wait – there’s more ! You are also the driving force behind FWKnop !

Michael: Thanks for mentioning fwknop. This project has received a large percentage of my attention in the last year or so. It was started originally in 2004 as the first port knocking system that added passive OS fingerprinting as an authentication parameter, but in 2005 Single Packet Authorization was added. SPA solves many of the protocol limitations that are built into port knocking (ease of replay attacks, lack of decent data transmission, and difficulty of scaling to many users), and takes the idea of “default-drop” to a new level. That is, a service such as SSH is itself made completely inaccessible before the lightweight SPA packet is passively sniffed and the firewall is reconfigured to allow access only if the SPA packet is valid. This essentially combines techniques from the IDS world (passive packet sniffing) with techniques from the authentication and authorization world (encryption and the like).

Erik: And how did the book come to be ?

Michael: I have generally tried to capture my thoughts on computer security by writing them down. In 2001 I started writing articles, and wrote a few for the Linux Journal after working with Jay Beale on the Bastille Linux project. From there, I joined Jay with writing material for Snort books for Syngress. My open source development interest has always remained in IDS and firewall technologies, so I eventually decided to write a book about the two together. The result was the No Starch book. Let me just mention here that if any of your readers is interested in writing a book, I can wholeheartedly recommend No Starch as an absolutely fantastic publisher to work with.

Stay Tuned for Part 3

Part 3 of this series is coming soon, with more discussion about network security as well as the impact that contributing to open source tools has had on Michael professional opportunities.

Cheers, Erik