Radar #5: This week's topics: 2024 CISO Salary Data, The Nearest Neighbor Attack, Federated Security Training, and more
Learn more about The Radar here
IANS released the 2024 CISO compensation report in October and while I recommend reading through it (especially if this is the world you are in) here are the main compensation numbers: $403k (Median), $565k (Average), $1.02M (Top 10%). There is nothing too surprising here, CISOs make a lot of money. The recommendations for increasing value and pay are:
This is difficult, but being able to craft a story to brief leadership can go a long way to build trust. One way to do so is monitor then news for highly public breaches, identify the TTPs used, map them to MITRE attack, and then either hire someone externally (or preferably have someone already on staff) to test each of those TTPs. If you have multiple defenses for each attack. Craft the story around how the money being spent on security is helping protect the business and enabling it to grow safely. Here are some of the more interesting data points that stuck out to me:
2 . Regional Differences in CISO Compensation: This figure is fascinating. The total comps in areas such as San Francisco and New York make sense and play a role in raising the average compensation of these areas. Interestingly, the Southeast has a lower total compensation than the Central US which is surprising. I’m also shocked to see Canada’s total compensation significantly lower than even the lowest regions of the US.
The nearest neighbor attack is an interesting story of how OrgA was compromised through a highly targeted attack that relied on the threat actor getting access to the neighboring company’s network (OrgB) and using a WiFi adapter in OrgB to connect to OrgA’s resources that were not protected by MFA if connecting via WiFi. Of note, OrgB seemed to have been compromised in the same way from a different neighboring company. The reason this level of sophistication was needed was that all public-facing assets required MFA, which the attacker did not have access to. They were able to obtain multiple valid passwords for OrgA users by spraying them at the public-facing assets. While they couldn’t log in using it over the internet, it tipped the threat actor off that the credentials were valid and they could be used if authenticating via the WiFi.
I have not tested it, but I wonder if some sort of detection when a user authenticates with a valid password, but never completes the 2nd factor. While this is a super interesting attack, it’s not something most companies need to have as their top priority. Some takeaways are: Log as much as you possibly can and what risks are you willing to accept? Was the risk of being attacked over WiFi deemed too low? Was it even identified as a risk?
Historically, training/education was centralized. You had to go to a certain school or company to obtain a degree or professional certification. While (for the most part), companies hiring for security roles have realized that a degree doesn’t mean much in terms of competence, we still heavily over-value certifications over aptitude. I’ve talked extensively about this issue on the demand side – addressing what you can do to stand out in your industry. On the supply side, I think we’re about to see (or are already seeing?) a massive increase in the amount of training being offered by individual companies or professionals, especially with highly respected instructors (See: Here and Here) leaving traditional training companies in droves.
This “Federated Security Training” model makes a lot of sense to me – the cost will be lower because it goes straight to the instructors and the quality will be more relevant because it can be updated quicker. The cons? Word-of-mouth marketing and a good instructor reputation will be super important. You may also be concerned about the lack of certifications approved by a “certifying body” for this training, you shouldn’t be though, we should probably move away from certification-based competence. What does this mean for you?
Want this sent straight to your inbox? You can subscribe here to have it sent every Monday morning.