aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Engineering

How To Introduce More Empathy Into Security Operations

  • aster.cloud
  • August 10, 2022
  • 3 minute read

Editor’s note: This blog was originally published by Siemplify on April 29, 2021.


With cybersecurity moving from backroom to boardroom, and the societal imperative that workplace cultures renounce toxicity for more sensitivity and tolerance, there is a rapidly-growing call for empathy to pervade the infosec function, from the CISO all the way down.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Within security operations, challenges often boil down to alert fatigue, skills shortages and lack of visibility.

But another hurdle is just as important: ensuring the extension of humility and compassion—to users, customers, third parties (a huge source of risk), colleagues on your own team, and even your adversaries. Fortunately, this struggle can be met without the need for technology, and result in more productivity, effective relationships, diverse thinking, and stronger and more resilient security postures.

The demand for empathy has only been exacerbated by COVID-19, as workers need to adjust to new security challenges and potential threats brought on by the shift to remote work, and also feelings of isolation and disconnection.

At the 2018 LASCON show, security expert Joe Parker delivered a foundational talk on SecOps empathy. He described three areas of security operations where empathy and vulnerability play a bigger role than most people may think.

Incident response

Whether you are investigating an ordinary alert, trying to determine whether something is a false positive, or embroiled in a full-blown incident, chances are you will need help. To obtain all the log data and other details you require, empathy can help encourage others to give you what you need to resolve the case and determine a course of action. Afterward, be sure to thank the sources from which you drew information and share with them the outcome of your investigation, as they may be curious of the result and helpful in avoiding similar situations in the future.

Read More  How To Build And Push A Docker Image With Cloud Build

Security awareness

One of the common traits that show up often in articles describing the habits of an empathetic person is the ability to put oneself in the shoes of others. When it comes to security, the basics are teachable and learnable, but expecting someone who is not an infosec expert to spot, for example, a well-oiled phishing attack may not be realistic. If you are called on to help with employee education, make sure that you are relatable (perhaps share a story of a time when you blundered), non-judgmental, and open to feedback.

Here is what SANS Institute instructor Ryan Chapman said about empathy during his appearance in the Siemplify, now part of Google Cloud, “Sitdown With a SOC Star” series:

“I truly believe that the most important soft skill to have within our realm is empathy. You can think of it this way: How many times has a SOC member said something like, ‘This stupid user clicked a link and now their host is compromised?’ We hear this often in a SOC environment. Is that person really ‘stupid?’ No, they aren’t. That person may be an engineer, a payroll specialist, a salesperson who enables the very company for whom you work. They have their specialties and their skills. And we have ours. Expecting everyone under the sun to understand security the way that we do is daffy. Rather, we need to be empathetic. We need to realize where they’re coming from. It’ll help us all get along, which in turn improves communication and fosters a healthy working environment.”

Read More  Google Meet And Miro Come Together To Create Great Collaborative Moments

Vulnerability management

When addressing security flaws and misconfigurations, SecOps pros often work with more IT-inclined staff than in a typical security awareness training exchange. When you interact with IT, developer, and operational teams, empathy for their challenges can help you understand why they might be reluctant to take on security tasks, such as patching.

“Not only can empathy help identify patching reluctance but you can use it to find a new pathways that takes everyone’s needs and challenges into account,” said Parker, now the head of IT and security at ByteChek, in an email.

The ability to trust and assume good intentions in others can be a good barometer to gauge how you’re doing. Exhibiting and growing your empathy is no easy task. But this much is known by science: Empathy can even improve your health. And maybe that’s the best reason of all to do it.

 

 

By: Dan Kaplan (Content Marketing, Google Cloud Security)
Source: Google Cloud Blog


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Google Cloud
  • Identity
  • InfoSec
  • Security
  • Siemplify
You May Also Like
View Post
  • Engineering
  • Technology

Guide: Our top four AI Hypercomputer use cases, reference architectures and tutorials

  • March 9, 2025
View Post
  • Computing
  • Engineering

Why a decades old architecture decision is impeding the power of AI computing

  • February 19, 2025
View Post
  • Engineering
  • Software Engineering

This Month in Julia World

  • January 17, 2025
View Post
  • Engineering
  • Software Engineering

Google Summer of Code 2025 is here!

  • January 17, 2025
View Post
  • Data
  • Engineering

Hiding in Plain Site: Attackers Sneaking Malware into Images on Websites

  • January 16, 2025
View Post
  • Computing
  • Design
  • Engineering
  • Technology

Here’s why it’s important to build long-term cryptographic resilience

  • December 24, 2024
IBM and Ferrari Premium Partner
View Post
  • Data
  • Engineering

IBM Selected as Official Fan Engagement and Data Analytics Partner for Scuderia Ferrari HP

  • November 7, 2024
View Post
  • Engineering

Transforming the Developer Experience for Every Engineering Role

  • July 14, 2024

Stay Connected!
LATEST
  • college-of-cardinals-2025 1
    The Definitive Who’s Who of the 2025 Papal Conclave
    • May 7, 2025
  • conclave-poster-black-smoke 2
    The World Is Revalidating Itself
    • May 6, 2025
  • 3
    Conclave: How A New Pope Is Chosen
    • April 25, 2025
  • Getting things done makes her feel amazing 4
    Nurturing Minds in the Digital Revolution
    • April 25, 2025
  • 5
    AI is automating our jobs – but values need to change if we are to be liberated by it
    • April 17, 2025
  • 6
    Canonical Releases Ubuntu 25.04 Plucky Puffin
    • April 17, 2025
  • 7
    United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services
    • April 15, 2025
  • 8
    Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology
    • April 2, 2025
  • 9
    IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management
    • March 27, 2025
  • 10
    Tariffs, Trump, and Other Things That Start With T – They’re Not The Problem, It’s How We Use Them
    • March 25, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    IBM contributes key open-source projects to Linux Foundation to advance AI community participation
    • March 22, 2025
  • 2
    Co-op mode: New partners driving the future of gaming with AI
    • March 22, 2025
  • 3
    Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience
    • March 10, 2025
  • PiPiPi 4
    The Unexpected Pi-Fect Deals This March 14
    • March 13, 2025
  • Nintendo Switch Deals on Amazon 5
    10 Physical Nintendo Switch Game Deals on MAR10 Day!
    • March 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.