Life got much more interesting when I moved into cybersecurity security strategy and policy roles at the White House and the Department of Homeland Security. Working on things that you read about in the newspaper is super interesting but also very stressful. Eventually, I left government, working as a security consultant at PwC, and landing at Venable LLP in 2018. Based in Washington, DC, Venable is more than a law firm. It's a place with a wonderful culture that is made up of more than 850 legal, cybersecurity, and policy advisors whose unique expertise helps steer our clients through an increasingly complex world. In many ways, we make opaque systems more transparent for our clients.
As Senior Director of Information Security, I'm responsible for all information security and risk initiatives and align security with the Firm's broader IT and business goals. I think I look at security through a different lens than most people in this space and have come to a seemingly shocking conclusion: The key to any good security strategy isn't more tools-it's transparency.
I'm a big believer in data. Data is the basis of the scientific method, a process that's defined our knowledge acquisition for hundreds of years. You can't protect weak spots if you don't know where they are, and you can't form a hypothesis about problems without collecting information first. Yet that's exactly what many organizations expect security teams to do, despite the fact that we need to observe and analyze to answer questions.
Many people believe the sole responsibility of security professionals is the maintenance and protection of the systems that everyone uses daily. But I see security professionals as enablers. We have a greater goal than just protecting the business against threats. If we do security right, we make everyone else successful at their jobs, enabling the firm to excel. This point can get lost in security conversations, and maintaining that ruthless bias toward enabling people makes it easier to focus on what matters. But without seeing the data and increasing visibility into the business's threat landscape, providing that enablement and security is impossible.
That was the case when I arrived here. We used a big-name managed security service provider (MSSP), but we received alerts with little context or supporting data. Basically, the method they used to identify threats was a black box. The vendor didn't share those insights or context, nor did they explain what actions they were taking to address threats. The lack of information bothered me. It was like they wanted to keep us in the dark so they could continue selling subscription services without addressing our real security issues.
I didn't feel we were getting value from the service, so I chased the vendor for weeks, requesting a sit-down conversation and more information about how they actually operate. All I ever got was a meeting with a sales rep, who gave me a generic presentation. I came out of the interaction feeling unimportant to them, and I still didn't have the answers I wanted. Transparency clearly wasn't a priority for them, and that led to a lack of trust in their efforts and their ability to deliver on their promises. We needed to change course.
I have been in security my entire adult life, but until I arrived at Venable, I'd never been in a CISO role. Suddenly, instead of the expert advisor, I was the buyer and received nonstop propositions-I typically receive 24,000 emails a year in vendor spam. It was challenging to filter through the noise of constant solicitation.
Luckily, we had a brilliant security engineer who suggested I speak to the team at Expel. I came away from those initial conversations very impressed with their Managed Detection and Response (MDR) solution and their genuine interest in me as a potential customer. Even though I went on to compare three different vendors, Expel won out for several reasons.
The overall customer experience mattered, too. Through all the years that Expel has been our security partner and in interactions with the Expel team, they are invested in their clients and client security in a way other companies are not.
There are real benefits to using a hybrid approach versus an entirely in-house SOC or an outsourced system. My security team consists of four people, and it would be difficult, if not impossible, for us to do alone what we do with Expel. I calculate it would cost about $1 million more than our current investment to bring everything in house and get minimal 24/7 coverage-that does not include the opportunity costs for the proactive projects my analysts engage in to improve our security, which wouldn't be possible if they were focused exclusively on network monitoring and response. I'd have to spend between $100-150k in additional consulting to get what I get from my analysts.
Let's be honest: Spending every day investigating routine security alerts and suspicious emails is a sucky job, and high SOC analyst turnover costs the business. Our SOC analyst attrition would probably be higher without Expel because they would be working on less exciting things. The disruption of gapping and retraining analysts would further undermine our SOC. We attract great people, which I partly attribute to giving analysts interesting projects outside traditional SOC functions. This is all in addition to my team's improved resiliency and continuity with Expel backstopping us.
The measure of a technology's success is whether it empowers humans and gives them capabilities we wouldn't have otherwise. And the value of a successful security platform is it turns analysts into super analysts. Using a hybrid SOC model extends the reach of our team and gives us a deeper bench, and working alongside Expel gives my team a depth of knowledge that would be very hard to replicate otherwise.
We now use Expel in two ways, one broad and one narrow:
When an incident occurs, we turn to Expel Workbench to collaborate on incident resolution. The real-time information in Workbench offers visibility we didn't have before, making it easy for everyone to see progress and next steps.
Expel has processed more than 2 million alerts on our behalf. From those alerts, they identified 114 actionable items-removing the need to investigate, triage, and action those remaining 1,999,886 alerts. If the alert turns out to be a credible threat, I follow the log of actions Expel takes to close the incident. I see the proof that Expel works.
Since we've been customers, they've added integrations to existing tools and AI bots for prioritizing customer interactions. They're adding a detections tab to Workbench and continue to standardize how they surface insights across their customer base. Discussing these insights and other trends during our quarterly reviews helps us stay on the right track and ensure we're focusing on the right things.
I think about how we paid that big-name MSSP for dedicated services and support, only for the vendor to be evasive about those services. Instead of prioritizing our needs, they wanted us to bend to how they operated. The funny thing is, the collaborative relationship I wanted could have potentially surfaced insights to benefit their other customers, too.
With Expel, there is no black box. For several years after our implementation, we made a habit of looking at Expel's activity as a quality control measure. I could finally see all the actions that kept our company safe, and that visibility allowed me to rest easy. Instead of being concerned that our partner was missing critical vulnerabilities, I saw that Expel delivered on their promises, which has translated to operational excellence for our teams and our business.
The lack of empiricism in cybersecurity is shocking. When I worked in physical security, I couldn't definitively say whether a building compound would be attacked, but I could accurately assess the threat and consequences: X amount of explosives from Y distance will result in Z damage. That certainty doesn't exist in digital security because there's often an economic incentive for security companies to keep information to themselves. Instead, most security measures stem from collective opinion (some of it right, some of it not).
But collective opinion isn't good enough. We didn't design the digital realm with today's robust ecosystem of malicious actors in mind-all the more reason why the security community needs more rigorous, evidence-based analysis, greater transparency, and increased avenues for sharing data. When we take this approach and work alongside strong partners, we can collectively determine the best defense.
Transparency is a big part of a great customer experience, and it's great to have a partner with a shared commitment to that. It's only through complete visibility and committing to sharing information that we can transform how we think about-and action-cybersecurity.