In other words, it takes a lot of moxie (pun intended) to stand up to a security professional.
Rob Lewis, aka @Infosec_Tourist, made the comment yesterday:
You're right. Nobody says "we're screwed!" with as a sincere and calm demeanour asWhich I appreciate, but it's been bothering me lately that that's almost always how we discuss security.
In his preso at Security B-Sides London last year, David Rook (aka @securityninja) made a great point about application security: if we taught driving the same way we taught secure development, we'd make a whole big list of different ways you could crash the car, but never actually tell the student how to drive safely.
A good number of talks at security conferences focus on what we (or other people) are Doing Wrong. Very, very few are about how to do something right. Part of the reason for this, of course, is that practitioners are afraid to stand up in front of an audience and talk about how they're defending themselves, for fear that someone in the audience will take it as a challenge and de-cyber-pants them before they've even gotten to the Q&A session. (I've heard tell of presenters' laptops being hijacked in the middle of a presentation.) I know a lot of practitioners are doing very cool things that their management would never let them say publicly.
But when we focus too much on what people are doing wrong, there's a danger of our talks turning into pompous lectures. "We need to do something different from what we're doing today." Okay, but what, exactly?* This is why I admire those who are proposing alternative solutions, such as Moxie Marlinspike's Convergence. These folks might be right, or they might be wrong, but at least they're trying to make things better.
So, lest this turn too Gödel, Escher, Bach on us, I'll stop lecturing too, and talk about what I plan to do about it. I'm going to do more talks about what I think works in security. I've done a few before on topics such as how to bootstrap an infosec program, what multi-contextual identity and access management looks like, and how to dicker on the contract with third party providers. I won't aspire to #sexydefense; I'll leave that to the ones who show up all the time on the Top Ten Infosecsiest lists. But I'll encourage people to turn that frown upside down, and try not to bring up a problem without also proposing a solution.
Maybe this way, we can get invited to a few more non-security parties instead of having to throw them all ourselves.
*No, the answer is NOT "use our product." Thanks for playing, though.