Information Security maga

PING: Tim Ozmun

Crises deem information security officers be the voice of reason, even if all voices around him are cracking with panic. Take for example Tim Ozmun, information security officer for the National Oceanic & Atmospheric Administration's National Coastal Data Development Center at the Stennis Space Center (NCDDC) on Mississippi's Gulf Coast shore. The center structurally survived Hurricane Katrina's wrath (it served as a local shelter), but telecommunications and power outages kept the NCDDC offline for most of the week after Katrina made landfall. Once power and some connectivity returned, the mandate for the center was to get operational and return services to customers who use the NCDDC's data for ecological studies. Ozmun, meanwhile, made it his top priority to keep security in the forefront of management's thinking as they loosened policies in order to get up and running.

What's been your message as operations slowly return?

Ozmun: From an information security standpoint, all of our rules are in place. In an emergency, there are things you don't normally do that people start to feel is OK to do in certain circumstances. I really have to ensure that the risk is still verbalized, and make sure my superiors and data managers understand what's going on. I have to vocalize that risk.

With most of the center's development staff evacuated, how do you help restore productivity?

Ozmun: We've got a lot of folks who are geographically dislocated. We have one gentleman who relocated to family in Virginia because his house here is gone. He's a software developer and we're trying to determine ways how he could work from up there; either via RAS (remote access server) or VPN. The outcome was to load a system with what he needed, FedEx it up there to him and do a remote connection to our staging servers.

I think in a lot of cases of emergency, oftentimes security can be thought of as optional, but that's the worst time to have that frame of mind. There will always be somebody out there lurking and just waiting for that.

Have you noticed targeted attacks since the disaster?

Ozmun: We've been watching our firewall logs, and there's some script kiddie hammering away at us. I don't know if it's random or they've selectively chosen our site. We don't have classified information, but our information is part of a public trust domain. A lot of our data is used to make determinations. Billions of dollars and where they go and how it's spent is determined by the kind of information we have and how it's presented. We have a public trust that the information is accurate, available and its integrity is kept.

Especially during an emergency, you have to watch for that. A lot of the folks around us tend to get a lot more lax, 'Get the job done, it's a big project.' It's important to have the voice of the information security officer to watch out for folks. In some cases, management is willing to take more of a risk. In that case, a security officer's job doubles; you have to have more log checks and make sure your IDS is up and running, and watch for patterns you don't normally see there.

Is it more of a challenge during a disaster to express risk to management anxious to get operations running?

Ozmun: You have to be a lot more vigilant in that case. If you need to convince them a particular risk is too great, run it through the NIST formulas and bring it to them. Ask them if this the kind of risk you want to take? Have them talk to insurance companies and get a qualitative value. Sometimes the risk is OK to take in management's eyes. Security officers have to have a flexibility about us as well. If we accept the risk, then kick it into high gear on the IDS side of the house, for example. Stay alert amidst all of that chaos going on.

About the author
Michael S. Mimoso is Senior Editor of Information Security magazine.

This was first published in November 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: