<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Gulp! Is that a Naked Emperor I See?</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=253" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=253</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=253&#038;cpage=1#comment-345</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Wed, 14 Nov 2007 04:15:24 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=253#comment-345</guid>
		<description><![CDATA[@Kevin -

Spoken like a true DLP vendor ;-)

First, I should say that I happen to be a big fan of DLP solutions, not because, omigosh! the world is coming to an end, but simply because they provide concrete evidence of the nature and type of activities that are ongoing in enterprises today.

Second, this post was not about the DLP value proposition, it is about evidence-based security, with Alex&#039;s DLP example as an illustration. You not only confirmed my point in this regard, but reinforced it - I am  not surprised at all that people react strongly even without evidence of that information being used against them. They reacted strongly with all the IDS alerts to ping sweeps back in 1998, too.

It is well-documented that people over-react to risk (see Paul Slovic, et. al. and the perception of risk academic work); I am cautioning against that kind of reaction, in any/all cases that come up.

You&#039;re not really suggesting that because people are &quot;shocked&quot; and &quot;awed&quot; by your reports that it causes or even correlates to losses, are you?

Heck, Vontu would probably be in the best position to provide such quantitative analysis. Do you have it?
]]></description>
		<content:encoded><![CDATA[<p>@Kevin -</p>
<p>Spoken like a true DLP vendor <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> </p>
<p>First, I should say that I happen to be a big fan of DLP solutions, not because, omigosh! the world is coming to an end, but simply because they provide concrete evidence of the nature and type of activities that are ongoing in enterprises today.</p>
<p>Second, this post was not about the DLP value proposition, it is about evidence-based security, with Alex&#8217;s DLP example as an illustration. You not only confirmed my point in this regard, but reinforced it &#8211; I am  not surprised at all that people react strongly even without evidence of that information being used against them. They reacted strongly with all the IDS alerts to ping sweeps back in 1998, too.</p>
<p>It is well-documented that people over-react to risk (see Paul Slovic, et. al. and the perception of risk academic work); I am cautioning against that kind of reaction, in any/all cases that come up.</p>
<p>You&#8217;re not really suggesting that because people are &#8220;shocked&#8221; and &#8220;awed&#8221; by your reports that it causes or even correlates to losses, are you?</p>
<p>Heck, Vontu would probably be in the best position to provide such quantitative analysis. Do you have it?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Kevin Rowney</title>
		<link>http://spiresecurity.com/?p=253&#038;cpage=1#comment-344</link>
		<dc:creator>Kevin Rowney</dc:creator>
		<pubDate>Wed, 14 Nov 2007 00:03:08 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=253#comment-344</guid>
		<description><![CDATA[One of your quotes will amaze nearly anyone who has actually seen the live results of a DLP-style risk assessment:

&quot;it is not even clear whether these leakage events create higher risk for an enterprise that is already sharing information in huge volumes&quot;

Yes, there aren&#039;t reliable numbers yet on the conversion rate from exposure events to actual legal/financial harm, but response to the wrap-up results of DLP risk-assessments  nearly always lands somewhere between &quot;shock&quot; and &quot;awe&quot;.   Anyone in business immediately sees the potential harm that can   come from these exposure events  and, often enough, activity found by just a two-day risk assessment finds clear evidence of serious harm.

I agree its important not to try to create a sense of panic out there.  Besides, FUD marketing doesn&#039;t work anyway.  On the other hand, you are *way* out on a limb if you think the problem that DLP treats is illusory or just vendor marketing spin.





]]></description>
		<content:encoded><![CDATA[<p>One of your quotes will amaze nearly anyone who has actually seen the live results of a DLP-style risk assessment:</p>
<p>&#8220;it is not even clear whether these leakage events create higher risk for an enterprise that is already sharing information in huge volumes&#8221;</p>
<p>Yes, there aren&#8217;t reliable numbers yet on the conversion rate from exposure events to actual legal/financial harm, but response to the wrap-up results of DLP risk-assessments  nearly always lands somewhere between &#8220;shock&#8221; and &#8220;awe&#8221;.   Anyone in business immediately sees the potential harm that can   come from these exposure events  and, often enough, activity found by just a two-day risk assessment finds clear evidence of serious harm.</p>
<p>I agree its important not to try to create a sense of panic out there.  Besides, FUD marketing doesn&#8217;t work anyway.  On the other hand, you are *way* out on a limb if you think the problem that DLP treats is illusory or just vendor marketing spin.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Adam</title>
		<link>http://spiresecurity.com/?p=253&#038;cpage=1#comment-343</link>
		<dc:creator>Adam</dc:creator>
		<pubDate>Tue, 13 Nov 2007 17:12:56 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=253#comment-343</guid>
		<description><![CDATA[I forgot to include URLs.  http://www.emergentchaos.com/archives/2007/10/1530_dataloss_incidents_d.html points to this http://www.govexec.com/story_page.cfm?articleid=38348
]]></description>
		<content:encoded><![CDATA[<p>I forgot to include URLs.  <a href="http://www.emergentchaos.com/archives/2007/10/1530_dataloss_incidents_d.html" rel="nofollow">http://www.emergentchaos.com/archives/2007/10/1530_dataloss_incidents_d.html</a> points to this <a href="http://www.govexec.com/story_page.cfm?articleid=38348" rel="nofollow">http://www.govexec.com/story_page.cfm?articleid=38348</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Adam</title>
		<link>http://spiresecurity.com/?p=253&#038;cpage=1#comment-342</link>
		<dc:creator>Adam</dc:creator>
		<pubDate>Tue, 13 Nov 2007 16:54:22 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=253#comment-342</guid>
		<description><![CDATA[Pete,

If you don&#039;t subscribe to massive number of breaches, why did GAO report that CERT is hearing about roughly a breach an hour?  Is the US government different?

We move rocks, we see things.  We move more rocks, we see more things.  You seem to be saying that the next rock is going to be different.
]]></description>
		<content:encoded><![CDATA[<p>Pete,</p>
<p>If you don&#8217;t subscribe to massive number of breaches, why did GAO report that CERT is hearing about roughly a breach an hour?  Is the US government different?</p>
<p>We move rocks, we see things.  We move more rocks, we see more things.  You seem to be saying that the next rock is going to be different.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
