Threat Level: green Handler on Duty: Russell Eubanks

SANS ISC: Internet Storm Center - SANS Internet Storm Center Internet Storm Center

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

Distraction as a Service

Published: 2017-03-25
Last Updated: 2017-03-25 12:02:56 UTC
by Russell Eubanks (Version: 1)
0 comment(s)
Have you noticed that some security projects never seem to get finished? Despite the best of intentions, often times they linger, sometimes for years. I believe that distractions play a role in security projects being delayed and ultimately never being completed. If not monitored closely, nothing will get moved from the to do list to the this security project is finally done list.
For me, it has always been natural to accept every new project that needs attention. I want to be helpful and perceived as a good team player and I bet you do as well. I found that it is easier to say yes to every request for help than to say no. I suspect that "why yes I do have a minute" and "of course I can help you with that problem” sound very familiar. I have found this behavior can also carry potential for a negative reputation as an information security professional when it impacts the delivery of security projects.
While it is normal to want to help, it is not always natural to remain focused immediately after a distraction occurs. I have determined to ask the question "what is the next action I can take right now?” immediately after a distraction. I found this behavior helpful to remain both mission focused and results oriented. With some intentional discipline and focus on the impact of distractions on security projects, the impact of unplanned distractions can be minimized.
It is impossible to enumerate all of the ways distractions can impact a security project. It is very possible to more quickly recognize them when they occur and put measures in place to reduce the impact of distractions severely impacting productivity. Are distractions keeping you from closing out projects and ultimately preventing you from providing full value to your organization?
Please leave what works in the comments section below.
Russell Eubanks
0 comment(s)

If you have more information or corrections regarding our diary, please share.

Recent Diaries

Nicely Obfuscated JavaScript Sample
Mar 24th 2017
1 day ago by Xme (1 comment)

SSMA Usage
Mar 23rd 2017
3 days ago by Tom (1 comment)

"Blank Slate" malspam still pushing Cerber ransomware
Mar 22nd 2017
3 days ago by Brad (2 comments)

Malspam with password-protected Word documents
Mar 21st 2017
5 days ago by Brad (11 comments)

Searching for Base64-encoded PE Files
Mar 19th 2017
6 days ago by Xme (0 comments)

View All Diaries →

Latest Discussions

"Insecure" technical requirements for online course?
created Mar 24th 2017
1 day ago by Marko (1 reply)

CTI Summit Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker
created Mar 11th 2017
2 weeks ago by Russell (1 reply)

Critical RCE on Apache Struts2 is being actively exploited [CVE-2017-5638]
created Mar 9th 2017
2 weeks ago by Anonymous (0 replies)

abnormal DNS queries mostly from AWS
created Mar 1st 2017
3 weeks ago by Anonymous (5 replies)

The format of BGP messages with routeviews
created Feb 22nd 2017
1 month ago by samara (3 replies)

View All Forums →

Latest News

View All News →

Top Diaries

Malspam with password-protected Word documents
Mar 21st 2017
5 days ago by Brad (11 comments) DDoS Attack
Oct 21st 2016
5 months ago by Johannes (9 comments)

Microsoft Patch Tuesday Delayed
Feb 18th 2017
1 month ago by Johannes (7 comments)

How was your stay at the Hotel La Playa?
Feb 18th 2017
1 month ago by Xme (9 comments)

Critical Vulnerability in Cisco WebEx Chrome Plugin
Jan 24th 2017
1 month ago by Johannes (10 comments)