SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Oughta Audit Good
Roger G. Johnston, Ph.D., CPP
Right Brain Sekurity
https://rbsekurity.com
In my experience, auditing employees for mindless compliance with security rules, policies,
regulations, guidelines, and standards is often more wasteful Security Theater than it is an
effective security tool. But it is worse than that. When auditors strive to nitpick, “catch”, and
slam employees who are accused of not fully enacting security requirements mandated by high-
level bureaucrats with no understanding of the local conditions or culture, and when there is no
local sanity check on these requirements, security becomes the enemy of productivity and of
employees. Auditors and the bureaucratic secret police then come to be viewed as the enemy;
focus is taken away from worrying about the true adversaries.
What should good security auditing look like? In my view, employees should be asked to
demonstrate to auditors that they have good security. If employees wish to invoke the security
rules as part of that, so be it. But if employees have different/alternative/
additional ideas and practices that permit good local security, they should be encouraged to
point those out. Auditors should ask employees how they think their security could be
attacked, and how it can be made better, but also ways to make it less intrusive, cheaper, and
less of a hassle.
Auditing should not be about bashing heads, but be more about
praising employees when there is good security, and having cooperative
discussions about local security. This, however, requires auditors,
security managers, and organizational leaders who aren’t uninformed
authoritarian knuckleheads. And it requires recognizing that security is
always about the details and the local conditions, not about threating
employees or one-size-fits-all thinking.
For more information, see https://rbsekurity.com/papers-and-talks.html

Contenu connexe

Similaire à Security Audits.pdf

Cracking The Employee Background Check Code.pptx
Cracking The Employee Background Check Code.pptxCracking The Employee Background Check Code.pptx
Cracking The Employee Background Check Code.pptxWorkforce Group
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
Best Employee Screening Practices for Australian Companies
Best Employee Screening Practices for Australian CompaniesBest Employee Screening Practices for Australian Companies
Best Employee Screening Practices for Australian CompaniesAIS International Group
 
Practical Programs Of Legal Background Check - Insights
Practical Programs Of Legal Background Check - InsightsPractical Programs Of Legal Background Check - Insights
Practical Programs Of Legal Background Check - Insightsnarrowcluster2553
 
How candidate background checks can help you ensure authentic hires
How candidate background checks can help you ensure authentic hiresHow candidate background checks can help you ensure authentic hires
How candidate background checks can help you ensure authentic hiresJobTatkal
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insidersgjohansen
 
How to prep for and handle an osha inspection
How to prep for and handle an osha inspectionHow to prep for and handle an osha inspection
How to prep for and handle an osha inspectionCervelliere Limited
 
IntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docxIntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docxnormanibarber20063
 
Pros and Cons of Employee Monitoring Balancing Oversight and Privacy.pdf
Pros and Cons of Employee Monitoring Balancing Oversight and Privacy.pdfPros and Cons of Employee Monitoring Balancing Oversight and Privacy.pdf
Pros and Cons of Employee Monitoring Balancing Oversight and Privacy.pdfLivetecs LLC
 
Speedy Programs Of Legal Background Check - A Back Ground
Speedy Programs Of Legal Background Check - A Back GroundSpeedy Programs Of Legal Background Check - A Back Ground
Speedy Programs Of Legal Background Check - A Back Groundwantingswamp2936
 
1. The meaning for criteria is defined as a standard of judgement.docx
1. The meaning for criteria is defined as a standard of judgement.docx1. The meaning for criteria is defined as a standard of judgement.docx
1. The meaning for criteria is defined as a standard of judgement.docxMargaritoWhitt221
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxnormanibarber20063
 
Clarifying Quick Secrets Of Legal Background Check
Clarifying Quick Secrets Of Legal Background CheckClarifying Quick Secrets Of Legal Background Check
Clarifying Quick Secrets Of Legal Background Checkerectkook4386
 
Hiring Contract Security - Common Sense and Basic Guidelines for Hiring a Sec...
Hiring Contract Security - Common Sense and Basic Guidelines for Hiring a Sec...Hiring Contract Security - Common Sense and Basic Guidelines for Hiring a Sec...
Hiring Contract Security - Common Sense and Basic Guidelines for Hiring a Sec...Tom Huskerson
 
Whistleblowing for sustainable value
Whistleblowing for sustainable value Whistleblowing for sustainable value
Whistleblowing for sustainable value leadershipmgtservice
 
Just wondering about professionalism in the Security Industry
Just wondering about professionalism in the Security IndustryJust wondering about professionalism in the Security Industry
Just wondering about professionalism in the Security IndustryPODUVATHRAVINDRANATH
 
Essential Criteria Of Legal Background Check Examined
Essential Criteria Of Legal Background Check ExaminedEssential Criteria Of Legal Background Check Examined
Essential Criteria Of Legal Background Check Examinedquickswamp4965
 

Similaire à Security Audits.pdf (20)

Cracking The Employee Background Check Code.pptx
Cracking The Employee Background Check Code.pptxCracking The Employee Background Check Code.pptx
Cracking The Employee Background Check Code.pptx
 
7 Elements of a Strong Work Ethic
7 Elements of a Strong Work Ethic7 Elements of a Strong Work Ethic
7 Elements of a Strong Work Ethic
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
Best Employee Screening Practices for Australian Companies
Best Employee Screening Practices for Australian CompaniesBest Employee Screening Practices for Australian Companies
Best Employee Screening Practices for Australian Companies
 
Practical Programs Of Legal Background Check - Insights
Practical Programs Of Legal Background Check - InsightsPractical Programs Of Legal Background Check - Insights
Practical Programs Of Legal Background Check - Insights
 
How candidate background checks can help you ensure authentic hires
How candidate background checks can help you ensure authentic hiresHow candidate background checks can help you ensure authentic hires
How candidate background checks can help you ensure authentic hires
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insiders
 
How to prep for and handle an osha inspection
How to prep for and handle an osha inspectionHow to prep for and handle an osha inspection
How to prep for and handle an osha inspection
 
IntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docxIntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docx
 
Pros and Cons of Employee Monitoring Balancing Oversight and Privacy.pdf
Pros and Cons of Employee Monitoring Balancing Oversight and Privacy.pdfPros and Cons of Employee Monitoring Balancing Oversight and Privacy.pdf
Pros and Cons of Employee Monitoring Balancing Oversight and Privacy.pdf
 
Speedy Programs Of Legal Background Check - A Back Ground
Speedy Programs Of Legal Background Check - A Back GroundSpeedy Programs Of Legal Background Check - A Back Ground
Speedy Programs Of Legal Background Check - A Back Ground
 
1. The meaning for criteria is defined as a standard of judgement.docx
1. The meaning for criteria is defined as a standard of judgement.docx1. The meaning for criteria is defined as a standard of judgement.docx
1. The meaning for criteria is defined as a standard of judgement.docx
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
 
Behaviour in org
Behaviour in org Behaviour in org
Behaviour in org
 
Clarifying Quick Secrets Of Legal Background Check
Clarifying Quick Secrets Of Legal Background CheckClarifying Quick Secrets Of Legal Background Check
Clarifying Quick Secrets Of Legal Background Check
 
Hiring Contract Security - Common Sense and Basic Guidelines for Hiring a Sec...
Hiring Contract Security - Common Sense and Basic Guidelines for Hiring a Sec...Hiring Contract Security - Common Sense and Basic Guidelines for Hiring a Sec...
Hiring Contract Security - Common Sense and Basic Guidelines for Hiring a Sec...
 
Background screening
Background screeningBackground screening
Background screening
 
Whistleblowing for sustainable value
Whistleblowing for sustainable value Whistleblowing for sustainable value
Whistleblowing for sustainable value
 
Just wondering about professionalism in the Security Industry
Just wondering about professionalism in the Security IndustryJust wondering about professionalism in the Security Industry
Just wondering about professionalism in the Security Industry
 
Essential Criteria Of Legal Background Check Examined
Essential Criteria Of Legal Background Check ExaminedEssential Criteria Of Legal Background Check Examined
Essential Criteria Of Legal Background Check Examined
 

Plus de Roger Johnston

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityRoger Johnston
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Roger Johnston
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyRoger Johnston
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link Roger Johnston
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Roger Johnston
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Roger Johnston
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020Roger Johnston
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentRoger Johnston
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability AssessmentsRoger Johnston
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Roger Johnston
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments Roger Johnston
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityRoger Johnston
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Roger Johnston
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Roger Johnston
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security DevicesRoger Johnston
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security InvestmentRoger Johnston
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Roger Johnston
 
Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Roger Johnston
 

Plus de Roger Johnston (20)

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & Security
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/Privacy
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)
 
Want seals with that?
Want seals with that?Want seals with that?
Want seals with that?
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020
 
Security Assurance
Security AssuranceSecurity Assurance
Security Assurance
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability Assessment
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability Assessments
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical Security
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
 
Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Journal of Physical Security 10(1)
Journal of Physical Security 10(1)
 

Dernier

The MEL Toolkit Launch Webinar Presentation
The MEL Toolkit Launch Webinar PresentationThe MEL Toolkit Launch Webinar Presentation
The MEL Toolkit Launch Webinar PresentationNAP Global Network
 
“Be part of the Plan” International Day For Biological Diversity 2024.
“Be part of the Plan” International Day For Biological Diversity 2024.“Be part of the Plan” International Day For Biological Diversity 2024.
“Be part of the Plan” International Day For Biological Diversity 2024.Christina Parmionova
 
Dawson City Rolling Ads for May 15 2024 Yukon
Dawson City Rolling Ads for May 15 2024 YukonDawson City Rolling Ads for May 15 2024 Yukon
Dawson City Rolling Ads for May 15 2024 Yukonpmenzies
 
Rocky Mount | Wilson | Greenville Regional Transit Plan Executive Summary
Rocky Mount | Wilson | Greenville Regional Transit Plan Executive SummaryRocky Mount | Wilson | Greenville Regional Transit Plan Executive Summary
Rocky Mount | Wilson | Greenville Regional Transit Plan Executive SummaryRobert Hiett
 
Happy International Day of light - SPIE.
Happy International Day of light - SPIE.Happy International Day of light - SPIE.
Happy International Day of light - SPIE.Christina Parmionova
 
2024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 342024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 34JSchaus & Associates
 
EDI Executive Education Master Class- 15thMay 2024 (updated) (2)
EDI Executive Education Master Class- 15thMay 2024 (updated) (2)EDI Executive Education Master Class- 15thMay 2024 (updated) (2)
EDI Executive Education Master Class- 15thMay 2024 (updated) (2)Energy for One World
 
Program Kickoff- Cohort......_4 (1).pptx
Program Kickoff- Cohort......_4 (1).pptxProgram Kickoff- Cohort......_4 (1).pptx
Program Kickoff- Cohort......_4 (1).pptxScottMeyers35
 
Building a better Britain: How cities like Bradford can help to end economic ...
Building a better Britain: How cities like Bradford can help to end economic ...Building a better Britain: How cities like Bradford can help to end economic ...
Building a better Britain: How cities like Bradford can help to end economic ...ResolutionFoundation
 
Inflation scarring: How has the cost-of-living crisis changed Britain?
Inflation scarring: How has the cost-of-living crisis changed Britain?Inflation scarring: How has the cost-of-living crisis changed Britain?
Inflation scarring: How has the cost-of-living crisis changed Britain?ResolutionFoundation
 
Ghana High Commission on list of diplomats including US & China who owe £143m...
Ghana High Commission on list of diplomats including US & China who owe £143m...Ghana High Commission on list of diplomats including US & China who owe £143m...
Ghana High Commission on list of diplomats including US & China who owe £143m...Kweku Zurek
 
WhenWomenTakeControl.pdf Yale Historical Review
WhenWomenTakeControl.pdf Yale Historical ReviewWhenWomenTakeControl.pdf Yale Historical Review
WhenWomenTakeControl.pdf Yale Historical Reviewyalehistoricalreview
 
Lahore Resolution of 1940, Emergence of Bangladesh.pptx
Lahore Resolution of 1940, Emergence of Bangladesh.pptxLahore Resolution of 1940, Emergence of Bangladesh.pptx
Lahore Resolution of 1940, Emergence of Bangladesh.pptxtasfia2829
 
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...Harm Kiezebrink
 
Effective Financial Reporting - May 2024
Effective Financial Reporting - May 2024Effective Financial Reporting - May 2024
Effective Financial Reporting - May 2024FelixPerez547899
 
“Bee engaged with Youth”. World Bee Day 2024; May. 20th.
“Bee engaged with Youth”. World Bee Day 2024; May. 20th.“Bee engaged with Youth”. World Bee Day 2024; May. 20th.
“Bee engaged with Youth”. World Bee Day 2024; May. 20th.Christina Parmionova
 
30th anniversary of the International Year of Families.
30th anniversary of the International Year of Families.30th anniversary of the International Year of Families.
30th anniversary of the International Year of Families.Christina Parmionova
 

Dernier (20)

07/03/2024 Publiekdomeindag - voormiddag
07/03/2024 Publiekdomeindag - voormiddag07/03/2024 Publiekdomeindag - voormiddag
07/03/2024 Publiekdomeindag - voormiddag
 
The MEL Toolkit Launch Webinar Presentation
The MEL Toolkit Launch Webinar PresentationThe MEL Toolkit Launch Webinar Presentation
The MEL Toolkit Launch Webinar Presentation
 
“Be part of the Plan” International Day For Biological Diversity 2024.
“Be part of the Plan” International Day For Biological Diversity 2024.“Be part of the Plan” International Day For Biological Diversity 2024.
“Be part of the Plan” International Day For Biological Diversity 2024.
 
How to Save a Place: How to Fund Your Preservation Project
How to Save a Place: How to Fund Your Preservation ProjectHow to Save a Place: How to Fund Your Preservation Project
How to Save a Place: How to Fund Your Preservation Project
 
Dawson City Rolling Ads for May 15 2024 Yukon
Dawson City Rolling Ads for May 15 2024 YukonDawson City Rolling Ads for May 15 2024 Yukon
Dawson City Rolling Ads for May 15 2024 Yukon
 
Rocky Mount | Wilson | Greenville Regional Transit Plan Executive Summary
Rocky Mount | Wilson | Greenville Regional Transit Plan Executive SummaryRocky Mount | Wilson | Greenville Regional Transit Plan Executive Summary
Rocky Mount | Wilson | Greenville Regional Transit Plan Executive Summary
 
Happy International Day of light - SPIE.
Happy International Day of light - SPIE.Happy International Day of light - SPIE.
Happy International Day of light - SPIE.
 
2024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 342024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 34
 
EDI Executive Education Master Class- 15thMay 2024 (updated) (2)
EDI Executive Education Master Class- 15thMay 2024 (updated) (2)EDI Executive Education Master Class- 15thMay 2024 (updated) (2)
EDI Executive Education Master Class- 15thMay 2024 (updated) (2)
 
Program Kickoff- Cohort......_4 (1).pptx
Program Kickoff- Cohort......_4 (1).pptxProgram Kickoff- Cohort......_4 (1).pptx
Program Kickoff- Cohort......_4 (1).pptx
 
Building a better Britain: How cities like Bradford can help to end economic ...
Building a better Britain: How cities like Bradford can help to end economic ...Building a better Britain: How cities like Bradford can help to end economic ...
Building a better Britain: How cities like Bradford can help to end economic ...
 
Inflation scarring: How has the cost-of-living crisis changed Britain?
Inflation scarring: How has the cost-of-living crisis changed Britain?Inflation scarring: How has the cost-of-living crisis changed Britain?
Inflation scarring: How has the cost-of-living crisis changed Britain?
 
Ghana High Commission on list of diplomats including US & China who owe £143m...
Ghana High Commission on list of diplomats including US & China who owe £143m...Ghana High Commission on list of diplomats including US & China who owe £143m...
Ghana High Commission on list of diplomats including US & China who owe £143m...
 
WhenWomenTakeControl.pdf Yale Historical Review
WhenWomenTakeControl.pdf Yale Historical ReviewWhenWomenTakeControl.pdf Yale Historical Review
WhenWomenTakeControl.pdf Yale Historical Review
 
Lahore Resolution of 1940, Emergence of Bangladesh.pptx
Lahore Resolution of 1940, Emergence of Bangladesh.pptxLahore Resolution of 1940, Emergence of Bangladesh.pptx
Lahore Resolution of 1940, Emergence of Bangladesh.pptx
 
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...
 
Effective Financial Reporting - May 2024
Effective Financial Reporting - May 2024Effective Financial Reporting - May 2024
Effective Financial Reporting - May 2024
 
2024_End_of_Session_Report_Final_With_Vetoes.pdf
2024_End_of_Session_Report_Final_With_Vetoes.pdf2024_End_of_Session_Report_Final_With_Vetoes.pdf
2024_End_of_Session_Report_Final_With_Vetoes.pdf
 
“Bee engaged with Youth”. World Bee Day 2024; May. 20th.
“Bee engaged with Youth”. World Bee Day 2024; May. 20th.“Bee engaged with Youth”. World Bee Day 2024; May. 20th.
“Bee engaged with Youth”. World Bee Day 2024; May. 20th.
 
30th anniversary of the International Year of Families.
30th anniversary of the International Year of Families.30th anniversary of the International Year of Families.
30th anniversary of the International Year of Families.
 

Security Audits.pdf

  • 1. Oughta Audit Good Roger G. Johnston, Ph.D., CPP Right Brain Sekurity https://rbsekurity.com In my experience, auditing employees for mindless compliance with security rules, policies, regulations, guidelines, and standards is often more wasteful Security Theater than it is an effective security tool. But it is worse than that. When auditors strive to nitpick, “catch”, and slam employees who are accused of not fully enacting security requirements mandated by high- level bureaucrats with no understanding of the local conditions or culture, and when there is no local sanity check on these requirements, security becomes the enemy of productivity and of employees. Auditors and the bureaucratic secret police then come to be viewed as the enemy; focus is taken away from worrying about the true adversaries. What should good security auditing look like? In my view, employees should be asked to demonstrate to auditors that they have good security. If employees wish to invoke the security rules as part of that, so be it. But if employees have different/alternative/ additional ideas and practices that permit good local security, they should be encouraged to point those out. Auditors should ask employees how they think their security could be attacked, and how it can be made better, but also ways to make it less intrusive, cheaper, and less of a hassle. Auditing should not be about bashing heads, but be more about praising employees when there is good security, and having cooperative discussions about local security. This, however, requires auditors, security managers, and organizational leaders who aren’t uninformed authoritarian knuckleheads. And it requires recognizing that security is always about the details and the local conditions, not about threating employees or one-size-fits-all thinking. For more information, see https://rbsekurity.com/papers-and-talks.html