<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Incidentally]]></title><description><![CDATA[Incidentally is for practical insights into cyber incident response. Drawing from real-life incidents and hands-on experience, each occasional issue seeks to deliver actionable advice that empowers you and your teams to manage a crisis and survive.]]></description><link>https://incidentally.mattpalmer.net</link><image><url>https://substackcdn.com/image/fetch/$s_!8bjH!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b20f02b-adea-47e4-a9e8-62759d363c4c_272x272.png</url><title>Incidentally</title><link>https://incidentally.mattpalmer.net</link></image><generator>Substack</generator><lastBuildDate>Fri, 17 Apr 2026 15:22:51 GMT</lastBuildDate><atom:link href="https://incidentally.mattpalmer.net/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Matt Palmer]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[mattpalmer@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[mattpalmer@substack.com]]></itunes:email><itunes:name><![CDATA[Matt Palmer]]></itunes:name></itunes:owner><itunes:author><![CDATA[Matt Palmer]]></itunes:author><googleplay:owner><![CDATA[mattpalmer@substack.com]]></googleplay:owner><googleplay:email><![CDATA[mattpalmer@substack.com]]></googleplay:email><googleplay:author><![CDATA[Matt Palmer]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Emperor’s New Clothes: Why Compulsory CBTs and Phishing Tests Keep Failing]]></title><description><![CDATA[What looks like assurance is often theatre. And that costs more than time &#8212; it also increases risk.]]></description><link>https://incidentally.mattpalmer.net/p/the-emperors-new-clothes-why-compulsory</link><guid isPermaLink="false">https://incidentally.mattpalmer.net/p/the-emperors-new-clothes-why-compulsory</guid><dc:creator><![CDATA[Matt Palmer]]></dc:creator><pubDate>Sun, 05 Oct 2025 17:12:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SEzU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over recent years I have irritated people immensely by insisting that most phishing training &#8211; and indeed most compulsory computer-based training (CBT) modules &#8211; are largely ineffective in reducing incidents, and are therefore a waste of time and resources.</p><p>Finally we have the information we need to challenge this, and find a better path that may actually reduce the frequency and impact of cyber incidents.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://incidentally.mattpalmer.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Incidentally! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SEzU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SEzU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!SEzU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!SEzU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!SEzU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SEzU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3603604,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://incidentally.mattpalmer.net/i/175350673?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SEzU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!SEzU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!SEzU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!SEzU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359f6767-8044-4e9e-ab82-ccc52f36978b_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The failure of compulsory training is a problem I know from personal experience.</p><p>When I rolled out a cyber CBT to 40,000 employees with just 8 questions to answer, one employee took 73 times to pass and one 86 times, such was the desire to comply whilst avoiding reading the material. The message was clear: you can force people to tick boxes, but you can&#8217;t force people to learn.</p><p>At another company, I asked a room of 100 employees who had just done training how many of them knew where to report a cyber incident. Nearly everyone raised their hand. But when I asked who was sure, all hands went down apart from two. Allowing for development and delivery costs, and assuming each employee spent half an hour on the CBT, each of those hands cost over $7,000.</p><p>Phishing testing performance had similar results, with failure rates depending largely on how hard the phish was. There was no real improvement over time, and the same proportion of people continued to click on similar retests.</p><p>There is of course a role for these on occasion. Onboarding of employees might be an example, when people are highly receptive and not distracted by day-to-day pressures. However it has been clear for some time that most time and money spent on these goes down a bottomless hole.</p><p>On the other hand, when we visited other companies and learned from their ideas, we found our own creative and fun ways to engage people. At one point our awareness campaign had a 92% engagement rate, versus a 4% corporate average. That campaign cost less than $1 per person for the same result.</p><p><strong>What I didn&#8217;t have, however, was clear empirical evidence. Now we do.</strong></p><p>In a newly released peer-reviewed study, Ho et al. (UC San Diego, 2025) studied 19,500 employees and found this training to be largely futile. Their peer-reviewed research, <em>Understanding the Efficacy of Phishing Training in Practice</em>, showed that phishing click rates did not improve over time and varied only by phish difficulty. Many participants spent less than a minute on the training, and a third didn&#8217;t open it at all. </p><p>They are not the only researchers to reach this conclusion - Rozema &amp; Davis (Purdue University, 2025) rapidly followed up, reaching very similar conclusions.</p><p>Some defenders of CBTs argue they serve a purpose &#8212; especially during onboarding, when staff are more receptive. Others point to regulatory obligations or legal defensibility: it&#8217;s easier to prove a policy was taught than a behaviour was learned. Even flawed training, they argue, is better than none.</p><p>But these arguments don&#8217;t hold up to scrutiny. If the goal is learning, not just liability shielding, the outcomes matter. And here the outcomes are dire: low retention, high cost, and little evidence of impact.</p><p>As organisations need to show compliance, they then improvise to counter employee tendencies to avoid training they know is largely futile. These attempts to drive compliance are generally designed for force, rather than facilitate, completion. Companies randomise quiz questions, move answer boxes around the screen, and lock the quiz until video content has been finished. They insert trick questions, monitor completion times, and punish people for finishing too quickly. Everyone knows it&#8217;s theatre, but no one wants to break the spell.</p><p><strong>If everyone knows it doesn&#8217;t work, why does nobody say so?</strong></p><p>Occasionally people do raise this. But quite simply, nobody has an incentive to address the problem and most have an incentive to let the status quo continue. For example:</p><ul><li><p>If you are an employee, telling your boss or HR that you are not doing the compulsory training properly will get you into trouble, and probably just result in disciplinary action or being reassigned the training again.</p></li><li><p>If you are a line manager, complaining about the cost or time spent on corporate mandated processes or activity is usually ineffectual, so managers won&#8217;t waste limited political capital on a lost cause.</p></li><li><p>If you are in Risk or Compliance, this can demonstrate everyone has had the information and the opportunity to learn what is expected, even if you know it doesn&#8217;t mean they&#8217;ve listened. You can use the fact that they should have understood to hold employees and managers accountable... which is one way of driving behaviour.</p></li><li><p>If you are in Legal and you need to show the organisation has passed on its obligations to employees, this allows you to show that the company exercised your responsibilities in a way that reaches everyone, and therefore to defend against many claims. Showing the training didn&#8217;t work is much harder than showing it was done.</p></li><li><p>If you are on a Board, or maybe a customer, CBTs and similar exercises provide simple and objective metrics to hold executive management to account and allow management to demonstrate to you that controls are in place. If it looks effective and management think it is the right thing to be doing, can you really invest precious time in unpicking this?</p></li></ul><p><strong>Why do we need to think differently?</strong></p><p>There are two good reasons to care about this.</p><p><strong>The first issue is cost.</strong> To work out how much your organisation is spending on CBTs and similar training, this is the basic calculation:</p><pre><code>Total cost of CBT = (Average fully loaded cost per employee x time spent x number of employees) + (cost of technology + costs of licensing + cost of development + cost of deployment + cost of monitoring &amp; reporting).</code></pre><p>For example, if your CBT costs &#163;10,000 to license and run, and you have 1,000 employees who cost &#163;50 per hour and each spends an hour on the CBT, your cost is &#163;70,000 - not &#163;10,000. Yet often only the software cost is measured, because that&#8217;s the only bit that&#8217;s visible in a budget.</p><p>If you then do 20 hours of CBTs per employee per year across all disciplines (which is quite normal when you consider HR, health and safety, and similar topics), you&#8217;re actually spending &#163;1 million of staff time on this stuff. Do you get &#163;1m of value? I doubt it.</p><p>At one point a function I ran was spending more than &#163;6m a year of company time requiring everyone to do a compulsory CBT. We cut it from 60 minutes to 12 minutes, because we couldn&#8217;t point to a single benefit (other than avoiding a conversation with a regulator). Yet cutting that cost didn&#8217;t change my departmental budget, and I don&#8217;t think the company really noticed because nobody else was measuring this. It&#8217;s important to make these costs visible to quantify the impact of a control.</p><p><strong>The second issue is the negative impact.</strong></p><p>CBTs irritate, annoy, and reduce employee morale. They take hours to build, maintain and deliver. Phishing tests require IT configuration to bypass the very controls you ought to be testing. CBTs require tech or management solutions so they can be accessed by everyone, even if they are on the shop floor or outdoors. The constant need for completion monitoring also teaches employees that what they will really be measured on is compliance with corporate diktats, rather than trying to make the best possible decisions they can. CBTs can actually reduce performance and increase risk: they disenfranchise, disincentivise, and disconnect.</p><p>It&#8217;s a big burden to overcome before the claimed risk reduction outweighs the costs, and yet as UC San Diego found, that claimed risk reduction is often not forthcoming at all.</p><p>Ineffective controls are not harmless. Bad controls that look like good ones can be dangerous: metrics plus mis-stated impact can result in false assurance. That false assurance is then what we pass to boards, markets and regulators. No wonder it causes trouble later when the behaviours we have tried to force out by compulsion still occur.</p><p><strong>Is there a better way?</strong></p><p>The good news is that it does not have to be this way. It is possible to reduce costs, improve efficiency, build positive staff engagement, and reduce risk from undesirable behaviours. That doesn&#8217;t have to come at the price of compliance, but it does mean understanding that some boxes are just not worth ticking. Instead, the focus should be on performance and risk.</p><p>Firstly, <strong>don&#8217;t fight employees</strong>. Systems and processes should be designed to work with employees, not against them. If you don&#8217;t want employees to click links in emails, don&#8217;t send them links in emails. Instead of telling employees off for clicking, use technology to have new links open in a secure sandbox. If you want to educate, do it with small prompts and nudges in line with work activity: did you really want to send this sensitive attachment to your personal email? Now you ask, maybe not.</p><p>Secondly, <strong>match incentives and outcomes</strong>. If your employees&#8217; incentives don&#8217;t match the desired outcomes, you will always get the wrong result. Don&#8217;t tell employees off for not doing a CBT, as that just drives fear and a tick-box culture. Instead, highlight and reward positive behaviour. For example, instead of monitoring compliance with a phishing test, monitor the rate at which real phish are reported and run a leaderboard for the best departments.</p><p>Finally, <strong>help employees</strong> <strong>have fun</strong>. The most effective awareness campaign I ran was called Harry the Hacker. Harry was a cartoon character and a shameless stereotype of a hacker, who got into all sorts of trouble including involvement with organised crime groups. A team member came up with the concept and we hired an ex-Marvel cartoonist to bring him to life. The hero was never the CISO or the CEO: it was always an employee who did the right thing. It was low tech, with a simple monthly email. He was such a hit that one day a member of staff dressed up as Harry, and sent us a photo of himself dressed as Harry with his computer open on our fake malicious website. Alongside this we cut the cyber CBT from 1 hour to 12 minutes. The results were excellent.</p><p>Eventually this was shut down by Corporate Communications who first relegated Harry from an employee email to a dusty corner of the intranet, then wanted us to make everything purple. Our engagement rate plummeted: sometimes you can&#8217;t win everything. However, my experience was that trying to engage people with the message in creative ways was more than worth the time and money. It cost more to develop than a standard CBT, but saved employees time and stress, whilst saving the company a fortune and reducing risk.</p><p>It&#8217;s true there will be a few that don&#8217;t engage - but they are also the few who would do a CBT 86 times to avoid reading the content. Sometimes we have to accept that there will always be some human risk, and whilst technology controls can help, having a CBT completion stat that denies the residual risk would hardly be beneficial.</p><p><em>Most employees want to do the right thing. All we need to do is help them.</em></p><p><strong>What then should you do with those CBT and phishing stats?</strong> </p><p>Instead of punishing the employee, use them to measure the performance of the functions that set them. Hold the commissioning team to account for the business impact. This is where cyber risk quantification techniques can be valuable, but the simple cost calculation above will usually suffice to make the point clearly.</p><p>Report the real costs of the delivery, and ask them to justify the investment with reference to real business impact. For example, by measuring voluntary engagement rates, or frequency of desired behaviours vs undesired. If the ROI on the activity is too low, treat it as you would any other under-performing activity. If your marketing didn&#8217;t work, how long would you keep doing the same thing? Not long.</p><p><strong>The emperor&#8217;s new clothes?</strong></p><p>In the cautionary folk tale The Emperor&#8217;s New Clothes, the emperor and his courtiers are told by charlatan weavers that the Emperor&#8217;s clothes are visible <em>unless you are incompetent or stupid</em>. As a result nobody says anything for fear of looking stupid, and so the emperor walks naked through the streets, to general public shock and humiliation. It is a warning not against following, but against following blindly.</p><p>We&#8217;ve all been told that these tools work, and of course relying on them does not indicate incompetence or stupidity. At one point, this was best practice. I also am not advocating dropping them without careful consideration and a clear plan. </p><p>But if we now know they don&#8217;t work well, yet we continue to do them?</p><p>One day we might find ourselves wearing that security incident a little too visibly for comfort.</p><p>There are few things more harmful to an organisation than having maintained that everything is fine, only for it to turn out after an incident that it wasn&#8217;t, and that management should have known this all along.</p><p>The knowledge is now there to show that whilst compulsory CBTs and phishing exercises are often effective at ticking boxes, they are rarely good at reducing risk - and it&#8217;s clear that they cost a fortune whilst making organisations worse places to work.</p><p>Yet this is all avoidable, if we try a better approach.</p><p><em>The risk isn&#8217;t just in what these tools fail to teach &#8212; it&#8217;s in what we&#8217;ve convinced ourselves they have already taught.</em></p><p>Let&#8217;s do better.</p><p></p><p><strong>References</strong><br>Ho, G., Mirian, A., Luo, E., Tong, K., Lee, E., Liu, L., Longhurst, C. A., Dameff, C., Savage, S. and Voelker, G. (2025). <em>Understanding the Efficacy of Phishing Training in Practice</em>. In Proceedings of IEEE Symposium on Security and Privacy. Available at: <a href="https://www.computer.org/csdl/proceedings-article/sp/2025/223600a076/21B7RjYyG9q">https://www.computer.org/csdl/proceedings-article/sp/2025/223600a076/21B7RjYyG9q</a></p><p>Rozema, A.T. and Davis, J.C. (2025) <em>Anti-Phishing Training (Still) Does Not Work: A Large-Scale Reproduction of Phishing Training Inefficacy Grounded in the NIST Phish Scale</em>. arXiv preprint. Available at: <a href="https://arxiv.org/abs/2506.19899?utm_source=chatgpt.com">https://arxiv.org/abs/2506.19899</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://incidentally.mattpalmer.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Incidentally! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Lessons from the Titanic: when you don’t respond to a crisis]]></title><description><![CDATA[When the RMS Titanic hit an iceberg on 15 April 1912, she set off flares and her wireless operator sent out a distress call. Yet the closest ship did nothing. Why?]]></description><link>https://incidentally.mattpalmer.net/p/lessons-from-the-titanic-when-you</link><guid isPermaLink="false">https://incidentally.mattpalmer.net/p/lessons-from-the-titanic-when-you</guid><dc:creator><![CDATA[Matt Palmer]]></dc:creator><pubDate>Thu, 26 Jun 2025 14:32:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WsXf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A few years ago I wrote a short article about the Titanic, and the lessons for cyber risk management. However, there&#8217;s a far more interesting part to that story.</p><p>When the <a href="https://en.wikipedia.org/wiki/Sinking_of_the_Titanic">RMS Titanic hit an iceberg</a> on 15 April 1912, she set off flares and her wireless operator sent out a distress call. The RMS Carpathia responded, but by the time she arrived, the Titanic had already sunk: only those who had already made it to the lifeboats could be saved. Some 1,500 people died.</p><p>Another ship was closer and could potentially have responded faster&#8212;perhaps even fast enough that more lives could have been saved. <strong>Yet despite seeing the flares, she did nothing.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WsXf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WsXf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WsXf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WsXf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WsXf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WsXf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg" width="1200" height="571" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:571,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:152823,&quot;alt&quot;:&quot;Photo of the steamship SS Californian&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://mattpalmer.substack.com/i/166891482?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5da06735-8ac9-424a-ab5f-124604f03037_1200x838.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Photo of the steamship SS Californian" title="Photo of the steamship SS Californian" srcset="https://substackcdn.com/image/fetch/$s_!WsXf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WsXf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WsXf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WsXf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a12b68a-8d8b-462d-a523-134d81ae27dd_1200x571.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">SS Californian. Credit: Wikimedia Commons</figcaption></figure></div><p>The <a href="https://en.wikipedia.org/wiki/SS_Californian">SS Californian</a> was a cargo vessel captained by a 34-year-old Brit, Stanley Lord. As the Titanic sank, she was close by&#8212;between 5 and 20 miles from the Titanic&#8217;s position.</p><p>However, the captain was having a nap at the time.</p><p>While Lord&#8217;s ship was nearby, it&#8217;s not clear they knew an incident had occurred. Crew members <a href="https://titanicfacts.net/californian/">saw white flares</a>, but mistook them for celebratory&#8212;perhaps not an unreasonable assumption. No wireless signals were received, as the ship&#8217;s sole wireless operator worked the day shift. </p><p>You could argue there were some control limitations (should they have had 24x7 wireless cover? Maybe. Could they have justified that cost if not required to? I doubt it). But these aren&#8217;t things the captain could have changed. It was also perfectly reasonable for Lord to get some rest. When he went to bed, it was a quiet night. I&#8217;ve slept just fine while leading a 24/7 response to a critical cyber incident&#8212;after getting it under control, of course. For a leader not to rest under such circumstances would be dangerous.</p><p>These factors meant the SS Californian didn&#8217;t become aware of the incident until receiving a wireless message in the morning&#8212;by which time it was far too late to help.</p><p>After the sinking of the Titanic, Lord&#8217;s inaction caused a scandal. Two inquiries were undertaken: a United States Senate hearing and a British Wreck Commissioner&#8217;s inquiry. Nobody was impressed. The hearings were critical, and the media unforgiving.</p><p>Despite regular sleep being a normal part of the human condition, and imperfect organisational controls being routine (as all risks have to be managed with regard to cost), the debate was quite binary with many taking sides for or against Lord. This is not unusual. You may wonder how <a href="https://www.bbc.com/news/articles/c62n0y3nepzo">Heathrow CEO Thomas Woldbye felt after sleeping through a power outage earlier this year</a>, despite having protocols in place allowing his COO to make critical decisions.</p><p>Rather than evaluating a young captain who followed sensible protocol &#8212; stopping after reaching an ice flow in the dark, then resting in the chart room before misinterpreting unclear signals &#8212; movies and media portrayed Captain Lord as an out of touch older man in his late 40s or 60s, sleeping peacefully in a comfy cabin while callously ignoring obvious cries for help.</p><p>No formal charges were brought against Captain Lord or his crew, but he spent the rest of his life fighting to clear his name.</p><p><strong>So what can we learn from Captain Lord?</strong></p><p>Not responding&#8212;or being seen not to respond&#8212;to an incident is hard to live down. Yet responding in uncertainty carries its own risks. At a minimum, the risk of overreaction. Had Lord responded decisively only to find a celebrating Titanic, would he have been the panicky captain who ruined his crew&#8217;s rest to chase after a firework? Worse, if he had attempted to sail through an ice field in the dark, he could have put his ship and crew at risk with the potential loss of even more lives. With a duty of care to consider, responding to uncertain signals is itself a risk. Indeed if reacting to every signal had been Lord&#8217;s usual behaviour, he would likely have lost the confidence of both his company and his crew.</p><p>His actions then appear reasonable, if perhaps not optimal&#8212;and that was the eventual judgement. Years later, a further analysis suggested that even if Lord had responded and got underway as promptly as could reasonably be expected, the SS Californian would simply have arrived alongside the RMS Carpathia, collecting survivors rather than saving more lives.</p><p>That may not be the whole story.</p><p>Lord did have some options. He knew the signals were present and relied on his own interpretation. Suppose instead he had woken his wireless operator and asked him to listen out? The Californian might then have heard the Titanic&#8217;s distress call. That may or may not have changed the number of lives lost&#8212;but what did he have to lose by seeking better information?</p><p>During the 2013 <a href="https://www.darkreading.com/cyberattacks-data-breaches/target-ignored-data-breach-alarms">Target data breach</a>, the company&#8217;s security team received alerts from their outsourced security operations centre (SOC) about suspicious activity. These were forwarded from the security team in Bangalore to the team in Minneapolis but were deemed not to require immediate action. That decision allowed the breach&#8212;which compromised the personal and credit card information of millions&#8212;to continue for an extended period. Inaction has a price.</p><p>In triaging signals that indicate a potential incident, then, there are <em>three options&#8212;not two</em>.</p><p><strong>First, you can treat the signals as noise and take no action.</strong> Often (usually, even), that&#8217;s right&#8212;but not always. This was Lord&#8217;s choice, and he lived to regret it.</p><p><strong>Second, you can take action immediately.</strong> Lord could have taken a heading from the flares, woken his crew, fired up the engines, and sailed full speed for the Titanic. This would have been a risk.</p><p><strong>Third, you can seek more data.</strong> This option is often forgotten amid the pressure and urgency of an incident. But it&#8217;s usually possible to seek further information, and the cost of doing so is typically lower than the cost of immediate action and more useful than inaction. As long as more information helps you make a better decision, it&#8217;s a good course of action. At worst, you understand the signals better and mount a more informed response. Lord could have woken his wireless operator. Target could have checked for further signs of compromise. And Mr Woldbye at Heathrow? His COO was on duty and made the necessary decision in his absence. Whether it was right or wrong, time may tell. But in acting quickly on the basis of the best information they could obtain, they at least maintained control of the incident.</p><p>If in doubt, then?</p><p><em>Do something.</em></p><p>And if you&#8217;re in bed, on a ship surrounded by ice in the middle of the night, when you see an unexpected light in the distance?</p><p><em>You have three options &#8212; make your decision.</em></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://incidentally.mattpalmer.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Incidentally! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Incidentally]]></title><description><![CDATA[An introduction to the debate on cyber incident response]]></description><link>https://incidentally.mattpalmer.net/p/incidentally</link><guid isPermaLink="false">https://incidentally.mattpalmer.net/p/incidentally</guid><dc:creator><![CDATA[Matt Palmer]]></dc:creator><pubDate>Tue, 10 Sep 2024 01:57:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!8bjH!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b20f02b-adea-47e4-a9e8-62759d363c4c_272x272.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://incidentally.mattpalmer.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://incidentally.mattpalmer.net/subscribe?"><span>Subscribe now</span></a></p><p><em>Incidentally</em>. The word itself sounds inadvertent; secondary. And in theory incidents are exactly that - a distraction from purpose, a painful moment in an otherwise rewarding journey.</p><p>But that&#8217;s not really true.  We take risks not for fun, but to make progress. Incidents are simply a risk materialising; their impact is not inevitable, nor their probability -but their existence is.</p><p>Risk is good. Without risk, there could have been be no tea clippers to India, and there could be no shuttles to space. With new developments come the inevitable risk of disasters, and so we - the organisations and individuals taking these risks - need to minimise the chance of this happening, but also to control the costs when they do.</p><p>Because we can do that we survive to tell the story, and so progress is made.</p><p>Progress therefore requires that risk is taken, and that incidents must always be possible, just as any progress in technology or information also depends on the possibility of serious cyber security incidents, the risk of which must be acknowledged and managed.</p><p>This issue is not so much about cyber security as about the human condition. Our fears, and our desires. That which drives us forward. Our striving for more, or better, or different.</p><p>And in so doing we take a risk, and survive the consequences, and learn.</p><p>Incidents are about survival, and about safety and security. They are about the care we take for others and our organisations, about our need for achievement, about purpose and meaning, and about seeing our world differently. In <a href="https://en.wikipedia.org/wiki/Maslow%27s_hierarchy_of_needs">Maslow&#8217;s hierarchy of needs</a>, incidents illustrate all.</p><p>So not really <em>incidental</em> at all.</p><p>Given how important it is to manage the impact of incidents, there should be more written and shared about it. But perhaps we prefer to move on to happier thoughts; after all who wants to dwell on the things we didn&#8217;t get right? However we learn little or nothing from success. We learn from when we fail, because the truth of our decisions is finally made visible to us in the cost to ourselves and others.</p><blockquote><p>&#8220;Truth is incontrovertible. Panic may resent it. Ignorance may deride it. Malice may distort it. But there it is.&#8221; <em>- Winston Churchill</em></p></blockquote><p>With misinformation and &#8216;fake news&#8217; we are increasingly lied to, the <em>malice</em> of those both at home and abroad <em>distorting</em> our understanding. The modern pace of change makes us inevitably <em>ignorant</em>, and as a result sober and balanced warnings are often met with <em>derision</em>. When all else fails us and there is no choice but to accept our situation, <em>panic</em> too often grips us and <em>distorts</em> our outlook: we freeze or under-respond, further worsening our situation to the benefit of those who would cause us harm.</p><p>But the truth remains incontrovertible, if only we can find it. Now is the time to look.</p><h3>A resource for responders, for leaders, for learners and teachers</h3><p>This exercise is not about me giving you the answers. I do not have a magical filter through which to see the signals in the noise. You may know as much as I do, or more, or less: it does not matter. You do not need or want to be lectured. My goal instead is that others find this interesting, or thought provoking, or just plain wrong. If you do, I trust you will join the conversation, share your perspective, and help all us learn together.</p><p>This occasional newsletter will be of value to those who do respond to cyber incidents, to those who may do so, and to those who hope they never will.</p><p>It will be no help at all to those who are certain it will not happen to them. If this is you, you are in the wrong place: try <a href="https://www.youtube.com/watch?v=IKqXu-5jw60">this strategy</a> instead.</p><p>There is a high probability of periodic insight in this newsletter, but there are also risks, including non-delivery and poor performance. These risks may be controlled through expertise and prioritisation, but they are not nil. Please tell me if I do not meet your expectations.</p><p>I&#8217;ve not imported subscribers from my previous newsletter, but I will email them and give them the choice.</p><h3>Who am I?</h3><p>Formerly a fortune 500 global CISO, I have served as a technology and cyber security leader for some of the world&#8217;s leading financial institutions, and had the privilege to advise both countries and corporations.</p><p>At Jersey Cyber Security Centre, my role is to lead Jersey&#8217;s cyber defence, overseeing the direction of JCSC to promote and improve cyber resilience across critical national infrastructure, businesses, communities, and citizens.</p><p>In all these roles, I have dealt with many incidents. Some successfully, and others less so. I no longer relish the next one, but I know it is coming. Perhaps it is already here.</p><p>Part of my role is to improve the way we handle cyber incidents and communicate good practice.</p><p>My goal is to do that with this newsletter too. If you read it and share it, I will be encouraged. So my time is in your hands.</p><h3>Read me, share me!</h3><p>Just as it took you time to read this, it took me time to write it. In exchange for my giving this to you for free, I ask only that if you find it useful, you forward it to a friend and suggest that they subscribe.</p><p>Regards,</p><p>Matt</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://incidentally.mattpalmer.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Incidentally! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item></channel></rss>