Speaker:

Hi, folks. This is the Cyberways podcast, and we

Speaker:

translate our academic knowledge about information security into stuff that you

Speaker:

can use as a security professional. We think it's a unique mission. We think you'll

Speaker:

like it. I'm Tom Stafford. Craig Van Slyke. Tom and I are your hosts on

Speaker:

your journey to knowledge. Cyberways is brought to you by the Louisiana

Speaker:

Tech College of Business's Center For Information Assurance. The center offers

Speaker:

undergraduate and graduate certificate programs in cybersecurity and

Speaker:

sponsors academic research focused on behavioral aspects of

Speaker:

cybersecurity and information privacy. Hello,

Speaker:

everybody, and welcome back in to cyber ways. This is a

Speaker:

production of the Louisiana Tech Center For Information Assurance in the College of

Speaker:

Business. It's a DHS NSA certified center of academic excellence in

Speaker:

cybersecurity, and we consider one of our jobs is to connect

Speaker:

you with the people that know what's happening in security research so you can

Speaker:

take advantage of the very best findings in the most timely manner.

Speaker:

Our our special guest today is doctor Mikko Sipinan. He is professor of

Speaker:

business, cyber security, and management at the University of Alabama's

Speaker:

Culverhouse College of Business. He holds advanced degrees,

Speaker:

several advanced degrees, in software engineering, information

Speaker:

systems, and my favorite of his group of degrees, philosophy.

Speaker:

He's a leading scholar in information systems, one of the thought leaders in our

Speaker:

behavioral information assurance workshop group. He

Speaker:

ranks amongst the top 30 worldwide for publication,

Speaker:

taking 2. He ranks among the top 40

Speaker:

worldwide based on his publications in premier journals.

Speaker:

Professor Siponen is the only Finnish IS professor who's been invited to join the

Speaker:

Finnish Academy of Science in Letters, and his expertise spans

Speaker:

cybersecurity management, IS development, and philosophical aspects of

Speaker:

information systems. He has extensive experience as a visiting professor, a

Speaker:

consultant, and a research leader internationally with his particular

Speaker:

focus on cybersecurity management. Mikko, welcome to our podcast.

Speaker:

Thank you. It's great to be here, and nice to discuss about sanctions and

Speaker:

how they work, and what kind of things you should avoid

Speaker:

if you are planning to use sanctions in your firm. So

Speaker:

what has had my attention for a number of years in the, the workshop group

Speaker:

that we all attend is, the role of sanctions and how they have

Speaker:

an effect on better cyber security. And, so

Speaker:

I I guess the question at the top of this, do sanctions work? How do

Speaker:

they work? Sanctions can work,

Speaker:

but if you don't use them carefully, they can also be worse than useless.

Speaker:

So that's why you have to be very careful when you're

Speaker:

using sanctions. And today, I will discuss

Speaker:

what we know and, you know, what kind of things you should avoid and so

Speaker:

on. So you you need to make sure that you understand what makes

Speaker:

sanctions effective and what to avoid. And,

Speaker:

luckily, many of of these questions about the effectiveness

Speaker:

of sanctions have already been answered in the in the scientific literature.

Speaker:

Actually, in cybersecurity management, sanctions have been studied over 30

Speaker:

years, especially in information systems, IS side of

Speaker:

cybersecurity security literature. Talk to us about the factors that

Speaker:

determine whether sanctions are effective or not. Yeah. There are

Speaker:

quite many. The most studied aspects are

Speaker:

what people call certainty of sanctions and the severity of

Speaker:

sanctions. So let's start with these 2 first. So the

Speaker:

certainty of sanctions means, basically, likelihood of getting

Speaker:

caught. So it means the likelihood that active

Speaker:

your activities will be detected and identified for the purpose of

Speaker:

sanction. And I will keep very soon, I will give you examples. Okay. The

Speaker:

other well known well studied aspect of sanction

Speaker:

is is the severity of punishment. It basically means

Speaker:

that if you get caught or somebody get caught, you

Speaker:

know, how harsh or big is the

Speaker:

penalty. And in the literature, these are

Speaker:

often presented in a way that the higher is the certainty

Speaker:

and severity, the less risky cyber

Speaker:

cybersecurity behavior will follow. And, of course,

Speaker:

on these two dimensions, there are few many which

Speaker:

I'll, explain later. People are talking about likelihood

Speaker:

of getting caught and and the severity of punishment. These

Speaker:

are refers to people or, in this case, users'

Speaker:

perception. For example, they they perception of

Speaker:

the likelihood of detection and and severity of punishment. So let's

Speaker:

illustrate this this with a very simple example first,

Speaker:

which is familiar to everybody, namely driving over the speed limit.

Speaker:

What the certainty of detection means, it means that

Speaker:

if you believe that there is a police radar, you know, when you drive,

Speaker:

on a highway, you are more likely to drive within the speed limit.

Speaker:

So more radar, more the more likelihood you believe there's a police radar,

Speaker:

the less you are likely you are driving over the speed limit. That's the

Speaker:

likelihood of getting caught, also known as certainty of

Speaker:

detection. The other thing is severity of the punishment.

Speaker:

It basically mean in the in the driving over the speed limit

Speaker:

example, that the higher is the the ticket fine, the less likely

Speaker:

you are you are expected drive within the speed limit. And now, I

Speaker:

mean, in that kind of cases, applying

Speaker:

sanction is quite easy and straightforward. But if

Speaker:

you apply these elements to

Speaker:

cybersecurity cases, it's a little bit

Speaker:

challenging. So let's take a phishing as an example. And let's illustrate

Speaker:

one idea only. The third time you have detect detection,

Speaker:

also known as the likelihood of getting caught. So if you're

Speaker:

a cybersecurity manager and, you know, you apply this principle,

Speaker:

You should ensure that the employees believe that if they click a phishing link or

Speaker:

share their password, the company will monitor such in

Speaker:

incidents and impose sanctions on them. So what is the problem

Speaker:

here? Well, the situation in in cybersecurity

Speaker:

and, of course, this depends case by case, but in the phishing

Speaker:

example, it's actually very different from the speeding example. Because in

Speaker:

the speeding example, people usually have

Speaker:

they know their car speed. Right? The only

Speaker:

contribution might be what is the actual speed limit on the road,

Speaker:

and then do their navigators often provide that information.

Speaker:

But if you think about the phishing victimization case, none of

Speaker:

this is true. Employees often lack the necessary

Speaker:

knowledge to separate phishing message from real one. And, you

Speaker:

know, if you impose sanctions in that case, the sanctions may backfire because

Speaker:

employees really believe how I should, you know, know these things.

Speaker:

That's why applying sanctions in cybersecurity cases is tricky.

Speaker:

And there are many other concerns. One is sanctions

Speaker:

experience. If you believe the original theory

Speaker:

developed in seventies by guy named Gibbs so he was

Speaker:

basically saying that you can use sanctions. The

Speaker:

sanctions require sanctions experience.

Speaker:

And there are 2 kind of sanction experience if you follow

Speaker:

the original idea. There are general and there are specific.

Speaker:

The specific means that employees have received

Speaker:

sanctions themselves. So they have own experience

Speaker:

of receiving sanctions. That's called specific experience.

Speaker:

The other experience is general experience. General

Speaker:

experience means that you have not received sanctions

Speaker:

yourself, but you have seen other received received sanctions. For example, you

Speaker:

may have never received a ticket for driving over the speed limit, but you

Speaker:

know it's actually happening. People are getting caught and people get

Speaker:

ticket. Okay. So so all of these conditions, if

Speaker:

you can think about the driving over the speed limit example, I

Speaker:

easily met. Be because people have either seen

Speaker:

that, you know, this actually happened. You know? People are driving over the speed limit.

Speaker:

They get caught, and they get a ticket, or they have their own

Speaker:

experience of that. Or, well, in many cases, both. But in

Speaker:

cybersecurity cases, that may not be the case.

Speaker:

For example, think about password reuse,

Speaker:

meaning you are using the same password in different accounts. Have anybody

Speaker:

ever received sanctions for password reuse when hardly anyone has

Speaker:

personal experience of receiving sanctions in, you know, many

Speaker:

cases like my example of password reuse,

Speaker:

then there's no really interference experience.

Speaker:

If we read the theory and we believe the theory, sanctions

Speaker:

would not work in that kind of cases. Because without this

Speaker:

this experience that you have own experience of receiving sanctions,

Speaker:

or you have seen that other people receive sanctions, the

Speaker:

sanctions should not work if we believe the theory.

Speaker:

There's a difference between sanctions, which somebody else is

Speaker:

imposing on you, and risk. So,

Speaker:

like, I I I've never heard of anybody being, you know, receiving a sanction

Speaker:

for reusing the password, but I've heard of people that got

Speaker:

hacked from reusing a password. So that that's a very different

Speaker:

thing. Right? Yeah. It's a different thing. And and and well, if

Speaker:

okay. If you believe the theory, here it means that

Speaker:

that you need to have sanction experience. Sanction experience does not mean that

Speaker:

somebody hacked, but somebody hacked and then

Speaker:

because of the hacking, the firm punished somebody.

Speaker:

Of course, the sanctions might be formal or might be informal. Informal

Speaker:

means that, you know, you get the warning or something. So that

Speaker:

basically the sanctions experience means. Okay? And if

Speaker:

you believe the theory, it means that you have seen that

Speaker:

employees in the firm has received sanctions

Speaker:

by the firm by not following cybersecurity

Speaker:

policies, or they have own experience, or they have seen that, you know, somebody

Speaker:

else actually received sanctions. And, again, the

Speaker:

theory is saying, if that not the case, sanctions should not work.

Speaker:

Now I'm saying, the theory is actually wrong

Speaker:

here. Because if if you look the evidence, as I

Speaker:

said, we have been studying sanctions 30 years.

Speaker:

And if you look to scientific evidence, it points out that

Speaker:

sanctions do have some effect in cybersecurity

Speaker:

cases, even there would be no sanction experience.

Speaker:

So my conclusion here is that sanctions could be more

Speaker:

effective if you have a sanction experience,

Speaker:

meaning you have received sanctions or you have seen people have received

Speaker:

sanctions by the firm for violating cybersecurity policies.

Speaker:

But if if firms are actually giving sanctions,

Speaker:

that's tricky as you know, when you

Speaker:

impose sanctions, you actually start to punish people or give warnings, the

Speaker:

sanctions may backfire. People don't like sanctions and so

Speaker:

on, and they may turn against you.

Speaker:

That's an interesting stream in the literature that I've noticed. The the articles you and

Speaker:

your your coauthors have been writing is the the possibility

Speaker:

resentment arising from the organization enforcing its

Speaker:

security mandate. I want to go back to the, the

Speaker:

the driving too fast in traffic example, because I'm going to be traveling up through

Speaker:

your part of the woods in a couple of weeks. Straight past Tuscaloosa, I

Speaker:

generally travel about 10 miles over the speed limit with a radar detector.

Speaker:

The thing in my mind is I always slow down if everybody else slows down,

Speaker:

and I always slow down if I see blue lights flashing, meaning somebody's been caught

Speaker:

in a speed trap. That leads me to ask the employees knowing

Speaker:

about, the punishable acts, knowing about what might get sanctioned,

Speaker:

that's an aspect of this too, isn't it? Their awareness of a of a security

Speaker:

protocol that might be applied against them? Yeah. So the

Speaker:

employees' knowledge should have a big role here, and especially if

Speaker:

you read the theory. So the original theory assumes that that

Speaker:

that users know already what is illegal

Speaker:

or, in in our case, cybersecurity policies and what

Speaker:

is allowed and not allowed by the cybersecurity policies. But

Speaker:

often the users may not know the policies. We have

Speaker:

run number of studies on on these things, and, you know, most

Speaker:

employees do not remember the details in cybersecurity policies. So

Speaker:

that's, of course, challenge. And there's also another issue, other

Speaker:

another knowledge issue related to how to do the right thing in

Speaker:

terms of cybersecurity because cybersecurity

Speaker:

policies may instruct let's take a pass password example

Speaker:

again. Okay? Cybersecurity policies may say, hey. Use

Speaker:

long random unique password for each account. But

Speaker:

then, you know, policy does not actually tell you how to do it, how how

Speaker:

you manage this, you know, how you remap accountless long unique passwords. And

Speaker:

they may not be training on this. Of course, this

Speaker:

issue is not specific to use of sanctions, but that kind of challenge is

Speaker:

there is in terms of employees' knowledge that they don't know the cybersecurity

Speaker:

policies. And even they know, they don't necessarily

Speaker:

know how to do the right thing because the company doesn't give them enough

Speaker:

information. Training is not adequate and so on. Of course, as I mentioned, this

Speaker:

issue is not specific to, return steering. Maybe we can explore that a

Speaker:

little bit more. As you were talking about that, I

Speaker:

started thinking about if if you're driving along the highway and you don't notice

Speaker:

that the speed limit changes, you don't necessarily

Speaker:

react to seeing that officer on the side of the road because you think you're

Speaker:

going the speed limit. Well, then if you get a ticket

Speaker:

and it turns out the speed limit sign was behind the branch of a

Speaker:

tree, you're gonna experience a lot of resentment. And

Speaker:

I think maybe or let me ask, do you think that the same sort of

Speaker:

thing is in play with cybersecurity? So we've got these

Speaker:

policies, either we haven't received training on them or the

Speaker:

policies are really complicated. We violate the policies,

Speaker:

get caught, get punished. It seems like that would lead to

Speaker:

resentment, wouldn't it? Yeah. I mean, big

Speaker:

thing here is that a very different thing if you don't

Speaker:

know the the rules. And and as I mentioned,

Speaker:

for many firms, you just give the policies. There's some generic

Speaker:

training. It means that people may not really

Speaker:

understand, you know, why they have to follow these policies. And sometimes the policies are

Speaker:

not actually good ones. You know? They are. There might be conflict between what the

Speaker:

cybersecurity policies are saying and what the firms want you to

Speaker:

do. For common example is that security guys are saying don't

Speaker:

click any, links. And then, you know, administration is

Speaker:

actually saying, just do this training and click a link. So, you know, that's a

Speaker:

con Look at this document to see what I'm writing you about. They do that

Speaker:

all the time where we were. Yeah. So there's basic con conflict that, you

Speaker:

know, cybersecurity policy is in the conflict, but you should do in the

Speaker:

work. And that's actually past cybersecurity management, not about the the

Speaker:

return as theory as such. Whether using sanctions or not,

Speaker:

it's important that the policies make sense, employees understand the

Speaker:

cybersecurity policies. And they also know how to cope, as

Speaker:

I mentioned. You know? If you start to say, hey. For every account,

Speaker:

you have 30 account. Every account use unique long

Speaker:

password, but you don't tell how to actually manage this, then, you know, you are

Speaker:

not really helping employees. And then don't and then don't use a password manager because

Speaker:

that that's, risks. I know yeah. Well, and I

Speaker:

I don't know about where you are, but we have annual training.

Speaker:

Yeah. And it's, what, Tom, 4 hours, 5

Speaker:

hours of just all kinds of training. It's a chunk of time. Yeah.

Speaker:

And the security training is buried in the middle of that,

Speaker:

and you're kind of tuned out. You know, all you wanna do is get through

Speaker:

the training. That's why I wonder if that's a reason that people

Speaker:

react poorly when they are sanctioned because they feel like

Speaker:

the training isn't very effective. It goes back to your awareness.

Speaker:

So what what about, can I can I can I quickly comment that? Sure.

Speaker:

Sure. So this is a almost like universal

Speaker:

problem. So not specific to, sanctions, of

Speaker:

course. It also have implications for sanctions because if you don't know the policies, you

Speaker:

don't know how to how how to react. But often, you know

Speaker:

and and the people who are listening to this, if if they are cybersecurity managers,

Speaker:

you know, or you are responsible for the cybersecurity, you should ask,

Speaker:

have you ever asked from the provider who is actually giving you the

Speaker:

training how effective the training is? Mhmm. So for example, if you take a vaccine,

Speaker:

you, you know, you ask, like, how effective? Is is this giving me 80% of

Speaker:

protection or 70% of protection and so on? You know, if you have a

Speaker:

cybersecurity training, you should ask the provider, give me

Speaker:

test results. How effective the training is?

Speaker:

Right. So, you know, is it actually no. If if I have an let's say,

Speaker:

anti phishing training, how effective this training

Speaker:

is against the you know, how how much is lower the

Speaker:

rate of victimization? And most providers, they have never

Speaker:

even tested. You know, while you're selling or buying

Speaker:

products with you don't know how effective they are. And if they aren't effect effective

Speaker:

are you actually wasting employees' time? Do you think that's just checking a

Speaker:

box? Yeah. You know? That that's a lot of because lot of cybersecurity

Speaker:

management, that's that's a really different topic. Lot of cybersecurity management

Speaker:

is people call it best practice, but it basically does that, you know, tick

Speaker:

box compliance that you can say to auditors that, hey. We have we have been

Speaker:

to you know, we have covered this. Right. You don't really you don't really care

Speaker:

or you don't know how to, you know, what is actually quality here. You just

Speaker:

say, hey, we did this. Next item, we did this. Right.

Speaker:

Right. Well, you said something earlier that I wanted to come back

Speaker:

and revisit, which is that employees typically don't know the full

Speaker:

totality of the information security policy of the organization, and

Speaker:

that implies that the, the information security officers need to be able to

Speaker:

communicate not only the restrictions and the prohibitions,

Speaker:

but also the sanctions associated with violating them in a more

Speaker:

in an effective and reasonable way. How can the security managers

Speaker:

get that word out in a way that will take that will be effective with

Speaker:

the other employees? In communicating sanctions, there are

Speaker:

a couple of things. First, you need to understand the firm culture

Speaker:

and the nature of the firm business. So if sanctions are not

Speaker:

self evident and depending on the firm culture and

Speaker:

existing cybersecurity education efforts, you

Speaker:

must explain why the sanctions are necessary if you want to use them

Speaker:

effectively. Also, you should think about putting

Speaker:

yourself in employee shoes. You know, say, hey. How about these sanctions?

Speaker:

Would you accept these sanctions if you would be the employee?

Speaker:

If you want to introduce sanctions, you should pilot test ideas with

Speaker:

you people. Discuss the concept and get feedback on

Speaker:

how they think about this. And, of course, you need management support.

Speaker:

And in any reason and this is really depending on

Speaker:

the country or state or even, you know, the the what kind of,

Speaker:

firm. Is it public firm or is it, like, private firm? But, you know, some

Speaker:

cases, some countries, some states, there might be strong work

Speaker:

union. And if there's a work strong union, they may actually challenge you

Speaker:

unless you are well prepared. A lot of cases in my, consulting

Speaker:

work where, you know, lot of things we introduce and then the work union came

Speaker:

and, you know, are you actually you know, what you are doing for our creative

Speaker:

employees. You have to know your firm culture well, what kind

Speaker:

of culture it is, put you on employees' shoes, pilot test

Speaker:

ideas, get management support, and so

Speaker:

on. So for our listeners who are generally managers responsible

Speaker:

for determining how to, manage security violations, how do

Speaker:

they determine the right level of sanction? In our protection motivation work that we're

Speaker:

all familiar with tends to suggest that if you have too heavy a

Speaker:

hammer, people are gonna shy away out of, perceptual screening,

Speaker:

essentially. The old fear appeals argument, don't scare them too much. How does the

Speaker:

CISA determine the right level of sanctions so they're,

Speaker:

maximally effective? 1st, I think you should under as I mentioned,

Speaker:

you should understand the firm's culture, and that's very

Speaker:

different. And here, actually, I think many

Speaker:

many scientists make a mistake. You know? If you if you let let's assume you

Speaker:

you have very liberal university and philosophy department. That's an extreme example.

Speaker:

Most employees think that sanctions would be absurd unless you you really explain

Speaker:

them carefully, and perhaps you are never able to do that. In contrast, if you

Speaker:

go to military organizations, almost everybody almost know,

Speaker:

hey. There will be sanctions. You know? It's it's a normal thing. In Northern

Speaker:

Europe or France, employees expect more autonomy, so sanctions must be

Speaker:

justified more than other countries. In turn, if you go,

Speaker:

like, US in the Middle East, sanctions are more commonly used. So, you know, you

Speaker:

need to know your firm culture. In cultures where

Speaker:

sanctions are not in firms culture with sanctions are not commonly used, then you really

Speaker:

need to justify the sanctions and especially if there are harder sanctions.

Speaker:

But as I mentioned, this is really depends on the firm's culture, so it's

Speaker:

it's very firm specific issue. But you can also compare the

Speaker:

cybersecurity sanctions with other sanctions. What kind of sanctions

Speaker:

the firm is giving other type of violations?

Speaker:

And, again, same commerce apply. Put yourself into employee shoes.

Speaker:

Pilot testing to idea ideas with few people. And, of course, you need to get

Speaker:

management support, as I mentioned, also.

Speaker:

Sounds like sanctions could backfire if they're not engineered

Speaker:

properly. How how could a a a manager avoid

Speaker:

sanctioning in a way that would have the an unintended effect?

Speaker:

Backfire basically means that you increase sanctions for

Speaker:

improving cybersecurity behavior. Perhaps cybersecurity behavior increases,

Speaker:

but then you have negative effects, kind of side

Speaker:

effects. People don't like sanctions as a result of which

Speaker:

they work work motivation may decrease. They may

Speaker:

start to hate cybersecurity, or they may start to hate

Speaker:

IT or even leave the firm. In in in case of

Speaker:

cybersecurity, one concern is also privacy.

Speaker:

It can depends on the culture and even people, what they think about privacy. Some

Speaker:

for some people, private is very important. For some people, it's not.

Speaker:

The privacy is important in cybersecurity cases because often

Speaker:

when you actively use sanctions, you have to monitor.

Speaker:

Right? And that's may involve violating employees'

Speaker:

privacy. And because of privacy concerns, people may start to

Speaker:

hate cybersecurity, hate to IT because they think that they

Speaker:

are the one and the same thing and so on. And we have studied that.

Speaker:

We have one study where short term, that was field field

Speaker:

experiments in Europe. So short term, the cybersecurity behavior

Speaker:

increased. Longer term, the sanctions were not

Speaker:

effective in cybersecurity behavior, but there was backfire effect

Speaker:

that people didn't trust the company and lot of negative

Speaker:

views regarding the company and so on. So in order to

Speaker:

avoid the backfire effect, you must

Speaker:

understand that the employees get the

Speaker:

importance of cyber stick policies and the reasons behind

Speaker:

regulating some actions by sanctions. This is depending on

Speaker:

the firm's nature. If you are military organization, this is easy. If you are in

Speaker:

a university, very hard, depending on the firm

Speaker:

culture. But the idea is that you if you use sanctions actively,

Speaker:

you need to justify them if they are not already self evident for employees. And

Speaker:

many organizations, they are not self evident for employees. And, you know, they

Speaker:

need to understand why the activities sanctioned

Speaker:

by sanctions are important to to cover and and so on. If they don't

Speaker:

understand that, if they're not accurate that they think that it's a you know, you

Speaker:

are just violating their privacy or you are just, making their work

Speaker:

more harder, then you most likely will get get the

Speaker:

backfire effect. I'm hearing a pretty

Speaker:

consistent subtext of fairness. So a lot of the things

Speaker:

that you're mentioning that can cause the sanctions to backfire would

Speaker:

be when the employees don't feel like it's fair. Yeah. You know, you're

Speaker:

violating my privacy. You know,

Speaker:

I didn't understand. You didn't communicate. They're too harsh.

Speaker:

But but I wonder if unevenness and

Speaker:

sanctions is a problem. I know at universities and and a

Speaker:

lot of other organizations, different departments or different functional

Speaker:

areas have different subcultures.

Speaker:

And so if you're talking to somebody in another department,

Speaker:

then, you know, I they get to leave early on Fridays, and, you know, nobody

Speaker:

cares when you come in. And your boss says, you better be in at

Speaker:

your desk at 8, and you better not be out that door before 5.

Speaker:

That seems like it could cause a lot of problems. Is that an issue with

Speaker:

the security sanctions as well? Well, that's an excellent question. I I

Speaker:

don't think that nobody knows the answer to that. Alright. Future

Speaker:

research. Yeah. Okay. So I think what I'm taking

Speaker:

from this is if, if the security

Speaker:

provisions they're required to follow aren't common sense, if they don't already know

Speaker:

it, It needs to be carefully explained in a in an explicit

Speaker:

manner by the manager Absolutely. In order to justify its application. So

Speaker:

it's almost as though explaining the the security policy

Speaker:

achieves a lot of what has to happen. It's that 1%,

Speaker:

those with a certain sense of psychopathy who are gonna break the rules anyway that

Speaker:

need to understand they're gonna get punished if they don't comply. You know,

Speaker:

if you think about the employees' compliance with cybersecurity policies,

Speaker:

lot of cases where almost every organization should do

Speaker:

better, and that's not necessary sanctions. Specific issue is that,

Speaker:

you know, you should make effort that the employees understand the policies and

Speaker:

why, you know, the policies are like they are. I don't know

Speaker:

that there's research into this in in the context of cybersecurity,

Speaker:

but I think there's there are some psychologists that

Speaker:

would say that the sanctions actually might

Speaker:

have a an increasing effect on violations

Speaker:

by those who are suffer from psychopathy, because that's

Speaker:

part of the thrill. You know, if you don't get caught, there's not

Speaker:

a chance of getting caught, then you don't get that thrill out of it. And

Speaker:

so I I just wonder, that might be an interesting avenue of

Speaker:

research as well. But I don't think I've read anything in

Speaker:

cybersecurity that's talked about that. No. I don't my

Speaker:

understanding is that nobody has studied this in in the cybersecurity context.

Speaker:

So I have I cannot really I

Speaker:

think the closest we get to that are the the very interesting findings in in

Speaker:

in Mikko's prior work, particularly about people wanting to

Speaker:

I don't wanna say get even with the boss for the boss being stringent, but

Speaker:

the the the whole ledger keeping, scale

Speaker:

balancing part of, deciding to act out just because you think

Speaker:

they're being too stringent. Yeah. That

Speaker:

might be. But What do you have coming in the

Speaker:

pipeline? What new ideas will are you working on to get into the literature

Speaker:

on on how to manage cybersecurity?

Speaker:

You mean sanctions or cybersecurity in general? Just

Speaker:

interested in what you're working on and how our reader our listeners might be

Speaker:

keeping their eye out for it if they're interested. Nowadays, I'm

Speaker:

also doing a lot of work on cybercrime, actually.

Speaker:

So I do understand cybercrime,

Speaker:

especially to how cybercrime happens and how to

Speaker:

how we can use communication between the offender and victim to actually

Speaker:

understand and prevent and prevent cybercrime. So that's

Speaker:

that's one thing I'm doing. It's not really on cybersecurity

Speaker:

manage management, of course, it has implications for cybersecurity management.

Speaker:

What what parallels do you see between that work

Speaker:

and and what you've done, around the sanctions within an organization?

Speaker:

Are you seeing any any commonalities across those 2 or too

Speaker:

early to tell? The cybercrime cases that we are

Speaker:

actually looking, These are cases where people

Speaker:

very careful and clever ways, victimized,

Speaker:

people and, you know, now sanctions. Well, if you don't

Speaker:

understand that you are being victimized, so how the sanctions could

Speaker:

really apply effectively. So that kind of case is I don't think the sanctions

Speaker:

help here. It's more about again, you know, we

Speaker:

need tools for ordinary people, and

Speaker:

and employees to to understand actually more cyber

Speaker:

crimes and, you know, what kind of how people may try to

Speaker:

use you in order to, get your money or or or some information

Speaker:

from the firm. So it's more about the risks and how to protect yourself?

Speaker:

Yeah. I think we're also seeing the threat actors becoming

Speaker:

vastly more sophisticated than they used to be. That may be that may be an

Speaker:

AI thing. I don't know. The the people I talk to over here where we

Speaker:

are, because we we have a a classified work workspace over by the air force

Speaker:

base, and they're the opinion that the, the national actors that are

Speaker:

trying to breach their network are using AI to do it, and only AI can

Speaker:

counter that. That's a lot of the phishing attempts I'm seeing

Speaker:

lately are vastly better than they used to be. So it's a risky environment

Speaker:

increasingly so, I think. You can use generic phishing

Speaker:

where, you know, you've sent the same message to, you know, million of

Speaker:

people and hope some of these will will be your victims,

Speaker:

and then you might be more specific or targeted

Speaker:

attacks where you actually find a lot of information

Speaker:

on the target, and then you make your attack and, you know, of

Speaker:

of course, these these targeted cases are much more successful in

Speaker:

phishing or other type of social engineering. So

Speaker:

so, Mikko, as we close out, we typically ask what your 4 or 5

Speaker:

practical recommendations would be for the security managers who'll be listening to this.

Speaker:

What are the things they can add to their list of to dos to keep

Speaker:

the company safe as they, practice the craft?

Speaker:

So first, you need to actually decide

Speaker:

how you're using active or passive use of sanctions. And and now I

Speaker:

realized I don't actually what we have discussed is basically

Speaker:

so far, is active use of sanctions. Active use of sanctions means

Speaker:

that, you know, you you monitor cases and you give sanctions to

Speaker:

employees. But there's also also passive use of sanctions.

Speaker:

So passive use of sanctions, some might prefer to these as a

Speaker:

theory of covering your ass by sanctions. So basic idea is that

Speaker:

you introduce sanctions, mainly to protect yourself or the

Speaker:

firm from the plane. With this passive approach of

Speaker:

using sanctions, you actually only use sanctions when

Speaker:

something bad happens. So you introduce sanctions,

Speaker:

but you actually will use them only if something very bad happens.

Speaker:

I call it back you know, passive use of sanctions. So So something pandemic

Speaker:

you can say, hey. We have sanctions in place. Now we can play in this

Speaker:

guy or whatever. Now if you use active use of

Speaker:

sanctions, that means that they require a justification,

Speaker:

and they may backfire. They use justification because you actively monitor

Speaker:

and keep sanctions. And, especially, to hire other sanctions,

Speaker:

the more most carefully they have to be justified. And if

Speaker:

you don't actively use sanctions, they will lose some of their effectiveness as

Speaker:

a preventive tool. You know, same I idea as in the,

Speaker:

climbing over the speed example if, you know, you are

Speaker:

removing all the police radars, people will increase climbing over the

Speaker:

speed limit. And now the use of sanctions,

Speaker:

especially I mean, active use of sanctions. If employees don't find them

Speaker:

justifiable, they tend to backfire, and you should

Speaker:

already think about that kind of scenarios.

Speaker:

And in this case, if your sanctions do not backfire, you don't justify

Speaker:

these, well, sanctions may become worse than

Speaker:

useless because the, because the side effects, such as

Speaker:

employees dislike in cybersecurity are worse than they prevent

Speaker:

the effect. These are the 4, 5 key points.

Speaker:

This has been Cyberways. It's a production of the Louisiana

Speaker:

Tech College of Business Center For Information Assurance, courtesy

Speaker:

of the Just Business grant from Dean Chris Martin.

Speaker:

This podcast is available wherever you consume podcasts,

Speaker:

and we'd be grateful if you tell your friends about it. And if you find

Speaker:

it useful to you, let us know. Let our guests know.

Speaker:

I'm I'm sure doctor Sipponen is available to talk to you if you

Speaker:

need more advice, because as he says, he does a lot of consulting in this

Speaker:

area. We hope you found this to be interesting, and we hope you

Speaker:

find the, the information to be useful in keeping your company more secure.

Speaker:

Until next time. Thank you. Thank you. Appreciate it.

Speaker:

And it is important to say that the Cyberways podcast is funded through the just

Speaker:

business grant program of Louisiana Tech College of

Speaker:

Business, and, we're grateful for that. So join us next time on

Speaker:

the Cyberways podcast, which is available on all major

Speaker:

podcast platforms. We want you to subscribe or follow or

Speaker:

whatever button your favorite podcast app has. Thank you very

Speaker:

much.