{"id":109377,"date":"2020-04-15T06:00:00","date_gmt":"2020-04-15T13:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=109377"},"modified":"2020-04-21T14:14:20","modified_gmt":"2020-04-21T21:14:20","slug":"cyber-canon-black-box-thinking","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/04\/cyber-canon-black-box-thinking\/","title":{"rendered":"Book Review: \"Black Box Thinking\""},"content":{"rendered":"<p><b>Cybersecurity Canon Candidate Book Review:<\/b><span style=\"font-weight: 400;\"> \u201cBlack Box Thinking\u201d by Matthew Syed, (published September 8, 2015)<\/span><\/p>\n<p><b>Book Reviewed by:<\/b><span style=\"font-weight: 400;\"> Kaoru Hayashi, Field CSO Japan, Palo Alto Networks, Oct 25, 2019.<\/span><\/p>\n<p><b>Bottom Line: <\/b><i><span style=\"font-weight: 400;\">I don't recommend this book for the Cybersecurity Canon Hall of Fame, but if you are interested in the topic, this is a good one to read.\u00a0<\/span><\/i><\/p>\n<p><b>Review:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Mathew Syed, a British columnist and writer for \u201cThe Times\u201d newspaper, writes \u201cBlack Box Thinking\u201d about how people and organizations learn from failure. This book covers various studies of individuals and organizations, such as the aviation and medical industries, and how they overcame failure. Similar to cybersecurity, these industries experience some truly advanced attacks that cannot be prevented. However, most security incidents are caused by simple mistakes, such as misconfigurations, using weak passwords or forgetting to apply updates to fix vulnerabilities. We see these common failures or mistakes repeated all over the world. This isn't a cybersecurity book, but it can help guide those who want to build a safer and more high-performance organization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The key messages of the book are: <img loading=\"lazy\" decoding=\"async\"  class=\"size-full wp-image-109379 alignright lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/BBT-Red.png\" alt=\"Black Box Thinking by Matthew Syed\" width=\"338\" height=\"225\" \/><\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">To succeed and progress you need to learn from failure.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Appropriate systems, culture, ways of thinking and methods are necessary for learning.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Pay attention to elements of psychology and organizational culture that hinder learning.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Share what you learn with the industry.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">There are a number of key concepts and topics in \u201cBlack Box Thinking,\u201d and here are a few that are important for cybersecurity:<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><b>System and Workflow<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">A single mistake can be fatal to an aircraft, so the aviation industry tries to automatically acquire as much data as possible. If something happens, the procedure is to analyze the data, investigate the cause and take immediate action to prevent the same failure from happening again. The \"Black Box\" in the title of this book is the flight recorder on the plane. It creates the most important record for investigating the root cause of an aviation accident.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In cybersecurity, it is also important to create a cycle in which records are automatically recorded as much as possible and analyzed in the event of an error.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One interesting point Syed makes in the book is that to learn from failure, you need to consider not only the data you can get but also the data you can't collect. It\u2019s not possible to obtain and retain all necessary data for technical, economic and other reasons, but it is very important to understand the data that you have and the data that you do not have at the time of analysis.\u00a0 This helps you investigate the causes of an issue and allows you to build more effective response measures moving forward.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Mindset and Culture<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">In order to succeed, it is necessary to learn through trial and error. As such, successful people have a positive attitude toward failure because they know that they can experience meaningful evolution by facing failure directly and repeatedly trying again. Growth mindset and growth culture help us unlock the potential of individuals and organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is no complete security. Even if you achieve a certain level of security, it cannot be a permanent solution. Organizations and human behavior cannot be predicted, and what is required of security will change according to the times and circumstances. Security is an iterative process, and organizations need to institute a mindset of improving productivity and security through embracing new challenges, rather than fearing change or failure.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><b>What Prevents Learning from Failure<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Syed also explains various human factors that hinder learning from failure.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Mistakes threatening self-esteem or professionalism.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Fear of failure and perfectionism.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Hierarchical relationships that don\u2019t allow individuals to point out mistakes.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Mindset and culture of placing blame on individuals for failure.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Fundamental attribution error by the brain, which tends to think of the simplest and most intuitive story.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Since cybersecurity is part of human and organizational activity, it is easy to imagine that some of the factors listed here have caused a drop in security levels. In particular, blame and intolerance can cause serious damage. When a security incident occurs, the person who fell victim or the IT or security team is often accused of being at fault, which doesn't help at all. If the culture of immediately shaming and blaming individuals is rooted in the organization, nothing will be reported, and no one will want to join the IT or security team. As explained in this book, it is important to face failures, identify the cause, make improvements and make the organization safer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I recommend adding this book to your reading list. Information technology is evolving day by day and is now an important part of the foundation of our lives. Cybersecurity has never been more important to human life, and everyone bears part of the responsibility for following best practices to keep ourselves and our organizations safe. \u201cBlack Box Thinking\u201d does not focus on cybersecurity, but it includes many tips that can contribute to more advanced processes and safer digital lives.\u00a0<\/span><\/p>\n<p><i>We modeled the\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><i>Cybersecurity Canon<\/i><\/a><i>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/i><\/p>\n<p><i>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><i>directly participate in the process<\/i><\/a><i>. Please do so!<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The exploration of how people and organizations learn from failure in \u201cBlack Box Thinking\u201d includes lessons that apply to cybersecurity.<\/p>\n","protected":false},"author":403,"featured_media":109043,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[4270],"coauthors":[4360],"class_list":["post-109377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-cybersecurity-canon-review"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/CANON-LOGO_350x300.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/403"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=109377"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109377\/revisions"}],"predecessor-version":[{"id":109393,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109377\/revisions\/109393"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/109043"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=109377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=109377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=109377"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=109377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}