Starbucks CISO Explains Security Outsourcing Model


The 62 full-time employees of the global cybersecurity team at Starbucks Corp. can’t do everything. The international coffee giant designates many tasks to those staffers, but also hires smaller firms to take on cybersecurity responsibilities that augment employees’ capabilities, Chief Information Security Officer Dave Estlick said.

The question of when to outsource security functions is key in the retail sector, where there is a high volume of transactions and relatively small security teams, according to research published in August by the Retail Cyber Intelligence Sharing Center and Deloitte LLP. Companies outsource cybersecurity work to overcome talent and budget constraints and to monitor their systems for possible threats, according to the report. At Starbucks, a member of the intelligence sharing center, the decision to hire a vendor rests on whether companies can provide a service that will help protect the coffee company’s brand, Mr. Estlick said.

In one case, Starbucks outsourced an important role that was beyond its expertise, according to Mr. Estlick. Starbucks for four years has relied on a cybersecurity vendor to help fend off hackers who plug lists of stolen usernames and passwords into automated tools, then use those tools on Starbucks’ website and applications to try to access customer gift card accounts. The company hired the firm in 2014 after breaches at other organizations resulted in cybercriminals selling batches of usernames and passwords on the dark web, said Mr. Estlick. Roughly 20% of those breaches included valid Starbucks credentials because customers re-used their name and password on multiple sites, he said.

“Let’s say another site loses those accounts but those accounts also work within Starbucks,” he said. “Where do you think the customer is going to see the problem manifest itself first? At Starbucks, which is often a daily routine. It’s really someone else’s issue, but it’s my brand that’s getting impacted.”

Mr. Estlick in an interview with WSJ Pro Cybersecurity explained why he assigns some cybersecurity work to his own staff, and why he hires outside firms, which he declined to name. Here are edited excerpts.

Q: How do you decide which cybersecurity tasks to outsource?

A: My mission statement at the security department is brand protection. It’s a foundational element in the decisions we make.

If it’s a commodity service, we’ll look to contract that out so I can place my resources on more critical tasks. On the other end of the spectrum, it would be something we don’t have the capability to do.

I’ll give you two examples of what we outsourced and the decision behind it. One is around threat intelligence. [On] many of the forums on the dark web, you actually have to be vetted before you’re allowed access. In many of those they will ask you to perform something that’s illegal to get in. We’re certainly not going to do that. It’s not brand appropriate. But I can contract with another entity without specific knowledge of how they have access to these forums to be able to get the benefit of that information.

The other is around bug bounties, being able to essentially crowdsource a solution and get many different individuals from different backgrounds and experience levels looking at the problem.

Q: Which cybersecurity tasks do you assign to your in-house team?

A: We do all security architecture, which is understanding the environment and the initiatives that are going on. That’s done completely in house. Identity management is done in house. Remote access management is done in house.

The others things are security engineering, application security and security operations. We did have security operations outside for several years with different providers but we realized we weren’t getting the value ... because most items were getting pushed back onto my engineering team for more analysis and review.

The mobile app is based on a distributed development model internationally. We do the development for English-speaking markets. If it needs to be localized for specialized content or … for language purposes, then the app development is distributed to international partners. However, security is not distributed.

All applications come back to my team here in the U.S. for application [penetration] testing and security code reviews. We have an application security team, which is a manager and five individuals.

They’ll do app security reviews of all the internally developed applications, whether it’s upgrades to point-of-sale or other things. We give the green light before the latest mobile app is released either to Google Play or the iTunes App Store.

They also run the response to our formalized bug bounty program. They have to validate the findings and are responsible for issuing rewards.

The amount of [code] review is dependent upon the features of the application. We have some markets where the mobile application is as simple as just a store locator that tells you where the nearest store is located. Others have … loyalty programs or include payment. Here in North America and Europe we have mobile order, so there is a lot more rigor that goes into testing that.

The focus of our testing is not the features or functions. We’re not looking to make sure the features are working as designed. We’re working to break the applications. Is there a way I can hijack sessions? Is there a possibility for data leakage? Do I have a potential issue around denial of service on the back end, or input validation issues?

Q: Which other security responsibilities do you assign to vendors?

A: Every once in awhile there’s a shift in the threat landscape where we’re seeing new approaches and different types of attacks that we planned to address in future years that need to be brought forward.

There’s a [service] we purchased [starting] in probably 2014 that’s part of the overall platform to knock down automated attacks.

We’ve identified where the potentials are for abuse on our [applications] and websites and send those to the vendor for validation. It takes milliseconds to do that.

Q: What should other companies keep in mind about their own outsourcing model?

A: First and foremost, especially for the security leader, they need to recognize they are going to be held accountable whether they’re providing a service internally or through a relationship. Risk can’t be outsourced. Your board and executive team still will hold you accountable at the end of the day.

Through that lens, you need to look at what services you’re putting out there and why that makes sense. If you put yourself in the situation of having to have a difficult conversation because a certain capability had issues or created risk, how comfortable are you standing in front of the executive team explaining why you made which decisions and why it was and is likely still the right decision for the company.

Article originally published on wsj.com





 



Top News

Sears, once the largest U.S. retailer, has filed for bankruptcy

The D&D Daily's Publicly Reported 'Retail Violent Death Report' Q3

Mexico City: 7 dead, 10 missing in collapse of Mexico mall
 

Lowe's CEO Marvin Ellison Talks Emergency Preparedness, Pledges $2M for Hurricane Michael Relief Efforts
 



 



Top ORC Cases

North Haven Man Pleads Guilty in U.S. Court to Role in Large-Scale $5.9M Fencing Operation


Worchester, MA: Man held on ID theft charges worked at store tied to $3.6M food stamp fraud

Detroit, MI: Store Owner Pleads Guilty To $2M Food Fraud

Houston, TX: Thieves smash display cases, make off with $2M in jewelry