In 2009, security consultant and current chief technology officer of IBM Resilient Bruce Schneier wrote about the concept of security theater. “Security theater refers to security measures that make people feel more secure without doing anything to actually improve their security,” he wrote. At the time, there was a lot of fear about information security and a sense of urgency to stem the tide of cybercrime.

Since then, we have learned that fearmongering is counterproductive. Tactics such as creating ID checks and banning liquids and gels from carry-on luggage aren’t really effective. As each measure is put in place to try to protect the public, there are others created to defeat them. Often, these techniques just create more problems.

Setting the Scene

In an earlier article, however, Schneier explained that security theater can be effective under certain circumstances. On a visit to a newborn unit at a local hospital, for example, he noticed that the babies were wearing radio frequency identification (RFID) tags around their ankles. The tags triggered an alarm when a baby passed through the doors, which were equipped with sensors.

Now, the risk to infant abduction from a hospital ward is quite low — about 1 in 375,000 babies, if you average things over the past several decades — and far lower than infant deaths. But that isn’t really relevant. In this case,”RFID bracelets are a low-cost way to ensure that the parents are more relaxed when their baby was out of their sight,” he explained.

The benefits of using RFID technology — in this case, parents’ peace of mind — outweigh the relatively low cost.

Don’t Write Off Security Theater

Yes, the RFID tags are security theater, but they are necessary. “Most of the time security theater is a bad trade-off, because the costs far outweigh the benefits,” Schneier wrote. “But there are instances when a little bit of security theater makes sense.” The potential cost of a lawsuit if a baby is actually abducted, for example, could easily eclipse the cost of the RFID tag program.

The trick is to balance the need for security with its eventual implementation. This holds for IT implementations, too. Sometimes we need to consider both our feelings and the realities of enterprise security.

As Schneier put it, “Security theater is no substitute for security reality, but, used correctly, security theater can be a way of raising our feeling of security so that it more closely matches the reality of security. To write off security theater completely is to ignore the feeling of security.”

More from Risk Management

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today