Incident Detection Mindset

It occurred to me today, after writing Build Visibility In, that I have a different mindset. I have an incident detection mindset. Often when I interact with the physical or digital worlds, I reflexively wonder how can I tell if this feature is trustworthy? For example, when I first received my Corporate laptop, I wondered "how can I tell if this box is owned?" When I received my Blackberry, I wondered "how can I tell when this device is owned?" In other words, if the device is compromised, it is not trustworthy. How can I tell?
The prevailing security mindset is a "defensive security mindset," where security people are taught to plan for and resist incidents. This attitude is necessary but not sufficient. We need people who plan for and resist incidents, people who can detect and respond to incidents, and people who can think offensively to assist those who work defensively.
I believe all three of these mindsets can be taught, but of the three I think the incident detection mindset is the rarest. Working to develop an incident detection mindset is one of the goals of this blog, and of posts like this one and the last.
Comments
How can you tell if your corporate laptop or Blackberry is owned? NSM is required. If you see the device communicating with hosts in the .cn, that's pretty suspicious for many organizations.
But what if your BES is owned and your Blackberry only communicates with the BES? You need visibility into the BES. You need to monitor more than just the end point, you need to monitor the infrastructure.
What if your BES has to regularly check in with RIM and RIM is owned? How can you know your company's data isn't trickling out a few bytes at a time over a period of months?
How well does this scale when you're dealing with an enterprise as large as yours?