This week's episode of Defense in Depth
How Vendors Should Approach CISOs
On this episode of Defense in Depth:Co-host Allan Alford and Ian Amit, CSO, Cimpress, discussed:
All CISOs are different so any advice we provide will vary from CISO to CISO. Plus, we have an entire other show, CISO/Security Vendor Relationship Podcast, dedicated to this very topic.
We acknowledge that this is tough because to be really on target you need to know what the CISO has, what their mix of products are, and how your product could work in their current security maturity and mix of security products and processes. It's all a very tall order for a security vendor.
Vendors must stop thinking of themselves as point solutions, but rather how they fit into the overall makeup of a security program. You're not coming in with a blank slate. How do you interoperate with what's existing?
There's unfortunately the trend of the people who make the contact, then initiate a meeting, and hand off to someone else. CISOs do not welcome that kind of engagement, although it may be very cost effective for security vendors to hire junior people to make those contacts and hand offs.
Lots of argument about the efficacy and the acceptance of cold calling. Those who claim they don't like it are often working at organizations that do it repeatedly to great success.
The pushy salesperson who eventually gets through after repeated attempts even when they're told no may show success, but they don't calculate all the people they've angered and the word-of-mouth negativity that has resulted from that behavior. If you push beyond a request to stop, the worse that can happen is your reputation will be destroyed.
CISOs are more receptive to market pull into your organization. That can happen through traditional marketing, content marketing, podcasts, analyst reviews, and word-of-mouth. Problem is these techniques don't leave any room for salespeople to operate.
Read more: https://cisoseries.com/defense-in-depth-how-vendors-should-approach-cisos/
Tags 🏷
#cissp #cciso #cism #isc2 #isaca #malware #cyberattack #threats #ransomware #cyberrisks #iot #itsecurity #cloud #cloudsecurity #infosecurity #securitymanagement #itriskmanagement #awarenesssecurity #top10vulnerabilities #carreira #career #darkweb #cybersecurity #cso #ciso #infosec #hacker #itriskmanagement #ciberseguranca #cibercrime #cisoseries

Comentários
Postar um comentário