Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/4/2019
02:00 PM
John Brennan
John Brennan
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
0%
100%

An Inside Look at How CISOs Prioritize Budgets & Evaluate Vendors

In-depth interviews with four market-leading CISOs reveal how they prioritize budgets, measure ROI on security investments, and evaluate new vendors.

I sat down with Joshua Danielson (CISO at Copart), Ryan Fritts (vice president of product information and security, CISO, at ADT), Rob Geurtsen (deputy information security officer at Nike), and Sherry Ryan (vice president, CISO, at Juniper Networks) to talk about security budgets and evaluating vendor claims for solving mission-critical enterprise security problems. I heard many shared insights around their thought processes for protecting their organizations.

Building the Budget
Before a vendor meets with potential customers, they already possess security budgets with predetermined priorities. Copart's Danielson notes that the NIST framework and others help organizations establish a shared understanding of risk and set common baselines. Using these baselines, CISOs manage risk registers, set priorities, and determine risk thresholds in their environments.

Armed with a basic understanding of the budgeting process, vendors must remember that, for CISOs, technology is a means rather than an end. According to Nike's Geurtsen, "The technology is part of the decision, but not the decision. More important is a unified view of risk at that moment and how to mitigate it." When customers evaluate solutions, they generally focus on gaps in their security programs and how vendor value propositions can fill those gaps. CISOs do not say "we need AI." Rather, they say "we need to address a problem; if AI is the best way to do that, so be it." This is a subtle but important distinction.

Think about ROI
Having identified customers' view of risk, how can a vendor prove its value? Because security does not generate revenue, CISOs measure financial returns by asking the following:

  • Does a solution address prioritized areas of risk?
  • Does it provide returns by mitigating those risks?
  • Will it replace incumbent products or augment an existing cybersecurity portfolio?
  • Does this solution enable the business and streamline the corporate security program?

CISOs have increasingly prioritized these last two points as widely publicized human capital shortages in the cybersecurity industry force them to rally around solutions that mitigate operational management gaps.

Juniper's Ryan sees great value in streamlined solutions. "We're dealing with a lot of complexity already... so I'm looking for integration with other security tools with similar look and feel, and tools that easily integrate into my environment." CISOs may want vendors to help justify investing time and resources in new products by ensuring that a solution is easily deployed and tested (reducing up-front investment) and can replace legacy tools (reducing overhead and demonstrating value).

Given today's security talent deficit, CISOs must consider the cost of human capital, which vendors should keep in mind. A good starting position highlights optimizing return (risk reduction) and minimizes cost (deployment, integration, and maintenance).

Communicate Your Message
Ryan also insists that "if [vendors] do nothing else, provide clarity around the problem you're solving and how it applies to me." It sounds simple, but many pitches don't succinctly articulate a core value proposition. In the noisy security marketplace, it's easy for vendors to lose their audience. They must present a clear value proposition, differentiated from competitors chasing the same budget.

Generally, security solutions either focus on "blocking-and-tackling" to address prevalent risk, or "greenfield" solutions that speak to emerging risks. For legacy "blocking-and-tackling" functionality, vendors enjoy a significantly lighter burden of proof. Customers understand the problem, possess a level of comfort with their security postures, and want to hear how vendors provide incremental, differentiated value. In these situations, a top-down sales approach with a clear message is most likely to connect.

ADT's Fritts, however, thinks the best sales approach for cutting-edge solutions is different. "For greenfield, vendors need passionate advocates downstream in the organization communicating upwards." Ryan adds: "No one has pure greenfields anymore. Directly address where you'll fit in, optimize across environments, and don't add complexity." The category of offering will determine how vendors mold their go-to-market tactics over time, with strategic messaging and tactical sales approaches.

Focus on What's Important
When vendors finally get in the door, CISOs want pitches to get straight to the point. Fitts and Geurtsen were most impressed with presentations dispensing with filler. Fitts notes, "I could do without the headlines. Like logo slides — it's great that they're your customers, but tell me why I should be, too." Geurtsen agrees. When a vendor "skips the five slides about their investment journey, I'm impressed. … Get to the conversation about how you'll reduce or manage my problem quickly."

I often hear from our advisory board that CISOs are well aware of headline-grabbing breaches like the recent incident at Capital One, and do not require lessons on what happened. Similarly, posing questions such as "does vulnerability management matter to you?" comes off as pedantic. Every CISO cares about security. Customers want vendors to focus on how their solution can address those concerns with minimal preamble.

Get CISOs' Complete Attention
I hear two things from the Fortune 500 CISOs I interact with daily: 1) They want to see great technologies early to understand what is out there on the market, and 2) they are constantly filtering through the noise of 300+ vendor pings every day. CISOs are ready to hear great ideas if approached correctly. Vendors must start thinking like their customers and focus on mitigating risk instead of defining themselves with a technology. Before developing a "better" interface, consider what potential customers already use. When engaging, listen closely and focus on the prospect organization's specific problems. Be concise and candid in every meeting. "Do that," says Nike's Geurtsen, "and you'll have my complete attention."

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's story: "'It Takes Restraint': A Seasoned CISO's Sage Advice for New CISOs."

John Brennan, Partner at YL Ventures, specializes in seed-stage cybersecurity investing. Leveraging a deep focus on cybersecurity and his diverse background in venture capital, he takes a hands-on approach to supporting YL Ventures' portfolio companies, especially those in ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's too shy to invite me out face to face!"
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15138
PUBLISHED: 2019-09-20
The html-pdf package 2.2.0 for Node.js has an arbitrary file read vulnerability via an HTML file that uses XMLHttpRequest to access a file:/// URL.
CVE-2019-6145
PUBLISHED: 2019-09-20
Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs ...
CVE-2019-6649
PUBLISHED: 2019-09-20
F5 BIG-IP 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.6.0-11.6.4, and 11.5.1-11.5.9 and Enterprise Manager 3.1.1 may expose sensitive information and allow the system configuration to be modified when using non-default ConfigSync settings.
CVE-2019-6650
PUBLISHED: 2019-09-20
F5 BIG-IP ASM 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.6.0-11.6.4, and 11.5.1-11.5.9 may expose sensitive information and allow the system configuration to be modified when using non-default settings.
CVE-2014-10396
PUBLISHED: 2019-09-20
The epic theme through 2014-09-07 for WordPress allows arbitrary file downloads via the file parameter to includes/download.php.