CISO Manifesto, helping our Vendors be Partners – RSA 2024 Edition
Gary Hayslip
CISO @ SoftBank Investment Advisers | Board Director | Investor | Author | Hacker | Veteran | Servant Leader | Father
As Security Executives, we collaborate with many in our community, and inevitably, we discuss our frustrations with vendors. Luckily, many community professionals are discussing these issues and trying to develop a way forward. For those of you reading this article for the first time, be advised that I have been writing on this subject for several years, as the CISO and their security teams must have vendors who are partners they can trust. So, in the spirit of building partnerships and preparing for the upcoming gathering of our community at RSA, I am releasing an updated version of this article. I will highlight my frustrations with some of the current sales and marketing processes and provide recommendations for a better approach.
1. Issue: "Don't pitch your competition" — I don't care for vendors in my office talking about their company and spending all their time trash-talking their respective competitors' technologies. I understand you must compare/contrast why your solution is better, but there is a fine line between how you are better than them and being unprofessional. You have limited time to discuss why I need your product. Don’t waste our time together - stay focused on how you will help me.
2. Issue: "Our technology provides 100% of <insert adjective>" — This is a major pet peeve for me; no technology is perfect, not even GenAI – especially not GenAI. When I hear vendors say they do 100% of something, such as "We use GenAI, and we have special LLM models to prevent 100% of <insert claim>," — I lose trust in that vendor as I feel they are not truthful. Saying you are 100% to me is marketing speak; anyone who works in technology knows technology is never perfect, so how can you honestly claim to be perfect? To make a point about how important this is for me, I don't allow my security teams to say they know something is 100% or can prove something to be 100%.
3. Issue: "Don't build and sell proprietary tools."— As a CISO, I have a limited budget and resources to build and manage my security stack. I need technologies and services that can communicate with each other. I will not look at technologies written in a proprietary language that requires expensive professional services and extra add-on modules to reach their full potential. I am also wary of vendors who can't fully explain how their technology works because it's proprietary or they don’t use the most current protocols, software libraries, or integration processes.
4. Issue: “Do your research” — Before you step through the door to speak to the CISO, expect they will have researched you, read some articles about your product, and talked to several peers about your technology, your company, and you as a partner. If they are researching you, I highly recommend you do the same. You typically have 30 minutes to 1 hour to speak to them; if you have done your research, you will know if they are experienced, so come prepared.
5. Issue: “Don’t forget my compliance needs” — This may not apply to all vendors. However, for those in the GRC space, I suggest using the research you collect in #4 above and include intelligence on the CISO and their company’s business landscape. In completing this due diligence, note any compliance requirements/restrictions that pertain to the organization’s business operations, such as (PCI, HIPAA, GDPR, HITRUST, SOC2, etc.). Understanding the regulatory landscape the CISO operates in will help you see what problems or gaps your company can help them solve to protect their business.
6. Issue: “If your product requires integration, be knowledgeable about the process.” — CISOs manage many threats, projects, audits, politics, budget issues, compliance requirements, etc., daily. When we research enterprise solutions such as ZTNA or SIEM, for example, that require extensive integration, we expect you to understand the use cases for installation as my new partner.
7. Issue: “Know the problem your technology solves.”— It is really on you as a vendor to understand the technology you are selling. You should understand and know the problem it solves. You and your company aren’t just creating an application or a service; you have better technology than your competitors because it can do “x, y, and especially z.”
领英推荐
8.?Issue: “Automation, Integration, Consolidation, Platformation, it is the future.” — When the CISO meets with you about your product, be prepared for them to ask about automation, integration, or tool consolidation. As previously stated, CISOs have small teams and limited resources; we want to be as productive as possible with any new solution we add to our security portfolio.
9. Issue: “Be willing to discuss price” — vendors contact CISOs daily. We, in turn, continuously research technologies that would benefit our organization, and when we talk to you about pricing, let’s have an honest dialogue. CISOs understand that no technology has just one fixed price that never changes. They expect other costs for add-on services such as new modules, installation, or platform integration. One last note about cost: We hate having a price that fluctuates, such as the cost being based on consumed cloud storage or the amount of bandwidth used by the organization. The issue here is that the costs may jump up and down, which isn’t stable. Making the business case for a solution where the cost isn’t a set price is brutal. I am just putting that out there as we are among friends here, and I would love to correct this problem.
10. Issue: “How would the CISO measure success using your solution”? — As a vendor, your answer to this question is a crucial differentiator of why the CISO should use your technology. Be able to speak to the CISO about success metrics that show your technology provides some form of measurable value. Most CISOs and their security programs don’t generate revenue for their companies but can enhance business operations by managing risk and protecting revenue-generating services. How do you help the CISO tell that valuable story to their board?
11. Issue: “Non-Technical Vendors wishing to partner” – You are a vendor that sells services not generally under the technology umbrella CISOs purchase to manage their security program. Maybe you are a consultant of some sort, and you reach out hoping to get the chance to present the services you would like to provide to the CISO or other technology executive.
12. Issue: "Hijacking Posted Content or Social Media Posts" - You are under pressure to close deals, and you feel you just need to get the brand some visibility, so you jump into posts and spray your company's name all over the place. To me, that is seriously unprofessional and it generates the wrong visibility.
As we finish our discussion, this is in no way the complete list of issues or problems CISOs and vendors have as they strive to work together. I hope that in continuing to update and publish this list, we can find common areas to work together to better our community. I believe improved communications between CISOs and their technology partners significantly enhance our community’s ability to innovate and respond to the threats that put our respective organizations at risk. With that said, I look forward to meeting many of you soon at RSA and this August at hacker summer camp – Blackhat/DefCon. Please reach out if you have any recommendations for this list; thank you for your time, and be well.
***In addition to having the privilege of serving as a Chief Information Security Officer, I am a co-author with my partners Bill Bonney and Matt Stamper on the CISO Desk Reference Guide Volumes 1 & 2 and the Executive Primer. I have also authored The Essential Guide to Cybersecurity for SMBs and Developing your Cybersecurity Career Path. All are available in print and e-book on Amazon. To see more of what books are following in our series, please visit the CISO Desk Reference website .
Global Chief Marketing & Growth Officer, Exec BOD Member, Investor, Futurist | AI, GenAI, Identity Security, Web3 | Top 100 CMO Forbes, Top 50 Digital /CXO, Top 10 CMO | Consulting Producer Netflix | Speaker
3 周Gary, thanks for sharing! How are you doing?
Helping organizations protect and secure identities, wherever they live
6 个月Great reminders, thanks Gary.
Information Security Leader | People Leadership | Risk Management
7 个月Well written, Gary Hayslip. This is insightful for security sales folks, even independent of RSA.
Founder of Hampton North - Cyber Security Recruitment Partner
8 个月Looking forward to catching up at RSA, Gary. It's been too long.
Great article with excellent advise!