Where Does a Platform Operate Best in your Security Program?
In our last Super Cyber Friday, "Hacking Platformization: An hour of critical thinking about how stitching together data, tools, and processes is necessary for the success of your security program," we explored the operational efficiencies of adopting a cybersecurity platform, how to overcome hurdles in transitioning to a platformized approach, and strategies for mitigating the risk of vendor lock-in. Joining us for this discussion were Elad Koren , vp of product management at Palo Alto Networks , and Yabing W. , vp, CISO and CIO at Justworks .
Watch the full video here
HUGE thanks to our sponsor, Palo Alto Networks.
Subscribe to our calendar
Did you know that we have an events calendar? Visit our events page to subscribe so you can stay up to date on Super Cyber Friday and other CISO Series content.
Next Friday, January 31st, 2025, “Hacking Third-Party Risk Management Process"
Join us next Friday [01-31-25] for “Hacking Third-Party Risk Management Process: An hour of critical thinking about practical tips for reviewing risk.”?
Best quotes from our guests
"If you build the right platform, and if you have things done properly, the platform is, in a sense, sort of that product that is the connecting tissue, right? And I think that is the point where you can have both. You can enjoy both sides of this coin." - Elad Koren, Palo Alto Networks
"Being consistent and standardized gives me a better user experience… because the tools could be different looking, different navigation, and different reporting." - Yabing Wang, JustWorks
"What I’m looking for is the people—the account team, the customer success team, their willingness to be a partner with me. That’s more important than what the tool can do." - Yabing Wang, JustWorks
"I want the security organization focusing on real security things… not becoming an IT support organization, spending time on integration or supporting tools." - Yabing Wang, JustWorks
Quotes from the chat room
"Best of breed is much easier to cycle out poor performers and integrate new tools." - Duane Gran , director of information security, Converge Technology Solutions Corp.
"Use a near best-of-breed strategy to avoid lock-in while gaining flexibility." - Andrew Aken, PhD, CISSP
"Platforms should be transparent. It builds trust and reduces risks." - Charlton Swearingen , CMO, LimaCharlie
"Consider how a product or platform integrates with your existing stack before purchasing." - Brian Colt , head of IT and security, DASH Financial Technologies
"Platforms should be able to automate actions and still leave room for manual overrides." - Charlton Swearingen , CMO, LimaCharlie
Bringing common sense to cybersecurity and information technology.
1 个月I agree with Brian Colt "Consider how a product or platform integrates with your existing stack before purchasing." My perception is that most best of breed applications these days use AI. These solutions, more often than not, consider their detection mechanisms their IP. As such, these AI driven applications do not provide details surrounding the detection, or context, that explains their detections. Integrating these applications inhibit an organization's ability to leverage AI to analyze the totality of data across the cybersecurity stack.