SlideShare a Scribd company logo
1 of 2
Download to read offline
CSI
A professional selling program that empowers and
enables Cisco Resellers to engage and motivate the
C-Suite in a discussion on Security strategy and
organizational integration.
COMSTOR SECURITY INITIATIVE
Executive Threat Strategy (ETS)
An Exclusive Offering from Comstor Security Initiative
EXECUTIVE THREAT STRATEGY
Silos of Security
Point solutions create silos of security and a myriad of unintended consequences, including increased staffing,
management challenges and roadblocks to organizational visibility. Moreover, the result of security silos is the exact
opposite of what was intended when these solutions were implemented...an increase in the organization’s
vulnerability and risk posture.
The best cyber security technologies are no match for the
bad actors who are determined to infiltrate your
organization and do harm. The number, sophistication
and complexity of potential threats shows no sign of
slowing down. So, we must think differently. We must
think broader and collaboratively.
The Birth of ETS
Comstor’s Executive Threat Strategy (ETS), provides a new
perspective on security. Rather than a narrow, myopic
view of Cyber Security, ETS takes aim at the entire
organization...Enterprise Security.
Comstor’s David McNicholas, a recognized technology
industry thought leader and author of the renowned
Executive Relevance Selling program, set his sights on
Security. After months of research and investigation, Mr.
McNicholas and Comstor have launched the industry’s
first holistic strategic selling program for enterprise
security.
Cyber Security is not enough.
About The Author
Director - Strategic Business Development
DAVID MCNICHOLAS
Comstor
Recognized by CRN "Best Of Breed" as an
executive level selling pioneer and innovator, Mr.
McNicholas is passionate about helping high tech
companies strategically stand out and differentiate
by simplifying complex & confusing offerings into
compelling, valuable narratives.
Mr. McNicholas was the driving force behind
Comstor’s Executive Relevance Selling (ERS)
program, which empowers professional sales
people to get out of the business of selling
technology and into the business of selling cash
flows. ERS has been adopted and rolled out by
Cisco in 50 cities and 10 languages around the
world.
Organizations are under attack from all sides.
A multi-faceted Comstor program
designed to help resellers initiate and
grow their Cisco Security practice.
CSI
An Exclusive Offering from
COMSTOR SECURITY INITIATIVE
Practice
Training
Sales
Engineering
Operations
Marketing
Contact Kevin Pistorius:
303.222.4882
Get Started
with CSI, today!
THE RING OF SECURITY
The Ring of Security is the centerpiece of Comstor’s Executive Threat Strategy
and represents a holistic and collaborative approach to Enterprise Security.
COMSTOR SECURITY INITIATIVE (CSI)
15%
FACILITIES
15%
PROCESS
25%
PEOPLE
45%
TECH
MALWARE
FIREWALL / IPSPHYSICAL
DESIGN
BEHAVIOR
AWARENESS
EDUCATION
NETWORK
EMAIL
EMPLOYEES
DEFENSE
GUESTS PARTNERS
PROCESS
Operations across the organization must be run with a diligence to risk management, process efficiency and protection.
Vendor risk is one of the largest attack surfaces in today's environments. Organizations must develop compliance controls
and manage processes across the entire enterprise.
TECHNOLOGY
At the core of a superior security strategy is the proper technology solutions. The threat landscape today is so vast that
most businesses find themselves unable to keep up. 24x7 monitoring and management of security devices is a critical
weapon against ongoing, pervasive threats.
FACILITIES
Giving people confidence in their safety at work makes a better work environment and protects the organization’s assets.
The days of simply protecting the perimeter of your digital assets are falling away as your data is on laptops, smartphones,
tablets, thumb drives and the cloud. Organizations must have comprehensive visibility into the facilities and the assets at
risk and the technology in place to protect them.
PEOPLE
The human operating system is still the most vulnerable and yet most valuable asset in any business. Organizations must
develop training and technology strategies to protect from malicious insiders, as well as, well-intentioned mistakes that can
cause irreparable damage.

More Related Content

What's hot

CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackKevin Duffey
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesSix Degrees
 
Ensuring Full Proof Security At Xero
Ensuring Full Proof Security At XeroEnsuring Full Proof Security At Xero
Ensuring Full Proof Security At XeroCraig Walker
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEOKevin Duffey
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyTripwire
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookChris Cornillie
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesEMC
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
Nexagate corporate profile 2021
Nexagate corporate profile 2021Nexagate corporate profile 2021
Nexagate corporate profile 2021Khairil Effendy
 
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeBe Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeKevin Duffey
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides SlideTeam
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3Jorge Sebastiao
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesSlideTeam
 

What's hot (20)

CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
 
Convergence of Security Risks
Convergence of Security RisksConvergence of Security Risks
Convergence of Security Risks
 
Ensuring Full Proof Security At Xero
Ensuring Full Proof Security At XeroEnsuring Full Proof Security At Xero
Ensuring Full Proof Security At Xero
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security Literacy
 
infosec-it
infosec-itinfosec-it
infosec-it
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic Technologies
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
Nexagate corporate profile 2021
Nexagate corporate profile 2021Nexagate corporate profile 2021
Nexagate corporate profile 2021
 
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeBe Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crime
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
 
W.E.B. Security Services
W.E.B. Security ServicesW.E.B. Security Services
W.E.B. Security Services
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 

Similar to ETS_CSI_Comstor_29Apr2016

Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprisessuserd58af7
 
Four Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdfFour Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdfEnterprise Insider
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
VCISO | Virtual Chief Information Security | VCISO services - 2023
VCISO |  Virtual Chief Information Security | VCISO services - 2023VCISO |  Virtual Chief Information Security | VCISO services - 2023
VCISO | Virtual Chief Information Security | VCISO services - 2023Cyber Security Experts
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontierwilliamshakes1
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021InsightsSuccess3
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
How Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskHow Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskEtQ, Inc.
 
The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021Merry D'souza
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfCIO Look Magazine
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...Booz Allen Hamilton
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021Merry D'souza
 

Similar to ETS_CSI_Comstor_29Apr2016 (20)

Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprise
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
 
Four Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdfFour Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdf
 
The 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providersThe 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providers
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
VCISO | Virtual Chief Information Security | VCISO services - 2023
VCISO |  Virtual Chief Information Security | VCISO services - 2023VCISO |  Virtual Chief Information Security | VCISO services - 2023
VCISO | Virtual Chief Information Security | VCISO services - 2023
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontier
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
How Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskHow Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber Risk
 
The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021
 

ETS_CSI_Comstor_29Apr2016

  • 1. CSI A professional selling program that empowers and enables Cisco Resellers to engage and motivate the C-Suite in a discussion on Security strategy and organizational integration. COMSTOR SECURITY INITIATIVE Executive Threat Strategy (ETS) An Exclusive Offering from Comstor Security Initiative EXECUTIVE THREAT STRATEGY Silos of Security Point solutions create silos of security and a myriad of unintended consequences, including increased staffing, management challenges and roadblocks to organizational visibility. Moreover, the result of security silos is the exact opposite of what was intended when these solutions were implemented...an increase in the organization’s vulnerability and risk posture. The best cyber security technologies are no match for the bad actors who are determined to infiltrate your organization and do harm. The number, sophistication and complexity of potential threats shows no sign of slowing down. So, we must think differently. We must think broader and collaboratively. The Birth of ETS Comstor’s Executive Threat Strategy (ETS), provides a new perspective on security. Rather than a narrow, myopic view of Cyber Security, ETS takes aim at the entire organization...Enterprise Security. Comstor’s David McNicholas, a recognized technology industry thought leader and author of the renowned Executive Relevance Selling program, set his sights on Security. After months of research and investigation, Mr. McNicholas and Comstor have launched the industry’s first holistic strategic selling program for enterprise security. Cyber Security is not enough. About The Author Director - Strategic Business Development DAVID MCNICHOLAS Comstor Recognized by CRN "Best Of Breed" as an executive level selling pioneer and innovator, Mr. McNicholas is passionate about helping high tech companies strategically stand out and differentiate by simplifying complex & confusing offerings into compelling, valuable narratives. Mr. McNicholas was the driving force behind Comstor’s Executive Relevance Selling (ERS) program, which empowers professional sales people to get out of the business of selling technology and into the business of selling cash flows. ERS has been adopted and rolled out by Cisco in 50 cities and 10 languages around the world. Organizations are under attack from all sides.
  • 2. A multi-faceted Comstor program designed to help resellers initiate and grow their Cisco Security practice. CSI An Exclusive Offering from COMSTOR SECURITY INITIATIVE Practice Training Sales Engineering Operations Marketing Contact Kevin Pistorius: 303.222.4882 Get Started with CSI, today! THE RING OF SECURITY The Ring of Security is the centerpiece of Comstor’s Executive Threat Strategy and represents a holistic and collaborative approach to Enterprise Security. COMSTOR SECURITY INITIATIVE (CSI) 15% FACILITIES 15% PROCESS 25% PEOPLE 45% TECH MALWARE FIREWALL / IPSPHYSICAL DESIGN BEHAVIOR AWARENESS EDUCATION NETWORK EMAIL EMPLOYEES DEFENSE GUESTS PARTNERS PROCESS Operations across the organization must be run with a diligence to risk management, process efficiency and protection. Vendor risk is one of the largest attack surfaces in today's environments. Organizations must develop compliance controls and manage processes across the entire enterprise. TECHNOLOGY At the core of a superior security strategy is the proper technology solutions. The threat landscape today is so vast that most businesses find themselves unable to keep up. 24x7 monitoring and management of security devices is a critical weapon against ongoing, pervasive threats. FACILITIES Giving people confidence in their safety at work makes a better work environment and protects the organization’s assets. The days of simply protecting the perimeter of your digital assets are falling away as your data is on laptops, smartphones, tablets, thumb drives and the cloud. Organizations must have comprehensive visibility into the facilities and the assets at risk and the technology in place to protect them. PEOPLE The human operating system is still the most vulnerable and yet most valuable asset in any business. Organizations must develop training and technology strategies to protect from malicious insiders, as well as, well-intentioned mistakes that can cause irreparable damage.