SlideShare a Scribd company logo
1 of 18
Decision Makers
Security Solution Sales
Larry Smith : Sales Enablement And Training Director
Questions To Answer Today
 Who are the decision makers in the security solution purchase process?
 What are their roles, goals, metrics and challenges?
 What resonates with them?
Decision
Maker
Influencer
Gatekeeper
BuyerUser
Initiator
The IT Security Organization
CEO
CxO CxO CIO
CISO
Compliance Identity/AM Privacy Audit
IS
Architects
IS Operations APPSEC
Incident
Response
BUSINESS
SYSTEMS
APPDEV IT Governance
Program
Management
= Decision Influencer
= Decision Maker } Business Advocates
} Technology Advocates
Chief
Information
Officer
CIO Role:
 Leads IT strategies to enable the business and drive value
 Envisions and implements information technology to solve
business problems and empower employees and clients
 Oversees decision input on operational processes to generate
revenue streams and cut costs
 Manages the proliferation of devices and applications, while
maintaining a secure environment
CIO Goals:
 Serve as a catalyst and enabler across the executive suite
 Turn insights into competitive advantage with tangible business
benefits that fuel innovation and hedge against disruption
 Build profitability and create cost efficiencies
 Ensure proper governance oversight
 Minimize IT silos and capitalize on new business opportunities
 Manage risks and grow safely
CIO Key Metrics:
• ROI and revenue value
• IT expense as a percentage of sales and IT spend per employee
• Change success rate and percent of emergency changes
• Number of security incidents
• Percent of SLAs met and response times
• Successful system implementation
• Cost management
• Uptime
• Customer and employee satisfaction
CIO Challenges:
IT failures and crisis management
Political and business savvy to navigate the C-suite
Compliance, security and governance
IT sprawl, shadow IT and BYOD
Overburden of operational activities that inhibit the ability
to drive innovation
Retaining IT Talent
Critical Issues What Resonates…
Business Alignment
Digital Leadership
Cyber Security
Cost/Value
Security
Talent
Transformation
Innovation
Efficiency
CIO
Chief
Information
Security Officer
CISO Role:
 Drives strategies to limit security risks and protects the brand
 Balances security strategies with business’ tolerance for risk
 Defines the security policies for the business
 Implements security architecture and engineering
 Ensures compliance within regulatory requirements, industry
standards and best business practices
 Stay in front of threat vectors
 Incident response and recovery
CISO Goals:
 Minimize risk
 Protect client’s privacy
 Create an organizational culture of security
 Collaborate as a trusted business advisor
 Talking “business risk” vs. “IT security”
 Quantify the business’ risk appetite
 Identify risk issues to business assets
 Detect and correlate multi-level attacks
CISO Metrics:
 Monetize the value of protecting intangible assets
 Quantifiable identity and access management metrics
 Balanced scorecards that highlight operational inefficiencies,
improve security posture, improve employee, partner and client
service delivery and satisfaction
CISO Challenges:
 Changing threat landscape
 Balancing strategic and operational tasks
 Compliance and regulations
 Quantifying Value of Information Assets
 Range of devices and technologies to maintain
 Abundance of security data
 Attracting and retaining talent
Critical Issues What Resonates…
Compliance
IT Complexity
Evolving Threats
Efficiency
Faster Time To Value
Reducing Risk
Reducing Complexity
Innovation
CSO/CISO
It’s Not About Security.
It’s About Business Value.
Thank You
Comments: lsmith30040@gmail.com

More Related Content

What's hot

Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metricsVladimir Jirasek
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101Resolver Inc.
 
Regulatory Risk
Regulatory RiskRegulatory Risk
Regulatory Risknikatmalik
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormGoutama Bachtiar
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsResolver Inc.
 
Saahil Goel Information Security Awareness Amongst Top Management
Saahil Goel Information Security Awareness Amongst Top ManagementSaahil Goel Information Security Awareness Amongst Top Management
Saahil Goel Information Security Awareness Amongst Top ManagementSaahil Goel
 
If SharePoint is your answer, do you know what your question is?
If SharePoint is your answer, do you know what your question is?If SharePoint is your answer, do you know what your question is?
If SharePoint is your answer, do you know what your question is?John Mancini
 
Centralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and ComplianceCentralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and CompliancePECB
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
Intégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsIntégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsPECB
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementJamesMooreCo
 

What's hot (14)

Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
 
Integrated risk management
Integrated risk managementIntegrated risk management
Integrated risk management
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101
 
Regulatory Risk
Regulatory RiskRegulatory Risk
Regulatory Risk
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment Form
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
Saahil Goel Information Security Awareness Amongst Top Management
Saahil Goel Information Security Awareness Amongst Top ManagementSaahil Goel Information Security Awareness Amongst Top Management
Saahil Goel Information Security Awareness Amongst Top Management
 
Mandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINALMandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINAL
 
If SharePoint is your answer, do you know what your question is?
If SharePoint is your answer, do you know what your question is?If SharePoint is your answer, do you know what your question is?
If SharePoint is your answer, do you know what your question is?
 
Centralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and ComplianceCentralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and Compliance
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Intégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsIntégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSs
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk Management
 

Similar to 110.decision makers.cio.ciso

Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application SecurityTy Sbano
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMIvanti
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh ShanmughanathanSharath Kumar
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Navigating the Data Era: Business Analytics & Development
Navigating the Data Era: Business Analytics & DevelopmentNavigating the Data Era: Business Analytics & Development
Navigating the Data Era: Business Analytics & DevelopmentCatherine William
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdflilabroughton259
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Ajay Kumar Uppal
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...GrapesTech Solutions
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceBill Lisse
 

Similar to 110.decision makers.cio.ciso (20)

Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application Security
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Navigating the Data Era: Business Analytics & Development
Navigating the Data Era: Business Analytics & DevelopmentNavigating the Data Era: Business Analytics & Development
Navigating the Data Era: Business Analytics & Development
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
 
IT Governances
IT GovernancesIT Governances
IT Governances
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT Governance
 

Recently uploaded

Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai MooreDubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moorehf8803863
 
Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)Delhi Call girls
 
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai Sibling
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai SiblingDubai Call Girls Jumeirah O525547819 Call Girls Dubai Sibling
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai Siblingkojalkojal131
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)Delhi Call girls
 
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceDelhi Call girls
 
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...Delhi Call girls
 
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai CfnmDubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnmkojalkojal131
 
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)Delhi Call girls
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)Delhi Call girls
 
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...rajputriyana310
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)Delhi Call girls
 

Recently uploaded (20)

Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
 
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai MooreDubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
 
Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort Service
 
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)
 
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai Sibling
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai SiblingDubai Call Girls Jumeirah O525547819 Call Girls Dubai Sibling
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai Sibling
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)
 
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
 
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
 
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai CfnmDubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
 
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
 
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
 

110.decision makers.cio.ciso

  • 1. Decision Makers Security Solution Sales Larry Smith : Sales Enablement And Training Director
  • 2. Questions To Answer Today  Who are the decision makers in the security solution purchase process?  What are their roles, goals, metrics and challenges?  What resonates with them?
  • 4. The IT Security Organization CEO CxO CxO CIO CISO Compliance Identity/AM Privacy Audit IS Architects IS Operations APPSEC Incident Response BUSINESS SYSTEMS APPDEV IT Governance Program Management = Decision Influencer = Decision Maker } Business Advocates } Technology Advocates
  • 6. CIO Role:  Leads IT strategies to enable the business and drive value  Envisions and implements information technology to solve business problems and empower employees and clients  Oversees decision input on operational processes to generate revenue streams and cut costs  Manages the proliferation of devices and applications, while maintaining a secure environment
  • 7. CIO Goals:  Serve as a catalyst and enabler across the executive suite  Turn insights into competitive advantage with tangible business benefits that fuel innovation and hedge against disruption  Build profitability and create cost efficiencies  Ensure proper governance oversight  Minimize IT silos and capitalize on new business opportunities  Manage risks and grow safely
  • 8. CIO Key Metrics: • ROI and revenue value • IT expense as a percentage of sales and IT spend per employee • Change success rate and percent of emergency changes • Number of security incidents • Percent of SLAs met and response times • Successful system implementation • Cost management • Uptime • Customer and employee satisfaction
  • 9. CIO Challenges: IT failures and crisis management Political and business savvy to navigate the C-suite Compliance, security and governance IT sprawl, shadow IT and BYOD Overburden of operational activities that inhibit the ability to drive innovation Retaining IT Talent
  • 10. Critical Issues What Resonates… Business Alignment Digital Leadership Cyber Security Cost/Value Security Talent Transformation Innovation Efficiency CIO
  • 12. CISO Role:  Drives strategies to limit security risks and protects the brand  Balances security strategies with business’ tolerance for risk  Defines the security policies for the business  Implements security architecture and engineering  Ensures compliance within regulatory requirements, industry standards and best business practices  Stay in front of threat vectors  Incident response and recovery
  • 13. CISO Goals:  Minimize risk  Protect client’s privacy  Create an organizational culture of security  Collaborate as a trusted business advisor  Talking “business risk” vs. “IT security”  Quantify the business’ risk appetite  Identify risk issues to business assets  Detect and correlate multi-level attacks
  • 14. CISO Metrics:  Monetize the value of protecting intangible assets  Quantifiable identity and access management metrics  Balanced scorecards that highlight operational inefficiencies, improve security posture, improve employee, partner and client service delivery and satisfaction
  • 15. CISO Challenges:  Changing threat landscape  Balancing strategic and operational tasks  Compliance and regulations  Quantifying Value of Information Assets  Range of devices and technologies to maintain  Abundance of security data  Attracting and retaining talent
  • 16. Critical Issues What Resonates… Compliance IT Complexity Evolving Threats Efficiency Faster Time To Value Reducing Risk Reducing Complexity Innovation CSO/CISO
  • 17. It’s Not About Security. It’s About Business Value.

Editor's Notes

  1. Because these are key players in the buying process, we need to understand their challenges and their perspective on the needs of the business.
  2. While there are no rules as to how an organization should be structured, there are general guidelines as to how responsibilities roll out through any organization. This presentation is more about responsibilities than titles as often one individual has multiple areas of responsibility. For this presentation we’re going to highlight the decision makers. While your conversations may not begin with the decision makers you do need to understand their challenges and how they see the world. The decision makers are the business advocates, guided by operational impact, cost of ownership, and budgets. They are responsible to the line of business to provide leadership and sound judgement. Generally the decision maker owns the budget for IT spending and will require a solid business case that supports their goals and initiatives. The decision influencers tend to be technology advocates guided by impact on existing processes and systems.
  3. Let’s meet our first decision maker.. The CIO or Chief Information Officer. CIO’s are pivotal to the entire enterprise IT vision and portfolio. They are strategists, initiators for needs, large budget owners, as well as key influencers over others’ budgets and decisions. Most successful CIO’s are proactive in nature and in practice strive to anticipate issues but managing the unexpected is a trademark of a seasoned CIO.
  4. In today’s economy the CIO isn’t merely a technical advisor to the board. Today the CIO is the enabler of the business. As organizations rely more heavily on technology to engage clients, improve business efficiency and drive revenue, the CIO and the IT organization have become the business. This is one dimension of digital transformation.
  5. The goals of the successful CIO are so closely aligned to the business they are often indistinguishable from the line of business. Generally the goals are to drive efficiency, reduce cost and reduce risk to the organization; You need to understand this because solutions that are not clearly aligned with their goals will likely not find their way through finance. Make sure your value proposition resonates with the CIO.
  6. These are some of the key metrics that a CIO is measured against. Obviously those most closely tied to managed security services would include: Number of security incidents Cost Management client and Employee Satisfaction… That last one is less tangible than the others but let me explain why this is perhaps the most critical to the CIO. Just consider what is happening in the news these days; Security breeches can be business ending events; Even minor events can damage a brand reputation; So client satisfaction becomes both an operational and a security challenge for the CIO as the business transforms to a digital workplace and clients become more demanding of impeccable brand experiences.
  7. Among the most challenging issues and decisions they face are around coping with outages, compliance, security, cost controls, complexity of their infrastructure and retention of skilled employees. Solutions that provide leverage to improve efficiency, mitigate risk and reduce costs while supporting the growth and expansion of the business are going to resonate with the CIO.
  8. In summary, Business Alignment, Digital Leadership and Cyber Security are often at or near the top of their list of issues to work through… Conversations about how to reduce cost, improve security, retain talent, help transform the business, enable innovation or improve efficiency are going to be of interest to the CIO.
  9. Now let’s meet our next decision maker, The CISO or Chief Information Security Officer. Sometimes referred to as simply the CSO or Chief Security Officer. Chief Security Officers are lead influencers on IT overall and can be a deal-maker or deal-breaker. In some organizations their identity can be a mystery, which they prefer because being well known in this role is generally the consequence of a security breach or an appearance on CNN. But the CISO of an organization is a strategic leadership role from a business standpoint. Monitoring and responding to cyber threats while meeting compliance requirements are a just the beginning of their challenges. They have board level visibility and must often articulate and explain complex threat management to the board. Many CISO’s come from non-business backgrounds having worked in engineering and IT for many years, this can be challenging. The typical CISO may have 15 or more years experience in IT and IT Security, To their credit they are often very technically savvy with deep industry knowledge and experience. Selecting or even changing managed security services providers is significant strategic change for an organization. Most often managed security services are part of a larger IT strategy which must be properly aligned. The benefits not only need to outweigh the risk, the business case has to meet with business approval including that of the board. Finally, the CISO is regarded as the company expert and educator. Someone the board relies upon and appreciates for their leadership and guidance in matters of cyber security, risk mitigation and cyber resilience.
  10. The CISO is there to ensure the security of information assets; In some cases the role or responsibility of the CISO may be delegated to an IT Director or other senior IT manager; In any case they will share certain similarities in terms of goals and challenges; Less important than the title is to understand who serves in this role and has these responsibilities;
  11. The goals of the CISO are aligned to those of the CIO, or they should be. As a trusted business advisor to boards they need to understand and convey information in the context of business risk as opposed to IT Security; Beyond compliance and policy enforcement, they must manage information risks more strategically and work toward a culture of shared cyber risk ownership across the enterprise.
  12. Metrics for the CISO can vary from one organization to another and can be difficult to quantify from a business perspective. How do you measure and monetize the prevention of or minimization of risk? As environments become more complex and threat models evolve, better detection, prevention and mitigation metrics can help CISO’s demonstrate value to their organizations. Key performance indicators for the CISO often include such measures as; Business process productivity and efficiency; R&D Spending client Satisfaction (Revenue) Employee Satisfaction (Retention)
  13. We all recognize that cyber threats are an evolving menace. But the person charged with protecting an organizations information assets has the enormous task and responsibility to oversee all aspects of that organizations security posture. They include everything from attracting and keeping skilled talent to policies, practices and technologies that reduce risk and maintain the integrity of data while aligning to the needs of the business.
  14. In summary, Compliance, IT Complexity and the evolving threat landscape are often at or near the top of their list of issues the CISO needs to work through… Conversations about how to improve efficiency, achieve faster time to value, reduce risk and support innovation will resonate with the CISO of an organization…