SlideShare a Scribd company logo
1 of 10
Download to read offline
Be the TSA: Trusted
Security Advisor!
Dominique Singer, CISSP CISM CRISC ITIL COBITGSECGOLD
VP, BizDev of Cybersecurity
What is a Trusted Security Advisor?
The most important person your customer doesn’t
know about - YOU!
Challenge: how much do YOU know about your
customer’s business objectives?
Cuts through vendor noiseto offer the right solution
How many people in this room want to be a security expert?
Endpoint SecurityNetwork Security Application Security
Managed SecurityService Provider WebSecurity Messaging Security
Risk & Compliance
Securit y Operat ions & Incident Response
Data Security
M obile Securit y
Threat Intelligence
Indust rial /Iot Security
Fraud Prevent ion / Transact ion Securit y
Specialized Threat Analysis & Prot ect ion
Ident ity & Access Management
Cloud Securit y
cybersecurity
landscape
CISSP Areas of
Study
Are you familiar with the acronym CISSP?
Certified Information Systems Security Professional
Endpoint SecurityNetwork Security Application Security
Managed SecurityService Provider Web Security Messaging Security
Risk & Compliance Securit y Operat ions & Incident Response Data Security M obile Securit y
Threat Intelligence
Indust rial /Iot Security
Fraud Prevent ion / Transact ion Securit y
Specialized Threat Analysis & Prot ect ion
Ident ity & Access Management Cloud Securit y
cybersecurity
landscape
What do customers
face when looking
for InfoSec solutions?
Key Concepts for Infosec:
Builda Framework
A House doesn’t stand
without the right
framework
Availability
Technology Respond
Three Rules
of Three
Predict Prevent
DetectRespond
Continuous
Visibility and
Verification
Users
Systems
Processes
Data
Network
Policy
Compliance
Adaptative Security
Architecture
Adjust
Posture
Implement
Posture
Monitor PostureAdjust Posture
How DO you NOT sell InfoSec Solutions?
SKIP Fear, Uncertainty, and Doubt (FUD)
Don’t ask if they’ve been breached!
Don’t ask about gaps, weaknesses, “Do you know how the hacker can get in?”
How DO you SELL InfoSec Solutions?
Operate at the Leadership / Strategy level
Focus on Business outcomes: IT and Security are enablers of Business
DO ask about security initiatives, governance, measurement of effectiveness
THANK YOU!

More Related Content

What's hot

kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
 
Ibm security domains 2015[3]
Ibm security domains 2015[3]Ibm security domains 2015[3]
Ibm security domains 2015[3]
joenicod
 

What's hot (20)

Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
 
Mastering Next Gen SIEM Use Cases (Part 2)
Mastering Next Gen SIEM Use Cases (Part 2)Mastering Next Gen SIEM Use Cases (Part 2)
Mastering Next Gen SIEM Use Cases (Part 2)
 
Ict conf td-evs_pcidss-final
Ict conf td-evs_pcidss-finalIct conf td-evs_pcidss-final
Ict conf td-evs_pcidss-final
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)
 
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015   saga - cisco cybersecurity rešenja- Viktor VargaIct 2015   saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
 
security in development lifecycle
security in development lifecyclesecurity in development lifecycle
security in development lifecycle
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROSécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
El Futuro de la Cibersegu
El Futuro de la CiberseguEl Futuro de la Cibersegu
El Futuro de la Cibersegu
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
 
Ibm security domains 2015[3]
Ibm security domains 2015[3]Ibm security domains 2015[3]
Ibm security domains 2015[3]
 

Similar to How to be a Security Wingman by Dominique Singer

Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
ethnos
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
tsaiblake
 

Similar to How to be a Security Wingman by Dominique Singer (20)

100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Cybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberCybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce Cyber
 
Main Menu
Main MenuMain Menu
Main Menu
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
braincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdfbraincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdf
 
braincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdfbraincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdf
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
 
Fidelis Cybersecurity Overview
Fidelis Cybersecurity OverviewFidelis Cybersecurity Overview
Fidelis Cybersecurity Overview
 
Forget cyber, it's all about AppSec
Forget cyber, it's all about AppSecForget cyber, it's all about AppSec
Forget cyber, it's all about AppSec
 
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security EssentialWhy Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Spirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton ChuvakinSpirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton Chuvakin
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
 
"Navigate the MDR Marketplace Like a Pro!"
 "Navigate the MDR Marketplace Like a Pro!" "Navigate the MDR Marketplace Like a Pro!"
"Navigate the MDR Marketplace Like a Pro!"
 

More from SaraPia5

More from SaraPia5 (20)

Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerLet's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
 
AppGate Getting Started Resources for Telarus Partners
AppGate Getting Started Resources for Telarus PartnersAppGate Getting Started Resources for Telarus Partners
AppGate Getting Started Resources for Telarus Partners
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Return to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with EverbridgeReturn to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with Everbridge
 
TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...
TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...
TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...
 
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
Creating Your Top Team - How to Find Your Goose by Richard Murray
Creating Your Top Team - How to Find Your Goose by Richard MurrayCreating Your Top Team - How to Find Your Goose by Richard Murray
Creating Your Top Team - How to Find Your Goose by Richard Murray
 
The Strategy of Platforms
The Strategy of PlatformsThe Strategy of Platforms
The Strategy of Platforms
 
How to Create a VoIP-Ready Network.
How to Create a VoIP-Ready Network.How to Create a VoIP-Ready Network.
How to Create a VoIP-Ready Network.
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
Finding Work Life Balance with Ron McNab
Finding Work Life Balance with Ron McNabFinding Work Life Balance with Ron McNab
Finding Work Life Balance with Ron McNab
 
Amy Bailey, VP of Marketing, presenting Telarus Loyalty Program
Amy Bailey, VP of Marketing, presenting Telarus Loyalty ProgramAmy Bailey, VP of Marketing, presenting Telarus Loyalty Program
Amy Bailey, VP of Marketing, presenting Telarus Loyalty Program
 
Security Compliance Tackled by Taylor Hersom
Security Compliance Tackled by Taylor HersomSecurity Compliance Tackled by Taylor Hersom
Security Compliance Tackled by Taylor Hersom
 
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
 
Growing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP EngineeringGrowing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP Engineering
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | TelarusLinkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
 
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | TalkdeskThe Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

How to be a Security Wingman by Dominique Singer

  • 1. Be the TSA: Trusted Security Advisor! Dominique Singer, CISSP CISM CRISC ITIL COBITGSECGOLD VP, BizDev of Cybersecurity
  • 2. What is a Trusted Security Advisor? The most important person your customer doesn’t know about - YOU! Challenge: how much do YOU know about your customer’s business objectives? Cuts through vendor noiseto offer the right solution
  • 3. How many people in this room want to be a security expert? Endpoint SecurityNetwork Security Application Security Managed SecurityService Provider WebSecurity Messaging Security Risk & Compliance Securit y Operat ions & Incident Response Data Security M obile Securit y Threat Intelligence Indust rial /Iot Security Fraud Prevent ion / Transact ion Securit y Specialized Threat Analysis & Prot ect ion Ident ity & Access Management Cloud Securit y cybersecurity landscape CISSP Areas of Study Are you familiar with the acronym CISSP? Certified Information Systems Security Professional
  • 4. Endpoint SecurityNetwork Security Application Security Managed SecurityService Provider Web Security Messaging Security Risk & Compliance Securit y Operat ions & Incident Response Data Security M obile Securit y Threat Intelligence Indust rial /Iot Security Fraud Prevent ion / Transact ion Securit y Specialized Threat Analysis & Prot ect ion Ident ity & Access Management Cloud Securit y cybersecurity landscape
  • 5. What do customers face when looking for InfoSec solutions?
  • 6. Key Concepts for Infosec: Builda Framework A House doesn’t stand without the right framework Availability Technology Respond Three Rules of Three
  • 8. How DO you NOT sell InfoSec Solutions? SKIP Fear, Uncertainty, and Doubt (FUD) Don’t ask if they’ve been breached! Don’t ask about gaps, weaknesses, “Do you know how the hacker can get in?”
  • 9. How DO you SELL InfoSec Solutions? Operate at the Leadership / Strategy level Focus on Business outcomes: IT and Security are enablers of Business DO ask about security initiatives, governance, measurement of effectiveness