SlideShare a Scribd company logo
1 of 50
Download to read offline
Differentiating Your
InfoSec Company:
Stabilizing (and
Increasing) Revenue
Many information security companies these days
are struggling to maintain revenue. Many are finding
it difficult to maintain their rates and their client list.
The InfoSec market has been increasingly
commoditized, with many standalone pentesting
tools and many new competitors.
With these new market pressures, InfoSec
consultancies are trying to provide as much value to
their clients as possible, and are looking for ways to
provide new and ongoing services.
In this article, we’ll look at some ideas for stabilizing
and increasing revenue at your InfoSec company.
Some of these ideas are currently being used by
some InfoSec companies, but at Security Roots, we
believe these ideas are deserving of wider
implementation and experimentation.
You can think of this article as a brainstorming tool.
As you read these insights, apply them to your
company and your specific clients.
Pre-Booking Work
The first idea we’ll look at is the pre-booking of
work, which is the point when you sell your services
to a client for a specific time in the future. For
example, a client has an app scheduled for release
six months away, so you pre-sell them 60 man-hours
that they can use any time during that month.
Often, this is used in conjunction with a discount on
the usual rate. Maybe you offer your services at 80%
of your normal rate when booked six months ahead
or during a typically quiet block of time on your
calendar.
This is a technique used in a lot of industries to
exert some control on the ebb and flow of demand.
For example, the airline industry lowers its rates
during slow seasons in order to maintain
smoothness in its bookings.
Offering a pre-booking discount could also be a way
for your consultancy to maintain some smoothness
in your schedule and even out the times of the year
you know are historically slow or unpredictable.
Another way to implement this
would be to have clients pay for
x number of man-hours, which
they could use at any time, as
needed. Tweak this approach
even further by charging higher
rates to ensure immediate
access and a rapid response
from your team.
Retainer Service Agreements
With retainers, clients pay in advance for work to be
specified later.
Some types of retainer-type agreements include:
—Paying for emergency response work in the event
something goes wrong. This retainer usage is kind
of like insurance.For a fee, you’re ensuring that
someone is available for an immediate response.
—Clients pay upfront for a certain amount of
pentesting and vulnerability-seeking per month
(this is basically what we talked about above, with
pre-booking of hours).
—Clients pay upfront for guaranteed access to your
team consulting and discussion.
With regards to this last idea, there are many ways
you might provide clients access to your team’s
expertise. Your team has deep insights into
vulnerabilities and testing, of course, but they
probably also have a lot of thoughts on secure
development practices.
So, for example, let’s say a software company client
is adding an LDAP authentication layer to their
software. This client might find it valuable to get
input from one of your team members on the
process to help them minimize risks of a future
compromise.
Subscription Services
With subscription services, you are trying to achieve
more passive income and move away from time-
intensive tasks to more automatic ones. The main
difference that separates subscription-based
services from retainer-type services is that your
subscription offerings are not tied to the specifics of
a single project.
Your subscription offerings are ways to bundle your
expertise and knowledge into more packageable,
automatic chunks. (Subscriptions can overlap with
retainer agreements a bit, depending on the services
offered.)
The traditional subscription service in the industry
has been the Vulnerability Assessment service,
which is often mandated by different policies and
regulatory bodies (e.g. monthly PCI scans). But that
is not the only service you can offer.
Examples of subscription services:
Automated (or semi-automated)
newsletters/emails. With a
content management system,
you can create a database of
which clients have specific
technologies, and then
automatically send security-
related news about those
individual techs every month (or
more frequently) to your clients
(e.g., security releases by
vendors, new vulnerability
classes, latest research / white
papers / conference
presentations / etc.).
Basically, it’s kind of an automated, personalized
newsletter. You can also add in items related to
specific industries (for example, sending banking-
related security news to your bank clients).
Product-specific recurring vulnerability scanning.
(This could also be thought of as a retainer-based
deal.) The idea is that you’re running automatic
scans of specific products and technologies without
much need for human oversight of the tests.
We’ve seen this service with WordPress site
scanning, but it also works for any other widely
available product category: CMS, e-commerce shop,
blogging platform, enterprise portal, etc.
Threat intelligence. No matter what your opinion is
on the merits of “threat intelligence”, the truth is
that vendors providing these types of service have
found a profitable recurring subscription model.
Compliance and legal issues. In the same way, you
could automatically gather news/updates on legal
and compliance issues that affect clients in certain
industries, certain regions, or certain technologies,
and send that as an automatic email.
This ongoing communication lets your clients know
that you’re watching trends and watching out for
them on multiple levels as you’re saving their mental
bandwidth.
Recurring Testing Services
You could charge a retainer/subscription-type
service for recurring vulnerability testing of various
kinds. Examples of recurring tests are:
—Recurring scans of critical assets
—Perimeter monitoring
—Social engineering and phishing attempts of
company’s employees
—Random DDoS fire drills
For all testing and scanning you do, you should be
tracking your activities and the related
improvements in the client’s system. This will let you
easily prove the worth of the work your team is
doing.
Keep in mind that it’s not the raw data that is
important to your clients; your main value is in
providing them actionable information, which will
come in the form of trends, delta reporting, and
comparisons with other companies.
Recurring Training and Education
You could also provide recurring training and
education for your clients. This could take many
forms, depending on your area of expertise or the
client’s needs. Ideas include:
Employee Awareness Campaigns
These could be occasional in-person or online
training sessions, dedicated to improving the client
workforce’s understanding of security threats. The
more specific to a client’s needs and workplace you
can make this, obviously the more value the client
gets. But even a fully-automatic online training could
improve things for many clients.
Awareness and training doesn’t have to be limited to
lessons, video, or audio. It can also mean monitoring
the news and forwarding to your clients specific
instances where lack of awareness resulted in a
breach or some other negative outcome.
The idea is to make your client’s employees have an
“aha” moment and think, “Well, I didn’t know about
that vulnerability, and we could be the next
headline.” This targeted information can prove to
them the value of your regular input on security
issues.
Training on Specific Products/Tech
You could do customized or automated online
training on specific products and their vulnerabilities
(e.g., WordPress, Sharepoint, etc.). This goes hand in
hand with your product-specific scanning service.
The knowledge you gain through the scanning
service can be repackaged and offered as training
material, hardening guides, etc.
Monthly Calls
Similar to the retainer-style agreement, you could
have clients pay upfront for a certain number of
hours to talk to your staff about practical issues they
are facing or potential threats they want to discuss.
Better Opportunity Tracking
We might be saving the strongest idea for last here.
One of the major ways InfoSec companies drop the
ball is that they don’t optimally track the many ways
they might continue to provide value for their
existing clients. Here are some ideas on how to
improve discovery of new opportunities:
—Follow-up. Do you check back with existing
clients regularly to see what they are doing and
what they may need? It should be a part of your
standard protocol to check in with clients.
—Post-project surveys. When projects are done, a
survey should be given to your clients. Not only
does this help discover their opinions and
thoughts on the completed project, it helps
illuminate the value you just provided them, which
might otherwise be a bit unclear.
(For example, ask, “What potential future issues
might have arisen if our team had not uncovered this
vulnerability?”) The survey can also bring to light
other areas in which you might offer them value.
—Tracking products and technology used. By
keeping files on what products and tech your
clients are using, this will allow you to proactively
look for opportunities to win work from them. For
example, if there is a major vulnerability
discovered in Android, it can be part of your
process to send an email about this to your
Android app clients.
Start Small and Improve
As we’ve talked about in past articles, you shouldn’t
be afraid to start small. Some people put off making
changes to their product/service offerings because
they think there has to be some huge, overarching
plan in place before they make changes. But if there
are obvious quick and easy wins you can get by
making the change, go ahead and do it.
For example, you could start offering retainer-type
services tomorrow if you wanted. You could toss up
some copy about these services immediately and
that might have an immediate impact on attracting a
new client.
The thing to remember about making these
changes: you will be continuously improving them.
As your clients give you feedback and as your team
understands the product better, you will get better at
doing it. You’ll figure out how to optimize the
process, how to reach more clients, and how to
make more money.
So, in short, don’t be afraid to start small and
improve from there.
Next...
Hopefully this article has helped you brainstorm
some ideas on how to stabilize and increase
revenue at your InfoSec consultancy.
If this article strikes a chord with you, please reach
out and let us know the financial challenges at your
company and maybe some unique changes you’ve
instituted to improve your situation.
In our next article in this series, we’ll be discussing
ways to enact long-term and meaningful cultural
change at your InfoSec company.
Was This Article Helpful?
Security Roots’ founder Daniel Martin conceived
and created the open-source collaboration tool
Dradis Framework in 2007. The success of that
application led to the creation of the Security Roots
company and Dradis Professional Edition software.
Over the years, Security Roots has helped hundreds
of InfoSec clients improve their team collaboration
and report creation processes. If you have any
questions about what we do or the solutions we
provide, please fill out our Contact Form and we’ll
be in touch right away.

More Related Content

Viewers also liked

Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled PresentationIgnacio Rippa
 
2 Contract Staffing
2 Contract Staffing2 Contract Staffing
2 Contract StaffingDarren Moore
 
карпова
карповакарпова
карпова16072010
 
What you need to know about diabetes
What you need to know about diabetesWhat you need to know about diabetes
What you need to know about diabeteselmoperes
 
LIANZA Otago Southland LA Day 2015 - Interlibrary Loan, part 2
LIANZA Otago Southland LA Day 2015 - Interlibrary Loan, part 2LIANZA Otago Southland LA Day 2015 - Interlibrary Loan, part 2
LIANZA Otago Southland LA Day 2015 - Interlibrary Loan, part 2Amber Nicholson
 
Uc Ii Joint Formula
Uc Ii Joint FormulaUc Ii Joint Formula
Uc Ii Joint Formulagerardo875
 
Top 8 function coordinator resume samples
Top 8 function coordinator resume samplesTop 8 function coordinator resume samples
Top 8 function coordinator resume samplestonychoper505
 
Administering maximo asset management
Administering maximo asset managementAdministering maximo asset management
Administering maximo asset managementKhaled Saleh
 
Deployment engineer performance appraisal
Deployment engineer performance appraisalDeployment engineer performance appraisal
Deployment engineer performance appraisalRioFerdinand345
 
Lead supervisor performance appraisal
Lead supervisor performance appraisalLead supervisor performance appraisal
Lead supervisor performance appraisalwalkerjohn4190
 
Каталог "Сандер-Логистик" 2015
Каталог "Сандер-Логистик" 2015Каталог "Сандер-Логистик" 2015
Каталог "Сандер-Логистик" 2015Dmitry Doroshenko
 
Desk assistant performance appraisal
Desk assistant performance appraisalDesk assistant performance appraisal
Desk assistant performance appraisalRioFerdinand345
 

Viewers also liked (16)

Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
2 Contract Staffing
2 Contract Staffing2 Contract Staffing
2 Contract Staffing
 
карпова
карповакарпова
карпова
 
What you need to know about diabetes
What you need to know about diabetesWhat you need to know about diabetes
What you need to know about diabetes
 
LIANZA Otago Southland LA Day 2015 - Interlibrary Loan, part 2
LIANZA Otago Southland LA Day 2015 - Interlibrary Loan, part 2LIANZA Otago Southland LA Day 2015 - Interlibrary Loan, part 2
LIANZA Otago Southland LA Day 2015 - Interlibrary Loan, part 2
 
brandingppt-130116015735-phpapp02 (1)
brandingppt-130116015735-phpapp02 (1)brandingppt-130116015735-phpapp02 (1)
brandingppt-130116015735-phpapp02 (1)
 
Uc Ii Joint Formula
Uc Ii Joint FormulaUc Ii Joint Formula
Uc Ii Joint Formula
 
Top 8 function coordinator resume samples
Top 8 function coordinator resume samplesTop 8 function coordinator resume samples
Top 8 function coordinator resume samples
 
Presentation Butinah I
Presentation Butinah IPresentation Butinah I
Presentation Butinah I
 
Oliwia raczek
Oliwia raczekOliwia raczek
Oliwia raczek
 
Administering maximo asset management
Administering maximo asset managementAdministering maximo asset management
Administering maximo asset management
 
Deployment engineer performance appraisal
Deployment engineer performance appraisalDeployment engineer performance appraisal
Deployment engineer performance appraisal
 
Particiones
ParticionesParticiones
Particiones
 
Lead supervisor performance appraisal
Lead supervisor performance appraisalLead supervisor performance appraisal
Lead supervisor performance appraisal
 
Каталог "Сандер-Логистик" 2015
Каталог "Сандер-Логистик" 2015Каталог "Сандер-Логистик" 2015
Каталог "Сандер-Логистик" 2015
 
Desk assistant performance appraisal
Desk assistant performance appraisalDesk assistant performance appraisal
Desk assistant performance appraisal
 

Similar to Stabilizing Revenue

ServiceNow Customer Service Management: Transforming Customer Service into St...
ServiceNow Customer Service Management: Transforming Customer Service into St...ServiceNow Customer Service Management: Transforming Customer Service into St...
ServiceNow Customer Service Management: Transforming Customer Service into St...Cyntexa
 
Why Investing in Credit Repair Software Is a Must for Your Business.pdf
Why Investing in Credit Repair Software Is a Must for Your Business.pdfWhy Investing in Credit Repair Software Is a Must for Your Business.pdf
Why Investing in Credit Repair Software Is a Must for Your Business.pdfDream Cyber Infoway
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITIONBhavanthSoni
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...31West Global Services
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?guestc65425
 
The WorksCRM (UK)
The WorksCRM (UK)The WorksCRM (UK)
The WorksCRM (UK)BrokerCRM
 
Finance :: Insurance Software Solutions - Build or Buy
Finance :: Insurance Software Solutions - Build or BuyFinance :: Insurance Software Solutions - Build or Buy
Finance :: Insurance Software Solutions - Build or Buytorpidpenitenti59
 
Better Software Keynote The Complete Developer 07
Better Software Keynote  The Complete Developer 07Better Software Keynote  The Complete Developer 07
Better Software Keynote The Complete Developer 07Enthiosys Inc
 
Better Software Keynote The Complete Developer 07
Better Software Keynote  The Complete Developer 07Better Software Keynote  The Complete Developer 07
Better Software Keynote The Complete Developer 07Enthiosys Inc
 
gtFace: Insurance
gtFace: InsurancegtFace: Insurance
gtFace: Insurancekostienko1
 
gtFace: Insurance (presentation)
gtFace: Insurance (presentation)gtFace: Insurance (presentation)
gtFace: Insurance (presentation)kostienko2
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEeAuditor Audits & Inspections
 
How to Choose a Legal Document Automation Solution
How to Choose a Legal Document Automation SolutionHow to Choose a Legal Document Automation Solution
How to Choose a Legal Document Automation SolutionHelen Coyne
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guideMarie Peters
 
Chapter 10 Tools and Techniques for Quality Management.ppt
Chapter 10 Tools and Techniques for Quality Management.pptChapter 10 Tools and Techniques for Quality Management.ppt
Chapter 10 Tools and Techniques for Quality Management.pptDr. Nazrul Islam
 
How to help gear your company towards cutting the right costs
How to help gear your company towards cutting the right costsHow to help gear your company towards cutting the right costs
How to help gear your company towards cutting the right costswilliamsjohnseoexperts
 
Tools and Techniques for Quality Management
Tools and Techniques for Quality ManagementTools and Techniques for Quality Management
Tools and Techniques for Quality ManagementNazrul Islam
 

Similar to Stabilizing Revenue (20)

ServiceNow Customer Service Management: Transforming Customer Service into St...
ServiceNow Customer Service Management: Transforming Customer Service into St...ServiceNow Customer Service Management: Transforming Customer Service into St...
ServiceNow Customer Service Management: Transforming Customer Service into St...
 
30 Measurable Use Cases for IoT by M Capone
30 Measurable Use Cases for IoT by M Capone30 Measurable Use Cases for IoT by M Capone
30 Measurable Use Cases for IoT by M Capone
 
Why Investing in Credit Repair Software Is a Must for Your Business.pdf
Why Investing in Credit Repair Software Is a Must for Your Business.pdfWhy Investing in Credit Repair Software Is a Must for Your Business.pdf
Why Investing in Credit Repair Software Is a Must for Your Business.pdf
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
The WorksCRM (UK)
The WorksCRM (UK)The WorksCRM (UK)
The WorksCRM (UK)
 
Finance :: Insurance Software Solutions - Build or Buy
Finance :: Insurance Software Solutions - Build or BuyFinance :: Insurance Software Solutions - Build or Buy
Finance :: Insurance Software Solutions - Build or Buy
 
Better Software Keynote The Complete Developer 07
Better Software Keynote  The Complete Developer 07Better Software Keynote  The Complete Developer 07
Better Software Keynote The Complete Developer 07
 
Better Software Keynote The Complete Developer 07
Better Software Keynote  The Complete Developer 07Better Software Keynote  The Complete Developer 07
Better Software Keynote The Complete Developer 07
 
Proactive Customer Service
Proactive Customer ServiceProactive Customer Service
Proactive Customer Service
 
gtFace: Insurance
gtFace: InsurancegtFace: Insurance
gtFace: Insurance
 
gtFace: Insurance (presentation)
gtFace: Insurance (presentation)gtFace: Insurance (presentation)
gtFace: Insurance (presentation)
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
 
How to Choose a Legal Document Automation Solution
How to Choose a Legal Document Automation SolutionHow to Choose a Legal Document Automation Solution
How to Choose a Legal Document Automation Solution
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guide
 
Chapter 10 Tools and Techniques for Quality Management.ppt
Chapter 10 Tools and Techniques for Quality Management.pptChapter 10 Tools and Techniques for Quality Management.ppt
Chapter 10 Tools and Techniques for Quality Management.ppt
 
How to help gear your company towards cutting the right costs
How to help gear your company towards cutting the right costsHow to help gear your company towards cutting the right costs
How to help gear your company towards cutting the right costs
 
Tools and Techniques for Quality Management
Tools and Techniques for Quality ManagementTools and Techniques for Quality Management
Tools and Techniques for Quality Management
 

Recently uploaded

FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 

Recently uploaded (20)

FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 

Stabilizing Revenue

  • 2. Many information security companies these days are struggling to maintain revenue. Many are finding it difficult to maintain their rates and their client list. The InfoSec market has been increasingly commoditized, with many standalone pentesting tools and many new competitors.
  • 3. With these new market pressures, InfoSec consultancies are trying to provide as much value to their clients as possible, and are looking for ways to provide new and ongoing services.
  • 4. In this article, we’ll look at some ideas for stabilizing and increasing revenue at your InfoSec company. Some of these ideas are currently being used by some InfoSec companies, but at Security Roots, we believe these ideas are deserving of wider implementation and experimentation. You can think of this article as a brainstorming tool. As you read these insights, apply them to your company and your specific clients.
  • 6. The first idea we’ll look at is the pre-booking of work, which is the point when you sell your services to a client for a specific time in the future. For example, a client has an app scheduled for release six months away, so you pre-sell them 60 man-hours that they can use any time during that month.
  • 7. Often, this is used in conjunction with a discount on the usual rate. Maybe you offer your services at 80% of your normal rate when booked six months ahead or during a typically quiet block of time on your calendar.
  • 8. This is a technique used in a lot of industries to exert some control on the ebb and flow of demand. For example, the airline industry lowers its rates during slow seasons in order to maintain smoothness in its bookings. Offering a pre-booking discount could also be a way for your consultancy to maintain some smoothness in your schedule and even out the times of the year you know are historically slow or unpredictable.
  • 9. Another way to implement this would be to have clients pay for x number of man-hours, which they could use at any time, as needed. Tweak this approach even further by charging higher rates to ensure immediate access and a rapid response from your team.
  • 11. With retainers, clients pay in advance for work to be specified later. Some types of retainer-type agreements include:
  • 12. —Paying for emergency response work in the event something goes wrong. This retainer usage is kind of like insurance.For a fee, you’re ensuring that someone is available for an immediate response. —Clients pay upfront for a certain amount of pentesting and vulnerability-seeking per month (this is basically what we talked about above, with pre-booking of hours). —Clients pay upfront for guaranteed access to your team consulting and discussion.
  • 13. With regards to this last idea, there are many ways you might provide clients access to your team’s expertise. Your team has deep insights into vulnerabilities and testing, of course, but they probably also have a lot of thoughts on secure development practices.
  • 14. So, for example, let’s say a software company client is adding an LDAP authentication layer to their software. This client might find it valuable to get input from one of your team members on the process to help them minimize risks of a future compromise.
  • 16. With subscription services, you are trying to achieve more passive income and move away from time- intensive tasks to more automatic ones. The main difference that separates subscription-based services from retainer-type services is that your subscription offerings are not tied to the specifics of a single project.
  • 17. Your subscription offerings are ways to bundle your expertise and knowledge into more packageable, automatic chunks. (Subscriptions can overlap with retainer agreements a bit, depending on the services offered.)
  • 18. The traditional subscription service in the industry has been the Vulnerability Assessment service, which is often mandated by different policies and regulatory bodies (e.g. monthly PCI scans). But that is not the only service you can offer.
  • 20. Automated (or semi-automated) newsletters/emails. With a content management system, you can create a database of which clients have specific technologies, and then automatically send security- related news about those individual techs every month (or more frequently) to your clients (e.g., security releases by vendors, new vulnerability classes, latest research / white papers / conference presentations / etc.).
  • 21. Basically, it’s kind of an automated, personalized newsletter. You can also add in items related to specific industries (for example, sending banking- related security news to your bank clients).
  • 22. Product-specific recurring vulnerability scanning. (This could also be thought of as a retainer-based deal.) The idea is that you’re running automatic scans of specific products and technologies without much need for human oversight of the tests.
  • 23. We’ve seen this service with WordPress site scanning, but it also works for any other widely available product category: CMS, e-commerce shop, blogging platform, enterprise portal, etc.
  • 24. Threat intelligence. No matter what your opinion is on the merits of “threat intelligence”, the truth is that vendors providing these types of service have found a profitable recurring subscription model.
  • 25. Compliance and legal issues. In the same way, you could automatically gather news/updates on legal and compliance issues that affect clients in certain industries, certain regions, or certain technologies, and send that as an automatic email. This ongoing communication lets your clients know that you’re watching trends and watching out for them on multiple levels as you’re saving their mental bandwidth.
  • 27. You could charge a retainer/subscription-type service for recurring vulnerability testing of various kinds. Examples of recurring tests are: —Recurring scans of critical assets —Perimeter monitoring —Social engineering and phishing attempts of company’s employees —Random DDoS fire drills
  • 28. For all testing and scanning you do, you should be tracking your activities and the related improvements in the client’s system. This will let you easily prove the worth of the work your team is doing. Keep in mind that it’s not the raw data that is important to your clients; your main value is in providing them actionable information, which will come in the form of trends, delta reporting, and comparisons with other companies.
  • 30. You could also provide recurring training and education for your clients. This could take many forms, depending on your area of expertise or the client’s needs. Ideas include:
  • 31. Employee Awareness Campaigns These could be occasional in-person or online training sessions, dedicated to improving the client workforce’s understanding of security threats. The more specific to a client’s needs and workplace you can make this, obviously the more value the client gets. But even a fully-automatic online training could improve things for many clients.
  • 32. Awareness and training doesn’t have to be limited to lessons, video, or audio. It can also mean monitoring the news and forwarding to your clients specific instances where lack of awareness resulted in a breach or some other negative outcome.
  • 33. The idea is to make your client’s employees have an “aha” moment and think, “Well, I didn’t know about that vulnerability, and we could be the next headline.” This targeted information can prove to them the value of your regular input on security issues.
  • 34. Training on Specific Products/Tech You could do customized or automated online training on specific products and their vulnerabilities (e.g., WordPress, Sharepoint, etc.). This goes hand in hand with your product-specific scanning service. The knowledge you gain through the scanning service can be repackaged and offered as training material, hardening guides, etc.
  • 35. Monthly Calls Similar to the retainer-style agreement, you could have clients pay upfront for a certain number of hours to talk to your staff about practical issues they are facing or potential threats they want to discuss.
  • 37. We might be saving the strongest idea for last here. One of the major ways InfoSec companies drop the ball is that they don’t optimally track the many ways they might continue to provide value for their existing clients. Here are some ideas on how to improve discovery of new opportunities:
  • 38. —Follow-up. Do you check back with existing clients regularly to see what they are doing and what they may need? It should be a part of your standard protocol to check in with clients.
  • 39. —Post-project surveys. When projects are done, a survey should be given to your clients. Not only does this help discover their opinions and thoughts on the completed project, it helps illuminate the value you just provided them, which might otherwise be a bit unclear.
  • 40. (For example, ask, “What potential future issues might have arisen if our team had not uncovered this vulnerability?”) The survey can also bring to light other areas in which you might offer them value.
  • 41. —Tracking products and technology used. By keeping files on what products and tech your clients are using, this will allow you to proactively look for opportunities to win work from them. For example, if there is a major vulnerability discovered in Android, it can be part of your process to send an email about this to your Android app clients.
  • 42. Start Small and Improve
  • 43. As we’ve talked about in past articles, you shouldn’t be afraid to start small. Some people put off making changes to their product/service offerings because they think there has to be some huge, overarching plan in place before they make changes. But if there are obvious quick and easy wins you can get by making the change, go ahead and do it.
  • 44. For example, you could start offering retainer-type services tomorrow if you wanted. You could toss up some copy about these services immediately and that might have an immediate impact on attracting a new client.
  • 45. The thing to remember about making these changes: you will be continuously improving them. As your clients give you feedback and as your team understands the product better, you will get better at doing it. You’ll figure out how to optimize the process, how to reach more clients, and how to make more money.
  • 46. So, in short, don’t be afraid to start small and improve from there.
  • 47. Next... Hopefully this article has helped you brainstorm some ideas on how to stabilize and increase revenue at your InfoSec consultancy.
  • 48. If this article strikes a chord with you, please reach out and let us know the financial challenges at your company and maybe some unique changes you’ve instituted to improve your situation. In our next article in this series, we’ll be discussing ways to enact long-term and meaningful cultural change at your InfoSec company.
  • 49. Was This Article Helpful? Security Roots’ founder Daniel Martin conceived and created the open-source collaboration tool Dradis Framework in 2007. The success of that application led to the creation of the Security Roots company and Dradis Professional Edition software.
  • 50. Over the years, Security Roots has helped hundreds of InfoSec clients improve their team collaboration and report creation processes. If you have any questions about what we do or the solutions we provide, please fill out our Contact Form and we’ll be in touch right away.