SlideShare a Scribd company logo
Security Value
         Chain
  The Business of
   Security Value
Porter’s Value Chain
             Firm Infrastructure
Human Resource Management




                                                             Margin
       Technology Development
                  Procurement
 Inbound                  Outbound     Marketing
             Operations                            Service
 Logistics                 Logistics    & Sales
Your NEW Value Chain

                           You

  Inbound                  Outbound     Marketing
              Operations                            Service
  Logistics                 Logistics    & Sales
Inbound     The number one raw
Logistics
            material for the business of
            security is INFORMATION!

            Where do you get it from?
            How do you store it?
Operations
             This is where you add
             VALUE!

             What value do you add to
             the information?
             What new information do
             you create?
             What is it that you and your
             team do?
Outbound     Getting that VALUE out to
 Logistics
             your customers.

             Who is your customer?
             How do you package the
             information?
             Is it easy to get?
             Is it easy to use?

             It’s all about the DELIVERY.
Marketing   Better than a Security
 & Sales
            Awareness Program!

            Create demand for your
            services.
            Pulling instead of pushing.

            It’s about CONSTANT
            communication!
Service
          This is where you maintain
          VALUE!

          High touch, high frequency.
          Strengthen your brand.
          Broaden your reach.
          Set SLAs. Live up to them!

          Incorporate criticism into
          improvements.
Sample Service Map
  Inbound
                 Operations
                                Outbound       Marketing &
                                                              Service
                                                                          Value
  Logistics                      Logistics       Sales
                                                                          Chain

Vulnerability
                 Prioritizing    Reporting      Educating     Training
    Data



 Patch Alerts    Correlating     Self-Serve    Advertising    Support
                                                                          Key
                                                                          Functions
Event Streams    Analyzing      Face-to-Face    Marketing     Response



                                 Decision
User Inquiries   Validating                      Selling     Engagement
                                 Support
Inbound Logistics Metrics
  Inbound
  Logistics
                     Look for trends.

Vulnerability        Time to remediate.
    Data
                     Security events by demographic.
                     % of patches released vs. relevant.
 Patch Alerts
                     Common user inquiries.
Event Streams




User Inquiries
Operations Metrics
Operations      Measure efficiency ruthlessly

Prioritizing
                # of systems changed in/out of
                maintenance window.
                # of projects with security oversight.
Correlating
                Time to decommission accounts.
Analyzing




Validating
Outbound Logistics Metrics
Outbound
 Logistics
                   It’s about engagement

 Reporting
                   % reports read.
                   Size of communication audience.
                   # of project meetings attended.
 Self-Serve
                   Frequency of customer contact.
                   Don’t forget packaging!
Face-to-Face



 Decision
 Support
Marketing & Sales Metrics
Marketing &
  Sales
                   Demand generation

 Educating
                   % of org educated.
                   # of hits to security portal.
                   # of project security checklist
Advertising
                   downloads.
                   “Pipeline” of projects.
 Marketing
                   # of contacts before engagement.

  Selling
Service Metrics
 Service     Stay connected

 Training
             Scheduled training events.
             # of security related support calls.
             # of reported incidents per unit.
 Support
             Time from call to response.
             % of returning callers.
 Response
             % of users trained.

Engagement
Questions?

             Brandon Dunlap
Managing Director of Research
    bsdunlap@brightfly.com
         Twitter: @bsdunlap

                 Brightfly, Inc.
           www.brightfly.com
           Twitter: @brightfly

More Related Content

What's hot

Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation211 Check
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdfMAHESHUMANATHGOPALAK
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityDevOps.com
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Shadow DOM, CSS and Styling Hooks in LWC what you need to know
Shadow DOM, CSS and Styling Hooks in LWC  what you need to knowShadow DOM, CSS and Styling Hooks in LWC  what you need to know
Shadow DOM, CSS and Styling Hooks in LWC what you need to knowSudipta Deb ☁
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
dlux - Splunk Technical Overview
dlux - Splunk Technical Overviewdlux - Splunk Technical Overview
dlux - Splunk Technical OverviewDavid Lutz
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life CycleMaurice Dawson
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 

What's hot (20)

Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Shadow DOM, CSS and Styling Hooks in LWC what you need to know
Shadow DOM, CSS and Styling Hooks in LWC  what you need to knowShadow DOM, CSS and Styling Hooks in LWC  what you need to know
Shadow DOM, CSS and Styling Hooks in LWC what you need to know
 
Soc
SocSoc
Soc
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
dlux - Splunk Technical Overview
dlux - Splunk Technical Overviewdlux - Splunk Technical Overview
dlux - Splunk Technical Overview
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 

Viewers also liked

Defining Security Strategy
Defining Security StrategyDefining Security Strategy
Defining Security StrategyBrandon Dunlap
 
Creating The Security Business
Creating The Security BusinessCreating The Security Business
Creating The Security BusinessBrandon Dunlap
 
FISCALIS Human Nature - Behavioral Science
FISCALIS  Human Nature - Behavioral ScienceFISCALIS  Human Nature - Behavioral Science
FISCALIS Human Nature - Behavioral ScienceJohan de Veer
 
Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Shahar Geiger Maor
 
Defining Competitive Advantage
Defining Competitive AdvantageDefining Competitive Advantage
Defining Competitive AdvantageBrandon Dunlap
 
Digital Manufacturing and Design Innovation Institute
Digital Manufacturing and Design Innovation InstituteDigital Manufacturing and Design Innovation Institute
Digital Manufacturing and Design Innovation InstituteControlEng
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Digital Transformation in the Manufacturing sector
Digital Transformation in the Manufacturing sectorDigital Transformation in the Manufacturing sector
Digital Transformation in the Manufacturing sectorArun Natarajan
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysisKamal Singh
 
10 Digital Hacks Every Marketer Should Know
10 Digital Hacks Every Marketer Should Know10 Digital Hacks Every Marketer Should Know
10 Digital Hacks Every Marketer Should KnowMark Fidelman
 

Viewers also liked (11)

Defining Security Strategy
Defining Security StrategyDefining Security Strategy
Defining Security Strategy
 
Creating The Security Business
Creating The Security BusinessCreating The Security Business
Creating The Security Business
 
FISCALIS Human Nature - Behavioral Science
FISCALIS  Human Nature - Behavioral ScienceFISCALIS  Human Nature - Behavioral Science
FISCALIS Human Nature - Behavioral Science
 
Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008
 
Defining Competitive Advantage
Defining Competitive AdvantageDefining Competitive Advantage
Defining Competitive Advantage
 
IISM INDIA
IISM INDIAIISM INDIA
IISM INDIA
 
Digital Manufacturing and Design Innovation Institute
Digital Manufacturing and Design Innovation InstituteDigital Manufacturing and Design Innovation Institute
Digital Manufacturing and Design Innovation Institute
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Digital Transformation in the Manufacturing sector
Digital Transformation in the Manufacturing sectorDigital Transformation in the Manufacturing sector
Digital Transformation in the Manufacturing sector
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysis
 
10 Digital Hacks Every Marketer Should Know
10 Digital Hacks Every Marketer Should Know10 Digital Hacks Every Marketer Should Know
10 Digital Hacks Every Marketer Should Know
 

Similar to The Security Value Chain

Customer Insights Summit Toronto 2012
Customer Insights Summit Toronto 2012Customer Insights Summit Toronto 2012
Customer Insights Summit Toronto 2012Fabiana Pereira
 
Marketlink powered by Centripetal
Marketlink powered by CentripetalMarketlink powered by Centripetal
Marketlink powered by CentripetalInformatica
 
Business Development to Drive Growth [Global Channel Partners Summit]
Business Development to Drive Growth [Global Channel Partners Summit]Business Development to Drive Growth [Global Channel Partners Summit]
Business Development to Drive Growth [Global Channel Partners Summit]interlinkONE
 
Gartner Session Final Prez October 2012
Gartner Session Final Prez October 2012Gartner Session Final Prez October 2012
Gartner Session Final Prez October 2012Rebecca Croucher
 
Innerworkings Pitch - Think Small to Get Big 3-4-13
Innerworkings Pitch - Think Small to Get Big 3-4-13Innerworkings Pitch - Think Small to Get Big 3-4-13
Innerworkings Pitch - Think Small to Get Big 3-4-13PrestonPate
 
Marketlink powered by Centripetal
Marketlink powered by CentripetalMarketlink powered by Centripetal
Marketlink powered by CentripetalPrestonPate
 
The evolution of the sales organization(1)
The evolution of the sales organization(1)The evolution of the sales organization(1)
The evolution of the sales organization(1)lalitb7
 
Frost And Sullivan 2009
Frost And Sullivan 2009Frost And Sullivan 2009
Frost And Sullivan 2009Don Lamping
 
Solutions for eCommerce industry.
Solutions for eCommerce industry.Solutions for eCommerce industry.
Solutions for eCommerce industry.Mindtree Ltd.
 
Gcsv2011 skills based volunteering-alan witchey-skills assessment grid
Gcsv2011 skills based volunteering-alan witchey-skills assessment gridGcsv2011 skills based volunteering-alan witchey-skills assessment grid
Gcsv2011 skills based volunteering-alan witchey-skills assessment gridServe Indiana
 
CRM Manufacturing - Birmingham 25th Jan 2012
CRM Manufacturing - Birmingham 25th Jan 2012CRM Manufacturing - Birmingham 25th Jan 2012
CRM Manufacturing - Birmingham 25th Jan 2012antonioferrin
 
Insurance Sales Performance Dashboard Powered By Pm Square
Insurance Sales Performance Dashboard Powered By Pm SquareInsurance Sales Performance Dashboard Powered By Pm Square
Insurance Sales Performance Dashboard Powered By Pm SquarePM square
 
Leverage your customer data to predict your customers actions - Colin Linsky
Leverage your customer data to predict your customers actions - Colin LinskyLeverage your customer data to predict your customers actions - Colin Linsky
Leverage your customer data to predict your customers actions - Colin LinskyIBM SPSS Denmark
 
Taking Email Marketing Offline to Maximize Results
Taking Email Marketing Offline to Maximize ResultsTaking Email Marketing Offline to Maximize Results
Taking Email Marketing Offline to Maximize ResultsAct-On Software
 
The Customer Experience Scenario
The Customer Experience ScenarioThe Customer Experience Scenario
The Customer Experience ScenarioEllery Wee
 
How Hansa Cequity can help you enrich your Customer Equity?
How Hansa Cequity can help you enrich your Customer Equity?How Hansa Cequity can help you enrich your Customer Equity?
How Hansa Cequity can help you enrich your Customer Equity?Ajay Kelkar
 
Marketing Management (Module 1)
Marketing Management (Module 1)Marketing Management (Module 1)
Marketing Management (Module 1)Ashish Pillai
 
Getting the Most from Marketing Automation
Getting the Most from Marketing Automation Getting the Most from Marketing Automation
Getting the Most from Marketing Automation Pardot
 
ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT O...
ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT O...ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT O...
ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT O...Axios Systems
 

Similar to The Security Value Chain (20)

Customer Insights Summit Toronto 2012
Customer Insights Summit Toronto 2012Customer Insights Summit Toronto 2012
Customer Insights Summit Toronto 2012
 
Marketlink powered by Centripetal
Marketlink powered by CentripetalMarketlink powered by Centripetal
Marketlink powered by Centripetal
 
Business Development to Drive Growth [Global Channel Partners Summit]
Business Development to Drive Growth [Global Channel Partners Summit]Business Development to Drive Growth [Global Channel Partners Summit]
Business Development to Drive Growth [Global Channel Partners Summit]
 
Gartner Session Final Prez October 2012
Gartner Session Final Prez October 2012Gartner Session Final Prez October 2012
Gartner Session Final Prez October 2012
 
Innerworkings Pitch - Think Small to Get Big 3-4-13
Innerworkings Pitch - Think Small to Get Big 3-4-13Innerworkings Pitch - Think Small to Get Big 3-4-13
Innerworkings Pitch - Think Small to Get Big 3-4-13
 
Marketlink powered by Centripetal
Marketlink powered by CentripetalMarketlink powered by Centripetal
Marketlink powered by Centripetal
 
The evolution of the sales organization(1)
The evolution of the sales organization(1)The evolution of the sales organization(1)
The evolution of the sales organization(1)
 
Frost And Sullivan 2009
Frost And Sullivan 2009Frost And Sullivan 2009
Frost And Sullivan 2009
 
Solutions for eCommerce industry.
Solutions for eCommerce industry.Solutions for eCommerce industry.
Solutions for eCommerce industry.
 
Gcsv2011 skills based volunteering-alan witchey-skills assessment grid
Gcsv2011 skills based volunteering-alan witchey-skills assessment gridGcsv2011 skills based volunteering-alan witchey-skills assessment grid
Gcsv2011 skills based volunteering-alan witchey-skills assessment grid
 
CRM Manufacturing - Birmingham 25th Jan 2012
CRM Manufacturing - Birmingham 25th Jan 2012CRM Manufacturing - Birmingham 25th Jan 2012
CRM Manufacturing - Birmingham 25th Jan 2012
 
Insurance Sales Performance Dashboard Powered By Pm Square
Insurance Sales Performance Dashboard Powered By Pm SquareInsurance Sales Performance Dashboard Powered By Pm Square
Insurance Sales Performance Dashboard Powered By Pm Square
 
Leverage your customer data to predict your customers actions - Colin Linsky
Leverage your customer data to predict your customers actions - Colin LinskyLeverage your customer data to predict your customers actions - Colin Linsky
Leverage your customer data to predict your customers actions - Colin Linsky
 
Interactions 2012 V0.2
Interactions 2012 V0.2Interactions 2012 V0.2
Interactions 2012 V0.2
 
Taking Email Marketing Offline to Maximize Results
Taking Email Marketing Offline to Maximize ResultsTaking Email Marketing Offline to Maximize Results
Taking Email Marketing Offline to Maximize Results
 
The Customer Experience Scenario
The Customer Experience ScenarioThe Customer Experience Scenario
The Customer Experience Scenario
 
How Hansa Cequity can help you enrich your Customer Equity?
How Hansa Cequity can help you enrich your Customer Equity?How Hansa Cequity can help you enrich your Customer Equity?
How Hansa Cequity can help you enrich your Customer Equity?
 
Marketing Management (Module 1)
Marketing Management (Module 1)Marketing Management (Module 1)
Marketing Management (Module 1)
 
Getting the Most from Marketing Automation
Getting the Most from Marketing Automation Getting the Most from Marketing Automation
Getting the Most from Marketing Automation
 
ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT O...
ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT O...ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT O...
ITIL V3 Chief Architect's Practical Guide to Leveraging Social Media for IT O...
 

Recently uploaded

Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content MarketingChuck Aikens
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
 
sales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumsales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumzyqmx62fgm
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesDragon Dream Bar
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterNathanBaughman3
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfSam H
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111zoyaansari11365
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback AnalysisSafe PaaS
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.smalmahmud11
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckHajeJanKamps
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxmy Pandit
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfJos Voskuil
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdftjcomstrang
 
IPTV Subscription in Ireland: Elevating Your Entertainment Experience
IPTV Subscription in Ireland: Elevating Your Entertainment ExperienceIPTV Subscription in Ireland: Elevating Your Entertainment Experience
IPTV Subscription in Ireland: Elevating Your Entertainment ExperienceDragon Dream Bar
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdcreerey
 

Recently uploaded (20)

Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content Marketing
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Communicative rationality and the evolution of business ethics: corporate soc...
Communicative rationality and the evolution of business ethics: corporate soc...Communicative rationality and the evolution of business ethics: corporate soc...
Communicative rationality and the evolution of business ethics: corporate soc...
 
sales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumsales plan presentation by mckinsey alum
sales plan presentation by mckinsey alum
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and Employees
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
IPTV Subscription in Ireland: Elevating Your Entertainment Experience
IPTV Subscription in Ireland: Elevating Your Entertainment ExperienceIPTV Subscription in Ireland: Elevating Your Entertainment Experience
IPTV Subscription in Ireland: Elevating Your Entertainment Experience
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 

The Security Value Chain

  • 1. Security Value Chain The Business of Security Value
  • 2. Porter’s Value Chain Firm Infrastructure Human Resource Management Margin Technology Development Procurement Inbound Outbound Marketing Operations Service Logistics Logistics & Sales
  • 3. Your NEW Value Chain You Inbound Outbound Marketing Operations Service Logistics Logistics & Sales
  • 4. Inbound The number one raw Logistics material for the business of security is INFORMATION! Where do you get it from? How do you store it?
  • 5. Operations This is where you add VALUE! What value do you add to the information? What new information do you create? What is it that you and your team do?
  • 6. Outbound Getting that VALUE out to Logistics your customers. Who is your customer? How do you package the information? Is it easy to get? Is it easy to use? It’s all about the DELIVERY.
  • 7. Marketing Better than a Security & Sales Awareness Program! Create demand for your services. Pulling instead of pushing. It’s about CONSTANT communication!
  • 8. Service This is where you maintain VALUE! High touch, high frequency. Strengthen your brand. Broaden your reach. Set SLAs. Live up to them! Incorporate criticism into improvements.
  • 9. Sample Service Map Inbound Operations Outbound Marketing & Service Value Logistics Logistics Sales Chain Vulnerability Prioritizing Reporting Educating Training Data Patch Alerts Correlating Self-Serve Advertising Support Key Functions Event Streams Analyzing Face-to-Face Marketing Response Decision User Inquiries Validating Selling Engagement Support
  • 10. Inbound Logistics Metrics Inbound Logistics Look for trends. Vulnerability Time to remediate. Data Security events by demographic. % of patches released vs. relevant. Patch Alerts Common user inquiries. Event Streams User Inquiries
  • 11. Operations Metrics Operations Measure efficiency ruthlessly Prioritizing # of systems changed in/out of maintenance window. # of projects with security oversight. Correlating Time to decommission accounts. Analyzing Validating
  • 12. Outbound Logistics Metrics Outbound Logistics It’s about engagement Reporting % reports read. Size of communication audience. # of project meetings attended. Self-Serve Frequency of customer contact. Don’t forget packaging! Face-to-Face Decision Support
  • 13. Marketing & Sales Metrics Marketing & Sales Demand generation Educating % of org educated. # of hits to security portal. # of project security checklist Advertising downloads. “Pipeline” of projects. Marketing # of contacts before engagement. Selling
  • 14. Service Metrics Service Stay connected Training Scheduled training events. # of security related support calls. # of reported incidents per unit. Support Time from call to response. % of returning callers. Response % of users trained. Engagement
  • 15. Questions? Brandon Dunlap Managing Director of Research bsdunlap@brightfly.com Twitter: @bsdunlap Brightfly, Inc. www.brightfly.com Twitter: @brightfly