SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Rapid7 Webcast:
How to Sell Security to Your CIO
2
Agenda
Introduction
5 Questions You Need to Have Answered Before Approaching Your CIO
Jay Leader
VP of IT & CIO
Presenter
3
There are lots of problems to solve, why this one at
this time?
What’s the value to the business, not just from an IT
standpoint but to the people who run our company?
What are we NOT doing because we’re going to do
this, and why is this the best choice?
4
Question 1: Tell me what problem we’re solving and why
it’s important to solve it
Lead me through your thinking about why the solution you’re
proposing is the right one
What are the main criteria you used to make your choice?
What else did you consider, and why did you reject the other
alternatives?
What’s best about this solution and why will it work better than
the others?
5
Question 2: Why is the solution you’re proposing the right
one?
Have you considered the following factors?
Impact of the implementation on IT resources
The need for business user participation and buy-in and their
availability to support the implementation needs and timeframe
The related soft costs to implement well (training, documentation,
deployment costs)
The ongoing costs of maintaining and supporting/upgrading the
selection, both from a financial and operational standpoint
6
Question 3: What will it take to implement this solution
effectively?
Financial
Business operation/disruption
Political commitments and impacts on you and other
supporters
Skill sets needed to initially implement and to support on
an ongoing basis
Fit and scalability vis a vis the overall technical
architecture
7
Question 4: What are the risks to success and what are you
doing to mitigate them?
What should I expect as an outcome and how will I know the solution
worked?
What are the projected benefits of the project
Metrics used to evaluate improvement
Timeframe to determine/evaluate success
8
Question 5: What should I expect as an outcome and how
will I know that the solution worked?
AUGUST 19 - 21, 2013 Boston Seaport Hotel
Boston, MA
Keynote: Dr. Hugh Thompson, Chief Security Strategist and Senior VP at
Blue Coat, Nate Silver, Author “Signal in the Noise”, voted Most
Creative Mind in Business By Fast Company
16 CPE credits
Nexpose & Metasploit Training available
www.unitedsummit.org
Rapid7’s 2013 UNITED Customer Security Summit
9
Early Bird
Pricing Available
Until June 28th –
save $400!
Thank you
www.rapid7.com

Weitere ähnliche Inhalte

Was ist angesagt?

6 Challenges to Implementing an ECM System & How to Avoid Them-2.pdf
6 Challenges to Implementing an ECM System & How to Avoid Them-2.pdf6 Challenges to Implementing an ECM System & How to Avoid Them-2.pdf
6 Challenges to Implementing an ECM System & How to Avoid Them-2.pdfBenevolence Technologies
 
Software and Tear
Software and TearSoftware and Tear
Software and TearJosh Howell
 
What people analytics can’t capture
What people analytics can’t captureWhat people analytics can’t capture
What people analytics can’t capturesaurabh sethia
 
The Seven Problem Solving Steps
The Seven Problem Solving StepsThe Seven Problem Solving Steps
The Seven Problem Solving StepsDeborah_W
 
Leadership Series #2 - Structured Approach to Problem Solving
Leadership Series #2 - Structured Approach to Problem SolvingLeadership Series #2 - Structured Approach to Problem Solving
Leadership Series #2 - Structured Approach to Problem SolvingZana Gawan-Taylor
 
10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business Resilience10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business ResilienceMichael Bowers
 
How to Estimate An Agile Backlog
How to Estimate An Agile BacklogHow to Estimate An Agile Backlog
How to Estimate An Agile BacklogPragati Sinha
 
Choicce Framework
Choicce FrameworkChoicce Framework
Choicce FrameworkPaul Rijks
 

Was ist angesagt? (18)

Putting Predictive Analytics To Work
Putting Predictive Analytics To WorkPutting Predictive Analytics To Work
Putting Predictive Analytics To Work
 
Building a Reliability Plan
Building a Reliability PlanBuilding a Reliability Plan
Building a Reliability Plan
 
Tips
TipsTips
Tips
 
Making progress in an uncertain world 2nd October 14
Making progress in an uncertain world  2nd October 14Making progress in an uncertain world  2nd October 14
Making progress in an uncertain world 2nd October 14
 
Performance management and agilty
Performance management and agiltyPerformance management and agilty
Performance management and agilty
 
Customer service starts at home v1.key
Customer service starts at home v1.key Customer service starts at home v1.key
Customer service starts at home v1.key
 
6 Challenges to Implementing an ECM System & How to Avoid Them-2.pdf
6 Challenges to Implementing an ECM System & How to Avoid Them-2.pdf6 Challenges to Implementing an ECM System & How to Avoid Them-2.pdf
6 Challenges to Implementing an ECM System & How to Avoid Them-2.pdf
 
Software and Tear
Software and TearSoftware and Tear
Software and Tear
 
What people analytics can’t capture
What people analytics can’t captureWhat people analytics can’t capture
What people analytics can’t capture
 
The Seven Problem Solving Steps
The Seven Problem Solving StepsThe Seven Problem Solving Steps
The Seven Problem Solving Steps
 
APD Presentation PP
APD Presentation PPAPD Presentation PP
APD Presentation PP
 
What is a claims handling pilot?
What is a claims handling pilot?What is a claims handling pilot?
What is a claims handling pilot?
 
Leadership Series #2 - Structured Approach to Problem Solving
Leadership Series #2 - Structured Approach to Problem SolvingLeadership Series #2 - Structured Approach to Problem Solving
Leadership Series #2 - Structured Approach to Problem Solving
 
10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business Resilience10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business Resilience
 
How to Estimate An Agile Backlog
How to Estimate An Agile BacklogHow to Estimate An Agile Backlog
How to Estimate An Agile Backlog
 
Choicce Framework
Choicce FrameworkChoicce Framework
Choicce Framework
 
Decision Making Process ppt
Decision Making Process pptDecision Making Process ppt
Decision Making Process ppt
 
Technology commercialization
Technology commercializationTechnology commercialization
Technology commercialization
 

Andere mochten auch

Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC
 
LicensingScopeAndBoundaries
LicensingScopeAndBoundariesLicensingScopeAndBoundaries
LicensingScopeAndBoundariesWilliam Francis
 
Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infobloxislamet
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminarpatmisasi
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMMundo Contact
 
DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6Andreas Taudte
 
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret WeaponUberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret WeaponInfer
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutionsFrank Victory
 
7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enoughCloudAccess
 

Andere mochten auch (20)

Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalytics
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
LicensingScopeAndBoundaries
LicensingScopeAndBoundariesLicensingScopeAndBoundaries
LicensingScopeAndBoundaries
 
Bmit meet theexperts_2013
Bmit meet theexperts_2013Bmit meet theexperts_2013
Bmit meet theexperts_2013
 
Workgroup Issues
Workgroup IssuesWorkgroup Issues
Workgroup Issues
 
Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infoblox
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminar
 
Long Infoblox
Long InfobloxLong Infoblox
Long Infoblox
 
Ipadd mngt
Ipadd mngtIpadd mngt
Ipadd mngt
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
 
Cyber crime v3
Cyber crime v3Cyber crime v3
Cyber crime v3
 
DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6
 
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret WeaponUberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutions
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough
 
Advanced DNS Protection
Advanced DNS ProtectionAdvanced DNS Protection
Advanced DNS Protection
 

Ähnlich wie How to Sell Security to Your CIO

Millionaire Game Discovery And Data Gathering
Millionaire Game   Discovery And Data GatheringMillionaire Game   Discovery And Data Gathering
Millionaire Game Discovery And Data Gatheringtjcarter
 
Building a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platformBuilding a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platformProcessMAP Corporation
 
Project on IFB Industries Ltd.
Project on IFB Industries Ltd.Project on IFB Industries Ltd.
Project on IFB Industries Ltd.Kaustubh Taparia
 
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxAssignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxcarlibradley31429
 
Doniel Wilson Presents: Surviving the Shift. Agile and its Impact to your Fut...
Doniel Wilson Presents: Surviving the Shift. Agile and its Impact to your Fut...Doniel Wilson Presents: Surviving the Shift. Agile and its Impact to your Fut...
Doniel Wilson Presents: Surviving the Shift. Agile and its Impact to your Fut...Liana Underwood
 
Strategic Thinking, TCF and Action Plans
Strategic Thinking, TCF and Action PlansStrategic Thinking, TCF and Action Plans
Strategic Thinking, TCF and Action PlansRupinder K Gill
 
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...Audrey Reynolds
 
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesIllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesCraig Miller
 
Are You Really Agile?
Are You Really Agile?Are You Really Agile?
Are You Really Agile?mhambalek
 
BUSINESS INTELLIGENCE REPORT .docx
BUSINESS INTELLIGENCE REPORT                                      .docxBUSINESS INTELLIGENCE REPORT                                      .docx
BUSINESS INTELLIGENCE REPORT .docxRAHUL126667
 
Harbin Clinic Presentation | Part 2
Harbin Clinic Presentation | Part 2Harbin Clinic Presentation | Part 2
Harbin Clinic Presentation | Part 2Michael Burcham
 
Conversion Conference 2011 NYC presentation
Conversion Conference 2011 NYC presentationConversion Conference 2011 NYC presentation
Conversion Conference 2011 NYC presentationBrian Jones
 
10 Steps to Developing an Effective Learning Solution Business Case
10 Steps to Developing an Effective Learning Solution Business Case10 Steps to Developing an Effective Learning Solution Business Case
10 Steps to Developing an Effective Learning Solution Business CaseRyan Shirah
 
Business analysis1.9 - business side
Business analysis1.9 - business sideBusiness analysis1.9 - business side
Business analysis1.9 - business sideAnton Galitskiy
 
Bringing User-Centered Design Practices into Agile Development Projects
Bringing User-CenteredDesign Practices intoAgile Development ProjectsBringing User-CenteredDesign Practices intoAgile Development Projects
Bringing User-Centered Design Practices into Agile Development Projectsabcd82
 
Com 140 check point different kinds of messages
Com 140 check point different kinds of messagesCom 140 check point different kinds of messages
Com 140 check point different kinds of messagesrothscarttispi1982
 

Ähnlich wie How to Sell Security to Your CIO (20)

Millionaire Game Discovery And Data Gathering
Millionaire Game   Discovery And Data GatheringMillionaire Game   Discovery And Data Gathering
Millionaire Game Discovery And Data Gathering
 
Building a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platformBuilding a business case & selecting an ehs mis platform
Building a business case & selecting an ehs mis platform
 
Project on IFB Industries Ltd.
Project on IFB Industries Ltd.Project on IFB Industries Ltd.
Project on IFB Industries Ltd.
 
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxAssignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
 
Doniel Wilson Presents: Surviving the Shift. Agile and its Impact to your Fut...
Doniel Wilson Presents: Surviving the Shift. Agile and its Impact to your Fut...Doniel Wilson Presents: Surviving the Shift. Agile and its Impact to your Fut...
Doniel Wilson Presents: Surviving the Shift. Agile and its Impact to your Fut...
 
Strategic Thinking, TCF and Action Plans
Strategic Thinking, TCF and Action PlansStrategic Thinking, TCF and Action Plans
Strategic Thinking, TCF and Action Plans
 
Top 10 Tips
Top 10 TipsTop 10 Tips
Top 10 Tips
 
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...
 
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesIllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance Principles
 
Compliance as Culture Strategy
Compliance as Culture StrategyCompliance as Culture Strategy
Compliance as Culture Strategy
 
Are You Really Agile?
Are You Really Agile?Are You Really Agile?
Are You Really Agile?
 
BUSINESS INTELLIGENCE REPORT .docx
BUSINESS INTELLIGENCE REPORT                                      .docxBUSINESS INTELLIGENCE REPORT                                      .docx
BUSINESS INTELLIGENCE REPORT .docx
 
How to make training stick
How to make training stickHow to make training stick
How to make training stick
 
Harbin Clinic Presentation | Part 2
Harbin Clinic Presentation | Part 2Harbin Clinic Presentation | Part 2
Harbin Clinic Presentation | Part 2
 
Conversion Conference 2011 NYC presentation
Conversion Conference 2011 NYC presentationConversion Conference 2011 NYC presentation
Conversion Conference 2011 NYC presentation
 
10 Steps to Developing an Effective Learning Solution Business Case
10 Steps to Developing an Effective Learning Solution Business Case10 Steps to Developing an Effective Learning Solution Business Case
10 Steps to Developing an Effective Learning Solution Business Case
 
Business analysis1.9 - business side
Business analysis1.9 - business sideBusiness analysis1.9 - business side
Business analysis1.9 - business side
 
Bringing User-Centered Design Practices into Agile Development Projects
Bringing User-CenteredDesign Practices intoAgile Development ProjectsBringing User-CenteredDesign Practices intoAgile Development Projects
Bringing User-Centered Design Practices into Agile Development Projects
 
Guide decisions
Guide decisions Guide decisions
Guide decisions
 
Com 140 check point different kinds of messages
Com 140 check point different kinds of messagesCom 140 check point different kinds of messages
Com 140 check point different kinds of messages
 

Mehr von Rapid7

[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...Rapid7
 
OpenSSL Heartbleed Vulnerability Explained & Tips for Protection
OpenSSL Heartbleed Vulnerability Explained & Tips for ProtectionOpenSSL Heartbleed Vulnerability Explained & Tips for Protection
OpenSSL Heartbleed Vulnerability Explained & Tips for ProtectionRapid7
 
How to Manage Your Security Control's Effectiveness
How to Manage Your Security Control's EffectivenessHow to Manage Your Security Control's Effectiveness
How to Manage Your Security Control's EffectivenessRapid7
 
Penetration Testing Techniques - DREAD Methodology
Penetration Testing Techniques - DREAD MethodologyPenetration Testing Techniques - DREAD Methodology
Penetration Testing Techniques - DREAD MethodologyRapid7
 
Life's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL InjectionLife's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL InjectionRapid7
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7
 
Rapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7
 
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Rapid7
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher EducationRapid7
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraRapid7
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityRapid7
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?Rapid7
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMRapid7
 

Mehr von Rapid7 (18)

[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
 
OpenSSL Heartbleed Vulnerability Explained & Tips for Protection
OpenSSL Heartbleed Vulnerability Explained & Tips for ProtectionOpenSSL Heartbleed Vulnerability Explained & Tips for Protection
OpenSSL Heartbleed Vulnerability Explained & Tips for Protection
 
How to Manage Your Security Control's Effectiveness
How to Manage Your Security Control's EffectivenessHow to Manage Your Security Control's Effectiveness
How to Manage Your Security Control's Effectiveness
 
Penetration Testing Techniques - DREAD Methodology
Penetration Testing Techniques - DREAD MethodologyPenetration Testing Techniques - DREAD Methodology
Penetration Testing Techniques - DREAD Methodology
 
Life's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL InjectionLife's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL Injection
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance Guide
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance Guide
 
Rapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance Guide
 
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher Education
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
 

Kürzlich hochgeladen

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

How to Sell Security to Your CIO

  • 1. Rapid7 Webcast: How to Sell Security to Your CIO
  • 2. 2 Agenda Introduction 5 Questions You Need to Have Answered Before Approaching Your CIO
  • 3. Jay Leader VP of IT & CIO Presenter 3
  • 4. There are lots of problems to solve, why this one at this time? What’s the value to the business, not just from an IT standpoint but to the people who run our company? What are we NOT doing because we’re going to do this, and why is this the best choice? 4 Question 1: Tell me what problem we’re solving and why it’s important to solve it
  • 5. Lead me through your thinking about why the solution you’re proposing is the right one What are the main criteria you used to make your choice? What else did you consider, and why did you reject the other alternatives? What’s best about this solution and why will it work better than the others? 5 Question 2: Why is the solution you’re proposing the right one?
  • 6. Have you considered the following factors? Impact of the implementation on IT resources The need for business user participation and buy-in and their availability to support the implementation needs and timeframe The related soft costs to implement well (training, documentation, deployment costs) The ongoing costs of maintaining and supporting/upgrading the selection, both from a financial and operational standpoint 6 Question 3: What will it take to implement this solution effectively?
  • 7. Financial Business operation/disruption Political commitments and impacts on you and other supporters Skill sets needed to initially implement and to support on an ongoing basis Fit and scalability vis a vis the overall technical architecture 7 Question 4: What are the risks to success and what are you doing to mitigate them?
  • 8. What should I expect as an outcome and how will I know the solution worked? What are the projected benefits of the project Metrics used to evaluate improvement Timeframe to determine/evaluate success 8 Question 5: What should I expect as an outcome and how will I know that the solution worked?
  • 9. AUGUST 19 - 21, 2013 Boston Seaport Hotel Boston, MA Keynote: Dr. Hugh Thompson, Chief Security Strategist and Senior VP at Blue Coat, Nate Silver, Author “Signal in the Noise”, voted Most Creative Mind in Business By Fast Company 16 CPE credits Nexpose & Metasploit Training available www.unitedsummit.org Rapid7’s 2013 UNITED Customer Security Summit 9 Early Bird Pricing Available Until June 28th – save $400!