Thu, 25 September 2008
This week we'll focus on the 2nd half of Step 6: Buying Security Products, which get down and dirty in picking the product. We've already engaged with a long list of potential vendors (we discussed that last week) and now it's time to figure out what will work for you.
Next we do a bake-off and actually test the products under real world conditions. Then we develop our short list (based on products that can meet the need), then we get to negotiate. Get out your bat because that's what you'll be using. Finally the selection should be obvious if you've done the other steps correctly.
If you didn't get the Buying
Security Products ebook,
you can sign up for the Daily Incite email newsletter. If you read TDI
via a blog feed, just send me an email and I'll forward the guide over
Running time: 6:56
Wed, 17 September 2008
As we jump into Step 6: Buying Security Products, it makes sense to understand what kind of homework we are going to have to do prepare for the process. Remember, it's easy to buy something, it's hard to buy the right thing at the right time for the right price.
So this week we discuss the first 4 steps of the Buying Security Products process I published back in 2006. The first step is to understand the business drivers for your project, then you assemble the team, then you educate YOURSELF on the market (don't let the vendors educate you), and only then are you ready to engage with a long list of vendors that can potentially meet the need.
If you want to check out the Buying Security Products ebook, you can sign up for the Daily Incite email newsletter. If you read TDI via a blog feed, just send me an email and I'll forward the guide over to you.
Wed, 13 August 2008
It's time to wrap up Step 5: Selling the Story. We finish the discussion by talking about how to get funding, when the budget monkeys have told you no. Basically we have to take a "grass roots funding" approach to go to the business leaders directly, make the case, and get the funding we need. It's kind of like selling cookies door to door. We have to be persistent and make the case as to why it would be a good purchase.
This requires us to broaden our skills and likely move out of our comfort zone quite a bit. It's uncomfortable, but it's a good thing. Just remember to focus on the "customer" issues, and that the Reasons to Secure. The business leaders will respond to that. Ultimately you may not get the funding you need, but you won't go down like a whimpering puppy. You'll go down swinging, trying to do the right thing.
Running time: 6:29
Intro music is Jungle and I finish it up with Dire Straits "Money for Nothing," because that is an appropriate metaphor. There is no money for nothing. We have to work for it and sometimes that means being creative about the funding we can/should get.
Photo Credit: weskimcom
Wed, 30 July 2008
July 30, 2008 - This week we talk about the sales pitch. This is the part that most security practitioners hate. Actually having to get in front of folks and ask for money. Although if you've followed the process up to now, then you should be in great shape to put together a compelling story and to deliver that message to the senior team.
In this week's episode (can you believe it's #20 already?), I go into detail about how to structure the sales pitch and what you should discuss and why. We are reminded about what the goals are and also the importance of practice - especially if you are an inexperienced public speaker.
Running time: 6:52
Intro music is Jungle and since we are talking about making a "pitch" and it's the middle of summer (in the Northern Hemisphere anyway) I broke out John Fogerty's classic baseball anthem, "Centerfield." Enjoy!
Photo Credit: XPLANE
PS: My apologies for some spotty audio quality this week. You can hear everything, but I tried out a new headset and it didn't work out too well. Back to the old gear next week!
Wed, 2 July 2008
This week we continue with Step 5: Selling the Story by reiterating the need to manage expectations appropriately. As you know, this is a common theme throughout the Pragmatic CSO, but when we are selling senior management on the security program, strategy, outputs, milestones, and funding requirements - now is really the last time we'll have to truly set expectations.
If you screw this up now, you will not be successful. Now is
the time to stand firm with your milestones and what you can (and can't
get done) given the funding scenarios (that we described last week). I
use the old parable about the 3 envelopes to illustrate how you need to
constantly go back and reset expectations based upon what is happening
Running time: 6:02
Wed, 25 June 2008
June 25, 2008 - This week we start into Step 5: Selling the Story by discussing funding scenarios. This is a technique that Pragmatic CSOs use to provide some alternatives and make the scenario we want (the likely one) a bit more tangible by providing alternatives.
In the show, I discuss how to develop these scenarios using your Security Architecture Matrix and then why it's important to discuss what won't get done, as part of these funding scenarios.
Running time: 6:20
Intro music is Jungle and you are sent on your merry way with the fine sounds of "Put Your Money Where Your Mouth Is" from an Australian band called Jet. That's pretty appropriate because in Step 5 we ask the senior team to start writing checks, and then we'll figure out if they really will put up.
Photo Credit: drewm
Wed, 18 June 2008
Finally we come to the end of the line on building the security business plan. It was a long time coming, but again this is the most important step in effecting long lasting change in your security organization. First I talk about defining the future state, and setting priorities relative to what you must have, should have, and is nice to have.
Then it's all about setting up the migration plan, which needs
to be in alignment with the timelines and milestones that we discussed
last week. A lot of this stuff happens simultaneously, but it's very
important to manage expectations appropriately at this stage of the
Running time: 6:50
Wed, 11 June 2008
This week we delve into the art of setting timelines and milestones within your business plan. After we discussed the importance of setting the bar (in terms of service levels), it's the timelines that really will determine your ultimate credibility with the senior team.
Once you define the key timelines, it's also important to have a process to revisit the project plans and to communicate variances. You need to expect that some of the initiatives will run off the track a bit and ensure you are aggressive about communicating the issues.
Running time: 7:05
Intro music is Jungle and the exit music is "Time" from Pink Floyd. Like you expected anything else.
Wed, 28 May 2008
This week we talk about service levels within the context of your security business plan. That's right, this is about setting the bar. Too high and you can't get there and you will be viewed upon as a failure in the executive wing. Too low and you may open yourself up to a breach on your watch. So we are looking for something "just right."
We also need to start thinking about how to quantify some of
the stuff we are doing, and now is not the time to look for innovative
means of pulling security metrics. We need to take some data the powers
that be are already used to and then set some achievable service
levels. Remember, this is about building credibility, not showing how
cool you are.
Running time: 6:50
Thu, 22 May 2008
Ah the mysteries of architecture. I can remember back to my days in college at Cornell. We had a great architecture school, but those folks seemed like magicians. They weren't around too much and it seemed like they were doing cool things, we engineers just didn't understand what it was.
Understanding how to build your security architecture isn't all that different. So this week, I delve into the nuances of architecture vs. design and also provide a brief description of the "Pragmatic Security Architecture," (click on the link to see the picture) which is my attempt to break the world into some domains that make sense.
The picture to the right is of the Cornell Architecture school, where they have a Dragon Day tradition that involves building a giant dragon and then marching over to the Engineering Quad and setting it on fire on the Arts Quad (I think). I guess there is rivalry between the two schools, but I was too busy funneling beers to notice.
Running time: 6:53
Intro music is Jungle and sign off with Sarah McLachlan's "Building a Mystery." The sad truth is that most of us don't really get how to build much of anything, and this security stuff is truly a mystery - so that seemed pretty fitting.
Wed, 14 May 2008
This week we are going to dig a bit deeper into the business plan and deal with the first two sections of the plan. Initially we need to POSITION our securirty organization. What are we doing and why is it important? Then we need to make our PRIORITIES very clear. What do we focus on first and why?
The business plan is as much for them (meaning your senior executives and the like) as it is for you. So you need to start the plan off with a bunch of information about them, before you get back to what you are going to do.
Running time: 6:45
Intro music is Jungle and we end with Ben Folds' "Don't Change Your Plans." Obviously the plan must adapt given the dynamic nature of our businesses, but by building the plan with the customer in mind you won't be changing it based upon the way the wind blows.
Wed, 7 May 2008
This week we get back into the Pragmatic CSO methodology, and jump into Section 2: Building Your Pragmatic Security Environment. The first step in S2 is Step 4 or Building Your Security Business Plan. Why do we need a business plan anyway? What's the point?
All is revealed in podcast #12. Well OK, not all - but I lay the groundwork on why the business plan is probably the most important of the 12 steps and what goes into building it. Over the next 2 months or so, we'll be delving deeply into the business plan and the associated efforts to "sell" the strategy to the senior team.
So, buckle up as we take off for the next leg of the P-CSO journey.
Running time: 5:52
Intro music is Jungle and I sign off with Acquiesce from Oasis' Masterplan album. Since the security business plan is YOUR Masterplan, I thought that was appropriate.
Wed, 23 April 2008
This week I take another tangential journey to discuss a concept I call "The Fixer." You know, when a senior staffer is airlifted in to "fix" security. The Fixer knows how to get things done in your organization, and can certainly be viewed as a threat and as indicative of the fact that security is broken.
How should you deal with the Fixer? Why is he (or she) there? Can you turn this into an advantage?
Check out podcast #11 and find out...
Running time: 6:40
Intro music is Jungle and I sign off with the classic Kool and the Gang anthem "Jungle Boogie," which is the song I associate most with Pulp Fiction. Yes, that's where I stole the term "The Fixer."
Wed, 16 April 2008
April 16 2008 -
Today I go on a bit of a tirade. Basically, just coming back from RSA - I'm a bit sensitive to vendor claims vs. reality. Thus, after I've been pounded by a webcast announcement from AlertLogic for the past week about "PCI Compliance made Easy." After I cleaned the puke off my desk, I needed to rant a bit. So this week's podcast is a little different. All rant, no filler.
Here is the invite, so you have some context... The event is today, so you can figure out just how "easy" security is.
Pre-Register for this Upcoming Webcast on SearchSecurity.com:
* Simple & Affordable PCI Compliance with Alert Logic
VENDOR WEBCAST: Simple & Affordable PCI Compliance with Alert Logic
WHEN: LIVE! April 16, 2008 at 2:00 PM EDT (1800 GMT)
SPEAKER: Nick Ignatiev, Sales Engineer, Alert Logic
SPONSOR: Alert Logic
ABOUT THIS VENDOR WEBCAST:
In this webcast, you will discover:
* An easy solution for addressing the PCI DSS requirements for
intrusion protection, vulnerability management, and log management
* Strategies for compliance that don't strain employee or budget
* The ways that your company can pass an audit quickly and easily
* And more...
Thu, 20 March 2008
This week we wrap up our stop in Step 3: Managing Expectations by talking about the long term plan. The first step of the managing expectations presentation is all about providing the context of the program and educating the senior team about why it's important. Then next step is about triage. Based on the baseline, what are the most important things that need to be tackled RIGHT NOW. Finally, we are in a position to start accepting responsibility for the long term success of the security program and ensure they senior team understands YOU are accountable for it's results. This final aspect of the presentation is all about mapping out the next few steps, setting milestones and starting to make those deposits in the credibility bank.
Running time: 5:22
Intro music is Jungle and I sign off with Madness' "Our House," mostly because today is the first day of the NCAA basketball tournament, so there is a lot of March Madness going around Incite Central.
Wed, 12 March 2008
This week we continue our journey through Step 3: Managing Expectations and talk about how to present the "bad news," as part of your efforts to ensure the senior team knows what you are up to and why. The triage part of the discussion is also pretty important because it will indicate whether you have a snowball's chance in hell of actually making progress on the program. If you can't get agreement on the 2 or 3 things you think are most important to do TODAY - then it doesn't bode well for the stuff you want to do tomorrow and the day after that.
Running time: 6:27
Intro music is Jungle (get used to it, it's not changing unless the copyright police come to visit), and we finish up with a live excerpt of Bon Jovi's "Bad Medicine," since that's the news we tend to deliver during triage.
Thu, 6 March 2008
This week we dive into Step 3: Managing Expectations and investigate why one of the most important things a security professional can do is to give the senior team the PERCEPTION that you're in CONTROL of the situation. Reality means little, perception means everything.
A couple of the topics covered include:
- Why managing expectations around security is hard
- How to provide context about what a security program is about
- The 3 most important ideas to convincing someone you have your act together.
Running time: 6:35
Intro music is Jungle, and we send you on your merry way with Alice Cooper's "School's Out."
Wed, 27 February 2008
This week we wrap up on Step 2: Taking the Baseline by being candid with ourselves and really understanding if we have a skills gap. This is one of the most brutal parts of being a manager, but it needs to be done.
I refer to a few books from the Gallup Organization, so you can understand what may be a different way of thinking about management. First, Break All the Rules and Now, Discover Your Strengths.
I don't have to manage much of anything nowadays, but these resources and philosophy were instrumental in being able to build great teams when I had to, and at the end of the day if you team isn't great - you can't be.
Running time: 6:57
Next week, we'll start up with Step 3: Managing Expectations.
Photo credit: Márcio Cabral de Moura
Wed, 13 February 2008
This week, we continue our journey through Step 2: Baseline Your Environment. Here are a couple of the topics covered:
Intro music is Jungle and I sign off with Ozzy's No More Tears. Yes, one of the classic bass lines in rock.
Image credit: hello_heiko
Fri, 8 February 2008
February 8, 2008:
This week's show starts to delve into Step 2: Establishing the Baseline.
Why you need to do this, what you are trying to achieve, and a little bit on policies (such as a monitoring policy and a communications plan).
Intro music is once again "Welcome to the Jungle" and I send you on your way with Aerosmith's "Get a Grip," since that is what taking the baseline is all about.
Tue, 29 January 2008
Now you can take the P-CSO on your iPod with you. This is great news, so now I can haunt you in your car, on an airplane, or even when you are running. Although since all of the podcasts are 6-7 minutes, it wouldn't be much of a run I guess.
To get the podcast, click this link and then it should direct you to iTunes to subscribe to the podcast. Screenshot of what you should see is below.
Category:podcasts -- posted at: 7:22am EDT
Wed, 23 January 2008
In this week's show I talk about getting facetime without feeling like you are banging your head against the wall. Basically a key part of Step #1 and in a broader perspective, your success as a CSO is about building relationships with the senior team and understand what is important to them. How do you do this, when they are pretty busy and don't really want to spend any time with you?
map out a 3 step process (and hopefully you only need two steps) to get
on their calendar and also talk about the need for persistence. The
podcast runs for 6:05.
Music this week is (of course), the Jungle intro and Peter Gabriel's "Don't Give Up" to send you on your merry way.
Direct Download: 03_Pragmatic_CSO_Podcast_3.mp3
Wed, 16 January 2008
January 16, 2008 -
Today's show talks about Whack a Mole and why it's an appropriate metaphor for information security nowadays.
Image source: http://www.creativepro.com/
Fri, 11 January 2008
January 11, 2008 -
Welcome to the Inaugural Pragmatic CSO Podcast. In today's show, I talk a bit about: