- CISO Series Newsletter
- Posts
- 11-12-19 - Do's And Don'ts of Trashing Your Competition
11-12-19 - Do's And Don'ts of Trashing Your Competition
Do's And Don'ts of Trashing Your Competition
This week's episode of CISO/Security Vendor Relationship Podcast
Do's And Don'ts of Trashing Your Competition
On
, special guest co-host, Mark Eggleston, CISO, Health Partners Plans, and our guest Anahi Santiago, CISO, ChristianaCare Health System. discussed:
CISOs appreciate pointed debate, not trash talking, among vendors.
Vendors understandably become frustrated when a competitor tries to show expertise for which they may not be an expert. Instead of just saying we've got more experience than you, use that opportunity to make a pointed argument. It can often be a grand opportunity to "fight up" and be seen as equal to a much larger competition.
CISO as political operative.
Sometimes you find yourself in a situation where you have to agree to something against your best interests from a security standpoint. When a merger between two companies happens, one will often have a better security posture. It may simply be too difficult or not in the larger company's mandate to accept a smaller company's "more secure program."
Should vendor invites avoid the weekend or not?
Plenty of debate on this topic and you can't make everyone happy. Your best bet is to provide options, and those options shouldn't be far too lavish. Our CISOs admitted to having to turn down offers of seeing U2 and the Superbowl because they felt they went over the line of accepting a "small gift."
Special thanks to this week's CISO/Security Vendor Relationship Podcast sponsors: Trend Micro, Thinkst, and Secure Controls Framework.
Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. For more information, visit
.
Most companies find out way too late that they've been breached. Thinkst Canary changes this. Find out why the Thinkst Canary is one of the most loved products in the business and why the smartest security teams in the world run Canary. Visit
is a meta-framework – a framework of frameworks. This free solution is available for companies to use to design, implement and manage their cybersecurity and privacy controls in an efficient and sustainable manner. Our approach provides a comprehensive solution to manage complex compliance needs.
CISO Series Video Chat (Friday, 11/15/19 at 10 AM Pacific)
Hacking the Hiring Process:
An hour of critical thinking on what we can actively improve about the process of hiring cybersecurity professionals
The hiring process could use a swift kick in the butt. We're going to focus mostly on parts of the process. What has to be there (legal or regulatory purposes) and what could be trashed? What slows down the process? What speeds it up? How can it be done en masse? Joining me, David Spark, producer of the CISO Series will be Brent Williams, CISO, SurveyMonkey, and Nick Falcone, CISO, University of Pennsylvania.Anyone else can join and be a part of the discussion. Please REGISTER and be part of the event this Friday.
Hacking the Boardroom Meeting
of “Hacking the Boardroom Meeting: An hour of critical thinking about communicating with the C-suite”.
Joining me in this discussion are Gary Hayslip, CISO, SoftBank Investment Advisers and cybersecurity consultant, Yael Nagler.
If you're not already participating in our weekly CISO Series Video Chats, start signing up. The next one is in the blue section just above this.
SUBSCRIBE TO BOTH PODCASTS
Go ahead and click on any of these links to subscribe to the podcast feed of your favorite podcast catcher.
If you're already a subscriber, THANK YOU! If you like either or both shows, please tell all your friends on social media and write a review on iTunes.