How and When Do You Trust a Security Vendor?

How and When Do You Trust a Security Vendor?

CISO | Security Vendor Relationship Series

This week's article for the CISO/Security Vendor Relationship Series

How and When Do You Trust a Security Vendor?

In all my interviews for this series, one topic keeps coming up again and again, and that's the need for trust.How do buyers make trust judgments and how does that add up to a final purchase?Read the article for additional questions on these issues on how buyers are building trust with a security vendor:

  • The importance of the first engagement: Is it do or die, or are you more willing to accept an initial failed attempt? 

  • Aggressive vs. passive sales techniques: Aggressive doesn't necessarily mean annoying, it just means they're doing everything they can to make the sale. And passive doesn't necessarily mean they're doing nothing, it's just their pitch isn't always directed at the potential buyer.

  • Where do you seek validation: Are you OK with your own judgement or do you seek outside verification for vendors to consider, and they one you ultimately choose?

  • Are security products interchangeable? Assuming the exit and entry costs were negligible, would you follow a salesperson if they moved to a competitive vendor?

  • Are you quantifying trust or is it a gut response? Do you take in these variables and many more into account, or is your trust purely a "feeling?"

Programming note:

CISO/Security Vendor Relationship Podcast is off this week for the holiday. We'll return next week.

SUBSCRIBE TO THE PODCAST

Got a podcast catcher? Search for "CISO" and chances are you'll find the CISO/Security Vendor Relationship Podcast. If it doesn't come up, go ahead and click on any of these links to subscribe to the feed.

If you're already a subscriber, THANK YOU! If you like the show, please tell all your friends on social media and write a review on Apple Podcasts.

THANKS to newsletter sponsorVerkada builds enterprise security cameras that combine cutting-edge camera technology with intelligent, cloud-based software—all in a secure, user-friendly solution. Unlike legacy systems, Verkada’s technology offers the protection of full encryption and is easy to install, configure, upgrade, and expand.

This week's video:

Best Responses to "4 Effective Targeted Techniques to Marketing GDPR"

Best Responses to "4 Effective Targeted Techniques to Marketing GDPR"

When the audience responds, I respond back, with a video. Here's a short video highlighting my favorite comments to the article "4 Effective Targeted Techniques to Marketing GDPR."

APPEAR IN THE NEXT VIDEO

I'm very fortunate to have a wise and passionate audience that provides tons of insight for the articles I write. Have some advice or opinions regarding my most recent article, "How and When Do You Trust a Security Vendor?" If so, please leave your thoughts on the LinkedIn post. Like you see in the above video, best comments make it to the featured video.

Sponsor the podcast or the series!

The CISO/Security Vendor Relationship Series will soon be in its new home. You'll see more articles, videos, an ebook, and webinars. We've been extremely fortunate to have a number of vendors eager to sponsor the podcast and the series. You could be the next one.

If you'd like to sponsor the podcast or the full series please reply to this email or connect with me on LinkedIn.