Objective
1. Using conceptual model as a framework (slide 2), begin to identify the desired components
of each platform – Slide 5&6. i.e., Platform Security Solutions that provide the four services.
2. Platforms are not merely a set of tools but rather an entire ecosystem that addresses the
many needs of the company. Slide 3 illustrates those needs (we will collectively improve the
material).
3. Slide 4 illustrates that a platform has a number of different elements.
4. See slide 5&6 - Platform Progression. Using the castle analogy (because it is easy
to explain), identify the elements of each castle design. Use actual data where
possible so that we can anchor the sales people in the as-is versus the to-be with
platforms.
5. Slide 7 is a still in the oven.
Sub objectives: 1.) can we live with the castle analogy? or is there a better one?
2.) Start listing the core tools that we would use in the platform so that we can begin
to plan our engagement with them.
3.) are the services listed the correct ones?
MH Thoughts
1. I like the idea of the conceptual model. It has to drive us towards biggest market, easiest to attack first,
right? I think about business models as single office; single-country, multi-office, that does some
outsourcing with one-way exchanges (ADP Payroll, for example); multi-country that does some
outsourcing, which may include outsourcing processes, creating two-way exchanges (DLR seems like this,
especially with Schneider and Allied Barton); multi-national that operates complex ecosystems;
conglomerate of multi-nationals with multiple, complex ecosystems. It feels like the castle model implies
there is a single entity in control, v. a pyramid or matrix of dependent relationships. For example, the
‘castle wall’ in the Stone Keep model doesn’t show how the ecosystems work – not all companies are
inside the wall, right? Or am I thinking about it incorrectly? It feels more like a marketplace (sorry, but it
fits) where people exchange value in a controlled and secure model. Not sure how this would be
reflected in the castle framework…just thinking about how we create frictionless visibility and security.
2. Agree the platform has to answer the value prop. Is our approach to the platform showing up in the
second bullet of our purpose? Developing end-to-end solutions that identify threats, break through
company silos and resolve issues quickly, often in seconds instead of weeks or months. How would we
approach developing this at at each level? Meaning, if we attack M&B first, what can we assume is in
place already and what do we need to stitch it together and automate? Does our platform progress on
all capabilities for each level v. adding capability as complexity increases? If a company can afford or has
‘x’ already, they are the right size for us to target (x could be service management tool, firewall, ids, etc.).
If a company has more than this, maybe we target them in a different way – telco’s, for example, would
be too sophisticated for us right now. I’d rather focus on sub-$3B companies and work the kinks out, but
certainly align our capabilities (like blockchain, for example) to work in larger organizations. If a company
is a hut, they are probably too small to have the problem we want to solve. Sub $50M maybe? Thinking
anyone that doesn’t have at least one dedicated security person.
3. Want to get on a call together and talk through? I’m not sure if my thinking makes senses or whether we
can keep everyone else along for the ride on the discussion :-)
Conceptual Model
Detection Services
Response Services
Remediation Services
Prevention Services
Plan Build Deliver Run
Finance & Assets
Sourcing & Vendor
Intelligence & Reporting
Resource & Project
Governance, Risk & Compliance
Platform
Security
Solutions
CFO CIO
BOD
CSO
Strategy to Portfolio
M: Metrics
E: Economic Buyer
D: Decision Criteria
D: Decision Process
I: Identify the Pain
C: Champion
Buyer
Persona
User
Persona
Platforms
Platforms
Evidence that
controls are satisfied
Platforms are the capital
augmentation/replacement for skilled
staff
Cost Model?
• Dollars per endpoint
• Cost per incident
What do we want the user to say?
• “I am confident I am working on
real security issues.”
Applicable Security Policy
• Policy
• Procedures (automated & manual)
• Checklists
Compare approach to other
supplier offerings
• What business are we in?
• What business are we not in?
Arbala Directors
• Provide priority
• Provide working content
Politics
• Supplier preference/selection
• Technical content
Elements of Platform Strategy
Detection
Services
Response
Services
Remediation
Services
Prevention
Services
For each Service:
•Service Dimensions
•Tools
•APIs
•Orchestration, if any
Endpoint Protection – Moderate
Crowdstrike – lateral movement
Cylance – Malware outbreaks
Network Security – Open DNS
IPS Intrusion Prevention – Palo Alto
SEIM – Security Event Information
Monitoring (Splunk)
Endpoint Protection – Basic
Crowdstrike – lateral movement
Network Security – Open DNS
• HIPAA (Health Insurance Portability
and Accountability Act)
• Sarbanes Oxley Act
• Federal Information Security
Management Act of 2002 (FISMA)
• Gramm Leach Bliley Act (GLBA)
• Family Educational Rights and
Privacy Act (FERPA)
• Payment Card Industry Data Security
Standard (PCI-DSS)
• General Data Protection Regulation
Tool Chain Controls
• Security Roadmap
packaged and delivered
at a “capitalizable” Price.
• Platform links tool chain,
controls, processes, and
is managed 24x7x365
Strategy
Endpoint Protection – Moderate
Crowdstrike – lateral movement
Cylance – Malware outbreaks
Network Security – Open DNS
IPS Intrusion Prevention – Palo Alto
SEIM – Security Event Information
Monitoring (Splunk)
Security Orchestration - Phantom
• HIPAA (Health Insurance Portability
and Accountability Act)
• Sarbanes Oxley Act
• Federal Information Security
Management Act of 2002 (FISMA)
• Gramm Leach Bliley Act (GLBA)
• Family Educational Rights and
Privacy Act (FERPA)
• Payment Card Industry Data Security
Standard (PCI-DSS)
• General Data Protection Regulation
• HIPAA (Health Insurance Portability
and Accountability Act)
• Sarbanes Oxley Act
• Federal Information Security
Management Act of 2002 (FISMA)
• Gramm Leach Bliley Act (GLBA)
• Family Educational Rights and
Privacy Act (FERPA)
• Payment Card Industry Data Security
Standard (PCI-DSS)
• General Data Protection Regulation
• Customer Account Growth
• Opensource
• Leverage Connections
Network Security – Free Open DNS
Malware Bytes – Enterprise
SEIM - Graylog
• Keep me alive
Hut
Motte & Bailey
Stone Keep
Concentric
• Security Roadmap
packaged and delivered
at a “capitalizable” Price.
• Platform links tool chain,
controls, processes, and
is managed 24x7x365
• Security Roadmap
packaged and delivered
at a “capitalizable” Price.
• Platform links tool chain,
controls, processes, and
is managed 24x7x365
Platform Progression
Tool Chain Controls Strategy
Hut
Motte & Bailey
Stone Keep
Concentric
Platform Progression
Pepsico (Services)
Detection
Response
Remediation
Response
Example ?? Chain of
ecommerce sites
Example ?? Dr’s Office
DLR (Services)
Detection
Response
Remediation
Response
Strategy to Portfolio
CFO CIO
BOD
Arbala Valuation and
Business Model
Security
Management
Platform(s)
Abala Cost of
Operations
Goto Market
Selling
Strategies
CSO
1 - Arbala Valuation and Business Model
• Excel model developed down to the phantom stock award
level.
2 Security Management Platform(s)
2 Security Management Platform(s)
3 Cost of Operations
4 Goto Market – Selling Strategies

More Related Content

PDF
Blockchain and AI - A Perfect Combination?
PPTX
Regaining the Defensive Advantage in Cybersecurity
PDF
A strategy for security data analytics - SIRACon 2016
PDF
How Customer Experience is Driving Application Modernization
PDF
Evolving challenges for modern enterprise architectures in the age of APIs
PDF
Vermont Teddy Bear Essay
PDF
All About Cybersecurity Frameworks.pdf
PPTX
All About Cybersecurity Frameworks.pptx
Blockchain and AI - A Perfect Combination?
Regaining the Defensive Advantage in Cybersecurity
A strategy for security data analytics - SIRACon 2016
How Customer Experience is Driving Application Modernization
Evolving challenges for modern enterprise architectures in the age of APIs
Vermont Teddy Bear Essay
All About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pptx

Similar to Platform Progression (20)

PPTX
Jack Whitsitt - Yours, Anecdotally
PPTX
Business case for concept models
PDF
Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...
PDF
Risksense: 7 Experts on Threat and Vulnerability Management
PDF
Tech Talent Meetup Hacking Security Event Recap
DOCX
CIS502 discussion post responses.Respond to the colleagues posts.docx
PPTX
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
PPTX
Patternbuilders Founder Showcase Deck
PPTX
What i learned at issa international summit 2019
PDF
Giving Organisations new capabilities to ask the right business questions 1.7
PPTX
Top 10 Interview Questions for Risk Analyst.pptx
PPT
Bridging enterprise-architecture and systems-thinking
PPT
Sharing Securely SIMposium 2010
PDF
7 Ideas to Revamp Product Marketing at Duo Security
PDF
Building an enterprise security knowledge graph to fuel better decisions, fas...
PDF
data2day2023_SKuehn_DataPlatformFallacy.pdf
PPTX
Threat modeling (Hacker Stories) workshop
PDF
AWS Tampere Meetup February 2019 - Real World Well-Architected
PDF
Mike Schleif - Executive Biography
PDF
Building A Security Operations Center
Jack Whitsitt - Yours, Anecdotally
Business case for concept models
Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...
Risksense: 7 Experts on Threat and Vulnerability Management
Tech Talent Meetup Hacking Security Event Recap
CIS502 discussion post responses.Respond to the colleagues posts.docx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
Patternbuilders Founder Showcase Deck
What i learned at issa international summit 2019
Giving Organisations new capabilities to ask the right business questions 1.7
Top 10 Interview Questions for Risk Analyst.pptx
Bridging enterprise-architecture and systems-thinking
Sharing Securely SIMposium 2010
7 Ideas to Revamp Product Marketing at Duo Security
Building an enterprise security knowledge graph to fuel better decisions, fas...
data2day2023_SKuehn_DataPlatformFallacy.pdf
Threat modeling (Hacker Stories) workshop
AWS Tampere Meetup February 2019 - Real World Well-Architected
Mike Schleif - Executive Biography
Building A Security Operations Center
Ad

Recently uploaded (20)

PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
PPTX
ai_satellite_crop_management_20250815030350.pptx
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
Measurement Uncertainty and Measurement System analysis
PDF
Introduction to Power System StabilityPS
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PDF
Design of Material Handling Equipment Lecture Note
PPTX
Information Storage and Retrieval Techniques Unit III
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
August -2025_Top10 Read_Articles_ijait.pdf
20250617 - IR - Global Guide for HR - 51 pages.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Soil Improvement Techniques Note - Rabbi
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
CyberSecurity Mobile and Wireless Devices
PRASUNET_20240614003_231416_0000[1].pptx
ai_satellite_crop_management_20250815030350.pptx
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Amdahl’s law is explained in the above power point presentations
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Measurement Uncertainty and Measurement System analysis
Introduction to Power System StabilityPS
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Computer System Architecture 3rd Edition-M Morris Mano.pdf
Design of Material Handling Equipment Lecture Note
Information Storage and Retrieval Techniques Unit III
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Ad

Platform Progression

  • 1. Objective 1. Using conceptual model as a framework (slide 2), begin to identify the desired components of each platform – Slide 5&6. i.e., Platform Security Solutions that provide the four services. 2. Platforms are not merely a set of tools but rather an entire ecosystem that addresses the many needs of the company. Slide 3 illustrates those needs (we will collectively improve the material). 3. Slide 4 illustrates that a platform has a number of different elements. 4. See slide 5&6 - Platform Progression. Using the castle analogy (because it is easy to explain), identify the elements of each castle design. Use actual data where possible so that we can anchor the sales people in the as-is versus the to-be with platforms. 5. Slide 7 is a still in the oven. Sub objectives: 1.) can we live with the castle analogy? or is there a better one? 2.) Start listing the core tools that we would use in the platform so that we can begin to plan our engagement with them. 3.) are the services listed the correct ones?
  • 2. MH Thoughts 1. I like the idea of the conceptual model. It has to drive us towards biggest market, easiest to attack first, right? I think about business models as single office; single-country, multi-office, that does some outsourcing with one-way exchanges (ADP Payroll, for example); multi-country that does some outsourcing, which may include outsourcing processes, creating two-way exchanges (DLR seems like this, especially with Schneider and Allied Barton); multi-national that operates complex ecosystems; conglomerate of multi-nationals with multiple, complex ecosystems. It feels like the castle model implies there is a single entity in control, v. a pyramid or matrix of dependent relationships. For example, the ‘castle wall’ in the Stone Keep model doesn’t show how the ecosystems work – not all companies are inside the wall, right? Or am I thinking about it incorrectly? It feels more like a marketplace (sorry, but it fits) where people exchange value in a controlled and secure model. Not sure how this would be reflected in the castle framework…just thinking about how we create frictionless visibility and security. 2. Agree the platform has to answer the value prop. Is our approach to the platform showing up in the second bullet of our purpose? Developing end-to-end solutions that identify threats, break through company silos and resolve issues quickly, often in seconds instead of weeks or months. How would we approach developing this at at each level? Meaning, if we attack M&B first, what can we assume is in place already and what do we need to stitch it together and automate? Does our platform progress on all capabilities for each level v. adding capability as complexity increases? If a company can afford or has ‘x’ already, they are the right size for us to target (x could be service management tool, firewall, ids, etc.). If a company has more than this, maybe we target them in a different way – telco’s, for example, would be too sophisticated for us right now. I’d rather focus on sub-$3B companies and work the kinks out, but certainly align our capabilities (like blockchain, for example) to work in larger organizations. If a company is a hut, they are probably too small to have the problem we want to solve. Sub $50M maybe? Thinking anyone that doesn’t have at least one dedicated security person. 3. Want to get on a call together and talk through? I’m not sure if my thinking makes senses or whether we can keep everyone else along for the ride on the discussion :-)
  • 3. Conceptual Model Detection Services Response Services Remediation Services Prevention Services Plan Build Deliver Run Finance & Assets Sourcing & Vendor Intelligence & Reporting Resource & Project Governance, Risk & Compliance Platform Security Solutions CFO CIO BOD CSO
  • 4. Strategy to Portfolio M: Metrics E: Economic Buyer D: Decision Criteria D: Decision Process I: Identify the Pain C: Champion Buyer Persona User Persona Platforms Platforms Evidence that controls are satisfied Platforms are the capital augmentation/replacement for skilled staff Cost Model? • Dollars per endpoint • Cost per incident What do we want the user to say? • “I am confident I am working on real security issues.” Applicable Security Policy • Policy • Procedures (automated & manual) • Checklists Compare approach to other supplier offerings • What business are we in? • What business are we not in? Arbala Directors • Provide priority • Provide working content Politics • Supplier preference/selection • Technical content
  • 5. Elements of Platform Strategy Detection Services Response Services Remediation Services Prevention Services For each Service: •Service Dimensions •Tools •APIs •Orchestration, if any
  • 6. Endpoint Protection – Moderate Crowdstrike – lateral movement Cylance – Malware outbreaks Network Security – Open DNS IPS Intrusion Prevention – Palo Alto SEIM – Security Event Information Monitoring (Splunk) Endpoint Protection – Basic Crowdstrike – lateral movement Network Security – Open DNS • HIPAA (Health Insurance Portability and Accountability Act) • Sarbanes Oxley Act • Federal Information Security Management Act of 2002 (FISMA) • Gramm Leach Bliley Act (GLBA) • Family Educational Rights and Privacy Act (FERPA) • Payment Card Industry Data Security Standard (PCI-DSS) • General Data Protection Regulation Tool Chain Controls • Security Roadmap packaged and delivered at a “capitalizable” Price. • Platform links tool chain, controls, processes, and is managed 24x7x365 Strategy Endpoint Protection – Moderate Crowdstrike – lateral movement Cylance – Malware outbreaks Network Security – Open DNS IPS Intrusion Prevention – Palo Alto SEIM – Security Event Information Monitoring (Splunk) Security Orchestration - Phantom • HIPAA (Health Insurance Portability and Accountability Act) • Sarbanes Oxley Act • Federal Information Security Management Act of 2002 (FISMA) • Gramm Leach Bliley Act (GLBA) • Family Educational Rights and Privacy Act (FERPA) • Payment Card Industry Data Security Standard (PCI-DSS) • General Data Protection Regulation • HIPAA (Health Insurance Portability and Accountability Act) • Sarbanes Oxley Act • Federal Information Security Management Act of 2002 (FISMA) • Gramm Leach Bliley Act (GLBA) • Family Educational Rights and Privacy Act (FERPA) • Payment Card Industry Data Security Standard (PCI-DSS) • General Data Protection Regulation • Customer Account Growth • Opensource • Leverage Connections Network Security – Free Open DNS Malware Bytes – Enterprise SEIM - Graylog • Keep me alive Hut Motte & Bailey Stone Keep Concentric • Security Roadmap packaged and delivered at a “capitalizable” Price. • Platform links tool chain, controls, processes, and is managed 24x7x365 • Security Roadmap packaged and delivered at a “capitalizable” Price. • Platform links tool chain, controls, processes, and is managed 24x7x365 Platform Progression
  • 7. Tool Chain Controls Strategy Hut Motte & Bailey Stone Keep Concentric Platform Progression Pepsico (Services) Detection Response Remediation Response Example ?? Chain of ecommerce sites Example ?? Dr’s Office DLR (Services) Detection Response Remediation Response
  • 8. Strategy to Portfolio CFO CIO BOD Arbala Valuation and Business Model Security Management Platform(s) Abala Cost of Operations Goto Market Selling Strategies CSO
  • 9. 1 - Arbala Valuation and Business Model • Excel model developed down to the phantom stock award level.
  • 10. 2 Security Management Platform(s)
  • 11. 2 Security Management Platform(s)
  • 12. 3 Cost of Operations
  • 13. 4 Goto Market – Selling Strategies