SlideShare a Scribd company logo
Selling Data security
             to the CEO



    Licensed under the Creative Commons Attribution License
                        Danny Lieberman
    dannyl@controlpolicy.com http://www.controlpolicy.com/ 

                               
Sell high




               “it's a lot easier to manage a 
                big project than a small one”




    Boaz Dotan – Founder of Amdocs (NYSE:DOX), $5.3BN Cap.
                                  
Agenda



•   Introduction and welcome
•   What is data security?
•   Defining the problem
•   After Enron
•   Weak sales strategy
•   The valley of death
•   Strong sales strategy
•   Execution




                            
Introduction




• Our mission today
    –   How to sell data security to the CEO




                       
What the heck is data security?




•   Security
     –   Ensure we can survive & add value
           •   Physical, information, systems, people
•   Data security
     –   Protect data directly in all realms




                           
Defining the problem




•   You can't sell to a need that's never been 
    observed(*)

     –   Little or no monitoring of data
         theft/abuse
            •   Perimeter protection, access control
                   –   Firewall/IPS/AV/Content/AD




                                                        Lord Kelvin
                                       (*) Paraphrase of 
What happened since Enron


•       Threat scenario circa 1999
         –    Bad guys outside
         –    Lots of proprietary protocols
         –    IT decides
•       Threat scenario circa 2009
         –    Bad guys inside
         –    Everything on HTTP
         –    Vendors decide




                               
Weak sales strategy




IT – 
data security is 
“very important”
...Forrester



                         Management board – 
                         fraud/data theft can maim or 
                         destroy the company
                         ...Sarbanes­Oxley

                      
Mind the gap



IT – 
We can get DLP 
technology for 100K 
and the first 6 
months are free.
...Websense


                           Management board – We 
                           have Euro 100M VaR
                           ...PwC


                        
The valley of death


      Logical &rational

                                                                             Emotional & Political


IT Requirements 
                   Compliance 
                   requirements   Meet                                            Close
                                  vendors     Evaluate
                                              alternatives
                                                             Capabilities                            Project
                                                             Presentation



                                       Talk to
                                       analysts
                                                                            Losing control




       Month 1                                    Month 5                                      Month 12­18
                                                         
Why you lose control




•   Issues shift
     –   Several vendors have technology
           •   Non-product differentiation
•   Divided camps
     –   Nobody answers all requirements
           •   Need a political sponsor
•   Loss of momentum
     –   No business pain
     –   No power sponsors

                           
Strong sales strategy




•   Build business pain
     –   Focus on biggest threat to the firm
     –   Rational


•   Get a power sponsor
     –   CEO,COO, CFO,CIO
     –   Personal



                        
Close the gap


Toxic customer data 
­ VaR: 100M
­ VaR reducation: 20M
­ Cost: 1M over 3 years
...Security & Risk



                              Management board – We 
                              have 100M VaR
                              ...PwC


                           
Execution – building business pain




•    Prove 2 hypotheses:
      –   Data loss is happening now.
      –   A cost effective solution exists that
          reduces risk to acceptable levels.




                          
H1: Data loss is happening




•   What keeps you awake at night?
•   What data types and volumes of data leave the network?
•   Who is sending sensitive information out of the company?
•   Where is the data going?
•   What network protocols have the most events?
•   What are the current violations of company AUP?




                                      
H2: A cost effective solution exists




•    Value of information assets on PCs, servers & mobile devices?
•    What is the Value at Risk?
•    Are security controls supporting the information behavior you want 
     (sensitive assets stay inside, public assets flow freely, controlled 
     assets flow quickly)
•    How much do your current security controls cost?
•    How do you compare with other companies in your industry?
•    How would risk change if you added, modified or dropped security 
     controls?




                                     
What keeps you awake at night


                  Asset has value, fixed over time or variable
                     Plans to privatize, sell 50% of equity



               Threat exploits vulnerabilities & damages assets.
               IT staff read emails and files of management board
                          Employee leaks plans to press
                       Buyer  sues for breach of contract.



    Vulnerability is a state of                Countermeasure has a cost
    weakness mitigated by a                    fixed over time or recurring.
        countermeasure.                       Monitor abuse of privilege &
            IT staff                                Prevent leakage of
          have access                         management board documents
       to mail/file servers                           on all channels.
                                        
Calculating Value at Risk




                                                                   Value at Risk
Metrics                                                            =Threat Damage to 
Asset value,                                                       Asset x Asset Value x 
Threat damage to asset,                                            Threat Probability
Threat probability




                                      
                                          (*)PTA ­Practical threat analysis risk model
Coming attractions




•   Sep 17:   Selling data security technology
•   Sep 24:   Write a 2 page procedure
•   Oct 1:    Home(land) security
•   Oct 8:    SME data security



      http://www.controlpolicy.com/workshops 

                          
Learn more




•   Presentation materials and resources
    http://www.controlpolicy.com/workshops/data-security-workshops/


•   Software to calculate Value at Risk
    PTA Professional
    http://www.software.co.il/pta




                              

More Related Content

PDF
Fns Incident Management Powered By En Case
PPTX
People are the biggest risk
PPTX
Business Intelligence In Cloud Computing A Tokenization Approach Final
PPTX
Harry Regan - It's Never So Bad That It Can't Get Worse
PPTX
What if
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PPT
PPTX
Incident Response in the age of Nation State Cyber Attacks
Fns Incident Management Powered By En Case
People are the biggest risk
Business Intelligence In Cloud Computing A Tokenization Approach Final
Harry Regan - It's Never So Bad That It Can't Get Worse
What if
BSIDES DETROIT 2015: Data breaches cost of doing business
Incident Response in the age of Nation State Cyber Attacks

What's hot (15)

PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PPTX
Cloud Computing Legal for Pennsylvania Bar Association
PDF
Yakhouba
PPTX
Hp Fortify Pillar
PPTX
On Common Ground: The Overlap of PCI DSS and Data Protection
PDF
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
PDF
Responding to and recovering from sophisticated security attacks
 
PDF
Robert beggs incident response teams - atlseccon2011
PPTX
Zenith Infotech Mirror Cloud Presentation. 112211
PDF
Gateway RIMS (Remote Infrastructure Management Services)
PPT
Tech Support Confidential: Insider Advice for Nonprofits on Selecting the Rig...
PDF
Managing Risk in IT
PPTX
You Will Be Breached
PPT
College Presentation
PDF
Afac device-security-july-7-2014v7-2
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Cloud Computing Legal for Pennsylvania Bar Association
Yakhouba
Hp Fortify Pillar
On Common Ground: The Overlap of PCI DSS and Data Protection
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
Responding to and recovering from sophisticated security attacks
 
Robert beggs incident response teams - atlseccon2011
Zenith Infotech Mirror Cloud Presentation. 112211
Gateway RIMS (Remote Infrastructure Management Services)
Tech Support Confidential: Insider Advice for Nonprofits on Selecting the Rig...
Managing Risk in IT
You Will Be Breached
College Presentation
Afac device-security-july-7-2014v7-2
Ad

Viewers also liked (17)

PPTX
Campbell’s Pitch presentation
PDF
Win more ad agency new business pitches. It’s easier than you think.
PPTX
Pitch Perfect: Agency Secrets to Winning More Business
PPT
Selling Value
PDF
How To Get Clients & Sell Without Selling (Social Selling)
PPTX
Arming Agencies for the Pitch
PDF
Airbnb pitch brief
PDF
Via NYC Agency Brand pitch
PPTX
Chesamel Communications Creds
PPTX
Cadbury campaign pitch presentation (naked idea agency)
PDF
Star Group - Digital Agency Of Record Pitch
PPTX
Selling Agency Ideas to Clients (Or Account Executives)
PDF
From Selling Technology to Selling Value (2008)
PDF
The Pitch Process: Turning client briefs into great ideas, then selling them
PDF
Business Development Frameworks & Tips for Agencies
PDF
The art of selling value
PDF
Build a Better Entrepreneur Pitch Deck
Campbell’s Pitch presentation
Win more ad agency new business pitches. It’s easier than you think.
Pitch Perfect: Agency Secrets to Winning More Business
Selling Value
How To Get Clients & Sell Without Selling (Social Selling)
Arming Agencies for the Pitch
Airbnb pitch brief
Via NYC Agency Brand pitch
Chesamel Communications Creds
Cadbury campaign pitch presentation (naked idea agency)
Star Group - Digital Agency Of Record Pitch
Selling Agency Ideas to Clients (Or Account Executives)
From Selling Technology to Selling Value (2008)
The Pitch Process: Turning client briefs into great ideas, then selling them
Business Development Frameworks & Tips for Agencies
The art of selling value
Build a Better Entrepreneur Pitch Deck
Ad

Similar to Selling Data Security Technology (20)

PDF
Data Security Metricsa Value Based Approach
PPTX
Gainful Information Security 2012 services
PPTX
Secure Iowa Oct 2016
PDF
Sexy defense
PDF
Managed Security For A Not So Secure World Wp090991
PPTX
Top Cybersecurity Challenges Facing Your Business
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PPTX
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
PPTX
Oracle security-formula
PPTX
MIS: Information Security Management
PDF
SilverStorm "Credibility and Collaboration to achieve excellence in IT Govern...
PDF
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
PDF
Why Have A Digital Investigative Infrastructure
PPTX
The Perils that PCI brings to Security
PPTX
Top 12 Threats to Enterprise
PDF
Presentation crafting your active security management strategy 3 keys and 4...
PDF
James Beeson SOURCE Boston 2011
PPTX
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
PPTX
Information security for business majors
PDF
InformationSecurity_11141
Data Security Metricsa Value Based Approach
Gainful Information Security 2012 services
Secure Iowa Oct 2016
Sexy defense
Managed Security For A Not So Secure World Wp090991
Top Cybersecurity Challenges Facing Your Business
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Oracle security-formula
MIS: Information Security Management
SilverStorm "Credibility and Collaboration to achieve excellence in IT Govern...
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
Why Have A Digital Investigative Infrastructure
The Perils that PCI brings to Security
Top 12 Threats to Enterprise
Presentation crafting your active security management strategy 3 keys and 4...
James Beeson SOURCE Boston 2011
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
Information security for business majors
InformationSecurity_11141

More from Flaskdata.io (18)

PDF
Flaskdata - Observability for clinical data
PDF
The travel industry does real-time. Why doesn't clinical research?
PDF
Flaskdata.io automated monitoring for clinical trials
PPTX
How to write secure code
PDF
The insights that will help your medtech clinical trial succeed
PDF
2017 02-05 en-eu-data-security_v2
PPTX
Quick user guide to the Clear Clinica Cloud EDC system
PPTX
Killed by code 2015
PPTX
Killed by code 2015
PPTX
Pathcare: Patient-issue oriented healthcare
PPTX
The Tao of GRC
PDF
Will Web 2.0 applications break the cloud?
PPTX
Killed by code - mobile medical devices
PPTX
Grc tao.4
PPT
Data Security For Compliance 2
PDF
Data Security For SMB - Fly first class on a budget
PDF
Homeland Security - strengthening the weakest link
PDF
Writing An Effective Security Procedure in 2 pages or less and make it stick
Flaskdata - Observability for clinical data
The travel industry does real-time. Why doesn't clinical research?
Flaskdata.io automated monitoring for clinical trials
How to write secure code
The insights that will help your medtech clinical trial succeed
2017 02-05 en-eu-data-security_v2
Quick user guide to the Clear Clinica Cloud EDC system
Killed by code 2015
Killed by code 2015
Pathcare: Patient-issue oriented healthcare
The Tao of GRC
Will Web 2.0 applications break the cloud?
Killed by code - mobile medical devices
Grc tao.4
Data Security For Compliance 2
Data Security For SMB - Fly first class on a budget
Homeland Security - strengthening the weakest link
Writing An Effective Security Procedure in 2 pages or less and make it stick

Selling Data Security Technology

  • 1. Selling Data security to the CEO Licensed under the Creative Commons Attribution License Danny Lieberman dannyl@controlpolicy.com http://www.controlpolicy.com/     
  • 2. Sell high “it's a lot easier to manage a  big project than a small one” Boaz Dotan – Founder of Amdocs (NYSE:DOX), $5.3BN Cap.    
  • 3. Agenda • Introduction and welcome • What is data security? • Defining the problem • After Enron • Weak sales strategy • The valley of death • Strong sales strategy • Execution    
  • 4. Introduction • Our mission today – How to sell data security to the CEO    
  • 5. What the heck is data security? • Security – Ensure we can survive & add value • Physical, information, systems, people • Data security – Protect data directly in all realms    
  • 6. Defining the problem • You can't sell to a need that's never been  observed(*) – Little or no monitoring of data theft/abuse • Perimeter protection, access control – Firewall/IPS/AV/Content/AD     Lord Kelvin (*) Paraphrase of 
  • 7. What happened since Enron • Threat scenario circa 1999 – Bad guys outside – Lots of proprietary protocols – IT decides • Threat scenario circa 2009 – Bad guys inside – Everything on HTTP – Vendors decide    
  • 8. Weak sales strategy IT –  data security is  “very important” ...Forrester Management board –  fraud/data theft can maim or  destroy the company ...Sarbanes­Oxley    
  • 10. The valley of death Logical &rational Emotional & Political IT Requirements  Compliance  requirements Meet Close vendors Evaluate alternatives Capabilities Project Presentation Talk to analysts Losing control Month 1 Month 5 Month 12­18    
  • 11. Why you lose control • Issues shift – Several vendors have technology • Non-product differentiation • Divided camps – Nobody answers all requirements • Need a political sponsor • Loss of momentum – No business pain – No power sponsors    
  • 12. Strong sales strategy • Build business pain – Focus on biggest threat to the firm – Rational • Get a power sponsor – CEO,COO, CFO,CIO – Personal    
  • 14. Execution – building business pain • Prove 2 hypotheses: – Data loss is happening now. – A cost effective solution exists that reduces risk to acceptable levels.    
  • 15. H1: Data loss is happening • What keeps you awake at night? • What data types and volumes of data leave the network? • Who is sending sensitive information out of the company? • Where is the data going? • What network protocols have the most events? • What are the current violations of company AUP?    
  • 16. H2: A cost effective solution exists • Value of information assets on PCs, servers & mobile devices? • What is the Value at Risk? • Are security controls supporting the information behavior you want  (sensitive assets stay inside, public assets flow freely, controlled  assets flow quickly) • How much do your current security controls cost? • How do you compare with other companies in your industry? • How would risk change if you added, modified or dropped security  controls?    
  • 17. What keeps you awake at night Asset has value, fixed over time or variable Plans to privatize, sell 50% of equity Threat exploits vulnerabilities & damages assets.  IT staff read emails and files of management board Employee leaks plans to press Buyer  sues for breach of contract. Vulnerability is a state of  Countermeasure has a cost weakness mitigated by a fixed over time or recurring. countermeasure. Monitor abuse of privilege & IT staff  Prevent leakage of have access management board documents to mail/file servers on all channels.    
  • 18. Calculating Value at Risk Value at Risk Metrics =Threat Damage to  Asset value,  Asset x Asset Value x  Threat damage to asset, Threat Probability Threat probability      (*)PTA ­Practical threat analysis risk model
  • 19. Coming attractions • Sep 17: Selling data security technology • Sep 24: Write a 2 page procedure • Oct 1: Home(land) security • Oct 8: SME data security http://www.controlpolicy.com/workshops     
  • 20. Learn more • Presentation materials and resources http://www.controlpolicy.com/workshops/data-security-workshops/ • Software to calculate Value at Risk PTA Professional http://www.software.co.il/pta