How To Establish Messaging & Mentoring During The Selection Of A Cyber Security Platform

Fig 1: Example CISO Vision & Approach

Establishing The Point

  • What does your customization enhance?
  • What does your customization prevent or address?
  • What’s the theme that encompasses your customization(s)?
  • How does your customization directly align with the vision?
  • How does your customization fulfill the requirements in the approach?
  • A TIP enhances my knowledge of relevant threats operating within my business vertical.
  • A TIP improves my ability to prevent & detect business-specific relevant threat vectors by integrating with existing systems.
  • A TIP aligns with the vision by improving the security efficacy of these integrated systems.
Fig 2: The Base Story

Clean-Up Vagueness & Gather Details

  • What are the integrated systems?
Fig 3: Integrations
  • What do relevant threats consist of?
  • What will be provided to each integrated system about each relevant threat, and how will this be done?
  • What existing platforms requirements must this platform meet?
  • Will any other tech be replaced or displaced, and if so, how much does those cost to operate?
  • What test cases are required to validate integration, operation, and viability?
  • How does this capability enhance the overall maturity of the organization?
  • What KPIs measure implementation progress, completion, and ongoing efficacy?
Fig 4: Repeatable Framework For Platform Selection

--

--

--

A witness to life; its patterns & flow. A discoverer of the essence of things. A creator of flowing designs from observation. A security architect & author.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

$COVER Token Launch

Let the Games Begin!

Epic Women in Cyber — Navjot Kaur

How to Get Free SSL Certificates for Your Website?

Skills and SIEM tool to make a successful Cyber Forensic Investigation.

{UPDATE} Chess Problems Lite Hack Free Resources Generator

Biometric Authentication: The Good, the Bad and the Ugly

Biometric Authentication: The Good, the Bad and the Ugly

⛱ LumoTools WhiteList Results [ Presale]

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Chuck Johnson

Chuck Johnson

A witness to life; its patterns & flow. A discoverer of the essence of things. A creator of flowing designs from observation. A security architect & author.

More from Medium

Splunk Enterprise — Q&A — Fields

Collaboration in Infosec

Your SOAR isn't your SIEM

Fixing the Zeek Add-on for Splunk in DetectionLab