getting your security budget approved without fud

12
SESSION ID: Getting Your Security Budget Approved Without FUD CISO-W04A John B. Dickson, CISSP Principal Denim Group @johnbdickson

Post on 19-Oct-2014

846 views

Category:

Technology


1 download

DESCRIPTION

Getting a security budget approved is a challenge, but it is arguably the single most important task a security leader can accomplish. This session reveals the six common factors that successful CISO’s use to quantify needs and justify security budget with non-technical executive leaders. Research and data gleaned from over 40 interviews with high-profile CISO’s provide some interesting results.

TRANSCRIPT

Page 1: Getting Your Security Budget Approved Without FUD

SESSION ID:

Getting Your Security Budget Approved Without FUD

CISO-W04A

John B. Dickson, CISSP Principal

Denim Group @johnbdickson

Page 2: Getting Your Security Budget Approved Without FUD

#RSAC

Why Is Selling Fear So Compelling?

u  Is it like selling insurance? u  The security industry is struggling

for parallel models and metaphors u  FUD Distorts the Process

2

Page 3: Getting Your Security Budget Approved Without FUD

#RSAC

CEO  

CFO  

CIO  

VP  Development  

Development  

CISO  

Security Leaders Are at A Structural Disadvantage

u  They have a staff advisory role and not a “line” operator role

u  They have different world views that drive their perspective

u  They talk differently u  They have less power

3

Page 4: Getting Your Security Budget Approved Without FUD

#RSAC

The Key Principles of Selling Security

1)  Exploit Pet Projects

2)  Account for Culture

3)  Tailor to Your Specific Vertical

4)  Consciously Cultivate Credibility & Relationships

5)  Capitalize on Timely Events

6)  Capture Successes & Over-Communicate

4

Page 5: Getting Your Security Budget Approved Without FUD

#RSAC

1) Exploit Pet Projects

Always bundle security into CAPEX or other critical projects as defined by the CEO

5

Page 6: Getting Your Security Budget Approved Without FUD

#RSAC

2) Account for Business Environment

Radically adapt your “Request for Resources” to your organization’s culture and risk appetite

6

Page 7: Getting Your Security Budget Approved Without FUD

#RSAC

3) Tailor to Your Specific Vertical

7

Tailor security requests to your specific vertical, sub-vertical, & sub-sub vertical

Page 8: Getting Your Security Budget Approved Without FUD

#RSAC

4) Capitalize on Timely Events

Use near-death experiences of others to justify security spend

8

“You  never  let  a  serious  crisis  go  to  waste.  And  what  I  mean  by  that  it's  an  opportunity  to  do  things  you  think  you  could  not  do  before.”    

-­‐  Rahm  Emanuel    

Page 9: Getting Your Security Budget Approved Without FUD

#RSAC

5) Consciously Cultivate Credibility & Relationships

Credibility and relationships must be established prior to “Making A Security Ask”

9

Page 10: Getting Your Security Budget Approved Without FUD

#RSAC

6) Capture Successes & Over-Communicate

Document security wins and communicate these successes so they become the new operating norm

10

Page 11: Getting Your Security Budget Approved Without FUD

#RSAC

Conclusion

Successful security leaders exhibit certain consistent approaches to get their security budgets approved – without using FUD!

1)  Exploit Pet Projects

2)  Account for Culture

3)  Tailor to Your Specific Vertical

4)  Consciously Cultivate Credibility & Relationships

5)  Capitalize on Timely Events

6)  Capture Successes & Over-Communicate

11

Page 12: Getting Your Security Budget Approved Without FUD

Q&A John B. Dickson, CISSP [email protected] @johnbdickson