Skip to content

Fix it! NO, not like THAT

Security pros often don’t understand why their business won’t accept certain types of solutions. Thus, they can’t articulate those problems to vendors. If both sides can't grasp why existing solutions aren’t organizationally viable, they stand no chance at building better solutions that are viable.

The most prolific meetings I have are with early stage founders, who’ve either just built a product, or are ideating the next big idea.  And, nigh universally, they all have the same complaint.

They went and talked to a lot of CISOs.  The CISOs all complained about some problem. The problem sounded really well articulated. The founder developed a solution to the problem.  The founder brought the solution back to the CISOs, who all said some variant of, “Not like that!” That complaint though? Hadn’t been articulated up front.  Wasn’t obviously inferrable from the problem space.  It felt like a complaint out of left field.

Maybe it’s the identity-proofing vendor who hears, “sure, prevent account takeover, but you can’t add any friction into the process!” Or it’s the vulnerability remediation founder who never really hears that the obstacle is that there can never be a tool that’ll cause engineering teams to trust the security team to auto-deploy anything.  Or it’s the SIEM optimization vendor who later gets told they’ll have to also be a SIEM replacement (a death knell for a company).

What’s going on here?  By and large, many security professionals have never been product professionals (either developing or marketing them), and so they see a problem.  Not the entirety of the problem, just the thing that hurts them the most.  And that’s what gets complained about. That isn’t how you specify a product–it’s how you specify a feature (and a minimalist specification at that).  Often, security professionals don’t understand why their business won’t accept certain types of solutions, and thus can’t articulate those problems to their vendors.

Until both sides of the equation understand why existing solutions aren’t organizationally viable, they don’t stand a chance at building better solutions that are viable.

Latest

Identity Is the Perimeter. Attackers Know It. Do You?

Identity Is the Perimeter. Attackers Know It. Do You?

Dave Lewis, Global Advisory CISO at 1Password, says if you treat identity as your perimeter, you stop caring about where traffic comes from and start caring about who is asking for access, how they proved it, and what they are allowed to do. Here's how to go about it.

CYBR.HAK.CAST Episode 13: Winn Schwartau

CYBR.HAK.CAST Episode 13: Winn Schwartau

Winn Schwartau argues that the biggest threat facing defenders isn’t just technical, but cognitive: overwhelming information flows that push humans into “mental DDoS.” He has introduced the concept of “critical ignoring” as a prerequisite to critical thinking.