The biggest discovery in this model is the shift in influence from technology decision-makers to the lines of businessSecurity product and services vendors once sold best-of-breed capability to expert security staffs. It was a pure sell of security for security’s sake. The enterprise decision-making process for security has changed and security vendors must adapt to the new model. Security vendors must now address three areas to win an account:Security: The enterprise relies on the security team to evaluate and recommend security technologies and sources of specialized service expertise. In internal planning discussions, the security team examines risk factors to the business and anticipated costs required to reduce those risks.Information technology: The enterprise looks to IT for cost-effective deployment strategies within the existing infrastructure; support strategies for users and application integrity; and required skills or external resources necessary to meet the business requirements. The IT team assesses the costs involved in managing the application and security deployments.Lines of business (LoBs): The LoBs set the prioritized agenda for business initiatives, define business requirements and make the ultimate decision on application/IT security balances. The LoBs’ concerns center on revenue generation, customer account acquisition, individual customer satisfaction and quality of service.Model Results and Conclusions The biggest discovery in this model is the shift in influence from technology decision-makers to the lines of business. We expect security budgets to grow in 2004, with actual budget allocations controlled by the lines of business. Changes in sales and marketing behavior for successful security practices are required: Security teams no longer have central funding to try new technologies and easily champion new companies within the enterprise. Emerging security vendors have difficulty gaining toeholds in an organization; larger incumbent vendors are more difficult than ever to displace. Security vendors must work past enterprise security teams to get direct exposure to lines of business. The lines of business influence decisions most heavily. Security vendors must express their value in terms that are meaningful to business managers. Vendors and chief security officers must educate each other on how to best identify product and service capabilities with business needs.CSOs are more conservative in presenting security vendors for approval. LoB managers that are not experts in security are more apt to be swayed by a vendor’s reputation, with inherent confidence in its ability to manage a future problem should something arise. Enterprises are forcing security vendors to consciously articulate benefits for the critical influencers, which include leading-edge security performance for the CSO; low-cost management and integration capability for the CIO; and preservation of business service confidentiality, integrity and availability for the COO.Enterprises are shifting organizational reporting structures, budget responsibilities and decision processes for security purchases. Two of the three critical influencers of security products and services are being aligned to support lines of business.Enterprise executives that have survived the expensive excesses of PKI, Y2K and IDS are wary of overhyped security claims. New security purchase decisions will need to map into corporate plans for supporting business goals in an easily managed manner. Enterprise RecommendationsInvolve your security team early in application selection processes. Security is integral to applications exposed to the Internet and seldom can be effectively bolted on after the fact. Have corporate security architects participate in defining requirements for new initiatives, evaluating vendor responses and evaluating acceptable business security trade-offs. Consider having CSOs report to the CFO or COO. Security organizations that report to CTOs or CIOs tend to prioritize according to technology or operational costs, respectively. Align with the chief financial officer or chief operating officer to better align security with spending from lines of business and integrate with business processes. Shift security metrics from ROI to reduction of risk (ROR) to better reflect security’s contribution to the business.Make security organizations tin-cup internal users for budget allocations. This forces security to justify its existence year-on-year by showing value to lines of business (customer-focused), audit teams (regulatory and policy compliance) and IT (infrastructure-oriented). Security is important to the business and this is the most effective means of measuring internal benefits. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe