Company
Title
Fortune 500 Rank
Biographical Info
City
State
Outsourcing or insourcing decisions can be complex, but Managed Security Service Providers (MSSPs) offer a viable solution for various security organizational needs. The recent Fortify Experts CISO Forum explored the decision-making process and the importance of effectively evaluating and working with MSSPs.
Key topics covered in the Forum included defining expectations through MSSP evaluations, contracts, Service Level Agreements (SLAs), monitoring MSSP performance. and maintaining communication.
The security leaders attending uniformly agreed that when engaging with MSSPs, aligning expectations with executive requirements and industry standards is vital. To ensure an effective partnership, organizations should consider this a strategic partnership.
Here are some CISO Recommended Tips on how you can improve your success with an MSSP.
A. Start by defining your requirements:
B. Investigate who the reputable vendors are in your industry:
C. Evaluate vendors:
D. Contracting with the Vendor
E. Monitoring Performance:
F. On-going Communication:
By following these insights and best practices, organizations can navigate the MSSP landscape confidently, ensuring successful engagements that meet their unique requirements while maximizing the value they receive from their MSSP.
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your security program.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through staffing, coaching, CISO Forums, and improving their team culture.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
CISO Forum Summary- Best Practices for 3rd Party Security Assessments
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed the best practices around 3rd Party Security Assessments.
Suggested Best Practices: The security leaders on the forum outlined several steps to establishing a vendor assessment program.
Step 1: Develop criteria to classify vendors into tiers.
Step 2: Define the process for assessing each vendor – example below:
Step 3: Work with the business leaders/owners to slot each vendor into a tier.
Step 4: Decide a frequency for assessments for each tier.
Step 5: Develop a process:
Note: Cyber Insurance provider, Lockton, is releasing an extensive 39-page assessment in 2023 which asks the percentage of completion for certain controls.
The downside of Vendor Security Assessments (VSA):
Note: If security risks are identified and the business still wants to use them, write the business owner a letter warning them of the risk. This will provide some CYA and transfer that decision back to the business owner.
3rd Party Evaluation Services:
Issues with 3rd Party Evaluation Services
Use a Security Addendum to Off-Load Vendor Risk to Legal
Another leader discussed how he off-loaded security risk by developing a Security Addendum which was included in the vendor contracts.
The Security Addendum can include language to:
Adding a Security Addendum transfers the liability from Security to Legal. If the vendor is immature and redlines parts of the security addendum in the contract, then the general counsel has to get involved. The GC is risk-averse and often has more influence than a security leader. This enables the legal team to be the enforcement arm of your vendor assessments.
The Security Addendum can be leveraged to improve cyber insurance, and compliance with GDPR, SOX, and HIPAA.
Is SOC2 enough?
The Leaders agreed that if a firm has completed a satisfactory SOC 2 Type 2 assessment, it would often be accepted in lieu of a VSA.
International 3rd Vendors:
For International vendors, evidence of security is very limited, therefore, it is recommended to look for any type of evidence to help show you took the best possible path for due diligence to protect yourself in case an event occurs. Ultimately, the question arises, “Would a jury of your peers agree that you did the best you could do in that situation?
Security vs. Risk Management
Security is not the risk assessment group. That’s up to Risk or Legal.
Regulators are often open to the idea of running risks through a Risk Management Framework and then discussing whether your firm is willing to accept that amount of risk.
Is it right to hand over all your cyber stuff when someone asks, “Send me all your security policies and scans?”
Note: Be careful about what is published on the internet and intranet. Are there policies that might expose vulnerabilities about internal processes, IP addresses, or an incident response plan if it got into the wrong hands?
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your security program.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through staffing, coaching, CISO Forums, and improving their team culture.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
CISO Forum Summary – Best Practices around 3rd Party Security Assessments
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed the best practices around 3rd Party Security Assessments.
From the security leaders who were present in the forum, here are some suggestions for best practices for assessing vendors:
Other Best p
Having a process through the whole assessment. Wanted every vendor to have the same experience. Valuable to see side to side comparisons. Took that to leadership who were then tasked with giving us target which led to establishing budgets to achieve those targets.
Assess business owners to
Responding to 3rd party questions:
Invite them to review
3rd party assessment providers – Bitsight, SecurityScorecard – If others are
“Drive by appraisal of your house”
Don’t have much useful data.
Questions are so broad. Often they don’t ask the right questions.
Lockton is releasing a new 39 page assessment.
Adding the percentage of times it was done.
Vendor security questionnaire using an automated 3rd party tool to reduce the workload and help to focus only scoring and high priority issues. How often do you conduct the assessment?
Initial contract
Once a year
If they are breached.
Only a point in time (a check box). Issue with chasing them down to do it. Or who is entering the data which could impact the validity of the assessment. Quality of results were low at best, but it was a check box.
Risk Recon – public facing – what is exposed on the internet but does not grasp what is exposed in the infrastructure.
Companies with strong security processes are usually more apt to share their security protocols. Those who are immature, often delay their response.
If a firm is going to do business with a company no matter what the assessment says, then completing the assessment is mute.
If risky, the business own gets a letter declaring there is a risk.
VSA (Vendor Security Assessment) – Approached the contract teams which included a Security Addendum.
Mandatory Annual Security Assessment
48 Hours notification of breach.
Mandatory to provide a contact name for their incident response.
Protect data & provide evidence of that.
Transfers the liability from Security to Legal. If the vendor is immature and redlines the security addendum in the contract, then the general counsel has to get involved and would be responsible for accepting the risk on behalf of the business.
That helps raise the risks to the executive team. VSA then can be leveraged for cyber insurance, or compliance with GDPR, SOX or HIPAA.
Enables the legal team to be the enforcement arm of your vendor assessments.
Security is not the “risk assessment’ group. That’s up to Risk or Legal. SaaS providers
Is a SOC 2 report enough to give a firm a pass in lieu of additional due diligence. As long as it is a SOC 2 Type II.
For International vendors, evidence of security is very limited so look for any type of evidence to help show you took the best possible path for due diligence to protect yourself in case an event occurs. Ultimately, would a jury of your peers agree that you did the best you could do in that situation.
Regulators are open to the idea of running this through a Risk Management Framework and are you willing to accept that amount of risk.
Is it right to ‘hand over all your cyber stuff’ Send me all your policies:
Do you have anyone qualified to read and understand what we give you.
How are you securing our data and roadmap to our security?
On-site
Alternates:
Written summary of policies,
Long virtual sessions.
Old school to do on-site assessments – Highly regulated industry.
CISO actions are tied to Business Development
Go get a SOC 2 Type II assessment.
GDPR is a legal issues. Chief Privacy Officer is responsible for data loss.
CISO’s job is to prevent and respond to breaches.
To protect firms from SaaS providers who might go insolvent. Contracts require them would have to escrow code and data incase
Are you posted all your Security Policies to your intranet? Do they show proprietary information
3rd Party Evaluation Services:
Technologies that may help:
Migrating from ServiceNow to ProcessUnity
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to improve your security program.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments.
In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – IAM Best Practices
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed the best practices around establishing a baseline for your security program.
BIGGEST IAM CHALLENGES FOR LEADERS:
WHERE CAN WE MAKE THE BIGGEST IAM IMPACT THE FASTEST?
EXPERIENCE WITH ONBOARDING/OFFBOARDING PROCESS:
IS THE GOAL OF IAM TO GET TO ZERO-TRUST AND IS THAT A COMMON GOAL?
Tools and how they how helped but has also exposed lack of skill in other areas:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your IAM processes and approach.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Establishing a Baseline in your Security Program
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed the best practices around establishing a baseline for your security program.
Frameworks for establishing a baseline in your program:
Challenges with Establishing a Baseline
Assessing a Baseline on Employees:
“Security is everyone’s responsibility, but not everyone knows their responsibility.”
Assessing a Baseline for Vendors:
Tools & Technology that Help:
Other Best Practices:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to establish a baseline for your security program.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary: The Viability of Passwordless Authentication
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed the viability of passwordless authentication.
The desire is high to achieve Passwordless Authentication, but there appear to be very few Passwordless solutions that achieve the level of security required for the broad needs of a large enterprise.
Our discussion revolved around password best practices and what technologies are available to reduce the burden of managing and securing passwords.
Initial Questions to Consider:
What is Password Integrity:
Biometrics:
Multi-Factor Authentication (MFA):
Challenges to Implementing MFA
Zero-Trust
Could a Personal Mobile Device be used for Passwordless Authentication?
Unhappy Path:
Security on OT Systems:
YubiKey Authentication:
Challenges of YubiKey’s:
Other Emerging Technologies:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your password authentication activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Establishing a Baseline in your Security Program
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to create a baseline to move your program forward.
Frameworks for establishing a baseline in your program:
Challenges with Establishing a Baseline
Assessing a Baseline on Employees:
“Security is everyone’s responsibility, but not everyone knows their responsibility.”
Assessing a Baseline for Vendors:
Tools & Technology that Help:
Other Best Practices:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Establishing Meaningful Metrics in your Security Program
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to create better metrics to move your program forward.
Below are perspectives from 18 Security Leaders who provided input on the following questions:
What metric has helped drive your program forward the most?
What technologies are used to help drive better metrics?
What are the most useless metrics to track?
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Executive Forum Summary – Best Practices for Managing a Hybrid Security Team
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to create higher-performing security teams. Here is a summary of their top tips or suggestions on how to better manage a hybrid/remote team.
Challenges with Hybrid/Remote Teams:
WFH and/or BYOD Policies:
Suggestions:
Connectivity and Bandwidth Challenges:
Hiring Hybrid & Remote Talent
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward
CISO Forum Summary – Best Practices for Red Teaming
Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics. Recently, we discussed how these successful security leaders have been able to improve their security programs through the use of red teams. Here is a summary of their top tips or suggestions on how to select and create better red teaming engagements.
Selecting a Red Team:
Here are some perspectives on how to select a red team.
Scoping/Contracting a Red Team:
Here are some perspectives on how to scope out and contract a red team engagement.
Why you SHOULD NOT do Red Teaming:
Why you SHOULD use Red Teaming:
Simulation instead of Red Teaming?
Different Approaches:
In Summary:
Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice on how to improve your Red Teaming activities.
If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.
About Tim Howard
Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST-based security assessments.
In addition, he has a passion for helping CISOs develop Higher Performing Teams through coaching, by creating interactive CISO Forums, and by helping them create highly-effective team cultures.
With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.
He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.
Tim is married with 3 kids. He is an avid runner and has completed two IRONMAN Texas events. He is also a graduate of Texas A&M University.
Invite Tim to connect: www.linkedin.com/in/timhoward