www.wsj.com
Open in
urlscan Pro
2600:9000:223c:dc00:3:4b0:de80:93a1
Public Scan
Submitted URL: https://info.templafy.com/e3t/Ctc/LX+113/cJ9Zz04/VVvPk89fJjLSW2ctFvv4t77ztW8JC1R54QfYqrN4sL4cG9gn4DV7Wycr7CgG1PW4SJZ9t3cMK...
Effective URL: https://www.wsj.com/articles/how-cyber-chiefs-cut-through-marketing-noise-11659432600?utm_medium=email&_hsmi=2&_hsen...
Submission: On September 23 via api from IE — Scanned from DE
Effective URL: https://www.wsj.com/articles/how-cyber-chiefs-cut-through-marketing-noise-11659432600?utm_medium=email&_hsmi=2&_hsen...
Submission: On September 23 via api from IE — Scanned from DE
Form analysis
1 forms found in the DOM<form autocomplete="off">
<div id="scrim-from-wrap" class="input-wrap">
<label for="scrim-from">From</label>
<textarea id="scrim-from" readonly="readonly" disabled="disabled" type="text" autocomplete="off" autocorrect="off" autocapitalize="none"></textarea>
</div>
<div id="scrim-to-wrap" class="input-wrap">
<label for="scrim-to">To</label>
<input id="scrim-to" type="text" autocomplete="off" autocorrect="off" autocapitalize="none">
</div>
<div class="input-wrap">
<label for="scrim-message">Message</label>
<textarea id="scrim-message" class="msg" maxlength="500" type="text" autocomplete="off" autocorrect="off" autocapitalize="none"></textarea>
</div>
</form>
Text Content
WSJ.COMBANKRUPTCYCENTRAL BANKINGCYBERSECURITYPRIVATE EQUITYSUSTAINABLE BUSINESSVENTURE CAPITAL SubscribeSign In Search * Home * News * Research * Newsletters * Events SubscribeSign In Search * Home * News * Research * Newsletters * Events This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit https://www.djreprints.com. https://www.wsj.com/articles/how-cyber-chiefs-cut-through-marketing-noise-11659432600 Share * Facebook * Twitter * LinkedIn * WSJ PRO HOW CYBER CHIEFS CUT THROUGH MARKETING NOISE IN A CROWDED CYBERSECURITY MARKET, TECH PROVIDERS MAKE BASIC MISTAKES IN TRYING TO WIN BUSINESS, CISOS SAY CORPORATE SECURITY CHIEFS CAN FACE A DELUGE OF MARKETING PITCHES FROM CYBERSECURITY PROVIDERS. HERE, AN AMAZON SECURITY CONFERENCE IN JULY IN BOSTON. Photo: KIM S. NASH/THE WALL STREET JOURNAL By Cheryl Winokur Munk Aug. 2, 2022 5:30 am ET | WSJ Pro Print Text Your browser does not support the audio tag. Listen to article Length 5 minutes AD Loading advertisement... 00:00 / 05:20 1x This feature is powered by text-to-speech technology. Want to see it on more articles? Give your feedback below or email audiofeedback@wsj.com. thumb-stroke-mediumthumb-stroke-medium Hundreds of cybersecurity companies compete for attention from chief information security officers through email solicitations, cold calls and tech conferences. Here are five strategies corporate security chiefs use to weed out unsuitable cyber providers. EMAIL FILTERS “As a CISO, the deluge of marketing and solicitation from cybersecurity startups was intense,” said Jerry Perullo, a cybersecurity management consultant who was CISO of New York Stock Exchange owner Intercontinental Exchange Inc. for 20 years until leaving the post in 2021. At one point, he counted all the emails that had been blocked by filters he had set up to find he received more than 120 solicitations a day. He had a category defined in his filtering tools for these types of messages, which his company dubbed “UCE,” or “unsolicited commercial email.” Since these emails weren’t malicious and often dealt with relevant topics, fine-tuning the filtering system was important, Mr. Perullo said. One trick was to block any email he received with the word “whitepaper” in the subject, he said. WARM INTRODUCTIONS Anne Marie Zettlemoyer, chief security officer for Palo Alto, Calif.-based CyCognito Ltd., which provides cyber-risk-assessment tools, said she is more inclined to read emails with a warm introduction, or those from vendor representatives who follow up based on the interest she has expressed. Certain emails she deletes almost immediately. As vice president of security engineering at Mastercard Inc. until earlier this summer, she got many generic emails aimed broadly at financial-services executives, with some that addressed her as “Dear Buyer.” Other automatic turnoffs were vendor agents who sent calendar invitations without having spoken to her and those who called her on a nonwork number. PURSUE VERSUS BEING PURSUED CISOs often prefer to be in the driver’s seat when it comes to finding vendors. For Ryan Heckman, assistant director of identity and access management governance at Principal Financial Group Inc., vendor selection is a continuous process to ensure his team’s capabilities align with the ever-changing threat landscape. Mr. Heckman was until late July cybersecurity manager at Iowa-based convenience store chain Casey’s General Stores Inc. He recalled that during a recent evaluation of capabilities and needs at Casey’s, he wanted to get a handle on industry products that could be useful add-ons for the company, so he did some window shopping at last summer’s Black Hat USA conference. By talking to vendors about the company’s requirements, he was able to narrow it down to about a half-dozen options that he could then research on his own and run by peers. -------------------------------------------------------------------------------- NEWSLETTER SIGN-UP WSJ Pro CYBERSECURITY Cybersecurity news, analysis and insights from WSJ's global team of reporters and editors. PREVIEW SUBSCRIBE -------------------------------------------------------------------------------- In the following months, Mr. Heckman’s team of cyber specialists tested various platforms and assessed each against the known attack vectors at the time. Some products were found to affect the end-user experience and were quickly eliminated. Others performed well, requiring additional comparison of integration and administrative overhead to narrow the field, he said. This hands-on approach, coupled with open-forum peer discussion with others in retail led to the final product selection, Mr. Heckman said. Ellen Benaim, CISO at Templafy ApS, a Denmark-based document-generation platform, was bombarded with emails after the Log4j bug emerged late last year. She waited to respond until about two weeks later, when she had secured the budget and resources to investigate vendors. In the meantime, Ms. Benaim said, the company addressed its Log4j vulnerabilities on its own, and started looking for a supplemental tool. Her vendor research included using CISO forums. One fellow CISO who used an open-source vulnerability-scanning tool demonstrated it for her and discussed hiccups the company had experienced with a different solution they used to work with. “That type of experience is invaluable,” she said. Templafy has since implemented the tool demonstrated by the other CISO. PARTNERS, NOT TRANSACTIONS Once they narrow the pool to one or two contenders, security chiefs said the final vetting process considers factors such as price and the ability to customize services and tools, plus the vendor’s own security practices and financial soundness. Vendors that make the cut are often willing to adapt to fit a customer’s needs, said Chris Castaldo, CISO at Philadelphia-based tech company Crossbeam Inc., which helps companies find new business partners and customers. “You can tell when someone is really passionate about making your problem their problem to solve,” he said. SEEK PROFESSIONALISM One way to weed out vendors is to discount those that come off as cagey, don’t provide information requested or are just plain sloppy, Ms. Zettlemoyer said. It’s important for vendors to understand what a customer wants and avoid careless mistakes, she said. One vendor didn’t personalize a pitch, showing her materials prepared for another company. “It sounds basic, but [some] vendors miss the mark,” she said. “With security, there are 3,000 vendors and nobody is really irreplaceable.” MORE FROM WSJ PRO CYBERSECURITY * After Prison, Hackers Face Tech Restrictions, Limited Job Prospects September 21, 2022 * Cybersecurity Investments Are No Longer Optional, Officials Warn September 21, 2022 * Companies Should Treat Cyber Threats as Core Business Risk, U.S. Cyber Official Says September 20, 2022 Copyright ©2022 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8 MUST READS FROM CYBERSECURITY * NEURODIVERSE CANDIDATES FIND NICHE IN REMOTE CYBERSECURITY JOBS * CYBER CHIEFS TRY NEW TRICKS TO ATTRACT TALENT * NATO CYBER GAME TESTS DEFENSES AMID WAR IN UKRAINE * INDUSTRIAL CYBER FIRMS FORM LOBBYING COALITION AS BIDEN RAMPS UP REGULATION * HACKERS STOLE MORE THAN $600 MILLION IN CRYPTO. LAUNDERING IT IS THE TRICKY PART. Close JERRY PERULLO, A CONSULTANT WHO WAS CISO OF THE NYSE’S PARENT COMPANY FOR 20 YEARS, SAYS ONE TRICK IS TO BLOCK EMAILS WITH “WHITEPAPER” IN THE SUBJECT In a crowded cybersecurity market, tech providers make basic mistakes in trying to win business, CISOs say From To Message SEND An error has occurred, please try again later. Thank you This article has been sent to BACK TO TOP Professional Resources WSJ ConferencesFactivaRisk & Compliance JournalDow Jones Risk & ComplianceDow Jones NewswiresCFO JournalCIO JournalCMOLogistics FacebookTwitterPodcasts Send us your feedback:pronewsletter@dowjones.com Subscriber Agreement & Terms of UsePrivacy NoticeCookie NoticeManage CookiesCopyright PolicyData Policy 2022 Dow Jones & Company, Inc.All Rights Reserved Copyright 2022 Dow Jones & Company, Inc. All Rights Reserved This copy is for your personal, non-commercial use only. Distribution and use of this material are governed by our Subscriber Agreement and by copyright law. For non-personal use or to order multiple copies, please contact Dow Jones Reprints at 1-800-843-0008 or visit www.djreprints.com.