{"id":6218,"date":"2014-07-23T06:00:34","date_gmt":"2014-07-23T13:00:34","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6218"},"modified":"2014-07-21T14:58:29","modified_gmt":"2014-07-21T21:58:29","slug":"get-budget-need-turn-skeptical-executives-security-champions","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/07\/get-budget-need-turn-skeptical-executives-security-champions\/","title":{"rendered":"How To Get the Budget You Need and Turn Skeptical Executives Into Security Champions"},"content":{"rendered":"<p>\u201cI don't have any new budget for security this year and I'm becoming more and more concerned about getting attacked by hackers. I also know there's a ton of malware that seems to be getting into my organization and I have no idea how to deal with it.\u00a0My staff is already stretched to the limit and our current firewalls are so old that I'm not sure they're even doing anything to protect us anymore. How can I convince senior management and executives that we need to take action now before something really bad happens?\u201d<\/p>\n<p>Does this sound familiar?<\/p>\n<p>This is a conversation I've had many times with CIOs, IT directors, and countless frontline security professionals throughout the public sector.<\/p>\n<p>Unfortunately for cash-strapped governments, cities, colleges and other public sector institutions, security is often seen as a <em>nice to have<\/em> by the C-level, not as an imperative. Far too often senior executives will point to the fact that they haven't been hacked yet, so what's the point in spending significant amounts of taxpayer money on a problem that doesn't exist?<!--more--><\/p>\n<p>The problem is that most of these organizations have already in fact been hacked in some way or another. Many are completely infested with malware, overrun with botnets, and all other sorts of other cyber nastiness too. The executives just don't know it and don\u2019t want to listen to doomsday scenarios and horror stories. <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/06\/remediation-fear-answer-everything-really\/\" target=\"_blank\">And as we\u2019ve said many times<\/a>, scare tactics don\u2019t work with executives to unlock budget and IT generally doesn\u2019t have the data or the context to explain it to them in a way that will get their attention and make them understand.<\/p>\n<p>So as public sector security professionals, how do we open the conversation with executives to get the budgets we need to effectively do our jobs?<\/p>\n<p>Here are some things that I've seen customers do to change the conversation and turn skeptical executives into security champions:<\/p>\n<p style=\"padding-left: 30px;\"><strong>1. Stop talking about ports and protocols.<\/strong><\/p>\n<p style=\"padding-left: 30px;\">Opening the conversation in technical terms defines the conversation as a technical discussion. Reframing the problem in a way they can understand is the key to getting their attention.<\/p>\n<p style=\"padding-left: 30px;\">One K-12 CIO I worked with recently who completed an <a href=\"http:\/\/connect.paloaltonetworks.com\/avr\/\" target=\"_blank\">Application Visibility and Risk<\/a> report with Palo Alto Networks successfully used the data from\u00a0the report to communicate security problems to the other executives in a completely different way. Instead of pointing out all the technical issues he opened the conversation by saying, \u201cMore people in China are using computers in our schools than our own students and here's the data to prove it.\u201d<\/p>\n<p style=\"padding-left: 30px;\">That really got everyone's attention fast and allowed him to then present the full results of the AVR report and really drill down into what was happening on the network and why it was important to address these problems immediately.<\/p>\n<p style=\"padding-left: 30px;\"><strong>2. Reframe security as an enabler of innovation, not a roadblock.<\/strong><\/p>\n<p style=\"padding-left: 30px;\">For far too long <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/07\/stop-encouraging-shadow-start-safely-enabling-innovation\/\" target=\"_blank\">many executives have seen IT security as the preventer of innovation<\/a>. If a department manager wants to use Dropbox to share documents with a contractor, or Skype to reduce costs of long-distance charges and provide affordable videoconferencing, or the public relations department wants to use Facebook for legitimate outreach purposes it's always been an \u201call or nothing\u201d discussion when it comes to security.<\/p>\n<p style=\"padding-left: 30px;\">In most cases the default answer from IT\u00a0is \u201cno,\u201d or a grudging acceptance of it. Increasingly, IT is never even brought to the table because it is assumed that the answer will always be \u201cno\u201d or at least a lot of complaining, so many think, \"Why bother?\"<\/p>\n<p style=\"padding-left: 30px;\">A hospital CIO I spoke to recently decided on a new tactic that was very successful in changing the\u00a0security conversation completely. She told the other executives around the table, \u201cIf it is important to the organization to use these applications, I will find a way to make it happen.\u201d Rather than just saying \u201cno,\u201d she would answer, \u201cYes, we can do that, now let's discuss how you want us to implement it,\u201d to all future requests. This subtle change in approach turned the discussion from a \u201ctechnology problem\u201d into a policy collaboration between IT and the various departments.<\/p>\n<p style=\"padding-left: 30px;\">Continuing the conversation with, \u201cYes, we can safely enable Facebook, but who would you like to have access to it and what would you like to allow them to do?\u201d not only frames the discussion in a positive and enabling manner, but also puts the onus on the whole organization to really think through the requirements and ramifications of allowing users to access a new application.<\/p>\n<p style=\"padding-left: 30px;\"><strong>3. Let them watch the big game, but show them the savings, too.<\/strong><\/p>\n<p style=\"padding-left: 30px;\">Most organizations see security as an expense, almost like insurance with no real ROI. The reality is there are lots of ways that security can actually save an organization money, and not just from potentially avoiding\u00a0doom-and-gloom scenarios resulting from breaches.<\/p>\n<p style=\"padding-left: 30px;\">Changing this conversation from security as \u201cinsurance\u201d to one of proactive cost savings is an extremely effective means of communicating with the C-level, but often involves a little bit of creative thinking. A great example of this comes from another Canadian public sector customer during the recent Winter Olympics.<\/p>\n<p style=\"padding-left: 30px;\">In Canada, access to hockey is pretty much an\u00a0inalienable right, so when it came time for the gold medal game most organizations either paid for extra Internet pipe or saw their Internet access slow to a crawl and become inoperable. That left IT in the awkward position of either asking for more budget to allow employees to watch the game at work or to block it and have an employee revolt on their hands.<\/p>\n<p style=\"padding-left: 30px;\">Rather than accept a no-win situation, this particular IT department deployed a simple policy on their Palo Alto Networks firewall that limited their exposure to this spike in video demand and not only let the fans see the game, but also ensured that the organization could continue doing business during that time without added expense. Everyone was happy and not just because team Canada won the gold! (Which of course, we did.)<\/p>\n<p style=\"padding-left: 30px;\">While many of their peers couldn\u2019t watch the game because their Internet was down, executives at this organization could see that IT was doing something different and innovative to balance the needs of users with the needs of the organization effectively. This demonstration along with the detailed cost savings analysis opened the conversation pro-actively on how further\u00a0investment in security could\u00a0generate results like this in other areas of the organization.<\/p>\n<p style=\"padding-left: 30px;\">Incidentally, they have also shared this approach with many other public sector organizations that were <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/06\/channeling-world-cup-passion-smart-security\/\" target=\"_blank\">worried about what the World Cup would do to their Internet connections<\/a>.<\/p>\n<p><strong>In conclusion\u2026<\/strong><\/p>\n<p>Changing the conversation from an IT discussion where security is a cost to the business into a discussion\u00a0of safely enabling innovation by investing in security is the key to unlocking the budgets you need.<\/p>\n<p>The best way to prepare for this conversation is to know what's going on in your organization today and to have\u00a0the data to prove it. If you are a current Palo Alto Networks customer my recommendation is to work with your local team or trusted partner to customize reports and dig into the data you're seeing to find real success stories of innovation, opportunity, and investments that will return results to present to the C-level. And again... make sure you back it all up with hard data!<\/p>\n<p>If you're not yet a Palo Alto Networks customer, then completing an evaluation and an\u00a0<a href=\"http:\/\/connect.paloaltonetworks.com\/avr\/\" target=\"_blank\">Application Visibility and Risk Report<\/a>\u00a0is a great first step that can equip you with the information you need to change the conversation quickly and with very little effort and expense on your part.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cI don't have any new budget for security this year and I'm becoming more and more concerned about getting attacked by hackers. I also know there's a ton of malware that seems &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[89,155,5,484,131,410],"tags":[300,284],"coauthors":[],"class_list":["post-6218","post","type-post","status-publish","format-standard","hentry","category-ciociso","category-cybersecurity-2","category-firewall","category-government","category-malware-2","category-vertical","tag-budget","tag-public-sector"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6218"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6218\/revisions"}],"predecessor-version":[{"id":6219,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6218\/revisions\/6219"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6218"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}