Intelligent CISO Issue 41 | Page 43

EXPERT OPINION in detecting threats , regardless of the threat vector .
How do you evaluate new vendors on your network ? Is the bar higher for new versus established vendors ? What are your acceptance criteria ?
Scanning the horizon for new and emerging cybersecurity technologies pays dividends . However , like the answer to the previous question , making sure that the existing investment is used to its full capability before chasing a shiny new toy is paramount . evaluation process should be started that would ultimately shortlist one or two solutions . These solutions could then be extensively evaluated , first in a test environment and then in production . Structuring the evaluation as either concurrent ‘ proof of value ’ engagements or fully paid , short-term subscriptions rolled out in parallel allows for a data-driven decision .
The solution that provides the best value in terms of stability , scalability , performance and support , wins . u
If indeed it has been determined that the existing toolset is unlikely to address the emerging threats , an
www . intelligentciso . com
43