Marcel Eisma, Senior Director of Value Management at Proofpoint, a leader in cybersecurity solutions, is making huge strides with his changes to Proofpoint’s selling practices. Not only did Marcel introduce value management to Proofpoint, he is also working to develop new sales practices, incorporated with existing value methods.
Stay ahead with customer value thinking.
Cybersecurity:
Cybersecurity as a Value Solution
While defending against cyberattacks has become an increasingly important part of doing business, cybersecurity is still often seen primarily as a technology issue. But a recent blog post from Gartner[1] is calling for change. In fact, according to Gartner, cybersecurity is more properly defined as a business value issue that reaches well beyond the information security realm and directly impacts operational outcomes.
A Conversation with Leaders in Cybersecurity Part 3
While the world of cybersecurity has undergone a complete transformation in the last 20 years, some aspects of the industry remain unchanged. Women are still underrepresented in the IT workforce—especially at the top. In the final installment of our three-part women in cybersecurity and tech webinar series, we spoke with a panel of seasoned executives about the quantifiable value of cybersecurity, how women can overcome common challenges, and ways to make the tech environment more inviting for career starters. Here are the top takeaways from these thought leaders. (Be sure to read part one ...
Why You Should Be Doing Business With SOC II Compliant Company
SOC and Customer Value Data – Why it’s ImportantWhen considering a Customer Value Management application or platform, service offering (including consulting services) or other forms of business case development tools or value realization tools, it’s important that any approach you choose has SOC 2 compliance. This detailed third-party evaluation will ensure that the data you maintain about certain key financial metrics, formulas and raw data about how your customer evaluates your product or service is handled and kept secure. Likewise, a Type II certification is essential. More than just a...
Part 2: Lessons for Tomorrow from Today’s Cybersecurity & Tech Leaders
At DecisionLink, we want to empower women to achieve more than what’s expected of us based on outdated stereotypes. In the second of our three-part webinar series about women in cybersecurity and technology, we talked to a new panel of female leaders. They shared what they’ve learned across decades in the industry, offering advice for both organizations and individuals at all levels and of all genders. We touched on personal responsibility for privacy and security, the development of a more inclusive workforce, and strategies for succeeding in an ever-changing world.
3 Lessons for Success From Cybersecurity & Tech Professionals
While the ratio of women in cybersecurity is steadily increasing—around 24% today compared to just 11% in 2011—it’s still far from achieving true gender inclusivity.1 In the first of a three-part webinar series, we talked to a panel of leading industry professionals with diverse backgrounds. They shared the key lessons they’ve learned working in cybersecurity and tech. Their insights are important not only for women seeking to enter cybersecurity and tech, but also for companies wanting to develop, recruit, and retain women in the field. While a number of lessons can be extracted from their...