<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Business Model of Security</title>
	<atom:link href="http://businessmodelofsecurity.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://businessmodelofsecurity.com</link>
	<description>Demand Driven Security Program Management</description>
	<lastBuildDate>Wed, 31 Jul 2013 18:39:41 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.38</generator>
	<item>
		<title>Desigining the Security Business</title>
		<link>http://businessmodelofsecurity.com/lifecycle/design/designing-the-security-business/</link>
		<comments>http://businessmodelofsecurity.com/lifecycle/design/designing-the-security-business/#comments</comments>
		<pubDate>Mon, 22 Jul 2013 22:56:56 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Design]]></category>

		<guid isPermaLink="false">http://businessmodelofsecurity.com/?p=475</guid>
		<description><![CDATA[<p>Successful business strategy is about actively shaping the game you play, not just playing the game you find. -Adam Brandenburger &#38; Barry Nalebuff When you are first starting out in redefining how you are operating your security program in a customer-centric context, you need to think about a few key concepts familiar to any new [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/lifecycle/design/designing-the-security-business/">Desigining the Security Business</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<blockquote><p>Successful business strategy is about actively shaping the game you play, not just playing the game you find.<br />
-Adam Brandenburger &amp; Barry Nalebuff</p></blockquote>
<p>When you are first starting out in redefining how you are operating your security program in a customer-centric context, you need to think about a few key concepts familiar to any new business.</p>
<h3>What business you are actually in?</h3>
<p>Do you want to be perceived, and perhaps more importantly, do you want to operate, as the carrot or the stick? In other words, do you want to play the role of the enforcer or the motivator/enabler? All too often our profession seems to lean towards that of the enforcer. Or, in many cases, more like a first responder. We have historically been very reactive in our approach to managing security. As a matter of fact, we have built entire product areas on managing event streams for purely reactionary purposes (like the IDS and SIEM markets).</p>
<p>While these are worthwhile monitoring concepts and shouldn’t be ignored, there is a vast ocean of untapped opportunity around a more consultative and proactive approach.</p>
<h3>Who are your customers?</h3>
<p>Just like a start-up, you need to identify who in your organization (and in some cases, those beyond your organization) are your customers. Don’t forget to include those parties that you only see occasionally, such as external auditors, and possibly even suppliers or other business partners. Your information can be a valuable part of their engagement with your organization as well.</p>
<p>This is a critical component to deciding the next step, which is what services and products (i.e.; packaged information for decision support you are offering and how best to ensure that it is useful to the recipients.</p>
<h3>Choosing your product and service mix.</h3>
<p>Now that you have decided who would be consuming your value-added information, it’s time to identify what makes up your product and service portfolio. A good place to start is to look at the controls spreadsheet that your internal and external auditors use to track the control objectives and activities they are responsible for testing.</p>
<p>While it isn’t a comprehensive set of controls for your security program, it is the minimum set of functions that you should look at for building out your business model. It also comes “pre-loaded&#8221; with a target market and allows you to start building a rapport with the consumers of the information you are providing so that you can make sure that you package it correctly and deliver it in a manner that makes it easier for them to use.</p>
<p>As always, your feedback is greatly appreciated. Not just on how this site can be improved, but also what other content or ideas you’d like to see in the curriculum or content on this site.</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/lifecycle/design/designing-the-security-business/">Desigining the Security Business</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/lifecycle/design/designing-the-security-business/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What kind of value do YOU bring?</title>
		<link>http://businessmodelofsecurity.com/uncategorized/what-kind-of-value-do-you-bring/</link>
		<comments>http://businessmodelofsecurity.com/uncategorized/what-kind-of-value-do-you-bring/#comments</comments>
		<pubDate>Tue, 09 Jul 2013 14:13:24 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://businessmodelofsecurity.com/?p=336</guid>
		<description><![CDATA[<p>&#160; As the manager of “ME, Incorporated,” you are in the B2B space. Your customer is your employer. If he doesn’t buy your services, you are out of a job. Your employer’s employers are his customers. If they don’t buy his products, he is out of business&#8230; And so are you. via The Only Way [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/uncategorized/what-kind-of-value-do-you-bring/">What kind of value do YOU bring?</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<blockquote><p>As the manager of “ME, Incorporated,” you are in the B2B space. Your customer is your employer. If he doesn’t buy your services, you are out of a job. Your employer’s employers are his customers. If they don’t buy his products, he is out of business&#8230; And so are you.</p>
<p>via <a href="http://www.linkedin.com/today/post/article/20130617180159-36052017-the-only-way-to-raise-your-salary?trk=eml-mktg-top10-p4&amp;_mSplash=1">The Only Way To Raise Your Salary | LinkedIn</a>.</p></blockquote>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/uncategorized/what-kind-of-value-do-you-bring/">What kind of value do YOU bring?</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/uncategorized/what-kind-of-value-do-you-bring/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>If your business were a black box machine&#8230;</title>
		<link>http://businessmodelofsecurity.com/bmos/business-model-personalities/</link>
		<comments>http://businessmodelofsecurity.com/bmos/business-model-personalities/#comments</comments>
		<pubDate>Tue, 09 Jul 2013 14:12:19 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[BMoS]]></category>

		<guid isPermaLink="false">http://businessmodelofsecurity.com/?p=340</guid>
		<description><![CDATA[<p>A well-defined business model should clearly articulate your function in the market, including how you make money, what inputs you depend upon, who your target customers are, and what value you are creating for them. It is a structural representation of how your business functions that concisely articulates what opportunities and challenges you will encounter [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/business-model-personalities/">If your business were a black box machine&#8230;</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<blockquote><p>A well-defined business model should clearly articulate your function in the market, including how you make money, what inputs you depend upon, who your target customers are, and what value you are creating for them. It is a structural representation of how your business functions that concisely articulates what opportunities and challenges you will encounter with this business. If your business were a black box machine, this would be the instruction manual.</p></blockquote>
<p>via <a href="http://www.inc.com/neal-cabage/7-business-model-personalities.html">7 Business Model Personalities | Inc.com</a>.</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/business-model-personalities/">If your business were a black box machine&#8230;</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/business-model-personalities/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Threat Monitoring</title>
		<link>http://businessmodelofsecurity.com/bmos/inbound-logisitics/threat-monitoring/</link>
		<comments>http://businessmodelofsecurity.com/bmos/inbound-logisitics/threat-monitoring/#comments</comments>
		<pubDate>Fri, 02 Mar 2012 20:18:06 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Inbound Logisitics]]></category>

		<guid isPermaLink="false">http://businessmodelofsecurity.com/?p=218</guid>
		<description><![CDATA[<p>What is Threat Monitoring? The ongoing collection, analysis, and review of attempted and/or successful compromises at the network, platform, data  and process levels. Process Overview The purpose of the Threat Monitoring Process is to standardize and explain the processing activities and steps involved in monitoring threat conditions to organization information assets. Supporting Technologies Network threat [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/inbound-logisitics/threat-monitoring/">Threat Monitoring</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h2>What is Threat Monitoring?</h2>
<p>The ongoing collection, analysis, and review of attempted and/or successful compromises at the network, platform, data  and process levels.</p>
<h3>Process Overview</h3>
<p>The purpose of the Threat Monitoring Process is to standardize and explain the processing activities and steps involved in monitoring threat conditions to organization information assets.</p>
<h3>Supporting Technologies</h3>
<ul>
<li>Network threat detection software/hardware.</li>
<li>Platform threat detection software/hardware.  Limited support through platform event logging.</li>
<li>Application threat detection through application event logging.</li>
<li>Centralized threat report repository software/hardware.</li>
</ul>
<h3>Process Dependencies</h3>
<ul>
<li>Help Desk/Problem Management</li>
<li>Data Center Operations</li>
<li>Network Operations</li>
<li>Contingency Planning/Disaster Recovery</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/inbound-logisitics/threat-monitoring/">Threat Monitoring</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/inbound-logisitics/threat-monitoring/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Creating the Security Business</title>
		<link>http://businessmodelofsecurity.com/bmos/introduction/creating-the-security-business/</link>
		<comments>http://businessmodelofsecurity.com/bmos/introduction/creating-the-security-business/#comments</comments>
		<pubDate>Tue, 23 Mar 2010 09:59:16 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Introduction]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[organizational strategy]]></category>
		<category><![CDATA[Professional Services Firm]]></category>
		<category><![CDATA[risk management]]></category>

		<guid isPermaLink="false">http://competitivecompliance.com/?p=135</guid>
		<description><![CDATA[<p>When you are first starting out in redefining how you are operating your security program in a customer-centric context, you need to think about a few key concepts familiar to any new business. What business you are actually in? Do you want to be perceived, and perhaps more importantly, do you want to operate, as [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/creating-the-security-business/">Creating the Security Business</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>When you are first starting out in redefining how you are operating your security program in a customer-centric context, you need to think about a few key concepts familiar to any new business.</p>
<h3>What business you are actually in?</h3>
<p>Do you want to be perceived, and perhaps more importantly, do you want to operate, as the carrot or the stick? In other words, do you want to play the role of the enforcer or the motivator/enabler? All too often our profession seems to lean towards that of the enforcer. Or, in many cases, more like a first responder. We have historically been very reactive in our approach to managing security. As a matter of fact, we have built entire product  areas on managing event streams for purely reactionary purposes (like the IDS and SIEM markets).</p>
<p>While these are worthwhile monitoring concepts and shouldn&#8217;t be ignored, there is a vast ocean of untapped opportunity around a more consultative and proactive approach.</p>
<h3>Who are your customers?</h3>
<p>Just like a start-up, you need to identify who in your organization (and in some cases, those beyond your organization) are your customers. Don&#8217;t forget to include those parties that you only see occasionally, such as external auditors, and possibly even suppliers or other business partners. Your information can be a valuable part of their engagement with your organization as well.</p>
<p>This is a critical component to deciding the next step, which is what services and products (i.e.; packaged information for decision support you are offering and how best to ensure that it is useful to the recipients.</p>
<h3>Choosing your product and service mix.</h3>
<p>Now that you have decided who would be consuming your value-added information, it&#8217;s time to identify what makes up your product and service portfolio. The best place to start is to look at the controls spreadsheet that your internal and external auditors use to track the control objectives and activities they are responsible for testing.</p>
<p>While it isn&#8217;t a comprehensive set of controls for your security program, it is the minimum set of functions that you should look at for building out your business model. It also comes &#8220;pre-loaded&#8217; with a target market and allows you to start building a rapport with the consumers of the information you are providing so that you can make sure that you package it correctly and deliver it in a manner that makes it easier for them to use.</p>
<p>Here is the slide deck that accompanies this portion of the Competitive Compliance curriculum we have developed. Feel free to spread the link around, or even download the PDF of the deck if you find it useful. As always, your feedback is greatly appreciated. Not just on how this site can be improved, but also what other content or ideas you&#8217;d like to see in the curriculum or content on this site.</p>
<div id="__ss_3495508" style="width: 425px;"><strong style="display: block; margin: 12px 0 4px;"></strong><object width="425" height="355" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="true" /><param name="allowScriptAccess" value="always" /><param name="src" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=creatingthesecuritybusiness-100321124202-phpapp01&amp;stripped_title=creating-the-security-business" /><param name="allowfullscreen" value="true" /><param name="allowscriptaccess" value="always" /><embed width="425" height="355" type="application/x-shockwave-flash" src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=creatingthesecuritybusiness-100321124202-phpapp01&amp;stripped_title=creating-the-security-business" allowFullScreen="true" allowScriptAccess="always" allowfullscreen="true" allowscriptaccess="always" /></object></div>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/creating-the-security-business/">Creating the Security Business</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/introduction/creating-the-security-business/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Defining Security Strategy</title>
		<link>http://businessmodelofsecurity.com/bmos/introduction/defining-security-strategy/</link>
		<comments>http://businessmodelofsecurity.com/bmos/introduction/defining-security-strategy/#comments</comments>
		<pubDate>Tue, 02 Mar 2010 11:50:40 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Introduction]]></category>
		<category><![CDATA[competitive strategy]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[isc2]]></category>
		<category><![CDATA[risk management]]></category>

		<guid isPermaLink="false">http://competitivecompliance.com/?p=123</guid>
		<description><![CDATA[<p>When developing your security strategy, it is important to recognize the limitations on your team. In this case, choosing what to do is often less important than choosing what NOT to do. This deck is used to drive conversation around the choices we make as security practitioners in what we choose to tackle, and what [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/defining-security-strategy/">Defining Security Strategy</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>When developing your security strategy, it is important to recognize the limitations on your team. In this case, choosing what to do is often less important than choosing what NOT to do. This deck is used to drive conversation around the choices we make as security practitioners in what we choose to tackle, and what choose not to do in our daily quest to mitigate and manage risk.</p>
<div id="__ss_3318386" style="width: 425px;"><object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" width="425" height="355" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="true" /><param name="allowScriptAccess" value="always" /><param name="src" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=definingsecuritystrategy-100302123240-phpapp02&amp;stripped_title=defining-security-strategy" /><param name="allowfullscreen" value="true" /><embed type="application/x-shockwave-flash" width="425" height="355" src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=definingsecuritystrategy-100302123240-phpapp02&amp;stripped_title=defining-security-strategy" allowscriptaccess="always" allowfullscreen="true"></embed></object></p>
<div style="padding: 5px 0 12px;"></div>
</div>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/defining-security-strategy/">Defining Security Strategy</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/introduction/defining-security-strategy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Language of Risk</title>
		<link>http://businessmodelofsecurity.com/bmos/introduction/language-of-risk/</link>
		<comments>http://businessmodelofsecurity.com/bmos/introduction/language-of-risk/#comments</comments>
		<pubDate>Sat, 27 Feb 2010 03:29:01 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Introduction]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[isc2]]></category>
		<category><![CDATA[Language of Risk]]></category>
		<category><![CDATA[organizational strategy]]></category>
		<category><![CDATA[risk management]]></category>

		<guid isPermaLink="false">http://competitivecompliance.com/?p=116</guid>
		<description><![CDATA[<p>Why is “The Language of Risk” so important right now?  What are the drivers for Business and Security to speak the same language?  The answer is change: massive, fundamental change in both camps. Technology has moved to center stage as a partner in business enablement, and has brought along its associated risks.  IT and IT [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/language-of-risk/">Language of Risk</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Why is “The Language of Risk” so important right now?  What are the drivers for Business and Security to speak the same language?  The answer is change: massive, fundamental change in both camps.</p>
<p>Technology has moved to center stage as a partner in business enablement, and has brought along its associated risks.  IT and IT Security see massive changes daily in the very nature of the capabilities and services they provide.  Transformative changes and their resulting risks and benefits impact the business enterprise overall.</p>
<p>What changes?  EVERYTHING. This is a paradigm shift far greater than that of changing from mainframes and terminals to desktop computing. Potential anarchy lurks, and security risks change hourly.  IT Security can no longer manage risk in a vacuum.  The risks to IT Security are the risks to the enterprise, period.</p>
<p>It is imperative now for the Language of Risk to be a common element between Business and IT Security.  Each of these transformative changes in IT brings the potential for competitive advantage, cost savings and economies of scale.  The security risks bring potential for financial ruin, loss of reputation and regulatory fines.  Technology evolves, but it is past time for IT Security and Business to define what is essential, the security and availability for the resources required to do business.</p>
<p>We need a common lexicon.  We need “The Language of Risk.”  Let’s talk.</p>
<p>Here is the opening set of slides from the (ISC)<sup>2</sup> 2010 Security Leadership Series on Competitive Compliance which outlines how thinking like the business leads to improved communication between parties on risk.</p>
<p><object width="425" height="355" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="true" /><param name="allowScriptAccess" value="always" /><param name="src" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=thelanguageofrisk-100226203521-phpapp01&amp;rel=0&amp;stripped_title=the-language-of-riskintroduction" /><param name="allowfullscreen" value="true" /><param name="allowscriptaccess" value="always" /><embed width="425" height="355" type="application/x-shockwave-flash" src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=thelanguageofrisk-100226203521-phpapp01&amp;rel=0&amp;stripped_title=the-language-of-riskintroduction" allowFullScreen="true" allowScriptAccess="always" allowfullscreen="true" allowscriptaccess="always" /></object></p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/language-of-risk/">Language of Risk</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/introduction/language-of-risk/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Information Security as a PSF</title>
		<link>http://businessmodelofsecurity.com/uncategorized/information-security-as-a-psf/</link>
		<comments>http://businessmodelofsecurity.com/uncategorized/information-security-as-a-psf/#comments</comments>
		<pubDate>Sat, 27 Feb 2010 01:58:20 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[Professional Services Firm]]></category>
		<category><![CDATA[PSF]]></category>
		<category><![CDATA[tom peters]]></category>

		<guid isPermaLink="false">http://competitivecompliance.com/?p=94</guid>
		<description><![CDATA[<p>Can security operations be run as though it were a Professional Services Firm (PSF)? Management guru and firebrand Tom Peters thinks so, and so do I. I first read Tom&#8217;s book, &#8220;The Professional Services Firm 50&#8243;, when it first came out, back in 1999. And I have to say, after spending the first few years [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/uncategorized/information-security-as-a-psf/">Information Security as a PSF</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Can security operations be run as though it were a Professional Services Firm (PSF)? Management guru and firebrand Tom Peters thinks so, and so do I. I first read Tom&#8217;s book, &#8220;The Professional Services Firm 50&#8243;, when it first came out, back in 1999. And I have to say, after spending the first few years of my infosec career listening to those that had tread before me bemoan the &#8220;lack of attention&#8221; or &#8220;poor management support&#8221; for their programs, it opened up a whole new world to me. It set me on the path that has defined my career for the last 10 years (and counting).</p>
<p>Tom understands what makes people tick, and more importantly how they can tap into that energy and change how they are perceived and valued within their organizations. By drawing parallels between our daily grind as white collar professionals and the work of &#8220;traditional&#8221; professional services firms such as those in advertising, legal, accounting, and other disciplines, he weaves together a model that each of us can use to great advantage in our day-to-day work.</p>
<p><em>If we choose to.</em></p>
<p>Tom&#8217;s fundamental understanding of the PSF boils down to three simple axioms. Here they are, in his own words:</p>
<blockquote><p>The Professional Service Firms. “PSFs,” as I call them, sell one and only one thing: Creative Intellectual Capital.</p></blockquote>
<blockquote><p>PSFs depend on one and only one thing: Superb Client Relationships.</p></blockquote>
<blockquote><p>The PSF bedrock consists of one and only one thing: Superior, Animated, Creative TALENT … dedicated to…EXCELLENCE.</p></blockquote>
<p>As security practitioners, we have been stellar at understanding and trumpeting the first point, often to our very own discredit. You see, we tend to imbue the information security universe with a certain mystique, an air of the supernatural.</p>
<p>Unfortunately, it has backfired, and something fierce.</p>
<p>In creating this atmosphere of complexity and high-tech mumbo-jumbo, we have alienated our stakeholders, the very people we are supposed to be educating and working with to manage risk. Perhaps it&#8217;s our IT backgrounds, or the glut of TLAs (<span style="text-decoration: underline;">t</span>hree <span style="text-decoration: underline;">l</span>etter <span style="text-decoration: underline;">a</span>cronyms) in our field that have built this Tower of Babel. The root cause is irrelevant; the end result has stayed the same. We have destroyed Tom&#8217;s second point, often before we even realized it. Our &#8220;client&#8221; relationships are in shambles. We <em>don&#8217;t</em> have a seat at the big table. We <em>aren&#8217;t</em> taken as seriously as we would like, or feel that we deserve to be.</p>
<p>And despite our focus on Tom&#8217; s third point, the fresh and exuberant talent we bring in gets poisoned by our own jaded worldview. We are destroying the future of our profession, one new hire at a time.</p>
<p>Thankfully, this trend can be reversed. All it takes is a fresh look at how our operations are run, and how we choose to measure our success.</p>
<p>You can just click here to jump to Amazon and pick up a copy of Tom&#8217;s book, &#8220;<a title="The Professional Services Firm 50" href="http://www.amazon.com/Professional-Service-Firm50-Reinventing-Work/dp/0375407715%3FSubscriptionId%3DAKIAIN5534UCWMDSRTVQ%26tag%3Dcompetitivecompliance-20%26linkCode%3Dxm2%26camp%3D2025%26creative%3D165953%26creativeASIN%3D0375407715" target="_blank">The Professional Services Firm 50</a>&#8220;. </p>
<p>If you&#8217;re the impatient type, and just want the highlights, then click the button below to download &#8220;PSFs Are Everything&#8221;, the e-book he has been gracious enough to allow us to redistribute.</p>
<p><a class="btn" href="http://businessmodelofsecurity.com/wp-content/uploads/2010/02/PSFIsEverything.pdf">Get Tom&#8217;s Paper</a></p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/uncategorized/information-security-as-a-psf/">Information Security as a PSF</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/uncategorized/information-security-as-a-psf/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Law, Strategy and Competitive Advantage</title>
		<link>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/law-strategy-and-competitive-advantage/</link>
		<comments>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/law-strategy-and-competitive-advantage/#comments</comments>
		<pubDate>Tue, 03 Nov 2009 17:44:24 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Competitive Advantage]]></category>
		<category><![CDATA[competitive strategy]]></category>
		<category><![CDATA[legal and regulatory issues]]></category>
		<category><![CDATA[organizational strategy]]></category>
		<category><![CDATA[Sarbanes-Oxley]]></category>
		<category><![CDATA[university of connecticut]]></category>

		<guid isPermaLink="false">http://competitivecompliance.com/?p=78</guid>
		<description><![CDATA[<p>In the hunt for sources of competitive advantage, scholars have identified opportunities in most business-related disciplines, including marketing, accounting, human resources, and management. Competitive advantage from cross-functional perspectives such as organizational capital, human capital, and global competition have also received vast amounts of scholarly time and attention. The end result has been a cornucopia of [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/law-strategy-and-competitive-advantage/">Law, Strategy and Competitive Advantage</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>In the hunt for sources of competitive advantage, scholars have identified opportunities in most business-related disciplines, including marketing, accounting, human resources, and management. Competitive advantage from cross-functional perspectives such as organizational capital, human capital, and global competition have also received vast amounts of scholarly time and attention. The end result has been a cornucopia of research on improving organizational strategy to capture and sustain competitive advantage. Despite this fact, the thought of an organization&#8217;s regulatory and legal landscape as a source of advantage has remained largely unexplored.<span id="more-78"></span></p>
<p>The increased corporate regulation brought about by the Sarbanes-Oxley Act of 2002, and the increased demand for legal compliance programs, coupled with the trend in using litigation as a tool for business reform, have increased organization&#8217;s regulatory obligations. This increased scrutiny means that legal and regulatory issues may be one of the most important determinants in a organization’s external operating environment.</p>
<p>Compliance is quite possibly the last great source of untapped competitive advantage available today.</p>
<p>To download the latest research from University of Connecticut <a href="http://www.business.uconn.edu/cms/p461/u365/mc/r">Asst. Professor Robert C. Bird</a>, the paper that started it all, click below.</p>
<p><a class="btn" href="http://businessmodelofsecurity.com/wp-content/uploads/2009/11/Law_Strategy_and_Competitive_Advantage.pdf">Get The Paper</a></p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/law-strategy-and-competitive-advantage/">Law, Strategy and Competitive Advantage</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/law-strategy-and-competitive-advantage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Competitive Advantage Defined</title>
		<link>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/competitive-advantage-defined/</link>
		<comments>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/competitive-advantage-defined/#comments</comments>
		<pubDate>Wed, 21 Oct 2009 17:02:05 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Competitive Advantage]]></category>
		<category><![CDATA[competitive strategy]]></category>
		<category><![CDATA[harvard business school]]></category>
		<category><![CDATA[michael e porter]]></category>
		<category><![CDATA[quality management]]></category>
		<category><![CDATA[six sigma]]></category>
		<category><![CDATA[total quality management tqm]]></category>
		<category><![CDATA[value chain]]></category>

		<guid isPermaLink="false">http://competitivecompliance.com/?p=8</guid>
		<description><![CDATA[<p>What are you choosing to do differently than your rivals in order to create and sustain value for your organization?</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/competitive-advantage-defined/">Competitive Advantage Defined</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignleft size-thumbnail wp-image-70" title="how YOU doing?" src="http://businessmodelofsecurity.com/wp-content/uploads/2009/10/iStock_000002652861Medium1-150x150.jpg" alt="how YOU doing?" width="150" height="150" />Competitive advantage is the &#8216;edge&#8217; a firm realizes against its rivals. There is a combination of activities that allow an organization to to manifest itself in the marketplace in the first place; it is <em>how</em> an organization executes these activities that are the determining factor in achieving advantage over rivals. Traditionally, these activities have been mapped across a value chain to show their inter-relationships and their contributions to the overall advantage (or disadvantage) to the firm. This value chain approach was developed and popularized by Michael E. Porter of the Harvard Business School in his groundbreaking work titled &#8220;<a href="http://astore.amazon.com/competitivecompliance-20/detail/0684841487" target="_blank">Competitive Strategy</a>&#8220;, published in 1980.</p>
<p>The activities that support the creation, production, sales, and delivery of a product or service are the fundamental constructs of competitive advantage. The term <em>operational effectiveness</em> is Porter&#8217;s way of describing how an organization performs these activities better (read as: faster, cheaper, higher quality, etc.) than market rivals. As we have discussed in presentations across the US, it was through operational effectiveness that Japanese companies, most notably the auto makers, dominated the US in the 1970s and 1980s. They used practices many of us are already familiar with, such as  Total Quality Management (TQM) and Six Sigma. Make no mistake, companies can gain tremendous advantages from operational effectiveness, but from a competitive standpoint, the best practices developed in this vein can be, and often are, easily emulated by rivals.</p>
<p>As the market begins to shift, adopting the same or similar best practices, the competitive advantage is eroded. Porter refers to this phenomena as the <em>productivity frontier</em>. The productivity frontier is a function of the application of the best technology, skills, and management techniques available to the organization and is the high water mark of value attained through this method.</p>
<p>As more and more companies adopt these operational effectiveness and efficiency measures, they become less and less differentiated. The marketplace then is essentially rebalanced, favoring no single player and reducing the past gains to simply a barrier to entry in the market.</p>
<p>As Porter sees it, the only way to achieve <em>sustainable</em> competitive advantage, is to do different things or to do the same things, but in a different fashion than your competitors.</p>
<p>What are you choosing to do differently?</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/competitive-advantage-defined/">Competitive Advantage Defined</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/competitive-advantage-defined/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
