ISSA – Best Practices for choosing an Information Security Product
July 14, 2020 @ 1:00 pm - 2:15 pm
Presentation:
Many companies are preparing for long term security solutions for employees. Josh will provide best practices and considerations for products and tools, as well as how to appropriately vet vendors via RFP process. Josh will facilitate discussion of what criteria to judge vendors against when evaluating Information Security technology. This will include approaches to evaluation, such as paper proof of concepts, partner recommendation elimination/qualification, limited proof of concepts and full proof of concept. He will also discuss common tactics seen in the industry that are sometimes used to obfuscate how effective (or not effective) a given product is, and how they are portrayed as a convince for the purchaser/evaluator.
Josh will share what features should be an absolute requirement in any security product, and how to evaluate for these features and what to consider in evaluating the long term prospects of a product.
The overall goal is to provide the audience with a good framework for evaluating Information Security tools and a general understanding of what to look for in any security tool.
Presentation:
Many companies are preparing for long term security solutions for employees. Josh will provide best practices and considerations for products and tools, as well as how to appropriately vet vendors via RFP process. Josh will facilitate discussion of what criteria to judge vendors against when evaluating Information Security technology. This will include approaches to evaluation, such as paper proof of concepts, partner recommendation elimination/qualification, limited proof of concepts and full proof of concept. He will also discuss common tactics seen in the industry that are sometimes used to obfuscate how effective (or not effective) a given product is, and how they are portrayed as a convince for the purchaser/evaluator.
Josh will share what features should be an absolute requirement in any security product, and how to evaluate for these features and what to consider in evaluating the long term prospects of a product.
The overall goal is to provide the audience with a good framework for evaluating Information Security tools and a general understanding of what to look for in any security tool.
Presenter:
Joshua Madsen, Manager Network & Security Services, Wings Financial Credit Union
Details
Organizer
Venue