whoisjoe.com

Understanding Customer Needs and Helping Them Mature

  

September 22, 2014

Home About Projects Blog LinkedIn ReThink Security

(Originally posted on the Security Innovation Blog)

##Security Innovation’s manifesto on being a trusted advisor

Each client has different backgrounds as well as a different depth of knowledge, experience, comfort, maturity, and trust. As trusted security advisors with genuine and heightened passion for helping our clients fundamentally improve their processes and build internal expertise, we take pride in delivering customized solutions that meet each company’s needs. At its core, this goes beyond simply setting and meeting expectations reliably.

We do this by:

  • Building trust - this is achieved by being dependable and professional and demonstrating that we have the customer’s best interest in mind
  • Fostering Education - ensuring that we transfer any internal expertise of the problem to the customer in a way that they can understand and repeat in the future

##Building Trust

Building trust allows us to help our customers in meaningful ways and facilitate their ability to build internal expertise and operational maturity. As trust is galvanized, customers realize that we are more than just a service provider and that we truly become a member of their team during the engagement, providing recommendations and insights as if we were actual employees. This creates loyalty on both ends as we realize that both parties are looking to achieve the same objectives in the most effective and impactful way possible. This makes it easier and more comfortable for our clients to proactively come to us with more challenging issues because they know we have their best interest in mind.

Once we have built trust with the client, we often engage in conversations and engagements that help them mature their processes, which is the backbone of a an effective Application Security Program. Depending on how much the client knows about application security, we adjust our technical conversations up or down. On one end of the spectrum, we may be teaching, leading and providing detailed explanations to help our client build their baseline understanding. At the other end of the spectrum, our experts will spend more time listening, summarizing conversations, and partnering with our client to create more novel solutions to unique issues. A client with less maturity typically needs more of a leader and a teacher. In this case, we need to make sure we understand their specific needs, and it often warrants us recommending a less complex, more turnkey solution due to their less extensive infrastructure and processes. A client with more maturity often needs an architect to solve challenging problems, understand their current process and offer customized and unique solutions.

The manner in which we interact with clients also changes based on the various security roles and stakeholders. For example…

  • CSOs are often concerned with the overall expense or value of the project
  • Engineers and Developers may be concerned that we’ll find mistakes in their code;
  • Security Engineers may be worried that we will identify a lack of proficiencies in their capabilities

Understanding the root of each stakeholder’s concern helps us adjust the language and tone of our conversations. In turn, this yields more open and trustworthy communication.

Lastly, we always keep in mind that trust needs to be earned and sometimes grows more slowly than anticipated. We do not expect it to happen over-night or to be implicitly trusted by the client, but we are always driven by reaching our goal of complete trust.

##Education and Knowledge

When communicating with our clients, it’s important that we phrase our conversations appropriately so what we do not incorrectly assume something or miss out on an opportunity to have more detailed follow up conversations. Depending on how much our client already knows about application security, we fine-tune our teaching, explaining and leading techniques. This ensures that our clients always have at least a baseline understanding of security and equips them to be a more active participant in future decision making. It is important to help improve our client’s knowledge so they can become a partner in improving their security posture. As our clients become more knowledgeable about application security, our conversations often change to a more collaborative conversation. At this point, the client may have a solid understanding of certain facets of security and is encouraged to play a greater role in the decision making process.

If a client has a solid understanding of security and process, they may also have a good understanding of how to solve their problem. In that case, our relationship changes from a leader/teacher role to a partner role. As a partner, we may be asked to help play an equal part in the problem solving and remediation process. In these situations, where we do inject our expertise, we do so in a manner conducive to continued learning.

Our goal is ultimately to teach our clients as much as possible without overwhelming them. Key to this is helping client’s reduce stress and solve problems around security. We avoid compounding our client’s existing challenges by expecting them to learn or know as much about security as we do.

…After all, that is why we have been contracted

Posted By: Joe Basirico

  • 81 More Posts
  • So, You're a Manager Now
  • A Mixtape in 2022
  • The Middle Path of Planning and Reflection
  • Micromanagement and Trust
  • On Giving Advice
  • Emergency Preparedness During Coronavirus Frenzy
  • Mind Map Your Life
  • Start With the Hard Part
  • Delight in the Details
  • Introducing ReThink Security
  • Newsletter & Recommendations
  • Take a Moment
  • Triage Decision Making
  • Show Your Work
  • Getting Back Up
  • Max Out vs. Continuous Development
  • Mental Diet and Exercise
  • Asking for Help Part 2 - Alerting
  • High Water Mark
  • Who Do You Want to Be
  • Presentation Tips
  • Asking for Help
  • China Hijacking the Internet
  • Recording Audio with AirPods in Imovie
  • Active Decisions
  • Create/Publish Scripts
  • Specialize or Do Not Specialize
  • Exactis Breach
  • Optimizing Images
  • What I Track
  • What I’m Thinking About May
  • What I’m Thinking About March
  • What I’m Thinking About January
  • Building a Collaborative & Social Application Security Program
  • Lazy Days in the Cloud
  • Delegate Then Do
  • So you want to be a better programmer
  • Project Success
  • Don't Short Circuit a Lesson
  • Scale Your Solution to the Problem
  • Digital Currencies
  • Fortnightly
  • Why You Should Have Trust Issues with Pokemon Go, and Every Other App on Your Phone
  • In Defense of Reverse Engineering and Responsible Disclosure
  • Ruby open allows command injection if user controlled
  • New Mac Install Guide
  • Understanding Customer Needs and Helping Them Mature
  • My Experiences with IOS8 and Yosemite so far
  • The Importance of Vulnerability Disclosure Programs and Bug Bounties
  • My New Record Player and Beck - Morning Phase (The Vinyl Experience)
  • An Hour of Code with Code.org
  • Gmail Changes to Displays Images by Default
  • Why I Donated to Help Jailbreak iOS7 & You Should Too
  • Email Strategy
  • Shutdown
  • Anatomy of a Distributed Denial of Service (DDoS) Attack
  • NASA Forced to Suspend All Public Outreach & Education Programs
  • Joe_CMS Open Source!
  • Mobile Application Security Testing FAQs: Post #1
  • How Much Security Does Obfuscation Get You?
  • Why Privacy Matters Even if You Have 'Nothing to Hide'
  • What LinkedIn Should Have Done with Your Passwords
  • Constant Vigilance
  • Boeing Paying Hackers to Break into Their Systems
  • My Reading Cycle
  • Developing Tools for Professional Hackers
  • Finding Your Inner Evildoer (4/4): An Evil Streak
  • Finding Your Inner Evildoer (3/4): A Good Imagination
  • When to Rebuild Your Process from Scratch
  • Finding Your Inner Evildoer (2/4): Complete Knowledge of the System
  • Continuous Incremental, Personal Improvement
  • Finding Your Inner Evildoer: Part 1
  • CISCO Password Revealer
  • Battling with Word and Excel
  • Which is More Secure: Windows or Linux?
  • The High Cost of an Application Security Data Breach
  • Using the ConfigurationManager to Access your ConnecitonStrings in the Web.Config
  • New WikiRater Features
  • When is it OK to Build up Technical Debt
  • Time Management with the Pomodoro Technique
  • Manage Energy Not Time
  • Goals, Results and Activities - defining your productivity
© 2022 whoisjoe.com