<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cybersecurity & Business]]></title><description><![CDATA[A Cybersecurity Chief Business Officer & Chief Revenue Officer for more than 20 years, writing about the market, the business and everything else required to build and lead a successful Cybersecurity organization.]]></description><link>https://cybersecandbiz.substack.com</link><image><url>https://substackcdn.com/image/fetch/$s_!ZO8W!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b1a6078-128d-4c5b-bdc7-816476a47464_256x256.png</url><title>Cybersecurity &amp; Business</title><link>https://cybersecandbiz.substack.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 01 May 2026 02:28:55 GMT</lastBuildDate><atom:link href="https://cybersecandbiz.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ignacio Sbampato]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cybersecandbiz@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cybersecandbiz@substack.com]]></itunes:email><itunes:name><![CDATA[Ignacio Sbampato]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ignacio Sbampato]]></itunes:author><googleplay:owner><![CDATA[cybersecandbiz@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cybersecandbiz@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ignacio Sbampato]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[They Say Gartner is Dead. Clearly, They Haven’t Checked Their LLM Sources.]]></title><description><![CDATA[We are in the Age of the Self-Fulfilling Prophecies and Why you should Stop using LLMs for Market Research]]></description><link>https://cybersecandbiz.substack.com/p/they-say-gartner-is-dead-clearly</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/they-say-gartner-is-dead-clearly</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Thu, 23 Apr 2026 08:47:18 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/476e54c3-4dbe-489b-8378-55cfd9fe5a90_1672x941.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Brands and Vendors are always working on creating their own reality and shaping our perception to match with it. It is the way it has always been and always will be and now they have new allies: <strong>LLMs</strong>.</p><blockquote><p>And most people using them for market research haven&#8217;t noticed yet.</p></blockquote><p>Let&#8217;s say you&#8217;re researching Vulnerability Management solutions. You open ChatGPT or Claude and type: <em>&#8220;What are the best Vulnerability Management solutions?&#8221;</em>, the same way you would have started a Google search three years ago.</p><p>Very likely, you get a confident, well-structured answer recommending Tenable, Qualys, Rapid7, and a few others. <strong>It makes sense, right?</strong> Those are the known &#8220;leaders&#8221; in the space. Common knowledge.</p><p><strong>But have you ever checked what sources the LLM is actually using to give you that answer?</strong></p><p>I did. I ran that kind of question across ChatGPT, Claude, and a couple of others, covering 15+ cybersecurity categories. And here&#8217;s the short version: if you thought industry analysts were biased &#8212; and many do &#8212; <strong>LLMs are clearly even more so.</strong></p><h1>The Importance of Knowing Your Sources</h1><p>I&#8217;ve been always interested in knowing the sources behind any research or statistics I read. So, I set up both ChatGPT and Claude, at the end of every interaction I have with them, what sources they drew on. That instruction is baked into my custom settings for both tools:</p><div class="callout-block" data-callout="true"><p>Always list your sources at the end of your response. Split between your own sources (<em>internal - not those you search on the web for</em>), and the ones you search one the web (<em>external</em>). Always include name and year for your own sources (<em>and link if exists</em>), and for the external sources, include name of publication, date and link.</p></div><p>What comes back looks something like this: a list of URLs, report titles, and vendor pages that the LLM uses &#8211; either directly or indirectly &#8211; to construct its answer. That source list is what I always pay attention to understand the quality of the LLMs outputs.</p><p>For instance, these were the sources the first time I asked ChatGPT about Vulnerability Management solutions:</p><div class="callout-block" data-callout="true"><p><strong>Own knowledge</strong></p><p>General cybersecurity tooling landscape (trained knowledge, 2024&#8211;2025)<br>Industry patterns in vulnerability management evolution (risk-based prioritization, CTEM)</p><p><strong>External sources</strong></p><p>Gartner Peer Insights comparisons (2025&#8211;2026): <a href="https://www.gartner.com/reviews/market/vulnerability-assessment/compare/qualys-vs-tenable">https://www.gartner.com/reviews/market/vulnerability-assessment/compare/qualys-vs-tenable</a><br>Tenable blog / Gartner MQ announcement (Nov 2025): <a href="https://www.tenable.com/blog/tenable-is-a-leader-in-the-first-ever-gartner-magic-quadrant-for-exposure-assessment-platforms">https://www.tenable.com/blog/tenable-is-a-leader-in-the-first-ever-gartner-magic-quadrant-for-exposure-assessment-platforms</a><br>Qualys blog / Gartner MQ (Nov 2025): <a href="https://blog.qualys.com/product-tech/2025/11/24/from-vision-to-value-gartner-identifies-qualys-as-2025-magic-quadrant-leader-in-exposure-assessment-platforms">https://blog.qualys.com/product-tech/2025/11/24/from-vision-to-value-gartner-identifies-qualys-as-2025-magic-quadrant-leader-in-exposure-assessment-platforms</a><br>CybersecurityNews (Jan 2026): <a href="https://cybersecuritynews.com/vulnerability-management-tools/">https://cybersecuritynews.com/vulnerability-management-tools/</a><br>AccuKnox blog (2025): <a href="https://accuknox.com/blog/vulnerability-management-tools">https://accuknox.com/blog/vulnerability-management-tools</a><br>BeagleSecurity comparison (Aug 2025): <a href="https://beaglesecurity.com/blog/article/tenable-vs-qualys-vs-rapid7.html">https://beaglesecurity.com/blog/article/tenable-vs-qualys-vs-rapid7.html</a><br>Luniq comparison (Mar 2026): <a href="https://www.luniq.io/en/resources/blog/qualys-vs-tenable-vs-rapid7-best-vulnerability-scanner-for-engineering-firms-in-2026">https://www.luniq.io/en/resources/blog/qualys-vs-tenable-vs-rapid7-best-vulnerability-scanner-for-engineering-firms-in-2026</a><br>UnderDefense blog (Dec 2025): <a href="https://underdefense.com/blog/tenable-alternatives-2026-9-vulnerability-exposure-platforms/">https://underdefense.com/blog/tenable-alternatives-2026-9-vulnerability-exposure-platforms/</a></p></div><p>Once you start reading those sources, it&#8217;s hard to unsee what&#8217;s happening.</p><h1>What LLMs Actually Use When You Ask About Cybersecurity Solutions</h1><p>Across <strong>15+ cybersecurity sectors</strong> &#8212; IoT Security, Vulnerability Management, WAF/WAAP, SIEM/XDR, ASM/Exposure Management, Zero Trust, SSE, PAM, NDR, Email Security, Firewall/Network Security, Backup/Data Protection, and Endpoint Protection/EDR and others &#8212; the pattern is very consistent. In almost every case, the LLM&#8217;s answer used three types of sources:</p><ol><li><p>Industry Analyst Reports (<em>primarily Gartner and Forrester</em>)</p></li><li><p>Articles written by Vendors themselves</p></li><li><p>US-based media and publications</p></li></ol><p>Even the categories that I have noticed were relying less on analyst reports (<em>like Backup/Data Security and Firewall/Network Security</em>) still included Gartner or Forrester indirectly, through articles citing their Magic Quadrant or Wave reports.</p><p>For instance, this is the output of one of the times I checked for Backup &amp; Data Security:</p><div class="callout-block" data-callout="true"><p><strong>Own knowledge</strong></p><p>General IT infrastructure &amp; enterprise backup architecture knowledge (OpenAI, 2025)</p><p><strong>External sources</strong></p><p>Redstor &#8211; <em>Top 10 enterprise backup solutions 2025</em> (2025) <a href="https://www.redstor.com/resource-hub/top-10-enterprise-backup-solutions/">https://www.redstor.com/resource-hub/top-10-enterprise-backup-solutions/</a><br>Zmanda &#8211; <em>Enterprise backup comparison</em> (2025) <a href="https://www.zmanda.com/blog/enterprise-offsite-backup-solutions-comparison/">https://www.zmanda.com/blog/enterprise-offsite-backup-solutions-comparison/</a><br>WWT &#8211; <em>Gartner Magic Quadrant review</em> (2025) <a href="https://www.wwt.com/blog/2025-gartner-enterprise-backup-magic-quadrant-review">https://www.wwt.com/blog/2025-gartner-enterprise-backup-magic-quadrant-review</a><br>Veeam &#8211; <em>Gartner MQ &#1083;&#1080;&#1076;&#1077;&#1088;</em> (2025) <a href="https://www.veeam.com/gartner-magic-quadrant.html">https://www.veeam.com/gartner-magic-quadrant.html</a><br>Acronis &#8211; <em>Top backup vendors</em> (2025) <a href="https://www.acronis.com/en/blog/posts/best-server-backup-solutions-top-five-picks-for-2025/">https://www.acronis.com/en/blog/posts/best-server-backup-solutions-top-five-picks-for-2025/</a><br>N2W &#8211; <em>Cloud backup tools</em> (2026) <a href="https://n2ws.com/blog/enterprise-cloud-backup-tools">https://n2ws.com/blog/enterprise-cloud-backup-tools</a><br>SoftwareReviews &#8211; <em>Backup rankings</em> (2025) <a href="https://www.softwarereviews.com/press-releases/data-quadrant-awards-2025-backup-and-availability">https://www.softwarereviews.com/press-releases/data-quadrant-awards-2025-backup-and-availability</a><br>TechRadar &#8211; <em>Best backup software</em> (2026) <a href="https://www.techradar.com/best/best-backup-software">https://www.techradar.com/best/best-backup-software</a><br>Medium &#8211; <em>Cloud backup review</em> (2025) <a href="https://medium.com/@mikkovirtanenofficial/best-cloud-backup-services-of-2025-ecf47dc88a42">https://medium.com/@mikkovirtanenofficial/best-cloud-backup-services-of-2025-ecf47dc88a42</a><br>LinkedIn &#8211; <em>Backup software comparison</em> (2025) <a href="https://www.linkedin.com/pulse/top-database-backup-software-companies-how-compare-them-2025-kfqde/">https://www.linkedin.com/pulse/top-database-backup-software-companies-how-compare-them-2025-kfqde/</a></p></div><p>Curious what would be the answers beyond core cybersecurity, I also checked the responses for the <strong>Identity Verification</strong> market or the emerging <strong>AI SOC</strong> term. That&#8217;s where things got even more revealing.</p><p>For <strong>AI SOC</strong>, a space where there is no Gartner MQ or Forrester Wave yet, I ran the same question five times across both Claude and ChatGPT. <strong>Every single time, 100% of the cited sources were vendor-authored content.</strong> No independent analysis. No practitioner perspectives. Just vendors describing themselves.</p><h1>How Closely Do LLMs Mirror Gartner and Forrester?</h1><p>I compared the LLM-recommended solutions in each category against the current Magic Quadrant and Wave Leaders lists. The correlation was always very high. In the majority of categories I tested, the LLM recommendations were either an exact match or near-exact match with the analyst <em>&#8220;Leaders&#8221;</em> tier.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3C18!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3C18!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png 424w, https://substackcdn.com/image/fetch/$s_!3C18!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png 848w, https://substackcdn.com/image/fetch/$s_!3C18!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png 1272w, https://substackcdn.com/image/fetch/$s_!3C18!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3C18!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png" width="1024" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59116,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/195215769?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3C18!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png 424w, https://substackcdn.com/image/fetch/$s_!3C18!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png 848w, https://substackcdn.com/image/fetch/$s_!3C18!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png 1272w, https://substackcdn.com/image/fetch/$s_!3C18!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69cf18b-63b7-437a-9dce-597feff5d282_1024x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the cases of very high similarity, we&#8217;re talking about a complete 1:1 match. Same vendors, same order of emphasis.</p><p>Think about what that means. When someone asks an LLM which security product to buy, they&#8217;re not getting independent research or some Artificial Intelligence esoteric knowledge. <strong>They&#8217;re getting Gartner&#8217;s Magic Quadrant, repackaged as a chat response.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>This Isn&#8217;t Market Research. It&#8217;s an Optimization Game.</h1><p>Going through the results in more detail shows that, at least when it comes to Cybersecurity, this cannot even be called <em>&#8220;market research&#8221;</em>. <strong>It&#8217;s just an Optimization game</strong> &#8211; SEO, AEO, GEO or whatever you want to call it.</p><p>In every category I checked, the number of sources that were the own vendor&#8217;s blogs or product documentation was always more than 50 %, and in some cases, like the AI SOC example I gave above, it was 100 %.</p><p>This shows that using LLMs to perform market research is heavily influenced by how optimized the websites are.</p><p><strong>This is a self-fulfilling prophecy machine. The biggest brands call themselves the best, LLMs confirm it, buyers believe it.</strong></p><p>Smaller vendors &#8212; especially those that don&#8217;t yet have analyst coverage or haven&#8217;t invested heavily in English-language content &#8212; are simply invisible in this model. <strong>Not because their solutions are worse. Because their websites aren&#8217;t optimized.</strong></p><h1>The Geographical Bias</h1><p>More than 90% of the sources cited across all my LLM runs were from the United States.</p><p>That&#8217;s not entirely surprising when you consider the compounding factors: US vendors dominate revenue and visibility; Gartner and Forrester are US-headquartered; and the leading English-language cybersecurity media is overwhelmingly American. By the time all of those layers stack up, there&#8217;s very little room left for any other geography.</p><blockquote><p>And this doesn&#8217;t happen only with US-based chatbots like ChatGPT or Claude.</p></blockquote><p>I also tested <strong>Mistral Le Chat</strong> &#8212; the French alternative &#8212; to see whether an European LLM would produce different results. It didn&#8217;t.</p><p>If anything, Mistral leaned even more heavily on Gartner and Forrester, explicitly citing their reports as primary sources (<em>its own knowledge</em>) in almost every run. It also regularly surfaced analyst content from 2024, meaning not even the most recent analyst opinions were being factored in.</p><p><strong>If you&#8217;re evaluating security vendors in Europe or another region, the model you&#8217;re relying on for research was trained almost entirely on American market narratives.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>What all of this means?</h1><p>For decades, Gartner and Forrester reports have been the main source of many cybersecurity buyers to select and evaluate potential vendors. A lot of practitioners always pushed back on that, arguing the reports are biased, pay-to-play, or US-centric, and even celebrated where their shares started to go down during the past years.</p><blockquote><p>There might be some level of truth in those criticisms. Some expected AI to fix that. It hasn&#8217;t.</p></blockquote><p>Instead, the LLMs that were meant to democratize information access have simply inherited and amplified the same biases. Analyst reports, vendor content, and US-centric media are still the dominant inputs. The interface might have changed, but the underlying sources didn&#8217;t.</p><p>Analysts aren&#8217;t going anywhere, and this research shows it. Without more rigorous, independent sources in the training mix, LLM-based &#8220;research&#8221; in cybersecurity will just keep recycling the same marketing narratives.</p><p>Gartner and Forrester, whatever their flaws, at least gather direct practitioner feedback. That&#8217;s something the average vendor blog doesn&#8217;t do.</p><p>The next time you ask ChatGPT or Claude to help you choose a cybersecurity product, remember: <strong>the answer you&#8217;re seeing is not independent analysis. It&#8217;s the result of analyst reports, vendor articles, SEO/AEO/GEO and geographical influence. Just re-packaged in another way.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gl2B!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!gl2B!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!gl2B!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!gl2B!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gl2B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:258628,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/195215769?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gl2B!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!gl2B!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!gl2B!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!gl2B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8424ee1-ce4a-427d-9b73-f2fe94922663_1584x396.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[Beyond Alert Fatigue: What European SOCs Actually Struggle With]]></title><description><![CDATA[Results from a Survey among SOC professionals from the region on what is the state of AI in SecOps in Europe]]></description><link>https://cybersecandbiz.substack.com/p/state-of-ai-in-europe-soc-secops</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/state-of-ai-in-europe-soc-secops</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Tue, 31 Mar 2026 03:28:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9af40f30-82a6-47e0-905c-0b890b2271f1_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Most of the data we consume as an industry (<em>benchmarks, surveys, vendor reports</em>) comes from a very specific lens. A U.S.-centric one. <strong>Every time you check the demographics section of a survey-based report (</strong><em><strong>if it even exists</strong></em><strong>), you&#8217;ll notice that between 80 to 90 % of participants are from the United States.</strong></p><p>While those insights might be valuable, they are then biased and don&#8217;t reflect the realities that practitioners from other regions experience. We all know that Europe is not North America, with different constraints, priorities, and more restrictive regulatory environments.</p><p>This is the reason I decided to launch <strong><a href="https://research.bridgerwise.com/?utm_source=substack">BridgerWise Research</a></strong>: <strong>to produce grounded, experience-driven research that considers the local realities outside the US, starting with Europe. </strong></p><blockquote><p>The goal is to generate insights that help practitioners benchmark themselves with the right peers, and help the cybersecurity community to better understand what&#8217;s really happening on the ground, without needing to follow recycled narratives from other parts of the world.</p></blockquote><p>Our first publication &#8212; <strong><a href="https://research.bridgerwise.com/research/ai-soc-europe?utm_source=substack">AI in the SOC: European Practitioner Survey 2026</a></strong> &#8212; is a first step in that direction. It&#8217;s based on responses from over 50 validated European Security Operations professionals.</p><p>That number may seem modest, but it&#8217;s actually more representative of European operational realities than many &#8220;global&#8221; reports where Europe accounts for a very small fraction of the overall sample.</p><p>For instance, one recent "industry report covering AI in Security Operations I reviewed, which was one of the final motivations to launch BridgerWise Research, surveyed 282 respondents, with 85% based in North America and only 13% across all of EMEA. When you do the math, that sample is smaller than ours.</p><blockquote><p><strong>When findings from those datasets are presented as universal truths, it&#8217;s worth asking: universal for whom?</strong></p></blockquote><p>Let&#8217;s get into what our data actually says.</p><h1><strong>The Narrative Everyone Repeats and Why It&#8217;s Incomplete</strong></h1><p>If there&#8217;s one phrase that dominates SOC discussions today, it&#8217;s <em>alert fatigue</em>. The story goes: SOC teams are drowning in alerts, analysts are burned out, and everything flows from that single chokepoint.</p><blockquote><p><strong>Our data tells there are more layers to that storyline. </strong></p></blockquote><p><strong>Alert volume is real, but it&#8217;s not the primary problem European SOCs are concerned about.</strong> When we asked regional practitioners to rank their top operational challenges, high alert volume and fatigue <strong>came in fourth</strong>, cited by 28% of respondents. That&#8217;s meaningful, but it&#8217;s far from the defining issue the dominant narrative would suggest.</p><p>What ranked above it? <strong>Tool fragmentation and context switching</strong> came first. <strong>Too many false positives</strong> came second. <strong>Insufficient automation</strong> came third.</p><p>This is quite a different situation that we read everywhere. The problem isn&#8217;t just the number of alerts - it is the workflow required to deal with them.</p><p>Analysts are changing tools and contexts all the time in order to investigate alerts and respond to incidents. They are switching between the SIEM and its query languages, the SOAR, EDR, Cloud and Identity platforms, threat intelligence platforms and ticketing systems for their investigations.</p><p>That inefficient constant switch of context increases investigation time, reduces analyst focus, and makes it difficult to scale operations without adding headcount and specialization.</p><blockquote><p>One respondent put it plainly: <em>&#8220;Everyone is talking about reducing alerts (fatigue), but with AI we should be able to turn up the noise, while the SOC evolves into a more strategic role.&#8221;</em></p></blockquote><p>Other research positions this primarily as an overload problem; our European data suggests the <em>why</em> is different. It&#8217;s not that analysts can&#8217;t keep up with the quantity, it&#8217;s that the workflows don&#8217;t scale.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1><strong>What SOC Teams Actually Want AI to Solve</strong></h1><p>When we asked practitioners where AI would deliver the most value, the answers were remarkably consistent: <strong>automated alert triage and prioritization</strong> (64%), <strong>investigation assistance and root-cause analysis</strong> (54%), and <strong>playbook automation and response orchestration</strong> (44%).</p><p>These are not aspirational use cases. They map directly onto the pain points teams are already experiencing: <strong>reduce the time spent on out-of-the-box and low-quality detections, automate the repetitive Tier-1 work, speed up investigations when context switching is the bottleneck.</strong></p><p>Despite the growing interest, AI adoption remains uneven. Around 24 % of respondents report using AI-driven alert triage today, yet many of those teams still struggle with false positives and operational overhead.</p><p><strong>Even teams that have deployed SOAR-driven automated playbooks are just as likely to report insufficient automation as a challenge as those without a SOAR at all.</strong></p><p>The scope of the automation and AI usage is very important, considering the vast majority of the respondents don&#8217;t have dedicated threat hunters that can do unstructured investigations to find hidden threats.</p><blockquote><p><strong>AI is a technology that SOCs want to adopt. They are just not sure yet where.</strong></p></blockquote><p>There are also <strong>meaningful differences between enterprise SOCs and MSSPs</strong>. Enterprise teams are more focused on detection engineering, investigation assistance, and rule tuning. MSSPs are prioritizing scalable workflows, report and ticket generation, and false-positive reduction. This makes sense given their need to manage multiple client environments efficiently. <strong>These aren&#8217;t just preferences; they reflect fundamentally different operational pressures.</strong></p><h1><strong>The Dimension Most Reports Miss: Regulation</strong></h1><p>Here&#8217;s where the European context becomes genuinely differentiating, and where a U.S.-focused research lens consistently falls short.</p><p><strong>Regulatory requirements are not a side topic for European SOCs. They are a core operational constraint.</strong></p><blockquote><p><a href="https://cybersecandbiz.substack.com/p/how-eu-regulations-are-reshaping">Frameworks like NIS2, DORA and the AI Act</a> have a real impact on Security Operations processes and workflows, and this shapes how they think about AI adoption.</p></blockquote><p>When we asked practitioners which compliance challenges concern them most when deploying AI in the SOC, the answers were clear and consistent:</p><ul><li><p><strong>Explainability and auditability of AI decisions</strong>: cited by 2 out of 3 respondents as a top concern. For enterprise SOCs, this number climbs to 73%.</p></li><li><p><strong>Liability for automated actions</strong>: highlighted by roughly half of all respondents.</p></li><li><p><strong>Data residency and sovereignty</strong>: the primary challenge for MSSPs, cited by more than half of MSSP respondents, reflecting the cross-border complexity of managing multiple client environments. With many AI SOC tools being available only in the cloud, they need to find other alternatives.</p></li><li><p><strong>Third-party and supply chain risk from AI vendors</strong>: flagged by around half of both enterprises and MSSPs.</p></li></ul><p>It is worth noting that the survey gave participants the option to select that they have no compliance concerns and feel well-prepared. <strong>Not a single respondent chose that option.</strong></p><blockquote><p>One practitioner captured the operational reality precisely: <em>&#8220;EU regulations like NIS2 and DORA drive my SOC strategy by mandating ultra-fast incident reporting (e.g., DORA&#8217;s 4-hour initial alerts vs. NIS2&#8217;s 24 hours) and rigorous third-party risk management, forcing automated detection, real-time logging, and supply chain audits as core priorities. The AI Act further requires explainable AI triage for high-risk detections to ensure compliance during automated Tier-1 handling.&#8221;</em></p></blockquote><p>This creates a dynamic that rarely shows up in North American research: <strong>European regulation plays a dual role in AI adoption.</strong> For MSSPs, stricter reporting requirements and the operational pressure to scale without headcount are actively accelerating AI adoption, with more than 40% of MSSP respondents citing EU regulations as a driver. At the same time, 1 in 4 respondents points to regulatory uncertainty (<em>particularly around the AI Act and AI governance frameworks</em>) as a barrier that is slowing or preventing AI deployment. The same regulatory environment both pushes and constrains.</p><p><strong>This is a real and significant challenge that is usually not reflected in any research built primarily from a North American sample.</strong></p><h1><strong>A Different Picture of Where SOCs Are Headed</strong></h1><p>The broader pattern that emerges from the data is this: <strong>AI adoption in European security operations is being driven by a need to make operations more efficient and scalable</strong>, not by technological enthusiasm.</p><p>Security teams are not looking for a particular tool, but for incremental friction reduction. Platforms that can remove the need to switch context, reduce the noise from false positives, and allow Tier-1 work to be more effective without proportionally increasing headcount.</p><p><strong>AI is emerging and it is expected to become a layer that makes those processes more manageable.</strong></p><p>There&#8217;s a benefit that the data hints at and I think it deserves attention: <strong>proactive threat hunting</strong>. Today, less than one third of European SOC teams have dedicated threat hunters,  and in enterprise environments, that number drops to 18%. In most cases, hunting is an activity shared among analysts who are already stretched thin across other responsibilities.</p><p>Roughly one in four organizations plans to shift toward more proactive threat hunting in the next 12-24 months, but capacity is a bottleneck for them. The teams are fully absorbed by other tasks, and simply don&#8217;t have the operational headroom to hunt proactively.</p><p><strong>This is where the AI investment story becomes more interesting than it first appears.</strong> If AI-driven triage genuinely reduces the manual burden on analysts (<em>fewer context switches, less time on low-quality alerts, faster investigations</em>) it doesn&#8217;t just improve the metrics SOC teams already track. It frees up the time and cognitive bandwidth to move <em>from reactive alert handling toward proactive detection</em>. <strong>Threat hunting, detection engineering, security analytics</strong> - these are the capabilities that make a SOC genuinely harder for adversaries to operate against. Right now, they&#8217;re aspirational for most teams. As automation is maturing, they can become achievable.</p><p>And at the same time, those teams are increasingly operating under regulatory frameworks that require any AI introduced into the SOC to be explainable, auditable, and defensible. That&#8217;s a very different design constraint than what North American vendors are typically building toward.</p><p>Looking ahead, <strong>82% of respondents expect AI usage in their SOC to increase over the next 12 months, with 32% expecting a significant increase.</strong> But the path forward looks more like <em>gradual embedding into core workflows</em> than a complete transformation. Fully autonomous operations remain rare. Trust, accountability, and integration complexity are still real barriers. The SOC is entering a new phase, but it&#8217;s doing so carefully.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1><strong>Final Thoughts</strong></h1><p>The above are just a few findings from our research. The full report covers more topics that are worth reviewing for SOC leaders and practitioners.</p><p>If I had to choose one way to describe the theme we uncovered, it would be this: <strong>the future of the SOC in Europe is not blocked by alert volume or fatigue. It&#8217;s limited by operational design and regulatory complexity.</strong></p><p>European security teams are dealing with fragmented tooling, inefficient workflows, high false positive rates, and a compliance environment that adds meaningful governance requirements to every AI decision. That combination is specific and real. And it&#8217;s largely invisible in research produced from a predominantly North American lens.</p><p>That&#8217;s the problem <strong><a href="https://research.bridgerwise.com">BridgerWise Research</a></strong> was built to address.</p><p>As I&#8217;ve said, these are just some data points from our first report. There&#8217;s a lot more to explore, with a different, grounded, local perspective, and that is our goal.</p><p>I invite you to check the <strong><a href="https://research.bridgerwise.com/research/ai-soc-europe">full report</a></strong> and I&#8217;d genuinely like to hear what resonates with you, and what you&#8217;d want to see explored next.</p><p><strong>Because if there&#8217;s one thing this research confirmed, it&#8217;s that we need more European voices in the data.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QpTU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!QpTU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!QpTU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!QpTU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QpTU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:258628,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/192601715?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QpTU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!QpTU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!QpTU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!QpTU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed052182-7e7d-4b4f-8a08-79b556a4a8e3_1584x396.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[How EU Regulations Are Reshaping SOC Operations]]></title><description><![CDATA[NIS2, DORA, and the AI Act are rewriting the rulebook for Security Operations Centers. Here&#8217;s what you need to know and do.]]></description><link>https://cybersecandbiz.substack.com/p/how-eu-regulations-are-reshaping</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/how-eu-regulations-are-reshaping</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Wed, 11 Mar 2026 10:46:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d85eaa62-ae47-4f1b-9ac0-0de9f62d18b9_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you run a SOC, whether in-house at an enterprise or as part of an MSSP, you&#8217;ve probably noticed that something has fundamentally changed in the last couple of years. And no, it&#8217;s not the explosive appearance of AI tools and platforms.</p><p>The job is no longer just about detecting and mitigating threats or responding to incidents. It&#8217;s also about <strong>proving you did it, on time, with evidence that can withstand regulatory scrutiny.</strong></p><p>European regulation is transforming SOCs from pure detection-and-response teams into <strong>evidence-producing operational control functions</strong> with formalised governance, strict reporting deadlines, and much tighter oversight of third-party dependencies and AI-assisted tooling.</p><p>In this article, we&#8217;re going to review the regulations that are driving this shift (<strong>NIS2, DORA, and the AI Act</strong>) and, more importantly, what they mean in practice for SOC architecture, workflows, staffing, and metrics. Whether you&#8217;re a CISO defining security strategy, a SOC manager designing playbooks, or an analyst on the front line, this piece is for you.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>The Regulatory Landscape: What SOCs Need to Know</strong></h1><p>Before we discuss operational impacts, let&#8217;s get aligned on the three key regulations. They are all active or becoming active right now, and each one touches SOC operations in different ways.</p><h2><strong>NIS2: The Baseline for Cybersecurity Operations Across the EU</strong></h2><p>The NIS2 Directive (EU 2022/2555) has been the big story in European cybersecurity since its transposition deadline in October 2024. It significantly expands the scope of entities that must meet mandatory cybersecurity risk-management and incident reporting standards.</p><p>For SOCs, the most impactful element is the <strong>multi-stage incident reporting cadence</strong>: a 24-hour early warning from the moment there is awareness of a significant incident, a 72-hour notification with more detail (including IoCs where available), and a comprehensive final report within one month covering root cause, impact assessment, and mitigations.</p><p>But NIS2 goes well beyond reporting. It also makes <strong>supply-chain security, vulnerability handling, business continuity, and management accountability</strong> explicit requirements. The SOC&#8217;s scope of responsibility just got a lot wider.</p><p>An important development: the <strong>NIS2 Implementing Regulation (2024/2690)</strong>, published in October 2024, sets concrete requirements for certain cross-border digital service providers, including managed security service providers (MSSPs). If you are an MSSP or rely on one, this regulation is essential reading: <strong>it describes expectations around monitoring, detection, security testing, patch management, and documentation that directly shape what can be demanded contractually.</strong></p><h2><strong>DORA: Finance Gets Its Own (Stricter) Regime</strong></h2><p>The Digital Operational Resilience Act (DORA, Regulation EU 2022/2554) has been applicable since January 2025 and is specifically designed for financial entities. If a SOC serves a bank, insurer, investment firm, or other financial institution, DORA is a must-have framework.</p><p>The key difference from NIS2 is that DORA is a <strong>regulation, not a directive</strong>. It&#8217;s directly applicable across all Member States, with a finance-specific supervisory ecosystem and detailed implementing/delegated acts that standardise reporting and controls.</p><p>The reporting clock under DORA is tighter. The European Banking Authority&#8217;s RTS establishes time limits such as an initial notification <strong>within four hours after classification</strong> (and within 24 hours after detection), 72 hours for an intermediate report, and one month for the final report. Finance SOCs need a tighter internal <strong>&#8220;time-to-classify&#8221;</strong> discipline, because the first reporting clock can be tied to the classification decision, not to a later &#8220;confirmed breach&#8221; moment.</p><p>DORA also goes further on third-party risk: ICT third-party risk must be managed as an integral component of ICT risk. Contracts for services supporting critical functions must include audit and inspection rights, termination triggers, and exit strategies. If a SOC relies on cloud SIEM, MDR, EDR, or identity platforms from third parties, this applies to them.</p><h2><strong>The AI Act: A New Governance Domain for AI-Powered SOCs</strong></h2><p>The AI Act (Regulation EU 2024/1689) enters its main application phase in August 2026, and this is where things get particularly interesting for SOCs that are embracing automation and AI.</p><p>As the industry moves toward the <strong>autonomous SOC</strong> (<em>with AI agents handling alert triage, threat hunting, and even containment decisions</em>) the AI Act introduces obligations that SOC leaders cannot ignore:</p><ul><li><p><strong>AI literacy: </strong>Providers and deployers must ensure their staff has a sufficient level of AI literacy. For SOC teams using AI-powered tools, this means structured training, not just a vendor demo.</p></li><li><p><strong>Record-keeping (logging): </strong>High-risk AI systems must support automatic event logging over the lifetime of the system. SOCs already deal with logs, but AI-specific logging requirements add a new dimension.</p></li><li><p><strong>Human oversight: </strong>Deployers of high-risk AI systems must assign human oversight with competent, trained personnel. In a SOC context, this means documenting who oversees AI-assisted decisions and how.</p></li><li><p><strong>Log retention: </strong>Deployers must keep AI-generated logs for at least six months where these logs are under their control. This is a new retention domain on top of your existing SIEM retention policies.</p></li><li><p><strong>Serious incident reporting: </strong>Deployers must report serious incidents involving their AI systems. If a AI-driven SOC tool makes a consequential error, there&#8217;s now a regulatory escalation path.</p></li></ul><p>Even if current SOC AI use cases don&#8217;t fall squarely into the &#8220;high-risk&#8221; category, my recommendation is clear: <strong>build the governance framework now</strong> as that might change in the future<strong>.</strong> Logging, oversight, incident escalation, and procurement controls should be in place so that when a higher-risk use case is adopted or the regulation is expanded to other categories, there is no need to re-platform.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://tandemtrace.ai" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4sbb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!4sbb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!4sbb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!4sbb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4sbb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:89156,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://tandemtrace.ai&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/190603199?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4sbb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!4sbb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!4sbb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!4sbb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5906ff9c-0295-4e15-aa25-4f984a6679bf_1584x396.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h1><strong>Operational Impacts: What Actually Changes in Your SOC</strong></h1><p>Now let&#8217;s get to the practical implications. There are at least five areas where regulation directly changes how SOCs must operate.</p><h2><strong>1. Incident Lifecycle Re-engineering</strong></h2><p>The multi-stage reporting cadence in NIS2 and DORA fundamentally changes incident management. Three workflow shifts become unavoidable:</p><p>First, the <strong>&#8220;regulatory clock&#8221; starts before your forensic conclusion is ready.</strong> Under NIS2, the 24-hour early warning is designed to alert national CSIRTs quickly and enable assistance. It&#8217;s explicitly not meant to wait for a full analysis. This means a SOC needs a fast-track process for producing an initial notification that&#8217;s separate from the ongoing investigation.</p><p>Second, <strong>IoC handling becomes a compliance output,</strong> not just a threat intelligence best practice. NIS2 asks for indicators of compromise already in the 72-hour notification, where available. A SOC needs to be extracting and packaging IoCs as part of the standard case workflow.</p><p>Third, <strong>your case management must preserve a full narrative trail:</strong> detection, containment, eradication, root cause, and lessons learned. The one-month final report requires this level of detail. Ad hoc post-incident reviews won&#8217;t cut it anymore.</p><p>A practical pattern that works well: a <strong>two-track process</strong>. Technical containment and eradication on one track, regulatory evidence capture and report drafting on the other. NIS2 itself warns that reporting should not divert resources from incident handling, so playbooks should be designed accordingly.</p><h2><strong>2. Service-Centric Triage and Business Impact Integration</strong></h2><p>NIS2 defines a &#8220;significant incident&#8221; by its <strong>impact on services</strong>. For example, severe operational disruption, financial loss, or considerable harm to others. DORA reinforces this by tying detection to the ICT risk management framework and resilience objectives.</p><p>The implication? SOC tooling that only sees security events but <strong>cannot map them to services, dependencies, and recovery objectives</strong> becomes a potential compliance risk as much as a security risk.</p><p>A SIEM/SOAR environment needs integration with the CMDB and business impact analysis data. When an alert fires, your analysts need to quickly answer: which service is affected, who is impacted, and what&#8217;s the business severity? Without this context, meeting the reporting requirements in time becomes extremely difficult.</p><p>The NIS2 implementing regulation makes this even more explicit by elevating concepts like maximum tolerable downtime and recovery objectives. These are metrics that SOCs increasingly need to operationalise jointly with resilience and IT operations teams.</p><h2><strong>3. Management Accountability and Board Reporting</strong></h2><p>NIS2 requires that management bodies approve cybersecurity risk-management measures, oversee their implementation, and can be held <strong>personally liable</strong> for infringements. It also mandates training for management bodies.</p><p>In practice, this pulls SOC reporting into executive and board dashboards. SOC metrics can no longer be limited to MTTD, MTTI and MTTR. <strong>Control effectiveness, residual risk levels, and readiness to meet regulatory deadlines </strong>needs to be demonstrated<strong>.</strong> Think of it as moving from <em>&#8220;how fast do we respond&#8221;</em> to <em>&#8220;can we prove our security posture holds up to scrutiny.&#8221;</em></p><h2><strong>4. Supply Chain and Third-Party Governance</strong></h2><p>This one is especially relevant for SOCs that rely on outsourced tooling like cloud SIEM, MDR, EDR, identity platforms. NIS2 hard-codes supply-chain security into the minimum control set. DORA requires that contracts for critical outsourced ICT services include audit rights, termination triggers, and exit strategies.</p><p>SOC leaders must now partner with procurement and third-party risk management teams to ensure that <strong>incident evidence and notification obligations can be met even during a provider disruption.</strong> The question is no longer just <em>&#8220;is our MDR vendor effective?&#8221;</em> but <em>&#8220;if our MDR vendor goes down, can we still meet our 24-hour reporting deadline?&#8221;</em></p><h2><strong>5. AI Tool Governance in the SOC</strong></h2><p>As I mentioned earlier, the AI Act creates a new governance domain for AI-assisted SOC operations. But let me be specific about what this looks like in practice, because I&#8217;ve been speaking with many companies that are building or deploying AI-driven SOC capabilities.</p><p>If your SOC uses AI for autonomous alert triage, threat hunting, or response recommendations, you need to consider:</p><p><strong>Logging and auditability: </strong>What decisions did the AI make? What data did it process? Can you reconstruct the chain of reasoning if a regulator or auditor asks?</p><p><strong>Human oversight documentation: </strong>Who is responsible for reviewing AI-assisted decisions? Is this role formally assigned with competent, trained personnel?</p><p><strong>AI-specific incident escalation: </strong>If the AI system malfunctions or produces a consequential error (false negative that leads to a breach, or false positive that causes a service outage), do you have a clear escalation path?</p><p><strong>Procurement controls: </strong>When you evaluate AI-powered SOC vendors, are you assessing their compliance with AI Act obligations? Are they providing the transparency and documentation you&#8217;ll need as a deployer?</p><p>The transition to the autonomous SOC is happening fast. <a href="https://scalingcyber.substack.com/p/autonomous-threat-hunting-how-tandemtrace">My conversation with Almog Ohayon from TandemTrace on the </a><strong><a href="https://scalingcyber.substack.com/p/autonomous-threat-hunting-how-tandemtrace">Scaling Cyber podcast</a></strong><a href="https://scalingcyber.substack.com/p/autonomous-threat-hunting-how-tandemtrace"> </a>highlighted how AI agents are already generating and testing hypotheses autonomously. But the regulatory framework is now catching up, and SOCs that build governance early will have a <strong>significant competitive advantage</strong>, especially MSSPs, where demonstrating compliance maturity is a market differentiator.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>Finance SOCs vs. General SOCs: Key Differences</strong></h1><p>One of the most common questions is: how different are the requirements for financial institutions compared to everyone else?</p><p>The answer: meaningfully different in both form and substance.</p><ul><li><p><strong>NIS2 is a directive</strong>. It gets transposed into national law, meaning enforcement and supervisory approaches can vary across Member States.</p></li><li><p><strong>DORA is a regulation</strong>, directly applicable everywhere, with standardised reporting and a finance-specific supervisory ecosystem.</p></li></ul><p>The reporting timelines under DORA are tighter. As mentioned, the initial notification can be due within four hours of classification. Finance SOCs must have a highly disciplined time-to-classify process, which means investing in pre-built classification decision trees and automating as much of the initial data collection as possible.</p><p>DORA&#8217;s third-party risk requirements are also more prescriptive. If you&#8217;re an MSSP serving financial clients, you should expect audit and inspection obligations to be baked into your contracts, along with requirements around exit strategies for critical services.</p><p>That said, NIS2 explicitly acknowledges the potential overlap: financial entities covered by DORA are generally exempt from NIS2&#8217;s risk-management and reporting obligations <em>(though information-sharing links between financial supervisors and NIS2 structures are maintained)</em>. So you don&#8217;t have to comply with both reporting regimes simultaneously&#8212;but you do need to know which one applies to you.</p><h1><strong>Compliance-Ready SOC Metrics</strong></h1><p>One of the most practical things a SOC can do right now is rethink or expand metrics through a regulatory lens. The question to ask is: <strong>can we prove we detected, decided, acted, and reported within the required windows, with evidence that stands up to supervision?</strong></p><p>Here are the key metrics that could be considered recommend tracking:</p><ul><li><p><strong>Time-to-classification (TTC): </strong>From detection to &#8220;significant/major&#8221; classification decision. Target: hours, not days. This is critical for both NIS2 and DORA reporting feasibility.</p></li><li><p><strong>Regulatory notification readiness: </strong>What percentage of high-severity incidents have a complete minimum dataset for early notification? This includes service impacted, initial severity, suspected maliciousness, cross-border potential, and IoCs where available.</p></li><li><p><strong>IoC sharing latency: </strong>Time from IoC discovery to internal sharing and, where relevant, inclusion in regulatory notifications.</p></li><li><p><strong>Evidence completeness index: </strong>Do your case records include immutable timelines, decision approvals, containment actions, and post-incident root cause analysis? This is essential for the one-month final report.</p></li><li><p><strong>Third-party observability coverage: </strong>What proportion of critical outsourced services have independent logs/telemetry plus contractual incident notification and audit rights?</p></li><li><p><strong>AI oversight effectiveness: </strong>For AI-assisted SOC workflows, what percentage of AI-driven decisions have documented human oversight and retained logs?</p></li></ul><h1><strong>SOC Regulatory Compliance Checklist</strong></h1><p>To help organizations operationalise everything we&#8217;ve discussed, <strong><a href="https://drive.google.com/file/d/1xPNK4ry38wpS1_aIHeFq_k1IjFJ9lKBI/view?usp=drivesdk">here&#8217;s a checklist</a></strong> a SOC team can use as a starting point. It&#8217;s designed to be practical, not exhaustive, and it must be adapted to the specific sector, size, and regulatory scope.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/how-eu-regulations-are-reshaping?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/how-eu-regulations-are-reshaping?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecandbiz.substack.com/p/how-eu-regulations-are-reshaping?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h1><strong>Final Thoughts</strong></h1><p>European regulation is reshaping what it means to run a SOC. The shift from &#8220;detect and respond&#8221; to &#8220;detect, respond, prove, and govern&#8221; is not optional but a new baseline.</p><p>But I want to be clear: <strong>this is not just a compliance exercise.</strong> The regulations are pushing SOCs toward practices that genuinely improve security outcomes. Better evidence management makes post-incident analysis more effective. Service-centric triage catches business-critical incidents faster. Structured AI governance prevents costly mistakes as autonomy increases.</p><p>The organisations that treat regulatory requirements as an <strong>architectural input </strong><em>(not a box-ticking exercise)</em> will build SOCs that are more resilient, more transparent, and more effective.</p><p>And for MSSPs specifically: compliance maturity is becoming a competitive differentiator. Your clients will increasingly choose providers who can demonstrate they meet the standards these regulations require.</p><p><strong>The regulatory clock is ticking. Start building now.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PvA0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!PvA0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!PvA0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!PvA0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PvA0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:258628,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/190603199?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PvA0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!PvA0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!PvA0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!PvA0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d7b82ee-7a43-42d5-8e30-fb925bb22d00_1584x396.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h1>One more thing</h1><p>If you believe I missed something important or have something to contribute to this article, feel free to contribute in the comments!</p>]]></content:encoded></item><item><title><![CDATA[The Language of the Cybersecurity Leaders]]></title><description><![CDATA[You can't become a category leader if you don't sound like one]]></description><link>https://cybersecandbiz.substack.com/p/the-language-of-the-cybersecurity</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/the-language-of-the-cybersecurity</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Thu, 12 Feb 2026 07:51:29 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fd945eb9-49d6-48b7-a2bf-f69fe4a0e754_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In cybersecurity, we like to believe that leaders are created by better products, stronger execution, and higher revenue. <strong>That belief is incomplete.</strong></p><p>The companies that dominate categories don&#8217;t just build differently, they also speak differently. They use a different <strong>language</strong> when they communicate who they are and what they do.</p><p>Language is not just a communication tool in cybersecurity. It does even more: it reduces perceived risk, signals inevitability and frames trust before proof is complete. Buyers are choosing long-term partners under uncertainty, and language becomes the base for stability, ambition and survivability.</p><p>They don&#8217;t just ask if a product will work, but they also need to reflect on the possibility that the company might not be alive in the near future or if it is a safe bet to build upon. <strong>In many cases, language is the first, even the strongest, signal they receive</strong>.</p><p>If you analyze how cybersecurity leaders use language, there is a sense of <strong>inevitability</strong>. They broadcast a distinct combination of attributes that others rarely match at the same time.</p><blockquote><p>Confidence, boldness, proof, specificity, urgency without panic, clarity on &#8220;who this is for&#8221; and a strong position against their competitors.</p></blockquote><p>The question that arises, though, is what came first: Actual market success in terms of revenue or <strong>an aspirational messaging that already made them sound, look and act like the leaders they would become.</strong></p><p>Moreover, when we focus on those that have achieved a recognized market position, <strong>are there differences across regions?</strong></p><p>Having worked for more than 20 years with non-American cybersecurity companies, I&#8217;ve always noticed something that felt intuitive but hard to quantify. They rarely communicate like leaders, even when their technology is cutting-edge.</p><p>The language of those coming from outside the United States is often more cautious, more precise and technically accurate, and <strong>more reluctant to claim authority</strong>. And in my experience, this difference in language is an <strong>early indicator of future outcomes</strong>, not just a reflection of current ones.</p><p>That experience and intuition is what led me to test this more systematically, and below we will see what the results said about <strong>the language of the cybersecurity leaders</strong>.</p><h1>The Setup &amp; Methodology</h1><p>The first step was to decide <em>what</em> to measure. After reviewing positioning language across dozens of vendors in two sectors (Endpoint Security &amp; Access Management), I decided to choose the following attributes:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!k-NO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!k-NO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!k-NO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!k-NO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!k-NO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!k-NO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png" width="1024" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:97340,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/187623958?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!k-NO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!k-NO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!k-NO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!k-NO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37e7b651-60f1-4a0b-990b-a549ec6f7ce2_1024x768.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Together, these dimensions describe not just <em>what</em> a company says, but <em>how</em> <em>it assumes its role in the market</em>.</p><p>In order to execute this analysis successfully, I needed to eliminate my personal bias. Considering how good LLMs are when it comes to language analysis, I designed a reusable prompt that could be applied consistently across groups of vendors.</p><p>The goal was not absolute truth, but <strong>relative comparison</strong>: how different companies <em>speak in relation to each other</em>.</p><blockquote><p>Two LLMs were used (ChatGPT and Claude) in order to detect if there would be any large deviations.</p></blockquote><p>Obviously, the same criteria was applied to all vendors. I also run the prompts three times in each one of the LLMs to account for potential differences.</p><p>Lastly, I defined the universe of vendors to be evaluated. For the purpose of this analysis, I focused on the vendors that were part of the latest Gartner Magic Quadrants for <strong><a href="https://www.gartner.com/en/documents/6718634">Endpoint Protection Platforms</a></strong> and <strong><a href="https://www.gartner.com/en/documents/7051198">Privileged Access Management</a></strong>.</p><p>Why the Gartner MQ? Those researchers already have a categorized list of vendors (Leaders, Challengers, Visionaries and Niche Players) that accounts for market penetration and positioning.</p><p>Before running the analysis, I had certain assumptions about the potential results: </p><ol><li><p>Market Leaders would have a stronger language score</p></li><li><p>Immediate challengers would have a more aggressive approach</p></li><li><p>Legacy vendors would score lower than leaders growing rapidly</p></li><li><p>Non-american companies would show a lower score in the majority of the dimensions</p></li></ol><p><strong>I did exclude some vendors</strong>: Microsoft and PaloAlto Networks. The first one because of how much different of a company it is compared to the rest of the vendors, and PaloAlto as it is not naturally, in my opinion, an Endpoint Protection company.</p><h1>The Result</h1><p>The output didn&#8217;t vary significantly between ChatGPT &amp; Claude, nor across the different runs of the prompts. This was a great first indication for me that the way the dimensions were defined could produce repeatable results.</p><p>You can see the results for yourselves below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Aofq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Aofq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!Aofq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!Aofq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!Aofq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Aofq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png" width="1024" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:77690,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/187623958?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Aofq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!Aofq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!Aofq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!Aofq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F374e86db-502c-4c30-82b7-63924c3a76c0_1024x768.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NkWW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NkWW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!NkWW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!NkWW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!NkWW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NkWW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png" width="1024" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:105943,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/187623958?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NkWW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!NkWW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!NkWW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!NkWW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05229b0-0164-49a3-bae7-96df4a877f9a_1024x768.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Across both markets, the same signals appeared again and again:</p><ul><li><p>Market Leaders clustered at the top in pretty much every dimension</p></li><li><p>American vendors showed higher scores in almost every category</p></li><li><p>Non-American vendors had higher scores on authenticity, but lower on the rest</p></li><li><p>American vendors showed a stronger <strong>target clarity</strong> than Non-American vendors</p></li></ul><p>There were two interesting outliers: <strong>BitDefender</strong> &amp; <strong>Keeper Security</strong>. The first one, a Romanian endpoint-centric cybersecurity vendor showed a stronger authenticity and target clarity than I&#8217;d have expected.</p><p>The second one, a growing PAM solution, had the second highest average scores in its group, above leaders in the sector in several attributes.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Leadership is Announced before It Is Validated</h1><p><strong>Did the results surprise me?</strong> Not at all. It did, though, extend to more dimensions the theory I already had that leadership is not just built by execution, but it is announced through language, reinforced through consistency, and validated later by the market.</p><p>The language that <strong>Crowdstrike</strong>, <strong>SentinelOne </strong>or <strong>CyberArk</strong> are using today is not different from the one they were using when they started in this market. They did not wait for market validation to speak like leaders. They spoke like leaders first, and then built the execution to match.</p><p><strong>Keeper Security </strong>is an early example of that. They are growing rapidly, taking advantage of a momentum created by their laser-focused targeting (<em>MSPs</em>) and using the language of an aspirational leader that knows where the market is going.</p><blockquote><p><strong>These companies don&#8217;t wait for permission. They speak with authority early, they frame the market on their own terms and they earn their right to keep speaking that way.</strong></p></blockquote><p>It could be argued that the analysis is biased toward leaders. It is a fair thought but that&#8217;s also the point. The goal was not to pick winners, but to understand why some companies sound like leaders while others don&#8217;t, even when they might want to become one or have the right mix of market presence, product and services that anyone else would consider the bases for leadership.</p><p>The more interesting question for me is not <em>why leaders speak this way</em>, but <strong>why don&#8217;t others</strong>. Why do so many capable vendors avoid assertive language or do they hesitate to define the market, name the problem strongly and claim authority?</p><p><strong>That doubt, that lack of strength costs them over time.</strong></p><h1>Leadership Language is Not Optional</h1><p>Some may argue that positioning through features or technical details is what works in their culture, country or region. And they might be right. But that is not the language that the market leaders use.</p><p>The uncomfortable takeaway is that you cannot become a global category leader without first sounding like one. It is not about hype, exaggeration or lying. <strong>It means embracing strength</strong>.</p><p>The leaders speak in outcomes, not just features. They don&#8217;t request relevance, they assume it. They define their target customers sharply, even at the cost of exclusion. And, not least important, they treat the competition as something beneath them, not to coexist with.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-8BL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-8BL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!-8BL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!-8BL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!-8BL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-8BL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png" width="1024" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76758,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/187623958?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-8BL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!-8BL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!-8BL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!-8BL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dabfe9-c653-4898-beb2-3a75e7aa8472_1024x768.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Leaders shape the playing field (<em>redefining it or reinventing it</em>, as they like to say), using language that reflects a claim on their <strong>inevitability</strong>. This influences procurement committees, analysts and partner ecosystems to <em>perceive</em> them as leaders, which then <em>becomes</em> a reinforcing cycle.</p><p>This prepares the market before the product fully arrives. While others use more <em>precise</em> words, which is excellent for technical accuracy yet signals <em>lower urgency</em>, the leaders become a <em>market-shaping force</em> by the way they speak and talk about it. They talk like leaders <em>before</em> they become leaders.</p><p>That confidence enables a clearer target customer narrative, defining <em>who they are for</em> and making it easier for buyers to know where they fit. <strong>This strong clarity is not just vanity, it drives their positioning, sales efficiency, partner alignments and customer trust.</strong></p><p>The consistent embrace of a <strong>leadership identity</strong>, shown regularly by their language, is a key pillar of what produces category leaders. Companies that speak like leaders recruit differently, set higher expectations, and normalize ambition.</p><p><strong>Leadership language does not just influence buyers. It influences the company itself.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>So What&#8217;s the Real Lesson Here?</h1><p>Of course, bold language alone does not create leadership. Many companies have spoken loudly and disappeared quietly. Leadership language is not a silver bullet, yet appears to be necessary.</p><p>Those that want to build a cybersecurity company that changes their <em>market category</em> need to understand that what they do today is tied to how you <em>talk</em> about their vision, their strengths, their customers and about tomorrow.</p><blockquote><p><strong>How a cybersecurity vendor speaks (its tone, audacity and narrative ambition) isn&#8217;t window dressing. It&#8217;s a foundation on their path to leadership.</strong></p></blockquote><p>Companies that embrace the language of leaders, with confidence, boldness, audacity and clear positioning will get noticed earlier and shape the market they want to end up as leaders.</p><p>American vendors dominate the market for many reasons, and this is one of them. European vendors often excel in accuracy and precision yet don&#8217;t talk about it enough in a way that will position them as leaders.</p><p>I will give you two examples of non-American vendors that are breaking this pattern: <strong><a href="https://scalingcyber.bridgerwise.com/guests/bforeai">BforeAI</a></strong> and <strong>Aikido</strong>. Both of them founded in Europe, they embraced the <em>leadership identity and language</em> from a very early stage, and while in different categories, the scores on the dimensions above would put them in the same group of the market leaders we analyse.</p><p>BforeAI is leading the talk about <strong>preemptive cybersecurity</strong> and <a href="https://www.aikido.dev/blog/aikido-funding-series-b">Aikido recently became a unicorn</a>.</p><p>In cybersecurity, technology earns credibility. Execution earns trust. And language earns attention, and that is where leadership begins. <strong>If you don&#8217;t speak like a leader, don&#8217;t be surprised when the market never lets you become one.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RayO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7f2e1fd-6a94-44cb-b821-ae8f9e680ec9_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!RayO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7f2e1fd-6a94-44cb-b821-ae8f9e680ec9_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!RayO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7f2e1fd-6a94-44cb-b821-ae8f9e680ec9_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!RayO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7f2e1fd-6a94-44cb-b821-ae8f9e680ec9_1584x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RayO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7f2e1fd-6a94-44cb-b821-ae8f9e680ec9_1584x396.png" width="1584" height="396" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7f2e1fd-6a94-44cb-b821-ae8f9e680ec9_1584x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:396,&quot;width&quot;:1584,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:298476,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/187623958?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d62551-809f-4aae-a3e7-9c06b26215c3_1584x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RayO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7f2e1fd-6a94-44cb-b821-ae8f9e680ec9_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!RayO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7f2e1fd-6a94-44cb-b821-ae8f9e680ec9_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!RayO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7f2e1fd-6a94-44cb-b821-ae8f9e680ec9_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!RayO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7f2e1fd-6a94-44cb-b821-ae8f9e680ec9_1584x396.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Predictions Are a Window into a Vendor’s Roadmap and Business Priorities]]></title><description><![CDATA[How to cut through the fluff - Includes a prompt to dissect vendor predictions]]></description><link>https://cybersecandbiz.substack.com/p/cybersecurity-predictions-are-a-window</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/cybersecurity-predictions-are-a-window</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Wed, 07 Jan 2026 23:15:53 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ed94be15-752d-497b-9ce3-d8ecb194e09e_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Every year, sometime around <strong>November</strong>, the cybersecurity industry enters what many of us think of as <em>prediction season</em>.</p><p>Vendors start publishing their <em>&#8220;Cybersecurity Predictions for Next Year&#8221;</em>, <em>&#8220;Top Threats CISOs Must Prepare For&#8221;</em>, or <em>&#8220;The Future of Security Operations&#8221;</em>. The cadence is almost ritualistic and it often continues well into <strong>January</strong>.</p><p>If you&#8217;ve been in the industry long enough, you can probably predict the predictions.</p><p>And after reading enough of them, one thing becomes clear: <strong>Many of these pieces are not really about forecasting the future.</strong> They&#8217;re about <strong>shaping it</strong>.</p><h1><strong>Predictions are rarely neutral</strong></h1><p>In theory, cybersecurity predictions are supposed to help practitioners prepare for what&#8217;s coming. Technically, operationally, and strategically.</p><p>In practice, many prediction reports are strongly influenced by what the vendor <em>needs the market to believe</em>. That shouldn&#8217;t be a surprise: <strong>they start to come in November - or even October! - to be aligned with the budgeting and planning season of the vendors&#8217; target customers.</strong></p><p>Most vendor predictions support at least one of the following:</p><ol><li><p><strong>Reinforcing today&#8217;s value proposition</strong></p><p>&#8220;The most important problems next year are exactly the ones we already solve.&#8221;</p></li><li><p><strong>Pre-justifying tomorrow&#8217;s roadmap</strong></p><p>&#8220;This trend is inevitable and we just happen to be building for it.&#8221;</p></li><li><p><strong>Shaping how buyers think about security</strong></p><p>&#8220;Stop evaluating tools the old way. Think in this new framework where we win.&#8221;</p></li></ol><p>That doesn&#8217;t automatically make predictions useless, but it does mean they&#8217;re not neutral.</p><div><hr></div><p>This edition of <strong>Cybersecurity &amp; Business </strong>is sponsored by<strong>:</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://tandemtrace.ai/?utm_source=substack&amp;utm_campaign=cybandsec" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GM76!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!GM76!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!GM76!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!GM76!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GM76!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59843,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://tandemtrace.ai/?utm_source=substack&amp;utm_campaign=cybandsec&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/173010384?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!GM76!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!GM76!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!GM76!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!GM76!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 1456w" sizes="100vw" loading="lazy" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h1><strong>A quick personal note</strong></h1><p>I&#8217;m not making this argument from the outside.</p><p>When I was <strong>Chief Business Officer at ESET</strong>, I used to oversee the creation of predictions content. I know how these pieces are shaped: <strong>not just by research and threat intelligence</strong>, but also by messaging discipline, positioning, and business priorities.</p><p>My personal take after reading <em>far too many</em> of these over the years:</p><ul><li><p><strong>The more mature a company is, the more substance there tends to be behind its predictions</strong> (better data, broader telemetry, more internal debate). But even then: <strong>take them with a grain of salt</strong>.</p></li><li><p><strong>Challengers and newer vendors</strong>, in my experience, lean much more heavily into predictions as a way to <em>move the conversation in their favor</em>.</p></li></ul><p>The most useful way I&#8217;ve found to read predictions is this: <strong>They&#8217;re not primarily a window into the future; they&#8217;re a window into the vendor. </strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>Two examples: what predictions reveal when you read them analytically</strong></h1><p>Below are two real prediction pieces from well-known vendors. I&#8217;ll refer to them as <strong>Vendor Q</strong> and <strong>Vendor S</strong>, not to obscure facts, but to keep the focus on <em>patterns</em> rather than brands.</p><h2><strong>Example 1: Vendor Q - predictions from an AI-SOC vendor</strong></h2><p>Vendor Q&#8217;s core positioning, simplified: <strong>autonomous SOC investigation, reduced analyst workload, faster outcomes</strong>.</p><p>Once you understand that, several of their &#8220;predictions&#8221; start to read differently.</p><h3><strong>Prediction #1: Automated remediation becomes standard</strong></h3><p>Framed as a market trend, this prediction conveniently extends the narrative from <em>investigation</em> to <em>remediation</em>.</p><p>That does two things at once:</p><ul><li><p>It reinforces the current message (&#8220;autonomy is the future&#8221;).</p></li><li><p>It quietly prepares the market for the <em>next logical step</em> in the product roadmap of Vendor Q.</p></li></ul><p>Even if large-scale automated remediation isn&#8217;t widely accepted yet, presenting it as inevitable makes future product expansion feel obvious, even necessary.</p><h3><strong>Prediction #2: SOAR budget reallocation</strong></h3><p>This is less a prediction and more a <strong>budget argument </strong>for their target customers.</p><p>The implicit message is:</p><p><em>&#8220;If you don&#8217;t know where to get budget from to purchase our solution, traditional SOAR tools are too complex and expensive. That money should move to autonomous AI SOC platforms instead.&#8221;</em></p><p>This reframes the buying conversation away from features and toward <em>economic efficiency</em>, while positioning Vendor Q as the natural beneficiary of that shift.</p><p>It&#8217;s a prediction, but it&#8217;s also a very intentional <strong>market re-education effort</strong>.</p><h2><strong>Example 2: Vendor S &#8212; predictions from a large security platform vendor</strong></h2><p>Vendor S positions itself as an <strong>AI-driven, increasingly autonomous security platform</strong> spanning detection, response, investigation, and automation.</p><p><strong>Unsurprisingly, its predictions reinforce that worldview.</strong></p><h3><strong>Prediction #1: AI will dramatically increase adversary capabilities</strong></h3><p>This theme appears everywhere, and it doesn&#8217;t <em>feel</em> wrong. But it also creates urgency for exactly the type of AI-native, automated defense that Vendor S sells.</p><p>The logic is straightforward:</p><ul><li><p>Attackers automate &#8594; humans can&#8217;t keep up</p></li><li><p>Manual SOC models fail &#8594; autonomy becomes mandatory</p></li><li><p>Point tools fall short &#8594; platforms win</p></li></ul><p>It&#8217;s a plausible argument, but also <strong>a very convenient one</strong>.</p><h3><strong>Prediction #2: Operational velocity and automation are table stakes</strong></h3><p>Here, predictions function as <strong>platform justification</strong>.</p><p>If speed and automation are everything, then:</p><ul><li><p>stitched-together toolchains look risky,</p></li><li><p>integrated data + AI + automation stacks look inevitable.</p></li></ul><p>Again, this may reflect real trends (or not), but it also <strong>nudges buyers toward evaluating vendors in exactly the dimensions where Vendor S is strongest</strong>.</p><h3><strong>Prediction #3: AI governance becomes critical</strong></h3><p>This is where predictions can hint at roadmap direction.</p><p>By emphasizing non-determinism, guardrails, and enterprise-grade AI, Vendor S implicitly signals future focus areas: explainability, governance controls, auditability. <strong>The kinds of features that tend to appear as platforms mature</strong>.</p><h2><strong>What these examples have in common</strong></h2><p>When you read predictions through a strategic lens, consistent patterns emerge:</p><ul><li><p>Predictions reinforce the vendor&#8217;s <strong>&#8220;why now&#8221;</strong></p></li><li><p>They normalize assumptions that benefit the vendor&#8217;s model</p></li><li><p>They often pre-condition buyers for upcoming features</p></li><li><p>They subtly de-emphasize competing approaches or legacy tools</p></li></ul><p>None of this means the predictions are <em>wrong</em>, but it does mean they&#8217;re <strong>motivated</strong>.</p><h1><strong>A practical bonus: a prompt to dissect vendor predictions yourself</strong></h1><p>This is a quick and useful way I&#8217;ve found to extract real signal from prediction reports.</p><p>Use the prompt below with any vendor&#8217;s predictions and it will help you understand:</p><ul><li><p>how predictions align with current products,</p></li><li><p>where they hint at future roadmap,</p></li><li><p>and where they&#8217;re mostly narrative shaping.</p></li></ul><p>It&#8217;s useful for:</p><ul><li><p><strong>Practitioners</strong> trying to separate signal from marketing</p></li><li><p><strong>Vendors</strong> analyzing competitor direction</p></li><li><p><strong>Industry analysts</strong> tracking category evolution</p></li></ul><pre><code><code>Prompt: Analyze Vendor Predictions Through the Lens of Business Strategy and Value Proposition

You are a cybersecurity industry analyst with expertise in security operations, vendor strategy, and market positioning.

You are given:
1. A cybersecurity vendor&#8217;s public material (website, product pages, blog posts, documentation, press releases).
2. A list of predictions published by that vendor about cybersecurity trends or threats.

Your task is to critically analyze how the predictions align with the vendor&#8217;s current and future business interests, not just their stated opinions.

Step 1: Identify the Vendor&#8217;s Value Proposition and Core Capabilities
Based on publicly available information, extract and summarize:
&#8226; Primary value proposition
&#8226; Key product features and capabilities
&#8226; Differentiation
&#8226; Current limitations or implied future gaps

Step 2: Analyze Each Prediction
For each prediction:
&#8226; Restate it succinctly
&#8226; Assess direct alignment with current offerings
&#8226; Identify indirect or strategic alignment with future direction
&#8226; Evaluate narrative or mindset shaping

Classify each prediction as:
&#8226; Strong direct support
&#8226; Moderate/indirect support
&#8226; Forward-looking strategic signal
&#8226; Weak or speculative alignment

Step 3: Synthesize Strategic Signals
&#8226; Dominant themes
&#8226; Implied roadmap direction
&#8226; Business priorities
&#8226; Market positioning intent

Step 4: Critical Assessment
&#8226; Evidence-driven vs narrative-driven claims
&#8226; Oversimplifications or bias
&#8226; Important trends that are missing &#8212; and why</code></code></pre><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>So&#8230; are cybersecurity predictions actually valuable?</strong></h1><p>Yes; just not in the way they&#8217;re usually framed.</p><p>Predictions are rarely reliable forecasts of what will happen next year. Any experienced cybersecurity practitioner knows that. They&#8217;re often too broad, too incentive-driven, and too selective for that.</p><p>But they <em>are</em> valuable as:</p><ul><li><p><strong>A roadmap signal</strong>, what the vendor is likely to build or emphasize next</p></li><li><p><strong>A positioning artifact</strong>, how they want the market to think</p></li><li><p><strong>A budget narrative</strong>, where they want spending to move</p></li><li><p><strong>A maturity indicator</strong>, how evidence-based their thinking really is</p></li></ul><p>The trick is not to dismiss predictions, but to read them correctly. </p><blockquote><p><strong>Treat them as strategy documents wearing a forecasting costume.</strong></p></blockquote><p>And using the prompt above, cut through the fluff and understand the <em>why </em>behind them.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!E-NW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!E-NW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!E-NW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!E-NW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!E-NW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54767,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/183849346?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!E-NW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!E-NW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!E-NW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!E-NW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d6a0102-dfa0-4f27-8bba-08fe4c0d2ade_1584x396.heic 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Building Cybersecurity Companies from Europe]]></title><description><![CDATA[What Founders Really See When They Try to Scale]]></description><link>https://cybersecandbiz.substack.com/p/building-cybersecurity-companies</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/building-cybersecurity-companies</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Thu, 18 Dec 2025 22:22:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d4a4f992-7f9c-4667-8e9e-a6cee248d0db_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For years, the dominant story in cybersecurity has been simple: <strong>real companies are built in the US or Israel. Everywhere else is secondary.</strong></p><p>But when you sit down with founders actually building cybersecurity startups and scaleups across Europe, a very different story emerges.</p><p>A story that mixes <em>structural friction<strong> </strong></em>with <em>forced creativity</em>, full of <em>hard choices and sometimes longer paths that can produce <strong>stronger companies</strong></em>.</p><p>In a recent article, we talk about how a focus on <strong>delivering real</strong> <strong>value</strong> - not protectionism - can transform the European cybersecurity landscape very positively.</p><p>The following piece is based on the views and experiences of founders from France, Ukraine, Belgium, Germany, Poland, Czechia, and Spain, who speak candidly about what they see as <strong>the real opportunities and challenges of building cyber companies in Europe </strong>and their relentless focus on creating solutions the world wants to buy .</p><p>What follows is not theory. It&#8217;s what they&#8217;ve lived.</p><h1><strong>Europe Forces You to Solve Harder Problems Earlier</strong></h1><p>One of the first patterns that emerges is this: <strong>Europe is not an easy place to build and sell European cybersecurity and that shapes products.</strong></p><p><strong><a href="https://open.substack.com/pub/scalingcyber/p/reinventing-human-risk-how-outkept?r=638o5t&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=false">Simon Bauwens</a></strong>, co-founder of <a href="https://scalingcyber.bridgerwise.com/guests/outkept">OutKept</a>, explains how even something as <em>&#8220;simple&#8221;</em> as phishing simulation becomes radically more complex in Europe:</p><blockquote><p>&#8220;If you write a phishing email in the Dutch that we use in Flanders, it&#8217;s very different from the Dutch in the Netherlands. The French in Wallonia is not the same as the French in France. A small change in wording is enough for people to immediately say: <em>this doesn&#8217;t look credible</em>.&#8221;</p></blockquote><p>He goes on:</p><blockquote><p>&#8220;If you&#8217;re a big global company, who is going to create phishing emails that refer to a local storm, a local election, or something that just happened in that region? Nobody does that. But that&#8217;s exactly the kind of phishing people actually fall for.&#8221;</p></blockquote><p>This isn&#8217;t an isolated experience.</p><p><strong><a href="https://open.substack.com/pub/scalingcyber/p/the-new-frontline-of-cybersecurity?r=638o5t&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=false">Andriy Kusyy</a></strong>, founder of <a href="https://scalingcyber.bridgerwise.com/guests/letsdata">LetsData</a>, describes how disinformation campaigns now launch <strong>multilingual by default</strong>, not as an afterthought:</p><blockquote><p>&#8220;Campaigns don&#8217;t start in English and then get translated anymore. They start multilingual from patient zero. If you&#8217;re only scanning English media space, you&#8217;re already late.&#8221;</p></blockquote><p>For him, Europe&#8217;s linguistic and cultural fragmentation isn&#8217;t noise but signal:</p><blockquote><p>&#8220;If a campaign starts in Romanian, then Russian, then Ukrainian, then comes back to Romanian, and finally targets Moldova, if you&#8217;re only looking at one country or one language, you will never understand it&#8217;s the same operation.&#8221;</p></blockquote><p>The opportunity this creates is clear: European founders are forced to build products that work across complexity &#8212; languages, cultures, regulations &#8212; <em>from day one</em>.</p><p>The result? Products that are often more resilient globally once (and if) they break out.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>Trust, Regulation, and &#8220;Made in Europe&#8221; Are Becoming Strategic Assets</strong></h1><p>Another shift founders consistently point to is <strong>trust</strong>. Not marketing trust but <em>structural trust</em>.</p><p><strong><a href="https://open.substack.com/pub/scalingcyber/p/inside-the-maze-how-labyrinth-is?r=638o5t&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=false">Pavel Rybczyk</a></strong> from <a href="https://scalingcyber.bridgerwise.com/guests/labyrinth">Labyrinth Security</a> puts it plainly:</p><blockquote><p>&#8220;We are not saying: buy European just because it&#8217;s European. That would make no sense. But for critical things like access management, monitoring, early detection &#8212; customers are starting to ask where the technology comes from, who controls it, and where the data lives.&#8221;</p></blockquote><p>He adds:</p><blockquote><p>&#8220;It&#8217;s not realistic to switch everything to European vendors. But for strategic layers, it&#8217;s absolutely realistic, and customers are now open to that conversation.&#8221;</p></blockquote><p><strong><a href="https://open.substack.com/pub/scalingcyber/p/from-czechia-to-1-billion-users-whalebone?r=638o5t&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=false">Richard Malovic</a></strong>, Co-Founder and CEO of <a href="https://scalingcyber.bridgerwise.com/guests/whalebone">Whalebone</a>, sees the same dynamic in the vertical they target the most, telecommunications:</p><blockquote><p>&#8220;We integrate directly into telco networks. This is critical infrastructure. Here, stability, long-term viability, and political alignment matter a lot.&#8221;</p></blockquote><p>Richard went on to highlight how those values are what many consider European cultural pillars and they are natural for a company that is built in this region.</p><p>Therefore, for companies operating in government, telecom, finance, or national infrastructure, <strong>European origin is increasingly a qualifier, not a handicap</strong>.</p><h1><strong>Speed vs. Skepticism: Europe&#8217;s Adoption Paradox</strong></h1><p>Yet nearly every founder contrasts this opportunity with a harsh reality: <strong>Europe is slow to adopt new cybersecurity vendors.</strong></p><p><strong><a href="https://open.substack.com/pub/scalingcyber/p/predicting-the-future-how-bforeai?r=638o5t&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=false">Luigi Lenguito</a></strong>, founder of <a href="https://scalingcyber.bridgerwise.com/guests/bforeai">BforeAI</a>, is blunt:</p><blockquote><p>&#8220;In Europe, customers want proof before innovation. In the US, they buy the vision and expect you to get there. In Europe, you need to already be there.&#8221;</p></blockquote><p>The result?</p><blockquote><p>&#8220;You often need US customers to convince European ones. That&#8217;s the paradox.&#8221;</p></blockquote><p>The <a href="https://scalingcyber.bridgerwise.com/guests/mitigant">Mitigant</a> founders, a Cloud Attack Emulation vendor from Germany, who come directly from academia into the cyber industry, felt this immediately:</p><blockquote><p>&#8220;In the US, you can sell the idea and iterate fast. In Europe, customers want a finished product, references, and long POCs before they even consider it.&#8221;</p></blockquote><p>They add:</p><blockquote><p>&#8220;That forces you to spend much more time educating your potential customers. Not just the security team, but management, procurement, legal. Everyone needs to understand why the tool exists.&#8221;</p></blockquote><p><strong>Nils Karn </strong>went further and quoted a study made in Germany that found out that from the billions spent in cybersecurity in the country, very little is actually dedicated to startups in their first years of life.</p><p><strong>The challenge: </strong>European founders must survive longer sales cycles with less early revenue, while still competing against global incumbents.</p><h1><strong>Why Many European Founders Default to Channel Models</strong></h1><p>Because of this friction, many founders independently converge on the same conclusion: <strong>Direct sales alone don&#8217;t scale well in Europe.</strong></p><p>Lukasz Jesis from <strong><a href="https://xopero.com/">Xopero</a></strong> explains it simply:</p><blockquote><p>&#8220;If you want to scale across Europe, you cannot sell country by country on your own. You need partners who already have trust, relationships, and distribution.&#8221;</p></blockquote><p>Labyrinth designed its product around partners from day one:</p><blockquote><p>&#8220;Multi-tenancy, MSSP support &#8212; this was in the product from the first version. We knew we could not scale commercially without partners.&#8221;</p></blockquote><p>Whalebone took this logic even further by embedding itself inside telcos:</p><blockquote><p>&#8220;We are not selling cybersecurity as a tool. We are helping telcos create a new revenue stream. That changes everything.&#8221;</p></blockquote><p>The fragmented reality of the European market, with different languages, cultures and business practices, requires a different approach than what US &amp; Israeli companies usually do. As Luigi Lenguito points out, if you go to the US first, you can go directly to customers, as they do.</p><p><strong>The opportunity: </strong>Europe rewards founders who think in ecosystems &#8212; MSSPs, telcos, distributors &#8212; not just direct sales. If they <a href="https://cybersecandbiz.substack.com/p/what-cybersecurity-vendors-get-wrong">listen to the channel</a>, they can have an advantage that &#8220;foreign&#8221; entities might not.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>Capital Is Available But the Middle Is Missing</strong></h1><p>One of the most honest reflections comes when founders talk about funding. Everybody knows that - with few exceptions - investment rounds in Europe are several orders of magnitude smaller than in the US.</p><p>That is an obvious obstacle but not the only one. Simon Bauwens describes a structural gap many European founders recognize immediately:</p><blockquote><p>&#8220;We are missing that big middle layer. We have early-stage startups in Europe, and we have global giants &#8212; mostly from the US. But we don&#8217;t have enough large European tech companies that can acquire, fund, or help scale the next generation.&#8221;</p></blockquote><p>Richard Malovic echoes this from a scaleup perspective:</p><blockquote><p>&#8220;We need more European examples of companies that grow big and stay independent. Positive examples matter more than anything.&#8221;</p></blockquote><p>Without that middle layer:</p><ul><li><p>exits happen earlier</p></li><li><p>ambition is often externally constrained</p></li><li><p>global scale sometimes requires leaving Europe behind</p></li></ul><p>Very few European cybersecurity vendors have reached EUR 1 billion ARR. There&#8217;s only a handful that even got to half a billion euros in annual revenue. Europe is full of stories of strong cybersecurity companies that were acquired by American firms before they could become that middle layer, like Hornet Security.</p><p><strong>Hornet Security</strong>, a successful german email security company acquired Vade Secure, a french player in the same sector. That looked like a successful story of european consolidation&#8230; until <strong>Proofpoint</strong> came and acquired them and fulfilled exactly what Simon and Richard mentioned above.</p><h1><strong>The Hidden Advantage: Forced Long-Term Thinking</strong></h1><p>And yet, despite all this, something remarkable appears across these conversations: <strong>European founders are not pessimistic. They are </strong><em><strong>patient</strong></em><strong>. </strong>They talk less about blitzscaling and more about <strong>durability</strong>.</p><p>Richard Malovic describes it as crossing a mountain valley:</p><blockquote><p>&#8220;You know you&#8217;re going forward. You&#8217;re not coming back. It&#8217;s hard, it&#8217;s cold, but you keep going.&#8221;</p></blockquote><p>Simon Bauwens frames it differently:</p><blockquote><p>&#8220;Competition becomes aggressive. People try to scare you, write legal letters, run ads against you. But you learn that if they bother, you must be doing something right.&#8221;</p></blockquote><p>In a world where the speed of developing software is accelerating, that patience can become an advantage. <strong><a href="https://open.substack.com/pub/scalingcyber/p/autonomous-threat-hunting-how-tandemtrace?r=638o5t&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=false">Almog Ohayon</a></strong> from <a href="https://scalingcyber.bridgerwise.com/guests/tandemtrace">TandemTrace</a>, who already went through a successful Israel-to-US founding journey and now is building out of Spain captures the moment we&#8217;re entering:</p><blockquote><p>&#8220;With AI, small teams can now outperform big organizations. The advantage is shifting back to speed, focus, and clarity of vision.&#8221;</p></blockquote><p>The new reality combined with European resilience can become a hidden strength for the local cybersecurity vendors.</p><h1><strong>The Real Story of European Cyber Founders</strong></h1><p>A bit more than a year ago <a href="https://open.substack.com/pub/cybersecandbiz/p/european-cybersecurity-startups-tales?r=638o5t&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=false">we discussed similar topics with other founders from Europe</a>. Many of the challenges remain the same yet something seems to be shifting in the market as well as in the mindsets of the leaders of the European cybersecurity vendors.</p><p>The conversations we have now, taken together, reveal a deeper truth: <strong>Europe doesn&#8217;t produce fewer or worse cybersecurity companies.</strong></p><p>It produces <strong>different ones</strong> that, while might have been built slower and taken longer to validate, are designed for complexity and could be more defensible long-term.</p><p>The stories of the companies we interviewed, as part of <strong><a href="https://scalingcyber.bridgerwise.com/">Scaling Cyber</a></strong>, provide us with a unique perspective on how cyber innovation is building up in Europe and that despite the challenges, there are strong opportunities ahead.</p><p><strong>Europe needs to listen to the European founders. When that happens, a new generation of global cybersecurity leaders will not just emerge. They will be impossible to ignore.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LWqL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!LWqL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!LWqL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!LWqL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LWqL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54767,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/182034324?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LWqL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!LWqL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!LWqL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!LWqL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48926eea-7765-478c-aa52-2e5727b6d12f_1584x396.heic 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Scaling Cyber: meet the next cybersecurity global leaders]]></title><description><![CDATA[Agentic Threat Hunting, Predictive Threat Intelligence, Disinformation Security & Cyber Deception and more]]></description><link>https://cybersecandbiz.substack.com/p/scaling-cyber-podcast-showcasing-cybersecurity-leaders</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/scaling-cyber-podcast-showcasing-cybersecurity-leaders</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Fri, 21 Nov 2025 09:48:18 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/90a044d8-5fcc-4e85-abac-3cdb57a24da3_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Is it possible to fulfil the <strong>AI-SOC</strong> promise beyond autonomous alert triage?<br>Can we <strong>predict</strong> where the next cyber attack against our organization is coming from<br>How to make attackers <strong>lose</strong> time so the defenders can catch them?<br>Is there a campaign against our <strong>customers</strong> that we are not aware of?</p><p>All these questions are being answered by <strong>a new generation of companies</strong>. They are delivering solutions that are approaching cybersecurity differently: <strong>preempting breaches</strong>, <strong>augmenting security operations with AI agents</strong> and <strong>alerting of information operations before they take off</strong>.</p><p>Discovering and showcasing innovation in cybersecurity is the purpose of <strong><a href="https://scalingcyber.substack.com">Scaling Cyber</a></strong>, the podcast I&#8217;ve launched 4 weeks ago, and that I&#8217;d like to invite you to subscribe to. You can find a description of each episode below.</p><p>The purpose of <strong>Scaling Cyber</strong> is to provide visibility to cybersecurity leaders and founders that are scaling out of the usual locations, like the US or Israel. The first season is going to cover 8 companies from Europe and Africa.</p><p>I&#8217;d love to hear your thoughts on our first episodes and guests! </p><p>You can subscribe on <strong><a href="https://scalingcyber.substack.com">Substack</a></strong>, <strong><a href="https://podcasts.apple.com/us/podcast/scaling-cyber-podcast/id1840151010">Apple Podcasts</a>, <a href="https://open.spotify.com/show/6ya2wXnAocJvzDfGkAjH8t">Spotify</a> </strong>or <strong><a href="https://www.youtube.com/@ScalingCyberPodcast?sub_confirmation=1">YouTube</a></strong>.</p><h1>Autonomous Alert Triage &amp; Threat Hunting in the SOC</h1><p>In our latest episode, <strong>Almog Ohayon</strong>, CEO &amp; Founder of TandemTrace, explains how AI is transforming SecOps at a pace few imagined. <strong>He draws a parallel with the early days of cloud adoption: a moment of skepticism that eventually became standard practice.</strong> Today, the same shift is happening with AI, but faster and with even bigger implications for security teams.</p><p>What makes <strong>TandemTrace</strong> stand out is its focus on <strong>autonomous threat hunting</strong>, not just alert triage. Their AI agents generate and test new hypotheses nonstop, examining telemetry far beyond what humans could handle. Almog argues that dashboards were created for human analysts. AI doesn&#8217;t need dashboards. It needs clean data.</p><p>His message is clear: <strong>the future SOC runs on AI as the pilot, with humans guiding strategy.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://youtu.be/QSu-IqcqLms" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u__g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic 424w, https://substackcdn.com/image/fetch/$s_!u__g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic 848w, https://substackcdn.com/image/fetch/$s_!u__g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic 1272w, https://substackcdn.com/image/fetch/$s_!u__g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u__g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:66995,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://youtu.be/QSu-IqcqLms&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/179337077?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u__g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic 424w, https://substackcdn.com/image/fetch/$s_!u__g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic 848w, https://substackcdn.com/image/fetch/$s_!u__g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic 1272w, https://substackcdn.com/image/fetch/$s_!u__g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5addb9-fbb2-4b18-95d1-78ee0fb9723e_1280x720.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h1>Detecting Information Operations &amp; Disinformation Campaigns</h1><p>A previous episode features <strong>Andriy Kusyy</strong>, CEO &amp; Co-Founder of LetsData, who takes us inside the world of modern information operations. <strong>He didn&#8217;t plan to build a startup in this space: he simply followed a problem that he was seeing every day.</strong> Disinformation campaigns now move in multiple languages, across borders and platforms, making them almost impossible to spot without automation.</p><p><strong>LetsData</strong> bridges cybersecurity and media intelligence by detecting coordinated manipulation early, before narratives go viral. Their platform monitors millions of posts across dozens of languages and looks for abnormal patterns: bot behavior, sudden surges, or hostile messaging.</p><p>Andriy shares how the team has supported organizations around the world, including helping Moldova defend its elections. His takeaway: <strong>information operations are now a mainstream cybersecurity threat.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://youtu.be/-2VNSEIhFUw" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Paj3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic 424w, https://substackcdn.com/image/fetch/$s_!Paj3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic 848w, https://substackcdn.com/image/fetch/$s_!Paj3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic 1272w, https://substackcdn.com/image/fetch/$s_!Paj3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Paj3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:65663,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://youtu.be/-2VNSEIhFUw&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/179337077?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Paj3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic 424w, https://substackcdn.com/image/fetch/$s_!Paj3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic 848w, https://substackcdn.com/image/fetch/$s_!Paj3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic 1272w, https://substackcdn.com/image/fetch/$s_!Paj3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1df53bb-ca42-4097-a6a3-846bd2de2446_1280x720.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Trolling Cyber Criminals</h1><p>In episode three, <strong>Pavel Rybczyk</strong> and <strong>Anastasiia Dorosh,</strong> from Labyrinth, introduce us to the new wave of <strong>cyber deception</strong>. Labyrinth deploys lightweight decoys &#8212; &#8220;points&#8221; &#8212; across a network. <strong>Since no real user should ever touch them, any interaction is an instant, high-fidelity alert.</strong> In an industry overwhelmed by false positives, this simplicity is refreshing.</p><p>Once attackers engage, <strong>Labyrinth</strong> doesn&#8217;t just detect them. It keeps them busy.</p><p>Their decoys pull intruders deeper into a controlled maze, buying defenders valuable time. Pavel and Anastasiia also highlight why <strong>this is the right moment for deception: environments are more complex, attacks move faster, and companies need a reliable second line of defense</strong>. Labyrinth is also part of a growing movement of high-quality European cybersecurity vendors building global-ready solutions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://youtu.be/gMnmv7TJE-I" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dgZi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic 424w, https://substackcdn.com/image/fetch/$s_!dgZi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic 848w, https://substackcdn.com/image/fetch/$s_!dgZi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic 1272w, https://substackcdn.com/image/fetch/$s_!dgZi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dgZi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79251,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://youtu.be/gMnmv7TJE-I&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/179337077?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dgZi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic 424w, https://substackcdn.com/image/fetch/$s_!dgZi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic 848w, https://substackcdn.com/image/fetch/$s_!dgZi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic 1272w, https://substackcdn.com/image/fetch/$s_!dgZi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe861bc54-0384-4d86-b842-e434aae3d1d9_1280x720.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h1>Predicting Attacks Before They Strike</h1><p>In our first recorded episode, <strong>Luigi Lenguito</strong> shares how BforeAI, where he is CEO &amp; Co-Founder, aims to shift cybersecurity back toward prevention. After years in global leadership roles at Dell, Luigi decided to challenge the industry&#8217;s assumption that breaches are inevitable. His team focuses on predicting malicious infrastructure <em>before</em> attackers launch their campaigns.</p><p><strong>BforeAI</strong>&#8217;s approach is bold, including a performance guarantee <em>backed</em> by Munich Re. <strong>Luigi also talks about scaling a European startup globally by going to the US early and shaping a new security category.</strong> His insights reveal what it takes to create trust, earn analyst recognition, and turn a contrarian thesis into a fast-growing company.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://youtu.be/deqDooDBI7A" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FF2Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic 424w, https://substackcdn.com/image/fetch/$s_!FF2Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic 848w, https://substackcdn.com/image/fetch/$s_!FF2Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic 1272w, https://substackcdn.com/image/fetch/$s_!FF2Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FF2Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79019,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://youtu.be/deqDooDBI7A&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/179337077?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FF2Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic 424w, https://substackcdn.com/image/fetch/$s_!FF2Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic 848w, https://substackcdn.com/image/fetch/$s_!FF2Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic 1272w, https://substackcdn.com/image/fetch/$s_!FF2Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d51d863-54b3-4f20-9199-a72bce88a5ea_1280x720.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>What&#8217;s Coming Next</h1><p>There will be four more episodes, released weekly, of the first season of <strong>Scaling Cyber.</strong> </p><p>They will cover new territory: <strong>cloud attack simulation, community-driven phishing simulation, preventing email impersonation at scale, and protecting the Internet&#8217;s backbone</strong>.</p><p>Each one brings fresh perspectives and more lessons from founders about cybersecurity as well as their journeys. <strong>They are redefining what modern cybersecurity looks like and they are ready to share with us.</strong></p><p>Discover the future cybersecurity global leaders in <strong>Scaling Cyber</strong>. <br><strong><a href="https://scalingcyber.substack.com">Subscribe now</a></strong>!</p>]]></content:encoded></item><item><title><![CDATA[Why Protectionism Won't Make Europe a Cybersecurity Powerhouse]]></title><description><![CDATA[Rethinking Digital Sovereignty: Building Value, Not Walls]]></description><link>https://cybersecandbiz.substack.com/p/why-protectionism-wont-make-europe-a-cybersecurity-leader</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/why-protectionism-wont-make-europe-a-cybersecurity-leader</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Tue, 04 Nov 2025 13:22:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ec365897-4672-47af-bdcf-c9a087e00ab4_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A couple of weeks ago I was at <strong>IT-SA</strong>, one of the largest IT &amp; Cybersecurity events in Germany and in Europe. When walking around the exhibition floor and talking with both exhibitors and attendees, <strong>something that struck me was how much the &#8220;Buy European&#8221; mindset is taking over.</strong></p><p>If you would compare IT-SA with, let&#8217;s say, <strong>RSA Conference</strong> in San Francisco, something would be clear: <strong>for every vendor booth mentioning <a href="https://cisoseries.com/the-cool-and-not-so-cool-of-rsa-2025/">AI in the latter</a>, you will find one with a big &#8220;Made in EU&#8221; or &#8220;Made in Germany&#8221; label in the German one.</strong></p><p>Not only that, <strong><a href="https://www.itsa365.de/en/actions-events/2025/it-sa-expo/knowledge-f/eu-wertschoepfungsallianz-cybersicherheit-anbieter-transparenz-made-in-europe-cyberintelligence">many presentations</a></strong> in the official agenda were covering that topic, one way or another.</p><p>After 20 years building one of the largest European cybersecurity vendors in the world, I am personally involved in many activities to promote local cybersecurity vendors and solutions myself. <strong>However, I believe a big part of the current &#8220;sovereignty&#8221; push is mis-guided and will not help in the long run.</strong></p><blockquote><p>Take into account that this comes from someone that is part of an initiative to develop a European cybersecurity marketplace. I even <strong><a href="https://www.itsa365.de/en/actions-events/2025/it-sa-expo/knowledge-e/the-cyberhive-europe-the-european-cybersecurity-marketplace-ecso">presented it at IT-SA</a></strong> myself! &#128512;</p></blockquote><p>In this article, I am going to explore how I see the overall situation and what I believe should be emphasised or done instead.</p><h1>The &#8220;Buy European&#8221; Many Problems</h1><p>There are several initiatives that are looking into modifying procurement rules and processes to give preference to European solutions. Recently, the European Commission, through its Directorate-General for Digital Services, published a <strong><a href="https://commission.europa.eu/document/download/09579818-64a6-4dd5-9577-446ab6219113_en?filename=Cloud-Sovereignty-Framework.pdf">Cloud Sovereignty Framework</a></strong> that defines objectives and Sovereignty Effectiveness Assurance Level.</p><p>Another initiative is <strong>EuroStack</strong>, which proposes a <strong><a href="https://eurostack.eu/a-proposed-framework-for-buy-european-regulation/">&#8220;Buy European&#8221; Regulation of Strategic Digital Procurement</a></strong> framework. This would aim to redirect a significant portion of the current purchases towards European firms and define a <strong>&#8220;Sovereign European Provider&#8221;</strong> through a <em>&#8220;rigorous, technical test of substantive control and operational autonomy&#8221;</em>.</p><p>These initiatives are getting some momentum and as that happens, they show the many problems of the <strong>&#8220;Buy European&#8221;</strong> movement. For instance, there was some news breaking a couple of months ago that the<a href="https://www.theregister.com/2025/06/20/ovhcloud_boss_talks_up_ec_discussions/"> European Commission was considering dropping Microsoft Azure and replacing it with the French OVHCloud provider</a>.</p><p>Now, my question is, <strong>how does that change anything?</strong> Yes, OVHCloud (or any <em>&#8220;sovereign cloud provider&#8221;</em>) is headquartered in a European country, but <strong>the majority of the base software they use and provide to their customers is not European.</strong> Even <a href="https://corporate.ovhcloud.com/sites/default/files/external_files/2025-06-24-ovhcloud-q3-fy25-pr-eng-vdef2.pdf">a change in prices in Broadcom/VMWare licenses affected their financial results, last year</a>.</p><p>When we review the Eurostack proposed framework, other issues arise. One of their pillars is the usage of <strong>&#8220;open-source&#8221; software</strong>. As they do point out to some extent, though, the vast majority of the key foundations behind those projects - like the Linux Foundation, Mozilla Foundation or the Apache Software Foundation - are incorporated in the U.S.</p><p>The other issue is the reliance of the proposal on a <strong>certification-like approach to validate if a provider is European</strong>.</p><p>There are enough certifications in Europe at the moment, at regional and local level, and in my opinion and personal experience, they are actually obstacles for innovative and disruptive new companies. <strong>There are too many already!</strong></p><p>A young startup doesn&#8217;t have the resources to obtain internationally recognized certifications like SOC2 and ISO, plus the local ACN, ANSII, BSI, LINCE, etc. and on top of that, some regional ones to show they are European enough.</p><div class="pullquote"><p>Some will point out that there are already efforts to harmonize the national schemes. However, <strong>has anyone noticed how long it takes to get anything like that done?</strong> Just give a look at the state of <strong><a href="https://ecs-org.eu/activities/nis2-directive-transposition-tracker/">NIS2 transposition</a></strong>!</p></div><p>We are launching <strong><a href="https://scalingcyber.substack.com">Scaling Cyber</a></strong>! The podcast where cybersecurity founders and leaders from all over the world share their journeys of growth, challenges, and global expansion. <strong><a href="https://scalingcyber.substack.com">Subscribe now!</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://scalingcyber.substack.com" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VDne!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!VDne!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!VDne!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!VDne!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VDne!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52109,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://scalingcyber.substack.com&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/175602478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!VDne!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!VDne!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!VDne!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!VDne!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><h1>Tales from the East</h1><p>While we could point out other issues with some of the &#8220;Buy European&#8221; initiatives, let&#8217;s take a pause, and look towards the East for <em>&#8220;inspiration&#8221;</em>.</p><p><strong>I have been in the cybersecurity industry for some time now</strong>, and I have seen the evolution of protectionism in countries like China and Russia. Both countries have had certification schemes in place for more than a decade, with rules that became stricter towards foreign providers year over year.</p><p>Their initiatives and certification processes have fared differently, and haven&#8217;t necessarily helped them to become fully sovereign nor global leaders.</p><div class="pullquote"><p><strong>Did you know that in Russia you need to have the source code manually reviewed by government officials in order to obtain certain certifications?</strong></p></div><p>When it comes to cloud, China fares better than Russia, as the primary cloud service providers are local and some of them have regional presence.</p><div class="pullquote"><p><strong>Did you know that when China started to push for stricter regulations for foreign cybersecurity companies, Trend Micro sold their local subsidiary to AsiaInfo?</strong></p></div><p>However, despite all their efforts, Microsoft Windows continues to be the primary operating system, and foreign software continues to be a reality at many levels, private and government, and even those Chinese cloud service providers need to offer non-Chinese software to their customers.</p><p>Rather than help, in my opinion, <strong>those initiatives create isolation and limit local companies</strong> to become true global market leaders.</p><h1>Why aren&#8217;t we talking more about &#8220;Sell European&#8221;?</h1><p>After this diversion through the East, there is another challenge to the &#8220;Buy European&#8221; movement: <strong>who promotes, sells and implements software and cybersecurity products and services.</strong></p><p>The vast majority of software and cybersecurity products are sold through third parties - service providers, system integrators, etc - in Europe and elsewhere.</p><p>While some of the pan-European providers have some sort of <em>&#8220;sovereign portfolio&#8221;</em> at the moment, they are actively promoting, selling, integrating and supporting non-european products and services for their european customers.</p><p>If you want to have more organizations buying European products and services, you need more of their suppliers offering them European options. <strong>Why don&#8217;t they?</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>The Good Examples</h1><p>All those procurement frameworks, certifications and regulations that we talked about before are not the only initiatives around. There are also some looking into increasing visibility and competitiveness.</p><p><strong><a href="https://thecyberhive.eu/">The CyberHive Europe</a></strong> is a good example, not because I am part of it, but because of the reasons I joined when it was first pitched to me.</p><p>The platform is aiming at becoming a marketplace showcasing European cybersecurity solutions and it is built and maintained with the inputs from the community, which includes CISOs, vendors and investors. It&#8217;s not putting up neon signs about <em>buying european</em>, it&#8217;s giving potential customers a place to find alternatives.</p><p>In that same direction, there is a recently launched website called <strong><a href="https://european-alternatives.eu/">European Alternatives</a></strong> with a similar aim: a directory of regional options for those that want them.</p><p>Another good initiative is the <strong><a href="https://www.cybersecurity-label.eu/">Cybersecurity Made in Europe label</a></strong>, a simple and realistic tool for cybersecurity vendors to show where they come from. It doesn&#8217;t take a minimum of six months and tens of thousands of euros to obtain it like with many of the certifications I mentioned above, which makes it available for established companies as well as young startups.</p><p>Moreover, the <strong><a href="https://ecs-org.eu/">European Cyber Security Organization</a></strong> has the aim to make Europe an equivalent to a seal of cybersecurity excellence, not through forced processes, but by a multitude of initiatives to promote European innovation and technology.</p><p>There are other initiatives that are good examples of what Europe needs to close the gap and become a global cybersecurity leader, aiming at removing obstacles and increasing opportunities:</p><ul><li><p><strong><a href="https://www.eu-inc.org/">EU-Inc</a></strong>: a proposal to create a new pan-European legal entity, with one central registry, and standardized investment documents, EU-wide stock options and taxes and employment rules.</p></li><li><p><strong><a href="https://ecs-org.eu/activities/european-cybersecurity-investment-platform/">The European Cybersecurity Investment Platform</a></strong>: set to be a fund-of-funds mechanism with a target size of at least 1 billion euros, as a response to the investment gap in the EU cybersecurity market.</p></li></ul><p>The above are good examples of &#8220;Buy European&#8221; initiatives that don&#8217;t even need to use that tagline to help increase the chances of customers choosing local solutions. They are well in line with the needs outlined by the <a href="https://cybersecandbiz.substack.com/p/european-cybersecurity-startups-tales">cybersecurity founders and leaders themselves</a>.</p><div class="pullquote"><p><strong>The problem is not where technology is made, but how value is created and delivered to those that use it.</strong></p></div><h1>What Customers Want?</h1><p>Speaking of customers, in my experience, everything starts with them. Their needs, pains and requirements.</p><p>If Europe wants to see the regional technology and cybersecurity industry grow and be adopted, <strong>these initiatives need to be laser-focused on what customers actually want</strong>, above anything else.</p><p>Last year I was in a panel discussion where a CISO said (I am paraphrasing): &#8220;<em>If a European and an American solution are equal in terms of benefits, functionality, integrations, implementation time, support, pricing, etc., I would choose European.</em>&#8221;</p><p>That couldn&#8217;t make more sense. <strong>We can&#8217;t force customers to choose a cybersecurity solution solely or primarily based on origin.</strong> Therefore, the focus needs to be on <a href="https://cybersecandbiz.substack.com/p/solve-first-shout-later">how european companies can solve real customer problems</a> and do it better than anyone else.</p><p>The challenge is, though, that many young startups face obstacles to gain access to them. <a href="https://youtu.be/deqDooDBI7A">European cybersecurity professionals are generally more risk-averse than Americans</a>, as Luigi Lenguito wisely said in a recent episode of <strong><a href="https://scalingcyber.substack.com/">Scaling Cyber</a></strong>.</p><p>There needs to be more initiatives to provide opportunities for young startups to present their solutions to potential buyers, and there needs to be more open-ness from European companies to give them some of their time.</p><p>Advice from end users, the opportunity to co-build a solution with an experienced CISO or practitioner, has an incredible value for startups and scaleups. As long as those end customers do want to see more European alternatives, this is a key initiative to pursue.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>What is a European company?</h1><p>The reality is complex and defining what makes a company truly European is a challenge in itself. <strong>EuroStack </strong>provides a large set of requirements that I doubt many companies can fulfil.</p><p>Like theirs, many definitions of what a European company is are limited by reality.</p><p><strong>A company I work with was recently not accepted in an exhibition as a European provider despite</strong> being a supplier for many EU-based defence organizations and despite their owners, leaders, most of their employees and most of their customers being in the EU. <strong>Why?</strong> Because their main legal entity is incorporated in the US.</p><p>Technically, that doesn&#8217;t make them &#8220;European&#8221;, but the reality is that they did that in order to receive investment they couldn&#8217;t get in Europe.</p><p><strong>Another example:</strong> <em>what happens with the large service providers and system integrators that are legally incorporated within the EU but the majority of their employees are in other countries due to cost and legal reasons?</em></p><p>That is not a hypothetical question. It is exactly what the main executive of a french cybersecurity service provider with tens of thousands of employees asked when their company was about to be excluded from a listing of European service providers. <strong>How many American companies are in exactly the same situation but they are considered US companies anyway?</strong></p><h1>Buy European if good - if not, at least Consider European</h1><p>Sovereign solutions don&#8217;t equal high quality ones. They also aren&#8217;t a guarantee of the necessary and expected business outcomes. <strong><a href="https://www.hornetsecurity.com/en/blog/proofpoint-acquires-hornetsecurity/">They might not even be Europeans forever</a></strong>!</p><p>The whole debate around &#8220;Buy European&#8221; is too much focused on the symptoms. If there is a real desire (and need) for European solutions (however we define them), the goal should not be to force procurement processes and create even more regulation.</p><p>I am a proud and active member of organizations like the <strong><a href="https://ecs-org.eu/">European Cyber Security Organization</a></strong> and the <strong><a href="https://european-champions.org/">European Champions Alliance</a></strong>. I worked more than 20 years developing European cybersecurity companies globally, and <strong>I truly want to see more European companies succeed</strong>.</p><p>Success doesn&#8217;t mean government contracts, nor regulations that will only address symptoms.</p><p>Success means to deliver actual value to end customers, solve their problems, so they want to buy and use the solution.</p><p>I always say, jokingly, that <strong>revenue solves all problems</strong>. If you really want people to &#8220;Buy European&#8221;, <strong>help European companies to build excellent products and services. </strong>That is the way forward and nothing else.</p><p><strong>Europe doesn&#8217;t need to buy European. It needs to build something the world wants to buy.</strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rvpX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!rvpX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!rvpX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!rvpX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rvpX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54767,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/177978908?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rvpX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!rvpX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!rvpX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!rvpX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabe4082-8f39-4dfe-90c0-f252f3c840f6_1584x396.heic 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Inside the CISO Mind: How Security Leaders Choose Solutions]]></title><description><![CDATA[Understanding how CISOs navigate noise, trust peers, and make buying decisions]]></description><link>https://cybersecandbiz.substack.com/p/inside-the-ciso-mind-series-1</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/inside-the-ciso-mind-series-1</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Wed, 15 Oct 2025 08:50:26 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/18462d5b-966a-4b0a-8694-3412201b0b39_1536x1096.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The cybersecurity market has never been more crowded. Every week, a new company claims to solve the latest threat, while others quietly vanish or are absorbed. <strong><a href="https://it-harvest.com/">IT-Harvest Dashboard</a></strong>, the most comprehensive database of cybersecurity vendors, is <a href="https://open.substack.com/pub/stiennon/p/state-of-cyber-q3-2025?r=ifkfc&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=false">currently tracking nearly 4,000 companies</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u1FC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u1FC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png 424w, https://substackcdn.com/image/fetch/$s_!u1FC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png 848w, https://substackcdn.com/image/fetch/$s_!u1FC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png 1272w, https://substackcdn.com/image/fetch/$s_!u1FC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u1FC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png" width="986" height="752" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:752,&quot;width&quot;:986,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u1FC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png 424w, https://substackcdn.com/image/fetch/$s_!u1FC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png 848w, https://substackcdn.com/image/fetch/$s_!u1FC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png 1272w, https://substackcdn.com/image/fetch/$s_!u1FC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55ed1b6-87b3-4af4-aa3e-b8a2e7b37afb_986x752.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">&#169; Richard Stiennon</figcaption></figure></div><p>The vast majority of these companies are targeting the same role within their ideal customers: <strong>the Chief Information Security Officer, or CISO</strong>. For them, this abundance doesn&#8217;t mean choice but noise. .</p><p>Meanwhile, CISOs themselves operate under intense pressure: limited bandwidth, career risk, burnout, and the enormous cost of switching solutions if they make the wrong call.</p><p>This is the first of a series of articles that will explore how CISOs are navigating this challenge, how they evaluate and approach vendors, who they trust, and what mistakes can kill relationships.</p><div><hr></div><p>We are launching <strong><a href="https://scalingcyber.substack.com">Scaling Cyber</a></strong>! The podcast where cybersecurity founders and leaders from all over the world share their journeys of growth, challenges, and global expansion. <strong><a href="https://scalingcyber.substack.com">Subscribe now!</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://scalingcyber.substack.com" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VDne!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!VDne!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!VDne!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!VDne!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VDne!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52109,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://scalingcyber.substack.com&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/175602478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VDne!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!VDne!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!VDne!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!VDne!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3ac1df2-d36a-4a62-97f1-77229c73928e_1584x396.heic 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><div><hr></div><h1>The CISO Buying Process: From Pain to Selection</h1><p>There&#8217;s not one way that CISOs buy. Talking with them, listening to their podcasts, or reading their LinkedIn or X posts shows that there are different approaches they take.</p><p>What is clear, though, is that they don&#8217;t <em>&#8220;shop&#8221;</em> like consumers nor do they evaluate vendors in the same way other enterprise buyers do. At least not entirely.</p><p>CISOs have a horizontal responsibility across their organization, needing to support the business, while also protecting it, even though they know they will never be able to prevent 100 % of threats. Pavi Ramamurthy, Global CISO and CIO at BlackHawk Network, <a href="https://cisoseries.com/time-to-choose-a-security-vendor-dart-board-or-spin-the-wheel/#:~:text=It%20seems%20like%20we've,from%20the%20people%20selling%20solutions?">put it in a simple yet very interesting way</a> when describing their job: <em>&#8220;I can&#8217;t promise safe, but I can promise ready.&#8221;</em></p><p>When choosing solutions, there are two very important dimensions they consider: <strong>what pain or problem they need to solve and when they can solve it. </strong>The third, obviously, is <em>the budget</em>.</p><p>Unless they are in the middle of a crisis or recently faced one, CISOs have a plan of what topics they will be addressing and in which priority. Resources are always limited, even for those with the deepest pockets, so planning is key for them.</p><p>As one security leader put it, &#8220;<em>Most CISOs are looking six to twelve months out. If you&#8217;re pushing me to buy tomorrow, you&#8217;re out of sync with my world.</em>&#8220;.</p><p>CISOs begin with a <strong>problem definition or statement</strong>, not necessarily a vendor list. Due to business priorities, compliance, trends or to improve their overall security posture, they have a set of topics (<em>problems, pains, upgrades, improvements, etc</em>) to address.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xny1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xny1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic 424w, https://substackcdn.com/image/fetch/$s_!Xny1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic 848w, https://substackcdn.com/image/fetch/$s_!Xny1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic 1272w, https://substackcdn.com/image/fetch/$s_!Xny1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xny1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic" width="1456" height="1039" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1039,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:50498,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/175602478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Xny1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic 424w, https://substackcdn.com/image/fetch/$s_!Xny1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic 848w, https://substackcdn.com/image/fetch/$s_!Xny1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic 1272w, https://substackcdn.com/image/fetch/$s_!Xny1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ba0870c-26e9-4ed0-a76d-3f23f7968377_1536x1096.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br><br>Going through that list, they consult with their trusted network (peers, suppliers) and conduct a <strong>&#8220;safe&#8221; exploration</strong> of the potential solutions, through articles, research, videos and reviews. Some of them, they talk with their current vendors to see if they have another solution for this new problem.</p><p>Only after that initial review, they have a <strong>shortlist</strong> of potential solutions to their problem, sometimes including the option to build it internally instead of using a third party vendor. CISOs are not the ones putting together that initial selection, at least not exclusively; they lean heavily on their teams for that.</p><p>Up to this point, with the exception of conversations they might have had with an existing vendor of theirs to see if they have a solution for this new problem, they most likely have not even talked with any other cybersecurity provider.</p><p>Once they conduct an <strong>internal assessment</strong> on risks, integration needs and the overall complexity of the potential solutions, they get to the moment to <strong>decide&#8230;</strong> and sometimes that decision might be to do nothing and accept the current problem as a known risk or maintain what they already have to address it, even if partially.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Who CISOs Really Listen To</h1><p>The path to the CISO is through their trusted network, which is formed by peers, their team, the VARs/Integrators they work regularly with, and the events and conferences they attend. In some cases, that network also includes industry analysts.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tD3t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tD3t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!tD3t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!tD3t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!tD3t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tD3t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tD3t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!tD3t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!tD3t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!tD3t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf71c17b-e824-40d9-bc26-fb9d55c82854_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>What they usually don&#8217;t do is follow up on cold calls, emails or direct messages, and not necessarily because they don&#8217;t want to, but because they are regularly bombarded with them.</p><p><a href="https://www.linkedin.com/posts/rosshosman_sales-ciso-cybsersecurity-activity-7317924418737840128-DPvd/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAACfCL4Bw__WIziEny_pf5PuajwHEJW-sKc">Ross Hosman shared an informal survey</a> he ran among other CISOs recently, and 50 % of them receive at up to 5 unsolicited contacts per day, with 12 % of them getting more than 20.</p><p>Another thing they don&#8217;t want to do is click on <em>&#8220;Book a Demo&#8221;</em> buttons, unless the vendor has already been vetted by someone they trust. This is not because they are not curious, it is because <strong>they don&#8217;t want to end up trapped in another sales and marketing funnel from another vendor</strong>.</p><p>Mike Johnson, from Rivian, <a href="https://cisoseries.com/time-to-choose-a-security-vendor-dart-board-or-spin-the-wheel/#:~:text=It%20seems%20like%20we've,from%20the%20people%20selling%20solutions?">often says that what CISOs want is to feel &#8220;safe&#8221; when evaluating new vendors</a>. They want to do things at their own pace, in their own way, without being forced into what the vendor sales process dictates.</p><p>That&#8217;s why many CISOs would start asking their peers before anything else. The majority of CISOs are part of some close community (<em>often a Signal group or Slack channel</em>) where they ask questions about how others are solving problems and what vendors are using for that.</p><p>Their usual VARs and Integrators are also a source, sometimes even more important than their peers. As Edward Contreras pointed out in a recent <strong><a href="https://cisoseries.com/how-do-security-vendors-stand-out/">Defense In Depth episode</a></strong>, his trusted VARs &#8220;<em>have been with me for a while. They&#8217;ve been in the trenches. They&#8217;ve seen some failures. They&#8217;ve seen some successes.</em>&#8221;</p><p>What many vendors and service providers often forget is that the CISO isn&#8217;t the only person to talk to, and moreover, sometimes it is not even the right one. <strong>More than one CISO recommends speaking to their team first</strong>, as their opinion will matter to them.</p><p>They will most probably be the real users of the solution, and they are the ones that will need to see, first-hand, if it is the appropriate one to solve the problem at hand. That&#8217;s why CISOs are looking for their feedback. <em>&#8220;Don&#8217;t talk to the CISOs, talk to the leaders within the security org, talk to the principal engineers. Those are the folks who are making the recommendations.&#8221;</em>, <a href="https://cisoseries.com/new-study-finds-no-email-has-ever-found-you-well/">said Mike Johnson</a> about this topic.</p><p><strong>What happens with events and conferences?</strong> CISOs definitely continue to attend, as well as their teams, but that doesn&#8217;t mean they are going to listen to everything that is being shown to them there.</p><p>The reality is that many CISOs see the value to attend not in how much the vendor is spending in the booth, but in what is happening outside or around the event, where they can gather with their community, spend time together and learn from peers and from those they trust, as <a href="https://cisoseries.com/the-value-of-rsa-black-hat-and-mega-cyber-tradeshows/">Geoff Belknap, CISO of LinkedIn, pointed out,</a> echoing the opinion of many others in the industry.</p><p>Lastly, there are industry analysts, like Gartner, Forrester and others. While many CISOs would not recognize it publicly, the reality is that these analysts have an influence in their decision making, especially for those that are their paying customers.</p><p>No CISO (<em>maybe some)</em> will choose a solution just because an analyst put it at the top of the report, but many would include that &#8220;market leader&#8221; in their shortlist.</p><p>For instance, two cybersecurity companies that I consulted noticed how being mentioned directly in Gartner reports - or even that their sector was mentioned as a priority - increased the number of CISOs that started to be interested in taking their invitations to events or meetings.</p><p>Lastly, their existing vendors, directly or indirectly, also are an influence. CISOs might look into their existing stack to see if a company they already work with has a solution for this new issue they are trying to address.</p><p><em>&#8220;I don&#8217;t want to go through the complexity of acquiring a new product. More screens, great complexity, greater total cost of ownership is an issue that I want to manage. So, if I go to my vendor and say, what can you do? They often have purchased a product.&#8221;</em>, said Jason Taule, CISO of Luminis Health in a <a href="https://cisoseries.com/how-do-security-vendors-stand-out/">recent Defense in Depth podcast</a>.</p><h1>The Budget</h1><p>Even left to the last part of this article, the budget has a strong impact on how CISOs choose solutions.</p><p>First and foremost, <strong>CISOs have already allocated a budget for their projects in advance</strong>, and internal rules can be very strict about their ability to spend it on people and/or tools. If they don&#8217;t have a reserve for <em>&#8220;innovation&#8221;</em> or <em>&#8220;research&#8221;</em>, the money is already in a particular budget line.</p><p>However, the budget they have allocated - and the potential price of the solution - can give these security leaders some room to navigate the selection process with more or less formality.</p><p>For instance, many organizations request formal tenders only when the price will be above a certain value - anything below can be decided alone by the budget owner.</p><p>If the price of the solution demands RFPs and involvement of a buying committee, the process can become long and cumbersome, and CISOs might choose to go with a &#8220;safer&#8221; bet (a.k.a. an established or existing vendor) to avoid the hazard of justifying the purchase of some unknown product to the CFO or others.</p><p>Moreover, in many cases, the CISO is not the sole decision maker when it comes to its budget, as some parts of it can be held by other functions in the organization, like IT, HR, Compliance, etc. This complexity can deeply affect the way they choose solutions.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>The Value of Trust</h1><p>In a world where every vendor promises to be the &#8220;best,&#8221; CISOs rely on something far rarer: trust.</p><p><strong>Their buying journey isn&#8217;t a funnel; it&#8217;s an ecosystem</strong>. Peers, teams, VARs, analysts, and events all act as filters that shape which solutions even get a chance to be considered. The decision itself is slow, deliberate, and can end with &#8220;not now.&#8221;</p><p>The vendors that make it through aren&#8217;t always necessarily the loudest. They&#8217;re the ones that meet the CISO where they are: aligned with their priorities, respectful of their time, and capable of proving value without pressure.</p><p>In short, CISOs don&#8217;t buy features; they buy confidence. And as with a strong security posture, that&#8217;s something that takes time to build.</p><div><hr></div><p>In the next part of this series, we will look at how CISOs view vendors, from startups to established ones, and what it takes for a newcomer to earn their trust.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!51Iy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!51Iy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!51Iy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!51Iy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!51Iy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54767,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/175602478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!51Iy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!51Iy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!51Iy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!51Iy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F686e47bf-a727-4a2f-ae25-26f45e9b65ba_1584x396.heic 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Reality of CTI: Voices from the Analysts]]></title><description><![CDATA[How CTI Analysts See Their Role, Challenges, and Future]]></description><link>https://cybersecandbiz.substack.com/p/the-reality-of-cti-voices-from-the</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/the-reality-of-cti-voices-from-the</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Tue, 30 Sep 2025 09:29:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2935cb39-3a88-4e7d-b882-ae370d809f04_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Cyber Threat Intelligence (CTI) has always carried a certain mystique. Analysts explore telegram channels and dark web forums, vendors portray it as the key to proactive defense, reports are created with polished charts and detailed IOCs, and surveys highlight growing adoption rates and trends.</p><p>On paper, CTI seems like a discipline that is steadily professionalizing. <strong>But speak with practitioners on the ground, and the picture is different.</strong> Quite different indeed.</p><p>The day-to-day work of CTI is more fragile, more improvised, and more dependent on context than smooth reports suggest. As one analyst told me bluntly: <em>&#8220;Tactical CTI is the most useful for SOCs, but it&#8217;s the most avoided. Organizations rely on recycled rules from public sources or improvise without risk-based prioritization.&#8221;</em></p><p>Through this article we are going to explore the opinions and views from 10 analysts across Europe, North America and Latin America, contrasting it with what surveys and frameworks say about where CTI stands in 2025. As with the <strong><a href="https://cybersecandbiz.substack.com/p/ai-in-threat-hunting-in-the-soc">previous piece about AI &amp; Threat Hunting</a></strong>, the difference is striking.</p><div><hr></div><p>This edition of <strong>Cybersecurity &amp; Business </strong>is supported by<strong>:</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://letsdata.net?utm_source=substack" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sg5k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!sg5k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!sg5k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!sg5k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sg5k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:65239,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://letsdata.net?utm_source=substack&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/174911404?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sg5k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!sg5k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!sg5k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!sg5k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70dad877-35f8-4434-bb0d-8fb59fca0d15_1584x396.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://tandemtrace.ai/?utm_source=substack" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!znfK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!znfK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!znfK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!znfK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!znfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:58138,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://tandemtrace.ai/?utm_source=substack&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/174911404?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!znfK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!znfK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!znfK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!znfK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F020affad-eff5-4c89-bc8d-b1a14c127e47_1584x396.heic 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><div><hr></div><h1>CTI on Paper: A Maturing Discipline</h1><p>The <strong><a href="https://www.sans.org/white-papers/2025-cti-survey-webcast-forum-navigating-uncertainty-todays-threat-landscape">regular CTI survey conducted by SANS</a></strong> is one of the main sources to have a quantitative view of what is happening in this field.</p><p>According to data from their latest edition (2025), <strong>93 % of organizations are now maintaining some form of in-house CTI capability</strong>, and more than a half of them (52 %) have dedicated CTI teams, up ten points from 2018. However, <strong>teams remain small</strong>: 62 % have fewer than four full-time CTI analysts.</p><p>Based on the survey, the dominant use case for CTI is <strong>Threat Hunting</strong>, with 77 % of respondents citing it, while MITRE ATT&amp;CK has become the shared language of the field (86 % adoption).</p><p>As everywhere else, <strong>AI adoption is growing</strong>: more than one-third of teams are already using it to enrich and score intelligence.</p><p>There are <strong>multiple challenges</strong> referenced by the respondents. 62 % mention lack of funding, as an obstacle to provide more value through CTI. Integration, automation and skill gaps remain top blockers.</p><p>Once you go through the survey, CTI feels like a field gradually moving from artisanal to a more professional stage. Formal processes, reporting structures seem to be more common, and maturity frameworks such as <strong><a href="https://cti-cmm.org/">CTI-CMM</a></strong> and initiatives like the <strong><a href="https://www.first.org/global/sigs/cti/">FIRST CTI SIG</a></strong> are, theoretically, gaining traction.</p><p>However, while the SANS CTI survey is probably one of the few global of its kind, <strong>the demographics are heavily skewed toward US-based respondents</strong>, and when we turn to the voices of analysts in other parts of the world, as I did through my interviews, the overall state of CTI feels less polished, despite the depth of knowledge.</p><h1>CTI in Practice: The View from Analysts</h1><h2>Role Diversity in CTI</h2><p>One common theme across the interviews is how <strong>rarely CTI is practiced exclusively</strong>. Only a minority of analysts work only in CTI, with most wearing multiple hats.</p><p>Just 2 of the 10 consulted analysts are fully dedicated to CTI, with the rest combining it with other functions, like <em>Threat Hunting, DRPS, engineering, incident response, automation and external comms</em>.</p><blockquote><p><em>&#8220;I am fortunate to work in a highly-focused Cyber Threat Intelligence (CTI) team&#8230;&#8221;</em>, said one of the interviewees, highlighting how uncommon this can be.</p></blockquote><p>Across all conversations, CTI seems to be <strong>a starting point to achieve something somewhere else</strong>, internally or externally. For instance, it was not unusual to hear how the work of the analysts could span across multiple other functions depending on the type of company they work for.</p><p>An analyst working at a major cybersecurity vendor needs to do malware research, identify TTPs, improve automation pipelines, to not only improve detections and the product itself, but also to support marketing, PR and sales.</p><p>Another one, working on a service provider, dedicates part of his time to CTI, but also participates actively in incident response and in managing and improving internal processes.</p><p><strong>This diversity illustrates CTI&#8217;s hybrid identity</strong>. Rather than its own thing, it often acts as a connective tissue between prevention, detection, response, product development, executive decision-making, and even corporate communications.</p><h2>Measuring Value: More Art than Science</h2><p><em>&#8220;What is the impact of CTI and how it is measured?&#8221;</em> was one of the questions asked to the professionals I interviewed.</p><p>The SANS survey respondents said they <strong>mostly measure effectiveness through feedback meetings or indirect metrics</strong>. The interviews I conducted echoed this, but with very different flavors.</p><p>The answers show different types of metrics, formal and informal, that go <strong>from outcome-based impact and process maturity to subjective feedback</strong>.</p><p>One of the analysts working in a cybersecurity vendor had a <strong>product-driven angle</strong>: <em>&#8220;The real test is how findings are used. If they lead to earlier detections, stronger defenses, or features that make our product more valuable, then I know the work is having an impact.&#8221;</em></p><p>The other respondents working in vendors and service providers had similar comments. One of them highlighted the metric is anchored in how CTI helps MDR or DFIR teams, even though it is not something they quantify in a specific performance indicator.</p><p>On the other side, a professional working for a service provider mentioned that the success often comes down to <em>&#8220;the valuation of supervisors or clients&#8221;,</em> while another analyst mentioned <em>&#8220;cross-team feedback&#8221;.</em></p><p><strong>CTI can be part of so many processes</strong> depending on the organization where they sit, so as another one of the respondents pointed out, the metrics can be various, like <em>hunts initiated, credentials reset, domain takedowns, vulnerabilities remediated</em>, and more.</p><p>Even PR or marketing results were mentioned as indicators, as some of the analysts are part of companies that are basing their value proposition and differentiation on the threat landscape knowledge of their teams.</p><p>Together, their answers show <strong>a field where measurement is still improvised</strong>, even if some of the maturity frameworks were mentioned. Some CTI teams are indeed tracking hard outcomes, but others are more focused on subjective measures that can span from client feedback to a company&#8217;s reputation and positioning.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Daily Struggles</h2><p>Analysts across the board complain about data volume, tool limitations, and stakeholder alignment. But one of them is warning us of something more subtle: <strong>the erosion of human critical thinking.</strong></p><blockquote><p><em>&#8220;The greatest challenge is the bias that creeps into teams when technologies like GenAI advance. Doubt and validation are being exercised less. Doubt is a skill we must maintain, otherwise we risk outsourcing responsibility to the tools.&#8221;, </em>said <strong>Ruben Lencina</strong>, Threat Intelligence Leader at <strong><a href="https://base4sec.com/en/">Base4 Security</a></strong>.</p></blockquote><p>The increasing usage of AI in CTI is leaving less space to analysts to apply critical thinking, he emphasised, as the output of the tools is not second-guessed as much as it should.</p><p>This gets worse, he pointed out, when we take into account resource shortages. Insufficient staff to adapt CTI into automated processes slows adoption and leaves service providers less agile to respond to attacks and to their competitors.</p><p>Other challenges are more familiar. As another analyst described, there is a difficult and delicate balance in filtering vast data streams without missing the critical bits. Also, there were <strong>common concerns about how tactical CTI is systematically neglected</strong>, either replaced by generic recycled rules or improvised without risk studies.</p><p>Stakeholder engagement and expectation management were brought up by several respondents.</p><blockquote><p><em>&#8220;If you just ask, &#8216;What are your PIRs?&#8217; you&#8217;ll get vague answers. You need to ask what they do daily, what they protect, what they&#8217;re afraid of.&#8221;</em></p></blockquote><p>Stakeholders sometimes think frameworks like ATT&amp;CK map neatly onto all threat activity, when underground forums, where many analysts spend their time, don&#8217;t provide that kind of structured intel. <em>&#8220;CTI is often misunderstood&#8221;</em>, one of them noted, and analysts need to face that misinterpretation as much as they need to battle threats.</p><p>That&#8217;s not all. There are more challenges that were brought up during the interviews. For instance, the<strong>fundamentals gap</strong>.</p><p><em>&#8220;Everybody tries to have the &#8216;next super-AI solution,&#8217; but they don&#8217;t have good firewalls, network segmentation, password management, or a comprehensive SOC.&#8221;</em> For this analyst, the challenge isn&#8217;t only volume or expectations but that too many organizations neglect basic security hygiene while chasing hype.</p><p>Prioritization was mentioned by other respondents, but at a different level: <em>&#8220;Threat actors use a huge number of TTPs, and it&#8217;s critical to identify which ones actually represent a risk for our customers.&#8221;</em></p><p>As it was pointed out by one of the interviewees, the problem might not be having too much data, but <strong>figuring out which behaviors deserve the most attention and how to translate findings into actionable detections and clear business value</strong>.</p><h2>What Opportunities are Ahead?</h2><p>Despite frustrations, every analyst pointed to areas where CTI could deliver more value. There are plenty of views regarding what lies ahead.</p><p>For some, especially MSSP practitioners, the answer is <strong>prevention and early detection</strong>. <em>&#8220;As MSSPs, we try to know adversaries and their TTPs so that if a client hasn&#8217;t implemented all defenses, we can still detect and mitigate quickly.&#8221;</em></p><p>When it comes to corporate CTI teams, <strong>the blind spot is internal intelligence</strong>. External feeds are plentiful, but too many organizations neglect their own SIEM logs or phishing data. Combining internal telemetry with external sources creates the most relevant threat picture.</p><p>An analyst working for a cybersecurity vendor highlighted that the opportunity is exposing actors earlier and prioritizing threats based on who is active and what they are doing. But he also stresses democratization: <em>&#8220;We need automation and scale, but also to make CTI available to more teams for less money.&#8221;</em></p><p>The involvement of the executive layer of the organization was also mentioned as a key opportunity: <em>&#8220;CTI is key for executive decision-making that improves the organization&#8217;s security posture.&#8221;</em></p><p>As expected, technology itself was mentioned several times and in different flavors, like how it can support automation, deeper analysis and integration (<em>where intelligence can accelerate efficiency and resilience</em>), and not only in IT, but also with legacy and industrial environments.</p><blockquote><p><em>&#8220;Enterprise and industrial sectors need dedicated, trained professionals, combining blue teams with CTI analysts. There is so much to do with security solutions from ten years ago that were not applied and understood. We don&#8217;t need the AI revolution; we need people that understand security.&#8221;</em></p></blockquote><p>The common thread, among many answers, is <strong>proactivity</strong>: CTI has its biggest impact when it reduces analyst workload, prioritizes what matters, informs executive choices, secures overlooked or obscure systems, and even strengthens a company&#8217;s business positioning.</p><h2>The Various Voices of AI</h2><p>No topic splits the field like AI.</p><p>The SANS survey notes that <strong>AI is already being used for enrichment and scoring</strong>, but adoption is uneven and many applications remain underexplored.</p><p>Our interviewees agree in general that AI will be transformative, but they describe it in far more human terms.</p><p>There are some that see it very positively. <em>&#8220;AI will be key to faster detection and anticipation&#8221;</em>, is a clear expectation from many of the analysts, with clustering behaviour and automating analysis as areas where AI is seen with good eyes by the respondents.</p><p>Another area that was mentioned with enthusiasm was <strong>predictive intelligence</strong>. Moving from <em>&#8220;what happened&#8221;</em>to <em>&#8220;what might happen&#8221;</em> as one of the interviewees put it. Some models can already anticipate attacker TTPs before they are deployed, and this is a very positive application of AI for CTI analysts overall.</p><p>However, <strong>not everybody shares the same enthusiasm</strong> and expectations. <em>&#8220;AI, in its current state, cannot replace human initiative&#8221;</em>, is the opinion of one of the analysts that is echoed across other answers, in one way or the other<em>. &#8220;We don&#8217;t need the AI revolution; we need people that understand security&#8221;</em>, adds another.</p><p>The bottom line, as it happens with AI in many sectors, is that while it might help with some processes and make the CTI function stronger overall, there are still <strong>concerns about how much it can really do</strong>, and the risks it might bring, from false positives and negatives, to over-confidence in its outcomes.</p><p>And of course, <strong>AI will also help the attacker</strong>, as one of the analysts pointed out, especially <strong>accelerating hybrid operations</strong>, where cyberattacks combine disinformation, deepfakes, and media manipulation.</p><p>There&#8217;s clearly not a common view on the topic, as we can see from very different views across everyone that was consulted. The only thing that is shared by the majority is that the adoption of AI is growing and it will be transformative, one way or another.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Where CTI Goes Next</h1><p>Between survey charts, maturity models, and analyst voices, some clear opportunities emerge.</p><ol><li><p><strong>Professionalization and Structure</strong><br>Frameworks such as CTI-CMM, the FIRST CTI SIG, and the Mandiant Competencies Model give CTI programs a way to mature. One respondent suggested CTI will eventually resemble <em>&#8220;classic intelligence services&#8221;,</em> only in digital form.</p></li><li><p><strong>Integration of Internal and External Intelligence</strong><br>It was stressed that the overreliance on external feeds needs to be corrected. Combining internal telemetry with vendor and community-driven intel is a chance to make CTI truly contextual.</p></li><li><p><strong>Automation and AI</strong><br>From enrichment to predictive analysis, automation is no longer optional. But as many warned, <strong>automation must be balanced with human oversight and critical thinking</strong>, and it should not distract from fundamentals. There is, though, a clear need for automation pipelines and TIPs to handle massive telemetry and OSINT, where AI can be key.</p></li><li><p><strong>Geopolitics and Hybrid Operations</strong><br>The SANS survey shows growing pressure from geopolitical and regulatory shifts. Analysts see the same. Russia-Ukraine and Israel-Iran conflicts were cited as shaping CTI priorities, while <strong>disinformation was pointed as a persistent reputational threat</strong>.</p></li><li><p><strong>Prevention, Early Detection, and Industrial Resilience</strong><br>CTI&#8217;s greatest value remains in stopping attacks early. Whether through actor exposure, TTP tracking, or internal hunting, the role of CTI is clearest when it prevents or shortens an incident. One perspective reminds us that industrial and legacy environments <em>(often still running on end-of-life systems)</em> stand to gain immensely from CTI paired with blue-team fundamentals.</p></li></ol><p>If there is something that is shared across survey results, frameworks and the voices of the analysts is that CTI, both as a function but also the tools they use, <strong>still has space to evolve and become a key part of the security strategy of any organization</strong>.</p><p>When it comes to the tools, they clearly need to evolve as well. Some vendors, like <strong><a href="https://www.eclecticiq.com/">EclecticIQ</a></strong> are taking the hint and working on initiatives that integrate CTI and SOC platforms.</p><p><strong>Even more, we can see how specialized platforms are appearing to address the very trends that the consulted analysts mentioned</strong>, like predictive intelligence, disinformation and hybrid operations. <strong><a href="https://bfore.ai/">BforeAI</a> </strong>and <strong><a href="https://letsdata.net/">LetsData</a></strong> are clear examples of companies working in that space.</p><p>These and other evolving tools can help analysts to filter the noise, communicate relevance, and deliver insights and outcomes that prevent damage.</p><p>In any case, the voice of the analysts is clear: <strong>more professional approach to CTI is needed</strong>, and the human experience and knowledge, as well as critical thinking, are what matter the most, in their opinion.</p><p>As one of them put it:</p><blockquote><p><em>&#8220;Professional analysts: don&#8217;t trust the source. Trust yourself and your analysis.&#8221;</em></p></blockquote><p>That, beyond any survey result or vendor promise, is what CTI truly comes down to: not frameworks or feeds, but <strong>the ability to question, interpret, and act.</strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GofG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!GofG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!GofG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!GofG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GofG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54767,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/174911404?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GofG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!GofG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!GofG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!GofG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42042f75-9c95-48b1-9c98-b644002401fe_1584x396.heic 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Solve First, Shout Later]]></title><description><![CDATA[Why cybersecurity vendors don&#8217;t win with bold claims, and what they should do instead]]></description><link>https://cybersecandbiz.substack.com/p/solve-first-shout-later</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/solve-first-shout-later</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Mon, 08 Sep 2025 10:09:33 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/982236f8-9c4b-4e81-9a9b-ca8fff30063b_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the early days of <strong>ESET</strong>, we didn&#8217;t win because of a bold vision or a polished marketing message.</p><p>We won because of two things that mattered deeply to the people we were trying to reach: <strong>small update sizes</strong> and <strong>low system resource consumption</strong>. That was it.</p><p>Our updates didn&#8217;t bring already slow connections to a halt. Our software didn&#8217;t bring underpowered computers to a crawl. These things may sound minor today, but back then, for many users and resellers, they were real, immediate problems. And we solved them. <strong>Better than others.</strong></p><p>That&#8217;s what got us in the door. And to become later the largest endpoint security vendor by revenue from the European Union.</p><div><hr></div><p>This edition of <strong>Cybersecurity &amp; Business </strong>is sponsored by<strong>:</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://tandemtrace.ai/?utm_source=substack&amp;utm_campaign=cybandsec" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GM76!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!GM76!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!GM76!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!GM76!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GM76!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59843,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://tandemtrace.ai/?utm_source=substack&amp;utm_campaign=cybandsec&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/173010384?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GM76!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!GM76!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!GM76!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!GM76!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6109897b-55c0-4627-a970-2b722c3767fb_1584x396.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h1>The problem with bold statements</h1><p>Cybersecurity vendors &#8212; especially startups and scaleups &#8212; often <a href="https://huntsmansecurity.com/blog/cyber-security-quotes-from-sales-and-marketing/?utm_source=chatgpt.com">feel pressure to say something bold</a>. Something visionary. Something that makes them sound like leaders.</p><p>But bold statements alone don&#8217;t win deals. Especially not in the beginning when nobody knows you.</p><p>There&#8217;s already too much noise in cybersecurity. Too many companies saying the same things, in the same way, with the same vague promises. <em>"Next-generation protection."</em>,<em>"AI-powered prevention."</em>,<em>"Unified, proactive defense".</em></p><p>Statements like these aren&#8217;t wrong. They&#8217;re just <strong>not enough</strong> to cut through the noise.</p><p>They don&#8217;t tell the buyer what problem is actually being solved, or why this or that vendor is the one to solve it. They sound good in a pitch deck, but fall flat <strong>in front of a buyer who has already seen 15 other vendors say the same thing</strong>.</p><h1>What buyers are actually looking for</h1><p>Here&#8217;s what often gets overlooked: most buyers don&#8217;t have the time, interest, or ability to test every product. They default to one of three things:</p><ol><li><p><strong>What they already use</strong></p></li><li><p><strong>What their trusted network recommends</strong></p></li><li><p><strong>What&#8217;s available from their existing service providers or distributors</strong></p></li></ol><p>For a new vendor to break through, you need to give them a <strong>very specific reason</strong> to consider you. That reason must connect directly to a problem they care about, ideally one that others don&#8217;t address well, or don&#8217;t communicate clearly.</p><h1>Where that insight comes from</h1><p>You won&#8217;t find that message sitting in a conference room with your team.</p><p>You find it by getting outside and talking with end users, service providers, distributors, MSSPs. Attending events and conferences. <strong>Understanding what their actual pain points are</strong>, not just the ones you imagined when building your technology and your product.</p><p>At ESET back in the day, we spent a lot of time doing just that. The insights that helped us grow didn&#8217;t come from strategy slides: they came from regularly testing the competition, from our support tickets, events, channel conversations, and feedback loops we created with our early partners and users.</p><p>That&#8217;s how we learned what really mattered.</p><h1>From tech, to product, to solution</h1><p>Many startups begin with a piece of technology. Something novel, interesting, or genuinely clever and they tend to think that is what will make them win.</p><p>But technology alone doesn&#8217;t win.</p><p>You have to turn that technology into a <strong>product</strong>:  something that people can actually use, deploy, and rely on. </p><p>Then you have to go a step further and turn that product into a <strong>solution</strong>:  something that solves a specific, recognized pain in someone&#8217;s workflow or infrastructure.</p><p>That last step doesn&#8217;t happen unless you deeply understand the user&#8217;s world. Which means talking to them, a lot. </p><blockquote><p>When you are able to articulate how your product can solve that specific pain or problem in a way that end users feel and understand, that is when you really have a chance to win.</p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>What you should (and shouldn&#8217;t) do</h1><p>Here&#8217;s what I&#8217;ve seen work for vendors who break through:</p><h2><strong>What to do</strong></h2><ul><li><p>Spend time outside the company, with users, implementers, and channel partners</p></li><li><p>Listen for the small but persistent pain points</p></li><li><p>Watch for the patterns behind unexpected wins</p></li><li><p>Build messaging around what you remove &#8212; friction, complexity, noise &#8212; not just what you add</p></li></ul><h2><strong>What not to do</strong></h2><ul><li><p>Assume your "key innovation" is what customers care about most</p></li><li><p>Rely only on feedback from CISOs or top-level execs, instead of listening also to the implementers and users</p></li><li><p>Over-rotate on vision and category creation before you&#8217;ve won a base</p></li><li><p>Copy messaging from the market leaders and hope to sound credible</p></li></ul><h1>What we would&#8217;ve missed</h1><p>If we had only talked about <em>&#8220;advanced heuristics&#8221;</em> at ESET, we wouldn&#8217;t have become the largest European cybersecurity vendor by revenue.</p><p>The way we implemented heuristics was important, a true innovation &#8212; no question. But that wasn&#8217;t the reason people became our fans and chose us in the beginning, no matter how in love we were of our technology.</p><p><strong>The reason was simpler.</strong> Updates were smaller. Systems ran faster. Partners didn&#8217;t get as many complaints.</p><p>Back in those days, IT administrators needed to update their endpoint security solutions at night to avoid their internal networks to overload, and users saw how their computers were suddenly running very slow when the antivirus was updating or performing a scan. </p><p>That&#8217;s what we solved. That&#8217;s what got us traction. The rest came later.</p><div class="pullquote"><p><strong>Another example:</strong> In the early days of <strong>Crowdstrike</strong>, what the customers were caring the most about was their <strong>Overwatch</strong> service. That is what was resonating the most with many of them.</p></div><h1>Solve first. Shout later.</h1><p>The security market doesn&#8217;t need more bold yet generic statements. It needs vendors that remove friction, solve real problems, and explain those things clearly.</p><p>If you&#8217;re a cybersecurity startup or scaleup trying to grow don&#8217;t focus on saying you are bold. Focus on being <strong>useful</strong>. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gHgz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!gHgz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!gHgz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!gHgz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gHgz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:56853,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/173010384?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gHgz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!gHgz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!gHgz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!gHgz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b223582-002a-4790-9a85-4925fe8b87cf_1584x396.heic 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Why the Email Security Battle Feels Lost (At Least for Now)]]></title><description><![CDATA[Despite better tools and growing awareness, phishing and impersonation attacks remain rampant.]]></description><link>https://cybersecandbiz.substack.com/p/why-the-email-security-battle-feels</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/why-the-email-security-battle-feels</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Mon, 18 Aug 2025 22:22:12 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/65737bce-964d-4e6e-9523-0fee6f02ed3e_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>91% of all cyberattacks start with email.</strong> And yet, for all the industry buzzwords, protocols, and vendors promising a more secure future, the inbox remains the weakest link.</p><p>The cause for this isn&#8217;t lack of innovation. It is fragmentation, cost, complexity and missed opportunities.</p><p>Many of the building blocks for a stronger email security posture are there. It&#8217;s just too complex and costly to transform them into a wall.</p><h1>Email Is Still the Frontline And It&#8217;s Not Going Well</h1><p>You&#8217;d think that by now, we&#8217;d have this under control. Email is one of the oldest technologies in our digital lives. And yet, it&#8217;s still where most attacks begin.</p><p>According to a <a href="https://sendmarc.com/resources/guides-and-reports/cyberthreat-report-2024/">Sendmarc Report</a>, 91% of all cybercrimes start with email, and based on information from the <a href="https://www.ic3.gov/AnnualReport/Reports/2023_IC3Report.pdf">FBI IC3 Report</a>, the losses from Business Email Compromise (BEC), just in the United States, are in the billions of dollars.</p><p>There are multiple cybersecurity vendors offering Email Security solutions that are still not able to cover all the bases, and standards that could help to improve the situation (like DMARC or BIMI) are still not widely adopted.</p><p>This is not something that affects only large companies, like the case where <a href="https://www.justice.gov/usao-sdny/pr/lithuanian-man-pleads-guilty-wire-fraud-theft-over-100-million-fraudulent-business">a Lithuanian man tricked Google and Facebook</a> into wiring him <strong>over $100 million</strong> using fake invoices and lookalike domains. <strong>It affects also smaller businesses.</strong></p><p>The following are just a few examples:</p><ul><li><p>In 2023, <strong>a Florida manufacturing firm lost $420,000</strong> to an impersonation email claiming to be a known supplier. The attacker had registered a similar domain and altered just one letter (<a href="https://www.cnbc.com/2023/05/15/business-email-compromise-is-costing-companies-millions-heres-how-to-stop-it.html">CNBC</a>).</p></li><li><p>A South African property company was hit with a <strong>$250,000 loss</strong> after hackers intercepted emails and modified banking details in a PDF invoice (<a href="https://mybroadband.co.za/news/security/442499-email-hack-costs-business-r4-2-million.html">MyBroadband</a>).</p></li></ul><p>None of the above are edge cases neither they were caused by a failed firewall or endpoint security. The same is happening to many organizations around the world, and just because someone believed an email.</p><h1>Why the Ecosystem Keeps Failing</h1><p>Email Security is a decades-old challenge. There have been many attempts to improve it, even though none have done it yet.</p><p>It&#8217;s not for lack of standards, as we have many to choose from. For example:</p><ul><li><p><strong>SPF, DKIM, and DMARC</strong> (<em>yet only 19.6% of DMARC-enabled domains have a </em>p=reject <em>policy); </em></p></li><li><p><strong>BIMI</strong><em>, which depends on DMARC and a <strong>Verified Mark Certificate</strong> </em>(which requires a registered trademark and can cost more than a thousand dollars a year)<em>, and</em></p></li><li><p><strong>Verified Sender</strong><em> </em>from<em> Microsoft </em>(which works only inside their own ecosystem and doesn&#8217;t support BIMI).</p></li></ul><p><strong>BIMI</strong> sounded like a promising solution to - <em>at least part of</em> - the challenges, but it is still not universally supported across email providers and clients, and the necessary certificates are expensive and slow to obtain.</p><p>On top of that, <strong>Microsoft</strong> came and decided to implement their own approach through <em>Verified Sender</em> that is also complex and not compatible with many other email providers and clients.</p><p>Moreover, <strong>lookalike domains can still bypass all of this</strong>, as it has been proven by many successful breaches.</p><p>The battle feels lost because the email threat landscape isn&#8217;t getting better. On the contrary, it&#8217;s getting more complex, and it would require more tools than the above, like DNS security, which isn&#8217;t common outside large enterprises.</p><p>Attackers adapt faster than security vendors align. They register domains and set up phishing campaigns in minutes that many brand protection tools don&#8217;t see until it is too late.</p><p>The lack of a unified, affordable, plug-and-play solution that covers all the angles, especially for SMBs, is forcing the defenders to be stuck with multiple different solutions that don&#8217;t talk to each other and still fail to cover all the bases.</p><p>And users? <strong>They&#8217;re still clicking on anything with a logo or a friendly tone</strong>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Something is shifting. Slowly.</h1><p>However, there is, maybe, some light at the end of the tunnel. At least when it comes to DMARC.</p><p>Since Gmail and Yahoo started to enforce DMARC for bulk senders others have joined, like Microsoft and Cloudflare recently. Moreover, anti-phishing measures and specific DMARC implementation are now part of many other frameworks like HIPAA, NIST, etc.</p><p>Additionally, vendors like <strong><a href="https://sendmarc.com">Sendmarc</a></strong> are making its adoption accessible and affordable, automating the process and helping organizations to get to <strong>p=reject</strong> faster.</p><p>This growing pressure is helping to transform DMARC from a best practice into a baseline.</p><h2>A Modern Email Security Stack</h2><p>Nowadays, defending against malicious emails should be based on standards like DMARC - <em>which is growing in awareness and adoption</em> - and complement the standard endpoint and email security products with solutions to other common challenges, like early detection of lookalike domains.</p><blockquote><p><em>&#8220;According to BforeAI&#8217;s telemetry, threat actors register thousands of look-alike domains every single day &#8212; often within 24&#8211;48 hours of launching phishing infrastructure. Some campaigns are detected within minutes of domain creation, but by the time traditional security tools catch up, the damage is often already done.&#8221;</em><br><br>&#8212; <a href="https://bfore.ai/report/bec-in-the-financial-services-sector/">BforeAI Report</a></p></blockquote><p>This multi-layered approach would require, considering the tools available today, solutions that at least cover the following:</p><ul><li><p><strong>SPF, DKIM, and enforced DMARC</strong> to minimize email impersonation</p></li><li><p><strong>BIMI + Verified Mark Certificate</strong> and/or <strong>Microsoft Verified Sender</strong> for visual trust (<em>where supported</em>) and helping to mitigate, to some extent, spoofing attacks</p></li><li><p><strong>Brand protection</strong> (or <em>Digital Risks Protection</em>) to catch lookalike domains before they go live and to be aware of stolen credentials</p></li><li><p><strong>DNS Security</strong> (or <em>Protective DNS</em>) to prevent clicks on fake domains that are part of phishing campaigns not caught by the rest of the tools</p></li><li><p><strong>Takedown services</strong> to remove malicious infrastructure as soon as possible</p></li></ul><p>Sounds a bit complex&#8230; and it is. Especially considering that it is difficult to find one provider that can do it all within the budgets of any type of organization.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iRqr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iRqr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic 424w, https://substackcdn.com/image/fetch/$s_!iRqr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic 848w, https://substackcdn.com/image/fetch/$s_!iRqr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic 1272w, https://substackcdn.com/image/fetch/$s_!iRqr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iRqr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic" width="1456" height="1029" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1029,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:176255,&quot;alt&quot;:&quot;A Modern Email Security Stack architecture&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/171320416?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A Modern Email Security Stack architecture" title="A Modern Email Security Stack architecture" srcset="https://substackcdn.com/image/fetch/$s_!iRqr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic 424w, https://substackcdn.com/image/fetch/$s_!iRqr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic 848w, https://substackcdn.com/image/fetch/$s_!iRqr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic 1272w, https://substackcdn.com/image/fetch/$s_!iRqr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc4972a-74a3-468a-8344-05e77aed6897_2000x1414.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A Modern Email Security Stack architecture</figcaption></figure></div><p>You will probably need 3, 4 or more solutions just to cover the above, on top of the basic security tools you still need to have anyway (<em>Endpoint Security, Email Security, etc</em>).</p><p>This is due to the nature of current email-based attacks, which are combining not only phishing and social engineering tricks, but also other components like stolen credentials and web infrastructure.</p><h2>Don&#8217;t Forget the Basics: People &amp; Partners</h2><p>The above stack would still be fallible. There are still at least two more areas that are requiring attention: <em>the members of an organization and their external stakeholders.</em></p><p>While <strong>BIMI</strong> or <strong>Verified Sender</strong> features can help people to spot the difference between a real email message and a spoofed one, users need to be trained to recognise the difference.</p><p>Moreover, an organization today is connected to many others (suppliers, partners, vendors, customers, etc) that would also need to adopt standards to reduce the exposure. For instance, <strong>enforcing DMARC on suppliers would help to reduce the potential risks of employees receiving emails impersonating a business partner</strong>.</p><p>Any technology stack is as strong as the weakest link, and as the solutions above aren&#8217;t infallible or fast enough, additional measures would be necessary to increase the overall security of the organization.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>How Far We Are, and Where We Go</h2><p>The truth is, most businesses are far from implementing the above stack, and many email security providers are too busy adding other features (<em>like AI Agents</em>) that don&#8217;t necessarily cover the full chain of a typical email-based attack.</p><p>Some reasons:</p><ul><li><p>It&#8217;s still <strong>too fragmented</strong> and <strong>complex</strong></p></li><li><p>Some tools are <strong>cost-prohibitive for SMBs</strong></p></li><li><p><strong>Lack of client-side support</strong> (i.e., Outlook still doesn&#8217;t support BIMI)</p></li><li><p><strong>No unified platform</strong> offers everything end-to-end</p></li></ul><p>The opportunity? A service provider &#8212; or security vendor &#8212; bundles <strong>email security</strong>, <strong>standards support</strong>, <strong>DNS protection, takedown, logo verification</strong>, and <strong>brand monitoring</strong> into a single pane of glass. With pricing that doesn&#8217;t rival your cloud bill.</p><p>That is, in my opinion, the path forward. A convergence play of several existing yet not integrated solutions that finally treat email as the critical infrastructure it has always been.</p><blockquote><p>The battle isn&#8217;t being lost because the tools don&#8217;t exist. It&#8217;s lost because we haven&#8217;t made them usable, affordable, and unified. A holistic approach is missing.</p></blockquote><p>The moment we see email-based attacks as something that needs a combination of different approaches beyond the standard email security, we will be able to start fighting back and maybe even winning.</p><p><strong>Email is still the front line. It deserves better defenses.</strong></p><div><hr></div><p><strong>What do you think?</strong> Is this layered approach to email security realistic in your organization &#8212; or still out of reach for most?</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aukD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aukD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!aukD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!aukD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!aukD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aukD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:56853,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/171320416?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aukD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic 424w, https://substackcdn.com/image/fetch/$s_!aukD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic 848w, https://substackcdn.com/image/fetch/$s_!aukD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic 1272w, https://substackcdn.com/image/fetch/$s_!aukD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1c76fd9-e9e7-45ec-a523-870ba7715a02_1584x396.heic 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[What Cybersecurity Vendors Get Wrong About Distribution]]></title><description><![CDATA[Lessons from Top Distributors on Creating the Right Opportunities for Actual Growth]]></description><link>https://cybersecandbiz.substack.com/p/what-cybersecurity-vendors-get-wrong</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/what-cybersecurity-vendors-get-wrong</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Mon, 04 Aug 2025 12:07:44 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/55d9ba1c-d8d8-4f4d-b9b5-303e76612280_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p><em><strong>&#8220;We signed the distribution agreement! Now time to sit, relax and see the growth finally coming!&#8221;</strong></em><strong>.</strong></p></blockquote><p>If you're a cybersecurity startup or scaleup, you might recognize this moment: <strong>the high of closing your first distribution deal. It feels like validation, a catalyst for expansion.</strong> But too often, that excitement turns to confusion, frustration, and disappointment.</p><p><strong><a href="https://www.linkedin.com/in/nick-bailey-55b7ab4/">Nick Bailey</a></strong>, Global Account Director at <a href="https://www.softcat.com/">Softcat</a>, has seen it firsthand: <em>&#8220;At my previous company, we signed 15 vendors while I was there: 2 were great, 3 were okay, and the rest failed. But that&#8217;s the general nature of this business.&#8221;</em></p><p>Most cybersecurity vendors that have tried to scale their business through distribution know what Nick is talking about. <strong>Many of these partnerships fail due to a wrong fit between channel and vendor.</strong></p><p><strong><a href="https://www.linkedin.com/in/mateusz-wepa/">Mateusz Wepa</a></strong>, from <a href="https://iit-d.pl/">iiTD Poland</a>, gives an example why this happens: <em>&#8220;Vendors tend to overvalue big brand distributors. You&#8217;d rather have a smaller distributor focused on you 100% than a big one that gives you 10% or less.&#8221;</em></p><p><a href="https://www.linkedin.com/in/ignaciosbampato/">I have been working for more than 20 years with cybersecurity vendors and distribution partners around the world</a>, and I can tell you this: <strong>signing a distribution agreement can be game-changing yet guarantees nothing</strong>. It's a milestone, yes, but it&#8217;s also a small step on the much harder journey toward growth.</p><p>To understand how vendors can increase their chances of success, <strong>I spoke with seven distribution leaders from a variety of companies</strong> <em>(large and boutique, transactional and MSP-focused)</em> across five different countries. Here&#8217;s what they had to say.</p><h1>What Distributors Really Want: More Than Just a Good Product</h1><p>The consulted distributors agreed on one key point: <strong>having a great product is just the starting point. It&#8217;s expected, not exceptional.</strong></p><div class="pullquote"><p>What truly sets vendors apart is their ability to support a channel that helps partners succeed. Technically and commercially.</p></div><p>Distributors consistently look for vendors that offer <strong>more than just a "cool" technology</strong>:</p><ul><li><p>Clear market differentiation</p></li><li><p>A realistic go-to-market strategy</p></li><li><p>Clarity on the channel strategy</p></li><li><p>Integration with existing ecosystems</p></li><li><p>Loyalty and trust</p></li></ul><p>Each one of the interviewees had something to say about this:</p><p><em>&#8220;Partners don&#8217;t need the best in class product. They need a good product, but they need the best in class channel,&#8221;</em> said Mateusz Wepa. <em>&#8220;A lot of vendors with great technology didn&#8217;t grow properly just because they didn&#8217;t have a channel strategy in place that was attractive for the partners. For the partner, the most important thing is to make money.&#8221;</em></p><p><strong><a href="https://www.linkedin.com/in/miko%C5%82aj-sikorski-32a61969/?originalSubdomain=pl">Mikolaj Sikorski</a></strong> from <a href="https://dagma.eu/en">Dagma</a> reinforced this point with a strategic lens: <em>&#8220;We expect the vendor to clearly articulate compelling differentiators, a strong product vision, and a strategic roadmap. If a vendor relies only on marginal feature comparisons or assumes success in one market means success in another, it shows misalignment.&#8221;</em></p><p><strong><a href="https://www.linkedin.com/in/dsangar/?originalSubdomain=es">David S&#225;nchez Garc&#237;a</a></strong> from <a href="http://ontinet.com/">Ontinet.com</a> tied it back to partner needs: <em>&#8220;A product only has value if it addresses real needs and fits into the partner&#8217;s overall strategy.&#8221;</em></p><p>Cybersecurity vendors - <em>especially those starting to work with distribution</em> - are often in love with their technology, forgetting that a <strong>product&#8217;s value lies not only in features but in its ability to integrate into a broader business context and solve actual use cases</strong>.</p><p><strong><a href="https://www.linkedin.com/in/thomasbresse/">Thomas Bresse</a></strong> from <a href="https://www.bemsp.fr/">BeMSP</a> echoes the importance of ecosystem fit: <em>&#8220;We want to avoid solutions that are completely isolated. We prefer those that fit well into an ecosystem.&#8221;</em></p><p>This is particularly true with specialized distributors, such as those focused on MSPs (<em>like BeMSP above</em>) or those who prefer to concentrate most of their efforts on one or two strategic vendors, surrounding them with complementary and inter-operable solutions. If a new vendor doesn&#8217;t align with that strategy - no matter how advanced the technology - the distributor is unlikely to prioritize it.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Channel Clarity Is Non-Negotiable</h1><p>One of the strongest recurring themes from every interviewee: <strong>vendors must choose a clear channel strategy and stick to it</strong>. Trying to sell both directly and through partners almost always creates conflict.</p><p><em>&#8220;Hybrid approaches rarely work. Vendors must make a clear choice,&#8221;</em> said <strong><a href="https://www.linkedin.com/in/ettoremastropasqua/?originalSubdomain=it">Ettore Mastropasqua</a></strong> from <a href="https://www.allnet-italia.it/">ALLNET.ITALIA</a>. <em>&#8220;Either go through distribution or go direct, but not both.&#8221;</em></p><p>Thomas Bresse reinforced this from an MSP perspective: <em>&#8220;We work with MSPs, so we immediately rule out vendors who are primarily targeting enterprise or mid-market clients.&#8221;</em></p><div class="pullquote"><p>Distributors expect not just clarity, but focus. If the vendor can&#8217;t commit to the channel - <em>and to the distributor as a strategic partner</em> - the foundation for growth simply isn&#8217;t there.</p></div><p><strong>Additionally, the way of working must be clearly defined from the beginning.</strong> What will be the respective roles of the vendor and the distribution partner? Will the distributor have exclusivity in a given market or for an initial period of time, or does the vendor intend to sign multiple distribution partners?</p><p>These are fundamental questions that determine how much effort and investment the distributor is willing to put forward.</p><h1>Commitment Goes Both Ways</h1><p>Successful distributor relationships require vendors to match the distributor&#8217;s commitment. This means contributing time, people, and money, instead of just expecting results.</p><p><em>&#8220;A strong sign of commitment is the allocation of dedicated resources - ideally in coordination with the distributor - rather than simply offloading activities to the channel.&#8221;</em>, says Ettore Mastropasqua of ALLNET.ITALIA.</p><p>Distributors consistently emphasized that they should be treated as an <strong>extension of the vendor&#8217;s team</strong>, not just another independent entity executing transactions. This includes transparent communication, shared objectives, and mutual accountability.</p><p><em>&#8220;A distributor is not just a reseller,&#8221;</em> reinforces Ettore Mastropasqua. <em>&#8220;It&#8217;s an extension of the vendor&#8217;s own team. The commitment must be mutual.&#8221;</em></p><p>David S&#225;nchez Garc&#237;a from Ontinet.com recommends: <em>&#8220;Treat the distributor like you would a new internal hire. Train them, support them, and empower them.&#8221;</em></p><p>At the heart of these expectations lie two core principles: <strong>loyalty and trust</strong>. Vendors must demonstrate that they are invested not just in transactions, but in building a stable, long-term relationship.</p><div class="pullquote"><p>Loyalty can take the form of channel exclusivity, avoiding direct sales conflict, or simply honoring prior agreements. Trust is built through consistent behavior, honest communication, joint planning, and respecting the distributor&#8217;s role in every customer interaction.</p></div><p>As Mateusz Wepa put it, <em>&#8220;The channel that we&#8217;re going to build needs to be secure and transparent. Transparency with the channel, and lack of direct involvement without the knowledge of the partners. That&#8217;s very important.&#8221;</em></p><p>Distributors are willing to invest, but they expect the same from vendors. This includes:</p><ul><li><p>Dedicated vendor-side resources</p></li><li><p>Marketing and event co-funding</p></li><li><p>Shared planning and transparency</p></li></ul><p>The more commitment the vendor shows to the distributor and their needs, the more the partner is willing to invest, prioritize the vendor, and build the brand alongside them.</p><h1>Flexibility and Local Adaptation</h1><p>Every country, every partner ecosystem, and every sales process is different. <strong>A rigid go-to-market model designed in one market rarely survives contact with another.</strong> Distributors unanimously emphasized that what works in the U.S., the Netherlands, or Germany might not work in Spain, Poland, or Italy.</p><p><em>&#8220;Many vendors, especially from North America, fail in Europe because they try to replicate their home market strategy in new regions,&#8221;</em> warns Mikolaj Sikorski from Dagma. <em>&#8220;You have to think global but act local.&#8221;</em></p><p>This goes beyond just messaging and pricing. It includes how the product is positioned, who it is sold to, and even how onboarding and demos are conducted. For example, David S&#225;nchez Garc&#237;a from Ontinet.com noted that vendors often fail by treating every distributor the same:</p><p><em>&#8220;Not all distributors are the same nor do they operate the same way. Vendors must invest time in understanding the local distributor&#8217;s structure and adapt their approach accordingly.&#8221;</em></p><div class="pullquote"><p>Distributors want the freedom and flexibility to localize every step of the process: from pricing to sales enablement and partner engagement.</p></div><p><strong>Language plays an important role here too.</strong> As Thomas Bresse from BeMSP shared, <em>&#8220;Our best experiences have been with vendors who have people on their team who speak our language and can interact directly with our partners.&#8221;</em></p><p>This is particularly important during the launch phase, when direct engagement with partners and internal teams can make or break momentum.</p><p>Mateusz Wepa added a complementary perspective: vendors shouldn&#8217;t worry about translating every piece of content upfront, but instead should empower the distributor with quality material in English and trust them to handle localization. <em>&#8220;That&#8217;s one of the reasons you choose a distributor: to bring local know-how,&#8221;</em> he explained. Those that are empowered to adapt tend to deliver faster, more sustainable results.</p><h1>Enablement and Responsiveness</h1><p>Enablement doesn&#8217;t just mean training. It means preparing the distributor to operate independently and successfully, on the commercial and technical fronts.</p><p>Distributors expect vendors to:</p><ul><li><p><strong>Provide high-quality documentation</strong>: Not just datasheets or product pages, but detailed, well-organized materials that help commercial teams pitch effectively and technical teams support customers. This only works when vendors provide complete, organized documentation from the outset. Resources that are accessible, up to date, and usable and <em>loved </em>by both commercial and technical teams.<br></p></li><li><p><strong>Offer training (commercial and technical)</strong>: Initial onboarding sessions should give distributors enough knowledge to deliver demos, answer partner questions, and troubleshoot common issues. But enablement doesn&#8217;t stop at launch; it should evolve with the product. As Mikolaj Sikorski emphasized, <em>"We expect structured product training, followed by continuous updates as the product evolves."<br></em></p></li><li><p><strong>Remain responsive and available</strong>: Vendors must be reachable when it counts. Quick access to answers, whether pricing clarification, technical support, or licensing help, allows distributors to be agile in front of their partners. As Mateusz Wepa noted, <em>&#8220;The ultimate value in value-added is time.&#8221;</em> If vendors delay, the whole channel slows down.</p></li></ul><p>Distributors that receive timely, relevant support can truly act as an extension of the vendor. Those that don&#8217;t, often become bottlenecks instead of growth engines.</p><h1>Driving Demand Together</h1><p><strong>Distribution is not just about logistics, contracts, or onboarding; it&#8217;s about growth</strong>. For distributors, lead generation and market development are critical indicators of a vendor's seriousness and readiness to succeed.</p><p>Nick Bailey was direct: <em>&#8220;Lead generation is key. There's no point in having the infrastructure in place if you're not going to drive actual transactions.&#8221;</em> In other words, no matter how well the operation is built, it&#8217;s meaningless without real pipeline opportunities.</p><p>Mateusz Wepa echoed the same idea but expanded it further: <em>&#8220;If you want to build a brand, you have to create visibility. You have to have people seeing it, having access to it, building credibility.&#8221;</em></p><p><strong>For him and others, marketing support isn&#8217;t a bonus; it&#8217;s a proof of commitment.</strong> Vendors that help co-fund events, share leads, or even just provide swag for giveaways get prioritized. Those that are present in the market, at least often, for in-person activities even more.</p><p>Ettore Mastropasqua connected this directly to onboarding and mutual responsibility: <em>&#8220;Lead generation is a key component of a strong partnership. It&#8217;s not enough to have infrastructure in place if there is no plan to drive transactions.&#8221;</em></p><p><strong>There is more to growth with a distributor than just lead generation.</strong> Incentives programs for both the organization and their teams are an important part of the conversation. Rebates, SPIFFs, dinners, prizes, experiences, are key to motivate the internal staff of larger distributors.</p><p>Distributors are often working with multiple vendors at once. The ones that show up with leads, demand-gen plans, or event support become the ones that get attention. As one distributor from the United Kingdom put it: <em>&#8220;If you don&#8217;t bring business, you become background noise.&#8221;</em></p><p>That said, <strong>how lead generation, incentives and market development are executed can vary widely depending on the type of distributor</strong>.</p><p>A boutique, value-added distributor may expect co-branded webinars or support for local roadshows, while a larger, transactional distributor might focus more on funded heads, digital campaigns or shared lead portals. MSP-focused distributors, on the other hand, may value tools and enablement programs that help their partners sell recurring services.</p><p>The key is for vendors to ask the right questions early on: <em>What does demand generation mean for this distributor? What support do they need to succeed in their model?</em> Just like everything else in successful partnerships, alignment matters more than assumptions.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Avoiding the Common Mistakes</h1><p>Here are the pitfalls that nearly every distributor mentioned when talking about failed vendor relationships:</p><ol><li><p><strong>Assuming the distributor will do everything.</strong></p><ul><li><p>Distributors are enablers, not magic growth machines.</p></li></ul></li><li><p><strong>Targeting the wrong type of distributor.</strong></p><ul><li><p>A startup might get lost in a large distributor's portfolio. A smaller, hungry partner may be a better fit.</p></li></ul></li><li><p><strong>Failing to commit resources.</strong></p><ul><li><p>Distributors need vendor-side people, budget, and a shared plan.</p></li></ul></li><li><p><strong>Not defining roles and expectations up-front.</strong></p><ul><li><p>Distributors want to know what their role will be from day one: <em>What responsibilities does each side take on?</em></p></li></ul></li><li><p><strong>Overcomplicating onboarding.</strong></p><ul><li><p>Onboarding should last as long as it takes, but it must be practical. Too little is a red flag; too much can overload the team.</p></li></ul></li><li><p><strong>Neglecting to adapt to local realities.</strong></p><ul><li><p>Language, culture, pricing models, and sales cycles all vary.</p></li></ul></li><li><p><strong>Complex processes.</strong></p><ul><li><p><em>&#8220;Make it as easy as possible&#8221; is the recommendation of one of the consulted distributors.</em></p></li></ul></li><li><p><strong>Damaging trust.</strong></p><ul><li><p>Nothing breaks a relationship faster than undercutting the channel or misattributing success.</p></li></ul></li></ol><h1>Choose Wisely</h1><p>Distributors are one of the <strong><a href="https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity">Kingmakers in Cybersecurity</a></strong>. Choosing the right one, and understanding how to work with them, is essential for cybersecurity vendors to achieve sustainable growth.</p><p><strong>Not every distributor will be the right fit for every vendor, and alignment in objectives, business model, priorities, and engagement style is often more important than size or reputation.</strong></p><p>Cultural fit, empathy, and communication matter just as much as pricing and product. Don&#8217;t fall for logos or headcount: look for alignment.</p><p>The right partner understands their market, shares your vision, and invests in your success. But that relationship must be nurtured through transparency, commitment, and mutual respect.</p><p>Signing a distribution agreement is cause for celebration, but it&#8217;s just the first mile of a marathon. And like with any marathon, you need to be ready for it.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ti7h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ti7h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!Ti7h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!Ti7h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!Ti7h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ti7h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:258628,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/170078662?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ti7h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!Ti7h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!Ti7h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!Ti7h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c06acd-4ca1-4757-b5fd-bc90fe118ce9_1584x396.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[AI & Threat Hunting in the SOC: Augmentation Over Automation?]]></title><description><![CDATA[Does Threat Hunting Still Belong to Humans?]]></description><link>https://cybersecandbiz.substack.com/p/ai-in-threat-hunting-in-the-soc</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/ai-in-threat-hunting-in-the-soc</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Thu, 03 Jul 2025 12:48:29 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/02d406e3-e7cc-4aed-84b1-14fbbcd20818_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s hard to avoid the noise around AI in cybersecurity. Buzzwords like <em>AI-driven detection</em>, <em>autonomous SOCs</em>, and <em>self-healing systems</em> dominate headlines, vendor decks, and conference panels. But when you speak with the people running Security Operations Centers (SOCs), a different, more grounded picture emerges.</p><p>Over the past weeks, <strong>I interviewed ten security professionals across internal enterprise SOCs and security service providers</strong> (MSSPs, MDRs, consultancies). Their roles span from SOC managers to DFIR engineers and Threat Hunting.</p><p>Collectively, they represent organizations of various sizes and sectors, from tens of thousands to dozens of employees, as well as different regions and cultures.</p><p>The goal was to understand <strong>what the real impact of AI on threat hunting and incident response is today</strong>, ignoring what the <em>&#8220;marketing&#8221;</em> says and listening to the SOC floor.</p><p>While we cannot draw general conclusions from a sample of this size, the result is that, for now, <strong>AI is helping, not replacing</strong>. The experts perceive gaps in the existing tools and are cautious about them, and they face several other challenges that are requiring their attention.</p><p>Through the rest of this article we are going to go through the most revealing insights from the experts that are defending organizations around the world, every minute of every hour of every day.</p><h1>Dedicated Team or Shared Responsibility?</h1><p>When it comes to the structure of Security Operations teams, there&#8217;s not one way to handle Threat Hunting. While larger organizations tend to have dedicated specialists, in-house or outsourced, most service providers don&#8217;t.</p><p><strong>Dedicated threat hunters are expensive</strong> to maintain, especially for smaller providers that depend on tight margins.</p><blockquote><p>&#8220;<em>We don&#8217;t have dedicated threat hunters because we&#8217;re not big enough. It&#8217;s simply not financially viable</em>&#8221;, says the SOC Deputy Manager of a French MSSP.</p></blockquote><p>Logically, <strong>service providers must balance efficiency and scale</strong>, and assigning full-time roles for threat hunting is challenging, not only because of the cost and resource constraints, but also because many clients don&#8217;t understand or perceive its value.</p><blockquote><p><em>&#8220;Some of the more mature clients understand why (threat hunting) is key, but unfortunately most of them are not yet convinced despite our best efforts&#8221;</em>, extends the previously quoted specialist from France.</p></blockquote><p>This makes it harder for service providers to justify threat hunting as a standard part of their services, a challenge that gets more complex as <strong>they need to deal with tool fragmentation across clients</strong>.</p><p>Threat Hunting then becomes a shared responsibility among analysts when it comes to service providers.</p><blockquote><p><em>&#8220;Senior-level analysts lead investigations, and all analysts share hunting responsibilities collaboratively&#8221;</em>, explains a SOC Analyst from a medium-size service provider from Arizona, US.</p></blockquote><h1>The foundational work</h1><p>Before even considering any kind of automation, including AI-driven ones, <strong>Security Operations teams need to build the right foundations</strong>.</p><p>How the teams are structured, as we mentioned above, is one of those pillars, alongside data, processes, and tools.</p><p>Many of the interviewees mentioned that <strong>their biggest challenges are on getting those basics right</strong>.</p><blockquote><p><em>&#8220;Lack of quality telemetry data is one of our biggest challenges. We&#8217;re working on improving visibility through better log management.&#8221;</em>, says the SOC Manager of a large logistics company.</p></blockquote><p><strong>It&#8217;s nothing new that <a href="https://cybersecandbiz.substack.com/p/opportunities-challenges-for-soc">SOCs need to deal with an ever-increasing amount of data</a></strong> being ingested by their SIEM and other tools. Even then, there are visibility gaps caused by budget constraints, compliance restrictions or overly aggressive tuning, as one of the interviewed analysts highlighted.</p><p><strong>Every one of the interviewees is going through different initiatives to not only address the data challenge but also their internal processes.</strong> SOARs, playbooks, methodologies (like <strong><a href="https://www.betaalvereniging.nl/wp-content/uploads/TaHiTI-Threat-Hunting-Methodology-whitepaper.pdf">TaHiTI</a></strong>) and custom approaches are some of the ways that the different organizations are looking into in order to achieve a high process maturity.</p><p>However, the variety of tools and sources plays a factor here, making it even more complicated. For instance, as examples:</p><ol><li><p>A SOC Manager at a 150,000 employees company highlights the need to integrate CTI and refined IOCs that could trigger alerts worthy of investigation.</p></li><li><p>An analyst from a Spanish service provider mentions that threat hunting is still a manual or semi-manual process due to the diversity of digital assets they are monitoring in different customer environments.</p></li></ol><p>What is clear across the board is that automation and AI requires the right foundations in place, especially around data and processes.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Hunting the Unknowns</h1><p>When reading through the lines, there is a topic that is mentioned by pretty much every interviewee:<strong> the challenge of hunting based on more than IOCs, detections and signatures.</strong></p><blockquote><p><em>&#8220;The biggest challenge is detecting threats without known IOCs. Advanced threats aren&#8217;t always identified through traditional signatures, so a more behavioural approach is needed, requiring more analyst time and specialization.&#8221;</em>, mentions a Digital Forensic Analyst from a large service provider.</p></blockquote><p><strong>This is an essential aspect of modern threat hunting, and it is still a work-in-progress in many cases.</strong> Many teams are relying on alerts as the trigger to investigate further, and many unknown threats don&#8217;t generate one.</p><p>Transforming intelligence into detections, creating behavioural baselines in collaboration with clients, reducing irrelevant alerts and better log management are some of the ways SOCs are addressing this issue.</p><blockquote><p><em>&#8220;The challenge isn&#8217;t just data volume. It&#8217;s the lack of context that makes hunting unknown threats especially difficult.&#8221;, </em>extends a Principal DFIR Consultant from a large UK-based service provider.</p></blockquote><p>Finding unknown threats is where machine learning and AI algorithms can help, according to a few of the interviewees.</p><p>A Threat Hunting Lead from one of the largest insurance companies in the world confirms that approach is being selectively applied: <em>&#8220;The use of AI algorithms is becoming more common. Since it can provide different angles in threat hunting, we apply it depending on the scenario and the goal.&#8221;</em></p><p>Moreover, another interviewee, Detection &amp; Response Lead at the cybersecurity arm of a large physical security company, details a more advanced practice: <em>&#8220;We use an internal correlator with machine learning to filter out irrelevant alerts. The important ones are first analyzed by an AI agent trained to behave like a hunter, so our analysts already have part of the work done when they step in.&#8221;</em>.</p><p>Hunting unknown threats is clearly resource-intensive and difficult to scale. The organizations with mature structures and processes seem to be better positioned to formalize and operationalize this kind of work. </p><p>The question is: <strong>Can this be the area where AI can bring the most value?</strong></p><h1>AI is here, to some extent</h1><p><strong>None of the experts are working in companies that have fully replaced Security Operations functions with AI</strong>, despite the promises of many new vendors.</p><p>When consulted about the usage of AI for threat hunting, <strong><a href="https://www.linkedin.com/in/caleff/">Olivier Caleff</a></strong>, CISO of Erium, a French cybersecurity service provider was very clear: <em>&#8220;No. We don&#8217;t use it in production at the moment, but is is used as a supporting tool. We are waiting to have more reliable tools and positive testing before relying on it. Anyhow, we plan to enforce human control for quite some time&#8221;</em>.</p><p>From the different answers, we can see that service providers, needing to deal with multiple tools due to the various customer technology stacks they must work with, are still not widely adopting AI, even though <strong>they do have some level of automation in place</strong>.</p><p>However, those in larger organizations, having a more homogeneous environment as well as less budget constraints, are already using (<em>or planning to use</em>) AI selectively in some processes, for instance, to assist threat hunters.</p><p>Nevertheless, maturity is still an issue, as a Senior DFIR Manager from a global financial company says: <em>&#8220;AI helps in the analysis process, sometimes. Currently, it&#8217;s not mature enough to be anything more than an aid to analysts.&#8221;.</em></p><p>The adoption of AI is gradual, from assisting specialists in some particular cases to alert filtering and initial triage in others. There are also activities in progress in the organizations of a few of the consulted experts to adopt it further but <strong>still only as an aid to threat hunting efforts instead of a fully automated approach</strong>.</p><p>The overall sentiment is that while AI offers potential, it&#8217;s not a plug-and-play solution. Its success depends on how well organizations have structured their SOCs, curated their data pipelines, and integrated their processes.</p><p><strong>A key takeaway?</strong> AI in threat hunting today is about <strong>augmentation over automation</strong>. The best implementations at the moment are those empowering analysts to focus on deeper investigation by handling noisy, repetitive work, and enhancing human intuition and expertise.</p><h1>What&#8217;s next with AI &amp; Threat Hunting?</h1><p>While most SOCs are cautiously testing AI for reducing noise and improving alerts handling while focusing on getting the basics right, there are new categories of solutions beginning to surface.</p><p>When it comes to Tier 1 SOC Automation, products like <strong><a href="https://www.prophetsecurity.ai/">Prophet Security</a></strong>, <strong><a href="https://www.dropzone.ai/">Dropzone</a></strong> and <strong><a href="https://www.qevlar.com/">Qevlar AI</a></strong> promise to provide &#8220;hyperautomation&#8221; using AI to reduce alert fatigue and improve times to respond and mitigate.</p><p>Others are designed <strong>from the ground up</strong> to automate or accelerate threat hunting for the Tier 2/3 SOC analysts and hunters using AI, addressing some of the challenges highlighted above. <strong><a href="https://www.cmdzero.io/">CmdZero</a></strong>, <strong><a href="https://tandemtrace.ai/">TandemTrace</a></strong> and <strong><a href="https://www.exaforce.com/">Exaforce</a></strong> are the most notable examples.</p><blockquote><p><em>&#8220;All escalations in security operations require thorough human analysis before a decision can be made. Analyzing these cases is a highly manual process with a lot of grunt work, and the universal shortage of talent for this advanced skillset makes it the most significant bottleneck.&#8220;</em>, <a href="https://www.cmdzero.io/blog-posts/introducing-command-zero">said</a> Dov Yoran, Co-Founder and CEO of CmdZero.</p></blockquote><p>For instance, <strong>TandemTrace</strong> is a purpose-built platform to perform threat hunting at scale using AI-driven techniques. Unlike legacy SIEMs or EDRs with bolted-on AI features, platforms like this one aim to <strong>generate hypotheses, correlate telemetry, and surface anomalies</strong> without relying exclusively on known IOCs or predefined detection rules.</p><p>These products promise to:</p><ul><li><p>Reduce the time and expertise needed to start hunting campaigns</p></li><li><p>Operate across telemetry sources (EDR, network, logs)</p></li><li><p>Bridge the gap between threat intel and detection by automating contextual analysis</p></li></ul><p>Their success will depend on showing the value to the Security Operations team when it comes to threat hunting but also in how they address the issues related to <strong>data quality, integration maturity, </strong>and <strong>human oversight</strong>.</p><blockquote><p><em>&#8220;Threat Hunters have an incredibly complex job: they need to find a needle in the haystack, without knowing which haystack or if the needle even exists.&#8221;</em>, remarks <strong>Almog Ohayon</strong>, CEO &amp; Founder of <strong>TandemTrace</strong>. <em>&#8220;The modern threat landscape doesn't pause for weekends or holidays. AI security agents can deliver continuous threat hunting and incident response, ensuring defenses are always up while attackers probe for weaknesses.&#8221;</em></p></blockquote><p>The path to AI-driven threat hunting isn&#8217;t about replacing the hunters. It's about empowering them. And with AI agents that never sleep now on the horizon, that promise is starting to look real.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RlTo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!RlTo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!RlTo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!RlTo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RlTo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png" width="1456" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:258628,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/167432617?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RlTo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!RlTo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!RlTo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!RlTo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c69776d-4120-438d-8497-82b3ab4c6849_1584x396.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Further Reading</h1><ol><li><p><strong><a href="https://medium.com/@7rm1ef8/a-soc-mssp-guide-1-of-4-3f5450638a98">A SOC-MSSP Guide</a></strong></p></li><li><p><strong><a href="https://www.soc-cmm.com/introduction/">SOC-CMM Maturity Model</a></strong></p></li><li><p><strong><a href="https://www.sans.org/white-papers/sans-2025-threat-hunting-survey-advancements-threat-hunting-amid-ai-cloud-challenges/">SANS 2025 Threat Hunting Survey</a></strong></p></li><li><p><strong><a href="https://www.linkedin.com/posts/oussama-noun-762546109_cybersecurity-securityvendors-gartner-activity-7343261068435120128-A9S4/">2025 Gartner Hype Cycle for Security Operations</a></strong></p></li></ol><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/ai-in-threat-hunting-in-the-soc?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/ai-in-threat-hunting-in-the-soc?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecandbiz.substack.com/p/ai-in-threat-hunting-in-the-soc?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Why Analyst Briefings Matter for Cybersecurity Startups (and How to Do Them)]]></title><description><![CDATA[Everything You Need to Know About Booking and Delivering Analyst Briefings]]></description><link>https://cybersecandbiz.substack.com/p/why-analyst-briefings-matter-for</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/why-analyst-briefings-matter-for</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Tue, 17 Jun 2025 08:48:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/051f583c-e20d-46db-9199-5fc1d11cafc3_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the highly competitive world of cybersecurity, industry analysts are one of the most influential Kingmakers. As I wrote in a previous article, <a href="https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity">"Kingmakers in Cybersecurity"</a>, analysts can act as <strong>critical amplifiers for emerging vendors</strong>.</p><p>I still vividly remember a call with an analyst more than 10 years ago. We were briefing them about our plans moving forward, and when we asked for feedback at the end, he mentioned that he was missing something he saw a then-newcomer, slowly gaining traction, was doing.</p><p>The analyst was clearly impressed by them and even advocated for us to follow through and deliver something similar. Today, that company is one of the largest cybersecurity vendors in the world.</p><p>Due to their constant interactions with customers, service providers, and vendors, analysts can shape buyer perceptions, guide enterprise decision-making, and influence which companies get considered for pilots, POCs, or RFPs.</p><p>So, how can cybersecurity companies <em>(no matter their size, origin, or revenue)</em> leverage this power? <strong>Start with analyst briefings.</strong></p><h1>What Is an Analyst Briefing?</h1><p>An analyst briefing is a vendor-driven meeting where you present your company's strategy, product, and positioning to an industry analyst. It's important to understand the flow of these sessions.</p><p>As the text in a meeting invitation from one analyst firm reminds: "<em>During a vendor briefing the flow of information predominates from a vendor to an expert. Requests for expert feedback should be scheduled as Inquiry calls only.</em>" <a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>That means <strong>it's your job to deliver a clear, compelling narrative.</strong> This is your show. Analysts are not even expected to talk during briefings, unless they want to, and many of them are well trained to remain silent for the entire session.</p><h1>Why Brief Analysts at All?</h1><p>The perception is that analysts are pay-to-play. I completely disagree with that. </p><p>Of course, becoming a customer gives you more opportunities to engage with them, but that doesn't mean you need to spend money to work with them.</p><p>If you're building something genuinely innovative or gaining traction with early customers, analysts want to know. Their job is to know everything about their market, and that includes your company.</p><p>A strong briefing can lead to:</p><ul><li><p>Mentions in market guides, special reports, and client conversations</p></li><li><p>Invitations to participate in research or comparative frameworks</p></li><li><p>Increased visibility with buyers during critical decision windows</p></li></ul><p>Analysts talk to your customers. Help them talk about you.</p><h1>How to Pick the Right Analyst</h1><p>It's not only about briefing the right firm (or all of them), but also about <strong>targeting the right analyst</strong>. Companies like Gartner, Forrester, and Omdia have multiple people covering cybersecurity, and not all of them write research with the same organizations in mind.</p><p>Targeting the right analyst is as important as the content itself. Understand which firms and analysts are covering your space by reading recent reports and noting who wrote them.</p><p>Your customers don't read every analyst report, so you need to pick the ones aligned with your buyer's world.</p><p>Then, <strong>research who those authors are</strong>. Look at their recent publications, presentations, social media posts, etc., to understand their current interests and focus.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>How to Request a Briefing (Even If You're Not a Client)</h1><p>Many believe you need to be a client to brief analysts. That's not true. You can easily request briefings with major firms through online forms:</p><ul><li><p><a href="https://www.gartner.com/en/contact/vendor-briefings">Gartner Briefings</a></p></li><li><p><a href="https://www.forrester.com/help/analyst-briefing/">Forrester Briefings</a></p></li><li><p><a href="https://pages.intelligence.informa.com/omdia-request-a-briefing">Omdia Briefings</a></p></li><li><p><a href="https://www.idc.com/contact/#briefing-request">IDC Briefings</a></p></li></ul><p>Depending on your pitch and how well you present it, the time to get a response will vary. Requesting to pitch more than one analyst (but not dozens) is recommended.</p><p>Be concise and compelling in your request. Lead with your unique story.</p><h1>How to Deliver a Great Analyst Briefing</h1><p>When it comes to delivery, it needs to align with your briefing request and your objectives. </p><blockquote><p>If you're a rising star in your space but your revenue is still modest, don&#8217;t expect to be included in a Magic Quadrant or Wave report just yet.</p></blockquote><p><strong>Your first briefings are about raising visibility within the analyst community.</strong> But remember: this is not a sales pitch. It&#8217;s about providing value to the analyst, sharing something that will help them do their job better.</p><p>Every analyst has different approaches and expectations. In some cases, you may not have their full attention. That means your narrative must be laser-focused. Stick to two or three key messages and reinforce them throughout your presentation.</p><p>It's important to provide context about your company, the team, funding, etc., along with real-world proof points highlighting customer stories, metrics, pricing models, and future plans where possible.</p><p>Here are a few key things to consider:</p><ol><li><p>You're not expected to be a leader, so be transparent and honest&#8212;address known gaps and how you plan to fix them.</p></li><li><p>Don&#8217;t lecture about the market. Analysts likely know it better than you.</p></li><li><p>Even if analysts remain quiet, encourage interaction by pausing for questions and building rapport.</p></li><li><p>Keep your deck short and focused. Share it in advance if requested, and plan to leave time for Q&amp;A.</p></li><li><p>A brief product demo (<em>very brief</em>) can help illustrate your value, but remember&#8212;briefings are not demos.</p></li><li><p>If there's something you don&#8217;t want shared, either leave it out or clearly mark it as confidential.</p></li></ol><p>The amount of time an analyst gives you is already a sign of interest. Their engagement during the call is a signal you're doing a good job.<br>How the call ends, and what the analyst suggests next, will tell you if it was successful.</p><p>After the briefing, follow up with the materials and summarize the key points you want them to remember.</p><p><strong>Your goal is to build a relationship with the analyst over time.</strong> Ask about their current or upcoming research and keep it in mind for future briefings.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Get Out of Your Comfort Zone and Start Briefing</h1><p>In my opinion and experience, interacting with analyst firms is a key pillar of success. The earlier you start, the better.</p><p>Analyst relations isn&#8217;t just for big vendors. Strategic briefings can be a force multiplier for startups ready to stand out. If you're building something meaningful in cybersecurity, make sure the Kingmakers know your name.</p><p><strong>Let them tell your story to the people who need to hear it.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nzhK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nzhK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png" width="728" height="182" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:258628,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/166135919?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nzhK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/why-analyst-briefings-matter-for?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/why-analyst-briefings-matter-for?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecandbiz.substack.com/p/why-analyst-briefings-matter-for?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Inquiry calls are only for paying clients.</p></div></div>]]></content:encoded></item><item><title><![CDATA[Key Lessons in Building Effective Partnerships]]></title><description><![CDATA[From Comic Strips to Real-World Channel Strategy]]></description><link>https://cybersecandbiz.substack.com/p/key-lessons-in-building-partnerships</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/key-lessons-in-building-partnerships</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Mon, 19 May 2025 00:33:09 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5c166e9a-0f28-4d70-af57-64dcddd8b32e_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Partnerships are no longer a side quest for technology vendors: <strong>they are the main storyline</strong>. With over 90% of cybersecurity solutions and more than 73% of IT spend flowing through the channel, partnerships have become a central growth strategy.</p><p>But success doesn&#8217;t come from just having partners. <strong>It comes from nurturing the right partnerships, in the right way, with the right expectations</strong>. It comes from creating <strong><a href="https://cybersecandbiz.substack.com/p/value-based-partnerships-strategy">Value-Based Partnerships</a></strong>.</p><p>Over time, I shared a series of comic strips on <strong><a href="https://www.linkedin.com/in/ignaciosbampato/?lipi=urn%3Ali%3Apage%3Ad_flagship3_detail_base%3BRNOIF2JMTk%2BgOJ1mGZ0z6w%3D%3D">LinkedIn</a></strong> illustrating some of the most common (<em>and often misunderstood</em>) elements of building and managing partner ecosystems.</p><p>Below are the <strong>key lessons behind each comic</strong>, rooted in real-world experience and my ongoing advocacy for value-based partnerships.</p><h1>The Importance of Partnerships and Leaders with Experience</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.linkedin.com/posts/ignaciosbampato_partners-in-pause-1-activity-7181968851675303937-L-AC/?utm_source=share&amp;utm_medium=member_desktop" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ahMr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!ahMr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!ahMr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!ahMr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ahMr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:98901,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/posts/ignaciosbampato_partners-in-pause-1-activity-7181968851675303937-L-AC/?utm_source=share&amp;utm_medium=member_desktop&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/163741031?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ahMr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!ahMr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!ahMr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!ahMr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F966f1dd3-24ab-451e-826f-ee4b0357fae9_1600x900.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Many companies are waking up to the power of partnerships, but few understand the <strong>how</strong>. In this "Decade of Ecosystems," the winning formula includes not only building partner networks but also hiring leaders who understand how they work.</p><p>Quoting Tiffani Bova, &#8220;<em>If you suck offline in relationship-building, it's going to be compounded online</em>.&#8221; <strong>Partnerships aren&#8217;t transactional, they&#8217;re relational</strong>. And they require leaders who have walked the path, built those relationships, and know what it takes to deliver mutual value.</p><p>As Jay McBain says, <strong>there are 28 moments in a buyer&#8217;s journey before a vendor even shows up</strong>. If you&#8217;re not engaging with the people who own those moments, someone else is.</p><blockquote><p><strong>Lesson:</strong> Don&#8217;t just invest in building partnerships: invest in leaders who understand how to make them thrive.</p></blockquote><h1>Measuring Channel Partners&#8217; Performance Without Overburdening Them</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WLN_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WLN_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!WLN_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!WLN_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!WLN_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WLN_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:223561,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/163741031?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WLN_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!WLN_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!WLN_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!WLN_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb23ab83c-466e-4194-8603-0171d3a810c5_1600x900.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When things aren&#8217;t going well, it&#8217;s tempting for vendors to drown partners in reporting requests. But demanding too much data, especially from partners for whom you're not a major revenue source, can backfire.</p><p><strong>Performance measurement is essential, but it has to be proportional.</strong> Large vendors might get away with more demands, but smaller ones must earn the right to ask.</p><p>The key is to focus on metrics that don't require extra effort from your partners. Let them focus on what they do best: selling and supporting customers. The more you can self-assess, the better your relationship will be.</p><blockquote><p><strong>Lesson:</strong> Respect your partners' time. Build reporting processes that reflect the value you bring.</p></blockquote><h1>Strategic Partnerships: You Can't Have Too Many</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.linkedin.com/posts/ignaciosbampato_partners-in-pause-3-activity-7212364106434031616-1hVU/?utm_source=share&amp;utm_medium=member_desktop" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yRdk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!yRdk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!yRdk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!yRdk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yRdk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:343412,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/posts/ignaciosbampato_partners-in-pause-3-activity-7212364106434031616-1hVU/?utm_source=share&amp;utm_medium=member_desktop&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/163741031?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yRdk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!yRdk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!yRdk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!yRdk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c1d5a4-d910-4416-b005-b302de12b200_1600x900.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Everyone wants to call every partner &#8220;strategic,&#8221; but <strong>not every partnership is created equal</strong>. If you have too many &#8220;strategic&#8221; partners, the word loses meaning. Worse, it dilutes your ability to focus where it really matters.</p><p>As I wrote in <strong><a href="https://cybersecandbiz.substack.com/p/strategic-partnerships-what-they">this piece</a></strong>, strategic partnerships require commitment, resources, and alignment. That&#8217;s not something you can scale endlessly.</p><p>You also need clarity (internally and externally) on what makes a partner &#8220;strategic.&#8221; <strong>Otherwise, you'll end up with a portfolio full of "formerly strategic" partnerships.</strong></p><blockquote><p><strong>Lesson:</strong> Be selective. Strategic should mean something, or it means nothing.</p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Onboarding Channel Partners: Make It Effortless</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-zGe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-zGe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!-zGe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!-zGe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!-zGe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-zGe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:365884,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/163741031?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-zGe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!-zGe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!-zGe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!-zGe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3823cbab-5b19-4add-8417-f4593a35b4ce_1600x900.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Partner onboarding is where many relationships falter before they even start. On one side, you have vendors demanding weeks of training. On the other, partners are left to figure things out with little support.</p><p><strong>The sweet spot lies in an onboarding program that&#8217;s lightweight, flexible, and tailored.</strong> It should cover both technical and sales readiness, adapt to different partner profiles, and above all, minimize the burden on your partners.</p><p>If your partners can&#8217;t quickly understand your value proposition (<em>or who to sell your solution to</em>) you&#8217;ve already lost momentum.</p><blockquote><p><strong>Lesson</strong>: Make onboarding seamless. The less friction at the start, the more success in the long run.</p></blockquote><h1>Recruiting Channel Partners: Quality Over Quantity</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x38c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x38c!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!x38c!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!x38c!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!x38c!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x38c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:293183,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/163741031?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!x38c!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!x38c!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!x38c!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!x38c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9f399e-28ca-47bc-853c-82a70886869f_1600x900.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Getting partners to join your program is hard&#8212;especially when they&#8217;re already busy with an established portfolio. Many vendors assume that past success in other channels will translate to easy recruitment in the partner world. It doesn&#8217;t.</p><p>Recruitment starts with alignment. <strong>You need to know which partners are a good fit for you, and vice versa.</strong> A great product alone won&#8217;t open doors. You need timing, fit, and a compelling value proposition.</p><p>Instead of trying to onboard every partner, focus on the right partners. The ones who see the opportunity and are open to it.</p><blockquote><p><strong>Lesson:</strong> Don&#8217;t spray and pray. Recruit intentionally and invest in the right relationships.</p></blockquote><h1>Defining Roles in the Customer Lifecycle</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cCl6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cCl6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!cCl6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!cCl6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!cCl6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cCl6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:109216,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/163741031?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cCl6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic 424w, https://substackcdn.com/image/fetch/$s_!cCl6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic 848w, https://substackcdn.com/image/fetch/$s_!cCl6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic 1272w, https://substackcdn.com/image/fetch/$s_!cCl6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5b57db9-7a6c-4082-b459-b607b48a9fd3_1600x900.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One of the most overlooked sources of friction in partnerships is role ambiguity, especially during the implementation phase.</p><p>Some vendors assume partners will handle implementation. Others want to own it themselves. <strong>When expectations aren&#8217;t clearly defined, it&#8217;s the customer who suffers.</strong></p><p>As I discussed in <strong><a href="https://cybersecandbiz.substack.com/p/reducing-effort-for-better-partnerships">this article</a></strong>, alignment on responsibilities must happen early. Define roles clearly, so everyone knows what&#8217;s expected&#8212;and customers get the experience they deserve.</p><blockquote><p><strong>Lesson</strong>: Set expectations up front. A clear customer journey reduces friction and builds trust.</p></blockquote><h1>Final Thoughts</h1><p><strong>Partnerships are an art and a science. They require intentionality, clarity, and empathy.</strong> Behind every comic strip I shared is a hard-earned truth, one that I&#8217;ve seen play out across ecosystems and markets.</p><p>Whether you&#8217;re building your first partner program or scaling a mature ecosystem, these lessons can help you stay grounded in what matters: relationships, value, and mutual success.</p><blockquote><p><strong>Remember:</strong> Great partnerships don&#8217;t just happen. They&#8217;re designed, nurtured, and earned, one intentional action at a time.</p></blockquote><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/key-lessons-in-building-partnerships?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/key-lessons-in-building-partnerships?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecandbiz.substack.com/p/key-lessons-in-building-partnerships?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Kingmakers in Cybersecurity]]></title><description><![CDATA[The Ecosystem Accelerating Vendor Success]]></description><link>https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Mon, 14 Apr 2025 21:48:52 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1632ebff-8738-49a3-9eaf-15728a839b41_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Are you ready for a long yet full of insights article? If so, this is the piece for you, especially if you are in the world of cybersecurity and are developing your growth strategy to protect the world with your disruptive solution.</p><p>We are going to review in detail what are the forces that can <strong>drastically accelerate the success of a Cybersecurity vendor</strong> and position them as a leader in their sector.</p><p>Even if you <em>(or your company)</em> have created the most outstanding and disruptive technology or solution, growing in this market requires a deep understanding of the role that existing actors have.&nbsp;</p><p>I have already discussed in a <strong><a href="https://cybersecandbiz.substack.com/p/product-channel-market-fit">previous article</a></strong> <strong>how relevant the choice of channel is</strong> when it comes to this market. Now, we will review the organizations that have the biggest impact and can transform a vendor into a king in their sector.&nbsp;</p><p>Understanding the role of the <strong>"kingmakers"</strong> is essential for any cybersecurity company aiming to scale effectively and become a leader, and through this article, we will be discussing who are the most influential ones for vendors that focus not only in business customers (B2B), but also for those that cater to consumers (B2C).&nbsp;</p><p>Buckle up!&nbsp;</p><div><hr></div><h1>Enterprise Cybersecurity Kingmakers</h1><p>When it comes to those cybersecurity companies focusing on business customers, there are clearly at least four candidates for the title of Kingmaker: <strong>Global System Integrators (GSIs)</strong>, <strong>Distributors</strong>, <strong>Cloud Marketplaces </strong>and <strong>Analyst Firms</strong>.&nbsp;</p><p>Each one of them has a different area of influence:&nbsp;</p><ul><li><p><strong>GSIs</strong> focus mostly on medium to large organizations,&nbsp;</p></li><li><p><strong>Distributors</strong> have a higher reach to smaller and medium companies through their <em>channel networks</em>,&nbsp;</p></li><li><p><strong>Cloud Marketplaces</strong> serve any size of organizations in different ways, and some of them are particularly well-suited for <em>Managed Services Providers</em>,&nbsp;</p></li><li><p><strong>Analyst Firms, especially the most relevant ones, cater predominantly to large enterprises, yet their market evaluations and reports shape perceptions across the entire cybersecurity landscape.</strong></p></li></ul><p>Let&#8217;s discuss the role and impact of each one of them below.</p><h2>Global System Integrators (GSIs)</h2><p>GSIs such as <strong>Accenture</strong>, <strong>Deloitte</strong>, or <strong>PwC</strong> deliver sophisticated integration services that align with complex IT environments and high-level security requirements, being instrumental in embedding cybersecurity solutions within large-scale digital transformation projects.&nbsp;</p><blockquote><p>Their extensive client networks and integration capabilities make them vital channels for vendors seeking enterprise adoption.</p></blockquote><p>Finding out exactly how much revenue they make in cybersecurity products isn&#8217;t easy as it is not publicly available information. Estimates place that in the<strong> tens of billions (USD)</strong>, reflecting the footprint they have in the market as well as the demand from their customers for integrated cybersecurity services.</p><p>If we analyze one of them in detail (Accenture), we see that they have a broad <strong><a href="https://www.accenture.com/us-en/services/ecosystem-partners">partner ecosystem</a></strong>. The firm lists around 260 technology partners on its website, including approximately 30 dedicated to cybersecurity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!X_q-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!X_q-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic 424w, https://substackcdn.com/image/fetch/$s_!X_q-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic 848w, https://substackcdn.com/image/fetch/$s_!X_q-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic 1272w, https://substackcdn.com/image/fetch/$s_!X_q-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!X_q-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic" width="1246" height="737" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:737,&quot;width&quot;:1246,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:25031,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/161339626?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!X_q-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic 424w, https://substackcdn.com/image/fetch/$s_!X_q-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic 848w, https://substackcdn.com/image/fetch/$s_!X_q-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic 1272w, https://substackcdn.com/image/fetch/$s_!X_q-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1305c88a-afd2-424e-9abe-0a5e464b4380_1246x737.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The <strong>majority of these partners are based in North America</strong>, with two from Israel and two from Europe. Each of these vendors typically generates <strong>at least several hundred million dollars</strong> in annual recurring revenue (ARR). Accenture has been named Partner of the Year 2025 in the Americas by <strong><a href="https://www.crowdstrike.com/en-us/partners/service-providers/accenture-partnership/">Crowdstrike</a></strong>, for instance.&nbsp;</p><p>Through these partnerships, Accenture covers various security sectors, such as <strong>Training &amp; Human Risk Management</strong>, <strong>Threat Intelligence / Security Operations</strong>, <strong>Network Security / SASE / Firewalls</strong>, <strong>SIEM / Threat Detection &amp; Response</strong>, <strong>Cloud Security / Cloud-Native Application Protection Platforms (CNAPP)</strong>, <strong>Identity &amp; Access Management (IAM) / Identity Governance</strong>, and <strong>Endpoint Protection / Extended Detection &amp; Response (EDR/XDR)</strong>.&nbsp;</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2>Distributors</h2><p>Distributors like Ingram Micro and TD Sinnex, along with their network of channel partners, extend a vendor's market reach by offering bundled solutions and managed services.&nbsp;</p><p>This model not only simplifies procurement for resellers and clients but also fosters recurring revenue streams. As the channel continues to evolve, distributors are becoming technical advisors and managed service providers themselves, enhancing the value delivered to both vendors and customers.</p><p>A strong example of distributor success in cybersecurity is <strong><a href="https://www.nasdaq.com/press-release/crowdstrike-and-shi-international-surpass-1-billion-sales-2024-12-18#:~:text=Together%2C%20CrowdStrike%20and%20SHI%20are,selling%20Falcon">SHI International's partnership with CrowdStrike</a></strong>. The companies announced that SHI has sold over $1 billion worth of CrowdStrike&#8217;s cybersecurity products, making CrowdStrike the first pure-play SaaS security vendor to achieve this milestone through SHI. Notably, over 70% of this $1 billion was generated in just the last three years.&nbsp;</p><p><strong>Palo Alto Networks</strong>, another multi-billion dollar cybersecurity vendor, also demonstrates the critical role of distributors, with <strong><a href="https://financialfreedomisajourney.com/palo-alto-networks-the-current-valuation-is-too-high-2024-8-21/">three primary distribution partners accounting for approximately 45&#8211;47% of its total revenue</a></strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NMe3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NMe3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic 424w, https://substackcdn.com/image/fetch/$s_!NMe3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic 848w, https://substackcdn.com/image/fetch/$s_!NMe3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic 1272w, https://substackcdn.com/image/fetch/$s_!NMe3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NMe3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic" width="1286" height="929" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:929,&quot;width&quot;:1286,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:28998,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/161339626?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NMe3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic 424w, https://substackcdn.com/image/fetch/$s_!NMe3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic 848w, https://substackcdn.com/image/fetch/$s_!NMe3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic 1272w, https://substackcdn.com/image/fetch/$s_!NMe3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8deed662-5eca-4242-82c8-1890a6e737c7_1286x929.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Another example of this successful partnership between distributors and cybersecurity leaders: <strong>Fortinet</strong> relies almost entirely on distribution for its go-to-market model. In fact, a single distributor has accounted for roughly 28&#8211;31% of the company&#8217;s total revenue in recent years, according to their financial reports.&nbsp;</p><h2>Cloud Marketplaces</h2><p>Platforms such as <strong>AWS Marketplace</strong>, <strong>Microsoft Azure Marketplace</strong>, and <strong>Google Cloud Marketplace</strong> offer vendors immediate access to a global customer base. According to <strong>Canalys</strong>, enterprise software sales through these marketplaces are expected to grow from $16 billion in 2023 to $85 billion by 2028. By 2027, over 50% of hyperscaler marketplace sales are forecast to be driven via channel partners.</p><p>One of the primary drivers of cybersecurity software sales on marketplaces like AWS and Azure is t<strong>he ability for customers to apply their committed cloud spend to third-party security solutions</strong>.&nbsp;</p><p>Enterprises frequently enter into large cloud commit contracts with providers like AWS, and purchasing security tools through the marketplace allows them to "burn down" those prepaid credits on critical solutions. <strong>This makes cloud marketplaces not just a procurement convenience, but a financial strategy</strong>.</p><p>CrowdStrike exemplifies the marketplace opportunity. In 2024, the company surpassed $1 billion in annual sales through AWS Marketplace alone. Transactions through AWS were, on average, four times larger than those via traditional channels and closed significantly faster.</p><blockquote><p>With over 50 native integrations with AWS services and a strong partner ecosystem, CrowdStrike demonstrates how a strategic marketplace presence can be a game changer.</p></blockquote><p>Other cybersecurity leaders are also thriving on cloud marketplaces. <strong><a href="https://invisory.co/resources/blog/cloud-marketplace-statistics-you-need-to-know-for-2024/#:~:text=Cloud%20marketplace%20success%20stories">Splunk and Okta have each reached $1 billion in AWS Marketplace sales</a></strong>. Meanwhile, <strong><a href="https://strategyofsecurity.com/p/cyberse-and-the-marketplace-era-of-cybersecurity-purchasing">Wiz has revealed that 50&#8211;60% of its total revenue now flows through cloud marketplaces</a></strong>.&nbsp;</p><p>Besides AWS, Azure or Google Cloud, there are other type of marketplaces that are having a strong impact on the success of cybersecurity companies. One of them is Pax8, that we can classify as a <strong>cloud distributor</strong>.&nbsp;</p><blockquote><p>Pax8 has created a purpose-built platform for MSPs and IT service providers to procure and manage SaaS solutions&#8212;including cybersecurity offerings&#8212;for SMB and mid-market clients.</p></blockquote><p>Pax8&#8217;s marketplace surpassed $1 billion in ARR and reached $2 billion in total revenue within just 18 months. <strong><a href="https://www.crn.com/news/channel-news/2024/pax8-ceo-ai-will-free-up-msps-to-be-so-much-more-to-their-clients">Security offerings are among the most &#8220;highly-utilized&#8221; products within the Pax8 ecosystem.</a></strong></p><p>A recent Pax8 survey highlighted that over one-third of global IT solution providers now generate more than 20% of their revenue via marketplaces, with the highest engagement levels seen in North America and Europe. Being listed in Pax8 has now become a go-to-market strategy for many cybersecurity companies due to their rapid growth and reach.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Analyst Firms</h2><p>Organizations like Gartner and Forrester wield significant influence through their evaluations and market analyses. Inclusion in Gartner's Magic Quadrant or Forrester's Wave reports can substantially boost a vendor's credibility and visibility.&nbsp;</p><p>Gartner produces approximately 25 Magic Quadrants specifically focused on cybersecurity domains, while Forrester regularly publishes Wave reports covering areas such as incident response, risk ratings, and cybersecurity consulting.&nbsp;</p><blockquote><p>These reports directly impact enterprise procurement decisions and vendor strategies not only for end customers but also for distribution channels.</p></blockquote><p>In the past, I made <strong><a href="https://cybersecandbiz.substack.com/p/where-are-the-european-vendors-in?utm_source=publication-search">an analysis of the geographic distribution of the Gartner Magic Quadrant leaders</a></strong>, based on the analysis of 10 of those reports. Out of 40 leaders identified, 33 were based in North America, while only 2 each come from the UK and Israel. Notably, none are headquartered in the European Union.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3i9e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3i9e!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic 424w, https://substackcdn.com/image/fetch/$s_!3i9e!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic 848w, https://substackcdn.com/image/fetch/$s_!3i9e!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic 1272w, https://substackcdn.com/image/fetch/$s_!3i9e!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3i9e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic" width="1333" height="1380" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1380,&quot;width&quot;:1333,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:42560,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/161339626?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3i9e!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic 424w, https://substackcdn.com/image/fetch/$s_!3i9e!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic 848w, https://substackcdn.com/image/fetch/$s_!3i9e!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic 1272w, https://substackcdn.com/image/fetch/$s_!3i9e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d890afe-3df1-4963-8891-736283a7b0e0_1333x1380.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This disparity highlights the dominance of North American vendors in gaining analyst recognition, which in turn reinforces their market leadership.</p><p>Magic Quadrants and Waves aren&#8217;t the only influential outcomes from the analyst firms that vendors seek. Cool Vendor status, Critical Capabilities research and more are badges that cybersecurity companies can use to create strong foundations for their growth strategies.</p><h1>Consumer Cybersecurity Kingmakers&nbsp;</h1><p>The consumer market for cybersecurity, while smaller, still has a lot of potential as I have already explored in a <a href="https://cybersecandbiz.substack.com/p/what-is-the-future-of-the-consumer">previous article</a>. In my opinion, as more people work from home, there is a lot ahead in terms of security for individuals, and understanding who are the most influential companies is highly important.</p><h2>Device Manufacturers</h2><p>OEMs like <strong>Dell</strong>, <strong>HP</strong>, and <strong>Samsung</strong> play a critical role by pre-installing cybersecurity software on consumer devices. These partnerships enable vendors to reach users at the point of sale, often increasing adoption and stickiness.</p><p>For decades, Symantec&#8217;s <strong>Norton</strong> and <strong>McAfee</strong> dominated this space on Windows PCs, effectively leading the market by striking deals with almost every major computer manufacturer.</p><p>This channel made McAfee one of the kings in their space: a <strong><a href="https://ec.europa.eu/competition/mergers/cases/decisions/m5984_1922_2.pdf">2010 European Commission</a></strong> analysis noted that OEM pre-installs were a major channel, accounting for a large portion of consumer antivirus revenue for these companies.&nbsp;</p><p>In McAfee&#8217;s case, the OEM channel was the single largest source of its consumer segment revenue, with partners that included Acer, Dell, HP, Lenovo, Samsung, and Toshiba&#8212;essentially a who&#8217;s who of the PC market.</p><p><strong>Symantec</strong> and <strong>Norton</strong> similarly leveraged these partnerships to become the two largest cybersecurity vendors in the space during the late 2000s. The vast majority of new Windows PCs came with one of the two pre-installed, creating a duopoly that was difficult for other vendors to penetrate.</p><p>Microsoft&#8217;s entry into the space with Windows Defender, starting with Windows 8 and continuing into Windows 10, disrupted the OEM channel by providing a built-in baseline antivirus to all users. However, during the 2000s, the OEM pre-install pipeline was arguably the single biggest factor in Symantec&#8217;s and McAfee&#8217;s global dominance.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2>Retail and E-tail Channels</h2><p>Traditional retailers and online platforms like Amazon are key distribution partners for consumer cybersecurity solutions. Their expansive customer reach and marketing clout amplify product visibility and credibility.</p><p>A compelling historical example is <strong>Kaspersky</strong>, a Russian-founded security firm that broke into Western markets by aggressively expanding retail distribution. In 2002, Kaspersky partnered with MediaGold, a European business development firm, to boost its retail channel presence.</p><p>The goal was to place Kaspersky&#8217;s boxed antivirus products in &#8220;virtually all available retail sales channels&#8221; across key European countries. This push paid off, and over the next decade, Kaspersky became one of Europe&#8217;s most visible consumer security brands, often seen in electronics stores and PC shops.&nbsp;</p><p><strong>By 2016, Kaspersky reported over 400 million users globally and held the largest market share of cybersecurity software in Europe</strong>. Retail visibility, from <strong>Media Markt</strong> in Germany to <strong>Dixon</strong>&#8217;s in the UK, made Kaspersky a household name and a default choice for consumers.</p><p>As sales shifted to digital, e-tail platforms like Amazon emerged as the new battleground. My own experience supports this transition: in markets where ESET had strong visibility and reviews on global e-tailers like Amazon, that exposure directly correlated with market leadership.</p><h2>Telcos and ISPs</h2><p>Telcos and ISPs are increasingly bundling cybersecurity services with broadband packages, providing vendors with access to massive customer bases. <strong><a href="https://omdia.tech.informa.com/om124588/omdia-market-radar-total-consumer-cybersecurity-solutions-for-telcos">Omdia reports a growing trend among telcos to offer total consumer cybersecurity solutions</a></strong>, underscoring the channel's strategic value.</p><p>One of the most prominent examples in this space is <strong>F-Secure</strong>, a Finland-based consumer cybersecurity vendor. Since the early 2000s, F-Secure has focused heavily on the operator channel and built what analysts refer to as "the largest telco operator network" in the cybersecurity industry. This early and strategic commitment to telco partnerships enabled F-Secure to scale its global presence and embed its solutions directly into consumer offerings from telecom providers.&nbsp;</p><p><strong>McAfee</strong> is another major vendor that has leveraged telco relationships to expand its reach. For instance, McAfee partnered with <strong>British Telecom (BT)</strong> to power "BT Virus Protect," a security suite offered free to all BT broadband subscribers. BT marketed this as &#8220;the most comprehensive free online security tools of any major UK broadband provider,&#8221; emphasizing its long-standing partnership with McAfee.</p><p>In Spain and Latin America, <strong>Telef&#243;nica</strong> adopted a "Security by Default" strategy with McAfee, rolling out McAfee-powered protection for all broadband and mobile customers under its Movistar brand. This included router-level protection and multi-device antivirus licensing, with Telef&#243;nica calling it the first instance of a telco delivering comprehensive cybersecurity to all customers regardless of connection type, immediately covering millions of users.</p><p>On the mobile front, <strong>Lookout</strong> offers a notable example. It became a leader in mobile security primarily through carrier preload deals. In 2012, <strong>T-Mobile</strong> began pre-installing Lookout Mobile Security on all Android devices it sold. By 2013, this rollout expanded to most T-Mobile Android handsets, and similar agreements were formed with AT&amp;T and Sprint.&nbsp;</p><p>A major milestone came in 2013 when Lookout partnered with Samsung to embed its software into the Samsung Knox security suite, gaining global reach as the app came pre-installed on all Knox-enabled devices. This dramatically expanded Lookout&#8217;s user base, and by 2014, the company reported over 50 million users worldwide.</p><p>Another notable player in this channel is <strong>Whalebone</strong>, a European cybersecurity firm that has built its presence almost entirely by focusing on telecom operators. The company&#8217;s growth highlights how telco partnerships can provide a robust foundation for scaling cybersecurity offerings to mass markets.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Other Kingmakers</h1><p>There are other entities that could be considered relevant in the making of a cybersecurity leader. For instance, in the consumer market, <strong>magazine reviews</strong> play a significant role, where becoming a leader in one of their comparatives can have a direct impact on the sales of a company.&nbsp;</p><p>Many European companies, for instance, work closely with their local <strong>governments</strong> at the beginning of their journey, which helps them to reach a significant position in their home markets.&nbsp;</p><p>While this can be a strong initial boost, it can also be a blocker. Public sector contracts can provide early-stage support and market legitimacy, but they have a limited reach, as they are only influential within their country.&nbsp;</p><p>On the other hand, regulations, procurement processes and local requirements can easily transform this into a disadvantage, where vendors need to dedicate too much time and effort to maintain their local position instead of being able to develop further globally.&nbsp;</p><p>Other relevant drivers of success are the initial <strong>investors</strong> in the cybersecurity vendors. They can provide expert guidance and support during the early days, and more importantly, they can enable their portfolio companies through introductions to, for instance, the above kingmakers.&nbsp;</p><p>If a cybersecurity startup counts in their board with people that can open the door to Global System Integrators or Distributors, that can put them on the path to success.&nbsp;</p><h1>The Strategy of Success&nbsp;</h1><p>Growing a cybersecurity company takes time, dedication and effort, and most importantly, a winning strategy. Understanding who are the channels or partners that can accelerate the growth of a vendor is key to develop the right approach to the market early on.</p><p>The decisions that cybersecurity startups make in their first steps will influence their future, as even <strong>partnering with the right investors will have an enormous impact</strong>.&nbsp;</p><p>Companies can have the best and most disruptive technology and solution, but if they don&#8217;t find their way to the kingmakers, they will need to work harder to achieve lower results than those that are currently the leaders in the market.&nbsp;</p><p>The above data and insights clearly show what is the reach and coverage that those entities have, and moreover, they play another important role besides being kingmakers: they are also <strong>gatekeepers</strong>.&nbsp;</p><p><strong>While the Customer is the ultimate-decision maker, the kingmakers exert a strong influence on them.</strong> The decisions of Enterprise CISOs, IT buyers and consumers alike are heavily shaped by the endorsements, partnerships and integrations provided by system integrators, distribution partners, analyst firms and the rest.</p><p><strong>The customer decides, yes, but from the choices that are known to them</strong>, and in many cases, those are limited to the options provided by the organizations that they already have relationships with.&nbsp;</p><p>For instance, when a customer already made the decision of working with a particular GSI, they have limited their options to those within their portfolio, and that is the power these organizations have.&nbsp;</p><p>Knowing what is the impact of the kingmakers in the cybersecurity market helps vendors, from startups to established ones, to develop the right strategy for them and truly become the leaders in their sectors.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.linkedin.com/in/ignaciosbampato/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nzhK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nzhK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png" width="728" height="182" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:364,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:258628,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/in/ignaciosbampato/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecandbiz.substack.com/i/166135919?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!nzhK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 424w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 848w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 1272w, https://substackcdn.com/image/fetch/$s_!nzhK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab35de7-bea6-4b20-bc27-990e9b684343_1584x396.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecandbiz.substack.com/p/kingmakers-in-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Strategic Partnerships Canvas]]></title><description><![CDATA[A Guide & Tool to Build Successful Alliances]]></description><link>https://cybersecandbiz.substack.com/p/strategic-partnerships-canvas</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/strategic-partnerships-canvas</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Mon, 24 Feb 2025 11:22:51 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/21f52648-626e-4efb-b4cc-32df4f0844c4_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Businesses can grow on their own, but <strong>most successful companies rely on partnerships</strong>. Collaborating with others helps companies expand, enter new markets, develop new technologies and products, and improve their services.&nbsp;</p><p>For example, in the pharmaceutical industry, partnerships between research institutions and drug manufacturers help develop new medicines.&nbsp;</p><p>And if we want some statistics to validate the impact of alliances, <a href="https://www.forbes.com/sites/katevitasek/2022/11/30/partnerships-three-data-backed-reasons-two-heads-are-better-than-one/?utm_source=chatgpt.com">95 % of Microsoft&#8217;s revenue comes through its channel partners ecosystem</a>, and <a href="https://www.globalfleet.com/en/manufacturers/global/analysis/massive-production-and-price-cuts-how-did-tesla-panasonic-alliance-thrive-over-years?t%5B0%5D=Tesla&amp;t%5B1%5D=Electrification&amp;curl=1">Tesla and Panasonic partnered to develop batteries</a> that saved the car manufacturer significant costs. In the IT industry, more than <a href="https://canalys.com/insights/it-spending-forecasts-2025">70% of business deals come from partnerships</a>.&nbsp;</p><p>Companies form partnerships for different reasons: to protect their market, to grow, or to share knowledge and resources, are some of the most common.</p><p>The more important alliances, usually called <strong>Strategic partnerships</strong>,&nbsp; bring two companies together for a very impactful shared goal.&nbsp;</p><p>To make it easier for businesses and professionals to create strong partnerships, I&#8217;ve developed the <strong><a href="https://miro.com/miroverse/a-strategic-partnerships-canvas/">Strategic Partnerships Canvas</a>,</strong> a free tool available on <a href="https://miro.com/">Miro.com</a>.&nbsp;</p><p>The goal is to provide a structured yet flexible approach that simplifies the complexities of partnerships, making collaboration more accessible and effective for professionals worldwide, no matter their background or experience.</p><h1>The Canvas: A Simple Approach to Complex Collaborations</h1><p>Forming a strategic partnership requires many steps and agreements. The Strategic Partnerships Canvas is a tool that helps partners define and organize their collaboration. It can also be used by a company alone to plan the kind of partner they need.&nbsp;</p><p>This Canvas&#8217; goal is not to be a perfect solution for every case, but a practical tool for professionals working with partnerships. It aims to address all important aspects of a partnership before it actually begins, planning and organizing the alliance in a structured way, and setting it up for success.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Overview</h2><p>The <strong>Strategic Partnerships Canvas</strong> is structured to help companies build partnerships step by step, ensuring a clear and organized approach.&nbsp;</p><p>It starts with the <strong>setup phase</strong>, where partners define the partnership&#8217;s purpose, values, and target customers. This helps align both companies from the beginning and ensures they have a shared vision.</p><p>Once the foundation is established, the focus shifts to <strong>defining goals and responsibilities</strong>. Each company outlines its individual goals and expectations while also identifying shared objectives. This clarity helps avoid misunderstandings and ensures both parties contribute effectively.</p><p>Next, the <strong>governance and operational structure</strong> are set up. This includes defining how decisions will be made, setting up performance metrics (KPIs), and determining how often the partnership will be evaluated. For example, businesses use a mix of lead and lag indicators to track progress and adjust their strategy as needed.</p><p>The <strong>execution phase</strong> covers key activities, necessary resources, and the tools or processes that will support the partnership. Companies define the activities they will undertake, the people responsible, and the systems that will be used to manage operations efficiently.</p><p>Finally, the Canvas addresses <strong>results, rewards, and exit criteria</strong>. Partners agree on expected outcomes, how rewards and responsibilities will be distributed, and under what conditions the partnership should be modified or terminated. For instance, exit criteria can include reaching a revenue target or a significant change in market conditions.</p><p>By following this structured approach, companies can navigate the complexities of strategic partnerships in a logical and effective way, reducing risks and maximizing the value of their collaboration.</p><h2>How to Use the Canvas</h2><p>Using the Strategic Partnerships Canvas effectively requires collaboration and structured discussions. Partners should work through each section step by step, ensuring all key elements are covered before moving forward to the next.</p><p>This can be done through a series of workshops between the parties where each part of the Canvas is co-created. The first parts of this tool include specific sections so each partner can define their own expectations before moving on to agreeing on the common ones.</p><blockquote><p>This is very important as while the goal of the partnership needs to be the same for both parts, it&#8217;s clear that they don&#8217;t necessarily have the same individual objectives.&nbsp;</p></blockquote><p>Defining how the strategic partnership will be governed should come next, and this needs to include not only performance metrics but also how those will be evaluated and reviewed. Having a clear accountability framework will ensure both parties remain committed to the agreement.</p><p>The Canvas brings the accountability to an individual level at this step, where it is expected that even the specific responsible people within each organization will be defined at this stage.</p><p>Only after all the above, the partners should work together on the execution, as this relies on the previously well-defined roles and streamlined common workflows. The tool provides space to agree on the most important areas of this stage that can be expanded with other more detailed ones.&nbsp;</p><p>Finally, the parties should define two very important topics: <strong>success</strong> and <strong>exit</strong>. Establishing what success looks like, how rewards and responsibilities will be shared, and under what circumstances the partnership may end helps ensure a smooth collaboration. By setting clear expectations for success and exit strategies, companies can avoid uncertainty and protect their investments.</p><p>During the above process, there are several key questions that need to be answered, which are included in the Canvas itself. For instance:&nbsp;</p><ul><li><p>What is the goal of this partnership?</p></li><li><p>What value does it create for customers?</p></li><li><p>What are our shared goals?</p></li><li><p>What are the roles and responsibilities of each company?</p></li><li><p>How will we measure success?</p></li><li><p>What key activities and systems are needed?</p></li><li><p>What are the criteria for success and exit?</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Delivering Value for Everyone Involved</strong></h3><p>Some time ago I created another Canvas, the <strong><a href="https://cybersecandbiz.substack.com/p/value-based-partnerships-canvas">Value-Based Partnerships Canvas</a></strong>, which focuses on how to balance Margins, Effort and Delight. Those principles drive any partnership, strategic or not.&nbsp;</p><p>Seeing the great response I&#8217;ve received to that tool and the struggles that professionals and organizations have in creating truly strategic partnerships, this new tool came to life.&nbsp;</p><p>The goal is always the same: <strong>creating, capturing and delivering value for everyone involved</strong>. However, the Strategic Partnerships Canvas is a practical step-by-step framework that, based on my experience, can help to avoid many of the most common pitfalls in developing truly strategic alliances.&nbsp;</p><p>By following its structured approach, companies can design partnerships that are clear, efficient, and beneficial for all parties.&nbsp;</p><p>While it may seem complex at first, the Canvas provides a clear roadmap that makes the process easier. Whether used with a partner or alone, it helps companies think critically and create strong, lasting partnerships.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/strategic-partnerships-canvas?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/strategic-partnerships-canvas?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecandbiz.substack.com/p/strategic-partnerships-canvas?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Humans Are the Weakest Link—But Which Humans?]]></title><description><![CDATA[Why Cybersecurity Failures Are Leadership Failures, Not User Mistakes]]></description><link>https://cybersecandbiz.substack.com/p/humans-are-the-weakest-link</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/humans-are-the-weakest-link</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Thu, 06 Feb 2025 12:22:31 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6f41b7fc-5c37-4626-b9dd-7dff9b129b02_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For years, cybersecurity professionals have echoed the phrase: <strong>&#8220;Humans are the weakest link.&#8221;</strong> It&#8217;s often used to explain why phishing attacks succeed, why credentials get stolen, and why ransomware spreads. The assumption? That end users&#8212;everyday employees working with computers&#8212;are the primary culprits.</p><p><strong>But I believe that we&#8217;ve been looking at it the wrong way.&nbsp;</strong></p><p>The real weak link isn&#8217;t the employees clicking on malicious emails, but rather the <strong>decision-makers responsible for securing the organization</strong>. At least, both users and those responsible for cybersecurity should share the label.</p><h1><strong>Rethinking the &#8220;Weakest Link&#8221; Narrative</strong></h1><p>Consider a common scenario: A company suffers a major security breach after an employee&#8217;s credentials are leaked on the dark web. The credentials were valid because <strong>multi-factor authentication (MFA) wasn&#8217;t enabled.</strong></p><p>One would consider this un-thinkable nowadays, but last year&#8217;s breaches at <strong><a href="https://www.theverge.com/2024/10/25/24279288/unitedhealth-change-breach-100-million-leak?utm_source=chatgpt.com">UnitedHealth Group</a></strong> and <strong><a href="https://www.channelinsider.com/news-and-trends/us/snowflake-data-breach-sparks-mfa-enforcement-urgency/?utm_source=chatgpt.com">Snowflake</a></strong> show that this happens more often than not.</p><p>Now, let&#8217;s ask: <strong>Who was the actual weak link?</strong></p><ul><li><p>The employee whose password was leaked?</p></li><li><p>The IT administrator who didn&#8217;t enforce MFA?</p></li><li><p>The CISO who didn&#8217;t prioritize MFA in the company&#8217;s security policy?</p></li><li><p>The budget owner who refused to allocate resources for security improvements?</p></li></ul><p>If we focus only on the end user, we ignore the <strong>systemic failures</strong> that allowed the breach to happen. Users are only as strong as the security environment built around them, and no cybersecurity awareness training will fix that.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>Failures in Basic Cyber Hygiene</strong></h1><p>Beyond MFA, <strong>there are numerous cybersecurity practices that are well-documented yet frequently neglected</strong>. Unpatched and outdated systems, vulnerable applications, lack of backup and recovery, poor endpoint protection&#8230; these basic hygiene recommendations have not changed since the dawn of computers.&nbsp;</p><p>However, many breaches start because one of them have not been properly in place. <strong>Who is responsible when organizations fail to implement them?</strong></p><p>Patching known vulnerabilities is a fundamental security task. Yet, <strong>many breaches occur due to unpatched software</strong>&#8212;sometimes for months or even years after a fix is available. This isn&#8217;t an employee clicking a bad link; it&#8217;s a failure of IT and security leadership to maintain a structured patch management process.</p><h1><strong>Beyond the Commonly Recommended Best Practices</strong></h1><p>Besides these widely known cyber hygiene practices, there are simple yet powerful ways to minimize problems. For example, <strong>phishing remains one of the most effective attack vectors.&nbsp;</strong></p><p>Yet, many organizations <strong>do not implement simple email authentication protocols</strong> like SPF, DKIM, and DMARC&#8212;measures that could <strong>significantly reduce phishing attempts</strong> that appear to come from legitimate sources.&nbsp;</p><p>A provider of solutions that can support organizations in improving their email security posture, <strong><a href="https://sendmarc.com">Sendmarc</a></strong>, has found that <a href="https://sendmarc.com/blog/understanding-dmarc-policies/">the majority of organizations have at least one of those controls poorly implemented</a> or not present at all.&nbsp;</p><p>Appropriate DMARC configuration would <strong>reduce email impersonation</strong> close to zero. If employees receive convincing phishing emails, should we blame them for falling for it, or the <strong>security team for failing to prevent those emails from reaching inboxes in the first place</strong>?</p><h2>There&#8217;s more&#8230;</h2><p>Some say that <em>Identity is the new perimeter</em>, and considering the amount of SaaS and Cloud applications that businesses are using, that definitely makes sense. But, the majority of companies around the world have poor or non-existent best practices in place to manage identities and their privileges.</p><p>Considering that <a href="https://www.linkedin.com/company/18267814/admin/page-posts/published/">at least 1/3 of breaches start inside an organization</a>, <strong>how security teams continue to have issues to prioritize appropriate identity and privilege management?</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>The Real Responsibility: Cybersecurity Leaders (kind of)</strong></h1><p>Cybersecurity is not just a technical problem&#8212;it&#8217;s a leadership and accountability problem. <strong>Blaming users for security failures is easy, but it ignores the real issue: security is an organizational responsibility.</strong></p><p>If security is weak, it&#8217;s not because employees are careless&#8212;it&#8217;s because leadership hasn&#8217;t built a resilient security culture.</p><p>That doesn&#8217;t mean everything is on the shoulders of the CISO or Cybersecurity team. They definitely have their own challenges to address. In an industry that has de-prioritized prevention and has become more complex, their resources and tools can be scarce.</p><p>However, <strong>the focus should shift from blaming users to system resilience</strong>, and to make sure the basic security measures are in place. All business leaders need to ensure that security is a part of their organization before an attack and not an afterthought.</p><p>At the end of the day, Cybersecurity leaders as well as those responsible for budgets and resources within an organization must acknowledge that the strength - or weakness - of an organization&#8217;s cybersecurity posture rests on their shoulders. </p><p>It&#8217;s time to move beyond the outdated narrative that &#8220;humans are the weakest link&#8221; and ask the real question: <strong>Which humans are responsible for making cybersecurity stronger?</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/humans-are-the-weakest-link?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/humans-are-the-weakest-link?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecandbiz.substack.com/p/humans-are-the-weakest-link?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Playing-to-Win Strategy]]></title><description><![CDATA[Apply the Play to Win framework to Cybersecurity Startups]]></description><link>https://cybersecandbiz.substack.com/p/playing-to-win-strategy</link><guid isPermaLink="false">https://cybersecandbiz.substack.com/p/playing-to-win-strategy</guid><dc:creator><![CDATA[Ignacio Sbampato]]></dc:creator><pubDate>Tue, 22 Oct 2024 03:18:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/78a87872-36ee-4bfd-ac50-a8aca5144a2e_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the fast-changing world of cybersecurity, startups need a clear strategy to handle challenges and beat competitors. Statistics show that <strong><a href="https://startupgenome.com/article/the-state-of-the-global-startup-economy#">around 90% of startups fail</a></strong>, often because they lack a clear strategy. This isn't only about the Go-to-Market (GTM) strategy. It's also about how the whole company is expected to operate and succeed.&nbsp;</p><p>Also, research shows that <strong><a href="https://hbr.org/2017/11/executives-fail-to-execute-strategy-because-theyre-too-internally-focused">up to 67% of business strategies fail</a></strong> due to poor execution. These numbers show how important it is to have a clear plan and execute on it, especially in a fast-moving field like cybersecurity.&amp;#x20;</p><p>The <strong><a href="https://www.amazon.com/Playing-Win-Strategy-Really-Works/dp/142218739X">Play to Win framework</a></strong>, created by A.G. Lafley and Roger L. Martin, helps startups design a strategy, following a established structure, that can easily be transformed into an execution plan that makes them stand out.</p><p>When I started working at ESET in Latin America, there was an open field with immense potential. The challenge was clear: <strong>where to focus, how to win, and how to become a leader in cybersecurity in the region.</strong></p><p>As a bootstrapped company, our limited budget meant we couldn't compete with bigger players with the same tools they had. There were already strong competitors in the region, like Symantec, Trend Micro, and McAfee, each with a established and large &nbsp;commercial operations and several years in the region.</p><p>Once we researched the market and evaluated our findings, we identified two key factors that could help us: <strong>our competitors didn't have strong cybersecurity experts in the region, and the majority of the region shares one language</strong>&#8212;Spanish.</p><p>We defined a simple strategy&#8212;use our product's strengths for consumers and small businesses, become thought leaders by sharing unique insights with local media and the market at large, and focus on recruiting channel partners.</p><p>We specifically targeted value-added resellers (VARs) that were already working in industries related to cybersecurity, but not necessarily had another antivirus in their portfolio.</p><p>To reach channel partners and the market, we participated in and organized events. We partnered with universities to provide cybersecurity masterclasses at their facilities&#8212;something that nobody else was doing&#8212;and ensured we were present in at least one key IT or cybersecurity event in every regional country.</p><p>Lastly, we partnered with a regional media outlet specialized in channel partnerships to increase our reach to the local market.</p><p>This combination became our winning approach and helped us establish a position in the region.</p><p>We did the above following a similar framework to the one described by Lafley and Martin in their Playing to Win book. This helped us become a&nbsp;leader in cybersecurity in the region in just a few years. Of course, the strategy evolved over time, as it is crucial to evaluate and iterate regularly, but the core principles remained consistent since the very beginning.</p><p><strong>My experience at ESET in Latin America demonstrates how applying the Play to Win framework can create a significant strategic advantage, even in challenging environments.</strong></p><p>By leveraging clear focus areas, building on existing strengths and identifying opportunities as well as competitors' weak spots. Moving fast and with determination, we were able to establish a leading position in the cybersecurity market.</p><p>This approach is particularly valuable for startups, as it provides a structured yet flexible way to make strategic decisions, maximize resources, and iterate over time, and <strong>helps to make product as well as GTM decisions</strong>.</p><p>Let's explore how cybersecurity startups can apply this strategy to fuel their growth and success.</p><h1>Define Your Winning Aspiration</h1><p>For any cybersecurity startup, the first step is to identify what <strong>"winning"</strong> looks like. Are you looking to become a leading provider of endpoint security to SMEs? Or do you aim to create a groundbreaking zero-trust solution for large enterprises?</p><p><strong>Winning aspirations should be ambitious yet focused, providing a clear goal&nbsp;for the company.</strong> For example, a startup could define its aspiration as "becoming the go-to provider for AI-powered threat detection for healthcare institutions." A clear and inspiring goal helps guide decisions and keeps the whole team focused on the same target.</p><p>In our case, we defined that we wanted <strong>to become the established cybersecurity thought leader in the region</strong>, focusing on providing value to the market besides our products, that we targeted towards small and medium businesses, education institution and government agencies.</p><p><strong>Focusing in more than just the commercial aspects of our operation helped us to build trust as our byproduct of our activities</strong>. We weren't <em>"just an antivirus"</em> company, we were the go-to-source when it came to cybersecurity.</p><p>Moreover, we very clearly decided that we would be <strong>100% focused on the channel</strong>, not having any sort of direct sales. This also provided confidence to those that were working with us that we would never compete with them, something that competitors were doing.</p><div class="pullquote"><p>"Becoming the Latin American cybersecurity thought leader and the company that the channel can trust" became our main objective.</p></div><p>We were not just selling antivirus; our purpose - our "winning aspiration" - was to help customers and channel partners become more secure, no matter which solution they chose at the end. Our focus on providing expert insights and educating the market, as a thought leader, was the vehicle for building that trust.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Choose Where to Play</h1><p>Cybersecurity is a broad field, spanning areas like network security, cloud protection, identity management, and more. Startups must choose their battlefields wisely.</p><p>The <strong>"where to play"</strong> decision is about selecting the market segments, customer types, and geographic regions that offer the best opportunities.</p><p>For instance, a startup might decide to focus specifically on providing cloud security solutions to mid-sized fintech companies in North America. By narrowing their focus, they can specialize deeply and deliver greater value compared to trying to serve every segment at once.</p><p>This extends the "winning aspiration" further, and provides guidance to the GTM  and other activities that come after creating the company strategy.&nbsp;</p><p><strong>One example of a company that clearly defined their "where to play" is Wiz, a cloud security startup that became an unicorn already.</strong> Wiz chose to focus on providing cloud security solutions for enterprises that are migrating to or managing complex cloud environments.</p><p>By focusing exclusively on cloud security, Wiz was able to address the unique challenges associated with multi-cloud and hybrid environments, delivering specialized insights and tools that traditional security vendors struggled to provide effectively.</p><p>This hyper-focused initial approach allowed Wiz to clearly define the following steps in their strategy. By being clear about where to play, Wiz could plan their resources, skills, and strengths better, which gave them an advantage in executing their strategy well.</p><h1>Determine How to Win</h1><p>Once the "where to play" is defined, the next step is deciding <strong>"how to win"</strong>. In cybersecurity, this often comes down to differentiating yourself in a crowded space.</p><p>A startup might focus on leveraging proprietary AI algorithms to detect threats faster than competitors, or they could provide a unique user experience that makes compliance simpler for non-technical users.</p><p><strong>The "how to win" strategy involves identifying the elements that give you a competitive edge</strong>&#8212;whether it's technology, exceptional customer service, speed of execution, or something else entirely, even the way the organization is structured.</p><p><strong>A great example of a successful "how to win" approach  is CrowdStrike</strong>. Everyone knows the large company they have become today, but when they started, their scope was more narrowed, competing with established and next-gen antivirus and endpoint security companies.</p><p>A key reason why they succeeded was that their agent could be installed on endpoints where another competitive product was already deployed, something that wasn't possible with other established vendors at the time.</p><p>By offering this capability, CrowdStrike was able to position itself as a "second opinion" for end customers. Once customers experienced what CrowdStrike could do, it made removing the existing solution more trivial.</p><p>This  helped mitigate the Total Cost of Ownership (TCO) associated with switching endpoint security solutions, which has always been one of the largest obstacles in this sector.</p><p>Furthermore, CrowdStrike's commitment to being cloud-first, at a time when no other established vendor had adopted this approach, further differentiated them.</p><p>These factors guided not only their GTM activities but also their product decisions and, along with other key strategies, helped them succeed and become the industry leader they are today.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/playing-to-win-strategy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/p/playing-to-win-strategy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecandbiz.substack.com/p/playing-to-win-strategy?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h1>Develop the Core Capabilities</h1><p>Winning in the cybersecurity world requires certain <strong>core capabilities</strong>. These are the strengths that allow your startup to execute its "how to win" strategy effectively.</p><p>If your goal is to provide cutting-edge AI-driven threat detection, then your core capability might be a team of highly skilled data scientists and cybersecurity experts.</p><p>Alternatively, if your strategy revolves around exceptional customer support, you might need a world-class onboarding process and an agile support team. Building these skills with clear focus is essential for keeping a competitive edge.</p><p>At ESET in Latin America, we wanted to become cybersecurity thought leaders. <strong>We needed experts</strong> in our team that could influence the market, and those are a limited "resource". What did we do? <strong>We created them</strong>.</p><p>We partnered with universities around the region to raise the awareness of the most relevant topics in the industry and to develop programs to educate the future experts in cybersecurity.&nbsp;</p><p>This made sure we always had the people we needed to carry out our strategy, and even after 20 years, these programs still give local cybersecurity enthusiasts the chance to become professionals, work at ESET or even in other cybersecurity companies.</p><h1>Set Up Systems to Support Your Strategy</h1><p>Lastly, implementing a Play to Win strategy means <strong>building the right systems to support your startup</strong>. This includes setting up processes for rapid product iteration, fostering partnerships with key technology vendors, or even establishing an efficient go-to-market approach.</p><p>In cybersecurity, the threat landscape changes constantly, and having adaptable processes is crucial for staying relevant. <strong>Align your operations, culture, and decision-making mechanisms to reinforce the strategy</strong>, ensuring every team member knows how their role contributes to the overall aspiration.</p><p>In order to be the company they are today, systems and infrastructure became a key part of CrowdStrike's strategy. As a cloud-first company, they needed a partner in the cloud service providers world, and they found it in AWS. This was a win-win for both, as CrowdStrike became a great example of how to scale with AWS, which gave them preferred access to AWS services, and the Amazon service had a great success story to share.</p><p>Not only that, they made use of Salesforce to create commercial processes that would make a difference. In the early days, setting up a demo with an endpoint security vendor was a struggle, and CrowdStrike facilitated that process to the extreme, using Salesforce as their commercial platform.</p><p>When we were developing the Latin American market for ESET, my team and I made sure that we had the systems we needed to support our thought leadership and partnerships operations.</p><p>Maybe other systems we had were less mature, but with the above being our north stars, we were able to provide great insights to media and influencers regularly. We had data that no other company had in the region, and we gave tools to our partners to connect with us in the most streamlined way.</p><p><strong>Staying focused on our goals, activities, systems, and how we made decisions was how we achieved our strategy</strong>. Staying firm in our strategic goals, and ensuring every action aligned with our objectives, was how we ultimately succeeded.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cybersecandbiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cybersecurity &amp; Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Playing-to-Win: A Focused Path to Success</h1><p>There are many frameworks you can use to develop a strategy for your company, and many of them have their advantages and disadvantages.</p><p><strong>Using the Play to Win strategy in a cybersecurity startup means making clear choices&#8212;where to focus, how to stand out, and which skills to develop.</strong></p><p>It encourages startups to think deeply about their ambitions and the specific steps they need to achieve them, and guides other key activities and decisions, like the product development and GTM activities, even the hiring practices.</p><p><strong>In a highly competitive and constantly shifting field like cybersecurity, this clarity can be the difference between becoming a market leader and getting lost in the noise.</strong> By playing to win, cybersecurity startups can create a unique space and build resilience for the long haul.</p><div><hr></div><p>If you are a Miro.com user, you can utilize <strong><a href="https://miro.com/miroverse/integrated-strategy-map-template/?utm_source=sfmc&amp;utm_medium=email&amp;utm_campaign=trans-triggered-miroverse-approved-published?social=copy-link">this template</a></strong> to develop your Play to Win strategy.</p>]]></content:encoded></item></channel></rss>