• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Understanding Cybersecurity Technology and Writing Cybersecurity RFPs

When it comes to cybersecurity technology, you want to make sure you’re managing risk assessment. We break it down and then tell you how to write a cybersecurity technology RFP.

August 29, 2017 Jonathan Blackwood 5 Comments

Cyber Security

When people talk about cybersecurity they tend to focus too much on technology. Technology is a moat in cybersecurity – it is people and policy that make the castle. Cybersecurity should really be compared to emergency management.

If you go into any organization and ask a random employee what to do if the fire alarm sounds, they’ll likely know. Head to hallway A, descend staircase B, and exit through door C. Ask the same employee what to do in case of a ransomware attack, and they likely won’t know to disconnect the computer from the network and notify the security manager.

One of the reasons for this is that safety measures are mandated by OSHA, where cybersecurity is unregulated. This means that there is nothing to stop anyone from selling cybersecurity. A tattoo artist needs a license, but a cybersecurity provider doesn’t. The onus is on the customer to do due diligence and exercise due care.

Writing a Cybersecurity Technology RFP

Before you even write cybersecurity into your RFP, ensure that there is a designated security manager at your institution. Involve them in the process and make that person clear in the RFP. If it’s you, say so. If it’s someone else, include their name and title in the RFP so the provider knows. If there is a hierarchy, include all of the relevant players. This not only helps the provider, but it will help your organization to have each employee understand who to go to in a cybersecurity emergency.

Next, explain what your company does. What’s the mission? What’s the objective? Explain how your company is organized. Is it a C Corp, S Corp, LLC, or privately owned?

All of your needs are going to stem from what you provide. If you’re a retailer then you’ll want to keep customer credit card information secure. If you’re a manufacturer you’ll be more worried about internal documents around products. If you’re a healthcare institute you’ll be worried about patient medical information. If you’re an accounting agency it’s all about financial data.

For this next part, make sure the provider signs a non-disclosure agreement. Then tell them everything about your network. The good, the bad, and the ugly. Without a full picture of your network then they can’t fully secure it. They need to know how the network is configured, how everything is sub-netted, how the firewall is set up, what policies are like. They need a complete schematic to properly secure the network.

Technology is still important to cybersecurity, however. The technology out there is actually pretty good. Firewalls, advanced endpoint security, intruder detection systems (IDS), and deep packet inspection analysis tools, are all part of a strong cybersecurity portfolio. You may also want to invest in vulnerability scanning or penetration testing software to regularly test your network.

One of the things companies can look at is IPv6. It’s a steep hill to climb, but IPv6 is a next-generation internet protocol with security features built directly into it. Not only that, much of the malware that is currently circulating, especially automated malware, is designed to work with IPv4 and not IPv6. That won’t be the case forever, but a long-term security strategy could include upgrading the internal network to IPv6 to get ahead of the curve for now.

In any case, leave room for flexibility. Your provider will recommend the products they think best suit your business, and you can work with the provider to pick the perfect vendor.

Make sure to include how your employees work as well. If there is a large presence of remote employees on the network daily, they need to know. If there are BYOD devices or company-owned devices interacting with the network, they need to know. If there are IoT devices, sensors, or AV equipment connected to the network, they need to know. Anything connected is a potential entry point for an intruder.

Finally, express your needs for ongoing support. There needs to be a written incident response plan as part of the program. Will you need training for employees? Will you need policies and best practices put in place? Will you need the provider to design safety drills and protocols? Will you need assistance if and when an attack occurs? This is all possible with your cybersecurity provider, but they need to know up front in order to give you a proper bid that takes the cost of ongoing support into account.

Pages: Page 1 Page 2

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Cyber Attacks, Cyber Security, IT Installer, RFP, Technology RFP

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Comments

  1. Larry Weaver says

    January 23, 2019 at 4:50 pm

    Thanks for the advice to keep customer credit card information secure. My dad is looking to start up a small retail shop in his neighborhood, and I think he needs help with handling credit card info secure. I’ll suggest he look into cybersecurity for his business.

    Reply

Trackbacks

  1. 50+ AMX by Harman AV Products Earn Cybersecurity Classification from DoD Information Network - Commercial Integrator says:
    April 4, 2018 at 4:54 pm

    […] Read Next: How to help your customer write a cybersecurity RFP […]

    Reply
  2. 9 Cyber Security Training Videos That Aren’t Boring - My TechDecisions says:
    July 5, 2018 at 10:53 am

    […] CIO, IT director or IT professional what keeps them up at night and they’re likely to acknowledge cyber security risks at their organization. The reason they lose sleep isn’t because of their lack of due diligence. In fact, it’s likely […]

    Reply
  3. Cybersecurity Awareness Month: 8 Ways to ‘Celebrate’ with Your Employees - My TechDecisions says:
    October 11, 2018 at 2:00 pm

    […] October is Cybersecurity Awareness Month, so ’tis the season for IT professionals to have some constructive conversations with employees about cybersecurity. […]

    Reply
  4. 2 Business-Crushing AV Trends I Hope Aren’t in 2019 State of the Industry Report - Commercial Integrator says:
    October 16, 2018 at 1:01 pm

    […] There is nothing more important to an IT director than cybersecurity. […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.