• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Understanding Cybersecurity Technology and Writing Cybersecurity RFPs

When it comes to cybersecurity technology, you want to make sure you’re managing risk assessment. We break it down and then tell you how to write a cybersecurity technology RFP.

August 29, 2017 Jonathan Blackwood 5 Comments

Cyber Security

Choosing a Cybersecurity Provider

When choosing a partner, do your research. Possibly the strongest sector when it comes to cybersecurity is the Department of Defense. The DoD uses a directive called DoD 8570 to ensure anyone working in the system is qualified. It’s a vendor-agnostic policy that can be received by obtaining different cybersecurity certifications. Different levels of DoD 8570 are reached by obtaining different certifications, such as SSCP, GSEC, CISA, GCIH, GCED, CISSP, CASP, CAP and more. A quick Google search will land you on a chart that spells out the different levels and corresponding certifications.

In lieu of searching for a needle in the unregulated haystack that is the cybersecurity industry, use DoD 8570 as a starting point. This will narrow your search down to more qualified, highly certified potential partners. Search for providers with DoD 8570 qualifications, or many of the certifications associated with DoD 8570. Cybersecurity is a specialty that goes beyond IT – you want someone that has special qualifications. Listen for providers that talk about risk assessment and their certifications.

Related: Ultimate Guide to Cybersecurity

Getting Buy-In from Key Stakeholders

When you’re ready to upgrade your cybersecurity portfolio, the first obstacle can be stakeholders within your company. Outside of the IT department, it’s not always understood why a stronger cybersecurity strategy is needed – especially a costly one. In this case you need to know your audience.

Whoever is going to approve your budget wants to see cybersecurity expressed in terms of risk management. They want to see it in dollars and cents. There are multiple equations designed by groups like CISSP that take annual rate of occurrence, exposure factor, and loss expectancy and determine a true cost risk analysis for you to present.

For 99 percent of businesses, cybersecurity is a cost center, and only makes sense to the extent that it reduces business risk or saves money. A CFO or other key stakeholder is going to want to know how much it costs and how much it’s going to save the organization in the event of a breach. Use equations, plug your data in, and show the stakeholder that different breaches will cost, how often they’re expected, and how purchasing a new technology can mitigate that cost. Then you’re providing a legitimate return on investment that stakeholders can buy into.

Ongoing Support

Any given organization needs to assume that it’s been breached or it will be breached at some point in time. Structure policies and technology accordingly.

Whether the cybersecurity provider is designing policies and drills or you’re doing it yourself, nothing has to be designed from the ground up. These frameworks all exist – again, the DoD has protocols such as STIGs and NISPOM. While stringent, these can be expensive to implement. There are also standards created by NIST and ISO that give frameworks for cybersecurity drills, policies and best practices that can be adopted by any organization. The Defense Security Service website has a ton of information for free that can help you build your own policy.

Finally, you’ll want to test your network as often as possible. In the DoD, vulnerability scans are conducted every month. PCI calls for them quarterly. In any case, vulnerability scans should be done regularly. A hacker could get into your network, not find anything they want, but leave a toehold in your network in case they want something down the line. If you don’t scan for them, they’ll stay there forever without you noticing. Make sure you scan after business hours. A number of different tools are available to automatically scan for vulnerabilities, and members of your staff can review results.

If you find a vulnerability you can move onto active exploitation, if you’re willing to take the risk. Active exploitation involves hiring ethical hacking companies to conduct white box or black box hacks of your system. This means the company will hack your network to discover vulnerabilities, either with prior knowledge of your system (white box) or without (black box). This will give you a detailed view of how a vulnerability can be used against you. You can also hire these services if no vulnerability was found but you still want a deeper test of your security measures.

Whatever the reason, ensure that the software, employee, or third party that is testing your system is totally separate from your cybersecurity provider. If you do it internally, the person testing and the person reviewing should be two separate people to mitigate insider threat and corporate espionage. If you hire a third party, ensure that they have no connection to your cybersecurity provider to ensure they are disinterested. You want them to find the problems. This is called a separation of duties and is crucial in the testing phase.

Cybersecurity is one of the most complicated technical problems of our time. There’s a reason you see a new hacking scandal in the news every week. You will be compromised at some point. However, writing a solid RFP, choosing the right provider, putting policies in place, and regularly testing your system will help mitigate the fallout of any potential attack.

 

Special thanks to Jason McNew of Stronghold Cyber Security for providing information. Learn more about cybersecurity technology from Jason’s interview on My TechDecisions Podcast.

Pages: Page 1 Page 2

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Cyber Attacks, Cyber Security, IT Installer, RFP, Technology RFP

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Comments

  1. Larry Weaver says

    January 23, 2019 at 4:50 pm

    Thanks for the advice to keep customer credit card information secure. My dad is looking to start up a small retail shop in his neighborhood, and I think he needs help with handling credit card info secure. I’ll suggest he look into cybersecurity for his business.

    Reply

Trackbacks

  1. 50+ AMX by Harman AV Products Earn Cybersecurity Classification from DoD Information Network - Commercial Integrator says:
    April 4, 2018 at 4:54 pm

    […] Read Next: How to help your customer write a cybersecurity RFP […]

    Reply
  2. 9 Cyber Security Training Videos That Aren’t Boring - My TechDecisions says:
    July 5, 2018 at 10:53 am

    […] CIO, IT director or IT professional what keeps them up at night and they’re likely to acknowledge cyber security risks at their organization. The reason they lose sleep isn’t because of their lack of due diligence. In fact, it’s likely […]

    Reply
  3. Cybersecurity Awareness Month: 8 Ways to ‘Celebrate’ with Your Employees - My TechDecisions says:
    October 11, 2018 at 2:00 pm

    […] October is Cybersecurity Awareness Month, so ’tis the season for IT professionals to have some constructive conversations with employees about cybersecurity. […]

    Reply
  4. 2 Business-Crushing AV Trends I Hope Aren’t in 2019 State of the Industry Report - Commercial Integrator says:
    October 16, 2018 at 1:01 pm

    […] There is nothing more important to an IT director than cybersecurity. […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.