Now this is a very subjective term as “Right” to each is quite different. More so, the subject “Information Security” by itself is quite a dynamic and an evolving term. Here, any measure stick with constant attributes may not provide a true insight for the choice of Technology. However, certain parameters of the selection process can be generalized for operational efficiency.

(Read more:  My Key Learning While Implementing Database Security)

Based on my experience I would recommend the following for any CISO to help choose the right Technology:

  1. Understand Your Line of Business
  2. Understand the Organization’s Core Competency
  3. Understand Business Drivers
  4. Understand How things work within your organization
  5. Understand how to get things done within your organization
  6. Get a Maturity Self-Assessment done for all domains of Information Security
  7. Work closely with Technology and Business Teams to chalk out how you can transform Information Security weakness to business enablers
  8. Get a Senior Management Buy In for your Information Security Roadmap
  9. Prioritize Tool/Technology procurement and rollout
  10. Track your progress and keep Management updated with the progress.

Once you have completed task mentioned in points 1 to 10 you many need to focus over tool and partner selection.
Here the process could be as follows:

  1. Choose the technology domain you would want to address
  2. Check to see if there exists a Gartner or Forrester report
  3. Chalk down your wish list
  4. Float your wish list via RFPs to all partners
  5. Assess all partner responses against a predefined attribute set as follows:

8669797078?profile=original

(Read more:  Database Security Vendor Evaluation Guide)


Once done these steps would help you narrow down your choice. However, for the final decision you would need to make a choice by yourself and here are few questions that you should have clear answers for you to choose the right Technology and Partner:

  1. Is the technology completely New or does the technology proposer have a demonstrative model in place?
  2. Does the technology Partner have a support system in your geographical region?
  3. Can the technology partner offer an Opex model along with Capex?
  4. Pull out reference work to understand what can go wrong and how better you can manage technology and project issues.
  5. Check to seek if you have in-house capabilities to manage the New Technology.
  6. Check if Technology partner presents tool benefits by way of Business outcomes.

(Watch more : 3 causes of stress which we are unaware of !)

I trust, there is no substitute to experience. However, with sharing through common body of knowledge can make technology selection lucid and succinct.

I strongly recommend every Information Security professional to love their Job first.  Be spiritual – Meditation, Service and Knowledge are profound pillars. This will help one achieve clarity of thought and vision. Without these, no matter how religiously you follow best practices, task accomplishment may be a challenge.

-Sagar Karan, CISO, Fullerton India Credit Company Ltd. tells us How Should a CISO choose the right Anti-Malware Technology

 

8669796654?profile=original

Votes: 0
E-mail me when people leave their comments –

Priyanka, Co-Founder and Editor, CISO Platform Breach Intelligence, leads our threat intelligence and incident analysis efforts, providing actionable insights to the global cybersecurity community. With extensive experience in cybersecurity leadership and breach analysis, she specializes in translating complex technical threats into strategic intelligence for security executives.

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

CISO Talk (Chennai Chapter) - AI Code Generation Risks: Balancing Innovation and Security

  • Description:

    We’re excited to invite you to an exclusive CISO Talk (Chennai Chapter) on “AI Code Generation Risks: Balancing Innovation and Security” featuring Ramkumar Dilli (Chief Information Officer, Myridius).

    In this session, we’ll explore how security leaders can navigate the risks of AI-generated code, implement secure development guardrails, and strike the right balance between innovation and security. AI…

  • Created by: Biswajit Banerjee
  • Tags: ciso talk

CISO MeetUp: Executive Cocktail Reception @ Black Hat USA , Las Vegas 2025

  • Description:

    We are excited to invite you to the CISO MeetUp: Executive Cocktail Reception if you are there at the Black Hat Conference USA, Las Vegas 2025. This event is organized by EC-Council & FireCompass with CISOPlatform as proud community partner. 

    This evening is designed for Director-level and above cybersecurity professionals to connect, collaborate, and unwind in a relaxed setting. Enjoy…

  • Created by: Biswajit Banerjee
  • Tags: black hat 2025, ciso meetup, cocktail reception, usa events, cybersecurity events, ciso

6 City Playbook Round Table Series (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    Join us for an exclusive 6-city roundtable series across Delhi, Mumbai, Bangalore, Pune, Chennai, and Kolkata. Curated for top cybersecurity leaders, this series will spotlight proven strategies, real-world insights, and impactful playbooks from the industry’s best.

    Network with peers, exchange ideas, and contribute to shaping the Top 100 Security Playbooks of the year.

    Date : Sept 2025 - Oct 2025

    Venue: Delhi, Mumbai, Bangalore, Pune,…

  • Created by: Biswajit Banerjee