Delivering Business Outcomes through Security (BLSS) – Outline
Детальна програма курсу
Security Fundamentals Overview
- Basic Security Principles
- Security Architecture
- Review of “Security Foundation Training E-Learning”
Essentials of Selling Security
- Customer Concerns, Business Transformation & Initiatives
- Understanding Business Transformation & Initiatives
- Linking Initiatives to Security Concerns
- Addressing Security Concerns & Positioning Cisco Security
- Objection Handling
- Role-Play Exercise
- Sources of CIO Success
- Ranking of CIO Business Strategies
- What is most likely to get the CIO’s attention
- Security Threats & concerns
Business Transformation & Business Initiatives
- What is Business Transformation?
- Business Initiatives as an Sales Enabler
- From Products to Architectures
- Linkage with Security
- Video Case Study
- Workshop Exercise: “Initiatives & Business Value”
Understanding the Customer
- Understanding your Customers
- Who is concerned about Security
- Understanding your customer’s business
- Understanding relevant Security Issues
- Business Decision Maker Concerns
- Technical Decision Maker Focus
- Company Profile – Current Situation
- Current Security Context
Fact Finding & Qualification
- Information that we should know
- Existing business pain points and challenges
- Identifying business initiatives
- Business Assets
- Relevant Threats
- Previous Security Breaches
- Security Compliance
- Where do we find this information?
- Workshop Exercise: “Finding Relevant Information”
Link Business Initiatives to Security Solutions
- Workshop Exercise: “Linking Business Initiatives to Business Concerns”
- Business Implication or Solution
- Risk Assessment
- Risk Assessment Methodology
- Workshop Exercise: “Identify Assets & the Asset Value”
- Workshop Exercise: “Identify the Threats & Threat Criticality”
- Workshop Exercise: “Identify the Vulnerabilities and Assess Risk”
- Workshop Exercise: “Link Business Solutions to Security Solutions”
- Risk Assessment Summary
- Workshop Exercise: “Positioning the Security Solution”
Return on Investment
- Security and ROI
- What is ROI?
- Total Cost of Ownership (TCO)
- Return
- Cost Saving Benefits
- Revenue/Productivity Benefits
- Quantifying Returns
- Cost Avoidance
- Improved Finances
Positioning Cisco Security & Objection Handling
- Architectural Approach Benefits
- The Architectural Approach
- Sell Benefits of an Architecture and Potential Problems
- Levitt’s Rings
- Positioning Cisco Security
- Workshop Exercise: “Cisco Security Positioning Statement”
- Where do Objections come from?
Security as a Business Enabler - the Pitch
- Constructing a Pitch
- SCIPAB: S (Situation), C (Complication), I (Impact), P (Position), A (Action), B (Benefit)
- Workshop Exercise: “Create a pitch to the CxO”
- Summary
- Questions