Satisfy Customer Requirements for Information Security



  • Your customers and potential customers are increasingly demanding assurance that you will meet their information security requirements.
  • Responding to these assurance demands requires ever more effort from the security team, which distracts them from their primary mission of protecting the organization.
  • Every customer seems to have their own custom security questionnaire they want you to complete, increasing the effort you have to expend to respond to them.

Our Advice

Critical Insight

  • Your security program can be a differentiator and help win and retain customers.
  • Value rank your customers to right-size the level of effort your security team dedicates to responding to questionnaires.
  • SOC 2 or ISO 27001 certification can be an important part of your security marketing, but only if you make the right business case.

Impact and Result

  • CISOs need to develop a marketing strategy for their information security program.
  • Ensure that your security team dedicates the appropriate amount of effort to sales by value ranking your potential customers and aligning efforts to value.
  • Develop a business case for SOC 2 or ISO 27001 to determine if certification makes sense for your organization, and to gain support from key stakeholders.

Satisfy Customer Requirements for Information Security Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should proactively satisfy customer requirements for information security, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Manage customer expectations for information security

Identify your customers’ expectations for security and privacy, value rank your customers to right-size your efforts, and learn how to impress them with your information security program.

  • Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security

2. Select a certification path

Decide whether to obtain SOC 2 or ISO 27001 certification, and build a business case for certification.

  • Satisfy Customer Requirements for Information Security – Phase 2: Select a Certification Path
  • Security Certification Selection Tool
  • Security Certification Business Case Tool

3. Obtain and maintain certification

Develop your certification scope, prepare for the audit, and learn how to maintain your certification over time.

  • Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain Certification
[infographic]

Buying Options

Satisfy Customer Requirements for Information Security

€309.50
(Excl. 21% tax)

Client rating

9.0/10 Overall Impact

Cost Savings

$247 Average $ Saved

Days Saved

3 Average Days Saved

 

IT Risk Management · IT Leadership & Strategy implementation · Operational Management · Service Delivery · Organizational Management · Process Improvements · ITIL, CORM, Agile · Cost Control · Business Process Analysis · Technology Development · Project Implementation · International Coordination · In & Outsourcing · Customer Care · Multilingual: Dutch, English, French, German, Japanese · Entrepreneur
Tymans Group is a brand by Gert Taeymans BV
Gert Taeymans bv
Europe: Koning Albertstraat 136, 2070 Burcht, Belgium — VAT No: BE0685.974.694 — phone: +32 (0) 468.142.754
USA: 4023 KENNETT PIKE, SUITE 751, GREENVILLE, DE 19807 — Phone: 1-917-473-8669

Copyright 2017-2022 Gert Taeymans BV