Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Education & TrainingCybersecurity News

Top 10 CISO Benefits of Participating on Customer Advisory Boards

By Rob Jensen
Top 10 CISO Benefits of Participating on Customer Advisory Boards
June 1, 2017

In their perpetual battle against external cyber threats, understanding and addressing evolving regulations and gathering resources to meet escalating security demands, Chief Information Security Officers (CISOs) are a busy, if not overburdened, bunch these days. And while focusing on their pressing jobs demands their full-time attention during the too-few hours of the day, there is one outside activity that does garner their precious attention: engaging with other CISOs. Indeed, CISOs are finding their best ally in meeting high demands is each other – to learn about new and emerging threats and best practices proven to defeat them.

In turn, the ideal forum to facilitate such engagements are Customer Advisory Boards, or “CABs.” CABs bring together executives – particularly CISOs – from top customer firms into an active and lively forum to review industry trends and solutions, and offer unvarnished guidance and insights to the sponsoring company.

When done correctly, CABs are an ideal method for collecting feedback on a company’s corporate strategies, gathering input to its product roadmaps and deepening relationships with its best customers. However, the core value proposition for a customer-driven advisory program is mutually beneficial collaboration that results in reciprocal value for both the host company and the participating members.

In the course of advising security companies such as Dell SecureWorks, McAfee, Arbor Networks, Symantec and many others in managing their CAB programs, we have identified numerous benefits that CISOs can obtain from participating in such initiatives.

Top 10 CISO Benefits of Participating on Customer Advisory Boards:

 

1. Learn About New and Evolving Security Threats

First and foremost, customer advisory boards provide CISOs a unique and all-too-rare opportunity to learn about cybercrime and evolving threats, and see to what extent such security trends are having on other like companies – or even completely different industries. Gathering this knowledge allows CISOs to benchmark such trends against their own organizations – i.e. get “ahead of the curve” for their own planning and investment purposes. Such data points may emanate from the host company, member CISO peers, or even third-party guest speakers, analysts or industry thought leaders invited to participate in the meeting.

 

2. Acquire Proven Security Best Practices from Peers

When managed correctly, advisory board meetings are dedicated to the mutual challenges faced by member CISOs. As such, common outputs are the often-innovative tactics deployed to solve shared security issues, generate executive support and manage remote employees. As members often confront such related challenges, learning from and benchmarking against other CISOs is a key benefit of participating on a customer advisory board. These interactions often result in actionable insights that CISOs can take directly from their advisory board participation, and implement immediately upon returning to their own organizations.

 

3. Influence their Security Vendors’ Product Roadmap

By participating on security vendors’ advisory boards, CISOs gain first-hand insight into the company’s product and services roadmap and planned enhancements. As such, CISOs are provided the rare ability to learn about upcoming products ahead of the market. They can provide feedback directly to the product management leadership and communicate desired opportunities for improvement and development of additional capabilities that would directly help their own companies. Such improvements, if implemented, can lead to numerous efficiencies and benefits for CISOs in their own operations.

 

4. Obtain Insight Into Security Vendors’ Strategic Initiatives

In addition to the product roadmap, CISO advisory board members can gain significant, forward-looking insight into their vendor’s strategic corporate initiatives, and provide a voice to these plans. Such initiatives can include “big bets” on technology development direction or investment, strategic partnerships, or even merger and acquisition targets. Such insight allows CISOs to align their own technology development decisions to what is happening in the marketplace, and consider the best vendors and service providers to meet their evolving security needs.

 

5. Opportunity to Beta Test New Security Products

Often, security companies qualify and select beta users from their customer advisory board membership. As such, participating CISOs have the ability to “test drive” the latest products and services, and provide direct feedback – often for their own direct benefit. In addition, vendors will sometimes offer financial incentives to garner valued beta feedback, such as a discount on the released product itself.

 

6. Interact with Security Vendor Executive Management

The CISOs we work with who participate on customer advisory boards always highly rate their ability to interact with their security vendors’ executive management team. CISO members see firsthand these leaders provide honest insight into their strategies, as well as rationale behind trade-offs and business decisions. Since the customer advisory board setting offers additional interaction over meals or other interactive activities, CISOs become better acquainted with these executives on a personal level and can gather more insight into their backgrounds and experience.

 

7. Improve Security Vendor Customer Service and Support

In addition to product direction input, CISOs often provide feedback that drives service and support. As such input often comes from specific incidents, the customer advisory board may tap that experience as a real-world case study and craft direct improvements that could significantly benefit operations for participating CISO members – turning an initial negative into a positive that benefits all.

 

8. Help Solve a Security Issue Impacting Everyone on the Board

Programs can be initiated to do more than simply communicate and gather product feedback, but rather offer an ideal opportunity to bring a group of experts together to solve a security challenge or leverage on a business opportunity shared by all participants. As such, participating CISOs are afforded the opportunity to collaborate together to come up with solutions, processes or technologies that will help themselves, the host company and others within their fields or industries.

 

9. Opportunity for Security Thought Leadership

Across myriad programs from various industries, innovative host companies turn the outstanding collaborations and solutions uncovered by their customer advisory board programs into original thought leadership. White papers, case studies or articles can be used to communicate the findings uncovered by a board and used for marketing and publicity pieces for all parties. Such pieces not only reflect the positive outcome of the initiative, but, more importantly, shine a positive light on the participant CISOs, bolstering their image and reputations in their industries.

 

10. Network for Potential Personal and Professional Growth

Customer advisory boards enable CISOs to interact with their peers and executives to not only benefit their own companies, but network for myriad potential personal and professional growth opportunities. It’s not unusual to see outspoken or outstanding CAB members join host companies or other member organizations. In interacting with security professionals over the years, with CAB membership as a “feather in their career caps,” members steadily move through the ranks within their own organizations or move on to manage security organizations for larger companies.

A customer advisory board is successful only when all participants derive value. And while advisory boards can sharpen and accelerate a host company’s focus and go-to-market plans, just as much benefit can be gained by the participating members as well. Assembling a peer group of CISO leaders as strategic advisors to a company that also influences the industry in which they operate is the promise and potential of customer advisory boards. As a participating CISO, that is a promise you can bring back to your own company.

KEYWORDS: CISO information sharing security risk management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rob jensen

Rob Jensen is vice president of marketing for Ignite Advisory Group, a consultancy that helps B2B companies manage their customer and partner advisory board programs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • chris-krebs.png

    Chris Krebs named Chair of Rubrik’s New CISO Advisory Board

    See More
  • cybersecurity-training-fp1170x658x86.jpg

    Top benefits of cybersecurity training

    See More
  • cyber-security-freepik

    US, UK and Australia issue joint cybersecurity advisory on top targeted vulnerabilities

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing