Tag Archives: CSO

Consultative Selling: The Key to New Client Acquisition

This is a reasonable process map for the BtB sales cycle & pipeline management. It touches on opportunity analysis and sales strategy, where my passion lies. In this piece, I will build the case for a particular business model in … Continue reading

Posted in Business, Data Security, Information Security, Integration, Physical Security, Technology | Tagged , , , , , , , , , , , , , , , | Leave a comment

Prepare for Identity Management in Physical Security to Change Drastically

Smartphones & Big Data Many of our everyday online activities are leveraging authenticating digital identities, cloud data resources and mobile convenience. As all of us come to depend more on smartphone functionality (pay at the pump, ATM’s, building access, network … Continue reading

Posted in Big Data, Cybersecurity, Data Security, Identity Management, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , , | Leave a comment

Security Automation: Responding to Disruptive Technology

Is this War, or an Opportunity? After taking a short few weeks to investigate the InfoSec space and speak with several ISC2 certified CISSP’s… it would appear the convergence and overlap of Data and Physical Security is creating misconceptions regarding … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , | Leave a comment