How to Choose a VM MSSP Provider

Introduction

Having the right group of people to run your vulnerability management program is just as important as the actual program itself. Let’s face it; not all companies can keep up-to-date with the latest security trends as technologies continue to advance, all while bringing on more threats.  Most organizations understand this and choose to bring on a Managed Security Services Provider (MSSP) to better their security team (if one already exists) and take over services such as running a vulnerability management program. Choosing a great MSSP is essential to the success of the programs the provider will run – in our case, vulnerability management program.

A Lasting Relationship

There are several essential points to consider when going through the process of choosing an MSSP. First and foremost, an indispensable part of bringing on a team is understanding that this isn’t just a case where you meet and greet, perform a job, and then go separate ways. The relationship between an organization and an MSSP should be long-term as there is never an end to vulnerability scanning. When talking with different providers, you should focus on whether or not the company is taking the time to get to know you and your business. A better understanding of what your company does, your goals for future growth, and what aspects of your business are most will only lead to a better-managed security service. If they aren’t interested in getting to know you, then you should look elsewhere.

An important piece to finish off the remediation process is to rescan the system in order to ensure your fix was effective. One of the last things you want to do is fall under the impression that you have eliminated the risk while it is still secretly lurking in the shadows.

Get to Know the Team

On the other hand, you should always make sure you know the people’s credentials that you propose to run your program. It should go without saying, but you want to bring on a team expert in the security field. Don’t be afraid to ask about members of the team and their respective security skills/expertise and any certifications they hold. If you have a specific area of your business that you know will need more attention, you want to ensure that the team you bring on will effectively handle those responsibilities. Ensure the team keeps up with the latest industry trends and never shies away from regular training to update their skills.

Up-to-Date Technology Stack

The technology that the team operates on is equally as crucial as the team members themselves. Your MSSP provider should be using the latest technology with advanced analytics designed to catch all of the relevant threats it may come across. Obtain a better understanding of all steps of the system from vulnerability scanning to the remediation process. The relationship between the team and the technology they operate should produce real results with very few hiccups along the way.

Processes

A vital part of the relationship between your company and the MSSP is understanding the processes they will take to support your organization. The first thing you should do is discover where they are based. If you are a U.S. based company and can find a provider based out of the U.S., then that is great! However, a lot of MSSPs operate out of India or somewhere else. In addition to this, you should find out how they will handle communicating with your team. You should consider if they will come onsite for face-to-face meetings or will everything take place remotely. If remote communication turns out to be the answer, you need to understand the method they will use to communicate and interact with your team. Always ask questions about their technical and operational processes. Discover if they have a way to exclude devices or hosts that are considered too sensitive to scan. Along with exclusions of devices, you should determine if the MSSP has a process to include specific devices or hosts based on security assessments or reviews necessary to certify them before they’re considered operational. Finally, you should learn more about how they pass on information to you. The importance of the vulnerability management program and remediation results means that monthly summary reports and status update meetings will be crucial to your program’s success. You should understand if they only communicate if there is something important to report. Find out how you can provide your feedback and insert comments or requests if necessary. Uncovering the answers to these questions before picking an MSSP can be the difference between a lasting relationship between the two parties and a relationship that leaves your organization unsatisfied and disappointed with their provider. 

Check Their Reviews

As with just about any physical product or service you may buy in today’s world, reputation and reviews are something that should be checked before forking over the cash. An MSSP that hesitates to provide you with references (if you ask for them) is a provider to avoid. But just getting the references is only the first step in understanding their previous work. Take the time to reach out to their past and current business partners to find out how the relationship with that MSSP has been going. Try to discover if the provider is as reliable as they say they are and if they truly possess the skills and expertise needed to protect an organization’s systems. Get a better understanding of the MSSP team’s responsiveness and how long it takes to contact them if there is ever a problem. Most importantly, find out more about their remediation process and whether or not they have been able to resolve any threats that have been detected. What would that process look like for your organization, and did it seem like the MSSP team saw the threat’s remediation as a top priority are both questions that you should be asking all of the references you contact.

MSSP Customer Base

Along with talking with existing and past customers of the MSSP, make sure most of the MSSP’s customers are similar in company size and industry niche (to an extent) as your own company. The majority of MSSPs are often more effective and efficient in specific fields due to a similarity across the organization servers, common types of breaches, and stored data locations. If you are a smaller sized company, it may be beneficial to avoid MSSPs who primarily work with larger organizations. These larger organizations pay the provider more money, so naturally, the MSSP will prioritize them and any issues they incur ahead of you and your own. If you are a larger company, you don’t want to select an MSSP who only has smaller sized companies as their customers. You may think doing this is a good idea since your organization’s needs should be a priority, but there is a learning curve for MSSP teams that protect larger companies rather than smaller ones. Not that it can’t work out, but in most cases, you don’t want to be the guinea pig for the MSSP.

MSSP Customer Base

Always know what the cost of the services is when in talks with an MSSP. But don’t just see the cost. Instead, understand what you will get for that price and how you might terminate the contract. You should always weigh out the cost between competing MSSP teams, but keep in mind that the cheapest doesn’t always mean it’s the worst, and most expensive doesn’t always mean it’s the best. It is essential to find an outstanding balance between the provider’s cost and its value from the relationship you form with them and their services.

Value

Speaking of value, getting a better understanding of the areas of expertise that the MSSP can bring to the table is a great way to discover if that team is right for your organization. Finding out if they are knowledgeable in any particular technology that would result in better service/recommendations is not something that you should overlook. You should also dive in a little deeper and see what they can tell you about your organization’s industry and vulnerability management best practices. They should walk you through the process while explaining areas like API work, scan scheduling, and integrations with other technologies that may be required. If they can’t walk you through this or seem to struggle with doing so, it may be best to look elsewhere. 

Conclusion

Always know what the cost of the services is when in talks with an MSSP. But don’t just see the cost. Instead, understand what you will get for that price and how you might terminate the contract. You should always weigh out the cost between competing MSSP teams, but keep in mind that the cheapest doesn’t always mean it’s the worst, and most expensive doesn’t always mean it’s the best. It is essential to find an outstanding balance between the provider’s cost and its value from the relationship you form with them and their services.

About Secutor

Secutor Cybersecurity is a trusted partner comprised of industry leading experts in the fields of Cybersecurity and Governance, Risk and Compliance. We partner with our clients to deliver on-demand solutions tailored to expertly navigate the regulatory demands of their specific industries.

Our proven track record of successfully exceeding client expectations is achieved through the combination of our methodical approach, advanced technologies, subject matter experts, and synergy with client team members.

Secutor is your team of world-class problem solvers with vast expertise and experience delivering complete solutions keeping your organization protected, audit-ready, and running smoothly.

Scroll to Top

Jason Fruge

Consulting Chief Information Security Officer (CISO)

Jason Fruge is an accomplished Consulting Chief Information Security Officer at Secutor Cybersecurity, bringing over 25 years of deep expertise in information security. His storied career includes leading and managing robust security programs for Fortune 500 companies across retail, banking, and fintech sectors. His current role involves providing strategic guidance and advisory services to clients, focusing on security governance, risk management, and compliance.

Apart from his consulting responsibilities, Jason is an active member of the global cybersecurity community. He is a Villager at Team8, a prestigious collective of senior cybersecurity executives and thought leaders. Additionally, he serves as an Advisor at NightDragon, an innovative growth and venture capital firm specializing in cybersecurity and enterprise technologies.

Jason’s tenure as a CISO is marked by a proven track record in developing and implementing comprehensive security policies and procedures. He adeptly leverages security frameworks and industry best practices to mitigate risks, safeguarding sensitive data and assets. His expertise encompasses incident response and root cause analysis, where he has notably managed cyber incidents to prevent breaches and minimize business disruption and customer impact.

A key aspect of Jason’s role has been the creation and facilitation of executive and board-level cyber risk committees, ensuring organizational alignment and awareness. His responsibilities have extended to maintaining compliance programs for standards such as PCI and SOX, as well as leading privacy and business continuity programs. Holding prestigious certifications like CISSP, QSA, and QTE, Jason is also a recognized thought leader, contributing articles on cybersecurity to InformationWeek.

Jason’s passion lies in driving innovation and fostering collaboration in the cybersecurity field. He is currently seeking an executive CISO role in a leading retail, finance, or fintech organization, where he can continue to make significant contributions to the cybersecurity landscape.

Jennifer Bayuk

Cybersecurity Risk Management Expert

Jennifer Bayuk is a highly esteemed cybersecurity risk management thought leader and subject matter expert at Secutor Cybersecurity. Her extensive experience encompasses managing and measuring large-scale cybersecurity programs, system security architecture, and a wide array of cybersecurity tools and techniques. Jennifer’s expertise is further deepened with her proficiency in cybersecurity forensics, the audit of information systems and networks, and technology control processes.

Jennifer’s skill set is comprehensive, including specialization in cybersecurity risk and performance indicators, technology risk awareness education, risk management training curriculum, and system security research. Her academic achievements are noteworthy, holding Masters degrees in Philosophy and Computer Science, and a Ph.D. in Systems Engineering. This strong academic background provides a solid foundation for her practical and strategic approach to cybersecurity challenges.

Certified in Information Systems Audit, Information Systems Security, Information Security Management, and IT Governance, Jennifer is a well-rounded professional in the field. Her credentials are further enhanced by her license as a New Jersey Private Investigator, adding a unique dimension to her cybersecurity expertise.

At Secutor, Jennifer plays a pivotal role in steering cybersecurity initiatives, aligning them with organizational risk appetites and strategic objectives. Her ability to educate and train in the realm of technology risk has been instrumental in raising awareness and enhancing the cybersecurity posture of our clients. Her dedication to research and continual learning makes her an invaluable resource in navigating the ever-evolving cybersecurity landscape.

Jennifer Bayuk’s blend of academic prowess, practical experience, and certifications make her an indispensable part of our team, as she continues to drive forward-thinking cybersecurity solutions and risk management strategies.

Steve Blanding

CISO Consultant

CISSP, CISA, CGEIT, CRISC

Steve is an IT management consultant living in Dallas, TX. Steve has over 35 years of experience in executive IT leadership, IT governance, risk and compliance (GRC), systems auditing, quality assurance, information security, and business resumption planning for large corporations in the Big-4 professional services, financial services, manufacturing, retail electronics, and defense contract industries. He has extensive experience with industry best practices for adopting and implementing new technologies, IT service management frameworks, and GRC solutions that have dramatically improved customer satisfaction while reducing cost.

Industry Experience

  • State Government: 5 years
  • Retail: 5 years
  • Defense Contract: 5 years
  • Manufacturing: 2 years
  • Health Care: 2 years
  • Local Government: 2 years
  • Public Accounting (Big 4): 7 years
  • Insurance: 3 years
  • Financial Services: 5 years

Key Career Accomplishments

  • Conducted a full-scale ISO27000 audit 4 times over the past 6 years.  Also, conducted a “light” ISO27000 review of a small Dallas-based company in 2007.
  • Developed and authored a comprehensive IT security policy manual, incident response plans, training programs, security contingency plans and configuration management plans for FedRAMP regulatory compliance.
  • Conducted multiple DR and operational backup and recovery IT risk assessments of critical business systems on mainframe, LAN, and distributed system networks located across North America.
  • Conducted data centers audits for Tyco Corporation (Brussels, 2005 and Denver, 2006), Farmers Insurance (Los Angeles, 2006), Zurich Financial Services (Chicago, Kansas City, and Grand Rapids, 2006), and Convergys Corporation (Dallas, 2010, 2011, and 2012).
  • Led a project to remediate segregation of duties and streamline user access system security and HIPAA compliance administration across 5 regions in North America, resulting in cost savings of $700,000 per year (Kaiser Permanente).
  • Implemented Sarbanes-Oxley Section 302 and 404 IT general and application controls, reducing security administration costs and improving operational performance by 50% or $500,000 annually (Tyco Corporation).
  • Led the global SAP business-IT alignment, process re-design implementation initiative for financial accounting, materials management, production planning, quality management, sales and distribution, warehouse management, and plant maintenance, which resulted in creating $2,000,000 in cost savings.
  • Engaged by Arthur Andersen in Houston to transform the local IT organization and then direct 3 organizational mergers/consolidations, which resulted in a 25% reduction in operating costs, or $3,250,000, while improving customer satisfaction by 30%, and improving employee morale, technology availability and the quality of IT infrastructure and service delivery.
  • Assigned by Arthur Andersen global leadership to lead global project teams responsible for data center and customer support call center consolidation, which resulted in annual operational cost savings of 45% or $4,000,000.
  • Implemented ITIL service management practices for problem management, incident management, help desk, project management, and operations management.
  • Conducted SOX 404 audits at Duke Energy (6 months), Red Hat (3 months), Tyco (9 months), Zeon Chemicals (4 months), and Convergys (2 months). Experience includes control design/documentation and effectiveness testing.

Publications:

Author, various articles in EDPACS and Auerbach’s IT Audit Portfolio Series, 1981 – 2001

Author, various articles in the Handbook of Information Security Management, 1993 – 1995

Editor, Auerbach’s Enterprise Operations Management, 2002

Editor, Auerbach’s IT Audit Portfolio Series, 2000 – 2002

Consulting Editor, Auerbach’s EOM Portfolio Series, 1998 -2001

Ready to Find Your Solution?

Reach out using the form below, and we’ll contact you as soon as possible to schedule your consultation.

Ready to Find Your Solution?

Use the form to schedule a consultation, and we’ll reach out within 48 hours to confirm the appointment.

Considering this delay, please only select meeting dates 48 hours or more in advance. Your information will only be used to facilitate a meeting.