{"id":251,"date":"2021-09-22T08:18:56","date_gmt":"2021-09-22T06:18:56","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?p=251"},"modified":"2021-10-21T13:41:20","modified_gmt":"2021-10-21T11:41:20","slug":"how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers","status":"publish","type":"post","link":"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/","title":{"rendered":"How do you cover and validate security requirements in tenders for your suppliers?"},"content":{"rendered":"<p><strong>Ren\u00e9 Matthiassen is Senior Security Consultant at Timmig Office Backup, and he is one of the speakers at the new international\u00a0<a href=\"https:\/\/insightevents.dk\/isc-cph\/\" target=\"_blank\" rel=\"noopener noreferrer\">Industrial Security Conference<\/a>\u00a0in Copenhagen. At the conference, he will talk about how you cover and validate security requirements in tenders for your suppliers. Furthermore, he will talk about the Danish State Railways cover of cybersecurity in one of the largest sourcing projects in Europe.<\/strong><\/p>\n<p>In this article, you can read an interview with Ren\u00e9 Matthiassen.<\/p>\n<h2><strong><em>How did you get into working with security and how did it develop throughout your career?<\/em><\/strong><\/h2>\n<p>Coming from a Cisco networking engineer background since the mid 90\u2019s, where the internet was just about to be launched for commercial use. I started with getting into firewall configuration and started to learn security from scratch, it just became more and more of interest and what I\u2019d focus on. From firewalls it just evolved itself as new security technologies came about, and my curiosity just kept on following these new things (and still is by the way J). I kind of moved more into security designs later, and today I am combining security compliance with security designs. It makes a lot of sense \u2013 at least to me.<\/p>\n<h2><strong><em>What are the biggest challenges within cybersecurity in your eyes?<\/em><\/strong><\/h2>\n<p>Short answer is lack of security people in the world. A lot of our day routines involve security routines, both in private and at work. A lot of processes are digitalized and with that comes security as a natural part of the processes, and we need to attend, defend, and protect both ourselves and where we work. Even small companies face many of the same threats as bigger companies.<\/p>\n<h2><strong><em>How do we get ahead of \u2018the bad guys\u2019?<\/em><\/strong><\/h2>\n<p>I don\u2019t think we can to be honest even despite the \u2018baddies\u2019 are expected to be much fewer than \u2018goodies\u2019. We need to re-think or re-invent some of the ways we do our work today. E.g. develop new coding standards with much more security included from the beginning, instead of adding and adding to a patchwork. Changing some of these things will be much faster and more secure. Where there is money, there is bad guys. It has always been like this since the currency was developed, and will probably stay like this, but things can be changed. E.g. there isn\u2019t that many bank robberies today compared to twenty years ago, as many bank affiliates are cashless.<\/p>\n<h2><strong><em>When looking forward just 5-10 years, what do you think will be different?<\/em><\/strong><\/h2>\n<p>I think (and hope) that as we are exposing more and more on the internet, making \u201ceverything\u201d reachable from everywhere, we\u2019d need to be much more concerned about securing our stuff and ourselves, and security will hopefully be more and more integrated into everyday live and not just something you apply down the line, but starting off with naturally.<\/p>\n<h2><strong><em>Besides more funds for security, what do you think would make a difference in the industry?<\/em><\/strong><\/h2>\n<p>It is not only about funding, but also about changing the mindset in peoples head. Funds can\u2019t help you if you don\u2019t know how to spend it correctly, and to do that you need a mindset focusing on security.<\/p>\n<h2><strong><em>What will your keynote be about?<\/em><\/strong><\/h2>\n<p>Many companies are sourcing services from their suppliers, but they are unsecure of how, what and if they can require in terms of securing the deliverables from the suppliers. How do you start, how do you convert your business requirements into security requirements so they can support your business and how do you evaluate them? This can be tricky but is doable. I\u2019ve been fortunate to work on both minor and massive complicated tenders and I will share some of my experiences and learnings with the participants to help them get better to run tenders.<\/p>\n<h2><strong><em>What are your own expectations for the conference?<\/em><\/strong><\/h2>\n<p>The line-up is just impressive with so many colleagues from the security industry with so much experience in different fields and areas and the biggest challenge will be to choose whom to hear. All have many thousand hours of hands-on experience and are security heavy lifters. I can\u2019t point at specific individuals, but I can assure you that I\u2019ll try to hear as many as possible, as it is not every day you get the opportunity to hear such much experience. It\u2019s going to be a blast!<\/p>\n<h2><strong>Do you want to hear more about security from Ren\u00e9 Matthiassen?<\/strong><\/h2>\n<p class=\"section-title ut-flowtyped ut-title-loaded\" data-title=\"Join the first international Industrial Security Conference\">Join the first international Industrial Security Conference. Read more\u00a0<a href=\"https:\/\/insightevents.dk\/isc-cph\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>\u00a0and sign up\u00a0<a href=\"https:\/\/my.eventbuizz.com\/event\/industrial-security-conference-cph-9585\/detail\/registration#get_register\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ren\u00e9 Matthiassen is Senior Security Consultant at Timmig Office Backup, and he is one of the speakers at the new international\u00a0Industrial Security Conference\u00a0in Copenhagen. At the conference, he will talk about how you cover and validate security requirements in tenders for your suppliers. Furthermore, he will talk about the Danish State Railways cover of cybersecurity [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":408,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How do you cover security requirements in tenders for your suppliers?<\/title>\n<meta name=\"description\" content=\"Ren\u00e9 Matthiassen is Senior Security Consultant, and he is speaking at the Industrial Security Conference\u00a0in Copenhagen. Read an interview here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do you cover security requirements in tenders for your suppliers?\" \/>\n<meta property=\"og:description\" content=\"Ren\u00e9 Matthiassen is Senior Security Consultant, and he is speaking at the Industrial Security Conference\u00a0in Copenhagen. Read an interview here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-22T06:18:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-21T11:41:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/09\/rene-matthiassen-1200x630-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/\",\"name\":\"How do you cover security requirements in tenders for your suppliers?\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/09\/rene-matthiassen-1200x630-1.jpg\",\"datePublished\":\"2021-09-22T06:18:56+00:00\",\"dateModified\":\"2021-10-21T11:41:20+00:00\",\"author\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/257334dad560019b2bb131acd119c339\"},\"description\":\"Ren\u00e9 Matthiassen is Senior Security Consultant, and he is speaking at the Industrial Security Conference\u00a0in Copenhagen. Read an interview here.\",\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/#primaryimage\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/09\/rene-matthiassen-1200x630-1.jpg\",\"contentUrl\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/09\/rene-matthiassen-1200x630-1.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Ren\u00e9 Matthiassen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How do you cover and validate security requirements in tenders for your suppliers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/257334dad560019b2bb131acd119c339\",\"name\":\"Mie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/54b9476f089b556d1cf723ef426f9a70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/54b9476f089b556d1cf723ef426f9a70?s=96&d=mm&r=g\",\"caption\":\"Mie\"},\"url\":\"https:\/\/insightevents.dk\/isc-cph\/author\/miec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How do you cover security requirements in tenders for your suppliers?","description":"Ren\u00e9 Matthiassen is Senior Security Consultant, and he is speaking at the Industrial Security Conference\u00a0in Copenhagen. Read an interview here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/","og_locale":"en_GB","og_type":"article","og_title":"How do you cover security requirements in tenders for your suppliers?","og_description":"Ren\u00e9 Matthiassen is Senior Security Consultant, and he is speaking at the Industrial Security Conference\u00a0in Copenhagen. Read an interview here.","og_url":"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/","og_site_name":"Industrial Security Conference Copenhagen","article_published_time":"2021-09-22T06:18:56+00:00","article_modified_time":"2021-10-21T11:41:20+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/09\/rene-matthiassen-1200x630-1.jpg","type":"image\/jpeg"}],"author":"Mie","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mie","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/","url":"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/","name":"How do you cover security requirements in tenders for your suppliers?","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/#primaryimage"},"image":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/#primaryimage"},"thumbnailUrl":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/09\/rene-matthiassen-1200x630-1.jpg","datePublished":"2021-09-22T06:18:56+00:00","dateModified":"2021-10-21T11:41:20+00:00","author":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/257334dad560019b2bb131acd119c339"},"description":"Ren\u00e9 Matthiassen is Senior Security Consultant, and he is speaking at the Industrial Security Conference\u00a0in Copenhagen. Read an interview here.","breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/#primaryimage","url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/09\/rene-matthiassen-1200x630-1.jpg","contentUrl":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/09\/rene-matthiassen-1200x630-1.jpg","width":1200,"height":630,"caption":"Ren\u00e9 Matthiassen"},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/2021\/09\/22\/how-do-you-cover-and-validate-security-requirements-in-tenders-for-your-suppliers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"How do you cover and validate security requirements in tenders for your suppliers?"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/257334dad560019b2bb131acd119c339","name":"Mie","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/54b9476f089b556d1cf723ef426f9a70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/54b9476f089b556d1cf723ef426f9a70?s=96&d=mm&r=g","caption":"Mie"},"url":"https:\/\/insightevents.dk\/isc-cph\/author\/miec\/"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts\/251"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/comments?post=251"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts\/251\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media\/408"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/categories?post=251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/tags?post=251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}