All insights

Public-Sector CISO

The Safe Choice Is the Riskiest Choice You Can Make

Enterprise vendor selection feels like risk management. It isn't. Here's what most CISOs get wrong before the contract is even signed.

Jason Walker

.6 min read

Every CISO has a version of this story. You ran a proof of concept. You checked the analyst reports. You brought in the right stakeholders and built a tight business case. You signed the contract feeling like you had done the responsible thing. Eighteen months later you are staring at a migration plan because the product stopped moving, the company got acquired, or the price jumped 35% for no reason other than the vendor decided it could.

That is not bad luck. That is the predictable outcome of a broken selection process most of us inherited and never questioned.

The problem starts with how we define risk in vendor selection. Most security leaders think about vendor risk as the risk of the vendor failing to deliver what was promised. That framing is too narrow. The real risk is committing to a product trajectory you cannot see, in a market moving faster than your procurement cycle. By the time a tool is fully deployed in an enterprise environment, the threat environment it was built to address has already shifted. You are not buying a solution. You are betting on a roadmap.

And here is the part that stings: the safe choice is often the highest-risk choice.

Aviation safety culture figured something out a long time ago that enterprise procurement has not. Accident investigators do not just look at the final failure. They trace the chain of decisions that made the failure inevitable, decisions that each looked reasonable at the time. In vendor selection, the chain usually starts with analyst reports. Gartner, Forrester, the magic quadrant. These are not market surveys. They are coverage of a thin slice of the market, and the vendors who appear in them have often optimized for appearing in them. The market leader in the report might be the marketing leader in practice. That distinction costs real money.

Running cybersecurity for dozens of state agencies and hundreds of thousands of devices forces a specific kind of discipline. When a contract goes wrong at this scale, the cost is not just financial. It is operational exposure across every agency that depends on the platform. A rip-and-replace is not a budget line item. It is a security gap that exists in production while you manage the transition. The pressure to pick the "proven" vendor is enormous. So is the cost when the proven vendor turns out to have been coasting on its reputation.

I have watched selection processes that looked rigorous produce exactly the wrong outcomes because the process was rigorous about the wrong things. Scoring matrices that measure feature checklists. Reference checks with customers the vendor selected. Demo environments that show the product at its best. None of that tells you where the product will be in two years, who owns it after the next acquisition cycle, or whether the pricing model holds when the vendor decides it has enough market share to extract more.

The discipline that separates good trading from gambling is not picking the right asset. It is understanding your position size relative to your ability to exit. Enterprise security procurement needs the same logic. Before you sign, you need to know: what does it cost to leave? Not contractually. Operationally. If this vendor pivots, gets acquired, or prices you out, how long does your migration take, what goes unprotected during that window, and what does it cost to rebuild the integrations? If you cannot answer those questions specifically, you have not finished your due diligence. You have just started it.

Term length is part of the answer, but not all of it. Shorter commitments give you more exit optionality. They also cost more and force more frequent decisions in an environment where decision fatigue is already real. The better discipline is building exit conditions into every contract before you sign, not as legal boilerplate but as operational planning. What triggers a review? What is the migration path? What data portability do you have, and in what format?

Startups deserve more credit than they get in this conversation. A well-run startup with focused engineering on a specific problem can outperform an established platform that has been stretching its product surface to defend market position. The calculus is different, not unfavorable. The questions are also different. For a startup, you are evaluating team and trajectory, not just current capability. You are asking whether the problem they solve is durable enough to outlast multiple market pivots. And you are pricing in the acquisition risk from the start, because the good ones get acquired, and that changes the product every time.

The hardest correction for most enterprise buyers is accepting that complete market intelligence is not achievable. There are thousands of security vendors. No analyst covers more than a fraction. Your peers see a different slice than you do. The answer is not to find the exhaustive list. The answer is to build a continuous market sensing capability inside your team, not just at procurement time. Your architects and engineers should be tracking the space they work in. Your threat intel function should be connected to the product evolution conversations happening at the vendors you depend on. This is not a one-time evaluation. It is a standing practice.

The last thing to calibrate is the pressure that comes from the vendor side. The big platforms are good at making the CISO feel like a sophisticated buyer by choosing them. There is a specific kind of vendor sales motion that equates buying the market leader with personal credibility. It works because we are human and because the accountability logic is real: no one gets fired for buying the established name. But accountability logic is not the same as security logic. If the product fails to do what you needed it to do, the brand on the contract does not protect the environment you were hired to protect.

Vendor selection is where strategy meets reality. Your roadmap and the vendor's roadmap are two separate documents. The contract does not merge them. The only way to manage that gap is to stop treating the selection decision as a discrete event and start treating it as the first move in a relationship you will need to actively manage, and potentially exit.

Pick the vendor that solves the problem you have now and can grow with the problem you will have next. Know your exit before you commit. And never confuse the market leader with the right answer.

Keep reading

Weekly writing from inside the work.

Practitioner-researcher essays four times a week. No spam, unsubscribe in one click.

Subscribe

Weekly writing from inside the work.

Field observations and framework critiques from a practitioner-researcher running cybersecurity at scale. AI in operations, FAIR risk research, and the leadership patterns that hold both together. No spam. Unsubscribe in one click.