Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

AppSecEu: Two year CISO strategies enable better budget negotiation

by The Gurus
June 30, 2014
in Editor's News
Share on FacebookShare on Twitter

CISO strategies are commonly built for two year plans.
Speaking at the AppSec conference in Cambridge, Tobias Gondrom, OWASP Global Board Member and project lead for OWASP, featured highlights from the 2013 OWASP CISO survey report which found that there was more investment in application security than infrastructure.
Gondrum said that 38 per cent of the 100 CISOs surveyed invested in infrastructure, compared to 47 per cent who invested in application security. He said that it could be concluded that “investment is the answer to the threat” as to where you put your money and where you talk. “The top result was training, and this was a clear number one for spending, then it was software development and testing, then management.”
He said that, in his view, commonly strategies are two years into the future (according to 27.8 per cent) as “we have no idea where the world will be in five years in terms of technology”. He also claimed that even in the cases where there has been a security breach there is no real change, and while it is believed that business usually invest more after an incident, there was no significant statistical evidence for that.
He said: “However there is a small benefit if there is a two year strategy, as you can increase on the security investment. My hypothesis is that a CISO cannot move much, and cannot put in money in the first year, but can in year two so they are planning it for next year. If you go into the budget negotiation, you can come in with advantageous position on budget decision. We see a correlation.”
The survey also found that 75 per cent of respondents were not using a maturity model or benchmark themselves and not looking in structured ways at where they are, but he said that there was a “glimmer of hope on the horizon” with 40 per cent considering doing it in the next 12 months.
For the future, Gondrom said that the identified top four challenges were in order: the availability of skilled resources; the level of security awareness by developers; management awareness and sponsorship; and adequate budget, which he said: “We need to teach people more about.”

FacebookTweetLinkedIn
Tags: 2014CISO
ShareTweetShare
Previous Post

Public and private sector partnerships key to cyber crime fight, say BBA and NCCU

Next Post

OWASP AppSecEU – Focus on attacker capabilities, not identity

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information