Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Three Steps To Justifying An Investment In IT Security.

by The Gurus
May 24, 2021
in Opinions & Analysis
Share on FacebookShare on Twitter

By Matt Middleton-Leal, EMEA General Manager at Netwrix

As there is no such thing as 100 percent secure and as data breaches continue to hit the headlines, investments in IT security never seem to be quite enough. When it comes to budgeting, the role of a Chief Information Security Officer (CISO) is to prioritise available resources based on the IT risks the organisation faces and justify additional investments when and where needed to executives. Of course, this is easier said than done. Many CISOs struggle to articulate the value of their current and future security projects when attempting to make the case for more resources. This article will set out a three-step guide to justifying an investment in IT security.

Step One: Assess your IT risks

Before requesting additional investments, CISOs should first assess whether current resources are allocated correctly in order to address the actual risks that firms are exposed to; whether those risks are prioritised well and what the level of remaining risk exposure is.

For this reason, organisations should conduct regular IT risk assessments. The process may seem very complex but keeping it simple is key at first. In fact, organisations shout identify threat/vulnerability pairs and determine the level of the risk they pose. This will be based on the likelihood that the threat will exploit the vulnerability; the impact of the threat successfully exploiting the vulnerability; and the adequacy of the existing or planned information system security controls for eliminating or reducing the risk.

Risk assessments enable CISOs to determine which risks are sufficiently addressed by current IT controls and what security gaps remain that require additional efforts and investment management. With that information, CISOs are therefore better able to prioritise risks and allocate resources wisely.

To this classic IT risk assessment process, adding a regular review of risk profile versus industry peers is also advisable. Peer comparisons will give organisations a heads-up on the threats peers encounter and how they address them. For instance, if a competitor recently experienced a data breach, companies should investigate whether they have the same weakness and what they must do to mitigate it. In addition, they should scrutinise research from analysts summarising security execution in different industries, in order to keep up to date when it comes to best practices.

By accurately assessing risks for organisations and the industry in general, companies will be able to prepare a roadmap for eliminating the critical security gaps in their environment and build a coherent argument for additional budget.

Step Two: Communicate security issues to the decision-makers

The next step would be to talk to executives. CISOs re well-advised to start with their security status, briefly describing the IT risks roadmap and explaining exactly what they are doing to address current risks, demonstrating that they are effectively using existing technologies and human resources. During the communication with the board, CISOs should avoid technical acronyms or using terms such as “the infrastructure”; they should instead reference business processes and real-life scenarios, ideally examples of incidents in the national press.

To demonstrate the effectiveness of security controls, CISOs can use a variety of metrics, for instance: MTTD (mean time to detect), MTTR (mean time to repair), the number of incidents and vulnerabilities discovered versus the number remediated, money saved due to remediation, mean time between security incidents, percent of changes with security review and so on.

At this point it is important to highlight the most acute security gaps that leave a company vulnerable to current threats and request money to address them. The key to success is to clearly explain and, whenever possible, quantify the business impact of the security incidents that could result if those security risks are left unaddressed.

Step Three: Offer a solution and highlight benefits

This stage involves providing a clear, actionable plan for how the CISO will use the budget requested to reduce the IT risks identified to a level acceptable to the business. This plan must include resources – people, technologies, etc. – deadlines and a detailed budget that sets out how much money will be spent on what.

To support the argument, it is important to estimate the expected return on security investment (ROSI) for planned investments in order to prove their effectiveness in balancing risk and cost. CISOs can base this calculation on direct prevention of financial losses, as discussed earlier. The best way is to use the SANS Institute’s quantitative risk analysis formula. This estimates ROSI by quantifying how well the solution mitigates the risks it is intended to address and how much money can be saved due to the reduced risk exposure. Even if the estimate isn’t completely accurate, using the same scoring algorithm over time is a good way to compare the return on security projects.

Apart from underlining the losses the company might avoid, it is great to translate the value that security projects can bring to the business. In other words, presenting budget requests to the board as opportunities for assisting in meeting their business objectives, such as reducing costs, increasing revenue or increasing the company’s value on the market.

Arguing for investments in security projects is always a challenge. Executives will not be swayed by vague promises or crystal ball predictions; it is essential to provide hard data that illuminates how a fortified security posture can help the business prosper. Plus, it is crucial to understand the market and the organisation’s objectives well, because it will help to identify the most business-critical risks and better articulate benefits that boards care about.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Businesses Not Investing Enough In Endpoint Security.

Next Post

BlackBerry To Help Improve Digital Infrastructure For Healthcare.

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information