Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Defend Your Budget to Defend Your Company

IT Security Budgets

IT Security Budgets

A key focus at the 2015 RSA Conference was the elevation of cyber security from the IT department to the board room.  By and large, we’re seeing leadership across enterprises around the globe take notice, as highly-visible attacks on the US government, Anthem, and others have raised questions like, “can this happen to us?” The advent and proliferation of the Chief Information Security Officer (CISO) spotlights the anxiety in the board room but also shows the cyber risk message has been received. For the IT Professional; however, access to the board room is just the beginning of a new journey.

IT practitioners must learn to think, and communicate, like a board member. One opportunity for security leaders and CISOs to showcase their executive skills comes in the form of defending their budgets.

To do so, it’s imperative for the CISO to first understand where the company’s dollars are being spent and identify potential areas of cost savings. At RSA, CISOs were polled about bloat in the IT security infrastructure, and more than 80% of the respondents stated that they had redundant software or hardware. Estimates of wasted money paying for maintenance and support varied but reached up to 28% of the overall budget. This is particularly true in cases where mergers have occurred. As such, the first step in preparing to defend budgets is taking an inventory of the firm’s security platforms. From there, a CISO can easily create a plan to rationalize the company’s infrastructure and the services for which they pay.

Next, CISOs should look for opportunities to cut costs and operationalize security. This means using the savings accrued by eliminating unnecessary redundancy to install, on premise or cloud platforms that pull together data and threat intelligence. These platforms enable security analysts to make fast and accurate decisions, and when integrated into workflow management or ticketing systems, limit the amount of unnecessary work a security professional is required to do. To be clear, this is not about cutting headcount. It’s about empowering the team in place with the support they need.

Finally, and perhaps most crucial, CISOs must begin to effectively prioritize various risks, weighing the potentially affected audience with the cost of remediation. In some cases, the platform installed to operationalize security can be helpful in prioritizing threats; it can avoid generating alert fatigue by implementing a system that helps analysts prioritize and deal with the increasing array of attacks. The prioritization and operationalization of individual risk is what will resonate with the board of directors. Translating “security concerns” into “business risks” and then proceeding according to the largest threat is the way any board would want to proceed.

As such, it is also how most boards would proceed when discussing and approving a budget. Today’s CISO, with his or her seat in the board room, can’t respond to the growing demand for cyber preparedness with constant requests for more headcount and more investment.  Instead, he or she must maximize staff productivity and then find cost-effective ways to bolster the team’s performance. Managed services should play a key role in augmenting staff performance. At minimum, these services strengthen perimeter defenses and limit the amount of potential malware getting through, and therefore, allow an internal team to be more focused on solving fewer challenges. Managed services that incorporate real-time threat intelligence, ensure security professionals have a better idea on what to be most focused.

If you’re a CISO, you no doubt have the security skills required to meet the demands of the role. Now, it’s time to showcase your executive skills by taking an inventory of systems, identifying opportunities for operationalization and improvement and being well positioned to defend the budget your team needs to protect the company.

Related Reading: CISOs Challenged in C-Suite

Advertisement. Scroll to continue reading.

Related ReadingWhy CISOs Need a Security Manifesto

Related ReadingHow a CISO Can Be a Change Agent Within a Company

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem