, ,

Cybersecurity is worth the spend

With earnings season approaching, organizations face a constant battle between growth and efficiency. It’s a back-and-forth pendulum that swings through macro changes, business results, challenges, and success. Businesses are continuously questioning whether they should accelerate marketing spending, look for ways to cut costs, and gauge whether their current budget is effectively geared toward driving an appropriate return on investment (ROI). Typically, across board rooms and leadership teams, general and administrative (G&A) systems are thought of as overhead: a cost element needed to mitigate risk and meet compliance standards, rather than one that generates a return.

Businesses often have a relatively large IT & security budget—but only a handful of people in the organization typically know how that budget is actually used. Unfortunately, even fewer can truly identify the ROI from each part of the stack compiling this budget. For businesses trying to set an appropriate cybersecurity budget, thinking about ROI shouldn’t be an afterthought—it should be a starting point. Spending $100,000 per year may feel like a lot—but it’s a good investment if it prevents $1 million in annual cyberattack losses.

Why cybersecurity is immune to recession

Companies of all sizes are susceptible to cyberattacks, no matter how many layers of defense they have in place. According to research from Harvard Business Review, organizations with 10,000 or more employees typically maintain almost 100 security tools—but despite this, even well-established global companies continue to be victimized by cyberattacks. The unfortunate truth is that it simply isn’t possible to stop 100% of attacks. As a result, most organizations are beginning to shift their thinking away from prevention and toward a focus on limiting the potential damage an attack can cause and better understanding where their actual vulnerabilities lie.

CIOs, CISOs, and the rest of a leadership team are ultimately responsible for protecting their company’s assets. Organizations spend millions of dollars on cybersecurity annually, as the overall security market is heading towards $300B in total addressable market (TAM). With this in mind, CISOs are seeking more budget flexibility to ensure they are meeting their company’s goals. As the number of cyberattacks increases and these attacks become more sophisticated, too many CISOs still struggle to answer basic questions about whether their company is secure and how well protected their assets actually are.

In order to accurately answer those questions, CISOs need to be able to continuously measure and demonstrate cyber effectiveness to leadership. They need to illustrate risk, validate controls, understand exposures mapped to security frameworks, and rationalize security spend while managing costs. The good news for security teams? Cybersecurity will always be critical for businesses. Even during leaner times, businesses will always need to invest in cybersecurity solutions to keep their data and other assets secure. As long as security teams can use data to justify which solutions are essential to their operations, cybersecurity is effectively recession-proof.

Establishing a cybersecurity budget gameplan

With the recently launched reporting requirements by the Security Exchange Commission (SEC) to address cyber incidents, registrants must disclose on the new Item 1.05 of Form 8-K any cybersecurity incident that the SEC determines to be material. Companies must also describe the material aspects of the incident's nature, scope, and timing, along with its impact on the registrant. The Form 10-K and Form 20-F disclosures will be due beginning with annual reports for fiscal years ending on or after December 15, 2023. The Form 8-K and Form 6-K disclosures will be due beginning the later of 90 days after the date of publication in the Federal Register or December 18, 2023.

This information doesn’t just magically appear, and gathering it requires having the right resources in place to not just detect potential security incidents, but effectively document both the course plotted by the attacker and the mitigation efforts engaged in by the organization. That means it is critical for organizations to have full visibility across their digital environments, with continuous monitoring capabilities that can detect and document changes as they occur. These continuous visibility and monitoring capabilities don’t just allow businesses to adhere to new compliance guidelines—they also help establish a solid foundation upon which to build a successful cybersecurity program. By effectively mapping out their digital environments and testing them for known vulnerabilities, organizations can have a more accurate view of their unique risk profile and better understand the steps they need to take to improve their security posture.

In practice, this means leaders must first take inventory of their data assets and their value to the company. Next, they should consider what they need to do in order to comply with industry regulations that may apply to their business, such as healthcare’s HIPAA or the European Union’s General Data Protection Regulation (GDPR). Do they need new solutions to enable additional visibility? Stronger endpoint protections? Expanded identity management capabilities? Once they have a firm understanding of what their goals are and the steps needed to accomplish them, leaders should look at what their company’s overall IT budget is. If what a company needs is about 20-25% or less of your general IT budget, then you probably have a useful figure to start with. Once that’s completed, it’s time to deep dive into assessing and verifying what’s working and what does not have any ROI. Just because a company spends money does not mean that money is being spent in the right places.

Aligning security with business

This responsibility will largely rest on the shoulders of the CISO or the CTO, and they will need to be able to effectively state and demonstrate their case to the CFO, COO, CEO, and other stakeholders. Given that most business leaders tend to think in terms of how their decisions impact the business’s bottom line, it is important to be able to properly articulate the ROI that cybersecurity investments can have. Whether those returns come in the form of eliminating redundant solutions, streamlining security processes, or preventing costly breaches, framing things in a business context is the most effective way to ensure security leaders and business decision makers can align on their initiatives.

We've listed the best cloud antivirus.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

https://www.techradar.com/pro/cybersecurity-is-worth-the-spend


Leave a Reply

Your email address will not be published. Required fields are marked *

July 2024
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031  

About Us

Welcome to encircle News! We are a cutting-edge technology news company that is dedicated to bringing you the latest and greatest in everything tech. From automobiles to drones, software to hardware, we’ve got you covered.

At encircle News, we believe that technology is more than just a tool, it’s a way of life. And we’re here to help you stay on top of all the latest trends and developments in this ever-evolving field. We know that technology is constantly changing, and that can be overwhelming, but we’re here to make it easy for you to keep up.

We’re a team of tech enthusiasts who are passionate about everything tech and love to share our knowledge with others. We believe that technology should be accessible to everyone, and we’re here to make sure it is. Our mission is to provide you with fun, engaging, and informative content that helps you to understand and embrace the latest technologies.

From the newest cars on the road to the latest drones taking to the skies, we’ve got you covered. We also dive deep into the world of software and hardware, bringing you the latest updates on everything from operating systems to processors.

So whether you’re a tech enthusiast, a business professional, or just someone who wants to stay up-to-date on the latest advancements in technology, encircle News is the place for you. Join us on this exciting journey and be a part of shaping the future.

Podcasts

TWiT 987: Often Plagiarized, Never Equalled – Sapce Junk, Threads Hits 175M Users, AIndependence This Week in Tech (Audio)

Why Surgeon General's Social Media Warning Label is a Bad Idea Russia says Apple blocks 25 VPN apps in Russia, IFX reports Microsoft MSFT Tells Texas Agencies They Were Exposed in Russian Hack Microsoft says it's okay to steal content published on the web Declare your AIndependence: block AI bots, scrapers and crawlers with a single click Perplexity's grand theft AI The Julian Assange Saga Is Finally Over Zotac's Big Mistake | Consumer Warranty & Business Data Exposure NASA and SpaceX misjudged the risks from reentering space junk The White House will host a conference for social media creators Meta's Threads hits 175 million users one year after launch Google emissions jump nearly 50% over five years as AI use surges Judge blocks Mississippi law that required age verification on social media Host: Leo Laporte Guests: Paris Martineau, Allyn Malventano, and Larry Magid Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: panoptica.app expressvpn.com/twit NetSuite.com/TWIT 1password.com/twit
  1. TWiT 987: Often Plagiarized, Never Equalled – Sapce Junk, Threads Hits 175M Users, AIndependence
  2. TWiT 986: Our Dope GPS! – Supreme Court Decisions, Snapdragon X Elite Tests
  3. TWiT 985: TikTok With Wings – AT&T Landlines, US Bans Kaspersky and DJI
  4. TWiT 984: Fifty-three Clicks – Bot Farms in Ukraine, LA Public Health Dept. Phished
  5. TWiT 983: Digital Snackwells – NVIDIA's Thor, Adobe's TOS, Insta's Unskippable Ads