According to a recent PricewaterhouseCoopers study, while SMBs spend nearly 15% of their IT budgets on security,...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
large companies spend only 11%. Both numbers represent an increase from a few years ago. Given that, how should CISOs best strategically take advantage of increases in cybersecurity spending?
Come budget year, all managers, including the CISO, grapple with how to spend the remaining budget in fear that executive management will reduce the subsequent year's allocation. You either use it or you lose it.
There is a general increase in cybersecurity spending in various types of organizations. There are many ways to spend an increased budget, including hiring more staff or acquiring tools that would be the envy of many (though smaller businesses should be careful to avoid shelfware).
But the better question is what do you need? First, you need to determine the total cost of ownership (TCO) for establishing the right complement of resources -- people and technology. The TCO needs to include:
- Total cost of technology (TCT): The cost of technology that is required to deploy, monitor and report on the state of information security for the enterprise.
- Total cost of risk (TCR): The cost to estimate and not deploy resources, processes or technology for your enterprise, such as compliance risk, security risk, legal risk and reputation risk.
- Total cost of maintenance (TCM): The cost of maintaining the information security program, such as people, skills, flexibility, scalability and comprehensiveness of the systems deployed.
The formula for TCO includes a junction of TCT, TCR and TCM. We all want to have the resources necessary to meet and stay ahead of risks. But how much of that budget is truly necessary?
It's difficult to calculate a realistic TCO because what is best for one organization may not be the best practice for another organization, but this is the best approach to effectively take advantage of an increased security budget.
Ask the Expert:
Have questions about enterprise security? Send them via email today. (All questions are anonymous.)
How to negotiate for a better DLP tool when your security budget is limited
Dig Deeper on Business Management: Security Support and Executive Communications
Related Q&A from Mike O. Villegas
FITARA became a law in 2014, but government cybersecurity continues to struggle. Expert Mike O. Villegas discusses the effects of the law.continue reading
The use of bug bounty programs in enterprises is growing, but they aren't risk free. Expert Mike O. Villegas discusses some concerns related to bug ...continue reading
A congressman proposed adding a Cyber National Guard to the military to protect the U.S. from cyber adversaries. Expert Mike O. Villegas examines the...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.