Article

Security Wire Weekly: Shrinking IT security budgets

SearchSecurity.com Staff

Despite the perception that companies are increasing security spending, a recent survey of IT security professionals found that security budgets are making up a smaller portion of overall IT spending than previously thought. The survey, conducted by Midvale, Utah-based Burton Group, found that security budgets typically make up about 2% of IT budgets. The number is significantly lower than earlier estimates reflecting 6% to 12% of IT budgets spent on security. This week, Burton Group analyst, Pete Lindstrom discusses the survey and why a smaller security budget could be a good sign.




  Security Wire Weekly: Shrinking IT security budgets 


    Requires Free Membership to View

powered by ODEO

  • Download MP3 | Subscribe to Security Wire Weekly


      Program highlights 

  • (2:53) Introducing Pete Lindstrom.

  • (3:39) How surprising is the survey results? Are budgets trending downward?

  • (5:48) Is this an alarming trend?

  • (7:11) How should CISOs respond to a shrinking IT security budget?

  • (8:42) CISOs typically fall three levels below the company CEO. Is that a surprising find?

  • (11:50) Are there any market trends that could change the makeup of the IT security organization?

      Senior Analyst Pete Lindstrom 

    Pete Lindstrom
    Pete Lindstrom is a senior analyst at the Burton Group. His research has an emphasis on security metrics, risk management, Web 2.0/SOA/Web services security and securing new technologies. Lindstrom was research director for security consultancy, Spire Security and was an analyst with the Hurwitz Group.


      Program Links 

  • Oracle patches serious holes with latest CPU: Vulnerabilities in Oracle Application Server can be exploited remotely to hijack a system, according to Oracle's latest Critical Patch Update.


  • Mapping the path toward information security program maturity Amid tight information security budgets, it can be hard to recommend the best ways to invest new dollars or focus new resources. In this tip, Ed Moyle explains why creating a security program maturity map is a sensible way to not only track a program's growth, but also isolate and correct inefficiencies.

  • SearchSecurity.com Audio Downloads: Visit our audio download archive.


  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: