News Stay informed about the latest enterprise technology news and product updates.

Security Wire Weekly: Shrinking IT security budgets

Pete Lindstrom of the Burton Group explains why shrinking IT security budgets could be a good sign.

Despite the perception that companies are increasing security spending, a recent survey of IT security professionals found that security budgets are making up a smaller portion of overall IT spending than previously thought. The survey, conducted by Midvale, Utah-based Burton Group, found that security budgets typically make up about 2% of IT budgets. The number is significantly lower than earlier estimates reflecting 6% to 12% of IT budgets spent on security. This week, Burton Group analyst, Pete Lindstrom discusses the survey and why a smaller security budget could be a good sign.

  Security Wire Weekly: Shrinking IT security budgets  

powered by ODEO

  • Download MP3 | Subscribe to Security Wire Weekly

      Program highlights  

  • (2:53) Introducing Pete Lindstrom.

  • (3:39) How surprising is the survey results? Are budgets trending downward?

  • (5:48) Is this an alarming trend?

  • (7:11) How should CISOs respond to a shrinking IT security budget?

  • (8:42) CISOs typically fall three levels below the company CEO. Is that a surprising find?

  • (11:50) Are there any market trends that could change the makeup of the IT security organization?

      Senior Analyst Pete Lindstrom  

    Pete Lindstrom
    Pete Lindstrom is a senior analyst at the Burton Group. His research has an emphasis on security metrics, risk management, Web 2.0/SOA/Web services security and securing new technologies. Lindstrom was research director for security consultancy, Spire Security and was an analyst with the Hurwitz Group.

      Program Links  

  • Oracle patches serious holes with latest CPU: Vulnerabilities in Oracle Application Server can be exploited remotely to hijack a system, according to Oracle's latest Critical Patch Update.

  • Mapping the path toward information security program maturity Amid tight information security budgets, it can be hard to recommend the best ways to invest new dollars or focus new resources. In this tip, Ed Moyle explains why creating a security program maturity map is a sensible way to not only track a program's growth, but also isolate and correct inefficiencies.

  • Audio Downloads: Visit our audio download archive.

  • Dig Deeper on Information security program management

    Start the conversation

    Send me notifications when other members comment.

    Please create a username to comment.