Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Security's Dollar Daze

Getting resources for security means making a savvy business case

2:10 PM -- The feeding frenzy is over. Now the hard part begins.

Over the past couple of years, it's been pretty easy to get resources -- people, equipment, budget -- for IT security. If dozens of public breach disclosures didn't scare the hell out of your CXOs, then the panic to achieve regulatory compliance probably did. Fear is a great motivator.

Now, however, top managers are starting to think more skeptically. They've spent a lot of money on security, and they're not sure whether their businesses really are more secure. And, as they continually seek ways to trim the budget, they are beginning to scale back on wild security spending. (See Security's Sea Change.)

For security pros, this new skepticism means that future purchase requests will be met with more scrutiny, more arguments, and more questions. If you want approval, you'll need to make a stronger business case for the investments you make.

One way to do that is to demonstrate the vulnerabilities that your company faces, and the potential fallout if those vulnerabilities are exploited. As experts eloquently explained at the Gartner IT Security Summit earlier this week, the ability to track hackers' directions can make a big difference in the way you set your security priorities. (See Using Bugs as Leverage.)

Another way to do it is to integrate security priorities and business priorities. This strategy is excessively evident in the security information management (SIM) space, where security products are evolving to incorporate broader business priorities, such as IT governance, risk management, and compliance cost control. (See A Multitude of SIMs.)

A third way to make security's business case is to position it as a point of differentiation. A study being presented today by researchers at Carnegie Mellon University indicates that consumers are willing to pay more to buy from online vendors that do their best to protect user privacy. (See Privacy Premium Doesn't Faze Buyers.)

In the end, though, security faces the same business problem it always has: It's hard to prove a negative. How much money did your company save last month because it didn't get hacked? Would it have achieved that same result if it had spent less? Some CFOs may want to tinker with the numbers to try and find out.

There is still plenty of fear on the horizon, especially with breaches such as TJX's still making the headlines. But if industry predictions about the coming year are true, IT is going to have to fight harder for its security dollars. If you haven't put your business cap on for a while, it's time to dig it out. You're gonna need it.

— Tim Wilson, Site Editor, Dark Reading


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Open redirect vulnerability in SHIRASAGI v1.13.1 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
PUBLISHED: 2020-07-09
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when u...
PUBLISHED: 2020-07-09
In TimelineJS before version 3.7.0, some user data renders as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most T...
PUBLISHED: 2020-07-09
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A ...
PUBLISHED: 2020-07-09
A reflected Cross-Site Scripting (XSS) Vulnerability in the KingComposer plugin through 2.9.4 for WordPress allows remote attackers to trick a victim into submitting an install_online_preset AJAX request containing base64-encoded JavaScript (in the kc-online-preset-data POST parameter) that is execu...