Business IT

How to decide on your company's IT security budget

By Alexander Moiseev on Nov 14, 2019 5:47PM
How to decide on your company's IT security budget

Editor's Picks

IoT Explained: What is the Internet of Things in Australia (June 2022)

5 essential digital transformation ideas

Top 5 Benefits of Managed IT Services

Venom BlackBook Zero 15 Phantom

Here are a few considerations when planning an organisation’s IT security budget.

Worldwide spending on information security products and services has been on the rise for years. According to Gartner, it’s going from $114 billion in 2018 (an increase of 12.4% from 2017) to forecasted growth of more than $124 billion in 2019. IT security leaders in enterprises also have high expectations: 72% say that their budget will increase in 2020. With more and more money being put into information security, it’s interesting to see how these investments are actually shaped.

From my experience, there are basically two ways to decide about the future, whether in business or personal matters. Number one: rely on your intuition and previous experience in similar situations or simply follow others choices. That’s a conventional approach. Number two: analyse your unique situation, break it down into small details and try to calculate the probability of these details changing in the near future. This is risk-based approach.

Now let's take a look at how different companies plan their IT security spending and what we can learn from these two approaches.

The conventional approach to budgeting

Newsletter Signup

Get the latest business tech news, reviews and guides delivered to your inbox.

I have read and accept the privacy policy and terms and conditions and by submitting my email address I agree to receive the Business IT newsletter and receive special offers on behalf of Business IT, nextmedia and its valued partners. We will not share your details with third parties.

The most typical approach to security budgeting is often based on today’s instant needs or on previous experience. This is especially relevant for growing companies that need to be able to quickly equip the business with minimum and necessary cybersecurity measures and tools to focus on growth.

In organisations at this stage, budget planning most often happens according to the principle of inheritance, whereby the current budget level is maintained for several cycles with minimum changes. There is no practice of setting strategic IT security goals or assessing specific risks, and the money is spent on emerging needs with ad hoc support.

This approach may work well unless sudden and unaccounted business needs emerge: for example, a decision to increase the digital side of the business, implement a cloud-based service for CRM or accounting, or open a new branch office. All these business decisions mean that the IT security budget, as well as personnel, will be rapidly allocated to fix the closest security gap, while previously scheduled tasks and deployments get delayed and piled up for later.

Unfortunately, as a result of this, the actual spending on security in these organisations may increase dramatically as whenever something unexpected happens, the organization will need to solve it as quickly as possible, no matter the cost. At the same time, larger organisations with a more mature approach to risk management may end up with a smaller proportion of money spent on information security.

A risk-based approach

It’s not surprising that in 2019, risk management expertise is cited as among the top three skills for Information Security Chiefs. In mature enterprises risk assessment is at the core of business processes. IT security is no different.

More mature organisations do not try to fix as many gaps as possible. First, they look at critical business risks — whether it’s downtime, service availability, a destroyed reputation, lost business opportunities or all kinds of direct monetary losses. For the businesses with this mindset, cybersecurity isn’t a habit or a ‘necessary evil’ investment instigated by scary headlines. It’s reasonable and it’s based on risk calculation (meaning the probability of an incident multiplied by its cost).

Cyberthreats make no exceptions but even so, each organisation will likely face specific types of cybersecurity risks. For an ecommerce firm with most of its business in digital, there’s a good chance that DDoS attacks on its web resources would cause massive damage, both monetary and reputational. Meanwhile, financial and government organisations will face significant penalties and fines from regulators should their systems get breached in an advanced cyberattack, so their budgets should focus here. Additionally, software developers and service providers can even be a target themselves, or a step in a supply chain attack against their customers. In other words, there are almost as many threat models as there are types of business, each with a specific and ever-changing set of risks.

As risks always imply a certain level of probability, IT security expertise is becoming a very important part of the risk assessment process. Here, experts – including external ones — are invited to evaluate possibilities and add their input for a better informed decision and balance the final outcome.

Finally, when a decision about purchasing a cybersecurity solution or service is made based on this approach, there is a transparent process of approval with higher management. This allows a company to avoid a situation when one employee in IT security forces a decision to not buy the most cost-effective and efficient solution — but, choose another, simply because, for example, they used to work with that platform in the past.

Of course, the risk assessment process differs from one company to another and it is constantly improving. Nonetheless, three key components — experts, risk evaluation, and a transparent decision-making chain — remain essential to help make budget planning more effective and make sure that the company’s investments in IT security are in line with business needs.

Lessons to learn

In simple terms, planning a security budget is similar to how different people approach their car maintenance for next year. As a car owner, I could just roughly estimate the average sum for regular expenses, tires, tech inspection and other such maintenance. However, as a racing enthusiast, I know I literally need to ‘kick the tires’ in advance: prepare for the season and make sure I will have enough budget for all car components (such as tires, brakes, etc.) that get worn out much faster on the track. This second approach is more mature and ultimately saves money. But it also demands expertise, time and dedication.

All in all, here are a few considerations when approaching an organisation’s IT security budget:

  1. When assessing risks, businesses should look at the threats most relevant to their industry and company size and then plan their budget accordingly. Access to the most up-to-date and tailored threat intelligence reports is invaluable in making this work.
  2. It is important to embrace expertise (whether internal, external or the combination of both) to evaluate risks and the potential value of cybersecurity solutions and services. Kaspersky and other vendors offer a variety of training to help organisations improve their level of internal expertise.
  3. Outsourcing is often the best choice for organisations that don’t yet have enough internal expertise or risk assessment processes. At this point, having a guaranteed service level agreement (SLA) and moving expenses from CapEx to OpEx is a way to keep security spending under control.
  4. While an industry benchmark alone isn’t enough information to make a budget decision, tools such as Kaspersky IT Security Calculator can be a good start to dive into the threats, measures and numbers that are worth looking into for the organisation of a certain industry, size and region.

When dealing with something as serious as corporate IT security (or racing at high speed) it’s best to take some time to prepare in advance, consult with experts and plan what to expect. As the saying goes, slow and steady wins the race!

Content supplied by Kaspersky.

Kaspersky
Tags:
budget cybersecurity kaspersky security software
By Alexander Moiseev
Nov 14 2019
5:47PM
0 Comments

Related Articles

  • 5 essential digital transformation ideas
  • Why phishing attacks are a more virulent security threat than ever before
  • How to lock down your web security
  • How SMBs can tackle heightened security pressures
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

5 essential digital transformation ideas

5 essential digital transformation ideas

Digital dystopia: your reputation is on the line

Digital dystopia: your reputation is on the line

How to manage payment risks and fraud in 2022

How to manage payment risks and fraud in 2022

IoT Explained: What is the Internet of Things in Australia (June 2022)

IoT Explained: What is the Internet of Things in Australia (June 2022)

Poll

What would you like to see more of on BiT?
News
Reviews
Features
How To's
Lollies
Photo Galleries
Videos
Opinion
View poll archive
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.