A recent study showed that organizations spend less than 1% of company revenue on cybersecurity. This means that a company with 5 million dollars in annual revenue may spend $50,000 on cybersecurity per year. The question is not whether this small amount is "enough", but rather, is this money being spent in the right places?
Common cybersecurity spending mistakes are often made when organizations seek to purchase the latest firewall, antivirus, intrusion detection system, or security awareness training. Often times, IT Directors are given a set budget to spend on cybersecurity without a game plan. This equates to ill-advised purchases of technologies, software, and hardware that do absolutely nothing to raise the security bar.
So, where would I start?
If I were an IT Director or CIO and I had $50,000 to spend on cybersecurity for my $5M business, I would take a step back and think about what really matters to the organization. I would begin this journey by asking myself (and my staff) some fundamental questions:
By the end of this exercise, I now understand what makes the organization profitable, what our data would be worth to attackers, what would be the impact of a data breach, what I am obligated to do by law, and what are the current security assets that I could leverage.
Now, what is my next move?
With the newly acquired information, I have a firm understanding that my company needs more protection. I may have PCI, DFARS, HIPAA, FFIEC, NERC, or other requirements but I do not have a game plan to address our overall security posture. I am also aware that my organization has sensitive data yet we have no control of our users and where they place data. I am understaffed and do not have the time to fix all of these things. However, I have figured out that spending $20,000 on a new firewall is not the best option for my company. I need an expert.
Whether the expert is internal or outsourced, you need a structured, trusted, and comprehensive program that is designed to minimize impact, bolster defenses, become compliant, and move the cybersecurity needle. This is where expertise and an unbiased perspective comes into play. The truth is that the vendor that is trying to sell you the next "blinking light machine" is likely not thinking in the best interest of your business—or your budget.
So, what is my course of action?
As an IT Director or CIO, my area of expertise is most likely not within cybersecurity, but in information technology. The two coexist and are certainly related, however each are their own individual science and require vastly different experience and skill.
I need a hero!
Let's say that I have $50,000—this is what I would do.
Year 1:
Year 2
By this time, your newly found cybersecurity champion has accomplished the following:
Congratulations!
Your budget has now been increased from $50,000 in year one to $100,000 in year two.
Why?
Because, you now have a structured plan based on a trusted set of criteria and have avoided chaotically spending precious funds in random areas of cybersecurity. You have empowered a highly-trained, unbiased, and experienced professional or firm to bring you to a new level of cybersecurity. Your board sees your due diligence, has learned from the process, and has become personally invested in the cyber-success of the organization. They are no longer external spectators to the cybersecurity actions in the company, but are now active participants that feel included, informed, and educated.
The lack of understanding, prioritization, and transparency are what create low budgets for protecting your organization. With data breach stories flooding the news every day, organizations are not intentionally setting low budgets for you. They simply do not understand what they should be setting a budget for. It is up to you to educate them by implementing a structured approach, either internally or outsourced. You have now made the case to increase the budget based on the in-depth and precise continuous analysis that is being performed.
Pick your chess moves wisely and remember; even the organizations with the latest (and most expensive) firewalls, intrusion detection systems, antivirus, and SIEM tools are breached. Creating an effective cybersecurity program begins with choosing the right person or company for the job. You can buy all of the latest technology in the market only to become proverbial paperweights without the right resources and approach.
Start with the basics, take a step back, and spend your money in the right places.
To learn more about IGI's approach to managed cybersecurity, visit igius.com/managed-security/.