How to Present Cybersecurity in a Way That Resonates

How to Present Cybersecurity in a Way That Resonates

Securing buy-in for cybersecurity projects in business requires a fine balance. If the rest of the C-suite believes the company is already secure, the CISO may struggle to get a budget for projects. Simultaneously, getting funding for preventative measures can be difficult to communicate. At the ISC2 Security Congress held in Las Vegas from Oct. 12-16, Safe-U founder and CEO Jorge Litvin shared strategies for framing security discussions in ways that resonate with executives. Why…

Read More

Balancing cost and protection: Budgeting physical security programs

Balancing cost and protection: Budgeting physical security programs

Budgeting for physical security programs is a strategic balancing act between maximizing the safety of people and assets while keeping costs down and ensuring a good ROI on the program’s budget spend. As security program leaders, the role that budgeting plays is crucial to the success of the organization, providing both short- and long-term goals for not only operational investments, but capital investments that will move the needle for the security team. On the surface,…

Read More

New research shows 12% of CISOs faced budget declines in 2024

New research shows 12% of CISOs faced budget declines in 2024

Research from IANS Research and Artico Search reveals the impact the global economy is having on security budgets. The research includes a survey of more than 750 CISOs from April to August 2024.  The average budget growth has increased from 6% in 2023 to 8% in 2024. However, this rise is smaller than in previous years, as 2021 saw a growth rate of 16% and 2022 saw one of 17%. Meanwhile, almost two-thirds of CISOs report a higher…

Read More

Cyber budgets year-over-year have increased by 59%

Cyber budgets year-over-year have increased by 59%

Optiv has published its 2024 Threat and Risk Management Report, exploring how organizations are maintaining pace with the evolving threat landscape. Specifically, the report examines the efforts of organizations in terms of cybersecurity investments and governance priorities. For instance, among organizations with more than 5,000 employers, 63% allocated an average of $26 million toward cybersecurity investments in 2024.  The top three investments made among organizations include acquiring additional cybersecurity tools (51%), investing in identity and access…

Read More

Recognizing the hidden costs of a security program

Recognizing the hidden costs of a security program

The costs associated with a security program almost always solely rely on the hefty price tags of security tools and the security headcount needed to support them. What these budgets fail to include is the hidden expenses of operationalizing security. In most cases, hidden costs are at scales greater than those seen on financial sheets — and decision makers must be fully aware of the true impact security has on an organization’s bottom line if…

Read More

Sweating the assets: Maximizing cybersecurity investments for greater ROI

Sweating the assets: Maximizing cybersecurity investments for greater ROI

Sweating the assets: Maximizing cybersecurity investments for greater ROI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Sixty-six percent of security leaders admit staffing challenges

Sixty-six percent of security leaders admit staffing challenges

53% believe security investment is keeping pace with digital business | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

58% of organizations claim high or critical OT security risk levels

58% of organizations claim high or critical OT security risk levels

58% of organizations claim high or critical OT security risk levels | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

AMA: Security Executive Edition — Mary Gates

AMA: Security Executive Edition — Mary Gates

AMA: Security Executive Edition — Mary Gates | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Formula for success: How to determine the optimal investment in cybersecurity protection

Formula for success: How to determine the optimal investment in cybersecurity protection

Formula for success: How to determine the optimal investment in cybersecurity protection This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2