Balancing cost and protection: Budgeting physical security programs

Balancing cost and protection: Budgeting physical security programs

Budgeting for physical security programs is a strategic balancing act between maximizing the safety of people and assets while keeping costs down and ensuring a good ROI on the program’s budget spend. As security program leaders, the role that budgeting plays is crucial to the success of the organization, providing both short- and long-term goals for not only operational investments, but capital investments that will move the needle for the security team. On the surface,…

Read More

New research shows 12% of CISOs faced budget declines in 2024

New research shows 12% of CISOs faced budget declines in 2024

Research from IANS Research and Artico Search reveals the impact the global economy is having on security budgets. The research includes a survey of more than 750 CISOs from April to August 2024.  The average budget growth has increased from 6% in 2023 to 8% in 2024. However, this rise is smaller than in previous years, as 2021 saw a growth rate of 16% and 2022 saw one of 17%. Meanwhile, almost two-thirds of CISOs report a higher…

Read More

The CISO role will either flourish or vanish

The CISO role will either flourish or vanish

Without a doubt, any C-level executive title comes at a personal cost — sleepless nights, countless questions and loads of responsibilities. That said, I believe today’s role of the CISO is accompanied by enormous pressures. Consequently, the way the role is currently structured does not set the CISO, nor the organization, up for success.  In speaking with my peers across the industry, I realize that we’re at a pivotal time for CISOs. Since its creation…

Read More

The top security threats leaders must prepare for in 2023

The top security threats leaders must prepare for in 2023

The top security threats leaders must prepare for in 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The hidden costs of alarm systems (and how to avoid them)

The hidden costs of alarm systems (and how to avoid them)

The hidden costs of alarm systems (and how to avoid them) | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How to protect cybersecurity budgets

How to protect cybersecurity budgets

How to protect cybersecurity budgets | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

4 security risk management tips for small to medium-sized organizations

4 security risk management tips for small to medium-sized organizations

4 security risk management tips for small to medium-sized organizations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Security at scale: Growing a security program regardless of headcount, size or budget

Security at scale: Growing a security program regardless of headcount, size or budget

<!– Security at scale: Growing a security program regardless of headcount, size or budget | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

90% of security leaders face internal cybersecurity skills shortage

90% of security leaders face internal cybersecurity skills shortage

90% of security leaders face internal cybersecurity skills shortage | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Where to spend on security depends on business objectives

Where to spend on security depends on business objectives

Where to spend on security depends on business objectives | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2