Network Computing is part of the Informa Tech Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
“Money should be no object when it comes to cybersecurity” is a phrase often uttered by people who generally know very little about money and even less about cybersecurity.
Actually, money does matter. It matters a lot. If money didn’t matter, even the most modest enterprise could hire a team of experts to work around the clock to build, operate, and maintain a military-grade cybersecurity infrastructure.
The truth is that cybersecurity, like any other business operation, has to follow a budget.
Budget Optimization
Security budgeting can be challenging since the vulnerability landscape changes daily. “We, as a cyber practice, do not believe there is a single magic software or platform,” says Rahul Mahna, managing director, managed security services, at risk and regulatory compliance advisory firm EisnerAmper Digital. He suggested creating a budget that adheres to three distinct visions: past incident reflections (to prevent repeating previous mistakes); current security needs; and future plans.
All cyber events and impacts aren’t equal, nor are organizations equally able to defend against and recover from them. “We advise leaders to optimize cybersecurity spend by first working to quantify the risk unique to their organizations in specific dollar terms,” says Andrew Morrison, US cyber risk services strategy, defense, and response solutions leader at business advisory firm Deloitte. Cyber risk quantification allows leaders to calculate expected losses from a cyber event in dollar terms. “Through bespoke modeling and scenario simulation, it’s possible to determine fairly accurate estimates of financial loss that could result from a cyber event — and to help determine how cyber spend should be allocated and prioritized to more impactfully address those specific risks.”
Avoiding Pitfalls
Many organizations start building their cybersecurity budget under the faulty assumption that they will probably never be attacked. They then believe they can safely minimize their cybersecurity investment. “I can think of thousands of companies that felt the same way,” says Alan Brill, senior managing director of the cyber risk practice at governance and risk advisory firm Kroll. Most eventually learned — the hard way — that attacks can hit any enterprise at any time.
Read the rest of this article on InformationWeek.
Organizations must adopt a forward-looking network security strategy that can deal with advanced threats, ensure regulatory compliance, and safeguard the network.
With hybrid work here to stay, organizations need to boost the employee user experience by ensuring performance, connectivity, security, and usability.
Social media security is vital for every enterprise in blocking targeted attacks, securing corporate accounts from compromise, and fighting scams and frauds.
There is no reason for security to lag behind and stick to old models when there are the capabilities and infrastructure to enable cloud-first network security.
How to hamper the adversary using AI-Powered cybersecurity.
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and head office is 5 Howick Place, London, SW1P 1WG.

source

You May Also Like

From Pelotons to Printers: Big Risks in Connected Devices

Network Computing is part of the Informa Tech Division of Informa PLCThis…

Visibility and Network Security: Using Dynamic Data to Prevent Cyberthreats

To a threat actor, an enterprise network is an attractive target, and…