

Thank you for Subscribing to Gov Business Review Weekly Brief
The days of Information Security and Data Privacy budgets expanding year-over-year have started to slow significantly. The average Information Security/Data Privacy budget is close to 10 percent of the overall IT budget, but what we are seeing is spending at the 2020 limits and not growing as you would expect. Is Information Security becoming less a priority to management or the Board of Directors (BoD)? I would say no, and a study by the Ponemon Institute found that “83 percent of directors describe themselves as at least ‘moderately’ engaged with overseeing the risk of cyber attacks”( Cyber Security Becomes a Boardroom Priority | Director point). This is very significant and does not align with the data on slowing security budgets. What is the disconnect? We can see several trends and potential reasons, but the feeling seems to get the most out of what you have and avoid the new “shiny” toys. So, if 83 percent of the BoD cares about cyber security, and the SEC is requiring specific cyber security (https://www.sec.gov/news/press-release/2022-39 by the BoD, how do Information Security/Data Privacy groups manage this?
This quandary requires IT professionals to take a much more business approach to safeguard assets and data and make decisions on a risk-based approach. This is not a new concept, but this is now a narrative that will resonate with senior management and the BoD and be the proverbial good story to tell. In talking with colleagues in different size companies and industries is to approach your strategic and steady-state operations is to bucket controls into four (4) categories and budgets based on criticality: • Crown Jewels (40 percent) • Technical (30 percent) • Regulatory (20 percent) • Administrative (10 percent) The percentages are just an example, but would likely be close after your initial analysis. When I say Crown Jewels, it may overlap the other areas, but knowing what drives the company’s revenue and what is critical to the organization should be a priority. The CISO function is as much a technical expert as a business leader in our current data-centric world. This requires the CISO and information security group to be a partner and not in the Yes or No business. If a business process is facilitating a Crown Jewel component, then moving resources to safeguard that aspect should be imperative for any IT/Security leader.This is a fast-moving world, and if you don’t stop and look around you might miss it
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info