Defense in Depth

Security Budgets


Listen Later

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-security-budgets/)

How do you calculate a security budget? Is it a percentage of the IT budget? Something else? And why does it grow so drastically after a breach?

Thanks to this week's podcast sponsor, IronNet Cybersecurity.

To combat sophisticated cyber threats, companies are increasingly adopting collective defense strategies to actively share intelligence with peer organizations to improve the detection capabilities of the collective. Through faster sharing of behavioral analytics, signature-based, and human threat insights, organizations can more effectively spot malicious activity and reduce attacker dwell time. More on IronNet Cybersecurity.

On this episode of Defense in Depth, you'll learn:

  • The general consensus among the community is cybersecurity is a spend it now or spend more later decision.
  • While everyone wants to find a metric to determine how much to spend on cybersecurity, there doesn't seem to be any that are useful.
  • The CISO's job is to provide data about risks so the business can make the decision about cybersecurity spending.
  • Most assume that after a breach there's more cybersecurity budget, but what you get first is cooperation.
  • Look at security as a market differentiator. What if you could withstand a cyber attack but your competition couldn't? Or possibly you could deliver a higher level of reliability to your customers. How would your business be perceived by the market?
  • A business impact analysis calculator can help understand your risk levels. Allan Alford has one his site.
  • Many felt the biggest cost to a company suffering a breach isn't loss of data or the regulatory fines, but the damage to the company brand.
  • The cost of proactive protection always beats the cost of suffering a data breach.
  • One listener recommended that MBA programs should have a breach case study as part of their curriculum.

...more
View all episodesView all episodes
Download on the App Store

Defense in DepthBy David Spark, Steve Zalewski, Geoff Belknap

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

73 ratings


More shows like Defense in Depth

View all
Hacked by Hacked

Hacked

186 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,011 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

370 Listeners

Risky Business by Risky Business Media

Risky Business

372 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

652 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,026 Listeners

Smashing Security by Graham Cluley

Smashing Security

318 Listeners

Click Here by Recorded Future News

Click Here

419 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,075 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

177 Listeners

Hacking Humans by N2K Networks

Hacking Humans

316 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

195 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

139 Listeners

Risky Bulletin by Risky Business Media

Risky Bulletin

45 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

167 Listeners