Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How to Decide on Your Company’s IT Security Budget

By Alexander Moiseev
budget-enews
January 15, 2020

Global spending on information security products and services has been on the rise for years. According to Gartner, budgets have grown from $114 billion in 2018 to a forecasted growth of more than $124 billion in 2019. IT security leaders in enterprises agree, with 72 percent saying that their budget will increase in 2020. With more money being allocated for information security, it’s interesting to see how these investments are actually shaped.

From my experience, there are two ways to decide about the future. One option is to rely on your intuition and previous experience or simply follow prior protocols. The other is to analyze your unique situation, break it down into small details and try to calculate the probability of these details changing in the near future.

With this in mind, let's take a deeper look at how different companies plan their IT security spending and what we can learn from these two approaches.

The Conventional Approach to Budgeting

The most typical approach to security budgeting is often based on instant needs or on previous experience. This is especially relevant for growing companies that need to be able to quickly equip businesses with the minimum necessary cybersecurity measures and tools to focus on growth.

In organizations at this stage, budget planning most often happens according to the principle of inheritance, whereby the current budget level is maintained for several cycles with minimum changes. There is no practice of setting strategic IT security goals or assessing specific risks, and the money is spent on emerging needs with ad hoc support.

This approach may work well unless sudden and unaccounted business needs emerge, for example, a decision to increase the digital side of the business, implement a cloud-based service for CRM or accounting or open a new branch of an office. All these business decisions mean that the IT security budget, as well as personnel, will be rapidly allocated to fix the closest security gap while previously scheduled tasks and deployments get delayed and piled up for later.

As a result of this, the actual spending on security in these organizations may increase dramatically as whenever something unexpected happens, the organization will need to solve it as quickly as possible, no matter the cost. At the same time, larger organizations with a more mature approach to risk management may end up with a smaller proportion of money spent on information security.

A Risk-Based Approach

It’s not surprising that in 2019, risk management expertise is cited among the top three skills for Information Security Chiefs. In mature enterprises, risk assessment is at the core of business processes, and IT security is no different.

More mature organizations do not try to fix as many gaps as possible. First, they look at critical business risks, whether it’s downtime, service availability, a destroyed reputation, lost business opportunities or any kind of direct monetary losses. For the businesses with this mindset, cybersecurity isn’t a habit or a ‘necessary evil’ investment instigated by scary headlines, it’s reasonable and based on risk calculation.

Cyber threats do not discriminate against industry or size, and all organizations are likely to face specific types of cybersecurity risks. For an ecommerce firm with most of its business in digital, there’s a good chance that DDoS attacks on its web resources would cause massive damage, both monetary and reputational. Meanwhile, financial and government organizations will face significant penalties and fines from regulators should their systems get breached in an advanced cyberattack, so their budgets should focus here. Additionally, software developers and service providers can even be a target themselves, or a step in a supply chain attack against their customers. In other words, there are almost as many threat models as there are types of business, each with a specific and ever-changing set of risks.

Since there is always a certain probability of risk, IT security expertise is becoming a very important part of the risk assessment process. Experts, including external ones, are invited to evaluate possibilities and add their input for a better informed decision and balance the final outcome.

Finally, when a decision about purchasing a cybersecurity solution or service is made based on this approach, there is a transparent process of approval with higher management. This allows a company to avoid a situation when one employee in IT security forces a decision to not buy the most cost-effective and efficient solution — but choose another simply because, for example, they used to work with that platform in the past.

Of course, the risk assessment process differs from one company to another and it is constantly improving. Nonetheless, three key components — experts, risk evaluation, and a transparent decision-making chain — remain essential to help make budget planning more effective and make sure that the company’s investments in IT security are in line with business needs.

Lessons to Learn

In summary, here are a few considerations when approaching an organization’s IT security budget:

  1. When assessing risks, businesses should look at the threats most relevant to their industry and company size and then plan their budget accordingly. Access to the most up-to-date and tailored threat intelligence reports is invaluable in making this work.
  2. It is important to embrace expertise (whether internal, external or the combination of both) to evaluate risks and the potential value of cybersecurity solutions and services. Kaspersky and other vendors offer a variety of training to help organizations improve their level of internal expertise.
  3. Outsourcing is often the best choice for organizations that don’t yet have enough internal expertise or risk assessment processes. At this point, having a guaranteed service level agreement (SLA) and moving expenses from CapEx to OpEx is a way to keep security spending under control.
  4. While an industry benchmark alone isn’t enough information to make a budget decision, tools such as Kaspersky IT Security Calculator can be a good start to dive into the threats, measures and numbers that are worth looking into for the organization of a certain industry, size and region.

When dealing with something as serious as corporate IT security, it’s best to take some time to prepare in advance, consult with experts and plan what to expect.

KEYWORDS: cyber security cybersecurity information security security budget security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alexander moiseev2
Alexander Moiseev is the Chief Business Officer of Kaspersky, where he is responsible for sales strategy and marketing globally. Previously, he was Kaspersky’s Chief Sales Officer, where he led global sales and new business development. He graduated from Moscow State University with a degree in engineering with mathematics and cybernetics.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1119-awareness-Feat-slide1_900px

    Enterprise Cybersecurity: Three Topics to Discuss With Your CISO

    See More
  • hacker

    How to Work with Hackers to Make Your Company More Secure

    See More
  • data privacy

    Accidental database breaches are on the rise – How can your company avoid becoming the next headline?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing