Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Where to spend on security depends on business objectives

By Lior Marom
security-budgets-freepik.jpg
September 8, 2021

Running a security operation is now a heavier task than ever before. Assets are moving targets because so many employees are still working from home — some likely will be for a while — and that means more possible vulnerabilities and less control. 


Organizations are shoring up security by building out their tools and technology and hiring to close skills gaps. According to a recent Cybersixgill survey of 150 CISOs, 85% of CISOs have budgets of more than $1 million. A whopping 97% expect their teams to grow this year, with 56% anticipating growth of up to 10%, and a third – 34% – expecting growth of 11-20%.


How CISOs approach these technologies and hiring decisions will go a long way in determining how their security posture evolves this year and beyond. There’s an important balance to strike between the two, and you can’t determine the right mix without taking a step back to understand the business itself. 


Which CISO are you? 

CISOs are defined by how they approach key decisions like technologies to implement and hiring. There are two major philosophies: Some CISOs are optimizers, and some are satisficers.


Optimizers focus more on gathering as much data as possible and building ideal scenarios (good luck with that) before making decisions. They hold out for a bigger budget to address any issues that may arise. Suppose the right teams and tools don’t exist already. In that case, an optimizer won’t be ready to start building or updating a cybersecurity system until they have enough information to know they’ve made the best choices. 


Satisficers will, of course, wish for those ideal conditions, but they work within the current landscape and identify more solutions than problems when considering a security plan. In this situation, a satisficing CISO can prioritize what is best for the business and optimize the budget accordingly. Especially these days, CISOs have to do the best they can with the information available. 


It’s no surprise that satisficing is the better approach. Still, to find the best available solution, you need to fully understand how the business operates beyond just privacy and security concerns. For example, knowing that the company plans to expand to Europe means GDPR compliance requirements are on the horizon. A new product for a healthcare company might introduce new HIPAA requirements.


When joining a new organization, spend the first month listening rather than offering suggestions. Learn about the objectives of the business, which will shape the scope and focus of security. Learn the organization’s culture. It may offer a glimpse into what resources – both financial and otherwise – are available to beef up a security team.


Building resources

Finding the right balance between technological innovation and manpower is one of the bigger challenges for CISOs.


There are fantastic, effective tools and technology, but they can’t work alone. They need proper support, whether a DevOps team or a SOC team, to run and maintain these tools on a daily basis. It has become an expensive and necessary requirement and will only grow more important. 


According to Gartner Inc., worldwide spending on security and risk management is expected to exceed $150 billion by the end of 2020, 12.4% more than companies spent in 2020.


Finding the right tech tools and deciding how to spend that money depends on the structure of your company. A cloud-based operation will want more automated tools for an automated process. Any company not working as much on the cloud will likely want to spend on human oversight of the technology. The answer always needs to be directly related to your business objectives. 


You also have to develop a roadmap for those objectives. For example, if a new product or service comes along, you need a development cycle that prioritizes security and privacy by design. You might need a DevOps engineer to support that lifecycle.


Take an active approach in creating those protections. Instead of playing whack-a-mole and reacting to vulnerabilities that have already been exploited, be aware of the building blocks of your company and its operations as clues for what might be most at risk. For example, if an operation is running on AWS, be diligent about finding and tracking chatter on hacking forums about vulnerabilities with that platform. If that’s something threat actors are exploiting, you’ll want to know as soon as possible. 


Find the mix that works for you

Ultimately, the balance you’ll need to strike between hiring and technology comes down to your business objectives. Based on what your company is focused on and investing in, you can make decisions that support your CEO and CFO. 


But don’t look at your security infrastructure as all or nothing. While an optimizer might have an uncompromising ideal in mind for the skills and tools needed to secure the organization, a satisficer takes a growth mindset. This year, it might make more sense to invest in threat intelligence tools. Maybe next year, you negotiate for a bigger budget to build out your security team or expand the DevOps team. Instead of waiting for the ideal situation, work within the constraints you have to make the most impactful decisions around security.


The right balance between tools and skills will come down to where your company is and where it’s going. For every technology you’re testing, for every hire you’re interviewing, always ask how that tech or that hire will advance the company’s goals. 

KEYWORDS: Chief Information Security Officer (CISO) cyber security risk management security budgets

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Lior Marom is CISO at Cybersixgill.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Chicago to Spend $1.2 Million on Private Security to Protect Businesses

    See More
  • Union Pacific To Spend $50 Million on Mexico Border Security

    See More
  • Atlanta to Spend $2 Million on Security Cameras

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing