Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Sweating the assets: Maximizing cybersecurity investments for greater ROI

By Andrew Hollister
Money

Image via Unsplash

October 3, 2023

In the wake of budget cuts and economic uncertainties, recent findings from Forrester highlight a promising trend: cybersecurity budgets are on the rise once again. However, this positive shift comes with its own set of challenges as companies struggle with the increasing complexity of cybersecurity threats that continuously test their defenses. While increased funding demonstrates a heightened commitment to cybersecurity, the battle against these threats remains fierce.

According to a recent report, a staggering 71% of businesses are now grappling with three or more security incidents, marking a substantial 51% surge compared to 2022. Despite a significant uptick in security budgets — rising by an average of 20% in large enterprises and 5% in mid-sized counterparts — security teams are confronting many challenges such as rising security incidents and talent shortages that are impeding their ability to effectively combat these escalating threats.

Balancing resource allocation and tool management

The skills gap persists as a formidable issue, with organizations struggling to procure and retain skilled cybersecurity professionals capable of fortifying their defenses. Moreover, the perpetual influx of alerts inundating security teams makes it increasingly difficult to differentiate between credible threats and noise. This deluge of information often results in crucial security incidents being inadvertently overlooked or inadequately addressed.

While cybersecurity budgets have expanded, the challenge also lies in the allocation of these resources to acquire the right tools and technologies. Organizations may have dozens of security tools, and without central visibility this can leave organizations contending with an array of disparate tools that lack synchronization, leading to inefficiencies, blind spots and an overall diluted defense strategy. With innovative technologies continually coming to market organizations may be tempted by the latest “must have” technology and fail to fully consider the broader overall picture leading to tool-sprawl and siloed visibility.

Unveiling strategies to optimize existing investments for enhanced resilience and ROI

Therefore, one of the most effective ways to overcome these challenges is by leveraging the cybersecurity investments organizations have already made. This approach known as “sweating the assets” entails optimizing and fully utilizing the tools, technologies and processes that organizations have already invested in. By extracting maximum value from these assets, businesses can avoid unnecessary duplication of both effort and technology and achieve a higher return on investments (ROI). 

In order to put these principles into practice and effectively harness existing cybersecurity investments, organizations can implement a range of strategies that not only optimize their assets but also enhance overall security resilience. Here are some key approaches to consider:

  1. Holistic security assessment: The first step towards optimizing cybersecurity assets is conducting a comprehensive assessment of the security solutions already in place. This involves evaluating existing tools, processes and policies to identify redundancies, gaps and areas that need improvement. By understanding strengths and weaknesses, organizations can fine-tune their cybersecurity strategy for maximum effectiveness.
  2. Skillful resource allocation: With budgets under scrutiny, it is essential to allocate resources efficiently. This may involve reallocating human resources or leveraging underutilized tools more effectively. By making the best use of existing assets, organizations can minimize unnecessary expenses and improve overall ROI. For example, many organizations have invested in threat intelligence platforms that provide valuable insights into emerging cyber threats. By fully integrating these tools with their Security Information and Event Management (SIEM) platform, organizations can more quickly qualify potential risks, enabling a more targeted and effective response.
  3. Employee training and awareness: A sizable proportion of cybersecurity breaches can be attributed to human error. Investing in ongoing employee training and awareness programs can enhance your organization's overall security posture without significant additional costs. An educated workforce is more likely to identify and prevent potential threats.
  4. Continuous monitoring and adaptation: Implementing a system of continuous monitoring and adaptation allows organizations to stay agile in the face of evolving cyber threats. By regularly assessing the effectiveness of their cybersecurity measures and adjusting them based on current information and emerging risks, organizations can maintain a strong and resilient security posture over time.

In a world where cybersecurity threats are constantly evolving, organizations must adopt a pragmatic and value-driven approach. The concept of sweating current cybersecurity assets emphasizes optimizing existing investments to achieve greater ROI. By embracing this balanced and resilient cybersecurity strategy, organizations can enhance their security posture without necessarily expanding their budgets.

KEYWORDS: budget return on investment ROI value added security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Logrythm image 67 of 89

Andrew Hollister is Vice President of LogRhythm Labs and Deputy Chief Security Officer (CSO) for EMEA, IMETA, and APJ. (Image courtesy of Hollister)

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • control room

    How Modern Security Solutions Are Engineered for Greater ROI

    See More
  • Maximizing ROI with the Right System Integrator

    See More
  • healthcare

    Bringing greater attention and awareness to cybersecurity practices in the global public health sector

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing