Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

How to protect cybersecurity budgets

By Raj Dodhiawala
security leader salary

SARINYAPINNGAM/ iStock / Getty Images Plus via Getty Images

August 12, 2022

Market volatility and inflation are forcing companies to slash spending. In uncertain times like these, there’s a tendency toward across-the-board cuts, so every department shares in the pain. But if you plan to include cybersecurity in your cuts, you’re likely putting your company at risk. 


Economic upheaval breeds a natural vulnerability, which only makes hackers more active. According to Kaspersky, the number of attacks has increased by 3 million in the last year. And a Washington Post headline says it all: “Elevated cyber threats are the ‘new normal.’”


For chief information security officers (CISOs) and their organizations, the question is not whether to cut the cybersecurity budget. It’s how much risk they are willing to take. 


Damaged Security Defenses

Due to COVID, the Great Resignation, and the rise in working from home, chances are your organization’s security was already compromised before the latest market turmoil began. Tech workers resigned in droves; there wasn’t enough talent to replace them. And now you’re connected like never before —  with remote work adding doorways to your data. All of this leaves organizations exposed in ways you might never have considered.  


Then come the changing modes of attack. Twenty years ago, hackers were content with low-and-slow breaches. The idea was to stay under the radar with small, barely detectable sorties. Today they’re striking with speed, disabling as many systems as possible or stealing everything they can in mere seconds. The assaults are coming with such frequency — and such a wider arsenal —  that there’s barely time to deconstruct today’s attack before a new method arrives tomorrow. 


Meanwhile, your cybersecurity is likely understaffed. Lay off a few cybersecurity team members included in a larger cut, and you’re placing enormous stress on the available resources needed to respond. 


Think of your defenses in the way you would a murder investigation. You need detectives, forensic investigators, coroners, and lab technicians, each doing their part. A similar cast is needed in cyber response. If you pull out one or two — or cut their budget for tools — the odds of repelling an attack correspondingly decline. 


In real terms, that might mean using an outdated response plan that hasn’t been properly tested and updated. It could mean dated software defenses that no longer meet the times. It may require employees to assume multiple roles, whether they have the expertise or not. The result: You’re slower and more vulnerable. These are the ingredients for an incident that could easily spiral out of control. 


As a result, your security budget is only discretionary if you’re willing to assume the risk. Not just the risk to your data or public reputation. But to your cyber insurance as well. Last year, premiums rose by 92%. Companies are now finding that without the people and systems in place, they can’t get insurance at all. 


How to Reduce Cyber Risk 

The best defense is a layered defense. You have to protect the on-premises data center, cloud, and Software as a Service (SaaS) applications. You have to guard remote employees working on their own islands. Each requires a specialized approach with the people and technology to handle them. 


The shortage of talent is increasingly moving companies to turn to outside firms to fill in gaps. Yet these contracts also make inviting targets for chief financial officer (CFOs) searching for cuts. Take away your providers, and it’s not much different than bringing the knife to your own security department. 


In trying times, there’s also a tendency to turn to large, name-brand providers. The idea is that they’re better suited to weather the storm. Yet this presents another risk that needs to be reckoned. In short: companies should be sure they’re buying the latest expertise, rather than the biggest name. 


If you have to reduce budgets, be cognizant of the risks those cuts produce. Instead of simply protecting a general dollar amount, CISOs need to outline exactly what each expense buys. Let the CFO know the exact amount that is needed to keep an incident response plan current, and the exact amount that is required to fill the holes with outside help. With this kind of specificity, the risks become clearer: some tasks will knowingly be de-prioritized, and some others simply won’t be done. 


It’s the only way to keep a CFO informed, providing them the data to properly assess exposure. After all, no company has unlimited resources for cybersecurity. There will always be risks. The question is how to know, manage and adapt to the risks for your organization. 


This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: Chief Information Security Officer (CISO) cyber security risk management security budgets

Share This Story

Raj Dodhiawala is president and CEO of Remediant. 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing