www.techradar.com Open in urlscan Pro
151.101.194.114  Public Scan

URL: https://www.techradar.com/pro/cybersecurity-is-worth-the-spend
Submission: On July 08 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.techradar.com/search

<form class="search-box" action="https://www.techradar.com/search" method="GET" data-analytics-id="search-submit" data-before-rewrite-localise="/search" data-component-tracked="19">
  <label for="search-input" class="sr-only">Search TechRadar</label>
  <input tabindex="0" type="search" name="searchTerm" placeholder="Search TechRadar" class="search-input" id="search-input">
  <button type="submit" class="search-submit" aria-label="Search">
    <span class="search-icon">
      <svg class="icon-svg" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 1000 1000">
        <path d="M720 124a422 422 0 1 0-73 654l221 222 132-131-222-222a422 422 0 0 0-58-523zm-92 504a291 291 0 1 1-412-412 291 291 0 0 1 412 411z"></path>
      </svg> </span>
  </button>
</form>

POST https://newsletter-subscribe.futureplc.com/v2/submission/submit

<form data-hydrate="true" class="newsletter-form__form newsletter-form__form--inbodyContent" method="POST" action="https://newsletter-subscribe.futureplc.com/v2/submission/submit"><input data-hydrate="true" type="hidden"
    class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="NAME"><input data-hydrate="true" type="email" class="form__email-input form_input form__email-input form__email-input--inbodyContent" name="MAIL"
    required="" placeholder="Your Email Address"><input data-hydrate="true" type="hidden" class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="NEWSLETTER_CODE" value="XTP-X"><input data-hydrate="true"
    type="hidden" class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="LANG" value="EN"><input data-hydrate="true" type="hidden"
    class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="SOURCE" value="60"><input data-hydrate="true" type="hidden"
    class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="COUNTRY"><label class="form__checkbox-label"><input data-hydrate="true" type="checkbox"
      class="form__checkbox-input form_input form__checkbox-input form__checkbox-input--inbodyContent" name="CONTACT_OTHER_BRANDS">Contact me with news and offers from other Future brands</label><label class="form__checkbox-label"><input
      data-hydrate="true" type="checkbox" class="form__checkbox-input form_input form__checkbox-input form__checkbox-input--inbodyContent" name="CONTACT_PARTNERS">Receive email from us on behalf of our trusted partners or sponsors</label><input
    data-hydrate="true" type="submit" class="form__submit-input form_input form__submit-input form__submit-input--inbodyContent" required="" value="Sign me up"></form>

Text Content

Skip to main content

Tech Radar
 * Tech Radar Pro
 * Tech Radar Gaming

Open menu Close menu
Tech Radar Pro TechRadar the business technology experts
Search
Search TechRadar
RSS

US Edition


Asia

Singapore

Europe

Danmark


Suomi


Norge


Sverige


UK


Italia


Nederland


België (Nederlands)


France


Deutschland


España

North America

US (English)


Canada


México

Australasia

Australia


New Zealand

 * 
 * News
 * Reviews
 * Features
 * Expert Insights
 * Website builders
 * Web hosting
 * Security





Trending
 * Expert Insights
 * Best web hosting
 * Best website builder
 * Best standing desks



When you purchase through links on our site, we may earn an affiliate
commission. Here’s how it works.


 1. Pro


CYBERSECURITY IS WORTH THE SPEND

News
By Roei Khermosh
published July 5, 2024

Cybersecurity is effectively recession-proof

 * 
 * 
 * 
 * 
 * 
 * 


(Image credit: Shutterstock)


With earnings season approaching, organizations face a constant battle between
growth and efficiency. It’s a back-and-forth pendulum that swings through macro
changes, business results, challenges, and success. Businesses are continuously
questioning whether they should accelerate marketing spending, look for ways to
cut costs, and gauge whether their current budget is effectively geared toward
driving an appropriate return on investment (ROI). Typically, across board rooms
and leadership teams, general and administrative (G&A) systems are thought of as
overhead: a cost element needed to mitigate risk and meet compliance standards,
rather than one that generates a return.



Businesses often have a relatively large IT & security budget—but only a handful
of people in the organization typically know how that budget is actually used.
Unfortunately, even fewer can truly identify the ROI from each part of the stack
compiling this budget. For businesses trying to set an appropriate cybersecurity
budget, thinking about ROI shouldn’t be an afterthought—it should be a starting
point. Spending $100,000 per year may feel like a lot—but it’s a good investment
if it prevents $1 million in annual cyberattack losses.

Roei Khermosh
Social Links Navigation


CFO, Cymulate.


WHY CYBERSECURITY IS IMMUNE TO RECESSION



Companies of all sizes are susceptible to cyberattacks, no matter how many
layers of defense they have in place. According to research from Harvard
Business Review, organizations with 10,000 or more employees typically maintain
almost 100 security tools—but despite this, even well-established global
companies continue to be victimized by cyberattacks. The unfortunate truth is
that it simply isn’t possible to stop 100% of attacks. As a result, most
organizations are beginning to shift their thinking away from prevention and
toward a focus on limiting the potential damage an attack can cause and better
understanding where their actual vulnerabilities lie.




CIOs, CISOs, and the rest of a leadership team are ultimately responsible for
protecting their company’s assets. Organizations spend millions of dollars on
cybersecurity annually, as the overall security market is heading towards $300B
in total addressable market (TAM). With this in mind, CISOs are seeking more
budget flexibility to ensure they are meeting their company’s goals. As the
number of cyberattacks increases and these attacks become more sophisticated,
too many CISOs still struggle to answer basic questions about whether their
company is secure and how well protected their assets actually are.

LATEST VIDEOS FROM techradar Tech Radar Pro



In order to accurately answer those questions, CISOs need to be able to
continuously measure and demonstrate cyber effectiveness to leadership. They
need to illustrate risk, validate controls, understand exposures mapped to
security frameworks, and rationalize security spend while managing costs. The
good news for security teams? Cybersecurity will always be critical for
businesses. Even during leaner times, businesses will always need to invest in
cybersecurity solutions to keep their data and other assets secure. As long as
security teams can use data to justify which solutions are essential to their
operations, cybersecurity is effectively recession-proof.




ESTABLISHING A CYBERSECURITY BUDGET GAMEPLAN

With the recently launched reporting requirements by the Security Exchange
Commission (SEC) to address cyber incidents, registrants must disclose on the
new Item 1.05 of Form 8-K any cybersecurity incident that the SEC determines to
be material. Companies must also describe the material aspects of the incident's
nature, scope, and timing, along with its impact on the registrant. The Form
10-K and Form 20-F disclosures will be due beginning with annual reports for
fiscal years ending on or after December 15, 2023. The Form 8-K and Form 6-K
disclosures will be due beginning the later of 90 days after the date of
publication in the Federal Register or December 18, 2023.

This information doesn’t just magically appear, and gathering it requires having
the right resources in place to not just detect potential security incidents,
but effectively document both the course plotted by the attacker and the
mitigation efforts engaged in by the organization. That means it is critical for
organizations to have full visibility across their digital environments, with
continuous monitoring capabilities that can detect and document changes as they
occur. These continuous visibility and monitoring capabilities don’t just allow
businesses to adhere to new compliance guidelines—they also help establish a
solid foundation upon which to build a successful cybersecurity program. By
effectively mapping out their digital environments and testing them for known
vulnerabilities, organizations can have a more accurate view of their unique
risk profile and better understand the steps they need to take to improve their
security posture.


ARE YOU A PRO? SUBSCRIBE TO OUR NEWSLETTER

Sign up to the TechRadar Pro newsletter to get all the top news, opinion,
features and guidance your business needs to succeed!

Contact me with news and offers from other Future brandsReceive email from us on
behalf of our trusted partners or sponsors
By submitting your information you agree to the Terms & Conditions and Privacy
Policy and are aged 16 or over.

In practice, this means leaders must first take inventory of their data assets
and their value to the company. Next, they should consider what they need to do
in order to comply with industry regulations that may apply to their business,
such as healthcare’s HIPAA or the European Union’s General Data Protection
Regulation (GDPR). Do they need new solutions to enable additional visibility?
Stronger endpoint protections? Expanded identity management capabilities? Once
they have a firm understanding of what their goals are and the steps needed to
accomplish them, leaders should look at what their company’s overall IT budget
is. If what a company needs is about 20-25% or less of your general IT budget,
then you probably have a useful figure to start with. Once that’s completed,
it’s time to deep dive into assessing and verifying what’s working and what does
not have any ROI. Just because a company spends money does not mean that money
is being spent in the right places.


ALIGNING SECURITY WITH BUSINESS

This responsibility will largely rest on the shoulders of the CISO or the CTO,
and they will need to be able to effectively state and demonstrate their case to
the CFO, COO, CEO, and other stakeholders. Given that most business leaders tend
to think in terms of how their decisions impact the business’s bottom line, it
is important to be able to properly articulate the ROI that cybersecurity
investments can have. Whether those returns come in the form of eliminating
redundant solutions, streamlining security processes, or preventing costly
breaches, framing things in a business context is the most effective way to
ensure security leaders and business decision makers can align on their
initiatives.

We've listed the best cloud antivirus.

This article was produced as part of TechRadarPro's Expert Insights channel
where we feature the best and brightest minds in the technology industry today.
The views expressed here are those of the author and are not necessarily those
of TechRadarPro or Future plc. If you are interested in contributing find out
more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Roei Khermosh
Social Links Navigation

Roei Khermosh, CFO, Cymulate.

More about pro

Samsung's SSD rival has just released one of the world's fastest PCIe 5.0 SSDs —
no, it won't beat Crucial's superfast T705 but its no-frills approach means it's
likely to be much cheaper



Chinese MIPS rival to Intel and AMD set to launch a 128-core server CPU to
compete in the busy market — EPYC and Xeon fans need not worry for now but do
keep an eye on the NVLink-like tech


Latest

A Pilates expert says these are the five ‘essential’ moves most people should be
doing

See more latest ►





MOST POPULAR

The best tech of 2024 so far – the 11 finest gadgets we've tested and what's
coming next
ICYMI: the week's 7 biggest tech stories from a DJI e-bike to Nothing phone
announcement
They did it again: Tech publisher keeps on breaking Pi Calculation World Record
— they almost doubled the previous one, reaching 202 trillion digits in 100 days
and used 1.5PB of SSD storage
The Google Pixel 9 could finally fix a flaw that’s been bugging us for years
Samsung might make a big change to the Galaxy Z Flip 6's cover screen
NYT Strands today — hints, answers and spangram for Saturday, July 6 (game #125)
NYT Connections today — hints and answers for Saturday, July 6 (game #391)
Quordle today – hints and answers for Saturday, July 6 (game #894)
This new AI voice assistant beat OpenAI to one of ChatGPT's most anticipated
features
Whatsapp might make an AI feature Google and OpenAI don't offer: an AI image of
you
'Transformers would take over the world': Little-known AI startup bet on ASICs —
and claims it can trounce Nvidia's flagship GPU, the B200, by almost 10 times


MOST POPULARMOST SHARED
 1. 1
    I'm writing this because I know my Gen Z offspring will never read it – and
    that's OK
 2. 2
    Best Buy's massive weekend sale is live: 32 deals I'd buy on TVs, laptops,
    and appliances
 3. 3
    AMD just unleashed FSR 3.1 – and it’s a great day for PC gamers no matter
    what brand of graphics card they own
 4. 4
    Early 4th of July deal drops LG's all-new C4 OLED TV to a new record-low
    price
 5. 5
    Everything new on Max in July 2024

 1. 1
    My fake company was hit by a ransomware attack — here’s what I learned to
    do, and what not to do
 2. 2
    Microsoft pauses Windows 11 update as it’s sending some PCs into an infinite
    reboot hell
 3. 3
    Microsoft's Copilot+ AI PCs aren't all that special right now, but there's
    one major reason why that's about to change
 4. 4
    This One Million Checkbox game is sparking an internet war – and it's taken
    hours of our life we'll never get back
 5. 5
    Geekom launches yet another mini PC that makes it a little bit more
    difficult to justify buying a traditional desktop PC — AX8 Pro looks like
    Intel's legendary NUC but with an unbelievably low price tag



TechRadar is part of Future US Inc, an international media group and leading
digital publisher. Visit our corporate site.

 * About Us
 * Contact Future's experts
 * Contact Us
 * Terms and conditions
 * Privacy policy
 * Cookies policy
 * Advertise with us
 * Web notifications
 * Accessibility Statement
 * Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.