Build, Optimize, and Present a Risk-Based Security Budget – Phase 2: Build the Budget

Author(s): Filipe De Souza, Azzam Jivraj, Ian Mulholland

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Building the security budget will require an understanding of how the business interacts with security, and how different controls can affect the risk level of the organization. This phase will take you through the following activities:

  • Map business capabilities to security controls and specify need.
  • Input the costs of the security controls, general expenses, and IT system-specific expenses.
  • Analyze the three different budget outputs and explain surpluses and/or deficits.
  • Optimize the budget by using defense-in-depth techniques.

Use this phase as part of the full blueprint, Build, Optimize, and Present a Risk-Based Security Budget.

View the Complete Blueprint:

Build, Optimize, and Present a Risk-Based Security Budget

Get the budget you deserve.

Related Content

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019