Effectively measuring cybersecurity spending is crucial for organizations to understand their security posture and make informed investment decisions. This blog outlines three key approaches: mission-based, risk-based, and other common methods.

a remote control sitting on top of a table next to a book - Cybersecurity Spending

Mission-Based Approach

The mission-based approach aligns cybersecurity investments directly with the organization’s critical business functions and strategic objectives. This method ensures that spending is prioritized to protect the most vital assets and operations.

Key Steps:

  • Identify Critical Missions: Define the core business missions that are essential for the organization’s existence and success.
  • Map Assets to Missions: Identify all IT assets, data, and systems that support each critical mission.
  • Assess Mission Impact: Determine the potential impact on each mission if a cybersecurity incident occurs. This involves evaluating financial, reputational, operational, and legal consequences.
  • Allocate Resources: Based on the assessed mission impact and criticality, allocate cybersecurity spending to protect the assets supporting these missions.

Risk-Based Approach

The risk-based approach focuses on identifying, assessing, and mitigating cybersecurity risks. Spending is then directed towards addressing the most significant threats and vulnerabilities that could impact the organization.

Key Steps:

  • Identify Assets: Catalog all information assets, including hardware, software, data, and intellectual property.
  • Identify Threats: Research and understand potential threats relevant to the organization’s assets and industry.
  • Identify Vulnerabilities: Discover weaknesses in systems, applications, or processes that could be exploited by threats.
  • Assess Risk: Determine the likelihood of a threat exploiting a vulnerability and the potential impact of such an event. This often involves calculating a risk score.
  • Prioritize Risks: Rank risks based on their severity and likelihood.
  • Implement Controls: Invest in cybersecurity controls and solutions that effectively mitigate the highest-priority risks.
  • Monitor and Review: Continuously monitor the effectiveness of controls and reassess risks as the threat landscape evolves.

Other Approaches

Beyond mission-based and risk-based methods, several other approaches are commonly used to measure cybersecurity spending.

ApproachDescriptionProsCons
Compliance-BasedSpending is driven by regulatory requirements, industry standards, and internal policies. The goal is to meet compliance obligations.Ensures adherence to regulations; provides a baseline for security.May not address all relevant risks; can lead to “check-the-box” mentality.
BenchmarkingComparing cybersecurity spending to industry peers or established benchmarks.Provides external context; can highlight areas of under-/over-spending.Industry averages may not reflect specific organizational needs; data can be limited.
Historical SpendingAnalyzing past cybersecurity expenditures to project future budgets.Simple to implement; provides continuity.May not account for evolving threats or new technologies; can perpetuate inefficiencies.
Perceived ValueAllocating budget based on the perceived value of specific cybersecurity tools or initiatives, often driven by vendor recommendations or industry trends.Can lead to the adoption of innovative solutions.May result in inefficient spending if not tied to specific risks or missions.

Organizations often combine elements from these different approaches to create a comprehensive and effective cybersecurity spending strategy. The best approach will depend on the organization’s size, industry, risk tolerance, and strategic objectives.

Cybersecurity Spending Project Qualification Questions for Mission-Based Budgeting

  1. Which critical business mission(s) does this project directly support?
  2. How does this project protect the vital IT assets, data, and systems linked to these critical missions?
  3. What is the potential impact on the supported mission(s) if this cybersecurity project is not implemented? (Quantify financial, reputational, operational, or legal consequences.)
  4. Does this project address a significant cybersecurity threat or vulnerability that directly affects a critical mission?
  5. How will this project reduce the likelihood or impact of a cybersecurity incident on the identified critical mission(s)?
  6. Is this project aligned with the organization’s strategic objectives for mission resilience?
  7. What measurable improvement in mission security or resilience will this project deliver?
  8. Are there any interdependencies with other projects or systems that support the same critical mission?
  9. What is the estimated cost of this project, and how does it compare to the potential impact on the mission if a breach occurs?
  10. How will the success and ongoing effectiveness of this project in supporting the critical mission be measured and monitored?

These are just a few of the questions you should be asking every project sponsor. You can adapt them to suit your organization.