Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Inside the 'real' security budget: Spending doesn't guarantee maturity

Holly Morgan | Dec. 13, 2016
Spending isn't a good measure of effectiveness, experts say

Businesses spend an average of 5.6 percent of the overall IT budget on IT security and risk management, yet many organisations falsely equate spending with maturity.

According to Gartner findings, IT security spending ranges from approximately one percent to 13 per cent of the IT budget and is potentially a misleading indicator of program success.

"Clients want to know if what they are spending on information security is equivalent to others in their industry, geography and size of business in order to evaluate whether they are practicing due diligence in security and related programs," Gartner research director Rob McMillan said.

However, McMillan said that “general comparisons” to generic industry averages do not reveal much insight regarding a business's state of security.

“You could be spending at the same level as your peer group, but you could be spending on the wrong things and be extremely vulnerable,” he explained.

“Alternatively, you may be spending appropriately but have a different risk appetite from your peers.”

As a result, McMillan believes the majority of organisations will continue to misuse average IT security spending figures as a proxy for assessing security posture through 2020.

Without the context of business requirements, risk tolerance and satisfaction levels, the metric of IT security spending as a percentage of the IT budget does not, by itself, provide valid comparative information that should be used to allocate IT or business resources.

Moreover, McMillan said IT spending statistics alone do not measure IT effectiveness and are not a gauge of successful IT organisations.

“They simply provide an indicative view of average costs, without regard to complexity or demand,” he warned.

For McMillan, explicit security spending is generally split among hardware, software, services (outsourcing and consulting) and personnel.

However, any statistics on explicit security spending are inherently "soft" because they understate the true magnitude of enterprise investments in IT security, since security features are being incorporated into hardware, software, activities or initiatives not specifically dedicated to security.

“Many organisations simply do not know their security budget,” McMillan observed.

“This is partly because few cost accounting systems break out security as a separate line item, and many security-relevant processes are carried out by staff who are not devoted full-time to security, making it impossible to accurately account for security personnel.

“In most instances, the chief information security officer (CISO) does not have insight into security spending throughout the enterprise.”

From a channel perspective, and to help customers identify the real security budget, there are many places to look, according to McMillan.

“Such as networking equipment that has embedded security functions,” he explained.

“Desktop protection that may be included in the end-user support budget, enterprise applications, outsourced or managed security services, business continuity or privacy programs, and security training that may be funded by HR.”

 

1  2  Next Page 

Sign up for CIO Asia eNewsletters.