Digital Marketing Guides & Strategies

Demystify Budget Priorities Crucial For A Resilient Cybersecurity Strategy | Forrester

Cyber Security

Amidst the current uncertain macroeconomic landscape, security and risk (S&R) leaders require actionable advice for overseeing both existing expenditures and incoming budget proposals.

This guide, driven by data analysis, offers spending benchmarks, valuable insights, and recommendations aimed at helping you maintain financial discipline while effectively addressing the most pressing risks confronting your organization.

Constrained Economic Conditions And Emerging Risks Demand hyper-focus

The evolution of generative AI tools, the escalation of geopolitical threats, and the growing complexity of cloud services are reshaping the strategies employed by security teams and the spectrum of emerging threats they confront.

Concurrently, persistent security challenges such as ransomware and social engineering persist in afflicting organizations.

Security and Risk (S&R) leaders are confronted with the imperative task of navigating these emerging challenges within the context of an uncertain macroeconomic landscape, which exacerbates the complexities of security budgeting and planning.

Given the impracticality of funding and staffing every security initiative, organizations are compelled to make discerning choices regarding risk mitigation while aligning with the organization’s growth objectives.

Consequently, in the current milieu, S&R leaders are advised to evaluate their current expenditure, focusing on minimizing the risk associated with initiatives that present the most significant opportunities for their respective organizations.

Cloud Security And Managed Services Spend Is Up, Other Areas Are Flat

Forrester’s Budget Planning Survey, 2023 furnishes a pivotal overview of shifts in budget allocations for security across various categories.

The data delineates areas witnessing substantial annual spending increments alongside cybersecurity domains experiencing stagnation or reductions in expenditure. S&R leaders can utilize this data as a benchmark to ascertain areas of overspending or underspending within their budgets.

  1. Cloud security spending continues its upward trajectory in tandem with the proliferation of cloud migrations. According to Forrester’s Budget Planning Survey, 2023, 80% of US IT security decision-makers intend to augment spending on cloud security within the ensuing 12 months. Moreover, findings from Forrester’s Infrastructure Cloud Survey, 2022, indicate that enterprises in the United States have migrated 44% of their total application portfolio to the cloud, with an anticipated escalation to 54% by 2024. Given the ongoing migration endeavors and lingering apprehensions surrounding misconfigured cloud workloads, organizations are compelled to augment their investments in cloud security.
  2. Despite the prevailing trend toward cloud adoption, the significance of upgrading on-premises technology remains conspicuous. Data from the 2023 budgets underscore that 75% of US IT security decision-makers plan to boost expenditure on enhancements to existing on-premises security technology. While certain applications may prove unsuitable for cloud migration due to practical or technical constraints, the heightened spending on on-premises security warrants scrutiny, particularly in light of the concurrent surge in cloud security spending. Accordingly, S&R leaders are urged to evaluate existing expenditures on on-premises security to ensure alignment with long-term budgetary plans and strategies concerning cloud migrations.
  3. Expenditure on managed security services is poised for growth to accommodate evolving requirements. Security teams have traditionally leveraged managed security services providers (MSSPs) for many reasons, and these entities continue to adapt their offerings to cater to the evolving needs of contemporary enterprises, including the transition to cloud infrastructure and the proliferation of AI-powered initiatives. Forecasts indicate sustained robust growth in spending on managed security services, notwithstanding a potential reallocation of expenditure towards MSSPs whose offerings are better aligned with future requirements.
  4. The scarcity of labor is impeding expenditure on staffing, consultants, and integrators. Many security teams rely on external consultants and integrators to optimize their technological infrastructure, assess vulnerabilities within their environment, and continually evaluate their overall security posture and maturity. Regrettably, persistent shortages of qualified personnel, whether directly employed or engaged via an integrator, have encumbered organizations’ staffing budgets. Consequently, the data reveals that 7% of US IT security decision-makers intend to curtail spending on security staffing by up to 10% over the ensuing 12 months, while 5% plan analogous reductions in expenditure on security consultants and integrators.
  5. S&R leaders express satisfaction with existing expenditure on security awareness and training (SA&T). Chief Information Security Officers (CISOs) have historically grappled with justifying investments in SA&T and quantifying the return on investment (ROI) derived from such expenditure. Although the allure of reallocating resources from SA&T to other security technologies may be tempting, budgetary data indicates that organizations are maintaining or augmenting spending in this domain, with none contemplating reductions. This suggests that organizations recognize the value of SA&T expenditure and possess mechanisms for measuring its efficacy. Consequently, S&R leaders are advised to resist any directives to curtail spending on SA&T over the ensuing 12 months.

Planning Guide 2024: Security And Risk | DMC

Investment Strategies for API Security, Detection, Zero Trust, and Cloud

Security leaders are advised to maintain or bolster investments in pivotal security controls and solutions safeguarding customer-facing operations, revenue-generating activities, and application programming interfaces (APIs).

Additionally, defending investments supportive of cloud migration endeavors and the transition to zero-trust architectures is paramount. Key recommendations for heightened investment or defense include:

  1. API Security: Prioritize protection measures for emerging business models and engagement platforms, addressing deficiencies in API security through a combination of traditional and developer-centric tools, alongside specialized solutions. Collaborate closely with development teams to reinforce API governance and ownership protocols.
  2. Phishing-Resistant MFA: Enhance security measures with multifactor authentication (MFA) solutions resistant to phishing attacks, leveraging technologies like FIDO keys and certificate-based authentication to fortify high-value targets against cyber threats.
  3. Third-Party Breach Control: Invest in dedicated platforms for robust third-party risk management (TPRM), ensuring comprehensive oversight of all external relationships, recurrent reassessment cycles, and risk threshold alignment with organizational objectives.
  4. Extended Detection and Response (XDR): Implement XDR technologies to streamline detection and response efforts, optimizing security team efficiency in identifying and mitigating evolving threats across diverse IT environments.
  5. Software Supply Chain Security: Strengthen product development and delivery processes by scrutinizing software components, pipeline tools, and development environments, utilizing software bill of materials (SBOM) and software composition analysis (SCA) tools to monitor security vulnerabilities continually.
  6. Zero Trust Network Access (ZTNA): Deploy ZTNA solutions to facilitate secure remote access, offering flexible policy-based controls for accessing resources across on-premises and cloud-based environments.
  7. Security Posture Management (SPM): Monitor and manage security configurations and data access within cloud infrastructure and SaaS applications, leveraging CSPM, CIEM, and SSPM solutions to ensure compliance and proactively mitigate cyber threats.

Divest Standalone On-Premises Security Tech And Redundant Solutions

Amidst evolving technological landscapes, it is prudent to divest from standalone on-premises security tools and redundant solutions to optimize resource allocation. Recommendations for decreased or avoided investments include:

  1. On-Premises Security Appliances: Reassess deployments of on-premises security appliances like secure web gateways (SWG), intrusion prevention systems (IPS), and data loss prevention (DLP), favoring cloud-based alternatives and integrated solutions for enhanced protection and operational efficiency.
  2. Low-Value Consulting Engagements: Streamline one-time or project-based consulting engagements, eliminating redundant assessments and audit preparations to mitigate engagement overload and optimize resource utilization.
  3. Standalone GRC Tools: Rationalize investments in standalone governance, risk, and compliance (GRC) tools, retiring legacy solutions and consolidating capabilities to enhance data integration and reporting efficiency.
  4. Endpoint Security Solutions: Transition from on-premises endpoint security solutions to cloud-delivered alternatives, leveraging the agility and scalability of cloud-native platforms to safeguard enterprise workloads effectively.
  5. Runtime Application Self-Protection (RASP): Redirect budgetary allocations from RASP towards solutions addressing modern application security challenges, such as API and container security, to align with evolving threat landscapes and technological advancements.

To access further insights and download the comprehensive guide on optimizing your cybersecurity investments and strategies, click here. Continue your journey towards enhanced security resilience and strategic resource allocation.

The Table of Contents of “Planning Guide 2024: Security And Risk”:

  • Summary
  • Constrained Economic Conditions And Emerging Risks Demand hyper-focus
  • Cloud Security And Managed Services Spend Is Up, Other Areas Are Flat
  • Invest Or Defend Investments In API Security, Detection, Zero Trust, And Cloud
  • Divest Standalone On-Premises Security Tech And Redundant Solutions
  • Experiment With CAASM, AI/ML Security, Distributed Identity, And ZT Edge

Number of Pages:

  • 11 pages

Pricing: 

  • Free
  • RELATED ARTICLE

    Subscribe for our newsletter!

    COPYRIGHTS DIGITAL MARKETING COMMUNITY 2019