当前位置:网站首页>Five key considerations for network security budget planning in 2023
Five key considerations for network security budget planning in 2023
2022-07-28 18:18:00 【Software testing network】

Planning 2023 Network security budget in , some CISO May be confused by “ Where to start ”. The ways to protect enterprises from cyber threats are diverse and rapidly changing , Therefore, the task of identifying the most urgent risks is crucial .
however , Security leaders also need to start thinking about how much money they need and how to allocate budgets . Consultancy, West Monroe Director of network security David Chaddock Express ,“ At the macro level , When defining strategic objectives and developing security budgets ,CISO You should know , The current situation of network security may cause security leaders to fall into ‘ Maintain operations and promote new initiatives ’ My dilemma . Although some enterprises with high maturity or have suffered network attacks , You have understood the value of change and may be ready , But the unfortunate reality is , Most enterprises are still struggling to meet their needs with traditional budgets , And the demand for security will only grow .”
Here are the possible decisions 2023 Annual budget 5 Big key factors :
- The changing threat situation .
- Economic trends and their impact on the behavior of threat actors .
- Geopolitical events , For example, the war between Russia and Ukraine .
- Changing government and other regulations and guidance .
- Changing cyber insurance requirements .
CISO These factors need to be carefully considered , In order to find the best way to ensure the safety of the enterprise .
1、 The changing threat situation
The pattern of network security threats is constantly changing , With the emergence of new blackmail software threats 、 The continuous development of cloud computing and the transformation of labor model , The pace of change seems to have accelerated . secondly , Many companies are accelerating their digital transformation .
Gartner Senior Research Director Ruggero Contu Express ,“ The digital transformation plan has further expanded the attack surface .CISO The budget must meet new requirements from external risks , The traditional budget focuses on internal infrastructure .”
Contu added , Exposed loopholes ( For example, unpatched servers and open ports in Internet connected devices )、 Cloud system configuration error 、 Key information leaked ( For example, credentials ) And damaged assets ( For example, spoofing domains and enterprise mobile applications ) Will be the key target of attack in the next few years .
Besides , The rapid growth of endpoint devices —— Including the Internet of things (IoT) The growth of —— And the inherent security risks will also affect the budget .
Contu Express , manufacture 、 energy 、 The safety budget in transportation and healthcare will have to focus on protecting the industrial environment and systems from IoT The impact of introducing vulnerabilities , as well as IT And operational technology (OT) Fusion .
2、 Economic trends lead to the scarcity of network security resources
Economic trend ( Especially inflation ) It may have a significant impact on cybersecurity expenditure and the behavior of threat actors . Consultancy, Plante Moran Partner and head of network security practice Raj Patel Express , The scarcity of network resources and inflation will be the future 12 To 18 The most important factor in the increase of network security budget and expenditure in the past month .
He thinks that ,“ Network talents are hard won , Enterprises are willing to pay for this . This has also led to an increase in wage costs by at least 10% To 15%. Because of the scarcity of resources ,8-12 The salary increase of employees with years of work experience is greater . As for safety products and services , In the past four years , Tools and techniques for better managing cyber risks have increased significantly .”
Chaddock added , The gap between the rich and the poor and the economic uncertainty it brings will inevitably lead to further increases in hacker behavior and other network security incidents that may destabilize . Now? , As enterprises become more digital and more vulnerable to security vulnerabilities , This situation will only worsen .
3、 Geopolitical events exacerbate security risks
Events around the world , Perhaps the most striking is the war between Russia and Ukraine , This may continue to have a significant impact on network security and risk . This is especially true for some industries , For example, the government and other industries supporting the country's key infrastructure .
Patel Explanation ,“ Current geopolitical events have transformed the image of attackers into state funded hackers , They have deep technical skills and the resources they need to attack critical infrastructure and companies .”
West Monroe Through quarterly revenue over 5 Billion dollar company's 250 name C Level executives to investigate , The latest quarter formed 《 Executive survey report 》 Show , When asked “ Due to geopolitical and supply chain instability , What actions are executives' companies considering this year ” when , Most executives (60%) Express , They are considering increasing spending or paying attention to network security , Because network warfare has become an increasingly common tool to gain competitive advantage .
Chaddock added , The nation-state sponsored attack tools against Ukraine can now be easily made available to a wider audience . And most enterprises do not have sufficient protection capabilities to resist attacks funded by the nation state . This means that most safety plans have fallen significantly behind , A lot of investment outside of working capital is required to maintain normal operation .
4、 Changing regulatory requirements
In the past few years , Regulatory requirements have been changing , Including laws dealing with data privacy .Patel Express , The cost of complying with various privacy regulations and security obligations in contracts is rising . for example , Some contracts may require independent testing by third-party auditors . Due to inflation and rising wages , Auditors' and consultants' fees are also rising .
Chaddock Think , Enterprises should focus on building strong security , Instead of focusing on compliance . When an enterprise is really safe , The cost of implementing and maintaining compliance should also be reduced . Especially for enterprises that support critical infrastructure , The evolving regulatory compliance requirements require a lot of support .
5、 Changing online insurance requirements and rising costs
After experiencing well-known attacks such as ransomware , More and more enterprises begin to buy or at least consider buying online insurance plans . If the cost of paying for such policies exceeds the security budget ,CISO Rising coverage costs and other factors will need to be considered .
Patel Express ,“ The cost of online insurance is rising 20% To 25%. Enterprises can reduce costs by reducing coverage levels or increasing deductibles . however , That would mean taking more risks . Some insurance companies will evaluate your network control to measure your premium . Through better control , You can also reduce the premium .”
Chaddock added , as time goes on , The company should ensure that the cost of online insurance is included , What is more important is to maintain effective and safe backup / Costs associated with resilience .“ Double blackmail ” The arrival of the times has caused many target enterprises to fall into financial difficulties . Enterprises with secure and resilient backup and recovery capabilities , It is much less likely to be materially affected by network events .
边栏推荐
- Openpcd installation process record
- The US ban on Huawei began to affect European chip manufacturers
- 矢量网络分析仪(矢网)的校准
- 视频号如何将公域流量将用户导入私域
- 1.08 billion dollars! TCL technology acquires Samsung Suzhou 8.5 generation line: the production capacity will increase by 60% in the next year!
- 视频号、公众号间导流便捷可观
- 视频号账号变现的一些方法
- Leetcode systematic question brushing (II) -- greed, backtracking, recursion
- 体验5分钟开发微信小程序
- Tips--对卷积的物理意义的理解
猜你喜欢

Openmv (II) -- ide installation and firmware download

centos8使用docker安装wordpress+mysql配置文件中WORDPRESS_DB_HOST的理解

Digital filter (IV) -- converting analog filter into digital filter

centos使用docker运行mysql后,远程连接需要开放端口

The best implementation of horizontal listview -- recycleview

Centos8 creates wordpress+mysql error reports according to the official website of docker

硬件工程师成长之路(0)----认识元件

电源适配器 全球定义

矢量网络分析仪(矢网)组成和原理简介

Uniapp local packaging permission configuration problem
随机推荐
Strong performance growth! Wentai technology's net profit in the first half of the year was 1.7 billion yuan, a sharp increase of 767.19% year-on-year!
centos使用docker运行mysql后,远程连接需要开放端口
有一种密码学专用语言叫做ASN.1
Ren Zhengfei's latest voice: American politicians hope Huawei will die, and the desire to survive inspires Huawei
com.mysql.jdbc.Driver 和 com.mysql.cj.jdbc.Driver的配置文件
ADS仿真 之 交流仿真和S参数仿真示例
Temporary URL
体验5分钟开发微信小程序
Digital filter (II) -- minimum phase delay system and all pass system
余承东:华为正在想办法应对美国芯片封杀
Install tensorflow2.1 and pytorch1.4 on Jetson nano
视频号、公众号间导流便捷可观
Tips--对卷积的物理意义的理解
Import the database backup of MySQL 8 into MySQL 5
Through private channels such as official account, direct the live broadcast of video number
USB Type-C 之CC线简介
硬件工程师成长之路(0)----认识元件
临时url
Answer questions about the pixel, resolution and size of the picture, as well as the display size of the monitor.
沪硅产业上半年营收8.5亿元,同比增长30.53%!各类产品认证正在加速