Improving security remains a pressing objective for enterprise IT, according to a recent survey by Forrester Research. But as for the funding to tackle this priority, CIOs must find ways to do more with less. Among IT decision-makers at companies of more than 20,000 employees, 67 percent called significant security upgrades a priority or a critical priority in 2006. And at companies of 5,000 to 19,999 employees, 63 percent of IT execs said the same. The conundrum: Despite management’s high expectations for security, the budget to achieve security goals has shrunk.Information security’s slice of the IT budget fell to 7.8 percent in 2006, from 8.9 percent in 2005. That drop was more significant when looking only at North American companies—6.9 percent in 2006, down from 8.3 percent in 2005. (Forrester surveyed 1,214 North American and European IT decision-makers.)Why the drop? For one thing, upper management continues to be skeptical of security investments, says Khalid Kark, senior analyst at Forrester Research. Security technology is mature enough that business-side executives expect standardization, measurement and accountability, which is tough since both security risks and ROI are hard to quantify, Kark notes. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe To help reduce costs, IT security execs should prioritize integration and seek product suites that provide a single dashboard view of myriad technologies or inputs, he says. But don’t ignore the important role that people and processes play either, says Kark. “There’s a huge risk reduction if you educate employees.” Best Practices Create a proactive and holistic security strategy. First, examine how breaches actually occur, then base product purchase decisions on that information. (Forrester found a gap between installed security products and how data breaches occur.) Second, create a security awareness program; many breaches are due to ignorance. Third, identify and shore up vulnerable points in the company workflow. Market information security to upper management. When briefing management regarding data breaches, show the value of security and the consequences of unmitigated risk. Also, be vocal about the current and future threat landscape: Don’t wait until you need funding for a specific project to begin talking about it. Translate security’s value into financial terms. For example, one company converted blocked spam into money saved by figuring out how much time (in terms of wages) unwanted e-mails would cost each employee. Translate security’s value into financial terms. For example, one company converted blocked spam into money saved by figuring out how much time (in terms of wages) unwanted e-mails would cost each employee. Related content opinion The changing face of cybersecurity threats in 2023 Cybersecurity has always been a cat-and-mouse game, but the mice keep getting bigger and are becoming increasingly harder to hunt. By Dipti Parmar Sep 29, 2023 8 mins Cybercrime Security brandpost Should finance organizations bank on Generative AI? Finance and banking organizations are looking at generative AI to support employees and customers across a range of text and numerically-based use cases. By Jay Limbasiya, Global AI, Analytics, & Data Management Business Development, Unstructured Data Solutions, Dell Technologies Sep 29, 2023 5 mins Artificial Intelligence brandpost Embrace the Generative AI revolution: a guide to integrating Generative AI into your operations The CTO of SAP shares his experiences and learnings to provide actionable insights on navigating the GenAI revolution. By Juergen Mueller Sep 29, 2023 4 mins Artificial Intelligence feature 10 most in-demand generative AI skills Gen AI is booming, and companies are scrambling to fill skills gaps by hiring freelancers to make the most of the technology. These are the 10 most sought-after generative AI skills on the market right now. By Sarah K. White Sep 29, 2023 8 mins Hiring Generative AI IT Skills Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe