{"id":1609,"date":"2020-02-21T14:05:22","date_gmt":"2020-02-21T14:05:22","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=1609"},"modified":"2021-04-12T02:54:57","modified_gmt":"2021-04-12T02:54:57","slug":"creating-business-case-cybersecurity-budget","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/","title":{"rendered":"Creating a Business Case for a Cybersecurity Budget"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Budgets are not infinite and organizations must align their spending to focus on core competencies. As a result, priorities do not always favor cybersecurity. Often I have been asked to join an organization and help them clear a specific hurdle, whether due to previous failed attempts or the identification of an incident prompting a response. What usually comes next is a great deal of frustration from the various in-house teams. My team arrives asking the same questions and requesting the same information that these folks have provided several times before. My role, in these cases, isn\u2019t to come in and blame either party, that is because lack of communication tends to cause this disconnect. Instead, my team\u2019s job is to help develop a strong investment business case and create an influential package that helps empower senior leadership to truly understand the need for this investment, which includes revamping communication practices to make them more effective.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><strong>Creating a Business Case for a Cybersecurity Budget<\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p>Consider the following:<\/p>\n<h4>1.\u00a0 \u00a0 \u00a0 What is the reason or focus of this investment?<\/h4>\n<p>If an incident has occurred, you can use that as an example to highlight an immediate need. If the incident was prevented or mitigated and a negative impact was avoided, there may be a need a determine the cause, in hopes that future incidents can be prevented.<\/p>\n<h4>2.\u00a0 \u00a0 \u00a0 \u00a0How were previous investments received and where did the spending go?<\/h4>\n<p>Have all previous investment requests failed? Worse yet &#8211; was a previous investment spent poorly? If so, you may be able to add lessons learned to your business case and avoid any similar failures.<\/p>\n<h4>3.\u00a0 \u00a0 \u00a0 \u00a0Trends and expectations on why this spending is needed &#8211; be industry specific.<\/h4>\n<p>These trends can be used to strengthen the argument, especially if you are referencing outside authority figures, such as the National Cyber Security Centre\u2019s findings<\/p>\n<h4>4.\u00a0 \u00a0 \u00a0 \u00a0Alignment with the overall business and avoiding assumptions.<\/h4>\n<p>Organizations struggle with effective communication. If you\u2019re building an investment program that requires business champions to adequately test solutions prior to the organization\u2019s go-live, it would behoove you to highlight the need for resource availability at the onset of the investment. If you incorrectly assume resource availability in this instance, the impact on your investment proposal could prove detrimental.\u00a0 In essence, your budget would be grossly skewed and your time frame would be inaccurate<\/p>\n<h4>5.\u00a0 \u00a0 \u00a0 \u00a0Current state of affairs, any regulatory requirements, and alignment with the organizations\u2019s risk register.<\/h4>\n<p>Be sure to address these items up front and don\u2019t underestimate their importance.<\/p>\n<h4>6.\u00a0 \u00a0 \u00a0 \u00a0How will the business be impacted during this investment?<\/h4>\n<p>Will there be a temporary loss of resources? Will it impact end users? You must consider the potential impact your investment will have on the organization. If concern is expressed, you need to be ready to respond<\/p>\n<\/div><div class=\"fusion-text fusion-text-3\"><p>At times it can be challenging to create a clear and concise plan that details the reason for the investment. You can start by asking the following questions:<\/p>\n<h4>7.\u00a0 \u00a0 \u00a0 Why does the organization need to make this investment?<\/h4>\n<p>You have to be able to justify the spending. Change for anyone is scary and it can have a noticeable impact on productivity. Regardless of what the change is, make sure that you can demonstrate the reason for this change and address any expected or unexpected disruptions. \u00a0Build a clear and concise breakdown of the requirement\/reason for spending, options for investment, and outcomes depending on decisions made.<\/p>\n<h4>8.\u00a0\u00a0\u00a0\u00a0\u00a0 Who or what will benefit from this investment?<\/h4>\n<p>Will the operations team glean the most benefit? Will the effort strengthen your company\u2019s overall security posture? Will your system resiliency increase tenfold? Will the end users see a great improvement in their experience? It is highly unlikely you will be the sole person and\/or department looking for investment. As a result, you should look at the big picture and consider including a holistic view of the benefits that will be derived from this investment.<\/p>\n<h4>9.\u00a0 \u00a0 \u00a0 When will the investment produce a return or show success in the metrics?<\/h4>\n<p>When will the investment produce a return or show success in the metrics? If you have data on when the organization may realize financial benefits or increases in productivity, be sure to include these findings in your investment case.\u00a0 You can spend time looking through other reported improvement programs to get a rough idea of the typical length of time it takes to realize these benefits.<\/p>\n<h4>10.\u00a0\u00a0\u00a0\u00a0\u00a0 How will success be measured?<\/h4>\n<p>If not properly measured, it will be next to impossible to see movement, either positive or negative. To have any sort of credibility to your business case, you must include a way to measure this. Consider when organizations implement phishing campaigns, for example. While knowing who \u2018fell victim\u2019 to the phish is often calculated, there are many other important metrics that are usually forgotten:<\/p>\n<ul>\n<li>Who opened the Phishing email(s) vs who did not. Several folks could have simply missed the email..<\/li>\n<li>Who clicked the link or opened the attachment. If someone was able to recognize from the wording it didn\u2019t look right and click the link, that is largely positive.<\/li>\n<li>Who entered details or credentials. If you were running a credential harvesting Phishing campaign where individuals clicked a link or opened an attachment, but stopped short of entering their user credentials, that would be considered a small victory.<\/li>\n<li>Who reported the Phishing email(s). If someone was a victim of the phish, but recognized their misstep shortly thereafter and reported themselves, that would also exemplify a positive takeaway. On the other hand, if the person \u2018fell victim\u2019 but failed to report it, that would serve as another metric as well \u2013 albeit one that wasn\u2019t as positive.<\/li>\n<\/ul>\n<h4>11.\u00a0\u00a0\u00a0\u00a0\u00a0 Where have we started?<\/h4>\n<p>Create a baseline for your current landscape, including workflows, productivity, risks, and whatever sort of improvement you\u2019re looking to realize as a result of the investment. Without this baseline, you won\u2019t actually be able to discern the changes that resulted \u2013 good or bad.<\/p>\n<h4>12.\u00a0\u00a0\u00a0\u00a0\u00a0 What does success look like?<\/h4>\n<p>In the above phishing example, the effort is viewed as a success if employees chose not to click the malicious link or open the attachment. However, a degree of success would also include those individuals who reported the email. Without noting that second aspect you would be unable to assess employee behavior during these exercises, and it would be incredibly difficult to measure any improvements in behavior going forward. If you want to increase your chances of having your investment proposal approved, take the time to document what every avenue of success looks like \u2013 even small areas, like a company\u2019s perception of cyber security. It is also important to note that at times the measure(s) of \u2018success\u2019 look different across all teams \u2013 consider documenting your version of success and discussing with senior leadership to obtain their vision of success \u2013 don\u2019t assume their outlook is the same.<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><p>A child once taught me that the best way to get what they want is to start out big!\u00a0 They started out by asking one parent for something extraordinary, such as a pet pony.\u00a0 After the parent denies the initial request, the child then asks for a hamster. At this point, the parent will mull the request over, and the child Theo would go to their other parent, bringing up the initial request for a pony. When the second parent hears this, they discuss with the first parent, and the proposition of a hamster becomes far more reasonable in their minds, which typically ends in that request being granted.This example, in essence, is a form of social engineering. Whilst I would advise against using this approach when it comes to investment business cases, there is something that can be learned from this child \u2013 the power of influence<\/p>\n<\/div><div class=\"fusion-text fusion-text-5\"><p>One of my favorite books that touches on the concept of influence is called <a href=\"http:\/\/a.co\/74EJCVw\" target=\"_blank\" rel=\"noopener noreferrer\">Phishing: Dark Waters<\/a>. It highlights the methodology of effectively implementing phishing awareness training. One part of the book talks about Social Engineering and describes it as a scale between influence and manipulation \u2013 typically the end result is the same, but the process you take to get there differs. When presenting your request for a budget, you\u2019ll rely heavily on your ability to influence by identifying your audience, what they value, what they understand, and how they think. From there, you\u2019ll present the most appropriate and supportive arguments to influence their decision, while using facts, company history, trends and the risk register to build a strong and persuasive case.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><strong>Presenting your Investment Business Case<\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-6\"><p>When preparing to present your plan to senior leadership, consider your relationship with those individual(s). Have you worked together long? Is there a mutual respect and understanding between you?<\/p>\n<p>If so, you\u2019re starting out on a positive note, and you can move forward in building the evidence and collateral needed to justify the budget request.<\/p>\n<p>If you\u2019re new to this role or simply have not yet developed that level of trust with your leadership, you must consider their expectations, understanding, and needs. While you are the expert in the field, these leaders are tasked with making educated decisions for not only the betterment of cybersecurity but the organization as a whole. When presenting your case, consider the following: questions you expect to be asked, where their focus lies, and their overall understanding of the cybersecurity posture.<\/p>\n<p>While there is no guarantee your investment will be seen as a priority, by focusing on the overall organizational needs, general perception of the cybersecurity posture, and highlighting the improvements that will be realized \u2013 you can be confident others will start to understand the connection between cybersecurity and the organization.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><strong>Enhancing the Overall Investment Business Case<\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-7\"><h4>Communication and Integration of the Cybersecurity Operations Team Across the Organization<\/h4>\n<p>In one instance, my team was called in to assist an organization that was struggling to consolidate technologies across multiple separate global offices. What\u2019s more, a few were separate businesses that had merged into this larger house. Previously, offices were allowed to assess, test, and implement technology solutions as they saw fit &#8211; without approval from central management. This anonymity was seen as beneficial for the local office but resulted in massive technical debt and a litany of integration issues when the organization had decided to centralize. As part of my team\u2019s effort, separate office cultures and processes had to be assessed and understood, the solutions had to be re-trialed and tested against a much larger scope, and the historic culture of validation and purchasing of solutions needed a significant overhaul. After several prior failed attempts to consolidate, it was determined that outside help was needed to develop a viable solution \u2013 which lead to my team\u2019s involvement. While you might feel this example isn\u2019t directly applicable to your business case, you may start to realize that departments typically act as separate offices, albeit on a much smaller scale. Because of this, teams may fail to communicate with one another and other groups, such as operations or security, may lack a holistic view of the organization and its objectives. This type of disjointed culture can result in technical debt and, in some cases, even \u00a0cause incidents to occur.<\/p>\n<h4>Enhancing day to day operations<\/h4>\n<p>Many years ago in college, I decided to open my own business. The offering was managed service provider for small to medium sized firms. From this experience, I learned that several organizations tend to employ third parties that simply build a cookie cutter infrastructure and leave. This approach led to nice technology that didn\u2019t align with the needs of the organization and, in some cases, even overlooked major requirements. From there, temporary workarounds would be implemented, which often led to an increase in the use of shadow IT. Unfortunately, these workarounds would not directly address the major concerns and were only meant to serve as a \u201cstop gap\u201d. As you probably guessed, however; these \u201cstop gaps\u201d typically turned into permanent solutions.<\/p>\n<p>When your investment changes the way people work, those persons are usually afraid of change; this is normal and should be expected. In order to really showcase the benefits of the investment, try holding a functional and non-functional requirements gathering campaign. Creating workflows that accurately reflect daily operations and including outside parties in that process will enhance their buy-in and establish trust. Or, if you cannot host this prior to the business case proposal \u2013 which is understandable \u2013 make sure to host during the first phase of the investment, and make all aspects of your business case clear to your stakeholders. This includes the owner(s)\/project manager of the investment, purpose of the investment, and benefits to be gleaned as a result of its implementation.<\/p>\n<p>In situations where your investment request will both enhance the security posture and enable effective documentation of user workflows, it can lead to less disruption to the business and greater efficiencies being realized across departments. I\u2019ve also seen investments include hardware and infrastructure improvements or better cloud-based offerings which can speed up access to resources and lead to a healthier bottom line. Regardless of your investment goals, be sure to utilize a proper form of internal marketing that emphasizes the positive benefits end users will see:<\/p>\n<h4>Empowering core competencies of the business<\/h4>\n<p>As mentioned previously, most businesses&#8217; core competencies do not include cybersecurity. Therefore, when building an investment plan, ensuring that the plan&#8217;s objectives align with the direction, needs, risks, and compliance requirements of the business. If you struggle with this, consider using a trusted adviser like ITEGRITI to perform a\u00a0<a href=\"http:\/\/72.52.228.46\/~itegriti\/cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">GAP analysis or help provide with you a baseline of your organization\u2019s security posture<\/a>. Understanding the needs of your organization will facilitate better strategic planning and could lead to more inclusive investments.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":1570,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,2180],"tags":[1439],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Creating a Business Case for a Cybersecurity Budget<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Creating a Business Case for a Cybersecurity Budget\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-21T14:05:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T02:54:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/02\/Copy-of-Untitled-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Zoe Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RoseSecOps\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/\"},\"author\":{\"name\":\"Zoe Rose\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/8fec04d3edbc87b981f6b06f773f8b9c\"},\"headline\":\"Creating a Business Case for a Cybersecurity Budget\",\"datePublished\":\"2020-02-21T14:05:22+00:00\",\"dateModified\":\"2021-04-12T02:54:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/\"},\"wordCount\":2852,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/02\/Copy-of-Untitled-2.png\",\"keywords\":[\"11 Minute Read\"],\"articleSection\":[\"Cybersecurity\",\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/\",\"name\":\"Creating a Business Case for a Cybersecurity Budget\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/02\/Copy-of-Untitled-2.png\",\"datePublished\":\"2020-02-21T14:05:22+00:00\",\"dateModified\":\"2021-04-12T02:54:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/02\/Copy-of-Untitled-2.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/02\/Copy-of-Untitled-2.png\",\"width\":800,\"height\":450,\"caption\":\"Creating a Business Case for a Cybersecurity Budget\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Creating a Business Case for a Cybersecurity Budget\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/8fec04d3edbc87b981f6b06f773f8b9c\",\"name\":\"Zoe Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3a81a5e3176af12c5e91824aa45ab60c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3a81a5e3176af12c5e91824aa45ab60c?s=96&d=mm&r=g\",\"caption\":\"Zoe Rose\"},\"description\":\"Zo\u00eb Rose is a highly regarded hands-on cyber security specialist, who helps her clients better identify and manage their vulnerabilities and embed effective cyber resilience across their organisation. Zo\u00eb is a Cisco Champion and certified Splunk Architect, who frequently speaks at international conferences. Recognised in the 50 most influential women in cyber security UK for the past two years, and the PrivSec 200, Zo\u00eb is quoted in the media, has presented on National News, has been featured in Vogue Magazine, and was the spokesperson for Nationwide\u2019s Over Sharing campaign that had a reach of 306 million citizens.\",\"sameAs\":[\"https:\/\/www.rosesec.com\/\",\"https:\/\/www.linkedin.com\/in\/zo-rose\/\",\"https:\/\/x.com\/RoseSecOps\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/zoe-rose\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Creating a Business Case for a Cybersecurity Budget","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/","og_locale":"en_US","og_type":"article","og_title":"Creating a Business Case for a Cybersecurity Budget","og_url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2020-02-21T14:05:22+00:00","article_modified_time":"2021-04-12T02:54:57+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/02\/Copy-of-Untitled-2.png","type":"image\/png"}],"author":"Zoe Rose","twitter_card":"summary_large_image","twitter_creator":"@RoseSecOps","twitter_site":"@itegriti","twitter_misc":{"Written by":"Zoe Rose","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/"},"author":{"name":"Zoe Rose","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/8fec04d3edbc87b981f6b06f773f8b9c"},"headline":"Creating a Business Case for a Cybersecurity Budget","datePublished":"2020-02-21T14:05:22+00:00","dateModified":"2021-04-12T02:54:57+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/"},"wordCount":2852,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/02\/Copy-of-Untitled-2.png","keywords":["11 Minute Read"],"articleSection":["Cybersecurity","Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/","url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/","name":"Creating a Business Case for a Cybersecurity Budget","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/02\/Copy-of-Untitled-2.png","datePublished":"2020-02-21T14:05:22+00:00","dateModified":"2021-04-12T02:54:57+00:00","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/02\/Copy-of-Untitled-2.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/02\/Copy-of-Untitled-2.png","width":800,"height":450,"caption":"Creating a Business Case for a Cybersecurity Budget"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-business-case-cybersecurity-budget\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Creating a Business Case for a Cybersecurity Budget"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/8fec04d3edbc87b981f6b06f773f8b9c","name":"Zoe Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3a81a5e3176af12c5e91824aa45ab60c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3a81a5e3176af12c5e91824aa45ab60c?s=96&d=mm&r=g","caption":"Zoe Rose"},"description":"Zo\u00eb Rose is a highly regarded hands-on cyber security specialist, who helps her clients better identify and manage their vulnerabilities and embed effective cyber resilience across their organisation. Zo\u00eb is a Cisco Champion and certified Splunk Architect, who frequently speaks at international conferences. Recognised in the 50 most influential women in cyber security UK for the past two years, and the PrivSec 200, Zo\u00eb is quoted in the media, has presented on National News, has been featured in Vogue Magazine, and was the spokesperson for Nationwide\u2019s Over Sharing campaign that had a reach of 306 million citizens.","sameAs":["https:\/\/www.rosesec.com\/","https:\/\/www.linkedin.com\/in\/zo-rose\/","https:\/\/x.com\/RoseSecOps"],"url":"https:\/\/itegriti.com\/kw022024\/author\/zoe-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1609"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=1609"}],"version-history":[{"count":11,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1609\/revisions"}],"predecessor-version":[{"id":2734,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1609\/revisions\/2734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/1570"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=1609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=1609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=1609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}