Jump to ratings and reviews
Rate this book

7 Experts on Justifying Security Spend: Prioritizing Security Needs to Senior Management and the Board

Rate this book
When it comes to cybersecurity, every organization builds a program based on its own
asset portfolio, unique business culture, and operational challenges. Regardless of its
specific needs, every security program must do two prioritize, and sell itself to senior
management. How do security executives do this successfully?
With generous support from Nehemiah Security, we asked seven security experts the
following
How would you advise a new CISO in justifying their prioritization and
spend to senior executives, and what strategies would you recommend for
communicating needs and risks to management?
In speaking with security practitioners from diverse industries, it is clear that the key lies
in how they quantify the business impact of risk. However, risk means different things to
different businesses. The challenge then comes down to deciding what is most important
to the business, what are the true costs of losing it, and how that compares to the cost of
preventing its loss.
The essays in this eBook offer practical strategies, advice, and examples showing different
approaches to calculating risk, and how to use that effectively in presenting to senior
management. I’m certain anyone who needs to justify their security program will benefit
from the experiences of these professionals.

Kindle Edition

Published June 13, 2018

1 person want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.