HomeNewsIndia NewsGartner Says Many Organizations Falsely Equate IT Security Spending With Maturity

    Gartner Says Many Organizations Falsely Equate IT Security Spending With Maturity

    Chief Information Security Officers Must Assess Risks and Identify the “Real” Security Budget

    Organizations spend an average of 5.6 percent of the overall IT budget on IT security and risk management, according to the most recent IT Key Metrics Data from Gartner, Inc. However, IT security spending ranges from approximately 1 percent to 13 percent of the IT budget and is potentially a misleading indicator of program success, analysts said.

    “Clients want to know if what they are spending on information security is equivalent to others in their industry, geography and size of business in order to evaluate whether they are practicing due diligence in security and related programs,” said Rob McMillan, research director at Gartner.

    “But general comparisons to generic industry averages don’t tell you much about your state of security. You could be spending at the same level as your peer group, but you could be spending on the wrong things and be extremely vulnerable. Alternatively, you may be spending appropriately but have a different risk appetite from your peers,” he said.

    According to Gartner, the majority of organizations will continue to misuse average IT security spending figures as a proxy for assessing security posture through 2020.

    Without the context of business requirements, risk tolerance and satisfaction levels, the metric of IT security spending as a percentage of the IT budget does not, by itself, provide valid comparative information that should be used to allocate IT or business resources. Moreover, IT spending statistics alone do not measure IT effectiveness and are not a gauge of successful IT organizations. They simply provide an indicative view of average costs, without regard to complexity or demand.

    Identifying the “real” security budget

    Explicit security spending is generally split among hardware, software, services (outsourcing and consulting) and personnel. However, any statistics on explicit security spending are inherently “soft” because they understate the true magnitude of enterprise investments in IT security, since security features are being incorporated into hardware, software, activities or initiatives not specifically dedicated to security.

    Gartner’s experience is that many organizations simply do not know their security budget. This is partly because few cost accounting systems break out security as a separate line item, and many security-relevant processes are carried out by staff who are not devoted full-time to security, making it impossible to accurately account for security personnel. In most instances, the chief information security officer (CISO) does not have insight into security spending throughout the enterprise.

     To identify the real security budget, there are many places to look, such as networking equipment that has embedded security functions, desktop protection that may be included in the end-user support budget, enterprise applications, outsourced or managed security services, business continuity or privacy programs, and security training that may be funded by HR.

    According to Gartner research, secure organizations can sometimes spend less than average on security as a percentage of the IT budget. The lowest-spending 20 percent of organizations are composed of two distinctly different types of organizations:

    1. Unsecure organizations that underspend; and
    2. Secure organizations that have implemented best practices for IT operations and security that reduce the overall complexity of the IT infrastructure and work toward reducing the number of security vulnerabilities.

    Gartner’s view is that enterprises should be spending between 4 and 7 percent of their IT budgets on IT security: lower in the range if they have mature systems, higher if they are wide open and at risk. This represents the budget under the control and responsibility of the CISO, and not the “real” or total budget.

    To demonstrate due care in information security, organizations need to first assess their risks and understand both the CISO’s security budget and the “real” security budget found in the complicated range of accounts that may not capture all security spending.

    “A CISO who has knowledge of all of the security functions taking place within the organization — as well as those that are necessary but missing — and the way in which those functions are funded, is likely to use indirectly funded functions to greater advantage,” Mr. McMillan said.

    Gartner clients can read more in the report: “Identifying the Real Information Security Budget.”

    Gartner analysts will provide additional analysis on IT security trends at the Gartner Security & Risk Management Summits 2017 taking place in National Harbor, Maryland and Tokyo.

    ELE Times Bureau
    ELE Times Bureauhttps://www.eletimes.ai/
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here

    Related News

    Must Read

    TI’s new power-management solutions enable scalable AI infrastructures

    Texas Instruments (TI) debuted new design resources and power-management...

    ESA awards Rohde & Schwarz for contributions to 30 years European Satellite Navigation

    The event brought together institutional and industrial partners, ESA...

    STMicroelectronics joins FiRa board, strengthening commitment to UWB ecosystem and automotive Digital Key adoption

    STMicroelectronics, a global semiconductor leader serving customers across the...

    STARLight Project chosen as the European consortium to lead in next-gen silicon photonics on 300 mm wafers

    The STARLight project is bringing together a consortium of leading...

    KYOCERA AVX RELEASES NEW KGP SERIES STACKED CAPACITORS

    KYOCERA AVX released the new KGP Series commercial-grade stacked...

    Microchip Unveils First 3 nm PCIe Gen 6 Switch to Power Modern AI Infrastructure

    Switchtec Gen 6 PCIe Fanout Switches deliver extra bandwidth,...

    Nuvoton Launches Arbel NPCM8mnx System-in-Package (SiP) for AI Servers and Datacenter Infrastructure

    Breakthrough BMC Innovation Powers Secure, Scalable, and Open Compute...

    NEPCON ASIA 2025: Showcasing the Future of Smart Electronics Manufacturing

    NEPCON ASIA 2025, taking place from October 28 to...

    Renesas Expands Sensing Portfolio with 3 Magnet-Free IPS ICs & Web-Based Design Tool

    New Simulation & Optimization Platform Enables Custom Coil Designs...

    IEEE IEDM, 2025 Showcases Latest Technologies in Microelectronics, Themed “100 Years of FETs”

    The IEEE International Electron Devices Meeting (IEDM) is considered...