How to Talk About Investing in Cyber

Category: News
Published: 11th December 2024

< Back to Media
Board meeting discussing investing in cyber

Communicating security concerns, policy changes and required investment in cyber to executives is arguably one of the toughest challenges that security professionals face. IT and security departments are can be perceived as cost centres, as they don’t directly generate revenue. This perception makes it difficult to convince boards, who won’t all have in-depth technical knowledge, to invest in the tools necessary to protect your organisation. Yet, without these investments, businesses risk exposure to severe financial, reputational, and operational damage.

The priorities of a security team are to achieve an effective threat management posture that protects the business and prevents cyber incidents. As well as aligning security initiatives with wider organisational goals and complying with regulatory obligations. However, these risks often feel abstract or intangible, especially for organisations that have not yet experienced a breach. We believe that the key to securing buy-in for cyber security investments lies in framing the conversation in terms of business impact and risk management.

The Threat Landscape

Giving the board a holistic view of the threat landscape is essential to justifying cyber security investment. Cyber threats are constantly evolving and becoming more advanced, so the risk for businesses is continually growing.

Some of the threats that Red Helix sees as the most prominent going into 2025 are:

  1. Ransomware
    Ransomware remains a prominent cyber threat, with many victims reportedly being SME businesses. These attacks are not only costly, often involving significant pay outs, but also difficult to recover from if you do not have adequate back-ups.
  2. Supply chain attacks
    Organisations are becoming increasingly connected via third party operations, which increases the risk of supply chain attacks and vulnerabilities. Supply chain attacks can be extremely sophisticated, and hard to detect, especially if they are originating from a network that you do not have visibility of.
  3. AI powered attacks
    Going into 2025, we expect to see AI come into full use by cyber criminals. AI has already facilitated better written communications in foreign languages for phishing emails, making them harder to detect. Generative AI has also meant that there is an increasing volume of convincing impersonations in phishing and vishing communications, that have the capabilities to trick voice recognition systems.

Cost of Doing Nothing

One of the most compelling arguments for investing in cyber is calculating the cost of doing nothing. The average cost of a cyber incident is reported to be £3.4 million, and while cyber insurance may cover some of these losses, insurers often take time to pay out. Without immediate funds to address a breach, businesses could face severe cash flow issues or even closure before relief arrives.

In addition to direct financial losses, regulatory non-compliance is about to be supercharged. With the enforcement of regulations like DORA (Digital Operations Resilience Act) and NIST2 (Network and Information Systems Directive) coming into effect in 2025, significant fines are expected to follow.

The fines under DORA vary based on the severity of the violation and the organisations level of cooperation with authorities. Penalties can include personal liability for the individual responsible for security, with fines reaching up to €1,000,000. Additionally, the companies face substantial financial repercussions—a fine of 1% of average daily global turnover can be imposed , until compliance is met.

Network and Information Security (NIS2) regulatory fines operate similarly with administrative fines of up to €10 million or 2% of a company’s annual revenue, whichever is greater, for non-compliance.

These fines make it easier to explain to boards the risks they are taking in terms of monetary value to the business by not appropriately and proportionately investing in cyber security. It’s important to convey that the magnitude of the fine will be proportional to the efforts made and the company’s commitment to cyber security. It is not about ensuring no breach occurs ever, but about demonstrating a commitment to incremental improvements and investing appropriately to control the risk.

Prioritising Limited Spend

To prioritise a limited budget effectively, identifying the biggest threats to your business is the best place to start. These may be the threats listed above or threats specific to your sector, such as vulnerabilities related to personal data or financial records.

Once the key threats are identified, analyse the vulnerabilities they exploit. For example, ransomware might target weaknesses like a lack of backups or unencrypted data, while phishing could exploit insufficient staff awareness or poor reporting processes.

By tracing each threat back to the underlying vulnerabilities, you can determine where to focus your budget for maximum impact. Prioritising the vulnerabilities that are most likely to be exploited ensures that your resources are allocated where they are needed most. Tools like CrowdStrike can identify your main vulnerabilities and the likelihood of that vulnerability being exploited for you, with their EDR (Endpoint Detection Response) technology. This is often a very good place to start if you are wanting to make data-driven decisions. Alternatively, you can reach out to trusted experts like Red Helix. We are always happy to advise.

How to Talk About Investing in Cyber

Board meeting discussing investing in cyber
Find out more

Quantum Computing and Changing Methods of Decryption

Website,Programming,Code.,Writing,Programming,Code,On,Laptop.,Computer,Program.
Find out more

The Zero Trust Model for the Hybrid Work Era

Dog and cat sleeping on sofa
Find out more

Stricter Compliance Regulations

Crossroad,Signpost,Saying,This,Way,,That,Way,,The,Other,Way
Find out more

Multi-Domain Security Across IoT and Cloud Environments

Networking,Connect,Technology,Abstract,Concept.,Polygonal,With,Connecting,Dots,With
Find out more

Do Not Underestimate the Importance of Your Security Culture

Business,And,Entrepreneurship,Symposium.,Speaker,Giving,A,Talk,At,Business
Find out more

Phishing Remains the Main Attack Vector

Phishing,Scam,From,Hackers,Stealing,User,Credit,Card,Online.,Via
Find out more

Building a Resilient Supply Chain

White background with blue trucks all around
Find out more

Recognising the Strengths and Threats Posed by AI Adoption

Group of robots looking in all directions
Find out more