Building the security budget will require an understanding of how the business interacts with security, and how different controls can affect the risk level of the organization. This phase will take you through the following activities:

  • Map business capabilities to security controls and specify need.
  • Input the costs of the security controls, general expenses, and IT system-specific expenses.
  • Analyze the three different budget outputs and explain surpluses and/or deficits.
  • Optimize the budget by using defense-in-depth techniques.

Use this phase as part of the full blueprint, Build, Optimize, and Present a Risk-Based Security Budget.

Also In

Build, Optimize, and Present a Risk-Based Security Budget

Get the budget you deserve.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019