Build a 12-month Cyber Security Budget in 6 hours

Published On: October 9, 2017

October 9th, 2017
Chad Boeckmann, CEO, Secure Digital Solutions

As we rapidly approach the end of the calendar year, many cybersecurity departments are working on budget requests for next year. Yet, these same cybersecurity teams are also likely to be busy wrapping up their projects before year end. It is against this backdrop that we wanted to share with you the story of a customer who recently approached our team with this very challenge: To create a security program budget and twelve-month roadmap. The catch? Do it in seven business days or less.

In the following paragraphs, we describe what the customer provided at the start, how we mapped relevant information towards their particular framework of choice, and how we leveraged our TrustMAPP tool to generate a prioritized budget, containing both budget figures and also the resources needed to bring the next year’s proposed security projects to fruition.

Starting with a Baseline

The customer wanted to use a previous risk assessment as a high-level program baseline with identified gaps. However, the assessment was a general IT controls assessment and security was only a small section in the report. To further complicate matters, the assessment results and data were, of course in PDF format, which would have required significant manual effort to leverage the results to create a plan and roadmap.

The risk assessment report did, however, list areas for improvement that guided initial scores for the baseline. We agreed that the overall goal was to find a way to use the assessment data as part of a meaningful budget and roadmap that aligned with the customers’ business objectives for the coming year.

Mapping Findings From Prior Report

The TrustMAPP team quickly reviewed the report and began to map findings from the assessment to the NIST Cyber Security Framework (NIST CSF). The NIST CSF framework was not only the customer’s preferred control framework, but also the mechanism by which the various security activities would be reported on and managed to in the future.

Once we had the data from the previous assessment mapped to the NIST CSF, we were able to populate the same data fields in the NIST CSF process template in the TrustMAPP tool. Once in TrustMAPP, we could very quickly generate estimates for improvements based on a third-party validated assessment.

Time to complete this task: 2 hours to map assessment data from the PDF report and enter those values into the NIST CSF template in TrustMAPP.

Gaining Insights and Building a Plan

At this stage, using the pre-built analytics in TrustMAPP, our team could readily produce a prioritized roadmap based on the business objectives established – ahead of time – for the security program (in this case, GDPR Readiness, FIPS compliance, and HIPAA). The analytics produced a prioritized list of estimated resource requirements (both internal and external) along with estimating capital expenditures (hardware, software, training) required to meet the objectives in the coming fiscal year.

Time to complete this task: 2 hours to complete the planning and roadmap development.

Develop Customer Presentation

Using the output from TrustMAPP’s pre-built analytics and intelligence the team was able to quickly generate estimated budget requirements. The customer received a graphical high-level security program roadmap to communicate these initiatives, associated budget and timelines.

Time to complete this task: 2 hours to generate a prioritized roadmap of security activities, complete with the required levels of effort and investment.

A Budget Proposal in Six Hours?

All told, the entire process was completed in about six hours. Compare the scenario we just shared to the time consumed and frustration generated by manually-produced budgets, which we estimate to be about 120 hours based on our own experience and feedback from existing customers.

TrustMAPP can not only help you produce next year’s budget figures and justification, it can also help track and report your progress, your maturity, as you work to implement your plan. With TrustMAPP, you not only save time, but also elevate your discussions about cybersecurity.

Browse These Topics

Tags

boost the protection of your data bridge the gap in your information security challenges build a cyber safe firm business decisions around security Challenges Facing Chief Information Security Officers CISO program efficacy CISO program management cyber security cyber security goals Cybersecurity management Cyber Security Mistakes cybersecurity performance management cyber security platform cyber security team Effective Data Security Measures effectively communicate with board members regarding cyber issues or threats elevate your security confidence elevating information security elevating your information security levels Identify Potential Security Weaknesses Implementing a Comprehensive Cyber Security Plan Implementing Strong Cyber Security Protocols Implementing strong security software protocols improve cyber security protocols Information Security Programs information security protection agency information security risk management information security solutions information security trends managing your information security effectively maturity of your information security and privacy programs measure security levels measure your security proprietary software can help you to protect your company Protect Against Costly Security Breach Protect Customer Data Protect Cyber Network risk management advisor risks of a data breach roadmap to better information security robust security monitoring service successful information security technology advancement top notch security software for your company traveling to high risk countries