jan-karel.com
Home / Security Measures / Executives & Governance / Security Budget and Investment

Security Budget and Investment

Security Budget and Investment

Security Budget and Investment

No Budget, But Risk

Cybersecurity is not a technical side issue here, but part of continuity, liability, and reputation.

For Security Budget and Investment, steering only works with measurable goals, clear escalation, and timely decisions.

This way the topic does not become a recurring discussion, but a manageable part of regular business operations.

Immediate measures (15 minutes)

Why this matters

The core of Security Budget and Investment is risk reduction in practice. Technical context supports the choice of measures, but implementation and safeguarding are central.

"How much should we spend on security?"

It is the question every CISO dreads and every CFO asks. And the honest answer is: it depends. But that answer is about as useful as a meteorologist saying "tomorrow will be weather again", so let's make it more concrete.

This chapter gives you the benchmarks, the frameworks, and the arguments you need to put together a security budget that fits your organisation. Whether you are the executive who must decide, or the CISO who must defend the budget – here you will find the numbers and the justification.

What do others spend? Benchmarks

Benchmarks are not prescriptions. They are reference points. What a bank spends on security is not what a construction company should spend. But they do help to check whether you are heading in the right direction – or hopelessly lagging behind.

Percentage of the IT budget

The most commonly used measure is security spending as a percentage of the total IT budget.

Sector Typical % of IT budget Notes
Financial services 10 – 15% Heavily regulated, high impact from incidents
Healthcare 7 – 12% Sensitive data, increasing regulation
Government 8 – 12% NIS2 and BIO requirements drive investment
Retail and e-commerce 5 – 10% Payment data, large attack surface
Industry and manufacturing 4 – 8% OT security is becoming increasingly important
SME (generic) 3 – 7% Often too low; the lower limit is risky

Percentage of revenue

An alternative measure is security spending as a percentage of total revenue. This is more useful for organisations where IT doesn't have a separate budget.

Organisation size Typical % of revenue
Enterprise (>250 employees) 0.5 – 1.5%
Mid-size (50-250 employees) 0.3 – 1.0%
Small (<50 employees) Often less than 0.3%, but 0.5% is desirable

Warning: A benchmark of "6% of the IT budget" is meaningless if your IT budget itself is too low. If your total IT budget is 50,000 euros and 6% of that goes to security, you have 3,000 euros. That buys you exactly half a penetration test.

Building the business case

Defending a security budget with "otherwise we'll get hacked" is like telling your child to eat their vegetables "because it's healthy". Technically true, but not convincing. You need a business case.

The foundation for a good business case is a solid risk analysis. Without insight into the risks your organisation faces, any budget is a shot in the dark.

Step 1: Quantify the risk

Risk analysis translates threats into monetary terms. The model is simple:

Expected annual loss = Probability of incident x Impact per incident

Scenario Estimated probability (per year) Estimated impact Expected annual loss
Ransomware attack 15 – 25% 500,000 – 5,000,000 euros 75,000 – 1,250,000 euros
Data breach with personal data 10 – 20% 200,000 – 4,500,000 euros 20,000 – 900,000 euros
BEC fraud (CEO fraud) 10 – 15% 50,000 – 500,000 euros 5,000 – 75,000 euros
Downtime due to DDoS 5 – 15% 10,000 – 100,000 euros 500 – 15,000 euros

These figures are estimates based on sector averages and Dutch incident statistics. Your own risk profile may differ. But even rough estimates show that the expected annual loss quickly exceeds a reasonable security budget.

Step 2: Show the cost of doing nothing

The costs of a security incident go far beyond the direct loss. Calculate the full picture.

Cost item Notes
Direct damage Ransom, stolen money, system recovery costs
Operational downtime Revenue loss due to downtime – average 21 days for ransomware
Fines GDPR: up to 20 million euros or 4% of revenue. NIS2: up to 10 million euros or 2% of revenue
Legal costs Lawyers, claims from affected customers, director liability
Reputational damage Customer churn, loss of contracts, falling share price
Recovery costs Forensic investigation, emergency measures, accelerated investments after the fact
Insurance impact Higher premiums after an incident, possible loss of coverage

Rule of thumb: The costs of resolving an incident after the fact are on average five to ten times higher than the costs of prevention. Every euro you invest now saves you five to ten euros in damage.

Step 3: Compare investment with risk reduction

Investment Annual cost Expected risk reduction
Endpoint Detection & Response (EDR) 15,000 – 50,000 euros 30 – 50% lower chance of ransomware
Security awareness training 5,000 – 20,000 euros 40 – 60% fewer successful phishing attacks
Annual penetration test 10,000 – 50,000 euros Proactive identification of vulnerabilities
MFA on all systems 5,000 – 15,000 euros 80 – 99% fewer credential attacks
SIEM/SOC (managed) 30,000 – 120,000 euros On average 60% faster detection of incidents
Incident response retainer 10,000 – 30,000 euros Much faster response time during incidents
Cyber insurance 5,000 – 30,000 euros Financial cushion for residual risk
Backup and recovery 10,000 – 40,000 euros Recovery without ransom in ransomware situations

The language CFOs understand is not "we need to reduce our attack surface" but "for 80,000 euros per year we reduce the probability of a million-euro incident by 70%". Translate technical measures into financial impact.

Where does the budget go? Budget categories

A security budget that only goes to tooling is like a gym membership without food and sleep. The distribution across categories is at least as important as the total amount.

Recommended distribution

Category % of security budget What it includes
People 35 – 45% CISO (internal or external), security analysts, hired specialists
Tooling and technology 20 – 30% EDR, SIEM, firewalls, vulnerability scanners, IAM solutions
Training and awareness 10 – 15% Security awareness for all staff, technical training for IT, executive training
Testing and audit 10 – 15% Penetration tests, red team exercises, compliance audits, code reviews
Incident response 5 – 10% IR retainer, forensic capacity, crisis plans, exercises
Insurance 5 – 10% Cyber insurance, supplementary D&O coverage

Common mistake: Organisations invest heavily in tooling but barely in people and training. A SIEM costing 100,000 euros per year without anyone to read the alerts is an expensive screensaver. People make the difference – tools support them.

Prioritising: where to start?

Not every organisation can do everything at once. The art is to start where the greatest risk reduction sits for the least money.

The prioritisation framework

Rank investments on two axes: impact on risk reduction and cost/complexity.

Priority Measure Impact Cost Start here
1 MFA on all external access Very high Low Tomorrow
2 Security awareness training High Low This month
3 Structure patch management High Low-medium This month
4 Test backup and recovery High Medium This quarter
5 EDR on all endpoints High Medium This quarter
6 Develop incident response plan High Low This quarter
7 Conduct penetration test Medium-high Medium This half-year
8 SIEM/SOC (managed) Medium-high High This year
9 Zero trust architecture High High Multi-year plan
10 Red team exercise Medium High After basic measures

Quick wins versus long-term investments

Quick wins (within a month, low budget): - Activate MFA on all external access points - Tighten password policy - Enable automatic updates where possible - Run a phishing simulation to measure baseline - Restrict admin rights on workstations

Long-term investments (multi-year plan, substantial budget): - Zero trust network segmentation - Security Operations Centre (internal or managed) - Full identity & access management - DevSecOps integration in software development - Business continuity planning and disaster recovery

ROI of security: the return on protection

The ROI of security is difficult to calculate because you measure the return in incidents that don't occur. But there are ways to make it tangible. In chapter 10 on security metrics and board reporting we go deeper into how you structure the reporting of these indicators to the board.

Direct ROI indicators

Indicator How to measure Example
Phishing click rate Before and after awareness training From 25% to 4% = 84% improvement
Mean time to detect (MTTD) Average time to incident discovery From 197 days to 30 days
Mean time to recover (MTTR) Average time to full recovery From 21 days to 3 days
Blocked attacks Number of blocked attempts by EDR/firewall Quantifiable from logging
Compliance status Percentage of GDPR/NIS2 requirements met From 40% to 90%

Indirect benefits

  • Commercial advantage. More and more customers and clients demand demonstrable security. An ISO 27001 certification or SOC 2 report opens doors.
  • Lower insurance premiums. Good security leads to lower premiums for cyber insurance and D&O.
  • Director protection. Demonstrable investments protect directors from personal liability (see chapter 5).
  • Employee trust. Employees who know that the organisation takes security seriously are more vigilant and report incidents more quickly.

Presenting the budget to the board

The CISO presents in technical terms. The board thinks in risks, costs, and strategic impact. Here are five principles to bridge that gap.

1. Speak the language of the board

Not: "We need to upgrade our SIEM to a next-gen XDR platform with SOAR integration." But: "We want to detect attacks twice as fast, reducing the average damage per incident by half."

2. Link to business risks

Not: "There are 47 critical vulnerabilities in our infrastructure." But: "Three of our customer-facing systems contain vulnerabilities that give an attacker access to 200,000 customer records. The expected fine in a data breach is 800,000 euros."

3. Offer options, not ultimatums

Present three scenarios with corresponding budget and risk acceptance.

Scenario Annual budget What it delivers Residual risk
Minimum 50,000 euros Basic hygiene: MFA, patching, awareness, backups High – does not meet NIS2
Recommended 150,000 euros Basic + pentest + EDR + incident plan + managed SOC Medium – meets NIS2 baseline
Optimal 300,000 euros Everything above + red teaming + zero trust + 24/7 SOC Low – best practice level

4. Use incidents as illustrations

Refer to recent incidents in your own sector. Not to create fear, but to show that the risk is real. Board members respond more strongly to concrete examples than to abstract probability calculations.

5. Report progress, not just problems

Show every quarter what was done with the budget, which risks were reduced, and which metrics improved. Board members who see results invest further.

Tip for the CISO: Don't end your presentation with a list of everything that is wrong. End with three concrete actions, a timeline, and the requested budget. Board members want to make decisions, not become depressed.

Common mistakes in security budgeting

Mistake Why it goes wrong Better alternative
Only investing after an incident Reactive is always more expensive than proactive Reserve a structural annual budget
Basing budget on last year + inflation Security threats grow faster than inflation Base budget on current risk analysis
Spending everything on tooling Tools without people are useless Distribute across people, tools, training, testing
No budget for incident response "That won't happen to us" – until it does Take out at least an IR retainer
Viewing security as a cost item Creates a perverse incentive to cut costs Frame as risk management and business continuity
No multi-year plan Annual discussion leads to ad-hoc decisions Three-year plan with annual recalibration

Summary: the bill

Security budget is not a cost item – it is risk management. Just like a fire insurance policy, a lock on the door, and a good lock on your bike. You hope you'll never need it, but when the moment comes, it is the difference between an incident and a disaster.

Three things to take away:

  1. Start with the basics. MFA, patching, awareness, backups. This delivers the greatest risk reduction for the least money.
  2. Distribute evenly. People, tools, training, testing. No category may be zero.
  3. Make it measurable. Link every investment to a risk, and report quarterly on progress.

Remember: The question is not "can we afford this?" The question is "can we afford not to do this?" The numbers speak for themselves.

Do this this month

A budget is only effective if you know what to do with it when things go wrong. In the next chapter, Incident Response and Crisis Management, you will read how to prepare your organisation for the inevitable moment that a security incident occurs – and how to limit the damage.

Op de hoogte blijven?

Ontvang maandelijks cybersecurity-inzichten in je inbox.

← Executives & Governance ← Home