What steps can the finance team take to measure the ROI of cybersecurity investments and demonstrate their value to IT or the CISO? How collaborative is the process between teams?

561 views2 Upvotes2 Comments
Sort By:
Oldest
Senior Financial Analysta year ago
There are certain items that are "network expenditures" (not be confused with computer networking, i.e. LAN, etc. Network expenditures in this case refers to items that only have value when they're used with something else. For example, if we get rid of all cybersecurity then you wouldn't be able to use a credit card online but it would also be wrong to ascribe all the value of items sold online to cybersecurity.

Even for something like breaches etc. it can be a problem. Using an average figure can be misleading since the average can include firms that are much larger/smaller than you. It you're a small shop selling $250K online then saying that the cost of an average breach is $500K doesn't make sense.

Depending on which jurisdiction(s) you fall under you may be obligate to disclose breaches or not. One common technique is to use a variety of KPIs and make sure that they align with the overall corporate strategy. Personally though, I think that if you want to show value you should have an audit done and this should include a penetration test. The goal of this would be show where the weaknesses are in the system and what sort of data someone might be able to compromise. In general its very hard to justify spending $200K to upgrade your credit card processing server, but if you can show that there might be a weakness and that if the server is compromised the firm will face $1M in liability and a loss of reputation then things can change. If you're lucky then the red team might find weaknesses that you were not aware of and help you remediate them before someone exploits them. Trying to get buy-in to do an audit with red-team might be a challenge but if you position it as way to test your security and people to make sure that things are working as intended, hopefully you can make the case well enough and leadership can see the case well enough to move ahead. If you need help you can also show the number of times per day/hour that someone is probing your network/website that you've caught/blocked.

Good luck, let me know if you need anything else.
2
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
CFOa year ago
Create and invest in partnerships with relevant stakeholders such as the technology department, the executive team and the board. Externally, build the same strong relationships with banks, insurance broker and security vendors. Have that short-list of phone numbers you will call should anything happen. 
Ideally all attacks can be averted in time and no financial, brand or other damages done. The ROI than becomes a measure of comfort for the organization as a whole. 
Cyberattacks, whether financially significant or not, are disruptive to the business, nonetheless. Investing in cybersecurity and raising the awareness thus becomes crucially important for the organization and all of its stakeholders.
2

Content you might like

Cost of RPA products27%

Lack of developers who can code RPA applications44%

Amount of customization needed to automate business processes24%

Lack of RPA code maintenance resources4%

View Results
11.7k views5 Upvotes8 Comments
162 views
Chief Accounting Officer in Software21 days ago
rebuilding after a large divestiture and take private transaction a few years back
807 views1 Comment

Yes34%

Yes, but only if your business is a certain size25%

No40%

View Results
838 views3 Upvotes3 Comments
VP Talent, Learning & Organisational Development in Manufacturinga month ago
In my previous role I managed outsourced payroll, my KPI's towards the payroll vendor were: 

these were all critical service levels to make sure that payroll would be compliant for internal financial reporting purposes ...read more
1 3 Replies
1.5k views1 Upvote4 Comments