Healthcare Cybersecurity Spend Rises: 4 Steps to a Wisely Spent Budget

By Eric Noonan • February 29, 2016

Predictably cyber/data security continues to be a rising concern from within the Healthcare industry, according to Modern Healthcare’s 26th annual Survey of Executive Opinions on Key Information Technology Issues. That being said the percentage of total IT spend devoted to security is still woefully inadequate if the survey numbers are to be believed. You simply can’t be secure on the spend levels highlighted in this survey.

I’m always skeptical of survey numbers because you can’t qualify the data or responses and there is no right answer as to how much to spend on security. However, there are best practices and industry standards that will ensure your organization is spending the money you have wisely.

4 Steps to Ensure a Wisely Spent Cybersecurity Budget

1: Make Security a Line Item in the Budget, Separate from IT

There is no right metric for security spend but you should at least be able to articulate what you are spending annually. With a defined security budget you can slice and dice any way you want, as a percentage of IT spend, cost per employee, as a percentage of revenue, etc.

2: Select a Framework

NIST, ISO, 20 CSC, just pick one! Whatever you select will give you a way to measure your current capabilities and prioritize investments, you can always change your mind later.

3: Assess Yourself

If you don’t take the time to objectively measure what you are doing today against a selected framework you will be doomed to keep doing the same things year over year. Maybe that works for some organizations, but my experience is that a comprehensive assessment against an accepted framework can serve as the burning platform for year over year improvement.

4: Roadmap the Journey

Use your assessment results to create a multi-year roadmap that ties security compliance efforts to operational efforts and tell the story to your business. Share the vision for security and articulate just how much the business is getting for its investment in security so you can have a conversation around outcomes and expectations rather than fear, uncertainty, and doubt (FUD).
Articulating the value of security and defending the budget is hard, but it’s not impossible if you use facts and figures relevant to your business and organization.

Don’t Know Where To Start?

CyberSheath’s Strategic Security Planning service offering can help you plan, build, and manage a strategic information security organization that enables your business. Our operational strategy and budgeting plans aggressively drive security organizations towards pursuing higher levels of performance.  Our Strategic Security Planning service will assist you in successfully creating a security budget that directly aligns with your business needs and goals.

CyberSheath Blog

Dr. Robert Spalding to Address Nation-State Attacks at CMMC Con 2021

Since the inaugural CMMC Con, we’ve seen some of the most malicious attacks on American infrastructure ever executed. The SolarWinds attack reverberated across the entire government as agencies scrambled to discover what nation-state attackers had accessed and stolen. The Colonial Pipeline, shut down by a ransomware attack, led to fuel…

CMMC-AB vice chair Jeff Dalton to address CMMC Con 2021

The swiftness and severity of recent cyber attacks has dominated headlines and revealed that many organizations still don’t quite know what to do to protect themselves, as well as the businesses and government entities they’re connected to.   Ransomware attacks were a big point of discussion at the recent G7…

CMMC Con 2021 Opens Registration, Reveals Theme and Speakers

CMMC compliance stands in the way of revenue for every defense contractor in the supply chain. Now that CMMC is a reality for the Defense Industrial Base (DIB), learn how contractors — primes and subs, large and small, foreign-owned — are handling the standards and requirements, as well as the…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Microsoft