EconLearnerEconLearner
  • Business Insight
    • Data Analytics
    • Entrepreneurship
    • Personal Finance
    • Innovation
    • Marketing
    • Operations
    • Organizations
    • Strategy
  • Leadership & Careers
    • Careers
    • Leadership
    • Social Impact
  • Policy & The Economy
    • Economics
    • Healthcare
    • Policy
    • Politics & Elections
  • Podcast & More
    • Podcasts
    • E-Books
    • Newsletter
What's Hot

3 financial literacy tips #shorts

January 31, 2026

Dave Ramsey Only Has 3 Investments

January 30, 2026

Trump’s civil service reforms are a necessary fix

January 30, 2026
Facebook X (Twitter) Instagram
EconLearnerEconLearner
  • Business Insight
    • Data Analytics
    • Entrepreneurship
    • Personal Finance
    • Innovation
    • Marketing
    • Operations
    • Organizations
    • Strategy
  • Leadership & Careers
    • Careers
    • Leadership
    • Social Impact
  • Policy & The Economy
    • Economics
    • Healthcare
    • Policy
    • Politics & Elections
  • Podcast & More
    • Podcasts
    • E-Books
    • Newsletter
EconLearnerEconLearner
Home » How CISOs can cut through board-level budget discussions
Innovation

How CISOs can cut through board-level budget discussions

EconLearnerBy EconLearnerNovember 12, 20241 Comment6 Mins Read
How Cisos Can Cut Through Board Level Budget Discussions
Share
Facebook Twitter LinkedIn Pinterest Email

Art Gilliland, CEO at Delinea.

getty

It’s that time of year again—summer vacations are a memory, fall routines are settling in, and companies of all sizes and industries are forecasting their next fiscal budgets.

For chief information security officers (CISOs), many of whom now report directly to their boards, this season brings the challenge of balancing evolving business priorities with increasingly complex cybersecurity ecosystems.

Navigating these board-level discussions and asking for additional funding isn’t always easy, but with the stakes higher than ever, it’s critical to make a compelling case for deeper investment—particularly in identity and access management (IAM). . It’s about demonstrating how these investments drive business growth, protect operations and ensure regulatory compliance.

The good news is that security spending is generally on the rise. According to Gartner, global spending on information security is expected to reach $212 billion in 2025a 15% increase from this year. This mirrors information from Forrester’s Budget Planning Guide for Security and Risk Managers where nine out of 10 CISOs expect their budgets to increase in 2025, but that optimism is tempered by the fact that only one in 10 expect to see budget increases of more than 10%.

Undoubtedly, in this age of artificial intelligence, a proliferation of vendors, tools, and platforms that promise cyber salvation, rather than creating operational silos, unexpected costs, and heightened exposure. This is on top of a regulatory maze that spans industries and borders, affecting the investments companies make in their cyber posture.

Despite the growing scale and complexity of businesses’ digital footprints, it’s clear that it will take more than a polite request for CISOs to justify increased solutions and spend in their FY2025 IT budgets.

As CISOs prepare for upcoming boardroom discussions, here are three strategies to help them demonstrate that deeper investments in security solutions like IAM not only mitigate threats but also strengthen IT integrity and drive business growth.

Position security as a business enabler.

Security as the linchpin to business enablement isn’t just a happy tune sung by CISOs to hopefully win more incremental budgets, it’s a fact.

Security automation and most fluid controls help companies put the corporate pedal to the metal on their digital transformation journeys. Take this simple analogy: Brakes are a control on a vehicle. without them, you can’t dive fast. Businesses should approach security the same way. Comprehensive and appropriate security controls allow businesses to move with greater speed and confidence.

In addition, try to place customers as a catalyst for security investments. Many customers are strongly focused on supply chain risks, which has led them to scrutinize the security postures of their partner and supplier ecosystems. Beyond general compliance certifications—such as SOC2, ISO, NIST, and FedRamp—customers often have specific regulatory requirements tied to their industry or region, which may include stricter data privacy measures, encryption standards, or unique audit protocols .

CISOs should leverage these very real customer concerns and demands to justify security investments that meet regulatory requirements as well as unique customer standards.

It is critical for CISOs to demonstrate to boards that security controls accelerate digital transformation and are the engine that powers the rest of the IT apparatus. If boards are skeptical, don’t be afraid to lean on your customers and point to the ever-growing network of standards and policies that, if not met, could lead to disruption or even loss of business.

Use attacks to go on the attack.

Cyber ​​threats are advancing at the same pace as the innovations developed to combat them. This means that whether you are a Fortune 100 company or a mid-sized company, a major attack on your IT infrastructure is a matter of when, not if. As counterintuitive as it may seem, security leaders should strengthen through breaches.

Following major cyber incidents or regulatory pressures, it is common for boards and executive leadership to pour significant dollars and resources into strengthening their cyber postures. But the faucet is only open for so long. As time passes, the urgency subsides, and the digital dust settles, this flow often dribbling as budget is redirected to other IT initiatives.

CISOs must take advantage of these windows of increased awareness and appetite to ask boards for deeper investments in security and compliance solutions that not only cover the cracks in their IT environments today, but to prevent future cracks in the months and years to come. .

Carry insurance as an adjustment against risk.

Almost every jurisdiction has some framework or legislation regarding information security and privacy and data protection: HIPAA, GDPR, PCI DSS, and a host of others that criss-cross government buildings, capitols, and bureaucratic buildings around the world.

For businesses that cross industries and borders, this complex web of regulations is enough to make any CISO wake up in a cold sweat screaming, “Compliance!”.

While it’s true that the increased cost and complexity of this regulatory network—and the severe penalties that accompany a failed audit—is a headache for any security leader, a major breach is a migraine. According to IBM’s annual data breach report, the global average cost this year is $4.88 millionup 10% from last year and the highest total ever. Not to mention the serious impact this downtime can have on ongoing business continuity, customer confidence and reputational damage.

CISOs need to convey to boards that proper cyber hygiene and strong controls—particularly around IAM—are critical to regulatory health and audit management. Furthermore, proof of these security investments is now the table stakes for companies to be eligible for cyber insurance. In fact, according to my company’s recent report, 35% of decision makers Reported compliance/regulatory requirements were the top reason for applying for cyber insurance—higher than any other motivation.

Conclusion

CISOs face a persistent challenge to balance long-term business needs with dynamic security risks, often without significant increases in spending.

By showing boards how investments in security, especially IAM, can enable digital transformation, IT integrity, and manage risk for the regulatory cycle, they may finally find a few more dollars in those coffers.


Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Am I eligible?


boardlevel budget CISOs cut discussions
nguyenthomas2708
EconLearner
  • Website

Related Posts

Netflix’s Murder Mystery is a major disappointment

January 29, 2026

The release date of the actual iPhone update is now coming into focus

January 29, 2026

4 ways to start seeing your worth in relationships, from a psychologist

January 28, 2026

Chrome and Safari Warning—If you see this, you will be hacked

January 28, 2026
View 1 Comment

1 Comment

  1. temp mail
    temp mail on November 12, 2024 1:46 pm

    “I can’t express how valuable this post is! The level of detail and thoughtful explanations demonstrate your mastery of the subject. Truly a goldmine of information.”

    Reply

Leave A Reply Cancel Reply

Personal Finance

How to Replace a 6-Figure Job You Hate With a Life That You Love

February 10, 2024

How To Build An Investment Portfolio For Retirement

February 10, 2024

What you thought you knew is hurting your money

December 6, 2023

What qualifies as an eligible HSA expense?

December 6, 2023
Latest Posts

3 financial literacy tips #shorts

January 31, 2026

Dave Ramsey Only Has 3 Investments

January 30, 2026

Trump’s civil service reforms are a necessary fix

January 30, 2026

Subscribe to Updates

Stay in the loop and never miss a beat!

At EconLearner, we're dedicated to equipping high school students with the fundamental knowledge they need to understand the intricacies of the economy, finance, and business. Our platform serves as a comprehensive resource, offering insightful articles, valuable content, and engaging podcasts aimed at demystifying the complex world of finance.

Facebook X (Twitter) Instagram Pinterest YouTube
Quick Links
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Main Categories
  • Business Insight
  • Leadership & Careers
  • Policy & The Economy
  • Podcast & More

Subscribe to Updates

Stay in the loop and never miss a beat!

© 2026 EconLeaners. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.