Gartner Exec: ‘There’s No Such Thing As Perfect’ Cybersecurity

Presenting metrics and knowing the level of tolerance leadership has for a cyberattack are important parts of the conversation.

Paul Furtado, Vice President, Analyst, Midsize Enterprise Security, Gartner

“There’s no such thing as perfect protection,” said Paul Furtado, Gartner’s vice president, analyst, midsize enterprise security, during the 2024 Midsize Enterprise Summit in Tampa, Fla.

Furtado delivered a presentation on how IT leaders can negotiate cybersecurity budgets and strengthen their company’s security posture using outcome-driven metrics.

“If you want strong protection, it’s not going to be cheap, you’re going to have to pay for it. If you’re worried about the bottom line and it’s strictly a cost decision, understand that you’re going to accept more risk,” he told the attendees during his presentation.

“The reality is that we need to build a balance here between what we do from a risk perspective and that cost perspective, that’s the conundrum we have to deal with.”

Businesses are heavily investing in cybersecurity. However, Furtado said that it is possible to “overinvest in security.”

“It gets to the point where you’ve got a diminishing return. Our executives are going to be a lot more risk-tolerant than we are as practitioners. We have to find this mechanism, a way to have a discussion with them where they can make a risk acceptance decision either formally through risk registers or informally by how they choose to fund the program.”

Furtado then outlined how IT leaders can negotiate their security budgets with their executive leadership and stressed the importance of making a persuasive case for defending security budgets using metrics.

Defending Security Budgets

Furtado offered this advice to IT executives:

A better approach, he advised, is to ask leadership, are we willing to defend our security program by saying we’re OK with accepting the risk of being vulnerable to an attack for 15 days longer than our peers in the industry? Ask what is the tolerance level for a cyberattack?

In closing, Furtado offered some additional advice:

Start looking at containment time and remediation time. The single biggest thing you can do from a security perspective is detect and contain.

Stop talking about shadow IT because shadow IT doesn't exist anymore, it’s just the way business happens now.

A successful ransomware attack is the failure of multiple things in your security stack.

Look at how you present your metrics and have a business continuity plan, part of this plan is knowing the business impact analysis.

Furtado advised making security a business conversation.

“Defend your [security] budget ... create defensibility with your key stakeholders regardless of who they are. [Stakeholders] need to be aligned with the outcomes and the benefits of treating security as a business decision because if you go in talking SIEM and EDR and all the alphabet acronyms it’s not going to resonate [with leadership]," he said.