Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Big Microsoft 365 price increases coming next year

      Big Microsoft price increases coming next year

      5 December 2025
      Vodacom to take control of Safaricom in R36-billion deal - Shameel Joosub

      Vodacom to take control of Safaricom in R36-billion deal

      4 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      BYD takes direct aim at Toyota with launch of sub-R500 000 Sealion 5 PHEV

      BYD takes direct aim at Toyota with launch of sub-R500 000 Sealion 5 PHEV

      4 December 2025
      'Get it now': Takealot in new instant deliveries pilot

      ‘Get it now’: Takealot in new instant deliveries pilot

      4 December 2025
    • World
      Amazon and Google launch multi-cloud service for faster connectivity

      Amazon and Google launch multi-cloud service for faster connectivity

      1 December 2025
      Google makes final court plea to stop US breakup

      Google makes final court plea to stop US breakup

      21 November 2025
      Bezos unveils monster rocket: New Glenn 9x4 set to dwarf Saturn V

      Bezos unveils monster rocket: New Glenn 9×4 set to dwarf Saturn V

      21 November 2025
      Tech shares turbocharged by Nvidia's stellar earnings

      Tech shares turbocharged by stellar Nvidia earnings

      20 November 2025
      Config file blamed for Cloudflare meltdown that disrupted the web

      Config file blamed for Cloudflare meltdown that disrupted the web

      19 November 2025
    • In-depth
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
      Valve's Linux console takes aim at Microsoft's gaming empire

      Valve’s Linux console takes aim at Microsoft’s gaming empire

      13 November 2025
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
      Why smart glasses keep failing - no, it's not the tech - Mark Zuckerberg

      Why smart glasses keep failing – it’s not the tech

      19 October 2025
      BYD to blanket South Africa with megawatt-scale EV charging network - Stella Li

      BYD to blanket South Africa with megawatt-scale EV charging network

      16 October 2025
    • TCS
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
      TCS | Why Altron is building an AI factory - Bongani Andy Mabaso

      TCS | Why Altron is building an AI factory in Johannesburg

      28 October 2025
    • Opinion
      Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
      It's time for a new approach to government IT spend in South Africa - Richard Firth

      It’s time for a new approach to government IT spend in South Africa

      19 November 2025
      How South Africa's broken Rica system fuels murder and mayhem - Farhad Khan

      How South Africa’s broken Rica system fuels murder and mayhem

      10 November 2025
      South Africa's AI data centre boom risks overloading a fragile grid - Paul Colmer

      South Africa’s AI data centre boom risks overloading a fragile grid

      30 October 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Quantifying cyber efforts will help CISOs secure board support: Forrester

    Quantifying cyber efforts will help CISOs secure board support: Forrester

    By Forrester16 March 2022
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Even as cybersecurity ascends the list of board-level concerns, directors are already dealing with what Forrester describes as “a chronic case of cyber fatigue”. In a new report, “Transform Cyber Risk Management with Cyber Risk Quantification” (CRQ), the company looks at practical actions for those hoping to tap into the quantifiable certainty offered by CRQ.

    Years of increasing spending without quantifiable results have soured board members on the topic. Chief information security officers (CISOs) are now turning to the emerging CRQ technologies to quantify cyber risk for the board,” says Forrester in the report, which examines how board cyber fatigue requires a fundamental rethink and revolution in cyber-risk management.

    In 2021, boards of directors were consumed with cyber resilience and ransomware preparedness. According to the “Forrester Infographic: Global Security Budgets in 2022”, security accounted for 34% of the average IT budget in 2021, continuing the upward trajectory, evidenced by a 16% compounded annual growth rate (CAGR) of security budget increase since 2018.

    However, Forrester believes that while detection and response as well as increased cloud adoption will dominate 2022 budgets, security leaders can expect greater examination of spending, along with demands for mature business cases from board members.

    Investment in preventative cybersecurity is difficult to qualify

    For years, boards have asked CISOs to quantify their efforts to determine if they have adequately invested in security to meet tolerance for financial loss experienced due to a cyber risk.

    However, Forrester points out that the traditional methods of ordinal scoring mechanisms and 5×5 heatmaps can be subjective. What’s more, executives tend to view security efforts as a cost centre, which McKay and his colleagues note can lead to the following problems:

    • In the absence of a common risk language, CISOs revert to heatmaps which rely on qualitative descriptions.
    • Qualitative risk analysis lacks the business context boards are used to.
    • CISOs see their role as protecting organisational data, rather than seeing their efforts as protecting the ability of the company to generate revenue.

    Forrester says CRQ can be viewed as a “Rosetta Stone” for translating security outcomes into more relevant financial terms, defining CRQ as:

    Tools that utilise mathematical modelling techniques to render the business impact of cyber risk in financial terms. Cyber-risk quantification models combine financial loss data with cyber-threat event data to provide a financial estimate of loss based on historical data. Organisations use cyber-risk quantification to make risk transfer decisions and cybersecurity alignment with business priorities more efficient.

    Common language aligns CISO and board conversations

    Forrester points out that by introducing a common taxonomy, security professionals are better equipped to contribute to the business conversation. By translating the cyber-risk impact into financial terms, CISOs can identify the biggest risks based on what has the biggest potential financial impacts.

    CRQ is also able to help leaders make better decisions around digital strategies. The ability to more accurately quantify the financial impact of security efforts in financial terms enables business leadership to better determine the optimum investment levels and priorities.

    CISOs are painfully aware that not every threat can be acted on. CRQ allows security professionals to prioritise risk treatment and remediation, targeting their risk mitigation strategies on the most significant risks and those that will have the biggest consequences on the organisation.

    The insight delivered by CRQ also helps business leaders calibrate their insurance coverage and pricing levels, which has become increasingly important as coverage limits continue to shrink.

    Despite its many advantages, Forrester says many of the CISOs interviewed admitted that implementing CRQ posed challenges, especially if attempting to do so on their own and without the right level of expertise, data, and executive buy-in.

    To help, Forrester has compiled some helpful tips to getting started.

    Four steps to start your CRQ journey

    1. While many organisations make use of the FAIR Institute’s methodology, Forrester encourages CISOs to investigate other approaches to see which methodology best fits their requirements. These include the Information Security Forum’s (ISF’s) Quantitative Information Risk Assessment (QIRA) approach, as well as the X-Analytics, a patented approach developed by Secure Systems Innovation Corporation (SSIC).
    2. Establishing a common risk taxonomy in your organisation can help security professionals better engage with their counterparts. It also keeps all stakeholders aligned when it comes to goals, priorities, outcomes, and threats, making it easier to execute on strategic objectives.
    3. Don’t neglect the collection and documentation of historical data. Organisations will require historical data on previous events to help them identify and model future scenarios. Examining the past can also help shed light on the costs of past and future events.
    4. Start small and deliver a successful pilot. Once stakeholders see the improved decision-making quality in a defined decision outcome, they are more likely to give CRQ the support it deserves and get behind a bigger roll-out.

    Forrester ends its report by reassuring CISOs that in the next five years it expects to see significant improvements in CRQ software, which it says will further aid in the collection and integration of data and boost adoption of CRQ technologies.

    For the past decade, Forrester has been tracking and delivering deep insights into how B2B and B2C consumers interact with technology, how their behaviours and expectations evolve, and how companies should respond. For more information on how to transform cyber risk management, contact Joan Osterloh, Forrester’s authorised research partner for South and East Africa.

    • This promoted content was paid for by the party concerned


    Forrester ImproveIT Joan Osterloh
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous Article7 simple hacks for smarter document workflow
    Next Article MediaTek unveils Dimensity 700 and 1200 chips for African consumers

    Related Posts

    It’s time the banks did something about legacy IT

    15 August 2024
    CallMiner earns top scores for conversation intelligence

    CallMiner named only leader in Conversation Intelligence for Customer Service

    24 August 2023
    Forrester AI CX

    Forrester: generative AI set to transform CX

    2 August 2023
    Add A Comment

    Comments are closed.

    Company News
    AI is not a technology problem - iqbusiness

    AI is not a technology problem – iqbusiness

    5 December 2025
    Telcos are sitting on a data gold mine - but few know what do with it - Phillip du Plessis

    Telcos are sitting on a data gold mine – but few know what do with it

    4 December 2025
    Unlock smarter computing with your surface Copilot+ PC

    Unlock smarter computing with your Surface Copilot+ PC

    4 December 2025
    Opinion
    Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

    Your data, your hardware: the DIY AI revolution is coming

    20 November 2025
    Zero Carbon Charge founder Joubert Roux

    The energy revolution South Africa can’t afford to miss

    20 November 2025
    It's time for a new approach to government IT spend in South Africa - Richard Firth

    It’s time for a new approach to government IT spend in South Africa

    19 November 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Big Microsoft 365 price increases coming next year

    Big Microsoft price increases coming next year

    5 December 2025
    AI is not a technology problem - iqbusiness

    AI is not a technology problem – iqbusiness

    5 December 2025
    Vodacom to take control of Safaricom in R36-billion deal - Shameel Joosub

    Vodacom to take control of Safaricom in R36-billion deal

    4 December 2025
    Black Friday goes digital in South Africa as online spending surges to record high

    Black Friday goes digital in South Africa as online spending surges to record high

    4 December 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}