{"id":295,"date":"2025-11-24T02:53:06","date_gmt":"2025-11-24T02:53:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/?p=295"},"modified":"2025-11-24T02:53:06","modified_gmt":"2025-11-24T02:53:06","slug":"balancing-training-and-technology-under-a-tight-cyber-budget","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/2025\/11\/24\/balancing-training-and-technology-under-a-tight-cyber-budget\/","title":{"rendered":"Balancing Training and Technology Under a Tight Cyber Budget"},"content":{"rendered":"\n<p>Balancing Training and Technology Under a Tight Cyber Budget: A CISO\u2019s Plan<br>I will provide a simple, repeatable framework for how I would decide what to fund.<br>First, use a threat-led, risk-based approach to map the most likely incidents<br>(phishing\/BEC, ransomware, lost devices, privilege misuse, cloud misconfig) to specific<br>controls.<br>Second, apply defense-in-depth principles, not redundancy. Each dollar should address a<br>unique vulnerability at different stages of the lifecycle (prevent \u2192 detect \u2192 respond \u2192<br>recover).<br>Third, fund tools and training in tandem. Tools will fail without well-trained staff; staff<br>will fail to follow best practices without sufficient guardrails.<br>Fourth, fund based on fast metrics. Spend money where there are clear measures of<br>performance (e.g., blocked phish rates, MFA coverage, patch SLAs, MTTR) in 1 \u2013 2<br>quarters.<br>Now I will describe my initial funding priorities (quarter-by-quarter).<br>Q1: Protect the front door.<br>Implement multi-factor authentication (MFA) for all users and phishing-resistant MFA<br>methods for administrators.<br>Tune your email security for your most common threats; implement<br>DMARC\/DKIM\/SPF.<br>Install Endpoint Detection and Response (EDR)\/Extended Detection and Response<br>(XDR) on all endpoints; test your backups.<br>Launch a new role-based training program and run a phishing simulation as part of your<br>baseline testing.<br>Q2: Reduce blast radius and build muscle.<br>Implement Privileged Access Management (PAM) for administrator accounts; centralize<br>your Security Information and Event Management (SIEM); conduct an Incident Response<br>(IR) tabletop exercise.<br>Create micro-training sessions for high-risk teams.<br>Q3: Secure and automate.<br>Create baselines for your endpoints and servers; create automated patching processes.<br>Automate playbooks; focus on Third-Party Risk.<br>Q4: Validate and refine.<br>Conduct penetration testing (pentesting) on critical systems; review your metrics; prepare<br>your spending cycle for next year.<br>Cost Discipline and Trade-off Logic<br>Prioritize reducing vendor sprawl: Use a platform or tool that covers multiple adjacent<br>functions if it meets quality standards.<br>Secure default by policy: Mandate MFA, disk encryption, and baseline hardening to<br>reduce the training burden on your team.<br>Buy outcomes, not features: Define measurable outcomes for every dollar you spend.<br>Invest in areas where humans interact with risk: Provide additional training for teams<br>such as Finance, Developers, IT, and Executive teams.<br>How I will measure success<br>Prevention:<br>Achieve MFA coverage of 98% or better<br>Have EDR installed on 95% or more of your endpoints<br>Have implemented DMARC p=reject<br>Restore successfully from backup at least once per quarter<br>People:<br>Phish click rate lower than industry average<br>Report rate greater than 30%<br>Time-to-report \u226410 minutes<br>Detection\/Response:<br>MTTD \u22641 day<br>MTTR \u22644 hours<br>\u226570% automated response coverage<br>Governance:<br>\u226590% compliance with hardening policies<br>Patch SLOs achieved<br>All third-party findings addressed within 30 days<br>Conclusion<br>The best way to allocate limited dollars is to invest in a small number of highly effective<br>controls that shut the largest doors (identity, email, endpoints, backups) and deliver rolebased training that changes human behavior. Pair this with detection\/response readiness<br>and governance and we will significantly decrease the likelihood and impact of humanenabled cyber threats\u2014while avoiding the cost of shelfware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Balancing Training and Technology Under a Tight Cyber Budget: A CISO\u2019s PlanI will provide a simple, repeatable framework for how I would decide what to fund.First, use a threat-led, risk-based approach to map the most likely incidents(phishing\/BEC, ransomware, lost devices, privilege misuse, cloud misconfig) to specificcontrols.Second, apply defense-in-depth principles, not redundancy. Each dollar should address&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/2025\/11\/24\/balancing-training-and-technology-under-a-tight-cyber-budget\/\">Read More<\/a><\/div>\n","protected":false},"author":31499,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/users\/31499"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}