In “10 Things That WON”T Happen in 2009”, David Kelleher argues that organizations will adopt a “Do more with less” approach to controlling IT security costs. While optimizing existing processes and resources can lead to short-term gains, doing so blindly may lead to long-term problems throughout the organization. Security spending strategies must support the core-competencies of the business and the needs of the customers that drive the bottom line.The shift toward business-enabling security spending was highlighted by Forrester Research. They noted that small to medium-sized business will shift their focus from protecting against computer security threats to protecting their critical data. Their analysis also noted a movement towards managed security services. More importantly, the article showed that while businesses have yet to accept security as a business-enabler, they do recognize it as a business issue.Before we can highlight the business case for security, we must understand the organization that will pay for those investments. In “Considerations and Foundations for Assuring Software Security: Business Case Models for Rational Action”, Don O’Neill notes that “cost is a function of perceived value.” An organization, he argues, will gain a competitive advantage from security investments only if its customers value security enough to pay for it. Thus, an organization must communicate its security strategy as a value-add for the customer.How can InfoSec professionals influence their company’s brand image? They must first understand how security is perceived in relation to the business plan. They must then begin to market strategic IT security investments that enhance its competitive edge. Mr. O’Neill offers basic questions must be brought before the Board. To what extent does the organization include its global supply chain management operation in its software security assurance operations? To what extent are the management staff and technical staff trained in their software assurance management responsibilities? To what extent is the organization legal staff trained in software security assurance? To what extent are organization executive and senior management trained in their software assurance management responsibilities? To what extent are the members of the board of directors informed of their software security assurance oversight responsibilities? As mentioned in the first part of this series, the value proposition of security must be championed by professionals who can communicate how those investments enable the business. Related content opinion Positioning the Security Team Through Influence Part 1 Influence styles are a reflection of the influencers and, by extension, their team. Thus, they must understand the situations to which different styles are applicable. This series explores the common influence styles and their application. By Steven Fox Apr 21, 2012 3 mins Technology Industry IT Jobs opinion From Obstacle to Ally - Repositioning the Security Team Pt 1 By Steven Fox Apr 08, 2012 3 mins Technology Industry IT Strategy opinion Key Sessions at CISO Executive Summit 2011 By Steven Fox Dec 03, 2011 3 mins Business Continuity Data and Information Security Careers opinion Securing User Credentials On Mobile Devices By Steven Fox Nov 15, 2011 4 mins Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe