How much should a company invest in cybersecurity?
Momentum: Cybersecurity in Organizations
Every day we read about cyberattacks in the media. We are aware that cyberattacks are among the greatest risks for our own company as well. At the same time, we tend to approach terms such as ransomware, phishing, data theft, or sabotage rather cautiously. Companies must weigh the risks: financial damage, reputational damage, supply chain reliability, and compliance requirements, against investing in preventive security measures.
This often leads to discussions: costs are measurable, but avoided incidents are not – at least until a security incident actually occurs. The key question is how companies can define a sensible investment framework for cybersecurity, which measures deliver the greatest impact, and how effort and effectiveness can be assessed in a practical way.
Between compliance requirements and risk management
Make Investment Decisions in a Structured Way
The appropriate investment framework is derived from a risk-based assessment rather than from technical wish lists or fear of negative headlines. A multi-stage approach has proven effective:
Make Intuition Visible
Cyber resilience is often not exclusively an IT issue. Instead, management must be involved. The following questions should be answered first:
- «What are we actually afraid of?»
- «What must absolutely not fail?»
- «What would be ‘uncomfortable’ or even existentially threatening?»
Determine Protection Needs
From these answers, it is necessary to derive what needs to be protected. People often think primarily of IT systems and technical components. However, this also includes critical business processes and sensitive data such as customer data, intellectual property, patents, or production data.
The level of protection required depends on the potential impact of a failure in terms of cost, legal consequences, supply chain reliability, and reputation. Areas of influence include customers, employees, partners, as well as the public and regulatory authorities.
Analyze Threats and Vulnerabilities
Based on the protection needs, threats and vulnerabilities are then analyzed. Questions such as:
- «What realistic, business-relevant attack scenarios exist?»
- «Where are known vulnerabilities present (technical, organizational, process-related, supply chain-related, or human factors)?»
help guide this process. In many cases, simplified risk assessments are sufficient to become operationally capable. It is not necessary to run a full ISO/IEC 27001 project to start taking effective action.
Quantify Expected Damages
Once threats and vulnerabilities are known, the next step is to quantify the expected damage. The goal is to determine the potential financial impact if a specific scenario occurs. A realistic assessment of how frequently an event might occur is also important.
The combination of the damage magnitude and the probability of occurrence results in an expected annual loss, which serves as an orientation value for prioritization and investment decisions.
Align Investments with Risk Reduction Potential
Finally, security measures are prioritized to ensure that risks can be demonstrably reduced and that a favourable cost-benefit ratio is achieved. In addition, measures should address regulatory or business-critical requirements and be feasible in the short to medium term.
The investment framework is therefore not derived from a fixed amount but from an economic trade-off between risk exposure and achievable risk reduction.
Focus on «Low-hanging Fruits»
A common mistake is to start with complex or expensive solutions while fundamental security measures are missing. Experience shows that the following areas deliver the highest impact per invested unit of currency:
Awareness and Employee Training
A large proportion of successful attacks start with human error. Regular, practice-oriented training on phishing, password security and secure working practices significantly reduces risk at relatively low cost.
Time Expenditure per Employee vs. Risk:
- A single successful cyberattack can result in weeks of downtime and substantial damage. Well-trained employees therefore significantly reduce risk.
- 10 minutes per week for cybersecurity training equals about 8 hours per year.
Conclusion: A manageable investment of time can significantly reduce the attack surface and limit consequential costs.
Basic Hygiene in IT
Visibility and Proactive Monitoring
Effective protection requires knowledge. Appropriate and targeted monitoring of systems, logs, and access activities in a central location enables early detection of attacks, faster response, and therefore limits the spread of damage.
Emergency and Incident Response Planning
It is not complete prevention, but rather the professional handling of security incidents that determines the actual costs. Clear responsibilities, regular testing (crisis exercises), communication plans, and decision-making processes are essential.


