Gartner Research

A Roadmap for Security Portfolio Prioritization: Adding Rigor to Security Investment Decisions

Published: 15 July 2018

ID: G00346030

Analyst(s): Information Risk Research Team

Summary

Digitization increases the strain on Security, so CISOs must do a better job of deciding what projects are prioritized. This research helps CISOs define portfolio objectives, triage resources, and more effectively communicate prioritization decisions to stakeholders. Using this guidance, CISOs can make better portfolio prioritization decisions.

Table Of Contents

Definitions

Occasion

Why CISOs Need a More Rigorous Approach to Portfolio Prioritization

Achieving a More Rigorous Approach to Security Portfolio Prioritization

1. Defining Portfolio Objectives

A. Invest disproportionately in projects that enable core business capabilities.

2. Triaging Projects

a. Use a lightweight assessment to fast-track projects with clear business impact.

b. Use a more rigorous secondary assessment for medium-impact projects.

3. Communicating Portfolio Decisions

A. Contextualize portfolio decisions within a common narrative of business enablement.

B. Allow stakeholders to fine-tune security resources to ensure continuous business alignment.

Conclusion

Recommended by the Authors

About this Research

Presentation Slides

©2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client