Understanding the Economics of Cyber Defense

Knowing when, where, and how much to invest in cyber defense is a challenge. This tool was created by Juniper Networks and interprets some of the principles of a framework, developed by The RAND Corporation, which aims to provide a new way to think about the various levers organizations should consider across the major areas that they can control in order to reduce the potential costs associated with cybersecurity. The RAND model analyzes a vast array of variables that impact the return on managing risk to investment, in a way that suggests how an organization might balance the four major spend areas: tools, workforce training, BYOD and IoT policy, and network isolation techniques.

Let’s get started.

1

How many people work at your company/enterprise?

2

The following questions will help us determine the value of your enterprise’s information:

No
Yes
No
Yes
No
Yes
No
Yes
3

Help us understand the diligence of your security organization.

$
.00
4

Help us understand how accessible your enterprise’s information is inside and outside of your organization. Would you consider the critical information (e.g. customer records, financial records) within your organization to be:

Results

The percentages below represent possible investment levels for your organization in each of these four areas as a percentage of your overall revenue, by the year 2025. Because these are percentages of your annual revenue, the sum of them will not add up to 100%.

It is plausible that your results may produce some or all zeroes. If this is true for your results, it indicates that baseline efforts are sufficient for the dynamics of your organization.

Training: Increased training for employees may reduce the risk of incidents and breaches.
0%
Tools: Security-related tools and technology can help prevent an attacker from gaining access to your network.
0%
BYOD Policies and IoT: Restricting device connection policies and increasing access control can help reduce risk.
0%
Air-gapping: Network isolation (air-gapping) can go a long way from preventing a network compromise.
0%

Email my results

Success
Juniper Networks protects your personal data in accordance with our Privacy Policy.