IT Budgeting & Costs

How do I build a business case for IT security spending?

How to justify IT security investments to leadership with real numbers, ROI frameworks, and strategies for overcoming common objections to security spending.

centrexIT Team 7 min read

Key Takeaways

  • The average data breach costs a small business $120,000-$1.24 million - frame security spending as insurance against that risk
  • Use an ROI framework: compare the cost of security tools to the expected loss from breaches (probability x impact)
  • Cyber insurance premium reductions, compliance penalties avoided, and downtime prevention all contribute to measurable ROI
  • Present to leadership in business terms - revenue risk, liability exposure, and competitive advantage - not technical jargon
  • A phased approach (must-haves first, then layered improvements) makes security spending easier to approve and budget

You know your company needs better security. Maybe you’ve seen the headlines about ransomware attacks. Maybe your cyber insurance provider sent a list of requirements. Maybe you just have a gut feeling that your current defenses aren’t enough.

But getting leadership to approve the budget is a different challenge entirely. “We’ve never been hacked” is one of the most common - and most dangerous - objections you’ll face. The absence of a breach doesn’t mean you’re secure. It means you’ve been lucky. And luck isn’t a strategy.

Here’s how to build a business case that speaks the language of leadership: risk, money, and competitive advantage.

Why Leadership Pushes Back on Security Spending

Before you build your case, understand why the answer is often “no” or “not now.”

It Feels Like Insurance You’ll Never Use

Security spending doesn’t produce visible output. There’s no new product, no new revenue stream, no shiny dashboard to show the board. When security works, nothing happens. That makes it incredibly hard to justify compared to investments that produce tangible results.

The “We’ve Never Been Hacked” Fallacy

Past performance doesn’t predict future risk. The threat landscape changes constantly. The fact that you haven’t been breached might mean your defenses are adequate - or it might mean attackers haven’t targeted you yet. With 43% of cyberattacks now targeting small businesses, the odds are shifting.

Competing Priorities

Every dollar spent on security is a dollar not spent on sales, product development, or hiring. Leadership is weighing security against investments that feel more directly tied to growth.

Technical Complexity Creates Skepticism

When the security conversation is full of acronyms (EDR, SIEM, MFA, ZTA) and worst-case scenarios, non-technical leaders disengage. If they don’t understand what you’re asking for, they’re unlikely to fund it.

Calculating the Risk: Real Numbers

The foundation of any business case is quantified risk. Leadership responds to numbers, not fear. Here’s how to calculate yours.

The Cost of a Breach

Industry data gives us concrete figures for small and mid-sized businesses:

Impact AreaAverage Cost
Incident response and forensics$10,000-$100,000
Data recovery and system restoration$15,000-$150,000
Business downtime (average 21 days for ransomware)$50,000-$500,000
Legal and regulatory fines$10,000-$250,000
Customer notification and credit monitoring$5,000-$50,000
Reputation damage and customer loss$20,000-$200,000+
Total estimated breach cost (SMB)$120,000-$1,240,000

Example

A 50-person professional services firm gets hit with ransomware. Operations are down for 12 business days. The ransom demand is $150,000, but even without paying it, costs include:

  • Emergency IT response: $35,000
  • System rebuilding and data recovery: $45,000
  • Lost revenue during downtime (12 days): $180,000
  • Legal counsel and notifications: $25,000
  • Increased insurance premiums: $15,000/year ongoing
  • Customer attrition (estimated): $50,000 in first year
  • Total: approximately $350,000

Compare that to the $40,000-$80,000 per year that comprehensive security for a 50-person company typically costs.

Calculating Your Specific Risk

Use this simple framework to estimate your risk exposure:

Annual Loss Expectancy (ALE) = Probability of Breach x Cost of Breach

FactorHow to Estimate
Probability of breachIndustry averages: 43% of attacks target SMBs; roughly 1 in 5 SMBs experience a cyber event annually
Cost of breachUse the table above, adjusted for your revenue and industry
Annual Loss ExpectancyProbability x Cost

Example

  • Estimated breach probability: 20% (1 in 5 chance per year)
  • Estimated breach cost: $300,000
  • Annual Loss Expectancy: 0.20 x $300,000 = $60,000/year

If your proposed security investment is $50,000/year and it reduces breach probability by 80%, the math is straightforward:

  • New breach probability: 4% (0.20 x 0.20)
  • New ALE: 0.04 x $300,000 = $12,000/year
  • Risk reduction: $60,000 - $12,000 = $48,000/year in avoided expected loss
  • Investment: $50,000/year
  • Net ROI: $48,000 in risk reduction for $50,000 in investment - essentially break-even before accounting for other benefits

And that doesn’t include the additional benefits below.

The ROI Framework: Beyond Risk Avoidance

Risk reduction is the core argument, but it’s not the only one. A comprehensive business case includes multiple ROI drivers.

1. Cyber Insurance Premium Reduction

Insurers are dramatically tightening requirements and pricing. Companies with strong security postures receive significantly better rates.

Security MeasureTypical Premium Impact
MFA implemented on all accounts10-15% reduction
EDR deployed across all endpoints5-10% reduction
Security awareness training program5-10% reduction
Incident response plan (documented, tested)5-10% reduction
Regular vulnerability scanning3-5% reduction

For a company paying $15,000-$30,000/year in cyber insurance premiums, these reductions add up to $4,000-$15,000/year in savings.

Key point

Some insurers now require specific security controls as conditions of coverage. Without them, you may not qualify for insurance at all - or only at significantly higher premiums with lower coverage limits.

2. Compliance Penalties Avoided

If your industry has regulatory requirements, non-compliance carries real financial consequences:

RegulationPenalty Range
HIPAA$100 - $1.5 million per violation category, per year
PCI DSS$5,000 - $100,000 per month until compliant
SOXUp to $5 million in fines and 20 years imprisonment
State privacy laws (CCPA, etc.)$2,500 - $7,500 per violation
CMMCLoss of government contracts

Even if you avoid the maximum penalties, audit findings and remediation costs are significant. Proactive security spending prevents reactive compliance costs.

3. Downtime Prevention

Quantify what downtime actually costs your business:

Hourly Downtime Cost = (Annual Revenue / Business Hours per Year) + Productivity Loss

Company RevenueEstimated Hourly Downtime Cost
$2 million$500-$1,000/hour
$5 million$1,200-$2,500/hour
$10 million$2,500-$5,000/hour
$25 million$6,000-$12,500/hour

The average ransomware incident causes 21 days of disruption. Even partial downtime over that period is catastrophic.

4. Competitive Advantage

Security is increasingly a differentiator in winning business:

  • Enterprise clients require security assessments before onboarding vendors
  • RFPs include security questionnaire sections that weak postures fail
  • SOC 2 certification opens doors to clients who require it from vendors
  • Government contracts mandate specific security standards (CMMC)

If security deficiencies are costing you deals - or preventing you from bidding on them at all - that’s directly measurable lost revenue.

5. Productivity and Employee Satisfaction

Poor security often means poor technology:

  • Overly restrictive policies that slow people down (because targeted controls haven’t been implemented)
  • Frequent incidents that disrupt work
  • Manual processes that modern security tools would automate
  • Employee frustration leading to turnover

Presenting to Non-Technical Stakeholders

The most well-researched business case fails if it’s presented wrong. Here’s how to communicate with leadership effectively.

Speak Their Language

Instead of…Say…
”We need EDR on all endpoints""We need to protect every company laptop and desktop from ransomware"
"Our SIEM needs upgrading""We need better visibility into who’s accessing our systems and data"
"We should implement zero trust architecture""We need to verify every access request instead of trusting anyone inside our network"
"Threat actors are using advanced persistent threats""Attackers are targeting businesses like ours and staying hidden in networks for months"
"We need to reduce our attack surface""We need to close the doors we’re leaving open for hackers”

Structure Your Presentation

1. Start with the business risk (2 minutes)

  • What could happen: breach scenario specific to your industry
  • What it would cost: use the numbers from your risk calculation
  • How likely it is: cite the industry statistics

2. Show the current gaps (3 minutes)

  • What defenses you have today
  • Where the specific gaps are (use plain language)
  • What an attacker could exploit

3. Present the solution (5 minutes)

  • What you’re recommending (in business terms)
  • What it costs (annual and monthly)
  • What risk it reduces (back to the numbers)

4. Show the ROI (3 minutes)

  • Risk reduction value
  • Insurance savings
  • Compliance cost avoidance
  • Competitive advantage

5. Propose a phased approach (2 minutes)

  • Phase 1: essentials (immediate)
  • Phase 2: improvements (6 months)
  • Phase 3: optimization (12 months)

Use Comparisons That Resonate

  • “We spend $X on physical security for our building. Our digital assets are worth far more and have far less protection.”
  • “We carry fire insurance even though we’ve never had a fire. Cybersecurity is the same principle for digital threats.”
  • “Our largest client requires these security measures. Without them, we risk losing a $X relationship.”

A Phased Approach to Security Spending

Leadership is more likely to approve a phased plan than a single large request. Break your recommendations into priority tiers.

Phase 1: Foundation (Month 1-3) - Highest ROI

These are non-negotiable and deliver the greatest risk reduction per dollar.

InvestmentApproximate CostRisk Reduction
MFA on all accountsFree - $3/user/monthBlocks 99.9% of credential attacks
EDR (replacing traditional antivirus)$5-$15/user/monthCatches 60%+ more threats
Email security enhancement$3-$8/user/monthReduces phishing success by 90%+
Security awareness training$2-$5/user/monthReduces human error by 70%
Total for 50 users$500-$1,550/monthAddresses top 4 attack vectors

Phase 2: Strengthening (Month 4-9)

Build on the foundation with deeper protection.

InvestmentApproximate CostBenefit
Managed detection and response (MDR)$15-$50/user/month24/7 monitoring and response
Vulnerability management$2-$5/user/monthProactive gap identification
Backup enhancement$200-$1,000/monthRansomware recovery capability
Incident response plan$5,000-$15,000 (one-time)Faster, more effective breach response

Phase 3: Maturity (Month 10-18)

Advance your security posture for competitive advantage and compliance.

InvestmentApproximate CostBenefit
Compliance framework (SOC 2, HIPAA, etc.)$15,000-$50,000 (one-time)Opens new business opportunities
Penetration testing$5,000-$20,000 (annual)Validates your defenses
DLP and data classification$3-$8/user/monthPrevents data leakage
Security policy formalization$5,000-$10,000 (one-time)Documentation for audits and clients

Why this works

Phased spending is easier to approve because it starts small, demonstrates results, and builds the case for continued investment. After Phase 1, you have data showing reduced incidents and lower risk to justify Phase 2.

Common Objections and How to Respond

”We’ve never been hacked.”

Response: “That we know of. The average time to detect a breach is 194 days. We may have been compromised without realizing it. But even if we haven’t, 43% of cyberattacks target small businesses, and the average cost is over $120,000. Our current defenses have gaps that make us vulnerable."

"Can’t we just get cyber insurance?”

Response: “Cyber insurance is important, but it’s not a substitute for security. Insurers now require specific security controls as conditions of coverage. Without MFA, EDR, and training, we may not qualify - or we’ll pay significantly higher premiums. Insurance also doesn’t cover reputation damage, lost productivity during recovery, or the time and stress of managing a breach."

"It’s too expensive.”

Response: “The proposed Phase 1 investment is $X per month. The average SMB breach costs $120,000-$1.24 million. We’re spending the equivalent of [comparison] to protect against losses that could be [multiple]x larger. We can also show projected insurance premium reductions of $X that offset part of the cost."

"We’re too small to be a target.”

Response: “43% of cyberattacks target businesses with fewer than 250 employees. Small businesses are actually preferred targets because they typically have weaker defenses and less capacity to detect attacks. Automated attack tools don’t discriminate by company size - they scan the entire internet for vulnerabilities."

"Can’t IT just handle this?”

Response: “Our IT team manages day-to-day operations and support. Cybersecurity is a specialized discipline that requires dedicated tools and expertise. Asking IT to also be the security team is like asking your general practitioner to perform surgery. We need specialized tools and, ideally, specialized monitoring."

"Let’s revisit this next quarter.”

Response: “Every quarter we delay is a quarter of unmitigated risk. Our cyber insurance renewal is in [month], and without these controls in place, we’re looking at a premium increase of $X or potential coverage denial. The threat landscape doesn’t wait for budget cycles.”

Putting It All Together: Your One-Page Business Case

Here’s a template for the executive summary that accompanies your full proposal.

Security Investment Proposal - Executive Summary

Current Risk Exposure: Based on industry data and our specific vulnerabilities, our estimated Annual Loss Expectancy from a cyber incident is $[X].

Proposed Investment: $[X]/month ($[X]/year), implemented in three phases over 18 months.

Expected Outcomes:

  • Reduce breach probability by approximately 80%
  • Meet cyber insurance requirements (estimated premium savings: $[X]/year)
  • Achieve compliance with [relevant framework] requirements
  • Protect ability to win and retain [type of client] contracts

ROI Summary:

  • Annual security investment: $[X]
  • Annual risk reduction value: $[X]
  • Insurance savings: $[X]/year
  • Compliance penalty avoidance: $[X]
  • Net benefit: $[X]/year

Recommendation: Approve Phase 1 ($[X]/month) immediately. Evaluate results at 90 days before proceeding to Phase 2.

The Bottom Line

Building a business case for security spending isn’t about scaring leadership into action. It’s about translating real risk into financial terms they can evaluate alongside every other business investment.

The companies that invest proactively in security don’t just avoid breaches. They qualify for better insurance rates, win contracts that require security maturity, meet compliance requirements without scrambling, and sleep better at night.

Start with the numbers. Frame the conversation around business risk, not technical details. Propose a phased approach that starts with the highest-ROI investments. And remember: the question isn’t whether your business can afford security. It’s whether your business can afford the consequences of skipping it.


Need help building a business case for security at your company? Contact us for a risk assessment that gives you the data and framework to present to leadership with confidence.

Have More Questions?

Our team is here to help. Whether you're evaluating IT services or have a specific question about your technology, we're happy to have a conversation.