Security and the budgeting process



Security is key for any company that considers itself a target for malicious attacks. Many cyber security solutions are available, but it might be a hard task to select the most efficient tools for the job.

SKU: bf279f8d-a664-459b-bfb0-149d3db40169 Category: Tags: , , , , , , , , , , , , , , , , , , ,
Available in: English, Dutch, French, German, Spanish
  • The CIO who wants to get a better insight in what opportunities his company has and where it can go with the right strategy.
  • The CISO who wants to set an internal benchmark.
  • The Innovation Manager who can only innovate in a secure technology setting.
  • The consulting partner assessing her client's approach to security.
  • The SMO owner who wants to understand the budget processes around security.
what is development and how does it work

who decides the budget and how to do it effectively

Vulnerability assessment
what are the risks, where are they coming from?

Risk management
how can you manage risk effectively?

Security assessment
identify security gaps in your organization's infrastructure and processes

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. Are the personal and development needs of employees taken into account during the strategy?
  1. No
  2. Is there a vulnerability analysis/risk assessment performed?
  3. A vulnerability analysis/risk assessment is performed and remediation activities are established and being executed.

Q. Are employees actively involved in identifying or changing things that do not work?
  1. No or hardly
  2. Employees can have their say within the limits of their formal remit
  3. Employees can have their say in matters outside their formal remit
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
oliverwymanRJ2014 02_Incentivising Risk Mgrs_Ipad.pdf
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.


    There are no reviews yet.

    Be the first to review “Security and the budgeting process”

    Your email address will not be published. Required fields are marked *