Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Security Teams Must Learn How to Build Value for Their Businesses
Cybersecurity

Security Teams Must Learn How to Build Value for Their Businesses

Robert WoodBy Robert WoodFebruary 21, 2022Updated:February 21, 20224 Mins Read
Facebook Twitter LinkedIn Email
Business Value with Security Teams
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Security teams are historically cost centers. It’s a necessity for organizations to create space in their budget and resource planning for cybersecurity initiatives. Oftentimes and historically though, cybersecurity creates friction towards delivering services or technologies that create value and bring in revenue. This ties back to all of the talk in the industry right now about security teams “enabling the business.” This chatter often doesn’t expand on what that really means though. This article will explore this dynamic.

Revenue Centers

Organizations exist for a reason. They exist to provide value to someone or something else. It is imperative that security leaders understand their organization’s mission and how it:

  • Provides value to its stakeholders; and
  • Earns revenue (or satisfies its mission in the cases of non-commercial entities)

To gain that understanding, leaders need to intentionally break out of their security and technology silo. Talk to other team leaders to understand their work, their pain points, and potential opportunities. Guided human-centered design research can be a great way to build a holistic understanding, but it’s more time-consuming and expensive. Start with something though, even if it’s (virtual) coffee meetings or lunches. Put a particular emphasis on individuals who are involved with organization initiatives that are on the front lines of value creation or revenue generation. Examples might be:

  • Sales and marketing
  • Product management
  • Financial operations team
  • Legal (specifically contract management)

As this understanding develops, security teams can then identify opportunities to optimize their efforts around value delivery.

Value Stream Mapping

Value stream mapping originates from the worlds of agile software development and human-centered design. The focus is on understanding the sequence of things that must occur to produce value for some stakeholder. Understanding the flow enables teams to ideate enhancements to parts of the process, improving the outcome. Building on the understanding of revenue centers within an organization, understanding what things must happen to produce value is key to understanding where cybersecurity teams are a dependency.

A commonly occurring example is when a security team is depended on to fill out third-party risk assessment questionnaires to support the sales process. The sales process is fundamental to bringing in customers who pay the organization for technology or services.

Another example is a security-generated policy that states new software must go through security validation or testing prior to moving into a production state. This might be a penetration test, a code review, a threat model, a compliance review, or something else entirely.

Understanding how security teams fit into a value stream is an important part of understanding pain points or friction.

Tying It Back to Value Generation

Value creation can come in many forms. Reducing cost for a business process or a stakeholder. Enabling a product to go to market faster while maintaining or improving the overall security state. Producing high-quality runtime telemetry directly to development teams and SRE’s about the state of a system so they can more effectively manage their services. These examples are by no means exhaustive, there is a lot that security teams can do to move into that “business enabler” role.

It’s important to note because there’s a lot that teams can do does not mean they should do it all. If everything is a priority, nothing is a priority. Understanding revenue centers, mapping out value streams, and actively seeking out pain points are important steps in prioritizing. There is not necessarily a right answer. Start with questions like this to begin ranking and prioritizing:

  • What will this improve and for who?
  • How long will this change take or how hard is it?
  • Who’s going to care about this change? On this one, use this answer to engage stakeholders in the improvement process directly if possible.
  • How will we know this change worked and how do we measure that?

Transitioning into that enabling role as a security team is a journey, not a switch that can be simply be achieved. Continual stakeholder engagement and review of opportunities to improve is an important step along the way of moving away from a sunk cost center as a security team.


business value Cybersecurity Cybersecurity channel devsecops featured security teams
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Google’s Vision for Gemini Super Assistant, Universal Capabilities

May 30, 2025

Accelerate, Assist, Transform: A Framework for AI Adoption Success

May 30, 2025

Google Offers First-of-Its-Kind GenAI Certification for Managers

May 30, 2025

Marc Benioff Is Transforming World’s Largest Apps Vendor into AI-Data Powerhouse

May 29, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Google’s Vision for Gemini Super Assistant, Universal Capabilities
  • Accelerate, Assist, Transform: A Framework for AI Adoption Success
  • Google Offers First-of-Its-Kind GenAI Certification for Managers
  • Marc Benioff Is Transforming World’s Largest Apps Vendor into AI-Data Powerhouse
  • AI Agents Are Here: Why C-Suite Leaders Should Pay Attention Now

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.