Cyber Resilience as Capital Planning: Quantifying Risk
嗯,用户让我帮忙总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要理解文章的主要内容。文章标题是“Cyber Resilience as Capital Planning: Quantifying Risk”,看起来是关于网络弹性作为资本规划的内容,量化风险。 接着,用户提供的文章内容提到,几十年来,网络安全预算被视为运营支出(OpEx),像保险或电力一样被视为业务的必要“税”。安全领导者通常基于恐惧、不确定性和怀疑来争取预算,常常难以证明投资回报,因为理想情况下工具的结果是“没有变化”。 所以,总结的时候需要涵盖以下几点:网络安全预算作为OpEx的传统处理方式、安全领导者基于FUD争取预算的困难、以及投资回报难以证明的问题。同时,要保持在100字以内,并且直接描述内容。 可能的结构是:网络安全预算过去被视为OpEx,安全领导者通过FUD争取资金,但难以证明投资回报。这样简洁明了地概括了主要内容。 最后检查一下字数是否符合要求,并确保没有使用任何特定的开头语句。 </think> 文章探讨了网络安全预算的传统处理方式及其面临的挑战。长期以来,网络安全被视为运营支出(OpEx),安全领导者常基于恐惧、不确定性和怀疑(FUD)争取资金,但难以量化投资回报。 2026-4-28 12:15:1 Author: securityboulevard.com(查看原文) 阅读量:17 收藏

The post Cyber Resilience as Capital Planning: Quantifying Risk appeared first on CyberSaint Blog.

Cyber Resilience as Capital Planning: Quantifying Risk

For decades, the cybersecurity budgethas been treated as part of Operational Expenditure (OpEx), a necessary “tax” on doing business, much like insurance or electricity. Security leaders have traditionally fought for budgets based on fear, uncertainty, and doubt, often struggling to justify the return on investment for tools that ideally result in “no change”.

*** This is a Security Bloggers Network syndicated blog from CyberSaint Blog authored by Padraic O'Reilly. Read the original post at: https://www.cybersaint.io/blog/cyber-resilience-as-capital-planning-quantifying-risk


文章来源: https://securityboulevard.com/2026/04/cyber-resilience-as-capital-planning-quantifying-risk/
如有侵权请联系:admin#unsafe.sh