Section 4: Baseline Assets, Exposure, and Spend

You can’t justify investment without first understanding what’s at risk—and how well it’s currently protected.

Before asking for more funding, you need to show what you're protecting, how well it's protected today, and how past investments have been used. This builds credibility, objectivity, and financial awareness into your business case from the start.

This section guides you through developing a clear snapshot of your cybersecurity program: what assets matter, what’s exposed, what’s already been spent—and what the current story tells leadership.


🧱 Inventory What’s at Stake

Start by identifying the critical assets your organization depends on. These may include:

Pro Tip: You don’t need to build a full CMDB—just map enough to show leadership what’s on the line and why it matters.

Use categories that align with business impact:


🔎 Assess Current Protection and Exposure

Next, identify how well those assets are currently protected. Consider:

Pair this with known audit findings, red team results, or SPI 360 assessment data if available.

Don’t try to over-quantify here. Your goal is to show informed awareness—not perfection.


💰 Analyze Spend and Efficiency

This is where you combine technical context with financial transparency.

Start with the budget vs. actual tracking discussed in Section 3:

Look for patterns:

Framing tip: Be honest but constructive. Highlight lessons learned and how this next ask is more focused, strategic, or disciplined.


🧠 Strategic Inputs to Carry Forward

This baseline becomes your starting point for cost-benefit analysis:

These insights set the stage for benchmarking, trade-offs, and scenario planning in the next sections.


📝 Section 4 Planning Questions

  1. What are the 3–5 most critical assets or systems this initiative will protect or support?

  2. How well are those currently protected—and where are the known or suspected gaps?

  3. What story does your budget vs. actual spending tell—and how does that support or undermine your case?

Published with Nuclino