We use cookies to give you the best experience and to help improve our website

Find out more about how we use cookies

Choose whether to use cookies:

No thanks That's fine

Skip to main content

Jisc

You are in:

  • Cyber security
  • Cyber security financial X-ray

Utilities:

  • Site search
  • Site navigation menu
  • Search the Jisc website
    Close search results

Search the Jisc website
Close search results

Navigation items within Cyber security financial X-ray

  • Cyber security financial X-ray
  • DDoS mitigation
  • Email advice and testing
  • CSIRT
  • Penetration testing
  • Security blacklists and whitelists
  • Simulated phishing and associated training
  • Vulnerability assessment and information service
  • Web filtering and monitoring
Service

Cyber security financial X-ray

Financial data view
Creative Commons attribution information
Financial data view
©phongphan5922 via iStock
All rights reserved

A transparent overview of cyber security costs, with peer benchmarking included – to help you assess levels of protection and identify vulnerabilities.

Contact your account manager

For enquiries contact:

  • securityservices@jisc.ac.uk

About cyber security financial X-ray

In research and education it’s vital to allocate resources across the many areas of cyber security so you can cost-effectively protect your users and your reputation.

This service gives you a transparent view of how you are allocating security resources, with peer benchmarking included. It helps you to balance your efforts across the estate, and address potential security vulnerabilities in the process.

Get a clear overview of cyber security costs

We capture and analyse your cyber security spend and calculate a total cost for each area, divided into staff and non-staff costs. This means you can understand their spread and reach, and, crucially, highlight gaps and vulnerabilities.

  • Results are presented to you in a clear, comprehensive report
  • Includes direct spend on hardware and software
  • Uses “activity-based costing” to capture staff time and enable staff effort to be measured accurately

Benchmark your spending against peers

  • Put your results in context with benchmark data from peer organisations
  • Discover where your spending is higher or lower than your peers
  • Helps you reallocate staff time and spot potential security vulnerabilities

Time with a security consultant

A Jisc security consultant will present your results to you in person. This is your chance to discuss risks and vulnerabilities and how you might go about mitigating them. Armed with this data, benchmarking and support, you will be able to make practical decisions on cyber security spend.

What next?

In order to collect and analyse this data, we need to spend about an hour each with relevant team leaders and managers inside IT and/or who contribute to cyber security elsewhere in the institution.

Contact your account manager

Related services

  • Financial X-ray

You are in:

  • Cyber security
  • Cyber security financial X-ray
  • Give feedback

    Areas

    • Connectivity
    • Cyber security
    • Cloud
    • Data and analytics
    • Libraries and research
    • Student experience
    • Advice and guidance

    Explore

    • Guides
    • Training
    • Consultancy
    • Events
    • R&D

    Useful

    • About
    • Membership
    • News
    • Jobs

    Get in touch

    • Contact us
    • Twitter
    • Facebook
    • LinkedIn
    • YouTube
    • Cookies
    • Privacy
    • Modern slavery statement
    • Accessibility