-
- Home
>
-
- Blog
>
-
- InfoSec Trends
Why Security Leaders Lose Budget When Security Tools Look the Same
- May 19, 2026
- Kevin Kirkwood
- 4 minutes to read
Table of Contents
Every CISO has sat in a budget meeting where the conversation quietly pivoted from risk to price. Not because the chief financial officer (CFO) was being difficult. Not because security stopped mattering. But because at some point in the discussion, two platforms started to look identical, and when things look identical, cost becomes the deciding factor.
That pivot is where security investment decisions go wrong.
Security leaders do not lose budget because financial leaders undervalue security. They lose budget when the case for investment fails to make risk, consequence, and business impact visible.
The CFO Is Not the Problem
A CFO’s job is to allocate capital efficiently, manage financial exposure, and demand clarity before committing resources. When two vendors are both claiming to stop breaches, both carrying enterprise customer logos, and both cleared through procurement, the practical move is to choose the one that costs less.
Defaulting to cost when outcomes look identical is rational decision-making. However, the real issue is that outcomes are likely not the same and shouldn’t appear the same in the first place. When they do, the most important part of the case has been left unmade.
What “Good Enough” Actually Means in a Security Budget Discussion
In budget conversations, “good enough” tends to land as a dismissal. In practice, it is a financial judgment with a specific internal logic: the lower-cost option appears sufficient for the organization’s current needs, the risk being accepted feels tolerable, and the alternative has not demonstrated meaningfully different outcomes. Understood on those terms, it is a defensible position.
The problem is that it rests on an assumption of stable conditions, and stable conditions are exactly what the current threat environment does not offer.
Lateral movement that once took days or months to achieve now takes hours or minutes. The attack surface has expanded with every cloud workload, third-party integration, and AI tool provisioned without security review. Threat actors are also using AI to scale phishing, credential abuse, impersonation, and other attacks with greater speed and precision, contributing to a reported 456% rise in AI-enabled scams and attacks. At the same time, AI agents are beginning to operate inside enterprise environments as autonomous actors, not just tools. In a future where organizations may have 100 AI agents for every human worker, those agents become more than another identity to manage. They represent a new class of insider threat: always on, highly connected, and capable of acting across systems faster than traditional controls were designed to follow.
“Good enough” is a time-stamped judgment. The platform that cleared the bar in a previous budget cycle may be quietly failing against conditions that exist right now. Making that expiration date visible, before the organization pays for the gap, is part of what the CISO’s role in the boardroom now requires.
The Environment That Makes Translation Hard
Security leaders operate under a level of scrutiny that few other executives face. Every gap is visible in hindsight. Every investment has to be justified against threats that, by design, no one hopes to see materialize. The work itself lives in technical depth, because that is where the decisions actually happen and where the consequences play out.
Boardrooms, by contrast, run on a different set of inputs entirely. When a security investment proposal arrives framed around features, detection logic, or capability comparisons, finance responds the way it always does: it pressures cost, assumes equivalence where no meaningful difference has been demonstrated, and asks the higher-priced option to justify itself in terms it can actually assess. The structural gap between how security leaders think about risk and how finance leaders think about capital is the real friction in that room.
What Can Be Evaluated Can Be Funded
When a CFO hears that Platform A offers superior detection, stronger analytics, and more advanced automation, what registers is that it costs more and performs better in ways they have no framework to assess. A case built on technical differentiation gives a finance leader nothing to act on.
CFOs are not resistant to spending on security. They are resistant to spending on outcomes they cannot evaluate. That distinction points directly to the CISO’s responsibility: not to prove that the better platform is superior, but to rebuild the case in the terms a CFO understands and knows how to work with.
What a CFO can actually evaluate:
- How long does it currently take to detect and contain a threat, and what does that window cost in a real incident?
- What specific failure scenarios does the current platform leave unaddressed?
- Where does coverage end, and what risk sits in that gap?
- What does the operational overhead of the cheaper platform cost in analyst time, alert fatigue, and missed signals?
- What hidden costs exist with regard to infrastructure, storage, or other requirements?
These are the inputs that turn a security investment into a capital decision, which is the only kind of decision a finance leader is positioned to make.
The Argument That Changes the Room
Every “good enough” decision carries a time horizon, a built-in risk tolerance, and consequences that compound when conditions shift. When those consequences are made specific, the conversation changes.
A CFO who understands that the cheaper platform means 16 additional hours of dwell time in a lateral movement event and can see what those hours cost in incident scope, response overhead, and business disruption, they now have a real basis for a decision. Without that specificity, the lower number wins, because no one gave them a better basis for the decision.
The security leaders who change the outcome of that meeting walk in with failure scenarios mapped, outcome comparisons built, and a clear accounting of what the cheaper option actually costs when something goes wrong.
Download the Guide
That is exactly why we created The CFO Conversation Checklist for CISOs, a practical field guide to help security leaders pressure-test their case, surface hidden costs, translate technical differentiation into boardroom language, and answer the question finance will always ask: what do we actually risk by choosing the cheaper option?
Kevin Kirkwood
Chief Information Security Officer | Exabeam | Kevin Kirkwood is the Chief Information Security Officer at Exabeam, overseeing the global Security Operations Center (SOC), Application Security (AppSec), Governance Risk and Compliance (GRC), and Physical Security. With over 25 years of experience, Kevin has led security initiatives for organizations such as PepsiCo, Bank of America, and the Federal Reserve System. Kevin studied Marine Biology and Journalism at Texas A&M and after six years in the US Navy, he received a Bachelor of Science in Computer Information Systems. Kevin is passionate about giving back and volunteers as the Vice Chairman of the Planning Commission for his county and serves as President of the local water board. In his free time, Kevin enjoys continuous learning, riding motorcycles, and dreams of creating a farm for both fun and profit.
More posts by Kevin KirkwoodLearn More About Exabeam
Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.