We use cookies to give you the best experience and to help improve our website

Find out more about how we use cookies

Choose whether to use cookies:

No thanks That's fine

Skip to main content

Jisc

You are in:

  • Cyber security
  • Cyber security financial X-ray

Utilities:

  • Search the Jisc website
    Clear search results

Search the Jisc website
Clear search results

Navigation:

  • Allow and deny lists
  • Foundation DDoS mitigation
  • Critical services protection
  • Cyber Essentials
  • Cyber security assessment
  • Cyber security financial X-ray
  • CSIRT
  • Cyber threat intelligence
  • Security operations centre
  • Email advice and testing
  • Janet Network resolver
  • Network time service (NTP)
  • Managed firewall
  • Managed SIEM
  • Penetration testing
  • Primary nameserver service
  • Simulated phishing and associated training
  • Splunk
  • Web filtering and monitoring framework
  • Vulnerability assessment service
Service

Cyber security financial X-ray

Financial data view
Creative Commons attribution information
Financial data view
©phongphan5922 via iStock
All rights reserved

A transparent overview of cyber security costs, with peer benchmarking included – to help you assess levels of protection and identify vulnerabilities.

Contact your account manager

For enquiries contact:

  • securityservices@jisc.ac.uk

About cyber security financial X-ray

In research and education it’s vital to allocate resources across the many areas of cyber security so you can cost-effectively protect your users and your reputation.

This service gives you a transparent view of how you are allocating security resources, with peer benchmarking included.

It helps you to balance your efforts across the estate, and address potential security vulnerabilities in the process.

Get a clear overview of cyber security costs

We capture and analyse your cyber security spend and calculate a total cost for each area, divided into staff and non-staff costs. This means you can understand their spread and reach, and, crucially, highlight gaps and vulnerabilities.

  • Results are presented to you in a clear, comprehensive report
  • Includes direct spend on hardware and software
  • Uses “activity-based costing” to capture staff time and enable staff effort to be measured accurately

Time with a security consultant

A Jisc security consultant will present your results to you in person. This is your chance to discuss risks and vulnerabilities and how you might go about mitigating them. Armed with this data, benchmarking and support, you will be able to make practical decisions on cyber security spend.

What next?

In order to collect and analyse this data, we need to spend about an hour each with relevant team leaders and managers inside IT and/or who contribute to cyber security elsewhere in the institution.

Contact your account manager

ISO certification

This service is included within the scope of our ISO9001 and ISO27001 certificates.

Read more about International Organisation for Standardisation (ISO) standards and view Jisc certificates.

ISO9001 with UK National Accreditation
ISO27001 with UKAS

Related services

  • Financial X-ray

You are in:

  • Cyber security
  • Cyber security financial X-ray

Areas

  • Connectivity
  • Cyber security
  • Cloud
  • Data analytics
  • Libraries, learning resources and research
  • Student experience
  • Trust and identity
  • Advice and guidance

Explore

  • Guides
  • Training
  • Consultancy
  • Events
  • R&D

Useful

  • About
  • Membership
  • Get involved
  • News
  • Jobs

Get in touch

  • Contact us
  • Sign up to our newsletter
  • Twitter
  • Facebook
  • LinkedIn
  • YouTube
  • Cookies
  • Privacy
  • Modern slavery
  • Carbon reduction plan
  • Accessibility