{"id":434,"date":"2025-06-05T11:25:00","date_gmt":"2025-06-05T11:25:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=434"},"modified":"2025-06-05T11:25:00","modified_gmt":"2025-06-05T11:25:00","slug":"redefining-cyber-value-why-business-impact-should-lead-the-security-conversation","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=434","title":{"rendered":"Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation"},"content":{"rendered":"<p>Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs respond with reports on controls and vulnerability counts \u2013 but executives want to understand risk in terms of financial exposure, operational impact, and avoiding loss.<br \/>\nThe<\/p>","protected":false},"excerpt":{"rendered":"<p>Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business&hellip;<\/p>\n","protected":false},"author":1,"featured_media":435,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-434","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=434"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/434\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/435"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}