Threatonomics

Building a Budget and Network for Resilience

The Cyber Advocacy Program

by Amanda Bevilacqua , US Claims Operations Leader
Published

Cyber risk is no longer just an IT challenge.

It has become a complex business problem that requires the collective effort of experts across cyber security, insurance, and financial and executive leadership. In 2023, cybercrime cost $8 trillion globally. Only two years from now, that number is expected to rise to $10.5 trillion in global losses by 2025 (Cybersecurity Ventures 2022). These figures mean now more than ever, cyber risk needs to be managed as a business challenge.

Resilience’s cyber risk management solution empowers security leaders to communicate risk transfer and mitigation objectives to financial leadership effectively. Enhanced data visibility and a network of external experts provided through our Cyber Advocacy program offer the expertise that CISOs, IT teams, and other cyber security leadership need to advocate for their budget and strategy. The program provides access to cyber risk budget training, an Incident Lifecycle Management plan with a pre-vetted client advisory panel, loss control, and governance guidance for third-party risk, and more.

Financial consultant calculating cybersecurity incident response plan budgets

Financial Advocacy and Cyber Risk Budget Training

Resilience was founded by security experts who understand the need for executive-level buy-in. Our Cyber Risk Budget training is designed to help our clients quantify the likelihood of loss exceeding a certain threshold and calculate the return on investment (ROI) of their controls.

The budget training program is designed to communicate what executive and board level stakeholders need to know about cyber risk,” said Amanda Bevilacqua, US Claims Operations Leader. They don’t necessarily need to know about implementing a specific control or process. They simply need to understand how that control or process translates into a better cyber security risk posture and its forecasted ROI.

Amanda Bevilacqua, US Claims Operations Leader

Before our clients share strategies with their stakeholders, our experts engage in virtual tabletop exercises to clarify the specific ROI of certain tools, communicating their necessity in terms of dollars and cents. Advanced AI risk modeling, loss exceedance curves, and a comprehensive overview of the organization’s cyber risk profile help our security clients present this information to their stakeholders in a way that will be more impactful. This overview translates the technical challenges of cyber risk into financially quantified solutions that will allow their organization to continue to deliver value should they experience an incident.

Cyber Security Incident Lifecycle Management

Traditional solutions provide templates and status-quo guidance for incident lifecycle management. Resilience’s process is tailored to our client’s unique risk and entails creating a comprehensive Cybersecurity Incident Response Plan (IRP) that details the steps required to resolve an event. The IRP covers notification, data backup restoration, legal and regulatory requirements, tips to preserve your organization’s reputation, and any other items needed to recover your unique environment. When the IRP is complete, it is tested thoroughly to identify any security gaps and promptly remediate them.

Part of our Incident Lifecycle Management program is offering our clients access to our network of pre-vetted external experts. This client advisory panel includes cybersecurity incident response partners and resources like privacy attorneys, computer forensic investigators, and more.

“This network helps us manage even the most complex situations,” said Bevilacqua. “If our in-house team can’t handle something, we have an external expert in the loop who can.”

Third-Party Risk Governance

Through access to security data and visibility into our clients’ risk profiles, our solution offers an extensive third-party risk governance program. This entails comprehensive State-of-your-Risk reports for up to 15 pivotal vendors, in-depth questionnaires to understand your vendor’s cyber risk profiles, and instruction to help align your vendor network with your organization’s security standards.

The impact of vendor breaches can be expansive, unpredictable, and difficult to recover from. After the MOVEit breaches in Q2 2023, third-party vendor risk has become Resilience’s number one point of failure – replacing phishing for the first time in our claim’s history. It is more important now than ever to take the steps necessary to protect your environment from your vendor’s risk, as these incidents will only grow more popular post-MOVEit’s success.

The Cyber Advocacy program is designed to give security and risk management all of the information they need to advocate for the tools they need to meet strategic business objectives. It works to accelerate stakeholder buy-in at all levels by offering data, analysis, and the financial threshold required to build a strong cyberinfrastructure.

“The Cyber Advocacy program offers our clients a responsive network ready to mobilize and capable of managing any incident,” said Bevilacqua. “This partnership approach is a key component of helping our clients remain cyber resilient in the face of growing threats.”

Ready for the first step to cyber resilience? Request a demo.

You might also like

A CISO’s guide to winning the annual budgeting battle

It’s that time of year again. Finance has sent the email with the budget template attached. Your CFO wants preliminary numbers by next week. And you’re staring at a spreadsheet wondering how to justify the security investments your organization desperately needs when last quarter’s board meeting included the phrase “do more with less.” Welcome to […]

What the Collins Aerospace outage reveals about vendor risk

On September 19, 2025, chaos erupted at airports across Europe—but not because of weather, strikes, or mechanical failures. Collins Aerospace’s MUSE platform, the digital backbone handling passenger check-in and baggage processing from Heathrow to Dublin, went dark after a ransomware attack. Within hours, major airports including Brussels, Berlin, and Dublin were forced to revert to […]

Does Resilience use your company data to train AI?

In an era where “AI training” has become synonymous with data collection, we get this question a lot: “Does Resilience use our company data to train AI models like ChatGPT?” The short answer? No. But the full answer reveals something more interesting about how we approach cyber risk modeling and why we chose a different […]

New insights on the evolving threat landscape, from our 2025 Midyear Cyber Risk Report 

The cybersecurity world is experiencing an unexpected paradox in 2025. While cyber insurance claims in the Resilience portfolio dropped by 53% in the first half of the year—suggesting that organizations are getting better at preventing attacks—the financial damage from successful incidents has actually increased. Our latest 2025 Midyear Cyber Risk Report reveals that when cybercriminals […]

The seven places you should be looking when building your vendor list

In our first post, we established why comprehensive vendor discovery matters and how most organizations approach it incorrectly. Today, we’re diving into the practical mechanics: the seven data streams that can reveal vendor relationships hiding in your existing systems. The key insight is to start with data you already have rather than surveys or questionnaires. […]

How to get people to care about security when they don’t report to you

Getting executive sign-off on a new control? Hard. Getting peer buy-in on security initiatives when they don’t report to you? Harder. In modern organizations, cybersecurity professionals often find themselves in the ultimate matrix of organizational challenges: you need buy-in from every department within the organization – operations, sales, HR, and finance – but none of […]