1 Introduction

The importance of continual improvements to cybersecurity for ensuring business continuity is widely acknowledged. Towards this objective, academic literature and industry research emphasize the need for cybersecurity investments (Accenture, 2021; Fedele & Roner, 2022). Although there could be various antecedents to firms' security investments, they are ultimately targeted at improving the security posture. Firms channel these investments toward improving technological or human cybersecurity capabilities. The objective is to lower the risk of breach occurrence and enhance incident response capabilities.

Antecedents to cybersecurity investments can be broadly classified into external or internal. External antecedents include industry-specific requirements, regulations, market demands, and vendor or customer demands (Barton et al., 2016; Weishaupl et al., 2018; Xu et al., 2019). For instance, compliance with PCI DSS in the credit card industry or HIPAA in healthcare could drive security investments. Internal antecedents could include business process needs, internal audits, CXO recommendations, lowering insurance costs (Rowe & Gallaher, 2006; Zhao et al., 2009), internal cybersecurity human resource capabilities (Tatsumi & Goto, 2010), or commitment to cybersecurity (Nassimbeni et al., 2012; Tang & Liu, 2015). Due to the difficulty in quantifying these antecedents to security investment, most research in this area is qualitative; information security managers use some form of economic analysis based on cost–benefit, sometimes without quantifying the benefits (Bodin et al., 2018; Gordon et al., 2006). However, simulation and game-theoretic approaches based on cost–benefit analysis (Beresnevichiene et al., 2010), attacker motivation, attacker capabilities, assets, acceptable risk level, and asset importance (Cavusoglu et al., 2008; Fenz et al., 2011; Herath & Herath, 2008; Nagurney & Shukla, 2017) have also been used widely to model security investment decisions. Regardless of the drivers, these security investments can be channeled through the purchase of security technology, the hiring of personnel, or training programs to improve cybersecurity capabilities. In summary, while research does acknowledge that a range of economic, performance, and environmental factors affect security investment decisions (Gordon et al., 2018), studies have focused mainly on economic issues through modeling approaches, leading to a neglect of research on performance outcomes' influence on security investment decisions.

Breach costs are an indicator of cybersecurity performance because they measure the impact of a breach, show the level of preparedness, and demonstrate the effectiveness of cybersecurity measures. While firms can choose to invest proactively, focusing on breach prevention (Kwon & Johnson, 2014; Safi et al., 2021), breaches, as an indicator of cybersecurity performance, can also trigger cybersecurity investments. Indeed, broader literature on strategic management contends that failures can often form the basis for investments to improve future performance (Haunschild & Sullivan, 2002). Despite this, there are no studies on breach costs motivating cybersecurity investments.

Accounting for breach costs is crucial because not all breaches elicit a strategic response; firms can choose to maintain the status quo (Bana et al., 2021; Gordon et al., 2018) or limit response to technical fixes that remedy the immediate vulnerability. For instance, firms frequently face incidents involving malware or lost devices that may have none or minimal impact; these may not always result in meaningful business impact. An organization-wide strategic cybersecurity response is not required in such cases. However, there may be singular incidents that elicit a broader reaction from stakeholders within and outside the firm, eventually serving as a trigger to increase cybersecurity investments. Ignoring the variation in breach costs as a motivation for investment decisions neglects real-world concerns and actual decision-making processes. Therefore, our study first investigates how breaches with varying costs to the firm influence cybersecurity investment decisions.

Secondly, the quality of incident response can lower or raise breach costs. Consequently, in addition to the type of breach, breach costs are also a function of the firm's incident response capabilities. Therefore, firm cybersecurity investment decisions in response to disruptive breaches can be expected to be more nuanced, based not only on breach severity but also on the firm's evaluation of the effectiveness of incident response. Again, research has not incorporated this critical aspect of cybersecurity performance into cybersecurity investment decisions. We use breach identification source, viz. whether the focal firm identified the breach or if it was identified by a third party, as one indicator of incident response efficiency and investigate how it influences cybersecurity investment decisions following a breach.

To answer our research questions, we use Organizational Learning Theory (Cyert & March, 1963) as a theoretical lens to hypothesize how breach costs and breach identification source affect cybersecurity investment decisions. We use firm-level data on actual breaches and cybersecurity investment decisions following these to test our hypotheses empirically.

Hui et al. (2016) identify security investments as one of the four major themes in IS research on securing digital assets. We contribute to the literature on cybersecurity investments (Gordon et al., 2018) by theorizing and providing empirical evidence for the role of cybersecurity performance, including breach costs and breach identification source as antecedents to cybersecurity investment decisions. We also contribute to the literature on incident response (Ahmad et al., 2022) by theorizing and providing empirical evidence for how breach identification source, an indicator of incident response efficiency, could be used by firms to calibrate cybersecurity investment decisions.

2 Background Literature

2.1 Cybersecurity breach costs

A cybersecurity breach is an event that results in unauthorized access to data, applications, services, networks, or devices by bypassing their underlying security mechanisms (ACSC, 2022). Some examples of incidents are data breaches, ransomware attacks, malware attacks, or phishing.

Incident costs can be divided into direct or short-term, recovery, and long-term costs (Fowler, 2016). Direct costs include direct loss or damage to assets, data, intellectual property, and loss of business continuity when staff cannot carry out normal activities, and customers cannot avail of services. Recovery costs include resources the IT function devotes to incident management, getting backups online, restoring business continuity, and costs of investigating the incident and communicating with stakeholders. Long-term costs include damage to reputation, lost business, market losses (Dong et al., 2023; Spanos & Angelis, 2016), loss of existing and potential customers, and customer redressal and compensation costs.

From the firm's perspective, high incident costs are undesirable as they add to business costs. Given that direct costs and the cost of recovery can vary based on firms' incident management capabilities, overall incident costs can be expected to vary among firms (Fowler, 2016). High incident costs can even threaten the survival of small and medium businesses (Paulsen, 2016; Ponemon, 2019). Therefore, it is in the firm's interest to avoid or keep these costs to a minimum (Hasan et al., 2021). Firms with mature security capabilities can identify incidents quicker and respond rapidly to reduce the incident impact and scope. Towards this end, continuous improvement of cybersecurity capabilities is in the firm's business interests. Financial investments in cybersecurity contribute to building these capabilities toward improving incident avoidance and response capabilities (Anderson & Choobineh, 2008; Gordon et al., 2016). Indeed, industry surveys point out that with the number of incidents increasing annually, investments in cybersecurity are showing a rising trend (SANS, 2021).

Major cybersecurity failures can spur an organization to engage in problematic search and learn from its experience in dealing with the incident, making meaningful changes towards improving its cybersecurity capabilities. Organizational learning (Cyert & March, 1963) represents an appropriate theoretical lens to examine learning and action following such failures. Prior literature has used organizational learning as a framework to provide conceptual recommendations for improving security capabilities (e.g., Ahmad et al. (2020), Shedden et al. (2011)).

2.2 Organizational Learning Theory

The fundamental idea in organizational learning is that organizations learn from experience and effect improvements to their processes, strategies, and structures based on performance (Levitt & March, 1988). Organizations are characterized as history-dependent systems that evolve in response to past experience (Cyert & March, 1963). Learning can come through direct experience, through interpreting others' experiences via planned learning, information seeking through research, surveys, and experiments, or unsystematic learning (Huber, 1991). Learning is included into routines that serve as knowledge repositories, which are updated in response to experiences. Examples of routines are rules, strategies, technologies, practices, and capabilities. Effective learning organizations assimilate novel ideas and overcome inertia (Simon, 1991). This process involves learning as well as unlearning. Inter-firm collaboration, outsourcing, and rare events are a few examples of sources from where such experiences could originate (Haunschild & Sullivan, 2002). Broadly, success and failure are two types of experiences organizations learn from (Miner et al., 2008).

Organizations engage in problematic search to correct their behavior following failures and incorporate this learning into their routines. The objective is to reduce future failure rates (Kim & Miner, 2007; Madsen & Desai, 2010). Failures lead to learning by providing the motivation for learning and inputs in the form of experience from which to infer lessons. Major incidents trigger this search process (Haunschild & Sullivan, 2002; Madsen & Desai, 2010) as opposed to smaller failures that might only lead to minor adjustments in organizational routines. Crisis events like cybersecurity breaches provide opportunities to reevaluate current processes and motivate change (Miller & Chen, 1994).

Employing interviews with cybersecurity decision-makers, Weishaupl et al. (2018) find that cybersecurity incidents can serve as learning triggers. They also find that major breaches play an important role in decision-making regarding cybersecurity improvements; in the absence of incidents, firms prefer maintaining the status quo. Having experienced a major incident that resulted in material damage, a firm will want to avoid similar costs in the future. Financial investments in security are an essential first step toward improving security capabilities. This is especially true for resource-strapped firms; firms focusing on reducing expenses will likely limit themselves to responding to disruptive incidents rather than putting preventive measures in place (Kwon & Johnson, 2014). Using information from the most recent incident to put security measures in place is a cost-effective strategy for firms that can't implement preventive measures (Ozkaya, 2021). For instance, unlike larger organizations with adequate financial resources, resource-strapped organizations cannot afford a 24 × 7 Security Operations Center (SOC) for continuous monitoring. Since it is difficult for the management to calculate the return on security investments, this strategy provides a better estimation of costs based on attacks encountered rather than anticipated attacks that might never happen.

3 Hypothesis Development

3.1 Costs of breaches and cybersecurity investments

Firms can choose to maintain the status quo or improve their security capabilities after a breach. How firms react to cybersecurity incidents has implications for their future cybersecurity posture.

Organizational learning posits that organizations engage in single-loop learning in case of relatively minor failures, such as minor product defects. This involves identification, correction, and process changes to address the immediate issue and ensure it does not recur. Echoing this approach, Shedden et al. (2009) posit that in the wake of breaches, organizations typically focus on resolving the immediate technical issues, with limited attention to improving the overall incident response process and with hardly any long-term oriented consideration of improvements to security capabilities. For instance, firms can take corrective actions to plug security vulnerabilities. However, focusing on only correcting the vulnerability that led to the most recent breach will only protect the organization from attacks that exploit the specific vulnerability. Failures thus provide organizations with learning opportunities, but learning is not guaranteed. Organizations have leeway in interpreting failures and might choose to interpret them self-beneficially (Baumard & Starbuck, 2005).

Minor failures also run the risk of going unnoticed or intentionally ignored. Managers tend to interpret minor failures as random events (Baumard & Starbuck, 2005). Small failures are less likely to challenge the IT security function or management's fundamental perceptions of the current security posture. Not all breaches are a cause for concern, and firms do not need to make major changes in response to every single breach. Due to budget constraints, firms must be judicious about how much and in which areas to invest. For instance, firms might be affected by different breaches that might not lead to data loss or loss of business continuity and have no business implications. In such cases, firms might perform technical fixes for low-cost breaches or choose to ignore them as one-off incidents. Other options include policy changes and training following breaches. Firms could also take other actions that do not necessarily demand investments, such as changing tool configurations and access controls, modifying backup and contingency plans, and standard operating procedures, taking disciplinary action, updating software, or updating passwords (Fowler, 2016).

On the other hand, organizational learning contends that major failures are more likely to elicit a meaningful response from an organization. Compared to minor failures, major failures can evoke surprise and greater recognition and lead to meaningful changes through a double-loop learning process (Argyris, 1977). Double-loop learning leads to the organization examining fundamental routines in an area of concern in greater depth to advance long-term improvements. It is more likely to occur in crises due to major events. Along these lines, major breaches give the firm a visible measure of the impact breaches can have on business. High breach costs increase the visibility of the cybersecurity function and make it easier to justify and gain support for cybersecurity investments. This is because breaches with higher costs can lead to extensive problematic search and major improvements to security to improve the overall security posture substantially (Ahmad et al., 2020; Van Niekerk & von Solms, 2004). After a costly breach, firms might invest more in cybersecurity to prevent repeat breaches and rebuild trust in key stakeholders. Firms can see such events as an opportunity to improve firm security capabilities to prevent, identify, and manage the response to future breaches.

In summary, compared to breaches with less material impact, breaches resulting in higher costs are more likely to gain wider visibility in the organization and provide greater motivation to effect improvements to cybersecurity routines. The organization would be more likely to reassess its security strategy and effect increased security investments rather than undertake only a limited tactical response. Therefore,

  • H1: Compared to breaches associated with lower costs, those with higher costs will be more likely to result in increased cybersecurity investments.

3.2 Organization Learning Theory and incident response

In learning from incidents, organizational learning theory emphasizes the importance of postmortems, which are systematic measures to diagnose problems (Basten & Haamann, 2018). This involves reflecting on positive and negative aspects of events to derive actionable items. Learning from careful analyses like postmortems is preferred over haphazard evaluations. In case of cybersecurity breaches, postmortems come in the form of post-breach reviews. They involve reflecting on and reviewing the preparedness, identification, and management of a breach to reduce the probability of a repeat incident and improve future incident identification and management capabilities (Fowler, 2016). This happens through a formal review, reports, and presentations to management. Changes to procedures are documented to serve as repositories for organizational routines in dealing with future breaches. We now hypothesize how breach identification, an essential component of incident response, can moderate the relationship proposed in H1.

Incident response (IR) is the formal process through which organizations engage personnel to analyze, identify, and respond to an incident (Ozkaya, 2021). Incident response aims to protect the organization from the negative consequences following a breach and enable timely business recovery (Grispos et al., 2015; Menges & Pernul, 2018). Effective incident response capabilities are critical in ensuring that a breach does not escalate. As such, incident response is one area where firm cybersecurity investments are directed. Due to its business impact, the process is a top priority for the management and security functions, and a dedicated team may be tasked to do it. Security Operations Centers in large organizations carry out incident response. In contrast, in small and medium-sized businesses, a smaller team from the IT function or the IT manager might carry out this activity (Ahmad et al., 2012).

Multiple standards propose linear incident response frameworks that move from one phase to another (CREST, 2021; IEC, 2016). The typical phases of incident response are preparation, identification, containment, eradication, recovery, and post-incident review (Ozkaya, 2021). Preparation involves having the relevant technology, processes, and governance mechanisms in place. Identification consists in ascertaining that an incident has actually taken place. The objective of containment is to stop further damage to the firm's information systems. Eradication consists in removing the root causes of the breach, e.g., by removing the malware. Recovery involves restoring business continuity and routine operations. Finally, post-incident review consists in reflecting on incident handling to improve processes for managing future incidents.

3.3 Breach identification source

Early identification is vital to the incident response process, with consequences for breach costs. Industry research shows that attacks are increasingly sophisticated, with attackers increasing their dwell time to access critical information. Consequently, the time to identify breaches has increased annually (IBM Security, 2019). According to FireEye (2021), the mean dwell time globally is 146 days before breach identification. Given the wide variation in dwell time, the quicker an organization can identify a breach, the better it will be able to limit the damage. Activities such as containment and recovery can only be carried out after breach identification, making breach identification capabilities of critical importance.

Breaches could be identified by several sources, broadly classified as internal or self-identified and external or third-party identified. Third parties include regulators, law enforcement, independent security professionals, or customers after they have experienced repercussions due to the breach (Clearinghouse, 2009). For instance, breaches could come to light after users report suspicious activity on their bank accounts or payment methods.

On the other hand, self-identification of breaches could originate from the IT security function or employees in the wider organization who notice suspicious activity. Self-identification, where firms identify breaches instead of being notified by third parties, signals effective firm cybersecurity capabilities and can help reduce negative media scrutiny that can unduly influence response. Well-managed incident response is of utmost importance to limit financial and reputational damage by ensuring the organization is effectively in control.

3.4 Breach identification source and performance feedback

Breach self-identification by the focal firm indicates that multiple facets of its security operations work effectively. For instance, effectively trained employees can be an essential means of early breach identification (McIlwraith, 2021) through activities such as reporting suspicious files, directories, or emails. Although they may not have the technical expertise to ascertain that the organization is under attack, cyber security-aware employees can signal their suspicion to the cybersecurity function for follow-up (Kemper, 2019). Efficient communication channels with the security function, an essential part of firm security capabilities, can facilitate this.

Another source of self-identification is security software, where firms have a choice of multiple security technologies and ways of configuring these according to their specific network. A one size fits all approach is not recommended for cybersecurity, and organizations need to be cognizant of their business needs and adapt cybersecurity to their specific environment. Deriving meaningful output and making sense of firewall notifications, malware and intrusion detection systems, and host-based and network-based tool logs (Gupta & Srinivasagopalan, 2020) involves optimal configuration and is a firm-specific capability.

In summary, self-identification of breaches reflects the firm's security capabilities, including how well employees are trained and security-aware, how well the SOC functions, and how well the security tools are configured and leveraged. While breaches may not be entirely avoidable, breach identification is part of a firm's cybersecurity capabilities. If the breach is identified by a third party instead of the focal firm, it is more likely that the firm evaluates its security capabilities negatively during post-incident reviews.

The incident response process is improved iteratively by incorporating feedback and insights gained from experience dealing with breaches (Ahmad et al., 2020). Learning from incidents will provide feedback to security routines when the team identifies what technical and procedural aspects worked and which did not and need rectification. Indeed, the security function is responsible not only for managing the technical response in the immediate aftermath of the incident, but also for providing inputs to validate and improve the incident response process (Fowler, 2016; West-Brown et al., 2003). This consists in documenting the experience and learning from incidents, communicating these to the management, and making a persuasive case for process changes if required (Grance et al., 2004; Shedden et al., 2011). Compared to self-identification, in case of breaches identified by third parties, the security function is more likely to recommend substantial changes toward improving security capabilities. This raises the likelihood of increased cybersecurity investments. Therefore,

  • H2: Breach identification source will moderate the positive relationship between breach cost and cybersecurity investments such that third party-identified breaches will be more likely to result in cybersecurity investments.

4 Method

4.1 Sample

We used data from the UK Cyber Security Breaches Survey to test our hypotheses. The survey is carried out annually by the Department for Digital, Culture, Media, and Sport of the Government of the UK (UKCS, 2020). The objective of the survey is to provide input to cybersecurity policy through understanding various aspects of cybersecurity threats. The survey targets small, medium, and large firms and charities spanning multiple industries in the UK. Data is collected through a telephone survey using random probability sampling to avoid selection bias. The data is anonymized, and firms are not tracked longitudinally. We used data collected in survey iterations from 2018 to 2020 as these iterations had uniform survey instruments directly applicable to our research questions; relevant questions were dropped in later iterations. The data had 267, 252, and 203 observations for 2018, 2019, and 2020 respectively. The specific section of the questionnaire asked the respondents to answer the questions in the context of the one cybersecurity breach or related series of breaches or attacks that caused the most disruption to their organization in the last 12 months.

4.2 Measures

Dependent variable

Our dependent variable is cybersecurity investment. Firms were asked: "What, if anything, have you done since this breach or attack to prevent or protect your organization from further breaches like this?" Firms were provided with multiple options related to possible actions. For our dependent variable, we focused on the specific response option “ Increased spending on cybersecurity.” The dependent variable was coded as 1 if firms responded yes to this option, 0 otherwise.

Independent variable

Our independent variable is breach cost. Firms were asked: “In total, approximately how much, if anything, do you think this single most disruptive breach or attack has cost your organization financially?” Responses were collected on a scale ranging from 1 to 12 (1: Less than £100; 2: £100 to less than £500; 3: £500 to less than £1,000; 4: £1,000 to less than £5,000; 5: £5,000 to less than £10,000; 6: £10,000 to less than £20,000; 7: £20,000 to less than £50,000; 8: £50,000 to less than £100,000; 9: £100,000 to less than £500,000; 10: £500,000 to less than £1 million; 11: £1million to less than £5million; 12: £5 million or more).

Moderator

Our moderator is breach identification source. This was coded as 1 if the firm self-identified the breach and 0 if a third party identified it. Firms were asked, "Thinking about your most disruptive breach or attack, how was this identified?" Respondents were provided with an extensive list of options from which they chose the source of breach identification. We classified this list of sources into self-identified and third-party identified. Specifically, breaches were coded as self-identified if the source was more likely to be the firm and included the following: by antivirus/ anti-malware software, routine internal security monitoring, other internal control activities not done routinely (e.g., reconciliations, audits, etc.), unusual email/ file activity, typos/ poor grammar/ use of English, pop-ups, website/ computer crashed, previous experience/ it was obvious, loss of data/ money, unusual phone calls, inappropriate requests for information/ money, by accident, reported/ noticed by staff/ contractors.

We coded breaches as third-party identified if the source was likely to be outside the firm and includes the following: from warning by government/ law enforcement, breach/ attack reported by the media, similar incidents reported in the media, reported/ noticed by customer(s)/ customer complaints, by the bank/ credit card company, external IT service provider, disruption to business/ staff/ users/ service provision, reported/ noticed by an external third-party.

Controls

We included control variables to account for other factors that might influence our hypothesized relationships. We controlled for firm size using the number of employees. The survey classified firms based on the number of employees as micro (1–9), small (10–49), medium (50–249), or large (250 +). We controlled for all 12 industries captured in the survey using dummy variables coded 1 for a specific industry and 0 otherwise. We also controlled for firms’ online presence as those with a greater online presence could be more attentive to cybersecurity. We created a composite variable to account for online presence based on responses to multiple questions under the “Online presence” section in the survey. This included whether the firm had a social media presence, if customers could pay for services online, an online bank account for customers to pay into, an industrial control system if customer's personal information was held electronically, if people could donate online, or if beneficiaries could access services online. We also controlled for the type of breach (ransomware, malware, denial of service, bank account hacking, impersonation, phishing, unauthorized file/ network access by insiders, unauthorized file/ network access by outsiders, other security incident). Finally, we controlled for year fixed effects. The equation below shows the model tested:

\(\mathrm{Cybersecurity Investment}=\left({\upbeta }_{1}\times \mathrm{Breach Cost}\right)+\left({\upbeta }_{2}\times \mathrm{Breach Cost}\times \mathrm{Breach Identification Source}\right)+\left(\gamma \times \mathrm{Controls}\right)+{\eta }_{t}+\mu\)

In the model indicated above, β1 and β2 are coefficients indicating the impact of breach cost and breach identification source on the decision to increase cybersecurity investment. The term γ indicates the effect of each of the controls described above. Finally, the term ηt represents time-fixed effects, while μ is the error term.

We used logistic regression with robust standard errors in Stata to test our hypotheses. Four control variables (dummies for entertainment or services, health or social care, utilities or production industries, and ‚" unauthorized use of computers, networks or servers by staff even if accidental") were found to predict failure perfectly and dropped by Stata in the regression analysis. This led to a total of 496 firm-year observations in the model. Table 1 shows the correlations among variables incorporated in the final regression analysis.

Table 1 Descriptive Statistics

Table 2 shows the results of hypothesis testing with logistic regression. In Model 1 we included only the control variables. In Model 2, we added breach costs and found that its effect on cybersecurity pending (H1) was significant (β = 0.237; p = 0.008; S.E. = 0.099). Although we did not hypothesize for the direct effect of the breach identification source, we added it as a control in Model 3. We found no significant effect (β = -0.453; p = 0.186; S.E. = 0.507).

Table 2 Hypothesis testing results

Model 4, the final model, includes all control variables, direct effects of the independent variable and moderator, and moderating effect. The positive effect of breach costs on increased spending on cybersecurity stays significant (β = 0.522; p = 0.006; S.E. = 0.192). H2, which argues for a moderating effect of the breach identification source, is confirmed (β = -0.409; p = 0.044; S.E. = 0.240).

5 Discussion

Organizational learning posits that firms learn when they experience problems (March, 1996). Learning occurs nonlinearly, with crisis events as triggers (March et al., 1991). Empirical analysis of firm-level data confirms the hypothesis that breaches resulting in higher financial costs are positively associated with the decision to increase cybersecurity investments. Furthermore, the likelihood of such an increase in cybersecurity spending is increased in case of weaker incident response capabilities represented by third-party reported breaches. That the moderator is not independently significant shows that firms are not likely to base their cybersecurity investment decisions solely on whether a breach was identified internally or by a third party. Information about the breach identification source will only be used to further calibrate cybersecurity investment decisions in the broader context of breach costs.

Firms cannot be expected to make strategic cybersecurity decisions in reaction to every breach; breaches with relatively greater financial costs will significantly affect their cybersecurity investment decisions. When faced with frequent low-impact breaches, firms might choose to maintain the status quo and focus on successes instead of minor failures (Madsen & Desai, 2010). This is because minor failures provide weak cues about firm performance (Eggers, 2012). On the other hand, major incidents are more likely to elicit support from the management for organizational learning and acting for sustained change. This translates to broadening the focus to identify the assets compromised, identifying more areas of weakness, investing more in securing assets, and improving incident response capabilities.

Even while reacting to high-cost breaches, firms need to be aware that they do not have unlimited resources and will need to consider their current state of incident response capabilities before deciding to invest. Self-identification of breaches is one such indicator of incident response capabilities; it is a culmination of many aspects of cybersecurity working efficiently. For instance, it reflects how well the employees are trained, how well security tools are configured, and how well the SOC correlates alerts to identify breaches. Therefore, the learning that firms derive following breaches will be different as third-party identified breaches might indicate greater room for improvement in cybersecurity.

Given that both higher breach costs and third-party identified breaches tend to signal relatively greater security shortcomings and might require increased cybersecurity spending, organizations must prioritize efforts to minimize breach costs and enhance their internal breach identification capabilities. Several practical recommendations can be considered to achieve these objectives.

Firstly, organizations can leverage tools, knowledge and training towards achieving these objectives. Examples of tools include Security Information and Event Management (SIEM) systems to swiftly identify potential breaches. In addition to security tools, regular monitoring of updates from global security expert groups such as Computer Emergency Response Teams (CERT) can help organizations stay abreast of emerging vulnerabilities so that response to zero-day attacks can be expedited. Implementing comprehensive Security Education, Training, and Awareness (SETA) programs (Hu et al., 2022) can empower employees to play an active role in detecting and reporting breaches in a timely manner; this could also lead to reduced breach dwell times, consequently lowering costs. These measures can help improve organizations’ internal breach identification capabilities.

Secondly, organizations need to focus on expediting incident response phases following breach identification, including containment, eradication, and recovery, to restore operations quickly and minimize business disruption (Fowler, 2016, pp. 12–13). This can help minimize overall breach costs.

Thirdly, the findings encourage firms to review their security budgets based on post-incident review findings. Analysis of the incident management experience can lead to organizational learning, allowing a more efficient allocation of resources into relatively weaker areas to strengthen the overall cybersecurity posture.

We contribute to the literature on cybersecurity investments (Gordon et al., 2016) by theorizing and providing empirical evidence for the role of cybersecurity performance. Past literature has overlooked the role of cybersecurity performance in cybersecurity investment decisions. It has mainly examined the market impact of a particular kind of breach, viz. data breaches (Spanos & Angelis, 2016), while ignoring their impact on internal functioning and investments. This is concerning because feedback from performance drives strategic decision-making. Our study moves the conversation from focusing on simulation approaches and game-theoretic models to actual firm experiences in the form of failures driving decision-making. We contribute to theory by explaining the cybersecurity investment decision process using the organizational learning perspective. This perspective leverages arguments from the actual functioning of organizations and provides practitioners with actionable insights. Wolff and Lehr (2017) indicate that empirical evidence lags far behind modeling and simulation approaches. We fill this research gap by examining the financial costs of actual breaches and cybersecurity investment decisions following these.

While incident response is understudied (Ahmad et al., 2022), the postmortem phase of incident response has received even less research attention (Shedden et al., 2011). Literature on incident response has focused mainly on technical aspects involving identification, recovery, and investigation for legal follow-up (Mitropoulos et al., 2006; Shedden et al., 2011) while implications for strategic security posture have been ignored. This is concerning because postmortems are critical phases that shape future cybersecurity posture. Despite this, past research has focused on the immediate response rather than organizational learning toward improving security capabilities. We theorize how firms could use postmortem analysis in the form of evaluation of the breach identification source to calibrate cybersecurity investment decisions.

6 Limitations

Our research focuses on cybersecurity investment decisions made by firms in response to the most disruptive breaches. We contend that not all cybersecurity breaches will necessarily trigger security investments, which is why it is more useful to examine security investment decisions as a function of breach costs rather than the mere occurrence of a breach. It is possible that organizations experience minor breaches from which they derive valuable insights and subsequently make improvements to their security measures. However, due to practical constraints, such minor breaches and the corresponding firm reactions cannot be feasibly included in a comprehensive survey spanning hundreds of organizations. Despite this limitation, our empirical analysis, which encompasses a diverse range of organizations and controls for breach type, offers robust evidence in support of our arguments.

To gain further insight into firm reactions to minor breaches that do not result in high costs but still highlight security gaps, qualitative case studies conducted within a limited number of organizations may present a suitable methodology. By complementing our current findings with case studies, a more comprehensive understanding of how organizations respond to different types and severities of breaches can be achieved.

7 Conclusion

Firms need to be concerned with cybersecurity investments and reactions to breaches as both have implications for their cybersecurity posture and downstream effects on overall business performance. Our study combines these two important areas of practical concern to examine the relationship between cybersecurity performance and cybersecurity investment decisions. Empirical results confirm the hypothesis that higher breach costs result in more security investment. Moreover, this relationship is strengthened if the breach is identified by a third-party instead of internally by the focal firm.

Our findings and theory are especially important to security decision-makers who can look at multiple aspects of their operational security performance to make cybersecurity investment decisions. It can help firms make their cybersecurity investment decisions data-driven. This presents a better alternative to other motivations for cybersecurity investments, including spontaneous reactions following breaches, adopting the latest security tools in fashion without examining firm-specific needs, or making fear appeals to the management.

Future research can extend this focus on cybersecurity performance to examine how other aspects of actual cybersecurity performance including failures, influence organizational learning and decision-making.