Files
antifragile/antifragile-consulting/playbooks/business-case-template.md
Tomas Kracmar 763da003d3 Initial commit: antifragile cybersecurity consulting blueprint
Complete repository of frameworks, playbooks, and assessment resources
for cybersecurity consultations focused on antifragile enterprise design.

Includes:
- Core philosophy and manifest (5 pillars)
- 12 modular engagement packages
- AI sovereignty and operations frameworks
- Zero-budget vulnerability discovery and hardening playbooks
- M365 E3 hardening and antifragile project plans
- Osquery sovereign discovery platform blueprint
- Perimeter scanning capability guide
- AI-assisted TVM blueprint for AI-powered adversaries
- Vertical specializations: banking, telco, power/utilities
- CIS Controls v8 and NIST CSF 2.0 mappings
- Risk registers and assessment templates
- C-suite conversation guide and business case templates
2026-05-09 16:53:22 +02:00

12 KiB
Raw Permalink Blame History

Business Case Template

"The board does not buy security. The board buys risk reduction, regulatory survival, and competitive advantage. Price it accordingly."

This template provides a reusable structure for building financial justification for antifragile engagements. It is designed to be adapted per client, per vertical, and per regulatory context. The output should be a 4-6 page document that a CFO can evaluate in 15 minutes.


Document Structure

Page 1: Executive Summary

Subtitle: Investment Proposal: Antifragile Enterprise Program

Element Content
Investment ask €[X] over 180 days, phase-gated with go/no-go decisions at days 30, 60, 90
Primary return Reduction of existential cyber risk; regulatory compliance evidence; competitive differentiation through AI sovereignty
Break-even Day 90 (via avoided regulatory fine exposure, reduced insurance premiums, or operational resilience)
Risk of inaction Quantified below; summary: [X]% probability of material incident within 24 months at estimated cost of €[Y]

Page 2: Cost of Inaction

Frame: The most expensive decision is the one not to act.

Direct Costs (Quantifiable)

Risk Category Probability (Client-Specific) Average Industry Cost Expected Value
Ransomware incident (recovery + downtime) [X]% €4.5M €[X * 4.5M]
Regulatory fine (DORA / NIS2 / national) [X]% 1-2% global turnover €[X * % GT]
Data breach notification and remediation [X]% €3.8M (per IBM Cost of Data Breach Report) €[X * 3.8M]
Cloud AI vendor price increase / lock-in [X]% 200-500% price shock €[X * shock]
Competitive intelligence loss (cloud AI training) [X]% Unquantifiable but existential High

Calculation:

Expected Loss = Σ (Probability_i × Cost_i)

Present this as: "Without intervention, the organization faces an expected loss of €[X] over 24 months. The proposed program costs €[Y], representing a [Z]:1 return on risk reduction."

Indirect Costs (Narrative)

  • Reputational damage: Customer churn, difficulty acquiring new business, talent attrition
  • Operational paralysis: During an incident, leadership attention is diverted from growth to survival
  • Insurance premium increases: Cyber insurers are tightening terms; resilience demonstrably reduces premiums
  • Regulatory scrutiny: A single incident triggers multi-year regulatory attention and reporting obligations

Page 3: Investment Structure

Frame: We spend your money as if it were our own. Configuration first. Purchase only if justified.

Phase-Gated Budget

Phase Timeline Primary Activity Estimated Cost Go/No-Go Gate
1. Hygiene Days 0-30 Configuration of existing tools; identity cleanse; visibility €[X] (primarily labor) Day 30: Demonstrate risk reduction or stop
2. Control Days 30-60 ASR, MFA enforcement, network segmentation, vendor lockdown €[X] (labor + minimal tooling) Day 60: Validate control effectiveness
3. Sovereignty Days 60-90 Local AI pilot; recovery drills; T0 asset protection €[X] (labor + local inference hardware if needed) Day 90: Prove local AI viability
4. Antifragility Days 90-180 Chaos engineering; red team; continuous improvement €[X] (labor + external testing) Day 180: Maturity assessment and next-phase planning
Total 180 days €[X]

Cost Categories

Category Typical % of Budget Description
Consulting / Labor 60-70% Configuration, process design, training, documentation
Existing Tool Activation 0% Included in current licensing; no new purchase
Local AI Infrastructure 10-20% Hardware or sovereign cloud for inference (only if pilot justifies)
External Testing 10-15% Red team, penetration testing, regulatory validation
Training / Change Management 5-10% Security awareness, champion programs, board briefings

Compare to Alternatives

Alternative Approach Cost Timeline Risk
Do nothing €0 Expected loss €[X] over 24 months
Traditional security audit €[X] 90 days Produces report; no structural change
Full E5 licensing upgrade €[X]/user/year 30 days Solves some gaps; does not address architecture or AI sovereignty
Managed security service (MSSP) €[X]/month Ongoing Outsources detection; does not reduce structural fragility
Antifragile program (this proposal) €[X] 180 days Structural change, regulatory evidence, AI sovereignty, measurable resilience

Page 4: Return on Investment

Frame: The return is not revenue. It is avoided cost + preserved optionality + regulatory license to operate.

Quantifiable Returns

Return Category Calculation 12-Month Value 24-Month Value
Avoided ransomware recovery Probability reduction × €4.5M €[X] €[Y]
Avoided regulatory fine Probability reduction × % GT €[X] €[Y]
Insurance premium reduction 10-20% reduction on cyber premium €[X] €[Y]
Cloud AI cost stabilization Shift from variable API costs to fixed infra €[X] €[Y]
Reduced incident response cost Faster detection and containment €[X] €[Y]
Total Quantifiable Return €[X] €[Y]

Strategic Returns (Narrative)

Return Category Description
Competitive moat Proprietary data improves only your models; competitors cannot replicate your operational intelligence
Regulatory agility Demonstrable resilience accelerates regulatory approvals, market entries, and partnership discussions
Talent retention Engineers and security professionals prefer organizations that invest in durability over firefighting
M&A readiness Clean identity architecture, tested recovery, and documented controls increase valuation and reduce due-diligence friction
Vendor negotiation leverage Documented exit architectures improve negotiating position with all major suppliers

ROI Summary

ROI = (Total Return - Total Investment) / Total Investment × 100%

Present as: "This program delivers a [X]% return in year one, rising to [Y]% in year two, with strategic optionality that compounds beyond quantification."


Page 5: Risk and Sensitivity Analysis

Frame: We are honest about what could go wrong. That honesty is why you should trust us.

Program Risks

Risk Likelihood Impact Mitigation
Operational disruption during hygiene phase Medium Medium Changes executed in maintenance windows; rollback procedures documented; "get out of jail free" executive authorization
Client team capacity constraints High Medium Weekly sprints with clear priorities; we do the heavy lifting; client provides decisions, not labor
Scope creep Medium High Ruthless phase gating; kill chain prioritization; deferred items tracked for future phases
Tool activation reveals deeper problems High Low This is the point. Early discovery is cheaper than late discovery.
Executive sponsor departure Low High Board-level endorsement; documented in steering committee minutes; knowledge transfer at each phase

Sensitivity Analysis

Scenario Investment Adjustment Outcome
Best case No additional tooling needed Program completes under budget; all value from configuration
Base case Local AI hardware required for pilot Slight budget increase; sovereign intelligence proven
Worst case Deeper technical debt than anticipated Extend Phase 1 by 30 days; additional labor cost; still cheaper than incident

Page 6: Recommendation and Next Steps

The Ask (Full Program):

"We recommend approval of a 180-day antifragile enterprise program, structured in four 30-60-90-180 day phases with hard go/no-go gates. The initial 30-day investment is €[X] with a defined deliverable: identification and initial closure of the organizational kill chain. If measurable risk reduction is not demonstrated by Day 30, the program stops with no further obligation."

The Ask (Modular Alternative):

"Alternatively, we can start with a single, fixed-scope module chosen based on your highest-priority pain. Each module is 30-60 days, fixed price, with defined deliverables and a hard stop. If the value is proven, we proceed to the next module. If not, you have still received a complete, bounded solution. See Modular Engagements for the module menu."

Immediate Next Steps:

Step Owner Timeline
Executive sponsor designation CEO / Board Week 0
Steering committee scheduling COO / Chief of Staff Week 0
Data room access (AD, cloud IAM, network diagrams) CISO / IT Director Week 0
SOW execution and kickoff Procurement / Consultant Week 1
Week 1 stakeholder interviews Consultant Week 1
Day 30 steering committee and go/no-go Executive Sponsor Day 30

Vertical-Specific Financial Adjustments

Banking

  • Regulatory fine exposure: DORA fines up to 2% of global turnover; use client's actual global turnover
  • SWIFT CSP non-compliance: Potential disconnection from SWIFT network; catastrophic for international payments
  • PSD2 SCA failure: Transaction rejection rates, customer abandonment, regulator attention
  • Insurance context: Many banks are self-insured for cyber; frame as direct balance-sheet protection

Telco / Power (Critical Infrastructure)

  • NIS2 penalties: Up to €10M or 2% of global turnover (whichever is higher)
  • Operational downtime: Power outages measured in €/minute; telco downtime in subscriber churn
  • National security implications: Some incidents trigger government intervention or nationalization risk
  • Supply chain: Single vendor failure can disable critical infrastructure; optionality has direct monetary value

Generic Enterprise

  • Ransomware: Primary quantifiable risk; use industry averages if client-specific data unavailable
  • Business interruption: Use revenue/day × estimated downtime
  • Reputation: Use customer acquisition cost × estimated churn from breach notification

The CFO Conversation: Key Metrics

When presenting to the CFO, lead with these metrics and no others:

  1. Expected loss without intervention (24 months): €[X]
  2. Program cost: €[Y]
  3. Risk reduction ROI: [Z]%
  4. Cash payback period: [X] days
  5. Probability of material incident: [before]% → [after]%

Everything else is supporting detail.


Template Appendix: Client-Specific Worksheets

Worksheet 1: Revenue at Risk

Annual revenue:                     €_________
Revenue per day:                    €_________ (annual / 365)
Critical system downtime tolerance: _________ days
Revenue at risk from downtime:      €_________ (revenue/day × tolerance)

Worksheet 2: Regulatory Fine Exposure

Global turnover (if applicable):    €_________
Applicable regulation:              [DORA / NIS2 / National / None]
Maximum fine %:                     _________%
Maximum fine €:                     €_________
Probability of fine (current):      _________%
Expected fine exposure:             €_________

Worksheet 3: Cloud AI Cost Trajectory

Current monthly cloud AI spend:     €_________
Projected 24-month spend:           €_________
Local AI infrastructure cost:       €_________
Break-even month:                   _________
24-month savings:                   €_________
Data leakage risk (narrative):      [Eliminated / Reduced / Unchanged]

For the board conversation guide, see C-Suite Conversation Guide. For the one-page executive summary, see Executive Summary.