Security and GRC: Driving Operational Maturity and Value Creation
"A security mindset from an ownership level is crucial when acquiring companies. At all TSPs, security should be top of mind, budgeted for, and given executive attention."
- Tim Weber, Vice President of Channel Growth at Cyber74
Security is a vital priority for today's IT solution providers (TSPs). It would be difficult to name a function, system, process, or behavior that does not have a security component attached to it. The emerging importance of artificial intelligence and hyperautomation has amplified urgency in properly approaching security and governance, risk management, and compliance (GRC) in two ways:
Best-in-class (BIC) companies formally address security and GRC as they know it can greatly impact their stock value, strategy, and operational performance.
"Our clients hire us to perform security due diligence on acquisition targets, and they care about security a lot. They are interested in whether or not there have been prior cyber incidents and whether there are potential impacts from those attacks on the horizon. They care about what controls they have in place, what third parties they have that are performing security services, and the overall posture of their infrastructure."
- Chris Loehr, EVP, CTO, CFC Response at Solis
From a shareholder perspective, it is a matter of risk. Getting GRC right protects the shareholders. While a high maturity in GRC implementation may not increase valuation, a low maturity GRC can decrease valuation.
Security also impacts shareholders as it represents a potential revenue stream to capitalize on to drive annual recurring revenue (ARR) and increase business valuation. According to the Service Leadership Index® 2025 Annual IT Solution Provider Profitability Report™1 , BIC managed service providers (MSPs), the most profitable MSPs who also tend to grow revenue the fastest, have a higher share of their total revenue coming from managed security than median and bottom ¼ performers (12.6% BIC vs. 7.0% median, 5.6% bottom ¼).
All quartiles (BIC, median, and bottom ¼) are growing their managed security revenue at least 16% year over year. They recognize the significance of including security as a mandatory component of service and not as an optional add-on (see Figure 1).
Figure 1: Managed security as a percent of total revenue
For stakeholders, the focus of security is the execution arm that protects the business, providing the necessary GRC efforts, as they are responsible for creating and delivering a tailored range of services to meet their clients' needs. Measuring and managing maturity is vital to integrating the proper behaviors into your business.
To aid in proper measuring and management of GRC, Service Leadership recently incorporated security and compliance into SLIQ™2 as the first new Functional Area since the product was released in 2013. This new addition expands Service Leadership's OML framework to evaluate a TSP's comprehension and approach to security and compliance.
This newsletter is not intended as instruction or education on security or GRC practices themselves, but rather a model for how leaders should approach security and GRC from both a shareholder and stakeholder perspective.
Before continuing, let's clarify the definitions of the terms we will be using.
Governance
According to the Information Systems Audit and Control Association (ISACA), governance is the process by which an organization aligns stakeholder needs with the protection of digital assets through defined objectives, responsibilities, and oversight. It includes administrative functions such as policymaking, risk management, and asset ownership.
Risk management
Risk management is the structured process of identifying, assessing, and addressing risks to an organization's operations and information systems. It formalizes decision-making through defined risk appetite and tolerance, using strategies such as mitigation, transfer, avoidance, or acceptance, and supports ongoing monitoring and control selection.
Compliance
Compliance requirements are mandatory laws, regulations, standards, or contractual obligations that organizations must meet to operate within an industry or with specific customers. Optional frameworks, while not legally required, often become de facto standards due to market expectations, and failure to meet either type of requirement poses a significant operational risk.
Controls
Security controls are actions to mitigate or reduce risk. While technical defenses like firewalls, passwords, and antivirus software first come to mind, other categories of controls exist. Administrative controls are policies or procedures that reduce an organization's risk, such as evaluating new software or following a change management process. Additionally, physical controls protect against physical threats such as security guards, door locks, or camera systems.
Compensating controls exist as alternatives to primary controls required by an organization's policies or by a regulatory requirement and are used when a requirement for a security measure is deemed too difficult or impractical to implement at the present time. As an example, an organization may have a policy that requires multifactor authentication and unique accounts for network devices. If a device doesn't support those features, an alternative may be to place the management interface for the device behind another system that does support MFA, such as a protected workstation. This satisfies the control objective in an alternative way.
There is a logical approach to ensuring your business ultimately serves the needs of shareholders. Service Leadership has followed and promoted this framework to help TSPs better align their strategy and operational execution to achieve their desired financial results.
Figure 2: How execution supports strategy (source: Service Leadership)
If you are familiar with the above image and approach (Figure 2), you will notice the introduction of a new step: Security and Governance, Risk Management, and Compliance (GRC). Previously, it was an unspoken expectation that companies were giving proper consideration to GRC. We've moved this from unspoken to instead be incorporated as a deliberate step into the process and into our OML guidance. The higher-level strategic considerations driven by shareholders are represented by the elements at the bottom of Figure 2. Building a strong understanding of your business mode, value creation strategy, and target client profile establishes a foundation that supports GRC as well as the tactical stages at the top of Figure 2 that have a stronger linkage to stakeholders than to shareholders.
Figure 3: Influence of GRC (source: Service Leadership)
You work too hard and invest too much time and money not to maximize the daily financial performance of your business as well as the growth in shareholder value.
Figure 3 shows the first step is understanding your shareholder mindset and appetite for growth and risk around your expected exit timeline, however far out into the future that might be. We call this Modes Theory, which you can learn more about here.
Once you understand your Mode, identifying and establishing your value creation strategy gives definition to your business's financial and valuation performance needs and turns them into a manageable plan.
That plan will ultimately help determine the target customer profile, ideally focused on a relatively narrow customer size, which will help drive stronger profitability through efficiencies in marketing, sales, and service delivery operations.
One of the primary concerns around security and GRC operationally is their role in protecting business value by ensuring that proper operational processes, controls, and reporting are in place.
Reporting of GRC practices and outlying activities at the shareholder level is a practice of BIC TSPs. When looking to sell your business or attract investors, the lack of proper reporting and incident documentation forces potential buyers or investors to rely on interviews and gather information at that moment to understand your company's security and GRC status.
Regular documentation of GRC efforts at the shareholder level should include:
There are cases where failure to disclose security incidents has stopped a transaction when the acquiring party discovered the incident during due diligence.
The OML progression concept we recommend at Service Leadership measures a company's maturity level for a given function. Figure 4 below shows a version of that progression as it relates to security and GRC.
Figure 4: OMLs of GRC (source: Service Leadership)
In OML 1, TSPs are just beginning to understand the importance of security and GRC practices and these practices, if they exist at all, are generally ad hoc and undisciplined. You may be following some recommended configuration guidelines and best practice checklists. However, that approach is not a holistic approach. It can be overwhelming to get your arms around what you should be doing. At this stage, understanding the need to choose a cybersecurity framework is key to maturing into the Emerging (OML 2) stage.
Examples of common cybersecurity frameworks include:
The specific framework matters less than the decision to follow established security practices. No need to overanalyze. If you focus on a specific customer vertical, it would be most logical to adopt a framework relevant to that industry. For instance, the Cybersecurity Maturity Model Certification (CMMC) is for organizations performing US government or defense contracting work. However, there is a significant overlap between security standards, all of which cover the essential security basics needed by all TSPs.
Another common mistake of lower OML companies is overreliance on more experienced and typically higher-cost resources. As your organization matures and builds structure, you enable scalability and move to more reliance on less experienced, lower-cost employees. Knowledgeable and experienced security and compliance resources are very expensive resources. Operational maturity regarding security and GRC practices in your business that reduces the need to rely less on those resources will be crucial to producing BIC profitability.
Finally, while regulatory compliance obligations may provide a useful source of security guidance, it is important to understand that not all regulatory obligations constitute security frameworks. For example, standards vary in the level of specific implementation guidance provided, as some provide very specific requirements.
OML 2 is where you do the bulk of your adoption for the framework you selected. At this stage, you are laying the foundation for a GRC program and introducing fundamental policies that govern your company's processes. Implementing an IT security framework will require investments of time, treasure, and talent, and it's critical to recognize that the initial implementation process is likely to be measured in months and quarters, not days and weeks. The focus should be on developing an ongoing cadence of continued progress that ultimately will underpin iterative processes needed to maintain effective GRC hygiene. As you are in the early stages of shaping and integrating your governance framework, you have yet to reach a level of maturity where formal metrics have been established to evaluate the efficacy of your company's policies.
The investment required to properly embed security-related operational and governance functions inside your business is not a marginal exercise. Building a plan that includes the time and expense in tools and people, both to adopt and maintain this new functionality, is crucial to ensuring successful implementation. While tactical guidance is easy to find, company maturity around proper pricing, staffing, management, and the ability to properly budget will dictate how quickly you can mature into the OML 3 (Scaling) stage.
At OML 3, you will have refined your processes and governance as you have matured to a point where security is embedded in the culture and operational functions of your organization. At this stage, you are also implementing controls, which are safeguards or countermeasures designed to avoid, detect, counteract, or minimize security risks to physical assets, information, computer systems, or other assets. They encompass various measures, including physical security, access controls, and administrative policies, to protect against threats and vulnerabilities that reinforce and ensure the selected framework is not simply selected but effectively adopted and working. You are measuring attainment and building good documentation practices.
You have identified and put systems in place to collect and track important metrics; however, you may not be consistently using them for management decisions.
At this stage, the leadership and management of security and GRC will begin to necessitate some form of a chief information security officer (CISO) function to oversee both internal policy management for your company and the provision of external security services to clients. Over time, it is advisable to delineate these responsibilities, with the CISO function focusing on internal policy development and external customer security policy formulation. The ongoing day-to-day management and execution of these policies can then be carried out by security engineers who are equipped to scale operations effectively.
At OML 4, this new security framework adoption should be a cultural and operational norm. You have worked your way to full adoption of your selected framework, including the necessary checks and reports to identify any breakdowns. The focus will move towards a more mature forward budget and attainment tracking. Continually maintaining framework standards while using standardized tools, systems, and management allows you to hire fewer high-dollar resources to properly maintain quality delivery of security and GRC components within your business and to your clients. At this stage, you are actively measuring internal adherence to your selected standard and consistently making routine adjustments based on what the metrics reveal. These metrics will also help reveal when new tools or services are necessary. Compensation for key security-related staff will be variable based on budget adherence and client security revenue attainment goals.
At OML 5, you should be so comfortable enough with your processes, tools, etc., that you are building them into your services and deploying the same methodologies to your clients. You are routinely engaging outside resources to assess your adherence to standards and the methodologies you are using to collect and report metrics. Outside reviews, such as external audits, are also used to review your security posture. All employees understand their role in delivering your security and GRC outcomes. Security and GRC reporting and review of practices are a regular discussion point in weekly, monthly, and quarterly meetings as part of an overall risk conversation.
A few things that help at any stage:
Deliberate consideration of security and GRC should also define guardrails and inform the remaining steps of the progression plan shown in Figure 2.
As referenced earlier, BIC TSPs typically grow more rapidly, and security offerings are a significant reason why. The extent to which you create unique security offerings will generally be greatly influenced by the markets you serve. There is increased revenue to be generated through security offerings, and those offerings could come in the form of adding to your existing core offering, or they can be positioned as net new and cross-sold to existing clients.
Most TSPs carefully evaluate adding new solutions or services to their offerings on a regular cadence (typically annually); however, the BIC includes an extra step in their evaluation process to home in on the economic viability of pursuing a new solution or service. BIC TSPs understand that there are two questions that must be answered:
If the answers to those two questions are not well aligned, then the new potential offering isn't worth investing time, treasure, and talent in bringing it to market. Ensuring that any new solution or service is both a win for shareholders and a win for customers is a key differentiator of BIC TSPs. You want to ensure you are both generating enough revenue and gross margin from the new service, as well as ensuring you have enough clients subscribing that you aren't in danger of a key client or two leaving, which would make the service not profitable. Line of sight to 10-15 clients is a comfortable start because the first 10 deployments will be lower margin based on the learning and documentation that your team will need to do as they get up to speed on the new service or product.
Another key BIC behavior is properly determining pricing. They perform a detailed cost analysis for the services they currently offer, including loaded labor, tools, and management expenses. They take a conservative approach as it is very common to underestimate the total costs of delivery of a given service. Once they have a detailed cost analysis, they use it to set a price to hit their targeted gross margin percentage (GM%).
The formula is: selling price = COGS/(1-targeted GM%). So, if your COGS = $1,200, and your targeted GM% = 60%, selling price = $3,000 [$1,200/(1-60%) = $3,000]. COGS stands for “Cost of Goods Sold” and it includes the cost of the tools, plus the cost of the labor to provide the services.
They also don't just set the price with their desired GM% and leave it alone; they revisit their detailed cost analysis, identifying the actual COGS for delivering services. The BIC performs this analysis periodically to ensure ongoing accuracy and uses updated COGS to identify the needed pricing to achieve the targeted gross margin.
Additionally, they move from “cost-plus margin” pricing to “value” pricing. While the cost-plus margin pricing delivers strong gross margins, the BIC does better. They can sell at a value pricing level when they understand the prospect's security needs and the costs the prospect incurs due to systems downtime, including lost productivity, missed revenue opportunities, customer satisfaction, etc. In this light, value pricing is still viewed as a great investment by their prospects, securing their services to maximize their uptime and minimize their business risk.
Most importantly, the BIC have an annual process that results in increased prices, which are uniformly applied to all new proposals and to over 95% of existing clients on non-recurring services and recurring revenue contracts.
Another important consideration is recouping the cost of necessary additional insurance for security and GRC purposes. While this cost is tracked in the general expense area of your income statement, recovering those costs requires properly pricing your offerings.
Driving technology standards is one of the critical traits to leverage in increasing OML and ultimately profitability. This concept takes on a whole new dimension when factoring in security and GRC. Any new tool, technology, or service offering needs to comply with your own internal selected security framework and risk profile. Depending on your specific situation, there could be an added need to ensure proper governance and compliance are in place as well, along with the ability to properly audit and report against those standards.
It's common for MSPs at lower OMLs to have relatively broad standards and/or a relatively relaxed attitude about them. While this can seem to provide a sales advantage over MSPs who take a stricter approach to the customer technology choices, in practice, it limits both the quality and scalability of their services (too many exceptions) and their profitability (too many skill sets needed).
Higher OML companies drive their business end-to-end to consistently work within their security and GRC requirements. They ensure that their installed base and each prospective customer are compliant without fail.
When selecting vendors, it becomes more important to carefully assess your security and GRC requirements. It is crucial to verify that each vendor meets the necessary criteria and that regular, ongoing reviews are maintained as part of your controls. You will also likely increase the number of vendors to include those that help with insurance and possibly offloading risk management. These vendors will need to be routinely checked for their compliance against your needed standards.
For lower OML companies, forecasting and ultimately budgeting for added costs to properly implement your security and GRC requirements needs to become part of your process. Low OML companies will not properly account for the necessary costs needed to meet their desired requirements and struggle to be profitable, as their pricing does not factor in these additional costs.
To properly implement security and GRC practices, high OML companies will properly budget for the training, tools, reporting, and time to develop and implement, properly resource controls, and the cost for any third-party services. Managing those costs becomes vital to maintaining consistent profitability. Low OML companies will not approach the project this way and will run into higher costs and more internal disruption.
As you mature your security and GRC practices, you will likely have some high-end resources that require more sophisticated compensation strategies to align with BIC behavior. You should have a strong variable compensation model for your existing management team that addresses the necessity that their overall compensation is tied to financial performance.
Much has been written about how security impacts MSPs and their customers. As the industry matures, so does the need to understand how OML, business valuation, and valuation creation are also impacted by security and GRC. From a shareholder perspective, managing risk and protecting share value cannot be overlooked.
Service Leadership Inc.®, a ConnectWise company is dedicated to providing total profit solutions for IT solution providers, directly and through industry consultants and global technology vendors. The company publishes the leading vendor-neutral, IT solution provider financial and operational benchmark: Service Leadership Index®. This includes private diagnostic benchmarks for individual IT solution providers and their business coaches and consultants. The company also publishes SLIQ™, the exclusive web application for owners and executives to drive financial improvements by confidentially assessing and driving their Operational Maturity Level™.
Service Leadership offers advanced peer groups for IT solution providers of all sizes and business models, as well as executive and industry best practices education and speaking.
For more information, please visit www.service-leadership.com.
Notice: All materials published (electronically or print) by Service Leadership are proprietary and subject to trademark and copyright protections, regardless of where and how it is sourced. The terms and concepts of SLIQ™, Service Leadership Index®, (S-L Index™), Predominant Business Model™ (PBM™), Operational Maturity Level™ (OML™), Normalized Solution Provider Charts of Accounts™ (NSPCoA™), Total Cost of Managed Services™ (TCMS™) and Service Factory™ are proprietary to Service Leadership, Inc. All Rights Reserved.
1 For more information on the report and purchasing details, click here.
2 SLIQ: Service Leadership's cloud-based OML progression tool that guides TSP executives to attain best-in-class performance. Learn more here.
3 Learn more about peer groups.
Service Leadership Inc.®,
a ConnectWise company
400 N Tampa St, Suite 130
Tampa, FL 33602
(ConnectWise headquarters)
Phone: 972-798-1288
General Information:
questions@service-leadership.com
You’ve successfully signed up to receive our newsletters. If you are not already signed up to receive our email communications, you will receive an email shortly to confirm your interest.
If you do not see the email in your inbox, please check your Junk/Spam folder.