Cybersecurity Benchmarking: Where’s The Data?

Share and earn Cybytes
Facebook Twitter LinkedIn Email

When it comes to communicating with the C-suite and Board of Directors about their organization’s cyber exposure, few IT and security professionals are happy with the benchmarking data currently available.

The ability to proactively measure and demonstrate how cyber exposure risk changes over time is crucial to communicating the value of cybersecurity investments to the C-suite and Board of Directors. Equally important is the ability to show how an organization’s cyber exposure management efforts compare to that of its peers. Yet, the vast majority of IT and cybersecurity professionals surveyed by Tenable said they’re not happy with the benchmarking data they use to demonstrate the effectiveness of their security program to business leaders.

These are the findings of a poll we conducted during last month’s Infosecurity Europe conference in London. Nearly three quarters (73%) of the 280 IT and security professionals we polled at the event confirmed the importance of using metrics to benchmark their cyber exposure.

The majority of respondents (80%) said they see value in sharing benchmarking data to demonstrate the effectiveness of their security program to the Board of Directors or C-suite. Yet, only 59% of respondents said they currently leverage benchmarking data.

Even more alarming, a fifth of respondents (21%) said they do not currently use any benchmark data when communicating with the Board of Directors or C-suite — though they would like to do so. Only 18% said they see no value in sharing such data with C-level leadership.

Why Cyber Exposure Benchmarking Matters

In order to understand where an organization is exposed, and determine which cybersecurity efforts are most effective, you need visibility into vulnerabilities and threats. But such visibility is only the beginning. You also need the ability to analyze the data and track the organization’s ability to react appropriately when issues are discovered.

Data showing how your cyber exposure posture has improved over time — and how it stacks up against that of your industry peers — allows you to demonstrate the value of your cybersecurity investments and support your requests for additional resources. The ability to share these cyber exposure benchmarks with your C-suite and board helps you improve their understanding of the organization’s risk posture.

The majority of survey respondents (54%) said they are already comparing their organization’s metrics against those of their industry peers. Yet, more than a third of these respondents (35%) say they would like comparative peer data; only 19% said they are happy with the benchmark data available. More than a quarter of respondents (26%) said they don’t currently benchmark against their peers and would like to do so.

What does effective cyber exposure benchmarking look like?

Through our work with cybersecurity professionals, we’ve identified four key questions every organization needs to be able to answer to communicate cyber risk to the business:

  • Where are we exposed?
  • Where should we prioritize efforts based on risk?
  • How are we reducing our exposure over time?
  • How does our cyber hygiene compare to our peers?

We recognize how challenging it is in today’s enterprise environment for you to answer these key questions. You’re faced with a mountain of data, much of it static and drawn from multiple spreadsheets, and you’re expected to turn it into the kinds of insights business leaders can use. Effective cyber exposure benchmarking requires live and holistic visibility across every asset in your organization — not only your IT assets and cloud infrastructure, but your organization’s internet of things (IoT) tools and industrial control systems.

Cyber exposure benchmarking provides an objective way for you to measure and communicate cyber risk to business leaders, who can then use it to make strategic decisions. Knowing which areas of your business are secure – or exposed – and measuring your organization against a larger set of peer data opens up a whole new set of discussions and decisions about where your organization needs to focus.

Learn more about cyber exposure

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?