Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Ponemon-Tenable Study Find 60% of Organizations Suffered 
Two Or More Business-Disrupting Cyber Events in last 24 Months

December 12, 2018

Columbia, MD

Yet inability to quantify the business cost of cyber risks leaves most boards of directors in the dark

Tenable®, Inc., the Cyber Exposure company, today released the Measuring and Managing the Cyber Risks to Business Operations Report, an independent study conducted by Ponemon Institute. It found that 60 percent of organizations globally had suffered two or more business-disrupting cyber events — defined as cyber attacks causing data breaches or significant disruption and downtime to business operations, plant and operational equipment — in the last 24 months. Further, the vast majority of respondents (91 percent) had suffered at least one such cyber event in the same time period.

Despite this documented history of damaging attacks, the study found that the majority of organizations (54 percent) are not measuring, and therefore don’t understand, the business costs of cyber risk. The report concludes that organizations are unable to make risk-based business decisions backed by accurate and quantifiable metrics, resulting in a lack of actionable insight for the C-suite and board of directors.

Digital transformation has created a complex computing environment of Cloud, DevOps, mobility and IoT, where everything is connected as part of the new, modern attack surface. This has created a massive gap in an organization’s ability to truly understand its Cyber Exposure at any given time. The research -- which surveyed 2,410 IT and infosec decision-makers in six countries -- found less than one third (29 percent) of respondents reported having sufficient visibility into their attack surface (i.e. traditional IT, cloud, containers, IoT and operational technology) to effectively reduce their exposure to risk. To further complicate this lack of visibility, more than half of respondents (58 percent) said their security function lacks adequate staffing to scan for vulnerabilities in a timely manner, with only 35 percent scanning when it’s deemed necessary by an assessment of risks to sensitive data.

Together, these data points reveal that the tools and approaches organizations are using fail to provide the visibility and focus required to manage, measure and reduce cyber risk in the digital era. 

Of those organizations that measure the business costs of cyber risk, 62 percent are not confident their metrics are actually accurate. Thus, decisions about the allocation of resources, investments in technologies and the prioritization of threats are being made without critical information — such as the costs of IP theft, loss of revenue or loss of productivity. Organizations admit to not using the key performance indicators (KPIs) they consider important to assessing and understanding cyber risks:

  • 64 percent rated “time to assess” an essential KPI but only 49 percent actually measure it
  • 70 percent rated “time to remediate” an essential KPI but only 46 percent measure it
  • Only 30 percent of respondents believe their organizations can translate cyber risk KPIs into actionable steps

This lack of rigor leaves boards of directors in the dark about the true cost of cyber risks to their organizations. Without confidence in the accuracy of their measures, CISOs and other security executives are reluctant to share critical information about the business costs of cyber risks with their boards.

“In today’s digital economy, cyber risk equates to business risk. It’s shocking to learn that organizations are suffering business-impacting cyber events yet are struggling to accurately measure the resulting financial cost,” said Bob Huber, CSO, Tenable. “This study powerfully highlights that most organizations have not implemented security metrics that reflect cybersecurity’s role as a core business function. CISOs need reliable metrics to help them make educated decisions on the allocation of resources, investments in technology and the prioritization of threats.”

For more information, and to download a copy of the report, visit https://www.tenable.com/cyber-exposure/ponemon-cyber-risk-report.

Notes to Editors: 

  • The survey was completed by 2,410 IT and security professionals in the United States, United Kingdom, Germany, Australia, Mexico and Japan. All respondents have a role in the evaluation and/or management of investments in cybersecurity solutions within their organization.
  • An infographic to support this release is available on request

About Tenable

Tenable®, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.

Contact Information:

Cayla Baker
[email protected]

Stay up to date!

Subscribe to our email alerts for new press releases.

Subscribe for press release updates

免费试用 立即购买

选择 Tenable.io

免费试用 60 天

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即注册。

立即购买 Tenable.io

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

65资产

$2,275.00

立即购买

免费试用 立即购买

免费试用 Nessus Professional

免费试用 7 天

Nessus® 是当今市场上功能最全面的漏洞扫描器。Nessus Professional 可帮助自动化漏洞扫描流程、节省合规周期的时间,并让您调动起 IT 团队的积极性。

购买 Nessus Professional

Nessus® 是当今市场上功能最全面的漏洞扫描器。Nessus Professional 可帮助自动化漏洞扫描流程、节省合规周期的时间,并让您调动起 IT 团队的积极性。

购买多年许可证,为您节省更多

免费试用 立即购买

试用 Tenable.io Web Application Scanning

免费试用 60 天

完整享有专为现代化应用程序而设、属于 Tenable.io 平台组成部分的最新 Web 应用程序扫描功能。可安全扫描全部在线资产组合的漏洞,具有高度准确性,而且无需繁重的手动操作或中断关键的 Web 应用程序。 立即注册。

购买 Tenable.io Web Application Scanning

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

5 FQDN

$3,578.00

立即购买

免费试用 联系销售人员

试用 Tenable.io Container Security

免费试用 60 天

完整获得已集成至漏洞管理平台之唯一容器安全产品的功能。监控容器映像中的漏洞、恶意软件和策略违规。与持续集成和持续部署 (CI/CD) 系统进行整合,以支持 DevOps 实践、增强安全性并支持企业政策合规。

购买 Tenable.io Container Security

Tenable.io Container Security 经由与构建流程的集成,可供全面了解容器映像的安全性,包括漏洞、恶意软件和策略违规,借以无缝且安全地启用 DevOps 流程。

了解有关 Industrial Security 的详情

获取 Tenable.sc 演示

请将您的联系方式填写在下方表格中,我们的销售代表很快与您联系安排演示。您也可以写下简短评论(不得超过 255 个字符)。请注意,带星号 (*) 的字段为必填项。