Corporate security vulnerability levels are worse than thought

Nearly 85% of security and IT leaders feel their programs are mature, but the data reveals otherwise, Israel's Vulcan Cyber says

Corporate security vulnerability levels are worse than thought

Photo: Bigstock

Israeli cybersecurity company Vulcan Cyber announced Wednesday the results of a research project conducted to better gauge the maturity of enterprise vulnerability management programs. Surprisingly, 84% of respondents felt their programs were mature, but a deeper dive revealed a major disconnect between perception and reality, according to the company. 

Vulcan Cyber said it surveyed more than 100 security and IT leaders about the current state of vulnerability management at their companies and compared the results to its vulnerability remediation maturity model which was developed to help companies fix vulnerabilities and reduce business risk. 

"We already know most enterprise vulnerability management programs are immature. We see it every day in the field. We mapped the survey results against our maturity model to helping IT leaders shift their focus from simply managing vulnerabilities to actual remediation," said Yaniv Bar-Dayan, co-founder and CEO of Vulcan Cyber. "What caught us off guard was that the vast majority of respondents felt their programs were already mature. Given the amount of breaches caused by known, unpatched vulnerabilities, we discovered a surprising disconnect that merits a closer look."

Vulcan Cyber worked with US-based Pulse, tapping into its social research platform of CIOs, CISOs, and other tech leaders to survey the readiness of enterprise vulnerability management programs. 

The survey found that the most mature element of enterprise vulnerability management programs is vulnerability scanning (72%), followed by the effective use of vulnerability remediation tools (49%) and vulnerability prioritization (44%). The three least-mature elements are orchestrated, collaborative remediation (48%), continuous, automated remediation (48%) and business alignment around cyber hygiene objectives (31%), Vulcan Cyber said. 

Also, 89% of security and IT teams said they spend at least some time collaborating with cross-functional teams to remediate vulnerabilities, with 42 % reporting they spend "a lot" or "too much" (7%) time every week working with other teams. A notable 83% of companies that said they spend too much time collaborating with other teams have 500-1,000 employees.

The survey also found that roughly 50% of IT and security teams share responsibility for key remediation functions, revealing an opportunity to facilitate more effective and efficient collaboration by clearly defining the division of labor.

"Vulnerability scanning and prioritization are essential functions, but they are the bare minimum -- not what constitutes a mature program," Bar-Dayan said. "In our experience, program bottlenecks are further along in the remediation lifecycle, stemming from inefficient cross-team collaboration. Changing the status quo requires organizations to update and automate their remediation processes. It's a heavy undertaking, but one that transforms vulnerability management programs into a powerful lever for shrinking security debt and strengthening the company's security posture."

You might be interested also