The State of Penetration Testing Global Research 2020

14 Key Takeaways On Penetration Test Strategy

Add bookmark

Seth Adler

We respect your privacy, by clicking "Download Your Copy" you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest subject to their privacy policy. You have the right to object. In addition, you will receive our e-newsletter, including information on related online learning opportunities. For further information on how we process and monitor your personal data, and information about your privacy and opt-out rights, click here.

In today’s cyber threatscape, it’s becoming increasingly clear that security validation of the network controls and processes must take center stage in the organizational cyber security strategy.

With penetration testing being the most common practice for validation, Cyber Security Hub and Pcysys recently decided to field a survey to capture enterprise pentesting practices from cybersecurity project influencers and decision makers. Data has been collected from enterprises that currently conduct penetration testing. The findings are brought to you in their raw format for you to draw your own conclusions.

Penetration testing is a common practice in various aspects of cyber security defenses.

It is mostly performed manually by 3rd party service providers and has evolved very slowly in the past decade. It represents a point in time, is costly, talent and time dependent. Ultimately, it isn’t sufficient in today’s dynamic threat landscape. 

This survey clearly indicates the practice shortcomings and the need to scale and automate these tests while maintaining control of the activity’s cost.

Walk away with a better understanding of:

  • The effect penetration testing has on the enterprise security strategy
  • How to others leverage their teams to better improve cyber resilience
  • A new, automated, approach to continuous security validation
Sponsored By: