The State of Penetration Testing Global Research 2020
14 Key Takeaways On Penetration Test StrategyAdd bookmark
In today’s cyber threatscape, it’s becoming increasingly clear that security validation of the network controls and processes must take center stage in the organizational cyber security strategy.
With penetration testing being the most common practice for validation, Cyber Security Hub and Pcysys recently decided to field a survey to capture enterprise pentesting practices from cybersecurity project influencers and decision makers. Data has been collected from enterprises that currently conduct penetration testing. The findings are brought to you in their raw format for you to draw your own conclusions.
Penetration testing is a common practice in various aspects of cyber security defenses.
It is mostly performed manually by 3rd party service providers and has evolved very slowly in the past decade. It represents a point in time, is costly, talent and time dependent. Ultimately, it isn’t sufficient in today’s dynamic threat landscape.
This survey clearly indicates the practice shortcomings and the need to scale and automate these tests while maintaining control of the activity’s cost.
Walk away with a better understanding of:
- The effect penetration testing has on the enterprise security strategy
- How to others leverage their teams to better improve cyber resilience
- A new, automated, approach to continuous security validation