The State of Penetration Testing Global Research 2020

14 Key Takeaways On Penetration Test Strategy

Add bookmark

In today’s cyber threatscape, it’s becoming increasingly clear that security validation of the network controls and processes must take center stage in the organizational cyber security strategy.

With penetration testing being the most common practice for validation, Cyber Security Hub and Pcysys recently decided to field a survey to capture enterprise pentesting practices from cybersecurity project influencers and decision makers. Data has been collected from enterprises that currently conduct penetration testing. The findings are brought to you in their raw format for you to draw your own conclusions.

Penetration testing is a common practice in various aspects of cyber security defenses.

It is mostly performed manually by 3rd party service providers and has evolved very slowly in the past decade. It represents a point in time, is costly, talent and time dependent. Ultimately, it isn’t sufficient in today’s dynamic threat landscape. 

This survey clearly indicates the practice shortcomings and the need to scale and automate these tests while maintaining control of the activity’s cost.

Walk away with a better understanding of:

  • The effect penetration testing has on the enterprise security strategy
  • How to others leverage their teams to better improve cyber resilience
  • A new, automated, approach to continuous security validation
Sponsored By:

More From Pcysys

14 Insights On The State Of Pen Test Strategy

In a recent survey of the Cyber Security Hub Audience, only 25% stated their pentesting methods w...

2020-07-29
14 Insights On The State Of Pen Test Strategy

State of the Practice: Enterprise Cyber Security Penetration Testing

In a new report from Cyber Security Hub, enterprise security professionals were surveyed about their...

2020-05-27
State of the Practice: Enterprise Cyber Security Penetration Testing

A CISO's Take on Continuous Security Validation

The inability to continuously test security controls in the network and prioritize remediation ac...

2020-04-15
A CISO's Take on Continuous Security Validation

The Age Of Automation In Security Control Validation

Continuous vigilance is now possible for validation of enterprise security controls. Whether necessa...

2020-02-12
The Age Of Automation In Security Control Validation

Sponsor Page

Recommended