The State of Penetration Testing Global Research 2020

14 Key Takeaways On Penetration Test Strategy

Add bookmark
Seth Adler
Seth Adler
08/03/2020

In today’s cyber threatscape, it’s becoming increasingly clear that security validation of the network controls and processes must take center stage in the organizational cyber security strategy.

With penetration testing being the most common practice for validation, Cyber Security Hub and Pcysys recently decided to field a survey to capture enterprise pentesting practices from cybersecurity project influencers and decision makers. Data has been collected from enterprises that currently conduct penetration testing. The findings are brought to you in their raw format for you to draw your own conclusions.

Penetration testing is a common practice in various aspects of cyber security defenses.

It is mostly performed manually by 3rd party service providers and has evolved very slowly in the past decade. It represents a point in time, is costly, talent and time dependent. Ultimately, it isn’t sufficient in today’s dynamic threat landscape. 

This survey clearly indicates the practice shortcomings and the need to scale and automate these tests while maintaining control of the activity’s cost.

Interested in presenting your own Case Study?

Share best practice, ideas and solutions to our global community of over 120,000 senior cyber security professionals.
View our latest Media Kit to learn more about our audience and review our content calendar. Download Now

Learn More

Walk away with a better understanding of:

  • The effect penetration testing has on the enterprise security strategy
  • How to others leverage their teams to better improve cyber resilience
  • A new, automated, approach to continuous security validation
Sponsored By:

RECOMMENDED