CIO Influence
CIO Influence News Cloud Containers

Tenable Study Outlines the People, Process and Technology Challenges That Limit Organizations’ Ability to Prevent Attacks

Tenable Announces New Product Certification Program

Cybersecurity and IT leaders reveal ability to stop just 57% of cyberattacks; 75% point to cloud infrastructure as their highest source of risk

Tenable, the Exposure Management company, has published a new study that sheds light on the challenges cybersecurity and IT leaders face in protecting their increasingly complex and expanding attack surface. Published for Cybersecurity Awareness Month, the report titled “Old Habits Die Hard: How People, Process and Technology Challenges Are Hurting Cybersecurity Teams” reveals that in the last two years, the average organization’s cybersecurity program was prepared to preventively defend, or block, just 57% of the cyberattacks it encountered. This means 43% of attacks launched against them are successful, and must be remediated after the fact.

The study, based on a commissioned survey of 825 global cybersecurity and IT leaders conducted in 2023 by Forrester Consulting on behalf of Tenable, illuminates the people, process and technology challenges standing between modern cybersecurity and IT teams and effective risk reduction practices.

CIO INFLUENCE News: WiMi Announced a Recommendation Model Based on Heterogeneous Information Network

Nearly six in 10 (58%) respondents say they focus almost entirely on fighting successful attacks rather than working to prevent them in the first place. The study finds that this is largely due to an inability to reduce potential risks before attacks happen. Cyber professionals cite that this reactive stance is largely due to their organizations’ struggle to obtain an accurate picture of their attack surface, including visibility into unknown assets, cloud resources, code weaknesses and user entitlement systems. The complexity of infrastructure — with its reliance on multiple cloud systems, numerous identity and privilege management tools and various web-facing assets — brings with it numerous opportunities for misconfigurations and overlooked assets.

Respondents were particularly concerned with the risks associated with cloud infrastructure, given the complexity it introduces in trying to correlate user and system identities, access and entitlement data. The vast majority of respondents (75%)* view cloud infrastructure as the greatest source of exposure risk in their organization. In order, the highest perceived risks come from the use of public cloud (30%), multi cloud and/or hybrid cloud (23%), private cloud infrastructure (12%) and cloud container management tools (9%).

CIO INFLUENCE News: DataStax Integrates with LangChain, Enables Developers to Easily Build Production-Ready Generative AI Applications

Additional findings from the study include:

  • While most respondents (75%) say they consider user identity and access privileges when they prioritize vulnerabilities for remediation, fully half (50%) say their organization lacks an effective way of integrating such data into their preventive cybersecurity and exposure management practices.
  • Nearly six in 10 respondents (57%) say a lack of data hygiene prevents them from drawing quality data from user privilege and access management systems, as well as from vulnerability management systems.
  • On average, it takes 15 hours a month to create reports for business leaders about the health of organizational security infrastructure.
  • In a slight majority of organizations (53%), meetings about business-critical systems take place monthly, while 18% hold such meetings only once per year and 2% say they never hold such meetings.

This data comes at a critical point in time for publicly traded companies, following the recent introduction of SEC rules on cybersecurity risk management, strategy, governance and incident disclosure that take effect in December of this year. The new rules that mandate the disclosure of material cybersecurity incidents by public companies also stipulate that they outline their processes for assessing, identifying and managing material risks from cybersecurity threats. It also requires them to highlight the oversight processes of boards of directors and executive management in assessing and managing cybersecurity risks. For organizations that do not have these best practices and processes in place, preventive security measures will become a requirement for operations.

“Preventive security is no longer an optional approach to risk management, but a prerequisite,” said Robert Huber, chief security officer and head of research, Tenable. “The scattershot firefighting by security organizations is a recipe for failure, especially with the expansion of the attack surface and exposure points caused by trends like cloud migration and AI. We’re speaking with more and more organizations about the importance of proactively understanding and reducing risk, and this research underscores that many of them know this intuitively, but are struggling with headwinds that are often beyond their control. We hope to foster more collaborative discussion between stakeholders to simplify their practices and get to the risk data they actually need for faster prioritization and remediation.”

CIO INFLUENCE News: Commvault Earns IRAP Certification, Meeting Australian Government Standards

[To share your insights with us, please write to]

Related posts

Atos And Ooredoo Deliver Critical Cybersecurity Services To Qatar’s National Smart City Program (TASMU)

Unleashing the Power of AI in the Trading Industry QuantGate Systems Sets the Standard


Wasabi Technologies Opens Paris Storage Region as it Accelerates Global Expansion in 2022

CIO Influence News Desk