Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

InfoSec teams fight dual battle: Limited visibility and board communication

By Vinay Sridhara
cyber professional
November 4, 2020

Vulnerability management has evolved tremendously in recent years, especially with automated monitoring systems providing continuous analysis of enterprise networks to effectively reduce risk.

Amid the current landscape and the shift to remote work policies due to COVID-19, organizations have undergone a rapid digital transformation to support business continuity. The adoption of new technologies such as cloud-based applications and IoT devices have introduced a myriad of vulnerabilities for malicious actors to exploit, and unfortunately, legacy vulnerability management tools are not able to provide organizations with the visibility or cyber-risk insights to protect this new array of asset types.

As a result, cybersecurity teams struggle with a lack of visibility into threats, endpoint devices, access privileges, and other essential security controls necessary for a robust cybersecurity posture. Without full visibility into their entire digital ecosystem, infosec teams cannot fully secure the assets on their networks or effectively prioritize the most serious threats.

There is a distinct relationship between clear visibility and effectively being able to report cyber risk. Below, I dive into how security professionals are still fighting the battle between effectively viewing serious threats and communicating cyber risk to company leadership.

Limited visibility remains top challenge

It is more and more challenging to keep track of the ever-growing number of non-traditional assets such as bring-your-own devices, IoT, mobile assets, and cloud services, and gaps in asset coverage are leaving cybersecurity leaders with more questions than answers. According to a recent study, the State of the Enterprise Security Posture Report, a majority of organizations (64%) lack confidence in the state of their security posture which is driven by inadequate visibility. Six in 10 organizations say that they are only aware of fewer than 75% of the devices on their network, with most claiming only spotty understanding of asset business criticality and categorization. What’s more, 46% of respondents find it hard to tell which vulnerabilities are real threats versus ones that will never be exploited.

Constant visibility across all the devices and applications on a network, across the hundreds of attack vectors an organization is susceptible to, and across the risk associated with open vulnerabilities, continues to be a primary challenge for infosec teams. This lack of awareness makes it extremely difficult to improve security posture and extends to significant causes of concern for risk - especially when an organization is incapable of clearly viewing the critical threats that their organization faces.

A vast majority (89%) of organizations stated that the security threats of most concern are phishing, web, and ransomware attacks. However, when asked which risk areas that they have visibility into, less than half (48%) confirmed continuous visibility of phishing, web, and ransomware threats. This creates a massive disconnect between the identified biggest risk and visibility into that risk, which is of huge concern.

Phishing is a key driver of risk for organizations because once an internal user falls victim to phishing, the attacker can move laterally in the infrastructure to cause more destruction. Even more, this issue is exacerbated by the fact that 81% of organizations report users having too much access to privileged data. If privileged access to business-critical assets is not closely monitored, the likelihood of a massive breach grows substantially.

An organization is only as secure as its weakest link, and they cannot protect what they cannot see. Companies must gain full visibility into the threats affecting negligent users, and vulnerabilities around privileged user assets should be managed with high urgency and high priority. Steps should also be taken to limit access privileges where possible.

Breach risk prioritization and communication
Cybersecurity has taken on a central role in the enterprise, with infosec teams engaging with the C-suite and board members more than ever before. This has placed a larger burden on reporting requirements, particularly when attempting to explain risk and costs to executives. Yet, with the growing amount of security posture issues that Infosec leaders face, the burden is now heavier than ever, and board presentations are a major challenge.

Only a small minority (13%) of security leaders think that they “nailed” their last board or senior management presentation and that they presented relevant data in easily understood business language. Unfortunately, over half (52%) said that their board presentation only went okay, and that they felt as if they were able to get the point across but not able to secure the expected outcome.

To continue to do their jobs effectively and conduct successful board presentations, security teams say they need tools that can improve the reporting process. 25% feel they are inundated with far too many alerts to take action, and 1 in 5 believe they are unable to prioritize security issues by business criticality.

It is critical that cybersecurity leaders do not settle for “okay” board presentations. Successful board-level presentations stem from quantifiable risk metrics and intuitive visualizations that can easily be understand by a non-technical audience. Infosec professionals must focus on business objectives and help stakeholders understand the company's current cyber risk state, where it should be, and how the company can strengthen this state.

Board engagement coupled with the necessary tools

Cybersecurity is a critical role in the enterprise, and security leaders must know how to engage with leadership to better protect their organizations as they adapt to distributed work and adopt new technologies. Without the proper tools to effectively assess, monitor and communicate risk, infosec teams are limited in their ability to strengthen cybersecurity posture for the organization.

Fortunately, there are vulnerability management tools on the market today that provide organizations with continuous, comprehensive visibility into the highest risks, including not only where weaknesses or vulnerabilities exist, but also the likeliness of those weaknesses impacting the business. From there, prioritizing fixes for the riskiest issues will ensure maximum breach reduction and the most efficient security team possible.

KEYWORDS: business continuity cyber security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Vinay sridhara

Dr. Vinay Sridhara has more than a decade of R&D experience in Wireless communication, Security, and Machine Learning. Prior to joining Balbix as CTO, Vinay worked at Qualcomm Research for over 9 years, where he worked on wireless networking, mobile security and machine learning. While at Qualcomm, he served on several IEEE 802.11 working groups and contributed to several core areas in these standards. Vinay has a Ph.D. in ECE and Masters in CS from USC and University of Delaware. He has authored many research papers, and holds over 100 patents.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Revised NIST Cyber Security Framework - Security Magazine

    How to lead an economical and efficient infosec program

    See More
  • cyber security

    Cybersecurity teams must proactively fight ransomware

    See More
  • Mass Communication Systems Gain New Visibility

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing