Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

InfoSec teams fight dual battle: Limited visibility and board communication

By Vinay Sridhara
cyber professional
November 4, 2020

Vulnerability management has evolved tremendously in recent years, especially with automated monitoring systems providing continuous analysis of enterprise networks to effectively reduce risk.

Amid the current landscape and the shift to remote work policies due to COVID-19, organizations have undergone a rapid digital transformation to support business continuity. The adoption of new technologies such as cloud-based applications and IoT devices have introduced a myriad of vulnerabilities for malicious actors to exploit, and unfortunately, legacy vulnerability management tools are not able to provide organizations with the visibility or cyber-risk insights to protect this new array of asset types.

As a result, cybersecurity teams struggle with a lack of visibility into threats, endpoint devices, access privileges, and other essential security controls necessary for a robust cybersecurity posture. Without full visibility into their entire digital ecosystem, infosec teams cannot fully secure the assets on their networks or effectively prioritize the most serious threats.

There is a distinct relationship between clear visibility and effectively being able to report cyber risk. Below, I dive into how security professionals are still fighting the battle between effectively viewing serious threats and communicating cyber risk to company leadership.

Limited visibility remains top challenge

It is more and more challenging to keep track of the ever-growing number of non-traditional assets such as bring-your-own devices, IoT, mobile assets, and cloud services, and gaps in asset coverage are leaving cybersecurity leaders with more questions than answers. According to a recent study, the State of the Enterprise Security Posture Report, a majority of organizations (64%) lack confidence in the state of their security posture which is driven by inadequate visibility. Six in 10 organizations say that they are only aware of fewer than 75% of the devices on their network, with most claiming only spotty understanding of asset business criticality and categorization. What’s more, 46% of respondents find it hard to tell which vulnerabilities are real threats versus ones that will never be exploited.

Constant visibility across all the devices and applications on a network, across the hundreds of attack vectors an organization is susceptible to, and across the risk associated with open vulnerabilities, continues to be a primary challenge for infosec teams. This lack of awareness makes it extremely difficult to improve security posture and extends to significant causes of concern for risk - especially when an organization is incapable of clearly viewing the critical threats that their organization faces.

A vast majority (89%) of organizations stated that the security threats of most concern are phishing, web, and ransomware attacks. However, when asked which risk areas that they have visibility into, less than half (48%) confirmed continuous visibility of phishing, web, and ransomware threats. This creates a massive disconnect between the identified biggest risk and visibility into that risk, which is of huge concern.

Phishing is a key driver of risk for organizations because once an internal user falls victim to phishing, the attacker can move laterally in the infrastructure to cause more destruction. Even more, this issue is exacerbated by the fact that 81% of organizations report users having too much access to privileged data. If privileged access to business-critical assets is not closely monitored, the likelihood of a massive breach grows substantially.

An organization is only as secure as its weakest link, and they cannot protect what they cannot see. Companies must gain full visibility into the threats affecting negligent users, and vulnerabilities around privileged user assets should be managed with high urgency and high priority. Steps should also be taken to limit access privileges where possible.

Breach risk prioritization and communication
Cybersecurity has taken on a central role in the enterprise, with infosec teams engaging with the C-suite and board members more than ever before. This has placed a larger burden on reporting requirements, particularly when attempting to explain risk and costs to executives. Yet, with the growing amount of security posture issues that Infosec leaders face, the burden is now heavier than ever, and board presentations are a major challenge.

Only a small minority (13%) of security leaders think that they “nailed” their last board or senior management presentation and that they presented relevant data in easily understood business language. Unfortunately, over half (52%) said that their board presentation only went okay, and that they felt as if they were able to get the point across but not able to secure the expected outcome.

To continue to do their jobs effectively and conduct successful board presentations, security teams say they need tools that can improve the reporting process. 25% feel they are inundated with far too many alerts to take action, and 1 in 5 believe they are unable to prioritize security issues by business criticality.

It is critical that cybersecurity leaders do not settle for “okay” board presentations. Successful board-level presentations stem from quantifiable risk metrics and intuitive visualizations that can easily be understand by a non-technical audience. Infosec professionals must focus on business objectives and help stakeholders understand the company's current cyber risk state, where it should be, and how the company can strengthen this state.

Board engagement coupled with the necessary tools

Cybersecurity is a critical role in the enterprise, and security leaders must know how to engage with leadership to better protect their organizations as they adapt to distributed work and adopt new technologies. Without the proper tools to effectively assess, monitor and communicate risk, infosec teams are limited in their ability to strengthen cybersecurity posture for the organization.

Fortunately, there are vulnerability management tools on the market today that provide organizations with continuous, comprehensive visibility into the highest risks, including not only where weaknesses or vulnerabilities exist, but also the likeliness of those weaknesses impacting the business. From there, prioritizing fixes for the riskiest issues will ensure maximum breach reduction and the most efficient security team possible.

KEYWORDS: business continuity cyber security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Vinay sridhara

Dr. Vinay Sridhara has more than a decade of R&D experience in Wireless communication, Security, and Machine Learning. Prior to joining Balbix as CTO, Vinay worked at Qualcomm Research for over 9 years, where he worked on wireless networking, mobile security and machine learning. While at Qualcomm, he served on several IEEE 802.11 working groups and contributed to several core areas in these standards. Vinay has a Ph.D. in ECE and Masters in CS from USC and University of Delaware. He has authored many research papers, and holds over 100 patents.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Revised NIST Cyber Security Framework - Security Magazine

    How to lead an economical and efficient infosec program

    See More
  • cyber security

    Cybersecurity teams must proactively fight ransomware

    See More
  • walkie-talkie-2534576_1920

    Communication changes for remote security teams

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!