Driving Cyber Maturity: Cybersecurity Program Management

About this report

Data collection: Jan 10 - Feb 13, 2023

Respondents: 189 IT and information security leaders whose organizations have implemented or are developing a strategy for cybersecurity program management

Cybersecurity program management helps IT and security leaders evaluate and improve their organization’s security posture to achieve cyber maturity. How are leaders implementing cybersecurity program management and what impacts have they seen so far?

One minute insights:

  • Magnifying Glass lock search iconMost surveyed leaders have already implemented cybersecurity program management
  • Zig Zag Arrow Up iconNearly all respondents report that cybersecurity program management has improved their security metrics
  • barrier traffic warning iconCommonly reported challenges include a lack of available staff, skills gaps and risk management program deficiencies
  • third party iconThird-party services for cybersecurity monitoring and management are widely used among surveyed leaders
  • Shuffle arrow iconMost who have defined their program’s future state, or are working on doing so, say that there is cross-functional collaboration on this effort

The majority have implemented cybersecurity program management and agree that it helps their communication with leadership/the board

Have you implemented cybersecurity program management activities and/or solutions?

Have you implemented cybersecurity program management activities and/or solutions?

Over half (52%) of all surveyed leaders (n = 189) have implemented cybersecurity program management, and about one-third (32%) say implementation is in progress.

n=189

Respondents who answered “we intend to, but no plans are in place at this time” or “no” were eliminated from the survey.

Nearly all (99%) of those who have implemented cybersecurity program management (n = 98) agree or strongly agree that it supports communication with leadership or the board as it helps them explain how business risk is impacted by program improvements and evolving threats.

Do you agree with the following statement: “Cybersecurity program management helps me explain to leadership/the board how program improvements and evolving threats impact business risk.”

Do you agree with the following statement: “Cybersecurity program management helps me explain to leadership/the board how program improvements and evolving threats impact business risk.”

n = 98

Disagree 0% | Strongly disagree 0%

Respondents who answered “yes” to “Have you implemented cybersecurity program management activities and/or solutions?”

lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals

Question: Do you have any final thoughts to share on cybersecurity program management?

This is for companies that have a high level of cybersecurity maturity. Like anything else, other areas within cybersecurity will be more important before you come to a point where you do [cybersecurity program management].

VP, manufacturing industry, 10,000+ employees

Industry-specific metrics and governance controls severely constrain maturity progress.

VP, healthcare industry, 5,000 - 10,000 employees

Threats are for real and much bigger than we initially thought. We can never be comfortable with what we have.

C-suite, software industry, <1,000 employees

Cybersecurity program management improves security metrics but many face challenges with team availability and skills gaps

95% of surveyed leaders who have implemented (n = 98) cybersecurity program management say it had a positive impact on their security metrics, with about one-quarter (24%) reporting a significantly positive impact.

Has cybersecurity program management had a positive or negative impact on your security metrics (e.g., mean time to detection, mean time to recovery)?

Has cybersecurity program management had a positive or negative impact on your security metrics (e.g., mean time to detection, mean time to recovery)?

n = 98

Moderately negative impact 0% | Significantly negative impact 0% | Not sure 0%

Respondents who answered “yes” to “Have you implemented cybersecurity program management activities and/or solutions?”

Note: Sum may not add up to 100% due to rounding

Among the same group (n = 98), the most commonly reported challenges faced in managing their cybersecurity program are a lack of available staff (46%) and skills gaps (45%).

About one-third are struggling with deficiencies in their risk management program (35%), inflexible governance processes (31%) and under utilized security tools or licenses (31%).

What challenges have you encountered in managing your cybersecurity program? Select all that apply.

What challenges have you encountered in managing your cybersecurity program? Select all that apply.

n = 98

Insufficient reporting capabilities or metrics 29% | Controls provide inadequate visibility 24% | Documentation issues (e.g., not easy to access or understand for non-technical individuals) 20% | Out-of-date security tools 17% | Program doesn’t address technical skill sets outside IT 14% | Lack of collaboration between organizational stakeholders and security/IT staff 12% | Lack of consensus on risk prioritization 10% | Metrics lack context (i.e., metrics are not meaningful to leadership/board) 9% | Decision-making power lies outside of IT/security 6% | None of these 3% | Other 0%

Respondents who answered “yes” to “Have you implemented cybersecurity program management activities and/or solutions?”

Question: Do you have any final thoughts to share on cybersecurity program management?

We have evaluated a few vendors, and we feel a solid cybersecurity program for email phishing is missing from the vendors we evaluated.

VP, software industry, <1,000 employees

Quite complex to wrap security around the IT systems and implement governance.

Director, manufacturing industry, 10,000+ employees

Distributed visibility seems to be a major issue for us — delegating segmented access to groups/divisions. Reporting can do it, but isn’t interactive.

Director, educational services industry, 10,000+ employees

Many use third-party services for cybersecurity program management and over three-quarters conduct regular threat assessments

What methods do you use or plan to use for cybersecurity program management? Select all that apply.

What methods do you use or plan to use for cybersecurity program management? Select all that apply.

Most surveyed leaders who have implemented cybersecurity program management or are in the process of doing so (n = 158) look to third-party services for monitoring or management (63%) and 58% use consulting services.

None of these 1% | Other 0%

n = 158

Respondents who answered “yes” or “implementation is in progress” to “Have you implemented cybersecurity program management activities and/or solutions?”

From the same group (n = 158), most respondents either currently or plan to conduct threat assessments (80%) or risk evaluations (72%) on a regular basis, and over half cited regular reviews for policy (58%), incidents (56%) or controls (55%).

Just over one-third say they regularly conduct or plan to conduct assessments for applications (38%), training program validation (35%) or issue remediation (34%).

Which of the following assessments are or will be conducted on a regular basis (whether they will be done internally or using external consultants)? Select all that apply.

Which of the following assessments are or will be conducted on a regular basis (whether they will be done internally or using external consultants)? Select all that apply.

n = 158

System assessments 44% | Change management process assessments 43% | Application assessments 38% | Training program validation 35% | Issue remediation 34% | Baseline assessments 23% | Facility assessments 11% | None of these 0% | Not sure 0% | Other 0%

Respondents who answered “yes” or “implementation is in progress” to “Have you implemented cybersecurity program management activities and/or solutions?”

Question: Do you have any final thoughts to share on cybersecurity program management?

Although we have external companies who test our cybersecurity program, we intend to strengthen this as a form of training for our staff by doing more social engineering.

C-suite, professional services industry, 1,000 - 5,000 employees

Cyber risk is a difficult area because the greater visibility we provide over vulnerabilities or gaps in our solutions, the more noise occurs. Unfortunately, executive teams have gotten into the habit of cyber risk as a zero-sum game, and unless you can show you have mitigated every risk, they will raise concerns. Trying to get executive teams to document their risk tolerance has proven unsuccessful.

C-suite, government, 1,000 - 5,000 employees

Some have both a defined target state for their cybersecurity program and a roadmap to reach it; cross-functional collaboration in this area is common

Have you defined a target (i.e., future) state for your cybersecurity program?

Have you defined a target (i.e., future) state for your cybersecurity program?

Out of all surveyed respondents (n = 189), less than half (43%) have defined a future state for their cybersecurity program.

n = 189

All respondents

Note: Sum may not add up to 100% due to rounding

73% of those with a defined future state for their program (n = 82) have already developed a roadmap to achieve it.

Have you developed a roadmap to address gaps between the current and target state of your cybersecurity program?

Have you developed a roadmap to address gaps between the current and target state of your cybersecurity program?

n = 82

Respondents who answered “yes” to “Have you defined a target (i.e., future) state for your cybersecurity program?”

70% of surveyed leaders who have or are in the process of defining the future state of their cybersecurity program (n = 181) report that staff outside of IT/security also participate in this activity.

Are staff from other business units (i.e., individuals outside of IT/security) involved in defining the target state of your cybersecurity program?

Are staff from other business units (i.e., individuals outside of IT/security) involved in defining the target state of your cybersecurity program?

n = 181

Respondents who answered “yes” or “we’re currently in the process of defining our target state” to “Have you defined a target (i.e., future) state for your cybersecurity program?”

Question: Do you have any final thoughts to share on cybersecurity program management?

Maintaining end-user awareness/engagement continues to be a challenge even with awareness reminders/content, phishing campaigns and awareness training. So while most tools/platforms may help reduce the potential attack surface, having security-conscious employees is a continual goal to improve and educate.

Director, arts and entertainment industry, 10,000+ employees

There is a lot of work to still do, but we are making progress.

VP, government, 10,000+ employees

Our cybersecurity program management is a shared responsibility between IT (1st line of defense) and the business's internal risk management group (2nd line of defense).

C-suite, finance industry, 1,000 - 5,000 employees
A lightbulb

Want more insights like this from leaders like yourself?

Click here to explore the revamped, retooled and reimagined Gartner Peer Community. You'll get access to synthesized insights and engaging discussions from a community of your peers.

Respondent Breakdown

Screenshot 2023-11-02 at 13.45.15

Note: Sum may not add up to 100% due to rounding