Search
Edgescan on AWS Marketplace: Seamless Security Testing, Natively Integrated with AWS
Vulnerability Management Maturity Model

A Framework to Determine your Cyber Security Maturity

Is Your Vulnerability Management Program Mature?

While corporations are advancing to meet the ever expanding cyber threat, there is uncertainty whether they are actually prepared.

It’s Not All Bad.

They can point to improvements in automated tools and key hires and some success in catching vulnerabilities.

What the Enterprise DOES Know?

They DO know that major Cyber Security incidents are happening on a daily basis just by reading the front page of the news.

And they do know that they are not prepared to avoid being the next front page news

The Problem

The ever expanding and dynamic attack surface across the full stack produces blind spots.

And automated detection tools produce an abundance of noise (false positives) that murk the waters even further.

Blind Spots

The Global 3000 Enterprise simply does not know what it does not know.

And Companies are Simply Not Ready

“More than half of businesses are not prepared for Cyber Attacks” (Cyber Trendscape Report 2020)

So We Developed a Maturity Framework

Based on Eight Evaluation Criteria, we developed a model that places each company into five categories:

  • Lagard (1) – 15%
  • Formative (2) – 20%
  • Traditional (3) – 50%
  • Progressive (4) – 10%
  • Mature (5) – 5%

Your Vulnerability Management Maturity

Let’s discuss your maturity level with the following framework.

Vulnerability Management Maturity Model Criteria

Evaluation CriteriaQuestionLagardFormativeTraditionalProgressiveMature
ManagementWho is the most senior cyber security executive?NobodyAn IT ManagerA team Lead/Senior ManagerA VP/DirectorCISO Implicit throughout organization.
StaffingWhat is your current cyber security staffing makeup?None1 Cyber Security Professional1-4 Cyber Security Professionals5-8 Cyber Security Professionals9+ Cyber Security Professionals
GoalsWhat is the primary goal of your current cyber security program?Non-ExistentAd-HocAssessment & ComplianceAttack ManagementBusiness Risk Management
IntelligenceHow comprehensive is your intelligence view?No intelligence/business contextNo full stack coverageNo full stack vulnerability viewRisk Based ViewValidated vulnerability intelligence & business context
ProcessesHow proactive and automated are your cyber security processes?Ad-hoc Patching/mitigation No processHaphazard mitigation/patching Ad-hoc assessmentCompliance Driven Infrequent process cadenceScheduled & on-demand Proactive PatchingScheduled, Continuous & On-demand Assessments
ResilienceHow prepared are you to react to a cyber event?UnknownUnpreparedRecovery CapabilitiesDetection and Protection CapabilitiesAdaptive strategies & mature actionable intelligence available.
Operational WorkflowHow do you put your cyber security intelligence into actual operational remediation?NoneManualSome automated integrationFull AutomatedFully automated integrated with expert remediation guidance
Tools / CapabilityWhat are your current VM tools capabilities?
  • No Metrics
  • No Attack Surface Visibility
  • Desktop Tool-based.
  • No Metrics/ improvement tracking
  • No Attack Surface Visibility
  • External scanning only
  • Desktop Tool-based.
  • Weak metrics
  • Weak visibility/ Attack surface management
  • No schedule / Not continuous / Ad-hoc
  • Weak coverage / Not full stack
  • No Integration to ticketing
  • External and Internal assessments
  • SaaS based tooling
  • Metrics and trending Vulnerability Tracking
  • Full-stack correlation and coverage
  • Self-validated vulnerability intelligence
  • Integration to ticketing
  • Ad-hoc Visibility
  • Manual ad-hoc pen testing / Saas SaaS-based service
  • Integrated systems and Alerts in real-time
  • Optimum visibility
  • Attack Surface Management
  • API Discovery & vulnerability management
  • Expert Support on demand
  • Ondemand -Pen testing as a Service (PTaaS)
  • VM & PTaaS in a single view
  • Compliance Mapping

* Based on a sample size of 789 global 3000s.

Human Touch

“Human Expertise is the Key To Effective Cybersecurity Automation”

“Getting real value and effective cybersecurity from these tools require a human touch” (Tom Gorup, Security Boulevard