Cybersecurity Benchmarking: Rethinking How We Measure Readiness

March 19, 2025
Effective benchmarking is not a one-time effort.

Cyber threats are evolving rapidly, yet many organizations still rely on outdated benchmarking methods to assess the capabilities of their cyber teams.

The cost of breaches involving shadow data—information spread across multiple environments like public cloud, private cloud, and on-premises—exceeds $5 million on average. These breaches also take the longest to detect and contain, averaging 283 days.

This highlights the need for a more dynamic and real-time approach to benchmarking cyber team capabilities—one that evaluates live performance, ensuring teams can effectively detect, respond to, and recover from threats under real, high-stakes conditions.

Static assessments of cyber skills, such as in-person training or certifications, only offer a snapshot of capability at a single point in time.

Moving beyond compliance metrics

Many organizations continue to rely on historical data, industry comparisons, and static assessments—such as certifications and training courses—to evaluate the effectiveness of their cyber teams.

Traditional benchmarking exercises typically measure adherence to best practices at a single point in time and under controlled conditions. While these methods provide useful reference points, they do not always reflect how well teams will perform when faced with a real incident. A security program may meet every compliance requirement but still struggle to respond effectively in a live attack scenario.

To truly measure and enhance cyber team capabilities, organizations need more dynamic and continuous assessment methods—such as realistic, scenario-based evaluations that replicate real-life incidents, including tabletop exercises and hands-on simulations.

After all, a checklist approach does not account for how teams adapt and collaborate when familiar playbooks fail. Measuring live response times and adaptability in cyber crisis scenarios provides a clearer picture of preparedness.

A penetration test might show a vulnerability, but unless teams can rapidly detect and neutralize an actual breach, the findings have little value to truly improve security resilience.

Security teams may have cutting-edge tools, but if those tools are not used effectively when it matters, their value is limited. Real-world performance is about agility, speed, and collaboration.

Benchmarking for real-world performance

Every company faces its own unique threats, shaped by its infrastructure, business operations, and potential adversaries. When security leaders compare their organization’s unique cybersecurity skills against broad, generalized industry benchmarks, they reduce their ability to actively manage gaps and respond to the targeted threats that they are likely to face.

Benchmarking should measure not only prevention but also containment speed, incident recovery time, and the overall impact on business operations. A team that has the skill set to rapidly transition from detection to response and resolution is one that minimizes disruption.

A performance-driven approach to benchmarking ensures that defensive security efforts align with actual threats rather than static external expectations. For example, if an organization is able to track internal progress in real-time and reduce response time to a phishing attack from thirty minutes to fifteen, this improvement is more meaningful than its ranking against competitors.

Performance-based benchmarking also makes cybersecurity training more engaging. Instead of passively reviewing policies, teams benefit from hands-on learning. Crisis simulation exercises, for example, provide an opportunity to test and refine skills, offering tangible proof of whether security measures work as intended.

This approach increases engagement, reduces burnout, and strengthens instincts, making security teams better equipped when real threats emerge.

Making benchmarking a daily practice

Threat actors never stop looking for new ways to penetrate an organization's defenses, so security teams cannot treat benchmarking as a one-time activity.

Cybersecurity benchmarking is at its most effective when it is treated as a continuous process rather than a periodic assessment. Embedding benchmarking into daily security operations allows for faster identification of knowledge and skills gaps, leading to quicker course correction.

Many organizations conduct annual or quarterly evaluations, but the pace of cyber threats demands ongoing testing and refinement. If a weakness is discovered during a simulation, either technical skills or a gap in teamwork dynamics, this can be immediately addressed, rather than waiting for the next scheduled review. This fosters a culture of continuous improvement, where cyber resilience becomes a mindset rather than a milestone.

A continuous benchmarking strategy also supports workforce development. Security professionals gain experience responding to threats in real-time, honing their instincts and soft skills to work together under pressure.

Gamification for stronger engagement

Gamified approaches transform benchmarking into an active learning process, where security teams refine their defensive strategies in immersive, real-world scenarios. Security professionals who engage in scenario-based training retain more knowledge and develop a deeper understanding of popular attack techniques.

Live challenges, adversarial simulations, and hands-on exercises create an engaging environment where cybersecurity teams can test and hone skills in high-pressure environments. These approaches shift benchmarking from a passive compliance exercise to a dynamic, interactive experience.

Capture The Flag (CTF) competitions, which simulate real-world attack scenarios, require participants to think critically, solve technical challenges, and work as a team under pressure.

Participants face a range of challenges, from web application security and cryptography to reverse engineering and cloud exploitation. Each category reflects a real-world attack vector, providing an opportunity for teams to identify skill gaps and improve their response strategies.

Equally important is ensuring a structured debrief is delivered once these exercises have been completed to ensure that teams are able to fully analyze areas that were successful and those that may require improvement.

Collaboration for stronger defense

Effective benchmarking does not happen in isolation. Many organizations operate with siloed security functions, limiting visibility and coordination. A more integrated approach strengthens overall resilience. Purple team exercises, which bring together offensive (red) and defensive (blue) security teams, offer valuable insights into detection and response capabilities.

External threat intelligence also plays a key role. Organizations that align benchmarking with emerging threat trends stay ahead of evolving risks rather than reacting to outdated standards. By combining internal performance tracking with external intelligence, security teams gain a comprehensive view of their readiness.

A collaborative benchmarking strategy also extends beyond the security department. Engaging multiple stakeholders ensures benchmarking efforts reflect real-world conditions rather than theoretical best practices.

Business leaders, IT teams, and operations managers all play a central role in maintaining cyber resilience. Involving these stakeholders ensures security strategies align with broader business objectives, making cybersecurity skills development an integrated part of daily operations rather than a standalone function.

Effective benchmarking is not a one-time effort. It requires an ongoing commitment to testing, learning, and adapting. Security leaders who prioritize this approach gain a clearer understanding of their organization’s true readiness.

By focusing on live performance, resilience, and continuous growth, organizations create a stronger, more adaptive cybersecurity program, one that is prepared for whatever comes next.

About the Author

Tom Williams | Director of Global Operations at Hack The Box

Tom Williams is the Director of Global Operations at Hack The Box. Prior to stepping into this position, Thomas established and led the Customer Success function at Hack The Box.

Before joining Hack The Box, Tom began his career in the UK Government, where he spent 12 years in various security and risk-related roles. He then transitioned into consulting, joining Context Information Security (now part of Accenture), where he served as a lead investigative consultant specializing in incident response investigations and cyber preparedness.

Tom further honed his expertise in cybersecurity by moving into a technical operations role within Context’s Red Team and Penetration Testing Practice, deepening his knowledge of offensive security.

Following his time at Context, Tom joined Intruder, a UK-based startup specializing in vulnerability management. At Intruder, he worked closely with customers to enhance the effectiveness of their Vulnerability Management Programs.