Dark ReadingArchived Apr 07, 2026✓ Full text saved
A panel of five C-suite leaders discuss how cybersecurity success is measured and why it isn't improving results.
Full text archived locally
✦ AI Summary· Claude Sonnet
CYBER RISK
CYBERSECURITY ANALYTICS
CYBERSECURITY OPERATIONS
Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.
Lies, Damned Lies, and Cybersecurity Metrics
A panel of five C-suite leaders discuss how cybersecurity success is measured and why it isn't improving results.
Joan Goodchild,Contributing Writer, Dark Reading
April 7, 2026
4 Min Read
SOURCE: PAULAPHOTO VIA ADOBE STOCK
Despite years of increased spending, investments in more tooling, and more talent flooding into the industry, cybersecurity outcomes seem to be getting worse. During a panel discussion in Las Vegas last month, a group of cybersecurity leaders said the problem runs deeper than attackers or technology. The panel, titled "Hard Truths in Cybersecurity: Fear, Liability, and the Industry's Biggest Lies," focused on what's broken in cybersecurity.
"Every year, we do more, and every year, the results get worse," said Andrew Rubin, CEO of Illumio. "The number of breaches, the size of the breaches, and the economic losses have gone up."
SolarWinds CISO Tim Brown, Microsoft deputy CISO Sherrod DeGrippo, CEO and founder of Fortalice Solutions and former White House CIO Theresa Payton, and Nationwide Building Society chief security and resilience officer David Boda discussed the disconnect between investment and outcomes. What emerged from the discussion was a set of assumptions the industry continues to rely on for successful defense, even as the results suggest otherwise.
Related:Shadow AI in Healthcare Is Here to Stay
Lie 1: Activity Equals Progress
There is a misalignment in how cybersecurity is measured and managed.
"I do believe that cybersecurity is fundamentally broken,"Payton said. "It's measured in terms of activity instead of reduction of threat surface."
The emphasis on checklists, metrics, and compliance frameworks, rather than outcomes, has created a system where organizations can appear secure on paper while remaining exposed in practice. Organizations need to rethink how they define success, starting with how security controls actually affect users and business operations."We need to literally start with the human user story," Payton said, pointing to the disconnect between security programs and how employees and customers interact with systems. Many security awareness programs have also become routine and ineffective.
"Your cybersecurity awareness training — they're snoozing, they're losing. So just reimagine, reenergize."
Instead of periodic training, Payton suggested reinforcing secure behavior through incentives, recognition, and integrating security into everyday workflows.
Lie 2: We Can Prevent Everything
If prevention falls short, what's next?"You cannot protect everything," Payton said, noting that means understanding what matters most to the organization — not just systems, but data, business processes, and the company's "crown jewels." For Nationwide's Boda, that shift is already reflected in how security teams operate."I spend like 50% of my time on response and recovery, not because we get hit every day, but because that's really hard to do right," Boda said.Building the ability to respond under pressure and restore operations requires coordination across the organization and repeated practice."To get a whole organization to respond and recover effectively under pressure is really important,"Boda said.That requires building repeatable processes and coordination across teams, not just adding more controls, he added.
Related:Why a 'Near-Miss' Database Is Key to Improving Information Sharing
Lie 3: We Understand Our Threats
Microsoft's DeGrippo noted a gap in how organizations approach threat modeling. In many cases, they are operating on assumptions about how attacks happen.
"People talk a lot about threat models, but they don't actually have anything written down," DeGrippo said. "They haven't actually done the research."Security teams need to be prepared for attacks from all parts of the threat landscape. Regardless of motive, by the time attribution happens, the attacker is already inside. The distinction between different threat actors matters less in practice, DeGrippo said. Whether an attack is financially motivated or nation-state backed, the tactics are often similar and the outcome is the same once access is established.DeGrippo also noted a growing third category of attacker: socially motivated actors. With artificial intelligence (AI) lowering the barrier to entry, a single individual can operate with the scale and persistence once associated with more sophisticated groups. That means security teams need to focus less on who the attacker is and more on how quickly the attacker can gain and maintain access.
Related:With Government's Role Uncertain, Businesses Unite to Combat Fraud
Lie 4: More Technology Will Fix It
AI is accelerating both sides of the equation, forcing organizations to decide how they are going to use it. The technology is already capable of automating large parts of detection and response, but it is not yet ready for 100% automation, Fortalice's Payton said. Organizations should focus on building auditability, visibility, and control before expanding automation further.At the same time, those same capabilities are reshaping the threat landscape."An agent doesn't get tired," SolarWinds' Brown said. "An agent can read emails for a year and slowly go after things."That kind of persistence changes the economics of attack. What once required significant resources can now be sustained indefinitely. And AI's impact is already visible."Technology has put the power of a nation-state in the hands of organized crime," Brown said.Many organizations still rely on legacy approaches, such as signature-based detection and traditional data loss prevention. Those controls continue to have a role but are often treated as sufficient when they are not, Nationwide's Boda said. Organizations need to evaluate how those defenses perform against real-world attack scenarios.
Lie 5: We Know What's Working
Another often-incorrect assumption is that systems are configured correctly. In most cases, the security issues are not the result of malice. The issues often come from routine changes, such as increased access or configuration drift that no one noticed. Teams need to continuously audit and test environments to catch risks that traditional scans miss. Security must be treated as something that is continuously validated, not assumed to be working."Don't assume, don't trust, verify," Brown said.
About the Author
Joan Goodchild
Contributing Writer, Dark Reading
Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online.
Want more Dark Reading stories in your Google search results?
ADD US NOW
More Insights
Industry Reports
AI SOC for MDR: The Structural Evolution of Managed Detection and Response
How Enterprises Are Developing Secure Applications
Frost Radar™: Non-human Identity Solutions
2026 CISO AI Risk Report
Gartner IGA Voice of the Customer 2026
Access More Research
Webinars
Identity Maturity Under Pressure: 2026 Findings and How to Catch Up
Building a Robust SOC in a Post-AI World
Retail Security: Protecting Customer Data and Payment Systems
Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need
Securing Remote and Hybrid Work Forecast: Beyond the VPN
More Webinars
You May Also Like
CYBER RISK
Switching to Offense: US Makes Cyber Strategy Changes
by Robert Lemos, Contributing Writer
NOV 21, 2025
CYBER RISK
Microsoft Exchange 'Under Imminent Threat,' Act Now
by Arielle Waldman
NOV 12, 2025
CYBERATTACKS & DATA BREACHES
DeepSeek Breach Opens Floodgates to Dark Web
by Emma Zaballos
APR 22, 2025
CYBER RISK
Why Data Privacy Isn't the Same as Data Security
by Chris Borkenhagen
APR 10, 2025
Edge Picks
APPLICATION SECURITY
AI Agents in Browsers Light on Cybersecurity, Bypass Controls
CYBER RISK
Browser Extensions Pose Heightened, but Manageable, Security Risks
CYBERSECURITY OPERATIONS
Video Convos: Agentic AI, Apple, EV Chargers; Cybersecurity Peril Abounds
ENDPOINT SECURITY
Extension Poisoning Campaign Highlights Gaps in Browser Security
Latest Articles in The Edge
CYBERSECURITY OPERATIONS
RSAC 2026: How AI Is Reshaping Cybersecurity Faster Than Ever
APR 7, 2026
CYBERSECURITY OPERATIONS
Human vs AI: Debates Shape RSAC 2026 Cybersecurity Trends
APR 7, 2026
CYBER RISK
Shadow AI in Healthcare Is Here to Stay
APR 6, 2026
DATA PRIVACY
Inconsistent Privacy Labels Don't Tell Users What They Are Getting
APR 3, 2026
Read More The Edge
Want more Dark Reading stories in your Google search results?
BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE
Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass.
GET YOUR PASS