Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal

In this report, we analyze real-world end-user vulnerability assessment (VA) behaviour using a machine learning (ML) algorithm to identify four distinct strategies, or “styles.” These are based on five VA key performance indicators (KPIs) which correlate to VA maturity characteristics. This study specifically focuses on key performance indicators associated with the Discover and Assess stages