<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>Return on Mitigation</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>A Call for a New Cybersecurity Measurement Standard</title>
  <link>https://www.hackerone.com/blog/new-cybersecurity-measurement-standard</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">A Call for a New Cybersecurity Measurement Standard</span>
    



    
        Kara Sprague
        
            CEO
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>joseph@hackerone.com</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 02/27/2025 - 07:47
</span>

            
  
      
  
    Image
                



          

  

      
            February 26th, 2025

      
            <p>That’s why worldwide spending on information security reached an estimated $180B in 2024, per industry analyst Gartner.&nbsp;</p><p>Still, translating the benefits of cybersecurity into dollars and cents has long been a challenge for security teams. This makes optimizing spending on security initiatives difficult because there’s no standard metric for comparing the impact of one versus another. It’s not because there isn’t quantifiable value. It’s because Return on Investment (ROI), the standard used for quantifying the value of an investment, doesn’t directly account for the benefits of cybersecurity measures.</p><h2>Why ROI Doesn’t Cut It for Cybersecurity</h2><p>We dive into more detail in our new paper,&nbsp;<a href="https://ma.hacker.one/rom-whitepaper-2025.html">When ROI Falls Short</a>, but here’s the net of it: the formula for calculating ROI requires a “revenue” or “net profit” value to get the result. Cybersecurity initiatives typically don’t directly generate revenue or a net profit.&nbsp;</p><p>Instead, these initiatives act as a safeguard, preventing potential losses such as data breaches, business downtime, ransomware attacks, reputational damage, and loss of customer trust. As such, an ROI metric that considers profits gained but not losses avoided fails to adequately capture the true impact.&nbsp;</p><h2>Why Return on Mitigation (RoM) Over ROI</h2><p>Security leaders need a metric that reflects the true value of cybersecurity, and ROI isn’t it. Return on mitigation (RoM) redefines how we calculate ROI for cybersecurity. Instead of focusing on net profit, RoM measures “mitigated losses”—the financial damage avoided through proactive security measures.</p><p>If you take a closer look, you’ll notice that the RoM formula is the same as ROI, except instead of "revenue," we use "mitigated loss":</p><p dir="ltr">By factoring mitigated losses instead of revenue, security leaders see a much clearer picture of the financial impact of their cybersecurity efforts on the bottom line—putting a dollar amount to the losses they’ve prevented.</p><p>You can see more detailed examples of how&nbsp;<a href="https://ma.hacker.one/rom-whitepaper-2025.html">RoM is calculated in our ebook</a>, using the cost of breach data, offensive security program results, and exploitation likelihood, or test it yourself with our light&nbsp;<a href="https://www.hackerone.com/info/return-mitigation-calculator">RoM calculator.</a>&nbsp;</p><h2>The Call for RoM Standardization</h2><p>For security leaders, adopting RoM bridges the gap between the theoretical value of cybersecurity testing and the reality of loss prevention. It empowers them to more accurately justify security budgets, communicate value to stakeholders, demonstrate quantifiable risk reduction, and prioritize their resources more effectively—all through a common financial language.</p><p>Now imagine if that common language was also common within an organization and across cybersecurity. The standardization of RoM would provide significant benefits to the entire security community. Establishing a common framework for calculating and communicating the financial impact of cybersecurity investments would enable organizations to make more informed decisions about their security strategies.&nbsp;</p><p>When everyone can calculate loss prevention with the same metric, they can benchmark with peers and across industries and better evaluate vendors and solutions. Meanwhile, it also provides greater support for regulators and cyber insurers, who need clear, methodical financial loss data to design regulatory standards and assess the adequacy of cybersecurity investments.&nbsp;</p><h2>Conclusion</h2><p>If you read my&nbsp;<a href="https://www.hackerone.com/blog/hope-fight-against-cyber-threats-new-years-message-cisos">recent blog</a>, you’ll remember my stance heading into this year: the fight against cyber threats will not be easy and we’re in this fight together. The standardization of RoM is just one practical way organizations can come together in cybersecurity; by implementing an effective, common method for measuring the value of cybersecurity investments, we’re one step closer to taking down cyber threats on a universal scale.</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/from-the-ceo" hreflang="en">From The CEO</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/return-mitigation" hreflang="en">Return on Mitigation</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/best-practices" hreflang="en">Best Practices</a>
        
    

            <p>Cybersecurity initiatives provide financial value to organizations. Board members and non-security executives know this to be true.&nbsp;</p>
      ]]></description>
  <pubDate>Thu, 27 Feb 2025 13:47:37 +0000</pubDate>
    <dc:creator>joseph@hackerone.com</dc:creator>
    <guid isPermaLink="false">5558 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>The Cost Savings of Fixing Security Flaws in Development</title>
  <link>https://www.hackerone.com/blog/cost-savings-fixing-security-flaws</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">The Cost Savings of Fixing Security Flaws in Development</span>
    



    
        Dan Mateer
        
            Senior Director, Delivery Excellence
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>joseph@hackerone.com</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 02/27/2025 - 07:56
</span>

            
  
      
  
    Image
                



          

  

      
            February 25th, 2025

      
            <p dir="ltr">When security incidents from software defects happen, retrospectives often tell the story of heroic remediation in the form of&nbsp;<a href="https://github.com/apache/logging-log4j2/pull/608">a few hundred lines of code</a> (or less) but maximum organizational disruption: all-hands-on-deck root cause investigations and executives working 24/7 to control fallout.&nbsp;</p><p dir="ltr">This reality has been the main drive behind the adoption of “Shift-Left” security—a proactive approach that integrates security testing like static application security testing (SAST) and software composition analysis (SCA) early in the development process.&nbsp;</p><p class="text-align-center" dir="ltr"><em>Common pre-production security controls in a software development lifecycle (SDLC).</em></p><p dir="ltr">Catching and fixing security vulnerabilities before they reach build, test, release, and deployment—before they even exist seems easy to justify, right?</p><p dir="ltr">Turns out it’s more complicated than that:</p><ol><li dir="ltr">Return on Investment (ROI) arguments rely on speculation and fear: cost savings by avoiding&nbsp;<em>unexpected&nbsp;</em>losses.</li><li dir="ltr">Business priorities typically focus on revenue-generating activities. The prospect of adding any extra step to pre-merge workflows when a company is already behind on deadlines is a tough pill to swallow.</li><li dir="ltr">It’s hard to prove #1, very easy to prove #2.</li></ol><p dir="ltr">Here, security leaders find themselves in an all-too-familiar paradox: if&nbsp;<a href="https://www.osti.gov/servlets/purl/842753#:~:text=Calculate%20total%20damage%2C%20incident%20risk%20and%20baseline%20scenario%20The%20damage,activities%20outside%20its%20own%20network.">an ounce of prevention is worth a pound of cure</a>, how is it so difficult to prove?</p><h2 dir="ltr"><strong>Rethinking return on security investment</strong></h2><p dir="ltr">Is a “return” on loss prevention the right justification for security investment? How do we quantify how well an organization outsmarts cybercriminals? How many organizations budget for expected data breaches as part of fiscal year planning?</p><p dir="ltr">Cybercriminal activity isn’t a predictable variable in business operations, but risk mitigation is. A more accurate framework for investment decision-making is&nbsp;<a href="https://ma.hacker.one/rom-whitepaper-2025.html">return on mitigation (RoM)</a>—the financial impact of preventing breaches, regulation penalties, and reputational damage.</p><p dir="ltr">Using the RoM model, we can estimate business impact for&nbsp;<em>pre-attack</em> mitigation. Imagine your team catches a high-severity SQL injection vulnerability during routine testing. Based on the&nbsp;<a href="https://www.ibm.com/reports/data-breach">$5.45M average cost of a data breach</a>, its high severity, and exploitation likelihood (5.5%), the estimated mitigated losses is about $149,875.&nbsp;</p><p dir="ltr">For more, check out&nbsp;<a href="https://www.hackerone.com/info/return-mitigation-calculator">HackerOne’s RoM calculator</a> to see how much financial damage your security investments prevent.</p><h2 dir="ltr"><strong>The true cost gap</strong></h2><p dir="ltr">Another important factor in investment justification is the delta between cost of remediation&nbsp;<em>pre</em>-production vs.&nbsp;<em>post</em>-production.&nbsp;</p><p dir="ltr">When a vulnerability is caught in production, fixing the code is a resource-intensive process that requires time and work from both security and engineering teams. How is the vulnerability possible? How and when did it get there? What development team, if any, is working on the application now? If we send the vulnerability report to the developers working on it, will they know how to fix it? Will attempt #1 to fix the vulnerability work? What about #2?</p><p dir="ltr">The below image from&nbsp;<a href="https://www.it-cisq.org/the-cost-of-poor-quality-software-in-the-us-a-2022-report/">CISQ</a> provides a good visual of how it plays out in practice: a trial-and-error feedback loop.</p><p class="text-align-center" dir="ltr"><em>Dollar signs indicate where most effort/cost is concentrated.</em></p><p dir="ltr">At HackerOne, we see a median resolution lifecycle of&nbsp;<strong>34 days</strong> for vulnerabilities reported to penetration tests.&nbsp;</p><p dir="ltr">Even when a patch involves an update to just a few lines of code, determining&nbsp;<em>what</em> lines of code can be like looking for a needle in a haystack. Fixing vulnerabilities discovered in production is roughly&nbsp;<a href="https://www.nist.gov/document/report02-3pdf">30 times more expensive</a> than finding and fixing them during development.</p><p class="text-align-center" dir="ltr"><em>Source:&nbsp;</em><a href="https://www.nist.gov/document/report02-3pdf"><em>NIST: The Economic Impacts of Inadequate Infrastructure for Software Testing</em></a></p><p dir="ltr">Fixing a vulnerability in coding/unit testing is more cost-effective because the context is immediately known, and the complexities involved in writing the code change have already been solved (e.g., navigating existing technical debt to “get it to work”). When a developer is tasked with a vulnerability report to fix, it creates an unplanned cycle of repeating this work. All of the context and technical debt navigation needs to be re-learned. In other words, code patches—even the ones with just a few changed lines of code—take a lot longer than they look.</p><p dir="ltr">How big of a problem is this? Just ask your engineering team.&nbsp;<a href="https://stripe.com/files/reports/the-developer-coefficient.pdf">Developers spend 13.5 hours a week dealing with technical debt</a>, which is the biggest obstacle to making changes to existing code bases and has an estimated&nbsp;<a href="https://www.it-cisq.org/the-cost-of-poor-quality-software-in-the-us-a-2022-report/">economic impact of $1.52T in the US alone</a>.</p><p dir="ltr">A majority of development teams already have a quality assurance stage built into their workflow:&nbsp;<a href="https://docs.github.com/en/pull-requests/collaborating-with-pull-requests/reviewing-changes-in-pull-requests/approving-a-pull-request-with-required-reviews">pull request review and approval</a>. For most development teams, proposed changes remain in this stage for 47-50 hours, during which defects are caught and fixed prior to merge. During this stage, developers catch and fix about 3.4-4.7 defects per 1,000 lines of code with the help of peer review and automated tooling.<a href="https://www.pullrequest.com/benchmarks/">¹</a> These existing development practices provide an opportunity for a non-invasive security policy that, if thoughtfully executed, avoids duplication of development effort and minimal impact on velocity. Ideally, none.</p><p dir="ltr">Revisiting our example of an SQL injection vulnerability caught in production, let’s assume the root cause was an implementation where a JavaScript template string was used instead of a parameterized query which would have escaped values properly. If the developer writing the code was informed with the right guidance in a pull request review, it would have taken them 30 minutes to address. Caught in post-production testing, perhaps months later, expect it will take 15 hours of triage, troubleshooting, translating application security terminology to software engineering terminology, etc.</p><p dir="ltr">Determining cost impact can be more directly measured based on known operational expenses and varies between organizations. For this example, let’s say the cost is $100 per hour.</p><p dir="ltr">Post-production remediation:&nbsp;<strong>$1,500</strong></p><p dir="ltr">Pre-production remediation:&nbsp;<strong>$50</strong></p><p dir="ltr">Total operational cost savings:&nbsp;<strong>$1,450</strong></p><p dir="ltr">This brings overall financial impact to $151,325 when added to return on mitigation ($149,875). Or,&nbsp;<strong>3,027 times cheaper</strong>. “An ounce of protection is worth a pound of cure” may be an understatement.</p><h2 dir="ltr"><strong>Conclusion</strong></h2><p dir="ltr">Whether caught pre-production or post-production, catching and fixing vulnerabilities before cybercriminals can exploit them prevents enormous losses. Forecasting business value is best achieved by using a return on mitigation (RoM) framework. The additive business value in pre-production code security comes from significantly lower remediation costs.</p><p dir="ltr">There’s no one-size-fits-all methodology for metric-based objectives to determine a “shift-left” security program’s success, but a good place to start is the volume of true positive reports received over the 12 months with a reasonable “prevention” rate prediction (i.e., expecting 40% fewer new true positive reports matching target CWE categories).</p><h2 dir="ltr"><strong>How HackerOne is reinventing security for developers</strong></h2><p dir="ltr">While there’s a clear investment justification for security in development,&nbsp;<a href="https://www.hackerone.com/blog/resurrecting-shift-left-human-loop-ai">efforts to “shift-left” often backfire</a>, creating frustration for developers, an unhealthy relationship between engineering and security, and overly strict friction inhibitors on velocity. HackerOne has been&nbsp;<a href="https://www.hackerone.com/press-release/hackerone-acquires-pullrequest-power-developer-first-security-testing-solutions">on a mission</a> to understand why “shift-left” security isn’t working and to build a&nbsp;<a href="https://www.hackerone.com/blog/how-hackerone-reinvented-security-developers">methodology-based solution</a> that gets it right.</p><p dir="ltr"><a href="https://www.hackerone.com/product/pull-request">HackerOne PullRequest</a> is a true, developer-first approach to code security. We combine AI with expert human manual code review. The output – remediation guidance embedded directly in the developers’ existing workflow – empowers them to write secure code and proactively address security risks in the tools they already use. With a developer satisfaction rate of over 96%, HackerOne PullRequest is trusted by development teams because it’s actionable, fast, and self-learned.</p><p dir="ltr"><em>¹ Source: HackerOne PullRequest&nbsp;</em><a href="https://www.pullrequest.com/benchmarks/"><em>Benchmarks</em></a><em> sample of 3,000 organizations and 115,000 repositories spanning Small, Mid-Sized, and Large development team size cohorts.</em></p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/engineering" hreflang="en">Engineering</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/best-practices" hreflang="en">Best Practices</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/return-mitigation" hreflang="en">Return on Mitigation</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/pullrequest" hreflang="en">PullRequest</a>
        
    

            <p>There’s no debate that catching and fixing security flaws in development saves time, money, and stress.</p>
      ]]></description>
  <pubDate>Thu, 27 Feb 2025 13:56:28 +0000</pubDate>
    <dc:creator>joseph@hackerone.com</dc:creator>
    <guid isPermaLink="false">5559 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>A New Approach to Proving Cybersecurity Value (That Isn’t ROI)</title>
  <link>https://www.hackerone.com/blog/new-approach-proving-cybersecurity-value</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">A New Approach to Proving Cybersecurity Value (That Isn’t ROI)</span>
    



    
        Naz Bozdemir
        
            Senior Product Manager
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>joseph@hackerone.com</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 02/27/2025 - 08:13
</span>

            
  
      
  
    Image
                



          

  

      
            February 14th, 2025

      
            <p>Over the past 8 months,<a href="https://www.linkedin.com/in/hakluke?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAACcK9ewBCyIzphohk027wOvn6V6sdXUpumo">&nbsp;Luke (hakluke) Stephens</a> and I have spoken with 10 security executives, surveyed over 550 security professionals, and incorporated insights from HackerOne’s CISO Advisory Board. A key challenge emerged repeatedly in our conversations: security leaders need a better way to measure and justify their investments—one that accounts for the financial impact of mitigated risks.</p><p>In this blog, we are excited to&nbsp;<a href="https://www.hackerone.com/press-release/hackerone-introduces-new-cybersecurity-investment-metric-security-leaders-question">announce our white paper on Return on Mitigation (RoM)</a>, a framework we designed to quantify the financial impact of security programs in a way that speaks to business leaders.</p><h3><strong>Why traditional ROI falls short in cybersecurity</strong></h3><p>Organizations that apply traditional ROI models to cybersecurity often focus on cost-cutting measures like reducing headcount or operational expenses. However, this approach fails to account for security’s primary function: risk reduction and breach prevention.</p><p>As one CISO put it in our research:</p><p>"Security is often viewed as a cost center, not a revenue driver. ROI doesn’t work because you can’t always show direct returns—it’s about preventing damage, not generating income.”</p><p>By nature, security efforts protect revenue, brand reputation, and operational continuity by preventing financial losses rather than generating direct profit. Yet, these benefits are often difficult to quantify, making them harder to justify through traditional financial models.</p><h2><strong>Introducing the Return on Mitigation (RoM) framework</strong></h2><p>RoM offers a new way to approach cybersecurity justification by reframing security investments to avoid future losses—much like an insurance policy.</p><p>Instead of measuring revenue gained, RoM calculates mitigated losses. Instead of asking, "What revenue did this investment generate?" RoM asks, "What losses did we prevent by investing in cybersecurity measures?"</p><p>It does this by factoring in:</p><ul><li>The cost of a breach, using benchmarks like<a href="https://www.ibm.com/reports/data-breach">&nbsp;IBM’s Cost of a Data Breach Report</a></li><li>The likelihood of exploitation, based on real-world vulnerability data we modeled on<a href="https://www.verizon.com/business/en-gb/resources/reports/2024/dbir/2024-dbir-data-breach-investigations-report.pdf">&nbsp;Verizon's Data Breach Investigations Report</a></li><li>The cost of mitigation, including program investments and remediation efforts</li></ul><p>By replacing traditional ROI’s “net profit” with “avoided losses,” RoM can concretely quantify cybersecurity’s financial impact.</p><h3><strong>The RoM Calculator: A practical tool for security leaders</strong></h3><p>One of the biggest takeaways from our research was that security leaders need more than theory—they need tools and models to run these calculations in real-world scenarios.</p><p>The first-of-its-kind RoM calculator we developed in this study integrates security program results, the likelihood of exploitation through the concept of Exploitation Likelihood Score (ELS), and industry benchmarks to calculate total mitigation savings. It provides organizations with defensible metrics for demonstrating the value of their security programs.</p><p>I had the opportunity to run countless real-world calculations on HackerOne customers to measure the financial impact of their security programs in the last 2 months. The results each time confirm that:</p><p>With RoM, it is now possible to demonstrate how every dollar spent on proactive security directly protects the bottom line.</p><p>A security leader at a global financial infrastructure provider describes it best:</p><p>“RoM allows me to justify a $300,000 investment against a potential $5 million critical breach. With this metric, I can show how mitigating vulnerabilities through continuous security testing prevents costly breaches and justifies spending.”</p><p>&nbsp;</p><p>While the advanced RoM calculator is available to customers, we have also developed a&nbsp;<a href="https://www.hackerone.com/info/return-mitigation-calculator">light version</a> that allows anyone to explore the concept and run their calculations using high and critical severity findings.&nbsp;</p><h3><strong>HackerOne customers can run RoM calculations in real time</strong></h3><p>The RoM framework is now available to HackerOne customers, who can use the RoM calculator to measure their security investments in real financial terms.</p><p>With the<a href="https://www.hackerone.com/hai-your-hackerone-ai-copilot">&nbsp;HackerOne AI Copilot, Hai</a>, customers can automate RoM calculations on every vulnerability submitted to the HackerOne platform. This means customers can instantly assess the potential financial impact of each vulnerability and prioritize mitigation efforts based on real risk data. By incorporating things like program history, industry benchmarks, and other key factors—such as assigned CVSS, CVE, or EPSS figures—we can bring in various dimensions to our analysis and make these assumptions as realistic, defensible, and actionable as possible, all within the HackerOne platform.&nbsp;</p><p>And that’s just the beginning!</p><p>&nbsp;</p><h3>&nbsp;</h3><h3><strong>The future of RoM and how you can contribute</strong></h3><p>RoM provides security teams with a clear, quantifiable way to demonstrate their impact, making it easier to secure buy-in, budgets, and long-term investment in proactive security measures. However, for RoM to become a widely adopted industry standard, we need ongoing input from security professionals.</p><p>We’re actively refining RoM to ensure it remains a practical, defensible, and actionable framework for security investment justification. If you’d like to test the RoM calculator and provide feedback on how we can improve it,&nbsp;<a href="https://www.hackerone.com/contact">contact us</a> (or message me on&nbsp;<a href="https://www.linkedin.com/in/nazbozdemir/">LinkedIn</a>)— we’d love your insights.</p><p>To learn more, you can read the&nbsp;<a href="https://ma.hacker.one/rom-whitepaper-2025.html">full white paper</a> and join HackerOne’s webinar, “<a href="https://ma.hacker.one/return-on-mitigation-workshop-2025.html">Quantify the Financial Impact of Cybersecurity with Return on Mitigation,</a>” on March 12, 2025. In this webinar, we’ll discuss real-world applications of RoM and how you can use it in your organization!</p>
      

            
            <a href="https://www.hackerone.com/blog/topic/return-mitigation" hreflang="en">Return on Mitigation</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/research" hreflang="en">Research</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/best-practices" hreflang="en">Best Practices</a>
        
    

            <p><a href="https://www.hackerone.com/blog/roi-isnt-cutting-it-6-questions-help-cisos-better-quantify-security-investments"><em>How do you justify a cybersecurity investment?</em></a> It’s a question every security leader struggles with. The problem is that the traditional Return on Investment (ROI) model simply doesn’t work in cybersecurity. Unlike traditional investments that generate direct revenue, security spending is all about risk reduction, breach prevention, and avoiding financial losses.</p><p dir="ltr"><em>But how do you quantify the value of something that hasn't happened?</em></p>
      ]]></description>
  <pubDate>Thu, 27 Feb 2025 14:13:28 +0000</pubDate>
    <dc:creator>joseph@hackerone.com</dc:creator>
    <guid isPermaLink="false">5560 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
