<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>From The CEO</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>A Call for a New Cybersecurity Measurement Standard</title>
  <link>https://www.hackerone.com/blog/new-cybersecurity-measurement-standard</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">A Call for a New Cybersecurity Measurement Standard</span>
    



    
        Kara Sprague
        
            CEO
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>joseph@hackerone.com</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 02/27/2025 - 07:47
</span>

            
  
      
  
    Image
                



          

  

      
            February 26th, 2025

      
            <p>That’s why worldwide spending on information security reached an estimated $180B in 2024, per industry analyst Gartner.&nbsp;</p><p>Still, translating the benefits of cybersecurity into dollars and cents has long been a challenge for security teams. This makes optimizing spending on security initiatives difficult because there’s no standard metric for comparing the impact of one versus another. It’s not because there isn’t quantifiable value. It’s because Return on Investment (ROI), the standard used for quantifying the value of an investment, doesn’t directly account for the benefits of cybersecurity measures.</p><h2>Why ROI Doesn’t Cut It for Cybersecurity</h2><p>We dive into more detail in our new paper,&nbsp;<a href="https://ma.hacker.one/rom-whitepaper-2025.html">When ROI Falls Short</a>, but here’s the net of it: the formula for calculating ROI requires a “revenue” or “net profit” value to get the result. Cybersecurity initiatives typically don’t directly generate revenue or a net profit.&nbsp;</p><p>Instead, these initiatives act as a safeguard, preventing potential losses such as data breaches, business downtime, ransomware attacks, reputational damage, and loss of customer trust. As such, an ROI metric that considers profits gained but not losses avoided fails to adequately capture the true impact.&nbsp;</p><h2>Why Return on Mitigation (RoM) Over ROI</h2><p>Security leaders need a metric that reflects the true value of cybersecurity, and ROI isn’t it. Return on mitigation (RoM) redefines how we calculate ROI for cybersecurity. Instead of focusing on net profit, RoM measures “mitigated losses”—the financial damage avoided through proactive security measures.</p><p>If you take a closer look, you’ll notice that the RoM formula is the same as ROI, except instead of "revenue," we use "mitigated loss":</p><p dir="ltr">By factoring mitigated losses instead of revenue, security leaders see a much clearer picture of the financial impact of their cybersecurity efforts on the bottom line—putting a dollar amount to the losses they’ve prevented.</p><p>You can see more detailed examples of how&nbsp;<a href="https://ma.hacker.one/rom-whitepaper-2025.html">RoM is calculated in our ebook</a>, using the cost of breach data, offensive security program results, and exploitation likelihood, or test it yourself with our light&nbsp;<a href="https://www.hackerone.com/info/return-mitigation-calculator">RoM calculator.</a>&nbsp;</p><h2>The Call for RoM Standardization</h2><p>For security leaders, adopting RoM bridges the gap between the theoretical value of cybersecurity testing and the reality of loss prevention. It empowers them to more accurately justify security budgets, communicate value to stakeholders, demonstrate quantifiable risk reduction, and prioritize their resources more effectively—all through a common financial language.</p><p>Now imagine if that common language was also common within an organization and across cybersecurity. The standardization of RoM would provide significant benefits to the entire security community. Establishing a common framework for calculating and communicating the financial impact of cybersecurity investments would enable organizations to make more informed decisions about their security strategies.&nbsp;</p><p>When everyone can calculate loss prevention with the same metric, they can benchmark with peers and across industries and better evaluate vendors and solutions. Meanwhile, it also provides greater support for regulators and cyber insurers, who need clear, methodical financial loss data to design regulatory standards and assess the adequacy of cybersecurity investments.&nbsp;</p><h2>Conclusion</h2><p>If you read my&nbsp;<a href="https://www.hackerone.com/blog/hope-fight-against-cyber-threats-new-years-message-cisos">recent blog</a>, you’ll remember my stance heading into this year: the fight against cyber threats will not be easy and we’re in this fight together. The standardization of RoM is just one practical way organizations can come together in cybersecurity; by implementing an effective, common method for measuring the value of cybersecurity investments, we’re one step closer to taking down cyber threats on a universal scale.</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/from-the-ceo" hreflang="en">From The CEO</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/return-mitigation" hreflang="en">Return on Mitigation</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/best-practices" hreflang="en">Best Practices</a>
        
    

            <p>Cybersecurity initiatives provide financial value to organizations. Board members and non-security executives know this to be true.&nbsp;</p>
      ]]></description>
  <pubDate>Thu, 27 Feb 2025 13:47:37 +0000</pubDate>
    <dc:creator>joseph@hackerone.com</dc:creator>
    <guid isPermaLink="false">5558 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs</title>
  <link>https://www.hackerone.com/blog/hope-fight-against-cyber-threats-new-years-message-cisos</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs</span>
    



    
        Kara Sprague
        
            CEO
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 01/23/2025 - 08:14
</span>

            
  
      
  
    Image
                



          

  

      
            January 23rd, 2025

      
            <h2>Facing the Reality: Cybersecurity’s Mounting Pressures</h2><p dir="ltr">The cybersecurity landscape is evolving at an unprecedented pace. This past year, breaches resulting from exploited vulnerabilities&nbsp;<a href="https://www.techtarget.com/searchsecurity/news/366582952/Verizon-DBIR-Vulnerability-exploitation-in-breaches-up-180" target="_blank">grew 180%</a>, and at HackerOne, we’ve seen&nbsp;<a href="https://hackerpoweredsecurityreport.com/the-top-ten-vulnerabilities/">a 12% jump in vulnerability reports</a> across our customer programs. Attack surfaces continue to expand, with AI systems as the new frontier and increasingly interconnected systems. Threat actors are growing in number, and boldness and attack techniques increasing in sophistication. And, as the headlines remind us all too often, breaches are not just a possibility but a probability.</p><p dir="ltr">It's natural to feel hopeless in the face of these developments. But within these challenges lies an opportunity to build something stronger than ever before.</p><h2>Finding Opportunity in Adversity</h2><p dir="ltr">Every challenge we face brings with it a silver lining: an opportunity to innovate, collaborate, and grow stronger. Over the past year, we've witnessed the transformative power of resilience. Organizations are increasingly adopting proactive security measures and leveraging cutting-edge tools like AI to detect and respond to threats faster than ever before. At the same time, crowdsourced cybersecurity programs are gaining momentum, demonstrating greater adoption and effectiveness. In fact,&nbsp;<a href="https://hackerpoweredsecurityreport.com/the-top-ten-vulnerabilities/">more than one-quarter of valid vulnerabilities</a> found through HackerOne programs are rated as critical or high severity. This highlights the value of collaboration with security researchers—helping organizations uncover and address vulnerabilities before they escalate into crises.&nbsp;</p><p dir="ltr">This year, I encourage you to consider how these opportunities can apply to your organization. Where is there potential for you to be more proactive in your security strategy? Which solutions and partnerships offer the highest return in strengthening your security posture? And perhaps most importantly, how do you, as a leader, reframe adversity as a catalyst for progress?</p><h2>The AI-Human Alliance in Cybersecurity</h2><p dir="ltr">At the heart of modern cybersecurity strategies lies the powerful synergy between human ingenuity and cutting-edge technology. While tools like AI have revolutionized how we identify and address vulnerabilities, their effectiveness hinges on the expertise and guidance of the people behind them. Your teams—the analysts, engineers, and researchers working tirelessly to defend against threats—are, without a doubt, your greatest asset. Equally invaluable are your partners, whether they be vendors, security researchers, or other collaborators who bring diverse perspectives and specialized knowledge to the table.</p><p dir="ltr">This blend of AI-driven efficiency and human insight is essential for staying ahead of increasingly sophisticated adversaries. It empowers us to adapt, innovate, and uncover even the most elusive vulnerabilities before they become threats. With AI, we can process vast amounts of data at speeds that would be impossible for humans alone, spotting patterns and anomalies that might otherwise go unnoticed. However, it is human expertise that ensures these tools are applied strategically, interpreting complex data in context and making nuanced decisions that automated systems alone can't achieve. Together, they form an agile and responsive defense system capable of outpacing the evolving tactics of cybercriminals.</p><p dir="ltr">A prime example of this approach in action is Amazon and AWS, who have been leveraging this combination in their security program with HackerOne for over eight years. In that time, they’ve received over 9,000 valid reports and paid over $30 million in rewards and bonuses to 6,000 security researchers. Each report from a researcher helps Amazon raise the bar on security, providing unique perspectives on their entire landscape and uncovering vulnerabilities that might otherwise go unnoticed. This partnership exemplifies how human ingenuity, paired with the right platform, can transform how organizations tackle cybersecurity challenges.&nbsp;<a href="https://youtu.be/pNJNdrZN0YA?si=MbAFjNm82AT-9izX" target="_blank">You can hear more in this short video</a>.&nbsp;</p><p dir="ltr">As you look to 2025, I encourage you to assess the talent and technology powering your charter. Build a culture that empowers your teams to leverage AI-powered capabilities while recognizing where human insight remains essential. Foster trust and resilience, and seek out new perspectives and partnerships. Sometimes the best solutions come from unexpected places.</p><h2>Let’s Build a Resilient Future Together</h2><p dir="ltr">In 2025, let’s shift the narrative. Instead of focusing on what we’re fighting against, let’s focus on what we’re building together: a more secure, more resilient digital world. Let’s embrace the tools and partnerships that empower us to stay ahead of threats. Let’s champion a mindset where security is seen not as a burden but as an enabler of innovation and trust.</p><p dir="ltr">At HackerOne, we’re committed to being your ally in this fight. We believe that no challenge is insurmountable when we work together and we’re here to support you every step of the way.</p><h2>Closing Thoughts</h2><p dir="ltr">To every CISO reading this: I see the challenges you face and the incredible work you do to overcome them. The road ahead won’t be easy, but we can navigate it together. You are not alone in this fight to build a safer internet. With the right mindset, tools, and partnerships, 2025 can be a year of meaningful progress for cybersecurity.</p><p dir="ltr">Here’s to a new year of resilience, innovation, and hope.</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/from-the-ceo" hreflang="en">From The CEO</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/ai-safety-security" hreflang="en">AI Safety &amp; Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/bug-bounty" hreflang="en">Bug Bounty</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/best-practices" hreflang="en">Best Practices</a>
        
    

            <p>As we settle into 2025, I want to take a moment to reflect on the state of cybersecurity—not just as an industry but as a shared mission. For CISOs, the stakes have never been higher. Protecting your organizations against increasingly sophisticated adversaries, managing constrained budgets, and ensuring business continuity in an unpredictable world—it’s a daunting charter, and it can feel isolating. But I’m here to remind you: You are not alone.</p>
      ]]></description>
  <pubDate>Thu, 23 Jan 2025 14:14:53 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5468 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
