Overconfidence in Cybersecurity: A Growing Concern as Teams Falter in Simulations
A recent study reveals a concerning trend in the cybersecurity industry: despite significant investments and growing confidence, teams are struggling to contain simulated cyber attacks. According to the Immersive Cyber Workforce Benchmark, organizations that believe they are well-prepared for major incidents are scoring only 22% accuracy and taking over a day to contain simulated attacks. This highlights a critical issue: the gap between confidence and actual capability.
The report, based on 1.8 million exercises and a survey of 500 cybersecurity leaders, highlights a stagnation in resilience scores since 2023. Median response times to critical cyber threats remain at 17 days, despite substantial investments and pressure from boards and insurance carriers. This suggests that organizations are not adequately practicing the right skills under pressure.
James Hadley, Immersive's founder, emphasizes that the problem lies not in a lack of effort but in the focus on the wrong training. He states, 'Readiness isn't a box to tick; it's a skill earned under pressure.' The data supports this, showing that participants achieved just 22% accuracy and took 29 hours to contain an infection in crisis-simulation drills, indicating a lack of practiced coordination rather than knowledge.
The industry's basic readiness metrics also show no improvement. Over 60% of sectors experienced slower response times year-over-year, and confidence scores for 'OK,' 'Good,' and 'Great' were identical, suggesting teams cannot accurately assess their performance despite high self-belief. This overconfidence is further exacerbated by the practice of outdated threat scenarios, with 60% of training focusing on vulnerabilities older than two years.
Another systemic issue is the exclusion of non-technical roles in cyber-response simulations. Only 41% of organizations include legal, HR, communications, or senior executives, despite 90% believing effective cross-functional communication during incidents. Immersive's data reveals that when business functions are not rehearsed under pressure, collaboration suffers, and response times worsen.
Industry habits contribute to the readiness illusion. Organizations heavily rely on training completion rates, which are not indicators of competence. Only 46% use resilience scores, and 42% measure simulation conduct, creating 'false metrics' that obscure real-world capability gaps. This overreliance on completion rates masks the need for more comprehensive and realistic training.
The report also highlights a widening adaptability problem. Experienced practitioners perform well on familiar threats but struggle with AI-enabled or novel attacks. Senior participation in AI-scenario labs dropped 14% year-over-year, while non-technical managers increased participation by 41%. This suggests a need for more diverse and realistic training scenarios.
Training completion rates remain inconsistent, with an average of 81% completion, indicating that nearly one in five participants do not finish the exercises they start. This inconsistency further emphasizes the need for more structured and engaging training practices.
Hadley emphasizes the importance of shifting from confidence based on assumptions to readiness grounded in evidence. He states, 'True resilience comes from continuously proving and improving readiness across every level of the business, so when a real crisis hits, your confidence is backed by evidence, not assumption.' This highlights the need for a more evidence-based approach to cybersecurity readiness.