The traditional narrative for cybersecurity has been about limited visibility and operational constraints — not business opportunities. These conversations are grounded in various assumptions, such as limited budgets, scarce resources, skills being at a premium, the attack surface growing, and increased complexity. For years, conventional thinking has been that cybersecurity costs a lot, takes a long time, and is more of a cost center than an enabler of growth.

In our upcoming paper, Prosper in the Cyber Economy, published by IBM’s Institute for Business Value (IBV), we share research findings that challenge some of these assumptions. The IBV partnered with Oxford Economics to interview more than 2,300 business, operations, technology, cyber risk, and cybersecurity executives across 18 industries and 25 countries.

What we found is sentiments around security are changing — according to security leaders and other leaders across the business. Sixty-six percent of respondents now view cybersecurity primarily as a revenue enabler. This makes sense when you consider that organizations with advanced security capabilities are realizing better business outcomes.

To better understand the business benefits associated with security transformation, we assessed respondent organizations’ security maturity in five areas: cyber and risk strategy, foundational capabilities, security operating models, business integration, and ecosystem coordination. Respondents fell into four stages of maturity with stark differences between the least and most mature groups — distinctions that reveal themselves in terms of operational performance.

Notably, the most mature security organizations see a 43% higher revenue growth rate over five years than the least mature organizations.

Shared responsibility is based on organizations working with partners to maintain a consistent security posture. Our analysis suggests that shared responsibility opens the door to additional downstream benefits like shared resilience and shared value. With common concerns like cyber risk and shared responsibility, the organization’s security function can break down silos by connecting different parts of the enterprise — and even extend capabilities (and opportunities) out into the broader partner ecosystem.

Explore the report

What are mature security organizations doing differently? More than just shifting from reactive to proactive, they look across the security lifecycle as a whole — where a growing number of value-added services can be found. In fact, the biggest opportunities arise from security’s unique role spanning the entire organization. For many clients, security modernization serves as the tip of the spear for broader business, security, and IT/IS transformation efforts.

Our research found that organizations with the greatest security maturity use their investments in security to enhance business outcomes. For organizations with the greatest security maturity, this takes the form of better risk awareness, greater visibility, deeper integration, more accountability, and more effective governance.

We found two sets of capabilities to be most impactful — how organizations approach cyber risk and how they approach shared responsibility via integration with their ecosystem partners. In practice, this means shifting our awareness further left in the security lifecycle to cyber risk and further right to cyber resilience. In doing so, cybersecurity becomes less about responding to adverse events and more about preventing, mitigating, and avoiding them.

In short, when leaders take a more proactive, collaborative, and integrative approach to cybersecurity, they not only reduce risk but increase profits. By expanding the aperture beyond the immediate threat environment — by focusing on risk exposure and IT/IS resilience — organizations can realize a more mature security posture that can power business transformation.

So what steps can security officers take to act on these insights?

While conventional thinking has long defined security around operational constraints, we can shift our perspective to re-envision security as the seed of opportunity. As more security leaders realize a defensive and reactive approach to cybersecurity is not serving them well, they are recognizing security as one of the few functions that cuts across the entire enterprise. This is an invitation — one that can drive new transformation opportunities with partners inside the organization and in the extended ecosystem.

If you’re interested in reading more from this report, you can download it here.

More from Intelligence & Analytics

2022 Industry Threat Recap: Manufacturing

It seems like yesterday that industries were fumbling to understand the threats posed by post-pandemic economic and technological changes. While every disruption provides opportunities for positive change, it's hard to ignore the impact that global supply chains, rising labor costs, digital currency and environmental regulations have had on commerce worldwide. Many sectors are starting to see the light at the end of the tunnel. But 2022 has shown us that manufacturing still faces some dark clouds ahead when combatting persistent…

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

The 13 Costliest Cyberattacks of 2022: Looking Back

2022 has shaped up to be a pricey year for victims of cyberattacks. Cyberattacks continue to target critical infrastructures such as health systems, small government agencies and educational institutions. Ransomware remains a popular attack method for large and small targets alike. While organizations may choose not to disclose the costs associated with a cyberattack, the loss of consumer trust will always be a risk after any significant attack. Let’s look at the 13 costliest cyberattacks of the past year and…