The Business Value of SANS: Proven Impact of Cybersecurity Training – Pounds
Cybersecurity training is a strategic investment. And like any high-impact investment, the returns scale with the quality of the programme. New research from IDC reveals the tangible business value of rigorous, practitioner-led training from SANS: faster threat detection and response, reduced operational risk, stronger team cohesion, and millions in annual cost savings. For organisations looking to elevate their security capabilities, the data shows that not all training delivers equally—and serious programmes drive serious results.
SANS_The_Business_Value_SANS_Proven_Impact_Cybersecurity_Training_Pounds (PDF, 1.02MB)
24 Jun 2025Related Content
Reducing Excessive Trust in the Web PKI Ecosystem
Research PaperThis research examines the possibility of developing an add-on for the open-source mitmproxy project to add drift detection for root Certification Authority (CA) certificates, incorporate policy-based controls over which CAs are allowed, and leverage an ensemble of existing technologies—some in novel ways—to reduce the level of trust placed in the public Web PKI.
- 12 Mar 2026
Structural Vulnerability: Autodesk Revit Server WAN Exposure Versus Cost of Autodesk Construction Cloud
Research PaperAutodesk Revit Server, a critical collaboration tool in the architecture, engineering, and construction (AEC) industry, was designed to operate within trusted networks.
- 7 Nov 2025
Privacy Protections: Are Stronger Laws Changing What We Reveal?
Research PaperAs U.S. states enact privacy laws aimed at giving consumers more control over their personal data, little is known about whether privacy legislation influences individuals’ willingness to disclose their identity on public platforms.
- 26 Sep 2025
SANS 2025 Security Awareness Report
Research PaperNow in its 10th year, the SANS Security Awareness Report remains the definitive, practitioner-built resource for understanding and managing the human side of cybersecurity.
- 12 Aug 2025
- Lance Spitzner
Cybersecurity Solutions Healthcare Report 2025
Research PaperReview and compare vendor capabilities, featuring SANS Institute as a top provider of security training and services tailored for healthcare.
- 30 Jul 2025
The Business Value of SANS: Proven Impact of Cybersecurity Training
Research PaperNew research from IDC reveals the tangible business value of rigorous, practitioner-led training from SANS
- 26 Jun 2025
Revolutionizing ISO 27001 Audit Evidence Collection: Steampipe as the Ultimate Tool
Research PaperIn the current landscape of increasing regulations, cyber breaches, and business risks, information...
- 5 Dec 2024
Assessing Operational Technology: Using the ONG-C2M2 Model and CIS Controls to Assess Operational Technology (OT) Environments
Research PaperMost small to medium-sized organizations rely heavily on CIS Controls (Center for Internet Security,...
- 20 Dec 2023
Who Needs a Pentest: Validating the Configuration of an EDR Solution Using the MITRE ATT&CK Framework
Research PaperIs that EDR suite fully configured, and providing the expected protection? Do we have a scalable way...
- 7 Nov 2023
"Think Different" About Compliance: Is Effective, Automated macOS Configuration Achievable with NIST's macOS Security Compliance Project?
Research PaperInformation security compliance within the Apple macOS ecosystem is an especially challenging...
- 21 Dec 2022
Risk Prioritization: An Examination of Published Exploitability Ratings
Research PaperBusinesses struggle to prioritize the remediation of vulnerabilities in their environment. One...
- 27 Jan 2022
Ransomware Impact Assessments: Guidance is Common, Your Organization is Not!
Research PaperDefeating ransomware's threat has become a cyber-Sisyphean task because the cybersecurity community...
- 3 Nov 2021
Security Network Auditing: Can Zero-Trust Be Achieved?
Research PaperSince 2010, government and business organizations have begun to adopt the Zero-Trust framework....
- 23 Sep 2020
Risk Management with Automated Feature Analysis of Software Components
Research PaperOrganizations developing software need pragmatic risk management practices to prevent malicious code...
- 27 Aug 2020
Answering the Unanswerable Question: How Secure Are We?
Research PaperBusiness environments consist of invisible or ill-defined risk factors which create challenges with...
- 3 Jun 2020
Building an Audit Engine to Detect, Record, and Validate Internal Employees' Need for Accessing Customer Data
Research PaperWhen using Software-as-a-Service (SaaS) products, customers are asked to store and entrust a large...
- 11 Dec 2019
Securing the Supply Chain - A Hybrid Approach to Effective SCRM Policies and Procedures
Research PaperOrganizations' supply chains are growing increasingly interdependent and complex, the result of...
- 7 Nov 2019
Cyber Protectionism: Global Policies are Adversely Impacting Cybersecurity
Research PaperCyber Protectionist policies are adversely impacting global cybersecurity despite their intent to...
- 21 Aug 2019
Overcoming the Compliance Challenges of Biometrics
Research PaperDue to increased regulations designed to protect sensitive data such as personally identifiable...
- 22 May 2019
Evaluation of Comprehensive Taxonomies for Information Technology Threats
Research PaperCategorization of all information technology threats can improve communication of risk for an...
- 26 Mar 2018
