Executive Advisory
Cybersecurity Metrics That Matter to Private Equity Partners
Simone Nogara
September 2025 · 6 min read
Private equity partners increasingly recognise cybersecurity as a material factor in portfolio value. Yet the metrics in board packs and investment committee reports frequently obscure more than they reveal. Understanding which metrics genuinely inform capital allocation — and which represent security theatre — is essential for effective portfolio governance.
The Measurement Problem
Unlike financial performance with standardised accounting frameworks, cybersecurity lacks universally accepted measurement standards. PE partners reviewing security reports across ten portfolio companies may encounter ten entirely different frameworks — different indicators, scales, and conclusions that cannot be meaningfully compared. This is not merely inconvenient: when a partner cannot compare cybersecurity posture across holdings using consistent metrics, the portfolio-level risk picture remains opaque andInvestment Committees lack the intelligence to inform capital allocation, add-on acquisitions, or exit timing.
Portfolio-Level Metrics
Effective portfolio reporting begins with a standardised risk scoring methodology applied consistently across all holdings. This does not require identical architectures — it requires a common framework that translates diverse postures into comparable risk indicators. Key metrics: aggregate risk distribution (percentage of companies at high, medium, and low risk), compliance status across applicable regimes (NIS2[1], GDPR[2], DORA[3], sector-specific), and trend indicators showing quarter-over-quarter improvement or deterioration. Present these alongside financial exposure estimates calibrated to company-specific revenue, data holdings, and operational dependency on digital infrastructure.
Also track portfolio-wide incident metrics (total incidents by severity and type with trend analysis) and insurance coverage adequacy — what percentage of companies maintain cyber insurance, whether limits are proportionate to exposure, and whether any have had claims denied or policies non-renewed (signalling underlying deficiencies insurers have identified).
Company-Level KPIs
The metrics that most reliably indicate security posture measure operational discipline rather than technology deployment. Having purchased an endpoint detection platform is not informative; knowing that 97% of endpoints are monitored with fourteen-minute mean detection time tells a partner the investment is functioning.
Patch cadence is among the most reliable maturity indicators. Organisations applying critical patches within 72 hours demonstrate both technical capability and organisational discipline. Companies with patch backlogs exceeding 30 days for critical vulnerabilities almost invariably have broader programme deficiencies. Track percentage of critical and high-severity vulnerabilities remediated within defined timeframes (48 hours, 7 days, 30 days), with particular attention to internet-facing systems.
Phishing simulation results directly measure human security awareness. Meaningful metrics: click rate (industry average 12–15%, well-trained organisations below 3%), reporting rate, and trend over successive campaigns. A declining click rate with increasing reporting rate indicates genuine culture improvement.
Mean time to detect (MTTD) and mean time to respond (MTTR) measure monitoring and incident response effectiveness. Partners should be concerned when MTTD exceeds 24 hours for high-severity events or MTTR exceeds 72 hours. Track over time and benchmark against sector averages.
Board-Ready Dashboards
Investment Committee members and board directors need formats that facilitate decisions, not demonstrate technical complexity. An effective dashboard answers three questions on a single page: what is our current risk level, is it improving or worsening, and what requires board-level attention.
The most effective format: traffic-light risk summary, no more than six key metrics with trend indicators, and a short narrative section on material changes, emerging threats, and recommended actions. The narrative is essential — quantitative metrics alone lack context. Produce on consistent cadence (quarterly for investment committee, monthly for management) with event-driven updates for material incidents or significant posture changes.
Benchmarking
Metrics gain greatest value when contextualised. A phishing click rate of 8% means little in isolation; understanding it places the company in the 60th percentile for European financial services provides actionable context. Useful frameworks: NIST CSF[6] maturity model, CIS Controls implementation levels, and sector-specific benchmarks. For NIS2-scoped companies, benchmarking against the directive's requirements provides regulatory-aligned assessment. The European Union Agency for Cybersecurity (ENISA)[4] publishes useful European-market benchmarks.
Be cautious about third-party security rating services based on external scanning. They measure only externally visible attack surface and cannot assess internal controls, governance maturity, or incident response capability. A company with excellent external ratings may have critical internal vulnerabilities. These ratings are a data point, not a definitive assessment.
Avoiding Vanity Metrics
The total number of blocked attacks is the most egregious vanity metric — modern infrastructure blocks millions of automated scans daily. Reporting this as security effectiveness is analogous to claiming excellence because locks prevented 10,000 attempted entries. Similarly, compliance checkbox rates (“94% compliant with ISO 27001[5]”) are often misleading — compliance frameworks assess whether controls exist, not whether they function under adversarial pressure. Look beyond percentages to evidence of effectiveness: penetration test results, tabletop exercise outcomes, actual incident response performance.
Security spend as a percentage of revenue also obscures more than it reveals. Spending levels correlate poorly with outcomes. An organisation spending efficiently on the right controls with strong culture may achieve superior protection at lower cost. Focus on outcomes (risk reduction, incident prevention, compliance achievement) rather than inputs (budget allocation).
Implementing a Portfolio Metrics Programme
Define a core set of eight to twelve indicators that every portfolio company reports, regardless of size or sector — universally applicable, consistently measurable, genuinely informative. Companies in regulated sectors may report additional metrics, but the core set provides portfolio-level comparability.
Some metrics (patch cadence, phishing results, endpoint coverage) can be extracted from existing tools. Others (risk scores, maturity assessments) require structured assessment processes. The initial investment in measurement capability is repaid through improved risk visibility, more informed capital allocation, and early identification of deficiencies that would otherwise erode portfolio value.
References
- Directive (EU) 2022/2555 (NIS2 Directive). EUR-Lex
- Regulation (EU) 2016/679 (General Data Protection Regulation). EUR-Lex
- Regulation (EU) 2022/2554 (Digital Operational Resilience Act). EUR-Lex
- European Union Agency for Cybersecurity (ENISA). enisa.europa.eu
- ISO/IEC 27001:2022 Information Security Management Systems.
- NIST Cybersecurity Framework (CSF). nist.gov