2022 SANS Survey Report
Inside the Minds & Methods of Modern Adversaries
To stay ahead of a hacker, you need to think like one. In groundbreaking new research, SANS and Bishop Fox surveyed more than 300 ethical hackers to gain insight into how attackers think, the tools they use, their speed, specialization, and favorite targets.
Unlike other surveys, which take a defender’s point of view and leverage past trends to predict the future, our report flips the script to explore how adversaries view environments and to uncover insights into where they find the most success. By better understanding the minds and methods of attackers, defenders can improve their security posture and refine offensive and defensive strategies.
Get The Complete Report
By submitting this form, you indicate that you have read and agree to the terms of our Privacy Policy
Your SANS report is ready to download. Enjoy!
KEY HIGHLIGHTS FROM THE REPORT
Defend Forward with New Insights Into How Attackers Operate

57% can complete an end-to-end attack in less than a day.

64% can exfiltrate data in less than 5 hours once they gain access.

36% can escalate or move laterally in 3 to 5 hours.
Most common exploitable perimeter exposures
The Greatest Risks You Face
Which Exploitable Exposures Are Most Often Found on the Perimeter?
Average hours to collect and exfiltrate data
Racing To The Finish Line
How Quickly Can Your Data Be Exfiltrated?
How many organizations have adequate detection and response capabilities
The Struggle Continues
How Do Detection & Response Capabilities Stack Up?

On-Demand Webcast
Dive Deep Into the Survey Results with the Experts
Join Matt Bromiley of SANS and Tom Eston of Bishop Fox as they dive deep into the findings of our recent research, discuss what they found most surprising, and provide tips for leveraging the data to refine your offensive and defensive security strategies.

GAIN A STRATEGIC ADVANTAGE
Know Your Enemy, Know Yourself
- Sun Tzu, The Art of War
It’s no secret that attackers are evolving faster than defenses can keep up. By the time detection measures are in place, attackers have a new way to circumvent them. It’s a game of cat and mouse that attackers are poised to win. We hope that this inaugural report developed in collaboration with SANS can start to shift these dynamics. By mining insights from ethical hackers armed with the same tools, tactics, techniques, and procedures as modern attackers, we can better understand what we're up against and, in doing so, better empower the defenders. We hope you find the report useful!
-- The Bishop Fox Team
Related Resources
Hone Your Offensive Strategy with More Attacker Insights
Continue your journey into the minds and methods of modern adversaries and see how you can improve proactive defenses against common attacks with these additional resources.

Hacker Insights Revealed: Explore New SANS Survey Results
In partnership with SANS,we share what our latest report uncovers about the minds and methodologies of modern attackers and how this can help to improve your security posture.

Sep 28, 2022
Know Your Enemy, Know Yourself: Examining the Mind of a Cyber Attacker
By Wes Hutcherson

Inside the Mind of Modern Adversaries
SANS, in partnership with Bishop Fox, surveyed 280 ethical hackers to gain insight into the mind and methods of modern adversaries – including what works and what doesn’t. Here are our preliminary findings.