A benchmarking report released by ACA Group on March 3, 2026, has found that 50% of private equity (PE) portfolio companies demonstrate 'elevated' or 'high' cybersecurity risk. The ACA Vantage Benchmarking Report analyzed detailed risk assessments from over 300 companies across 12 countries and 18 industries, painting a stark picture of systemic weaknesses. The report identifies the Health Services and Producer Manufacturing sectors as having the highest risk profiles. Two critical control domains—Third-Party Risk Management and Penetration Testing—were consistently identified as major deficiencies. These findings indicate that many PE-backed firms are not only struggling with their own security posture but are also failing to manage risks originating from their vendors, making them attractive targets for supply chain attacks.
The ACA Vantage Benchmarking Report provides a data-driven analysis of cyber risk within the private equity sector, highlighting systemic issues that require attention from investors and company leadership.
The report shows that cyber risk is not uniform across industries.
The high risk in health services is likely due to the value of protected health information (PHI) and legacy systems, while manufacturing risk is heightened by complex supply chains and vulnerable Operational Technology (OT).
Two areas stood out as consistent, high-risk problems across all sectors:
The high-risk posture of these firms has several negative consequences:
For PE firms and their portfolio companies, detection and response must become more programmatic.
Vulnerability Scanning.The report suggests that stronger governance is key to reducing risk.
Security Policy Management.Incident Response Plan development.Software Update - D3-SU).Corresponds to addressing findings from penetration tests and regular vulnerability scanning.
Mapped D3FEND Techniques:
Directly addresses the weakness in penetration testing by formalizing the process of identifying vulnerabilities.
Directly addresses the weakness in Third-Party Risk Management by implementing processes to vet and monitor vendors.
To address the identified weakness in penetration testing, PE firms should mandate a baseline of regular, automated vulnerability scanning for all portfolio companies. This should be supplemented by annual, independent penetration tests. A centralized platform could be used to aggregate scan results from across the portfolio, giving the PE firm visibility into systemic risks and tracking remediation progress. This programmatic approach ensures that vulnerability identification is not an ad-hoc activity but a continuous process, directly mitigating the risk of exploitation of known flaws.
To counter the high risk from poor Third-Party Risk Management, PE firms should establish a standardized TPRM framework for their portfolio companies. This framework should require companies to inventory all third-party vendors, classify them based on data access and criticality, and conduct risk assessments accordingly. For high-risk vendors, this must include reviewing their security certifications (e.g., SOC 2), issuing security questionnaires, and contractually obligating them to meet specific security standards. This structured approach replaces informal vetting with a defensible process to manage supply chain risk.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats