Most mid-market security programs were not built. They accumulated.

A firewall was purchased when the company moved to the cloud. An endpoint tool was added after a scare. A compliance requirement triggered a vendor contract. A new IT director brought a preference for a different SIEM. A merger added a second environment that was never fully rationalized with the first.

Each addition made sense in isolation. None of it was designed as a system. And the result, in most mid-market organizations, is a security program that looks busy on paper and costs far more than it should, while covering less than anyone realizes.

The cost of accumulation

When security programs grow by accumulation rather than design, they generate two categories of hidden cost that most organizations never calculate.

The first is financial. Redundant tools with overlapping coverage, vendor contracts that renew automatically because no one reviewed them, licenses sized for a headcount that has changed, and services purchased for threats that have since been addressed other ways. The total is not trivial. For most mid-market organizations, it falls between $100,000 and $500,000 annually. It does not appear on any security dashboard. It requires someone with the independence and the time to look for it specifically.

The second cost is operational. A security program built by accumulation is harder to manage than one built by design. Alerts from overlapping tools create noise that analysts cannot effectively triage. Coverage gaps hide in the seams between tools that were never designed to work together. Incident response becomes harder when no one has a clear picture of what the environment actually contains.

Neither of these costs is visible to the people inside the program. They are the water the fish swim in. It takes an outside perspective to see them clearly.

Why this happens in PE-backed companies specifically

The accumulation problem is more acute in PE-backed companies than in any other mid-market segment, for a straightforward reason: growth through acquisition.

When a company grows by acquiring other businesses, each acquired entity brings its own security tools, vendors, and practices. Integration timelines are driven by operational and financial priorities, not security rationalization. The security programs get stapled together rather than merged, and the overlap compounds with each transaction.

By the time a PE operating partner asks whether the portfolio company’s security spend is justified, the program has often been through three or four ownership events, each of which added complexity without removing any. No single person has ever looked at the whole picture.

What it costs to leave this unaddressed

The financial cost of carrying $300,000 in unnecessary security spend for three years is $900,000. Against a typical PE hold period of four to six years, the cumulative number becomes a meaningful drag on EBITDA.

But the operational cost is harder to quantify and potentially more significant. A security program built by accumulation has gaps it does not know about. Those gaps are where breaches happen. The IBM Cost of a Data Breach Report puts the average breach cost for mid-market organizations at over $4 million, and that figure does not include the operational disruption, the regulatory exposure, or the reputational damage that follows a significant incident.

The risk is not theoretical. It is the predictable result of a program that was never designed to be coherent.

What a structured review produces

A structured 90-day independent assessment of a mid-market security program typically finds the same things in the same proportions: tools that overlap, contracts that should be renegotiated, coverage areas that are over-invested and others that are exposed, and a program that has been reactive for so long that nobody remembers what it was originally supposed to prevent.

The review does not just surface the waste. It produces a rationalized program: fewer tools, clearer coverage, lower cost, and a roadmap that connects every dollar of future investment to a specific risk it addresses.

For a PE operating partner preparing a portfolio company for exit, that rationalized program is a due diligence asset. For a new CISO trying to establish credibility in a program they inherited, it is the foundation everything else gets built on.

The program nobody built is fixable. But it requires someone willing to look at the whole picture honestly, and the independence to say what they find.


Paul Sundar Singh is the Principal Cybersecurity Advisor and CISO at enDarity, and creator of Cyber Stabilization 90™, a structured 90-day advisory engagement for PE-backed and mid-market organizations. Learn more at endarity.com/.