The report found that most organizations have not incorporated cyber risk into their vulnerability management program, emphasizing the importance of assessing and improving cybersecurity posture. It also highlights the need to prioritize IT issues based on risk analysis and to apply incident management practices such as offering multiple modes for incident logging, automatically categorizing and prioritizing incidents, managing SLAs, and creating unique workflows for major incidents.