How to engage with the C-Suite on cyber risk management, part 4

0
161

In part 3 of our metrics series, we discussed we how KRIs help identify risks while KPIs help us measure them. In this, our final article in the series, we’ll build on this knowledge to create metrics based on our four-stage model for qualifying risks and threats that we introduced in part 2. By making your way through our sequential process, you’ll be able to extract performance indicators that can enlighten your executives on security risks and management.

security funnel Chris Hodson

Figure 1. Four-stage model for qualifying risks and threats.

Keep in mind that the metrics that come from the four-stage process should be kept within the infosec team, and used to inform future KRIs. Why? Because the results that are generated by these steps are often in jargon and tech-speak that the board won’t understand – like this:

“We’ve seen a persistent 200 gbps DDoS attack targeting the external interface of our DMZ.”

“Our sandbox devices have been evaded five times through malware with a sophisticated form of payload obfuscation.”

These are not risks: they are threats. If a threat cannot exploit a vulnerability, who cares? If the vulnerability doesn’t impact the confidentiality,…

Read More…