Week 44: Cybersecurity Metrics
In the last 43 weeks, we’ve covered the theory behind topics like, but not limited to, Risk Management, Incident Response, and Cyber Threat Intelligence. And, all of that is fine, but we felt something something was missing – Metrics.
So, why are they crucial?
Metrics can help organizations evaluate the effectiveness of their security efforts against threats. Tracking them can provide a view of the events that occurred in the last x number of days, for example, and where they materialized. They can provide intel into the robustness of security tools and processes. They can help measure aspects of incident response, vulnerability management, and compliance. All this means that security teams can track, analyze, and enhance their approach towards security. It can even aid CISOs to prioritize investments.
As a recap, measuring the effectiveness of cybersecurity with tangible data can:
Okay, but why do entities fail to measure their cybersecurity effectiveness?
According to an article published by CIO in 2017, Thycotic, a provider of privileged account management (PAM), conducted a survey in which they interviewed over 400 businesses. The study revealed that companies spend over $100 billion on cybersecurity defenses. Approximately, 32% made business decisions and purchased cybersecurity technology blindly. Over 80% did not consider the business users when making decisions about procurement. The article also said that these companies did not have a steering committee to evaluate the risks and impacts with regard to the investments.
Additionally, the ISF found that many CISOs report the wrong metrics. This is because they have little to no interaction with the intended audience. Consequently, plenty of assumptions are made, which leads to a disjoint between security and the business.
(Note: In our experience, too many metrics can also affect decision making).
Hmm… what does all this translate to?
It means the following process should be followed:
(Note: Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs) are two different metrics. KPIs focus on analyzing the overall performance of the organization, while the latter is concerned with identifying and keeping track of risks that could affect the organization’s ability to achieve its objectives).
Recommended by LinkedIn
Question: “Is there a framework to measure your cybersecurity program?”
Yes, and it’s called CARE. It was designed by Gartner, and it stands for Consistent, Adequate, Reasonable, and Effective.
In a nutshell, this framework, unlike the traditional approach where organizations measure the avoidance of an outcome, CARE helps assess the credibility and defensibility of the cybersecurity initiative.
Now… where can I find examples?
We couldn’t find an exhaustive and/ or downloadable list, but we did find resources like SecurityScorecard that mention some of the metrics you can track and share with the relevant stakeholders. This pdf from Actzero, for instance, provides an example of how you can structure your document by using columns like audience level, owner, InfoSec. category, KPI, definition, and rationale.
Next week we’ll address security by design.
This article is part of a project called Security Chronicles, written jointly with Walter Buyu .
Sources: