Numbers are the language of business. Fortunately, security metrics are growing ever more sophisticated. Knowing what to measure, how to measure it and how to communicate those metrics can help ...
To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources ...
The National Defense Authorization Act for Fiscal Year 2017 (2017 NDAA) requires the Department of Homeland Security (DHS) to develop an annual report containing 43 specific metrics to measure the ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More The metrics that quantify cybersecurity’s contributions to a business’ ...
Excerpted from Measures and Metrics in Corporate Security, by George Campbell, published by the Security Executive Council At a high level, metrics are quantifiable measurements of some aspect of a ...
For years, organizations have relied on traditional security metrics to measure their risk posture. Service-level agreements (SLAs), issue closure rates, and compliance checklists dominate dashboards, ...
The other day, I learned a great lesson about security metrics while getting a haircut. Initially, this may sound like a bit of an odd statement, but I promise it will make sense in the end. The woman ...
Randy Marchany has been involved in the computer industry since 1972. He is currently the Virginia Tech Information Technology Security Officer and the Director of the Virginia Tech IT Security Lab.
Knights of medieval times are known for impossible quests and challenging missions seeking rare religious items. The quest for the Holy Grail is perhaps the most notable. Today’s security ...
If you can’t measure it, you can’t manage it. Metrics, the bane and blessing of corporate citizens, emerge from this truism. Metrics allow managers to determine the efficacy of process changes and ...