SlideShare a Scribd company logo
Session ID:
Session Classification:
John D. Johnson
Security Strategist
Presenting Metrics
to the Executive Team
SEM-003
Intermediate
Questions:
 How do we define security metrics?
 How are security metrics useful?
 Where do get the information, and how do we
turn it into something meaningful?
 How do we present security metrics to our
management?
 Building a security metrics program
 Group Discussion: What works for you?
2
Metrics In Real Life…
3
Measurements & Metrics
 Performance metrics measure how well an
organization performs
 Drives process improvements and demonstrates
value-add
 Metrics can show how we compare to our peers
 Metrics can help us break out of the cycle that
comes from relying on products from vendors to
rescue us from new threats:
Detect  Report  Prioritize  Remediate
4
Security Metrics
 Make security metrics more meaningful to
stakeholders
 We need to learn to ask the right questions, if our
results are going to be meaningful
 The best metrics are SMART: Specific, Measurable,
Attainable, Repeatable & Time-Dependent
 This is an inherently difficult problem
 What is meaningful to stakeholders?
 Can we make metrics more quantitative?
 What can we measure?
 What are our peers doing?
5
Motivations
 Various Motivations for Developing Metrics
 Regulations - Compliance
 Audits (both internal and external)
 Money (security is rarely a profit center)
 Responding to new threats
 Enabling new technology and business processes
 Awareness: Making executives aware of trends
 Example Compliance Metrics:
 Manager sign-off on access controls
 A&A control artifacts
 Audit reports/findings (number, severity, BU)
 Exception reporting/tracking
 PCI Compliance status, dates
6
Example Security Metrics
 Application Security
 # Applications, % Critical Applications, Risk Assessment Coverage, Security Testing
Coverage
 Configuration Change Management
 Mean-Time to Complete Changes, % Changes w/Security Review, % Changes w/Security
Exceptions
 Financial
 Infosec Budget as % of IT Budget, Infosec Budget Allocation
 Incident Management
 Mean-Time to Incident Discovery, Incident Rate, % Incidents Detected by Controls, Mean-
Time Between Security Incidents, Mean-Time to Recovery
 Patch Management
 Patch Policy Compliance, Patch Management Coverage, Mean-Time to Patch
 Vulnerability Management
 Vulnerability Scan Coverage, % Systems w/o Known Severe Vulnerabilities, Mean-Time to
Mitigate Vulnerabilities, # Known Vulnerability Instances
7
* Source: Center for Internet Security
Gathering Data
 Data can be qualitative or quantitative
 Data can be coarse-grained or fine-grained
 Data can involve ordinal or cardinal numbers
 Less mature programs often have historical data to use
 Coarse-grained, qualitative, requires interpretation
 Examples: Audit findings, incident reports, viruses…
 More mature programs use multiple data sources
 Data from different sources can provide context, it is
important to consider the type of meta data that can
be gathered to add value later on
8
Modeling Data
 Some good standard assessment frameworks
can be used to provide a standard taxonomy for
describing risk
 Common frameworks allow data to be shared
and compared between companies
 Good models allow better analysis of complex
risk scenarios
 Examples: CAPEC, FAIR and VERIS
 Example of Industry Data: Verizon DBIR
9
Operational, Tactical & Strategic Metrics
 Operational plans lead to accomplishing tactical
plans, which in turn lead to accomplishing
strategic plans (which in turn are aligned with
business objectives).
 Tactical & Operational: IDS, Forensics, Help
Desk Tickets, Time to Patch, Viruses Blocked,
Support, Change Management…
 Strategic Metrics: Overall Compliance,
Compared to Baseline, Identifies Gaps in
Program, Shows Business Alignment & Value
10
Learn Where Others Succeed & Fail
11
 Successful security leaders overcome
confirmation bias and compare notes more often
with peers
 Standards and frameworks help a company
establish a baseline
 Results need to be translated into a context that
is relevant for your business
 Be aware that executives may downplay the
significance of industry data and feel their
company is the exception to the rule
Good or Bad?
12
Good or Bad?
13
© Pedro Monteiro of the What Type blog
Good or Bad?
14
Good or Bad?
15
Good or Bad?
16
Good or Bad?
17
Good or Bad?
18
Applied Security Visualization, Raffael Marty
Good or Bad?
19
Applied Security Visualization, Raffael Marty
Good or Bad?
20
http://www.pentest-standard.org
Clear, Concise, Contextual
21
© 2010 Institute of Operational Risk
Presenting to Executives
22
© 2010 Institute of Operational Risk
Security Metrics for Management
 Find a way to add business value
 Meeting regulatory requirements
 Consolidation of tools, reduction of resources
 Demonstrate reduced costs by reduction in help desk cases
 Business leaders take the loss of IP seriously
 Have security seen as a business enabler. New technologies
come with risks, but they may also lead to new innovations and
competitive advantage.
 Explain it in language business leaders understand
 Make presentations clear & concise
 Avoid IT jargon
 Provide the information executives need to make informed
decisions
23
Building a Security Metrics Program
 Decide on your goals and objectives at the onset
 Long-term and short-term goals
 Identify key metrics (SMART) to generate
 Will these be qualitative or quantitative?
 Will these be manual or automated?
 Will these be based on a standard framework, or vetted against peers, or use
some other model?
 Will these be tactical, operational, strategic or business metrics?
 Establish a baseline and targets
 Determine how best to present metrics in a consistent way, for
audience and frequency
 Get stakeholder buy-in and feedback; deliver balanced scorecard
 Develop a process for continuous improvement
24
References
 CAPEC, http://capec.mitre.org
 Verizon DBIR, http://www.verizonbusiness.com/go/2011dbir
 Verizon VERIS Framework, https://www2.icsalabs.com/veris/
 FAIR Framework, http://fairwiki.riskmanagementinsight.com/
 Center for Internet Security, Security Metrics, http://benchmarks.cisecurity.org/en-
us/?route=downloads.metrics
 Trustwave SpiderLabs Global Security Report, https://www.trustwave.com/GSR
 Ponemon Institute, http://www.ponemon.org
 Security Metrics: Replacing Fear, Uncertainty, and Doubt, Andrew Jaquith (2007)
 Metrics and Methods for Security Risk Management, Carl Young (2010)
 Security Metrics, A Beginner’s Guide, Caroline Wong (2011)
 Applied Security Visualization, Raffael Marty (2008)
 The Visual Display of Quantitative Information, Edward Tufte (2001)
25
References
 New School Security Blog, http://newschoolsecurity.com/
 SecurityMetrics.org, http://securitymetrics.org/
 A Few Good Metrics, http://www.csoonline.com/read/070105/metrics.html
 Measuring Security, Dan Geer, http://geer.tinho.net/measuringsecurity.tutorial.pdf
 CIS Consensus Security Metrics v1.0.0,
https://community.cisecurity.org/download/?redir=/metrics/CIS_Security_Metrics_v1.0
.0.pdf
 Performance Measurement Guide for Information Security,
http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf
 Directions in Security Metrics Research, http://csrc.nist.gov/publications/drafts/nistir-
7564/Draft-NISTIR-7564.pdf
 A Guide to Security Metrics,
http://www.sans.org/reading_room/whitepapers/auditing/a_guide_to_security_metrics
_55
 Patch Management and the Need for Metrics,
http://www.sans.org/reading_room/whitepapers/bestprac/1461.php
26
References
 The Security Metrics Collection,
http://www.csoonline.com/article/455463/The_Security_Metrics_Collection
 Implementing a Network Security Metrics Program,
http://www.giac.org/certified_professionals/practicals/gsec/1641.php
 Choosing the Right Metric, http://www.juiceanalytics.com/writing/choosing-rightmetric/
 Web Metrics Demystified, http://www.kaushik.net/avinash/2007/12/webmetrics-
demystified.html
 Blogs about: Security Metrics, http://en.wordpress.com/tag/security-metrics/
 Standardizing metrics and their presentation,
http://www.unifiedcompliance.com/it_compliance/metrics/reporting_standards/standar
dizing_metrics_and_thei.html
 Getting to a Useful Set of Security Metrics,
http://www.cert.org/podcast/show/20080902kreitner.html
 Dashboards by Example, http://www.enterprise-dashboard.com/
 Excel Charting Tips, http://peltiertech.com/Excel/Charts/index.html
27
Group Discussion
28

More Related Content

PDF
Information Security Strategic Management
PDF
How to measure your cybersecurity performance
PPTX
Information Security Assessment Offering
PDF
Why Corporate Security Professionals Should Care About Information Security
PPTX
Risk View - InfoSec intro
PDF
Hp arc sight_state of security ops_whitepaper
PPTX
Security assessment isaca sv presentation jan 2016
PPT
Convergence innovative integration of security
Information Security Strategic Management
How to measure your cybersecurity performance
Information Security Assessment Offering
Why Corporate Security Professionals Should Care About Information Security
Risk View - InfoSec intro
Hp arc sight_state of security ops_whitepaper
Security assessment isaca sv presentation jan 2016
Convergence innovative integration of security

What's hot (20)

PDF
u10a1-Risk Assessment Report-Beji Jacob
PPTX
Information Security Risk Management
PDF
PTX12_Presentation_George Delikouras AIA
PPTX
Hernan Huwyler - 10 risk concepts to throw on the bonfire
PPTX
Information Security Metrics - Practical Security Metrics
PDF
Strategy Insights - How to Quantify IT Risks
DOCX
The Significance of IT Security Management & Risk Assessment
PDF
Hands on IT risk assessment
PDF
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
PDF
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
PPTX
Security Metrics Program
PPTX
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
PDF
StateOfSecOps - Final - Published
PPTX
Practical Measures for Measuring Security
PDF
Effective Security Metrics
PPTX
PDF
An Intro to Resolver's Incident Management Application
PDF
IT Security and Risk Management - Visionet Systems
PDF
Using Security Metrics to Drive Action
PDF
7 Lessons Learned From BSIMM
u10a1-Risk Assessment Report-Beji Jacob
Information Security Risk Management
PTX12_Presentation_George Delikouras AIA
Hernan Huwyler - 10 risk concepts to throw on the bonfire
Information Security Metrics - Practical Security Metrics
Strategy Insights - How to Quantify IT Risks
The Significance of IT Security Management & Risk Assessment
Hands on IT risk assessment
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
Security Metrics Program
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
StateOfSecOps - Final - Published
Practical Measures for Measuring Security
Effective Security Metrics
An Intro to Resolver's Incident Management Application
IT Security and Risk Management - Visionet Systems
Using Security Metrics to Drive Action
7 Lessons Learned From BSIMM
Ad

Similar to Presenting Metrics to the Executive Team (20)

PDF
Hewlett-Packard Enterprise- State of Security Operations 2015
PPTX
Meaningfull security metrics
PPTX
What are the key cybersecurity KPIs that businesses.pptx
PPSX
Meraj Ahmad - Information security in a borderless world
PPTX
Cyber Defence - Service portfolio
PDF
Happiest Minds NIST CSF compliance Brochure
PDF
Applying Lean for information security operations centre
PPTX
Top 10 Interview Questions for Risk Analyst.pptx
PDF
State of Security Operations 2016
PDF
State of Security Operations 2016 report of capabilities and maturity of cybe...
PPTX
defensible_security-executive_support-sample.pptx
PDF
Small Business Playbook for Security and Compliance Success.pdf
PPTX
Small Business Playbook for Security and Compliance Success.pptx
PPT
Old Presentation on Security Metrics 2005
PDF
Rosetta Stone x Compliance ONETRUST-1.pdf
PDF
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
PPT
Process Maturity Assessment
PPTX
2016 Risk Management Workshop
PDF
From checkboxes to frameworks
PPTX
Managing Enterprise Risk: Why U No Haz Metrics?
Hewlett-Packard Enterprise- State of Security Operations 2015
Meaningfull security metrics
What are the key cybersecurity KPIs that businesses.pptx
Meraj Ahmad - Information security in a borderless world
Cyber Defence - Service portfolio
Happiest Minds NIST CSF compliance Brochure
Applying Lean for information security operations centre
Top 10 Interview Questions for Risk Analyst.pptx
State of Security Operations 2016
State of Security Operations 2016 report of capabilities and maturity of cybe...
defensible_security-executive_support-sample.pptx
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pptx
Old Presentation on Security Metrics 2005
Rosetta Stone x Compliance ONETRUST-1.pdf
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Process Maturity Assessment
2016 Risk Management Workshop
From checkboxes to frameworks
Managing Enterprise Risk: Why U No Haz Metrics?
Ad

More from John D. Johnson (13)

PDF
Security & Privacy Considerations for Advancing Technology
PPTX
IoT and the industrial Internet of Things - june 20 2019
PPTX
All The Things: Security, Privacy & Safety in a World of Connected Devices
PPSX
Fundamentals of Light and Matter
PDF
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
PPTX
Big Data: Big Deal or Big Brother?
PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
PPTX
Cyber Education ISACA 25 April 2017
PDF
Discovering a Universe Beyond the Cosmic Shore
PDF
AITP Presentation on Mobile Security
PDF
Security & Privacy in Cloud Computing
PDF
Mars Talk for IEEE
PDF
2011 SC Magazine Insider Threat Keynote
Security & Privacy Considerations for Advancing Technology
IoT and the industrial Internet of Things - june 20 2019
All The Things: Security, Privacy & Safety in a World of Connected Devices
Fundamentals of Light and Matter
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
Big Data: Big Deal or Big Brother?
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
Cyber Education ISACA 25 April 2017
Discovering a Universe Beyond the Cosmic Shore
AITP Presentation on Mobile Security
Security & Privacy in Cloud Computing
Mars Talk for IEEE
2011 SC Magazine Insider Threat Keynote

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Cloud computing and distributed systems.
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
Cloud computing and distributed systems.
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm

Presenting Metrics to the Executive Team

  • 1. Session ID: Session Classification: John D. Johnson Security Strategist Presenting Metrics to the Executive Team SEM-003 Intermediate
  • 2. Questions:  How do we define security metrics?  How are security metrics useful?  Where do get the information, and how do we turn it into something meaningful?  How do we present security metrics to our management?  Building a security metrics program  Group Discussion: What works for you? 2
  • 3. Metrics In Real Life… 3
  • 4. Measurements & Metrics  Performance metrics measure how well an organization performs  Drives process improvements and demonstrates value-add  Metrics can show how we compare to our peers  Metrics can help us break out of the cycle that comes from relying on products from vendors to rescue us from new threats: Detect  Report  Prioritize  Remediate 4
  • 5. Security Metrics  Make security metrics more meaningful to stakeholders  We need to learn to ask the right questions, if our results are going to be meaningful  The best metrics are SMART: Specific, Measurable, Attainable, Repeatable & Time-Dependent  This is an inherently difficult problem  What is meaningful to stakeholders?  Can we make metrics more quantitative?  What can we measure?  What are our peers doing? 5
  • 6. Motivations  Various Motivations for Developing Metrics  Regulations - Compliance  Audits (both internal and external)  Money (security is rarely a profit center)  Responding to new threats  Enabling new technology and business processes  Awareness: Making executives aware of trends  Example Compliance Metrics:  Manager sign-off on access controls  A&A control artifacts  Audit reports/findings (number, severity, BU)  Exception reporting/tracking  PCI Compliance status, dates 6
  • 7. Example Security Metrics  Application Security  # Applications, % Critical Applications, Risk Assessment Coverage, Security Testing Coverage  Configuration Change Management  Mean-Time to Complete Changes, % Changes w/Security Review, % Changes w/Security Exceptions  Financial  Infosec Budget as % of IT Budget, Infosec Budget Allocation  Incident Management  Mean-Time to Incident Discovery, Incident Rate, % Incidents Detected by Controls, Mean- Time Between Security Incidents, Mean-Time to Recovery  Patch Management  Patch Policy Compliance, Patch Management Coverage, Mean-Time to Patch  Vulnerability Management  Vulnerability Scan Coverage, % Systems w/o Known Severe Vulnerabilities, Mean-Time to Mitigate Vulnerabilities, # Known Vulnerability Instances 7 * Source: Center for Internet Security
  • 8. Gathering Data  Data can be qualitative or quantitative  Data can be coarse-grained or fine-grained  Data can involve ordinal or cardinal numbers  Less mature programs often have historical data to use  Coarse-grained, qualitative, requires interpretation  Examples: Audit findings, incident reports, viruses…  More mature programs use multiple data sources  Data from different sources can provide context, it is important to consider the type of meta data that can be gathered to add value later on 8
  • 9. Modeling Data  Some good standard assessment frameworks can be used to provide a standard taxonomy for describing risk  Common frameworks allow data to be shared and compared between companies  Good models allow better analysis of complex risk scenarios  Examples: CAPEC, FAIR and VERIS  Example of Industry Data: Verizon DBIR 9
  • 10. Operational, Tactical & Strategic Metrics  Operational plans lead to accomplishing tactical plans, which in turn lead to accomplishing strategic plans (which in turn are aligned with business objectives).  Tactical & Operational: IDS, Forensics, Help Desk Tickets, Time to Patch, Viruses Blocked, Support, Change Management…  Strategic Metrics: Overall Compliance, Compared to Baseline, Identifies Gaps in Program, Shows Business Alignment & Value 10
  • 11. Learn Where Others Succeed & Fail 11  Successful security leaders overcome confirmation bias and compare notes more often with peers  Standards and frameworks help a company establish a baseline  Results need to be translated into a context that is relevant for your business  Be aware that executives may downplay the significance of industry data and feel their company is the exception to the rule
  • 13. Good or Bad? 13 © Pedro Monteiro of the What Type blog
  • 18. Good or Bad? 18 Applied Security Visualization, Raffael Marty
  • 19. Good or Bad? 19 Applied Security Visualization, Raffael Marty
  • 21. Clear, Concise, Contextual 21 © 2010 Institute of Operational Risk
  • 22. Presenting to Executives 22 © 2010 Institute of Operational Risk
  • 23. Security Metrics for Management  Find a way to add business value  Meeting regulatory requirements  Consolidation of tools, reduction of resources  Demonstrate reduced costs by reduction in help desk cases  Business leaders take the loss of IP seriously  Have security seen as a business enabler. New technologies come with risks, but they may also lead to new innovations and competitive advantage.  Explain it in language business leaders understand  Make presentations clear & concise  Avoid IT jargon  Provide the information executives need to make informed decisions 23
  • 24. Building a Security Metrics Program  Decide on your goals and objectives at the onset  Long-term and short-term goals  Identify key metrics (SMART) to generate  Will these be qualitative or quantitative?  Will these be manual or automated?  Will these be based on a standard framework, or vetted against peers, or use some other model?  Will these be tactical, operational, strategic or business metrics?  Establish a baseline and targets  Determine how best to present metrics in a consistent way, for audience and frequency  Get stakeholder buy-in and feedback; deliver balanced scorecard  Develop a process for continuous improvement 24
  • 25. References  CAPEC, http://capec.mitre.org  Verizon DBIR, http://www.verizonbusiness.com/go/2011dbir  Verizon VERIS Framework, https://www2.icsalabs.com/veris/  FAIR Framework, http://fairwiki.riskmanagementinsight.com/  Center for Internet Security, Security Metrics, http://benchmarks.cisecurity.org/en- us/?route=downloads.metrics  Trustwave SpiderLabs Global Security Report, https://www.trustwave.com/GSR  Ponemon Institute, http://www.ponemon.org  Security Metrics: Replacing Fear, Uncertainty, and Doubt, Andrew Jaquith (2007)  Metrics and Methods for Security Risk Management, Carl Young (2010)  Security Metrics, A Beginner’s Guide, Caroline Wong (2011)  Applied Security Visualization, Raffael Marty (2008)  The Visual Display of Quantitative Information, Edward Tufte (2001) 25
  • 26. References  New School Security Blog, http://newschoolsecurity.com/  SecurityMetrics.org, http://securitymetrics.org/  A Few Good Metrics, http://www.csoonline.com/read/070105/metrics.html  Measuring Security, Dan Geer, http://geer.tinho.net/measuringsecurity.tutorial.pdf  CIS Consensus Security Metrics v1.0.0, https://community.cisecurity.org/download/?redir=/metrics/CIS_Security_Metrics_v1.0 .0.pdf  Performance Measurement Guide for Information Security, http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf  Directions in Security Metrics Research, http://csrc.nist.gov/publications/drafts/nistir- 7564/Draft-NISTIR-7564.pdf  A Guide to Security Metrics, http://www.sans.org/reading_room/whitepapers/auditing/a_guide_to_security_metrics _55  Patch Management and the Need for Metrics, http://www.sans.org/reading_room/whitepapers/bestprac/1461.php 26
  • 27. References  The Security Metrics Collection, http://www.csoonline.com/article/455463/The_Security_Metrics_Collection  Implementing a Network Security Metrics Program, http://www.giac.org/certified_professionals/practicals/gsec/1641.php  Choosing the Right Metric, http://www.juiceanalytics.com/writing/choosing-rightmetric/  Web Metrics Demystified, http://www.kaushik.net/avinash/2007/12/webmetrics- demystified.html  Blogs about: Security Metrics, http://en.wordpress.com/tag/security-metrics/  Standardizing metrics and their presentation, http://www.unifiedcompliance.com/it_compliance/metrics/reporting_standards/standar dizing_metrics_and_thei.html  Getting to a Useful Set of Security Metrics, http://www.cert.org/podcast/show/20080902kreitner.html  Dashboards by Example, http://www.enterprise-dashboard.com/  Excel Charting Tips, http://peltiertech.com/Excel/Charts/index.html 27

Editor's Notes

  • #3: My goal is 1 minute per slide; ultimately the more interesting stuff is sharing what works and doesn’t work with the people in the room.
  • #9: It can be difficult to show the efficacy of all deterrent controls when data is sparse. Metrics may include something related that can be measured, related business metrics or weights derived from good industry data sets
  • #25: This is the APPLY slide.