Many companies are finally taking cybersecurity seriously and have implemented programs to meet their organization’s specific needs. Having a program in place, however, is only the first step. Measuring the effectiveness of a cybersecurity plan is equally important. There are several steps a company should take to adequately measure the effectiveness of their plan.
How Does A Company Measure Security Efforts?
There have to be specific ways to measure security efforts in order to determine their effectiveness. Before beginning this process, it’s important to understand the difference between measurement and metrics. The United States National Institute for Standards and Technology (NIST) states that measurement is defined as observable and quantifiable. Metrics, however, are normally something that can be supported by measurement. Metrics are to be used to assist in decision making and to improve accountability and ultimately performance. Cybersecurity metrics should include accurate data that can be compared in different time periods. In particular, it must include specific and objective data. Cybersecurity effectiveness can generally be divided into three areas. These include systems, incidents, and people.
What Metrics Should a Company Choose?
Establishing a few key metrics to determine cybersecurity effectiveness is a good place to begin. An organization will need to start by tying in their business goals with how increased security can help meet those specific goals. This would include establishing a company’s threat profile and identifying scenarios that would potentially cause the greatest impact to an organization. The following are examples of various metrics that can be used.
State Current Capabilities – An organization should be able to list their current security capabilities. What programs are in place? What exactly are they expected to do? How does the current program address each high-risk scenario that the organization may face?
List Vulnerable Assets – To understand the risk an organization incurs, it’s necessary to know the number of all vulnerable assets. This will enable a company to create a vulnerability management plan that will likely include scans of all appropriate assets. This will indicate what specific action, such as managing patches and updates, should be taken to improve security.
After a few general metrics have been established, a company will want to put in place those that are more specific. The following are just a few examples of specific metrics that can be used to assess the effectiveness of a cybersecurity plan.
Track Patching and Updates – Patch management is a critical aspect of addressing vulnerabilities in software. Companies will want to specifically track how many system patches have been put in place over a particular time period or how many updates have been installed. How often patching is completed can be compared to the number of incidents that occur within a particular time period.
Response Time – Keeping track of response times for a variety of incidents is a relatively objective and efficient way to measure overall effectiveness. How many spam messages have been intercepted? How many attacks from worms, viruses, or ransomware have been identified during a specific time period and how much time lapsed been identification and resolution? How long did it take to remediate vulnerabilities that are found in software?
Monitor Data Transference – Monitoring the volume of data that is being transferred will help an organization identify misuse. If employees are downloading videos, software, and applications that are unnecessary or potentially dangerous, this can open the door for malware.
How is the Company Comparing to Peer Performance?
Another way to gage cybersecurity performance is in relation to how other organizations in similar industries are doing. After deciding which metrics to use to determine security effectiveness, an organization will want to find out how successful other companies are in these areas. Comparing performance to other companies is also known as benchmarking.
How many security breaches have occurred when compared to other companies in the same industry of a similar size? How did they handle different types of incidents? What percentage of the budget is being spent on cybersecurity? These are just a few questions to ask when making valid comparisons. There are a variety of peer networking forums and online meetings that can be used when finding out how other organizations are doing when it comes to cybersecurity.
What Steps Can a Company Take to Address Gaps in Performance?
Finally, how an organization addresses gaps in performance will determine how effective their cybersecurity program will ultimately be. After metrics have been in place for a specified time period and then evaluated, the company will want to implement the following to strengthen weak areas.
Educating Employees – Ongoing employee training is the first, and for most organizations the most important aspect of cybersecurity effectiveness. Organizations need to have clear company policies in place that specifically address weaknesses and gaps that have been discovered.
Updating Systems – Whether it’s improving hardware security, automatically updating software, or creating a new firewall, a company’s systems must constantly be monitored and updated to improve cybersecurity effectiveness.
Ongoing Testing – Is employee education effective? Has the number of times employees have responded to online scams or clicked on a dangerous link decreased? Part of testing will be to record and analyze recovery time whenever an incident occurs. Cybersecurity effectiveness can be calculated by how much time lapses between the detection of a threat and when appropriate action is taken. An organization needs to find an objective method of calculating recovery time.
After completing the previous steps, an organization will now have a better understanding of how effective their cybersecurity program is and how it aligns with their overall business goals. They should also have a plan in place for improvement and specific ways to track and monitor improvement. Finally, it’s important to remember that assessing cybersecurity effectiveness is an ongoing process. This means it’s necessary to continually update and tweak the metrics that are used so they align with the ongoing security needs of the organization.
“My passion for quality IT service is at the forefront of my career.”
Lance Skipper Client Engineer
“A day without laughter is a day wasted.”– Charlie Chaplin
Always at your service to provide the highest level of quality support to our customers.
Anthony Firth Client Engineer
“I’m passionate about building and fostering relationships, and finding solutions for success.”
Michael Koenig Client Account Manager
“Enabling IT to become an effective and valuable partner by delivering premier customer service and quality IT solutions achieving business goals.”
Jake Parrott Business Development Manager
“Striving to provide friendly and quality service to our customers”
Ted Rorabaugh Client Engineer
“I help clients stabilize and grow their IT infrastructure so they can focus on growing their core business.”
Josh Wilshire Systems Engineer Team Lead
“Striving to be your trusted adviser and IT teammate in accomplishing all your business goals”
Brandan Bishop Client Account Manager
“I strive to provide the highest level of quality service to our customers.”
Tommy Williams Sr. Hardware Engineer
“I’m driven by the steadfast belief that technology must serve as a business enabler. This mantra has driven 21
Years of successful partnerships.”
Stephen Riddick VP Sales & Marketing
“CSP doesn’t succeed unless your company succeeds.”
Stephen Allen Inventory Manager
“Through my intuition and genuine concern to help others I have built long-lasting relationships with our customers, co-workers and business partners.”
Scott Forbes VP Support Services
“Every day, I work with clients to help plan the future of their businesses.”
Michael Bowman vCIO
“Your IT problems become our IT solutions.”
Mark McLemore Project Engineer
“Managing internal and external operations to ensure that CSP provides quality and reliable customer service .”
Margie Figueroa Business Manager
“Helping customers get the most out of their IT Infrastructure.”
Marc Gillet Project Engineer
“Providing quality internal and externals financial support to our customers and accounting support to CSP.”
Katie Steiglitz Accounting Administrator
“Your satisfaction is our #1 priority.”
Heather Moore Project Manager
“Some call me the CEO. I call myself the Cheerleader for an awesome team!”
William B. Riddick Founder & CEO
“CSP is here to assist you with your IT needs.”
Beth Wylie Inside Sales Manager
Thinking ofHiring A New IT Company?
On What Questions You Need To Ask Before Signing Any Agreement.