SlideShare a Scribd company logo
Measures and Metrics In Corporate
Security
PLN9, A Complete Security Solution In
Association With Tyco
© COPYRIGHT PLN9 SECURITY SERVICES PVT. LTD. ALL RIGHTS RESERVED
1- Basic











Introduction
The Business Context for Metrics
The Balanced Scorecard
The Risk Management Context for Metrics
The Regulatory Context for Metrics
The CSO’s Context for Metrics
The Legal Context - The Critical Value of a Policy Infrastructure
Good Metrics are Smart
Keep Your Measures and Metrics in Proper Perspective
Making the Workbook Work for You
2-Types Of Metrics & Performance
Indicators













Influential Initiatives from the Corner Office
The CSO Dashboard
Risk Analyses
Threat Assessment
Vulnerability Assessment
Cost Risk Benefit Analysis
Leading Indicators
A lagging indicator
Value Indicators
Criticality Ranking
Confidence and Influence Indicators
Security Standards
3-Building A Model Appropriate To Your Needs











Does the Business we’re in Make a Difference?
What Are the Most Important Data to the Security Executive?
What Should We Measure?
What’s the Goal? What Are Your Objectives With This Data?
Metrics Can Bite
How do I Get the Attention of Different Constituencies?
Management of the Data
What Tools Are in the Presentation Toolkit?
Interpreting the Data
Organizing For Success: Engaging a Security Committee.
4-Security-Related Measures and Metrics











Communicating Risk Knowledge
Audit Implications
Background Investigations
Business Conduct & Reputational Risk
Criminal Incidents and Investigations
Security Operations, Physical Security & Premises Protection
Contingency Planning & Business Continuity
Business-based Security Programs
Confidence with the Corporate Security Functions
Management, Professional Development & Employee Satisfaction
Risk Measure Maps






Frequency and Severity of Workplace Violence Incidents
Increased Numbers of Employees as Subjects in Misconduct Cases
Security Budget Reduction As Result of Decreasing Corporate Revenues
Business Interruption By Computer Virus
Failure of Security to Respond to Security Breach
Thank you

More Related Content

What's hot

Tpm all you need v1.2
Tpm all you need v1.2Tpm all you need v1.2
Tpm all you need v1.2
RastinKenarsari
 
David Caruso Keynote Address
David Caruso Keynote AddressDavid Caruso Keynote Address
David Caruso Keynote Address
Nathaniel Palmer
 
Managing with KPI's and KRI's
Managing with KPI's and KRI's Managing with KPI's and KRI's
Managing with KPI's and KRI's
Andrew Smart
 
Ignorance Is Risk
Ignorance Is RiskIgnorance Is Risk
Ignorance Is Risk
Jeromie Jackson
 
Intro To COBIT IT Controls And Cost Benefit Analysis
Intro To COBIT IT Controls And Cost Benefit AnalysisIntro To COBIT IT Controls And Cost Benefit Analysis
Intro To COBIT IT Controls And Cost Benefit Analysis
webmentorman
 
Paul Strassman Keynote Address
Paul Strassman Keynote AddressPaul Strassman Keynote Address
Paul Strassman Keynote Address
Nathaniel Palmer
 
Gartner IT Financial, Procurement & Asset Management Summit London 2011 Overview
Gartner IT Financial, Procurement & Asset Management Summit London 2011 OverviewGartner IT Financial, Procurement & Asset Management Summit London 2011 Overview
Gartner IT Financial, Procurement & Asset Management Summit London 2011 Overview
Pascal Winckel
 
JoMax Consulting Introduction
JoMax Consulting Introduction  JoMax Consulting Introduction
JoMax Consulting Introduction Vince Benz
 
It governance
It governanceIt governance
It governance
Mahetab Khan
 
It governance 13 may20102
It governance 13 may20102It governance 13 may20102
It governance 13 may20102James Sutter
 
IT governance and bal
IT governance and balIT governance and bal
IT governance and balsourov_das
 
Expert handling and management of project and compliance risk
Expert handling and management of project and compliance risk Expert handling and management of project and compliance risk
Expert handling and management of project and compliance risk
Rolta
 
IT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance MetricIT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance Metric
PECB
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentation
S L
 
The Do's and Don'ts of Fixing FP&A While ERP is in Flux
The Do's and Don'ts of Fixing FP&A While ERP is in FluxThe Do's and Don'ts of Fixing FP&A While ERP is in Flux
The Do's and Don'ts of Fixing FP&A While ERP is in Flux
Adaptive Insights
 
Physical security roi
Physical security roi Physical security roi
Physical security roi
Kevin Schmidt, LPC
 
Sage ERP Cost Benefit Analysis
Sage ERP Cost Benefit AnalysisSage ERP Cost Benefit Analysis
Sage ERP Cost Benefit Analysis
BurCom Consulting Ltd.
 
Measuring IT Value with Business Intelligence and Analytics
Measuring IT Value with Business Intelligence and AnalyticsMeasuring IT Value with Business Intelligence and Analytics
Measuring IT Value with Business Intelligence and Analytics
ComScibyUpland
 
Allegro Opportune Success Factors For Etrm System Implementation
Allegro Opportune  Success Factors For Etrm System ImplementationAllegro Opportune  Success Factors For Etrm System Implementation
Allegro Opportune Success Factors For Etrm System Implementation
robertjparker
 
IT Governance Overview
IT Governance OverviewIT Governance Overview
IT Governance OverviewJim Sutter
 

What's hot (20)

Tpm all you need v1.2
Tpm all you need v1.2Tpm all you need v1.2
Tpm all you need v1.2
 
David Caruso Keynote Address
David Caruso Keynote AddressDavid Caruso Keynote Address
David Caruso Keynote Address
 
Managing with KPI's and KRI's
Managing with KPI's and KRI's Managing with KPI's and KRI's
Managing with KPI's and KRI's
 
Ignorance Is Risk
Ignorance Is RiskIgnorance Is Risk
Ignorance Is Risk
 
Intro To COBIT IT Controls And Cost Benefit Analysis
Intro To COBIT IT Controls And Cost Benefit AnalysisIntro To COBIT IT Controls And Cost Benefit Analysis
Intro To COBIT IT Controls And Cost Benefit Analysis
 
Paul Strassman Keynote Address
Paul Strassman Keynote AddressPaul Strassman Keynote Address
Paul Strassman Keynote Address
 
Gartner IT Financial, Procurement & Asset Management Summit London 2011 Overview
Gartner IT Financial, Procurement & Asset Management Summit London 2011 OverviewGartner IT Financial, Procurement & Asset Management Summit London 2011 Overview
Gartner IT Financial, Procurement & Asset Management Summit London 2011 Overview
 
JoMax Consulting Introduction
JoMax Consulting Introduction  JoMax Consulting Introduction
JoMax Consulting Introduction
 
It governance
It governanceIt governance
It governance
 
It governance 13 may20102
It governance 13 may20102It governance 13 may20102
It governance 13 may20102
 
IT governance and bal
IT governance and balIT governance and bal
IT governance and bal
 
Expert handling and management of project and compliance risk
Expert handling and management of project and compliance risk Expert handling and management of project and compliance risk
Expert handling and management of project and compliance risk
 
IT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance MetricIT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance Metric
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentation
 
The Do's and Don'ts of Fixing FP&A While ERP is in Flux
The Do's and Don'ts of Fixing FP&A While ERP is in FluxThe Do's and Don'ts of Fixing FP&A While ERP is in Flux
The Do's and Don'ts of Fixing FP&A While ERP is in Flux
 
Physical security roi
Physical security roi Physical security roi
Physical security roi
 
Sage ERP Cost Benefit Analysis
Sage ERP Cost Benefit AnalysisSage ERP Cost Benefit Analysis
Sage ERP Cost Benefit Analysis
 
Measuring IT Value with Business Intelligence and Analytics
Measuring IT Value with Business Intelligence and AnalyticsMeasuring IT Value with Business Intelligence and Analytics
Measuring IT Value with Business Intelligence and Analytics
 
Allegro Opportune Success Factors For Etrm System Implementation
Allegro Opportune  Success Factors For Etrm System ImplementationAllegro Opportune  Success Factors For Etrm System Implementation
Allegro Opportune Success Factors For Etrm System Implementation
 
IT Governance Overview
IT Governance OverviewIT Governance Overview
IT Governance Overview
 

Similar to Measures and metrics in corporate security

IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
GrapesTech Solutions
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloJohn Intindolo
 
WHEN Group Investor Deck
WHEN Group Investor DeckWHEN Group Investor Deck
WHEN Group Investor Deck
RedChip Companies, Inc.
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 
SLA Best Practices Ci
SLA Best Practices   CiSLA Best Practices   Ci
SLA Best Practices Ci
Marion Lipshutz
 
IT Governances
IT GovernancesIT Governances
IT Governances
Jerald Burget
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
Bradley Susser
 
Hp arc sight_state of security ops_whitepaper
Hp arc sight_state of security ops_whitepaperHp arc sight_state of security ops_whitepaper
Hp arc sight_state of security ops_whitepaper
rickkaun
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
Security Executive Council
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
Capgemini
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
Happiest Minds Technologies
 
Task 2
Task 2Task 2
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
Chris Ross
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Solvency II Offering
Solvency II Offering Solvency II Offering
Solvency II Offering
Thinksoft Global
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consulting
Iskcon Ahmedabad
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
Mohamed Abdelhakim
 
The Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data ManagementThe Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data Management
DATAVERSITY
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy
Maarten BOONEN
 

Similar to Measures and metrics in corporate security (20)

IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_Intindolo
 
WHEN Group Investor Deck
WHEN Group Investor DeckWHEN Group Investor Deck
WHEN Group Investor Deck
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
SLA Best Practices Ci
SLA Best Practices   CiSLA Best Practices   Ci
SLA Best Practices Ci
 
IT Governances
IT GovernancesIT Governances
IT Governances
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
Hp arc sight_state of security ops_whitepaper
Hp arc sight_state of security ops_whitepaperHp arc sight_state of security ops_whitepaper
Hp arc sight_state of security ops_whitepaper
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
 
Task 2
Task 2Task 2
Task 2
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Solvency II Offering
Solvency II Offering Solvency II Offering
Solvency II Offering
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consulting
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
Security Metrics
Security MetricsSecurity Metrics
Security Metrics
 
The Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data ManagementThe Chief Data Officer Agenda: Metrics for Information and Data Management
The Chief Data Officer Agenda: Metrics for Information and Data Management
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy
 

More from PLN9 Security Services Pvt. Ltd.

Patrolling
PatrollingPatrolling
Types of Security Services
Types of Security ServicesTypes of Security Services
Types of Security Services
PLN9 Security Services Pvt. Ltd.
 
Smms corporate presentation ppt
Smms corporate presentation pptSmms corporate presentation ppt
Smms corporate presentation ppt
PLN9 Security Services Pvt. Ltd.
 
Corporate Presentation (solar plants)
Corporate Presentation (solar plants)Corporate Presentation (solar plants)
Corporate Presentation (solar plants)
PLN9 Security Services Pvt. Ltd.
 
Physical Security
Physical SecurityPhysical Security
Negotiation Skill
Negotiation SkillNegotiation Skill
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
PLN9 Security Services Pvt. Ltd.
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
PLN9 Security Services Pvt. Ltd.
 
Motivational Skills
Motivational SkillsMotivational Skills
How to Teach Soft Skills
How to Teach Soft SkillsHow to Teach Soft Skills
How to Teach Soft Skills
PLN9 Security Services Pvt. Ltd.
 

More from PLN9 Security Services Pvt. Ltd. (20)

Port security
Port securityPort security
Port security
 
Patrolling
PatrollingPatrolling
Patrolling
 
Types of Security Services
Types of Security ServicesTypes of Security Services
Types of Security Services
 
Smms corporate presentation ppt
Smms corporate presentation pptSmms corporate presentation ppt
Smms corporate presentation ppt
 
Corporate Presentation (solar plants)
Corporate Presentation (solar plants)Corporate Presentation (solar plants)
Corporate Presentation (solar plants)
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Negotiation Skill
Negotiation SkillNegotiation Skill
Negotiation Skill
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Motivational Skills
Motivational SkillsMotivational Skills
Motivational Skills
 
Types of Soft Skills
Types of Soft Skills Types of Soft Skills
Types of Soft Skills
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
How to Teach Soft Skills
How to Teach Soft SkillsHow to Teach Soft Skills
How to Teach Soft Skills
 
Campus Security
Campus SecurityCampus Security
Campus Security
 
Managing Conflicts @ Workplace
Managing Conflicts @ WorkplaceManaging Conflicts @ Workplace
Managing Conflicts @ Workplace
 
ATM Security Tips
ATM Security TipsATM Security Tips
ATM Security Tips
 
Powerful Presentation Skills
Powerful Presentation SkillsPowerful Presentation Skills
Powerful Presentation Skills
 
Personality Development
Personality DevelopmentPersonality Development
Personality Development
 
'Leadership & Executive Coaching'
'Leadership & Executive Coaching''Leadership & Executive Coaching'
'Leadership & Executive Coaching'
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Measures and metrics in corporate security

  • 1. Measures and Metrics In Corporate Security PLN9, A Complete Security Solution In Association With Tyco © COPYRIGHT PLN9 SECURITY SERVICES PVT. LTD. ALL RIGHTS RESERVED
  • 3.           Introduction The Business Context for Metrics The Balanced Scorecard The Risk Management Context for Metrics The Regulatory Context for Metrics The CSO’s Context for Metrics The Legal Context - The Critical Value of a Policy Infrastructure Good Metrics are Smart Keep Your Measures and Metrics in Proper Perspective Making the Workbook Work for You
  • 4. 2-Types Of Metrics & Performance Indicators
  • 5.             Influential Initiatives from the Corner Office The CSO Dashboard Risk Analyses Threat Assessment Vulnerability Assessment Cost Risk Benefit Analysis Leading Indicators A lagging indicator Value Indicators Criticality Ranking Confidence and Influence Indicators Security Standards
  • 6. 3-Building A Model Appropriate To Your Needs
  • 7.           Does the Business we’re in Make a Difference? What Are the Most Important Data to the Security Executive? What Should We Measure? What’s the Goal? What Are Your Objectives With This Data? Metrics Can Bite How do I Get the Attention of Different Constituencies? Management of the Data What Tools Are in the Presentation Toolkit? Interpreting the Data Organizing For Success: Engaging a Security Committee.
  • 9.           Communicating Risk Knowledge Audit Implications Background Investigations Business Conduct & Reputational Risk Criminal Incidents and Investigations Security Operations, Physical Security & Premises Protection Contingency Planning & Business Continuity Business-based Security Programs Confidence with the Corporate Security Functions Management, Professional Development & Employee Satisfaction
  • 11.      Frequency and Severity of Workplace Violence Incidents Increased Numbers of Employees as Subjects in Misconduct Cases Security Budget Reduction As Result of Decreasing Corporate Revenues Business Interruption By Computer Virus Failure of Security to Respond to Security Breach