Cybersecurity can be daunting, especially if you are unsure which metrics to track. And to be honest, this title is kind of misleading. Metrics, just like cybersecurity, are not one-size-fits-all. The most important metrics that your organization’s security program should track should be driven by what is critical to monitor in your industry and whether you have reporting requirements.

Before we dive in, we must clarify that first and foremost you need to establish a security program that is customized to your organization and its industry. Once you have this in place, it is time to track metrics to see how well your security system is working and where your organization stands against cyberattacks.


Security Metrics

The security metrics your organization should track are dependent on your industry and its reporting requirements.

For example, private schools are required to comply with the Family Educational Rights and Privacy Act (FERPA). After an initial impact assessment, the private school may determine that data tagging student records and tracking the movements via logging is vital to their security program. They may also want to track data breach attempts based on specific thresholds to see where hackers are most interested.

In another example, a manufacturing plant that handles legacy equipment is only profitable and secure if it maintains a certain interval speed. If the manufacturing is stopped for any reason, it could result in large-scale losses each hour. The executive team may want to track the recovery time and pinpoint weak areas in the production line that may need to be corrected.


How to Determine Your Security Metrics


As is evident from these two scenarios, each organization needs to determine what metrics are important to track based on their specific needs. Each metric is equally important to the other. However, the process of determining what metrics are important to the organization should be the same regardless of the business model.

The first step is to understand the core business functions and values of your organization. This will help drive the security metrics and outcomes. We encourage you to speak with each business unit to understand their operations and identify which data elements are most important to them. Then, you can begin to develop the bigger picture for your security system.

As your security program matures, you may find that the metrics will change in tandem. The point of this exercise is to fully understand what is important to the organization so the metrics presented to the executive team have value.


If you have questions about cybersecurity and which metrics to track, contact usSlate Enclave is the trusted partner for custom security solutions, tailored to your business.


About Slate

Slate is known for providing security solutions for Federal Agencies—including implementing comprehensive security programs for maximum security organizations and U.S. intelligence agencies. Our team works closely with federal government contractors to help them prepare for the upcoming Cybersecurity Maturity Model Certification (CMMC) standards.

Slate is an approved Registered Provider Organization (RPO) within the CMMC Marketplace. This means we completed all the requirements set by the CMMC-AB Code of Professional Conduct and have been vetted to help organizations prepare for the CMMC. We are also in the process of becoming a certified CMMC Third-Party Assessor Organization (C3PAO). Our team is comprised of highly skilled, recognized, and respected professionals in the security industry. We maintain standard certifications, DoD 8570 compliance, the appropriate clearances, and continuing education to ensure the highest security of your organization.



Related content:

Our CMMC/DFARS Solutions
The First Steps Towards CMMC Compliance
The Role of Cyber Awareness in the Workplace
Starting A Cyber Awareness Program…