{"id":44192,"date":"2022-09-14T18:15:03","date_gmt":"2022-09-14T15:15:03","guid":{"rendered":"http:\/\/datalabsua.com\/ua\/?p=44192"},"modified":"2024-05-22T17:44:20","modified_gmt":"2024-05-22T14:44:20","slug":"cybersecurity-key-performance-indicators","status":"publish","type":"post","link":"https:\/\/datalabsua.com\/en\/cybersecurity-key-performance-indicators\/","title":{"rendered":"Cybersecurity key performance indicators"},"content":{"rendered":"<p>Confidential data protection is of key importance for any company. Any information leakage can lead to devastating consequences: damage to reputation, financial losses, market positions loss, customer churn, etc. The internal cybersecurity system must provide reliable data protection, as well as be proactive \u2013 detect and prevent cyberattacks in time.<\/p>\n<p>To track cybersecurity level, it\u2019s necessary to have a checklist and analyze KPIs. <strong>Key Performance Indicators (KPIs)<\/strong> are an effective way to measure the success and effectiveness of any program, including cybersecurity. It is impossible to assess the real state of security and protection level without analyzing the operation of the cybersecurity system.<\/p>\n<p>Cybercriminals evolve dynamically and constantly come up with new and more sophisticated methods of attack. Accordingly, processes and technologies for their prevention are changing. It is important to regularly evaluate the effectiveness of protection tools and timely replace and\/or update obsolete tools.<\/p>\n<p>Analysis of key performance indicators (KPIs), key risk indicators (KRIs) and security measures allows to get a complete picture of security team work, understand what is working and what doesn\u2019t work, and take appropriate actions. Metrics provide quantitative information that can be easily compiled into a report and shared with all stakeholders.<\/p>\n<p><strong>Cybersecurity key performance indicators:<\/strong><\/p>\n<ul>\n<li>Level of preparedness \u2013 determining the number of serviceable and updated devices, scanning for vulnerabilities and managing them;<\/li>\n<li>Unidentified devices on internal networks \u2013 network intrusion detection (employees can increase cyber risks and pose a threat using their own devices and poorly configured IoT devices);<\/li>\n<li>Intrusion attempt \u2013 the number of attempts by intruders to gain unauthorized access;<\/li>\n<li>Security incident \u2013 the number of information assets breaches and\/or network breaches;<\/li>\n<li>Mean time to Detect (MTTD) \u2013 the time at which security threats go unnoticed (i.e., the metric shows the time required for specialists to detect a threat);<\/li>\n<li>Mean time to resolve (MTTR) \u2013 the average response time of specialists\u2019 team to a cyberattack, determines the quality of the incident response plan implementation;<\/li>\n<li>Mean time to contain shows the response time of the company and the ability to measure its cybersecurity state;<\/li>\n<li>Security ratings \u2013 assessing cybersecurity risks, identifying information security indicators that require attention;<\/li>\n<li>Average safety rating of third parties;<\/li>\n<li>Patching Cadence \u2013 time to implement application security patches and\/or fix high-risk vulnerabilities;<\/li>\n<li>Access control and access analysis (which user has administrator rights);<\/li>\n<li>A measure of third-party risk and potential vulnerabilities;<\/li>\n<li>Time of third-party response to an incident. A security incident is a successful cyberattack. However, the target can also be a company that cybercriminals are trying to gain access to through a third party. The longer a partner takes to respond to an incident, the more likely the company is to suffer from a data breach.<\/li>\n<\/ul>\n<p>There is no general decision on which metrics to use. Each company chooses KPI and KRI depending on the field of activity, company needs, rules, guidelines, management&#8217;s vision of risks, etc. It is important that the selected metrics are understandable to everyone, including non-technical specialists, reflect the current situation and help make decisions regarding company cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To track cybersecurity level, it\u2019s necessary to have a checklist and analyze KPIs. Key Performance Indicators (KPIs) are an effective way to measure the success and effectiveness of any program, including cybersecurity. It is impossible to assess the real state of security and protection level without analyzing the operation of the cybersecurity system.<\/p>\n","protected":false},"author":2,"featured_media":44859,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[29],"class_list":["post-44192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/posts\/44192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/comments?post=44192"}],"version-history":[{"count":5,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/posts\/44192\/revisions"}],"predecessor-version":[{"id":44198,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/posts\/44192\/revisions\/44198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/media\/44859"}],"wp:attachment":[{"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/media?parent=44192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/categories?post=44192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/tags?post=44192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}