KPIs and Metrics For Cyber Nerds: Infosec Engagement

It’s time for CISOs and cyber nerds to turn measurement of complex programs like information security engagement on its head so the metrics and KPIs are useful and actionable by more than info security practitioners. We need to measure cyber security engagement in a way that is useful to executives and board members as well as more broadly across the infosec program.

This video is the second in a series that attempts to rethink metrics, KPIs, and program views across cyber security programs. This video is geared to senior cyber leaders, threat intel practitioners, and infosec professionals that already have at least a basic level understanding of the threat intel cycle and want to push their boundaries beyond them in terms of measurement and easiily understandable executive level conversation.

In this video, you’ll learn the following:

● Why traditional approaches don’t work for infosec engagement

● New definitions, taxonomy, and constructs that are essential to understanding and starting to measure infosec engagement

● A new way to think about the infosec engagement cycle

● How to measure infosec engagement at the individual team level

● How to measure collective infosec engagement at the infosec program level





This channel exists to help CISOs, BISOs, and senior infosec practitioners grow and mature their programs.

Recommended from Medium

EA Servers Uptick by DDoS attacks

What Is CoinHelper Malware And How Does It Work?


Coming in Hot, Our latest Airdrop 🪂

Uppsala Security Signed a „Business Service Partnership“ Agreement with Samsung Electronics

Fasten your seatbelt, the bird season is starting.

Imagine taking back control of your personal information

Making The Smart Bet On Cybersecurity

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Opinionated Security

Opinionated Security

Tony Grey * CISO for an insurance company * grew team from 3 to 22 * led large software teams at Microsoft * blogs about cyber leadership & program development

More from Medium

Security Protection Using NIST CSF

Reverse engineering musings: WhisperGate Stages 1 & 2

Quantified AppSec

Detecting Sweet32 vulnerability in a Web-Application