Get Instant Access
to This Blueprint

Security icon

Forge an Ironclad Reporting Strategy for Security Metrics

Help the board understand what they need to know – no more, no less.

  • Board-level presentations are a rare opportunity for Security and the Business to understand each other’s viewpoints and the things they care about, and metrics are a good way of quantifying successes and shortcomings.
  • But because both sides think in different terms, reaching this understanding can be easier said than done. In effect, there is a language gap between the Business and Security that can have a detrimental effect on business-security alignment.

Our Advice

Critical Insight

  • Out of all the metrics your security program tracks, how do you decide which ones are important enough to share with the board?
  • Once you’ve made that decision, how will you explain those metrics in terms that will be meaningful to the board?
  • The best way is to aggregate your individual, low-level metrics into larger groups that are easily digestible by the board.

Impact and Result

  • Learn to view your individual metrics as component parts in a larger story about your organization’s security posture.
  • Decide what message the business needs to hear in order to appreciate the security program’s successes and areas for improvement.
  • Strategize ways of using those groups to tell a broader story about risk, allowing you to bridge the language gap between security and business leaders.

Forge an Ironclad Reporting Strategy for Security Metrics Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should develop a risk-based reporting strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

1. Develop a risk-based reporting model

Deliver a strong metrics presentation to the board by presenting data in terms of business risk.


Member Testimonials

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.

Client

Experience

Impact

$ Saved

Days Saved

YHA New Zealand

Guided Implementation

10/10

$10,000

10

No worst parts, I enjoyed working with Logan on this project and found his input invaluable.

City of Durham

Guided Implementation

9/10

N/A

N/A

Logan communicated very effectively and made sure the discussion provided value and met my objective.

Sherritt International Corporation

Guided Implementation

10/10

N/A

20

Excellent advise on designing Cyber Security dashboard.

Ontario Pension Board

Guided Implementation

9/10

$20,500

10

Best - discovered other tools that were more appropriate during our discussions Worst - realized that I don't have time to do all the things I'd l... Read More

Shared Services Canada

Guided Implementation

10/10

$1,000

5

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 1-phase advisory process. You'll receive 2 touchpoints with our researchers, all included in your membership.

  • Call 1: Start with a winning reporting strategy.
  • Call 2: Learn to communicate through risk-based terms.

Author

Logan Rohde

Contributors

  • Robert H. Jackson, Global Chief Information Security Officer, Sedgwick
  • Peter Singh, Executive Officer - IT Services, Toronto District School Board
  • Jeff Tandy, Senior IT Security Specialist, General Dynamics Land Systems Canada
  • Kelly Walsh, CIO, College of Westchester
  • Kevin Yenglin, Information Security Manager, Rehmann
  • Three anonymous contributors
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019