Cyber Resiliency: Difference between revisions
No edit summary |
|||
Line 2: | Line 2: | ||
==Metrics== | ==Metrics== | ||
There are two different approaches to measuring cybersecurity effectiveness: Dashboards and benchmarking. Dashboards visualize and make assessable metrics quantified in terms of cost, risk level, and time. Benchmarking refers to the gathering of data from similar organizations for comparison with one's own organization’s cybersecurity measures.<ref>[https://www.logsign.com/blog/what-are-cyber-security-measures-of-effectiveness/ Cybersecurity effectiveness measures, Logsign]</ref> | There are two different approaches to measuring cybersecurity effectiveness: Dashboards and benchmarking. | ||
===Dashboards=== | |||
Dashboards visualize and make assessable metrics quantified in terms of cost, risk level, and time. | |||
Key Performance Indicators (KPIs):<ref>[https://cipher.com/blog/10-cybersecurity-metrics-you-should-be-monitoring/ Top 10 Cybersecurity KPIs, Cipher]]</ref> | |||
# Mean-Time-to-Detect and Mean-Time-to-Respond | |||
# Number of systems with known vulnerabilities | |||
# Number of incorrectly configured SSL certificates | |||
# Volume of data transferred using the corporate network | |||
# Number of users with “super user” access level | |||
# Number of days to deactivate former employee credentials | |||
# Number of communication ports open during a period of time | |||
# Frequency of review of third party accesses | |||
# Frequency of third-party accesses to critical enterprise systems | |||
# Percentage of business partners with effective cybersecurity policies | |||
===Benchmarking=== | |||
Benchmarking refers to the gathering of data from similar organizations for comparison with one's own organization’s cybersecurity measures.<ref>[https://www.logsign.com/blog/what-are-cyber-security-measures-of-effectiveness/ Cybersecurity effectiveness measures, Logsign]</ref> | |||
==Challenges== | ==Challenges== |
Revision as of 17:35, 6 August 2021
Cyber Resiliency is the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on cyber resources.[1] In essence, it is the effectiveness of an entity's cybersecurity. Cyber resiliency differs from Cybersecurity in that it emphasizes the need to minimize mission impacts rather than the need to minimize losses of information, information systems, or other assets. Cyber resiliency differs from other concerns of resilience in that it focused on adversarial disruptions.[2]
Metrics
There are two different approaches to measuring cybersecurity effectiveness: Dashboards and benchmarking.
Dashboards
Dashboards visualize and make assessable metrics quantified in terms of cost, risk level, and time. Key Performance Indicators (KPIs):[3]
- Mean-Time-to-Detect and Mean-Time-to-Respond
- Number of systems with known vulnerabilities
- Number of incorrectly configured SSL certificates
- Volume of data transferred using the corporate network
- Number of users with “super user” access level
- Number of days to deactivate former employee credentials
- Number of communication ports open during a period of time
- Frequency of review of third party accesses
- Frequency of third-party accesses to critical enterprise systems
- Percentage of business partners with effective cybersecurity policies
Benchmarking
Benchmarking refers to the gathering of data from similar organizations for comparison with one's own organization’s cybersecurity measures.[4]