* More on metrics in IT security and compliance Last week, I talked about the emergence of metrics in the management of IT risks. I asked for your feedback, and (thank you all very much!) I’ve already gotten many interesting responses from readers and IT practitioners.Although what I wrote about last week was the increasing use of metrics in the management of security and compliance risks, it should be pointed out that IT risk management is a much broader topic than security and compliance alone, and touches on areas such as project, technology and investment risks. IT governance initiatives address another aspect of IT risk, mitigating exposures through a systematic integration of people, process and technology controls.When it comes to the evolution of metrics, however, one of the most active areas of interest today is in the use of metrics in the management of IT security and compliance risks – a trend influenced in no small way by the increased adoption of best-practices governance models such as those mentioned above, as well as control frameworks for satisfying regulatory compliance requirements. These systematic approaches tend to favor objective measurements of conformity which encourage metrics-based measurement.I mentioned last week that I see IT security and compliance risk metrics falling into two broad categories: tactical metrics, which contribute to measurement of the current risk posture such as numbers of systems, network points and users in compliance with a given policy or standard; and strategic metrics that combine higher-level correlations of metrics that guide decision support in developing a security and compliance management strategy. Readers offered several examples of each, and among the most interesting to me were those that achieve an elusive goal: the use of performance-based measures in security management. While network availability measurement can (and must) be performance-based, security metrics tend to be more asset-focused, such as measuring the types of defenses in place or numbers of systems protected against a specific threat. Response time, however – in dealing with security events or applying countermeasures to an emerging threat, for example – is a security performance measure that can add significant value to measurable service level management (SLM).Performance-based metrics like these, however, still tend to be more in the tactical category – unless they can be used to support security and compliance strategy decisions. Not coincidentally, managed security service providers (MSSP) have capitalized on that strategic opportunity. The sophisticated tools and expertise available to an MSSP are often outside the reach of what their customers can maintain – and, just as importantly, retain – in-house. These quantifiable asset-based measures can be delivered with measurable performance in response and remediation. Financial savings can be measured against the cost of maintaining assets and expertise that deliver the same degree of value. Of course, we could go on indefinitely about security and compliance risk metrics – and I’d like to invite you to do just that, at a new Web site devoted to this topic, where I invite you to respond to a poll asking visitors what categories of strategic metrics they value most. Because of the relationship between risk metrics and service level management, this new site will be hosted by the SLM-Info community. Registrants will be able to see up-to-date poll results, and additional studies will likely be featured in the future. We would welcome your input on topics you’d like to see addressed.If you’ll be at the RSA Conference in San Jose next week, I also invite you to a panel I’ll be on, where Gidi Cohen of Skybox Security, Dan Geer of Verdasys, Preston Wood, CISO, Zions Bancorporation, and John Meakin, group head of information security for Standard Chartered Bank, will join me to discuss “ABCs of Security Risk Metrics Calculations: A Common Language,” Wednesday, Feb. 15 at 3:25 p.m. The conference Web site can provide you with details of the panel sessions.Your responses to the poll here will have an influence on this panel discussion, so I encourage you to visit the Web site and participate. Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Mergers and Acquisitions news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Network Management Software Network Management Software news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe