Making Metrics Matter to the C-Suite

Too many information security executives struggle to sell their metrics efforts to the C-suite.

What's the problem?

The way the information security industry currently thinks about metrics needs an overhaul.

We try to sell operational metrics when we should sell strategic metrics. But here's the deal: The C-suite listens and reacts only to metrics that mirror its own strategic goals for the organization.

[Security metrics: Critical issues]

Operational metrics are tools to assess the productivity of the information security team. Examples include: What was the average dwell time for a network intrusion? What is the patching status of our Korean servers? These metrics allow the CISO to determine how efficiently his or her team conducts its work.

Where information security gets into intellectual hot water is when we aggregate various operational metrics and attempt to interpret some broader significance from the results.

It doesn't work.

Cobbling together two or three metrics with some complicated algorithm yields generic answers that are neither actionable nor significant.

To build compelling C-suite metrics, we must leave our IT-centric focus behind and instead focus on the organization's initiatives. The CEO is measured on revenue growth and expense control, so our strategic information security metrics have to mirror these priorities.

We need to ask the questions: What are we trying to accomplish as a business? How do we make revenue grow faster, reduce costs, or both? How do our security efforts support these initiatives?

I'll give you an example from one of IANS' Fortune 1000 Decision Support clients. One of the corporations key initiatives was to increase revenue by opening new retail locations in underserved markets.

To demonstrate value to the C-suite, the information security team aligned itself with this business initiative. The CISO and his team built a series of metrics that showed how their activities were reducing the cycle time for new store launches. The takeaway was pretty clear --the faster a store comes online, the faster the corporation sees revenue and a return on this infrastructure investment.

By the way, this CISO didn't abandon his operational metrics program in favor of a more strategic position. Those metrics remained invaluable in measuring his team's performance. That's an important point to stress: There are operational metrics that are invaluable in measuring day-to-day performance. These are the metrics that allow you to know where you stand and how you are managing your infrastructure.

Ultimately, what I am proposing is two distinct sets of metrics. The first is a set of strategic metrics that CISOs can present to the C-suite. These should focus on how information security is directly helping revenue go up, costs go down, or both. The second set should be operational metrics that help you run your department. Don't confuse the two and dont try to make one into the other.

Why has this thinking not taken root? The answer, I think, is primarily a cultural one --we are much more comfortable with technology than business. However, if we want the C-suite to listen to concerns about information security, weve got to change.

[The Great IT Risk Measurement Debate]

It requires going outside our comfort zones and seeking out business leaders. We need to create relationships and understand what's important to the organization. Then we need to figure out how information security supports and drives the overall business initiatives. This is not going to be an easy task, but the CISOs that have made this transition have seen great success in their security programs, particularly with funding.

The members of the C-suite may not understand the intricacies of your security program, but they do understand that security matters. They know they need to spend money on security. When you can take security and link it to a revenue-generating opportunity or a cost-reduction opportunity --allowing the initiative to be done more safely, more securely, more quickly, or all of the above --that's a huge win.

Phil Gardner is the co-founder and CEO of IANS, a provider of in-depth security insights and decision support delivered through research, community and consulting.

Join the CSO newsletter!

Error: Please check your email address.

Tags security

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Phil Gardner

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place