12
Testing Your Security and Building Metrics
We have covered a lot of different topics throughout this book. We have built our vision and mission statements, aligned our security program to a framework, performed assessments, created a strategy, and learned about several different security topics. So, how do we know everything is working as intended? We must set up monitoring tools to ensure that our IT resources have stayed within our security baselines.
How do we do this? First, we build meaningful metrics to ensure that we are not only maintaining our security but are also mitigating the risks in our organization. Vulnerability scans, phishing attempts, ping sweeps, and brute force attempts are all things that we can report. However, we ...
Get Executive’s Cybersecurity Program Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.