Measuring Information Security

Published On: August 29, 2016

Measuring information security is one of the most difficult tasks a security leader faces. How do you measure something that has no quantifiable definition? There just is not an accepted metric by which to measure r compare, yet this is exactly what most board members want to know. “Security leaders must begin to speak the language of the business and show forecast improvements, investments required, and track improvement based on consistent key process indicators. This is the same rigor applied to other areas of the business and information security or cyber security must transcend.” Quote taken from Michael T. Lester’s article Technology Security and the Human Condition posted on CSO online.
Check out how Michael Lester’s CSO Online article goes on to explain how Information Security is a “human problem” not a “machine problem” and how Secure Digital Solutions “TrustMAPP” platform addresses this issue. Read the full article at CSO Online.

Secure Digital Solutions (SDS) has been at the forefront of maturity-based consulting, today offering a baseline Maturity Assessment, Profile, and Plan (MAPP) to all our clients. We’ve made the three-step MAPP process rapid, reliable, and repeatable with our automation platform, TrustMAPP™.

Contact us today to begin your free trial.

TrustMAPP. Elevating Information Security.

Browse These Topics


2022 Cyber trends Affordable Information Security Platform Affordable Security Assessment Tool analyze security data findings analyze your security data Assess Company's Security Readiness ciso CISO investment strategies Common Employee Data Security Mistakes company cyber security plans company that specializes in preventing data breaches company’s Internet security cybersecurity budgeting cybersecurity is discussed in board meetings data breach readiness Data Security Data Security Tactics Facebook Safety Federal Trade Commission’s cybersecurity standards fighting security attacks financial data stolen improving the information security of your company increase cyber security across your entire company information protected from a Malicious Cyber Attack Information Security Best Practices interactive security software platform Keep Cloud Storage Secure long term information security solutions maintain a successful security roadmap predict and protect yourself from potential threats prevent a devastating security breach prevent unauthorized access to your network prioritize potential threats Real-time Cyber Security Software real time information security Recent High Profile Companies with Data Breaches reduce cyber vulnerabilities security software dashboard for your entire company security team assess risk Simple Internet Safety stay ahead of cyber security threats unintentional data leakage valuable metrics and processes verbally explain the cyber security threats victim of a cyber security breach