Measuring Information Security

Published On: August 29, 2016

Measuring information security is one of the most difficult tasks a security leader faces. How do you measure something that has no quantifiable definition? There just is not an accepted metric by which to measure r compare, yet this is exactly what most board members want to know. “Security leaders must begin to speak the language of the business and show forecast improvements, investments required, and track improvement based on consistent key process indicators. This is the same rigor applied to other areas of the business and information security or cyber security must transcend.” Quote taken from Michael T. Lester’s article Technology Security and the Human Condition posted on CSO online.
Check out how Michael Lester’s CSO Online article goes on to explain how Information Security is a “human problem” not a “machine problem” and how Secure Digital Solutions “TrustMAPP” platform addresses this issue. Read the full article at CSO Online.

Secure Digital Solutions (SDS) has been at the forefront of maturity-based consulting, today offering a baseline Maturity Assessment, Profile, and Plan (MAPP) to all our clients. We’ve made the three-step MAPP process rapid, reliable, and repeatable with our automation platform, TrustMAPP™.

Contact us today to begin your free trial.

TrustMAPP. Elevating Information Security.

Browse These Topics


boost the protection of your data bridge the gap in your information security challenges build a cyber safe firm business decisions around security Challenges Facing Chief Information Security Officers CISO program efficacy CISO program management cyber security cyber security goals Cybersecurity management Cyber Security Mistakes cybersecurity performance management cyber security platform cyber security team Effective Data Security Measures effectively communicate with board members regarding cyber issues or threats elevate your security confidence elevating information security elevating your information security levels Identify Potential Security Weaknesses Implementing a Comprehensive Cyber Security Plan Implementing Strong Cyber Security Protocols Implementing strong security software protocols improve cyber security protocols Information Security Programs information security protection agency information security risk management information security solutions information security trends managing your information security effectively maturity of your information security and privacy programs measure security levels measure your security proprietary software can help you to protect your company Protect Against Costly Security Breach Protect Customer Data Protect Cyber Network risk management advisor risks of a data breach roadmap to better information security robust security monitoring service successful information security technology advancement top notch security software for your company traveling to high risk countries