Measuring Information Security

Published On: August 29, 2016

Measuring information security is one of the most difficult tasks a security leader faces. How do you measure something that has no quantifiable definition? There just is not an accepted metric by which to measure r compare, yet this is exactly what most board members want to know. “Security leaders must begin to speak the language of the business and show forecast improvements, investments required, and track improvement based on consistent key process indicators. This is the same rigor applied to other areas of the business and information security or cyber security must transcend.” Quote taken from Michael T. Lester’s article Technology Security and the Human Condition posted on CSO online.
Check out how Michael Lester’s CSO Online article goes on to explain how Information Security is a “human problem” not a “machine problem” and how Secure Digital Solutions “TrustMAPP” platform addresses this issue. Read the full article at CSO Online.

Secure Digital Solutions (SDS) has been at the forefront of maturity-based consulting, today offering a baseline Maturity Assessment, Profile, and Plan (MAPP) to all our clients. We’ve made the three-step MAPP process rapid, reliable, and repeatable with our automation platform, TrustMAPP™.

Contact us today to begin your free trial.

TrustMAPP. Elevating Information Security.

Browse These Topics


2022 Cyber trends analyze security data findings analyze your security data Assess Company's Security Readiness automate and visualize information security risk management better understanding of their information security management company that specializes in preventing data breaches company’s Internet security corporation’s information security create a security roadmap cyber attack cybersecurity budgeting Data Security Data Security Tactics determining cyber risks developing security programs across the business Easy to Understand Data Security Solution fighting security attacks financial data stolen Good Cyber Hygiene guide development of a strong information security information protected from a Malicious Cyber Attack Information Security Best Practices information security dashboard information security management long term information security solutions maintain advanced cyber security maintain a successful security roadmap maintain the control and strength of your firm’s cyber security prevent unauthorized access to your network prioritize potential threats prioritize security functions professional information security Recent High Profile Companies with Data Breaches reduce cyber vulnerabilities reliable cyber security platform reliable information security dashboard Simple Internet Safety stay ahead of cyber security threats stay ahead of potential cyber threats strength of your company’s information security verbally explain the cyber security threats victim of a cyber security breach Visualization of Information Security Risk Management visual representation of security risk in an organization