Fall World 2014

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 27, Issue 3

Full Contents Now Available!

Does Your Security Data Mesh With Risk Metrics?

With so much data streaming real-time from network logs, vulnerability managers, infrastructure monitoring tools, and security appliances across the enterprise, sometimes one of the most difficult first steps IT risk managers must make in developing a security metrics program is indexing that data into a set of consistent risk scoring that makes sense in the board room.

"You've got all these different controls, they all talk about assets differently, they all present different information," says Dwayne Melancon, CTO of Tripwire. "So how do I roll that up into a small number of indicators that actually helps me develop confidence that I'm secure or my risk score is going down?" 

http://www.darkreading.com/risk-management/167901115/security/news/240151103/does-your-security-data-mesh-with-risk-metrics