Does Your Security Data Mesh With Risk Metrics?
- Published on March 25, 2013
- Written by Mike McClain, Senior Web Designer & Site Manager
With so much data streaming real-time from network logs, vulnerability managers, infrastructure monitoring tools, and security appliances across the enterprise, sometimes one of the most difficult first steps IT risk managers must make in developing a security metrics program is indexing that data into a set of consistent risk scoring that makes sense in the board room.
"You've got all these different controls, they all talk about assets differently, they all present different information," says Dwayne Melancon, CTO of Tripwire. "So how do I roll that up into a small number of indicators that actually helps me develop confidence that I'm secure or my risk score is going down?"