Assigning Metrics

An important part of understanding how we can apply cyber intelligence in our organization is by developing metrics that highlight the progress of an end-to-end process. In this chapter, we will be looking at how we can apply a risk metric across capabilities between IT security and IT operations. We will cover:

  • Overview of security configuration management
  • Developing a risk score
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.68.18