
Why Cybersecurity Pros Need to Be Good Storytellers
Like storytelling, data visualization can be used to provide a narrative about your organization’s cybersecurity posture. Cybersecurity is never a single thing; it is an amalgamation of an often growing list of issues that never seem to end. So in order to make some sense of what it means for the health of your organization, I am combining several metrics to define a singular one—cybersecurity posture—in a visual manner.
Telling Your Cybersecurity Posture Story
So what is cybersecurity posture and how does an analytics and reporting platform like Tripwire Connect help you tell that story? I am sure you have heard the adage that a picture is worth a thousand words. Just the same, a cybersecurity metric is worth not only a thousand but several thousand vulnerabilities, unauthorized changes or compliance findings.
The security health of any organization is represented by not one but several variables defined by the organization in order of risk priority. In other words, your task is protecting what is important first and safeguarding it. In most cases, organizations look for vulnerabilities, changes to their configuration and adherence to certain compliance-related policies as key metrics to define their risk profile.
3 Types of Cybersecurity Posture
Taking these three factors (vulnerability, compliance and change) as the most important aspects of your enterprise’s security health, your overall cybersecurity posture reflects how well you fare when measuring these metrics Individually and together. In order to understand each of them, you have to go through a lot of data, reports and analysis.
- Vulnerability posture: Vulnerabilities by assets
- Compliance posture: Assets out of compliance
- Change posture: Files/documents that have changed
Questions Your Trend Data Should Answer
Tripwire Connect takes the data from your security configuration (SCM), file integrity monitoring (FIM) and vulnerability management (VM) installations and creates visual representations that give (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Baksheesh Singh Ghuman. Read the original post at: https://www.tripwire.com/state-of-security/security-awareness/tripwire-connect-cybersecurity-pros-need-good-storytellers/