Need a security road map? Ditch the ad hoc measurement
CIO
SEPTEMBER 17, 2024
Rather, they rely on ad hoc inputs such as IT audits, pentest results, one-time security assessments, risk register analysis, and a general understanding of their program. CISOs can only know the performance and maturity of their security program by actively measuring it themselves; after all, to measure is to know.
Let's personalize your content