Icon info
EN
https://www.antwerpmanagementschool.be/en/
Home
https://www.antwerpmanagementschool.be/en/insights
Insights
https://www.antwerpmanagementschool.be/en/blog/performance-management-in-information-security
Performance Management in Information Security
Back to overview
Picture1
Digital & IT

Performance Management in Information Security

Organizations often struggle with effective cybersecurity performance management due to the lack of standardized metrics, siloed security practices, and difficulty quantifying cybersecurity initiatives' value. Many businesses fail to tie cybersecurity performance directly to organizational goals, leading to gaps in resource allocation, risk mitigation, and strategic planning. This results in poor visibility into the effectiveness of cybersecurity measures and an inability to adapt quickly to emerging threats.
Yuri Bobbert
by Yuri Bobbert, PhD | February 21, 2025
Share item
Picture1

Introduction

Organizations often struggle with effective cybersecurity performance management due to the lack of standardized metrics, siloed security practices, and difficulty quantifying cybersecurity initiatives' value. Many businesses fail to tie cybersecurity performance directly to organizational goals, leading to gaps in resource allocation, risk mitigation, and strategic planning. This results in poor visibility into the effectiveness of cybersecurity measures and an inability to adapt quickly to emerging threats. Pironti stated, “Information security is an ever-changing and evolving activity. To have accurate visibility to these changes, an organisation must establish, maintain, monitor, interpret and report effective metrics and measures. With this, Pironti emphasises the need for clear metrics that boards of directors can understand and monitor at all time[1] and improve their Cybersecurity resilience.


[1] J. Pironti, "Developing Metrics for Effective Information Security Governance," ISACA, US, 2007

Best Practices in Cybersecurity Performance Management

Experts highlight several best practices for improving cybersecurity performance management:

  • Establish Clear Objectives: Saylor Academy defines that in order to make an objective measurable, the objective must first be defined. Align cybersecurity goals with overall business objectives to ensure that efforts directly contribute to organizational success[1].

  • Develop Meaningful Metrics: Use a mix of key performance indicators (KPIs) that address technical performance, compliance adherence, and operational risk. Metrics should be actionable, measurable, and regularly updated to reflect evolving threats.

Because of the information security objective to reduce risks, a different kind of KPI can be developed, such as KRI’s. According to ISF (2015), a KRI indicates the risk associated with an activity. A KRI can also be defined as a Key Result Indicator. This Key Result Indicator, indicates the key result expected and required, of an activity[2]. Both terms are distinguishable in definition, but both report on results. Upon analysis, Key Risk Indicators can relay a level of risk associated with an activity or simply might be a security result metric that indicates risk (e.g., the number of critical vulnerabilities in system).

  • Adopt a Risk-Based Approach: Focus on managing cybersecurity risks based on their potential impact and likelihood rather than attempting to mitigate every possible threat.
  • Leverage Automation and Technology: Implement tools to automate monitoring, reporting, and incident response to improve efficiency and accuracy in performance tracking.
  • Engage Stakeholders: Foster collaboration between IT, business units, and executive leadership to ensure buy-in and shared responsibility for cybersecurity initiatives. Jesmiatka (2009) suggests that defining KPI’s depends on three different factors. These factors are an organization's mission, processes, and stakeholders. These three factors are the variables which determine how to define effective KPI’s according to Jesmiatka’s (2009) research.[3]

  • Continuous Improvement: Regularly review and refine cybersecurity strategies and performance metrics to address emerging threats and changing business needs. Our research indicates that process improvement is important but is of low value if the process is not continuous. And for process improvement to be continuous, the process owners should be responsible for the process.


[1] Saylor Academy, „Chapter Goals and Objectives,” June 2011. [Online]. Available: https://www.saylor.org/site/wp....

[2] H. d. Koning, „Scientific grounding of lean six sigma’s methodology,” 2007. [Online]. Available: https://pure.uva.nl/ws/files/4....

[3] Jesmiatka, „Defining Key Performance indicators,” April 2009. [Online]. Available: http://edepot.wur.nl/10811.

How to Implement a Metric-Oriented Way of Working: 5 step approach

Extensive research among experts distilled a variety of security metrics and strategies to use them, in summary: [1]

1. Define Metrics Framework: Establish a structured framework for metrics that includes input, output, and outcome-based indicators. For example:

- Input Metrics: Resources allocated (e.g., budget, personnel).

- Output Metrics: Number of incidents detected and mitigated.

- Outcome Metrics: Reduction in risk exposure or business downtime.

2. Standardize (metric) Data Collection: Use standardized methods and tools to collect data, ensuring consistency and reliability in performance measurement.

3. Integrate Metrics into Decision-Making: Embed metrics into regular reporting and decision-making processes at all organizational levels, from operational teams to the boardroom. The primary goal of metrics is quantifying data to facilitate insight”[2]. Metrics should be collected with a specific improvement objective in mind. Otherwise, metrics only produce additional costs for an organization.

4. Train and Educate Teams: Train employees on the importance of metrics and how to interpret and act on them. This ensures that teams are equipped to use data-driven insights for strategic planning. Continuous improvement, as part of Total Quality Management, is implemented by executing this PDCA cycle numerous times and studying interventions to understand their effectiveness during maturing[3]. Edward Deming refers to this learning element as the PDSA cycle, a Plan-Do-Study-Act cycle, which builds deductive and inductive learning into learning and improvement cycles

5. Monitor and Adjust: Continuously monitor the effectiveness of the metrics and adjust them to stay aligned with organizational goals and the dynamic cybersecurity landscape.


[1] Y. Bobbert, Improving the Maturity of Business Information Security: On the Design and Engineering of a Business Information Security Administrative tool, Nijmegen: Radboud University, 2018.

[2] A. Jaquith, Security Metrics Replacing Fear, Uncertainty, and Doubt, Pearson Education, 2007.

[3] Y. Bobbert, Improving the Maturity of Business Information Security: On the Design and Engineering of a Business Information Security Administrative tool, Nijmegen: Radboud University, 2018.

Top 3 Recommendations

Based on this, we have developed three recommendations to establish and run a metric-based approach.

  • Align Cybersecurity Metrics with Business Goals: Ensure that cybersecurity initiatives are not only technical but also strategic, contributing directly to the organization's overall success.
  • Adopt Automation for Real-Time Monitoring: Use advanced tools and platforms to automate cybersecurity performance data collection, analysis, and reporting.
  • Foster a Culture of Continuous Improvement: Regularly review and refine cybersecurity practices and metrics to adapt to evolving threats and organizational changes.

Conclusion

Effective cybersecurity performance management is essential for organizations to navigate the complex and ever-evolving threat landscape while aligning security practices with business goals. The lack of standardized metrics, insufficient integration of cybersecurity into strategic planning, and the challenges in demonstrating the value of cybersecurity investments remain significant barriers.

Implementing best practices, including aligning cybersecurity objectives with business goals, leveraging meaningful metrics, adopting risk-based approaches, and fostering collaboration among stakeholders, is crucial to building a robust cybersecurity framework. The introduction of Key Performance Indicators (KPIs), Key Risk Indicators (KRIs), and Key Result Indicators (KRIs) offers organizations a way to quantify both risk and performance effectively. When integrated into decision-making processes, these metrics enable data-driven insights that enhance strategic and operational security initiatives.

A metric-oriented way of working provides a structured approach to managing cybersecurity performance.

Ultimately, organizations that align cybersecurity metrics with business goals, adopt real-time automation tools, and foster a culture of continuous improvement will be better positioned to manage risks effectively and drive long-term success. By embracing a metrics-driven approach, cybersecurity can evolve from a technical, ad-hoc function to a strategic enabler of business value and resilience.

Share article

About the author

Related content

Boogkeers campus AMS management school

AMS insights