Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Using Metrics to Keep the Network Safe

By Hessel Heerebout, Sujata Ramamoorthy
September 23, 2014

In the film Moneyball, based on the bookof the same name by Michael Lewis, the Oakland A’s Major League baseball team had a tough task: assemble a competitive team with one of the lowest budgets in the league. Desperate times call for desperate measures, and in this case, the measures were a new set of metrics. General Manager Billy Beane focused not on the typical player performance statistics but on the less-flashy metrics like slugging and on-base percentages that exert greater influence on how many runs are scored – because that is what wins games.

Many were reluctant to believe that this new data set could accurately predict performance, but the data proved to be correct. The A’s spent that season challenging the American League record for consecutive wins. By keeping their eyes squarely focused on the real problem – protecting and safeguarding their franchise’s future – the A’s used simple, meaningful metrics to manage risk, guide their operating and decision-making practices, and strengthen their brand.

Metrics Hit a Home Run

This example from baseball provides many insights into the usefulness of metrics. Good metrics have three primary attributes: consistency, cost-effectiveness and significance. A different kind of team altogether, the Cisco® Information Security (Infosec) team, applies similar fundamentals to protect Cisco IT infrastructure against attacks. One of its key governance programs, Unified Security Metrics (USM), is part of a broader CIO initiative called the Pervasive Security Accelerator (PSA).

USM’s mission includes measuring the security posture of an IT service over time, promoting continuous improvement, and providing a quarterly two-way reporting, feedback mechanism to IT service owners and leaders. Increased visibility of these security indicators provides critical system vulnerability intelligence, which can be used for preventative or prescriptive remediation; risk management and security posture assessment; improved security hygiene; and operational/business decision-making activities. More importantly, the introduction of USM represents a paradigm shift at Cisco. Security issues are now handled much more strategically than reactively, and they give organizations like IT expanded operational control and flexibility in managing their security investments, actions and processes.

As Moneyball demonstrates, meaningful metrics have the ability to solve real business problems and transform an organization. In addition, our baseball example proves that metrics do not need to be sophisticated to be meaningful. But they do need to be measured properly. The policies we use for ensuring hygiene – patching systems, building security in and managing vulnerabilities – have existed for many years. However, when we first started measuring these existing activities, very few teams were doing it well. Today, with enhanced measurement and reporting activities through USM, we’ve improved our own vulnerability on-time closure rate by 70 percent, which shows that expanded visibility motivates people to do their part.

Higher-value actionable business metrics and decision-making capabilities: that is what USM creates by combining multiple sources of individual data. These outcomes protect Cisco’s business processes, data, operational integrity and brand from attacks. For us, that’s a home run.

Measuring for Improvement

Metrics are a link in the chain of better business processes. H. James Harrington, noted author of Business Process Improvement, wrote, “Measurement is the first step that leads to control and eventually to improvement. If you can’t measure something, you can’t understand it. If you can’t understand it, you can’t control it. If you can’t control it, you can’t improve it.” Good idea, but where do you start? How do you mine data through the use of metrics in order to provide greater insight into your organization’s security posture, while simultaneously using it as a vehicle to protect your most critical assets?

There are myriad statistical data sources, including IT system logs and dashboards, for Infosec’s USM team to mine information from. In fact, early research conducted by the team identified 30 different types of meaningful data to track. Comprehensive, yes, but not feasible or sustainable to implement long-term across Cisco. The USM team’s solution centered on the primary outcomes they were trying to achieve – namely, driving security process improvement behaviors and actions within IT. Subsequently, the list was narrowed down to five key measurements:

  • Anti-malware compliance:quantifies whether malware protection software has been properly installed and is up-to-date
  • Stack compliance:measures vulnerabilities found on the TCP/IP stack (i.e., network devices, operating systems, application servers, middleware, etc.)
  • Design exceptions:measures the total number of open security exceptions, based on deviations from established security standards and best practices
  • Baseline application vulnerability assessment:computes whether automatic vulnerability system scans have been performed in accordance with Cisco policy and, if post-scan, any open security weaknesses remain
  • Deep application vulnerability assessment:computes whether penetration testing has been performed on our most business-critical applications in accordance with Cisco policy and, if post-testing, any open security weaknesses remain

Numerous benefits came from using these measurements. All were readily available, provided good quality data, and could be easily collected and correlated to existing IT service delivery success factors. A great starting point, yet how do you translate these measurements into meaningful security metrics? For USM, the data output from these baseline measurements were used to calculate two critical security metrics: (1) vulnerability, which reveals how many vulnerabilities exist in my service, and how many are infrastructure versus application related; and (2) on-time closure, which answers the question, “Are vulnerabilities closed and compliant with the team’s given Service Level Agreement?”

IT service owners were not fully convinced that these security metrics would yield quantifiable information during the early rollout phase of this program. However, when USM discovered that only 15 percent of vulnerabilities were actually closed on time, leaving Cisco exposed, IT service owners stepped up and managed to raise the rate to 85 percent within a year.

The program overcame some initial difficulties to provide real value to IT service owners. One year later, these same individuals now routinely use these metrics as part of their executive review process. Before the USM program launch, there was not much visibility into InfoSec’s security posture. IT service owners and executives incorrectly assumed that their IT systems were secure. However, USM now gives them more confidence, understanding and insight about what is actually going on within the enterprise. This enables quick diagnosis and remediation of current security issues and those to come.

(This is the first installment in a two-part series on the benefits of leveraging unified security metrics to improve responsiveness and reduce vulnerabilities across the enterprise. The second installment, on putting the metrics to use, can be read next month in the October 14 SecurityE-Newsletter).

KEYWORDS: Cisco cyber security metrics cybersecurity defense network security security metrics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Hessel Heerebout is the Program Manager of Information Security Strategy and Governance at Cisco. Heerebout leads the Cisco Unified Security Metrics program, generating security metrics for all Cisco IT services.
Sujata Ramamoorthy is Director of Global Information Security at Cisco. Ramamoorthy and her team of information security professionals partner with Cisco IT and business functions to create and adopt the most effective security technologies, policies and practices that meet the dynamically evolving business. She co-leads a multiyear, CIO-level, pervasive security initiative to create and accelerate the delivery of next-generation capabilities that will strengthen Cisco’s overall security posture.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Making Metrics Stick for Threat Management

    See More
  • Piggy bank tipped over

    How to use artificial intelligence to keep financial data safe

    See More
  • 900x550_G4S_ESRM_0006_Metrics_Report_2.jpg

    Addressing the cyber metrics challenge

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • Career Network (60 days)

  • Career Network (30 days)

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing