CISO KPI Dashboard

Track and improve your security program's key performance indicators

Filter by category:

Showing 33 of 33 KPIs

Mean Time to Detect

incident-response
12.5 hours

+2% from previous period

Average time between incident occurrence and detection

Mean Time to Respond

incident-response
8.5 hours

-6% from previous period

Average time between detection and containment

Security Control Coverage

operations
72%

+5% from previous period

Percentage of controls implemented vs. required

Security Incident Rate

incident-response
4.8

-10% from previous period

Number of security incidents per month

Vulnerability Remediation Time

vulnerability
12.3 days

+2% from previous period

Average days to remediate critical vulnerabilities

Security Program Maturity

operations
3.4/5

+0.2 from previous period

Overall security program maturity score

Vulnerability Management

vulnerability
84%

+6% from previous period

Effectiveness of vulnerability remediation process

Time to Patch Critical

vulnerability
5.2 days

-1.3 days from previous period

Average time to patch critical vulnerabilities

Account Hygiene

access
92%

+3% from previous period

Health of user accounts and access management

Cloud Security Posture

operations
89%

+7% from previous period

Security configuration compliance in cloud environments

Insider Threat Indicators

access
12 alerts

-2 from previous period

Monitoring of potential insider risk behaviors

Regulatory Compliance

compliance
94%

+2% from previous period

Adherence to applicable regulatory requirements

Security Incident Impact

incident-response
2.1/5

-0.3 from previous period

Business impact score of security incidents

Security Automation

operations
47%

+12% from previous period

Percentage of security processes automated

Threat Intelligence

operations
31% FP reduction

+8% from previous period

Effectiveness of threat intelligence program

Data Protection Effectiveness

data-protection
78%

+6% from previous period

Measures effectiveness of data security controls

Third-Party Risk Ratings

operations
3.6/5

+0.4 from previous period

Assessment scores of vendors based on security posture

Incident Cost

incident-response
$186K

-12% from previous period

Total financial impact of security incidents

Security Tool Efficacy

operations
76%

+8% from previous period

Effectiveness of security tools in detecting threats

Risk Reduction Over Time

operations
43%

+15% from previous period

Percentage reduction in overall security risk

Phishing Simulation Failure

awareness
8.3%

-25% from previous period

Percentage of employees who clicked on simulated phishing emails

Security Training Completion

awareness
94%

+6% from previous period

Percentage of employees who completed required security training

Patch Management Compliance

vulnerability
92%

+7% from previous period

Percentage of systems patched within SLA timeframes

Security Configuration Compliance

compliance
94.7%

+2.3% from previous period

Systems adhering to defined security baselines

Privileged Access Management

access
92.8%

+3.7% from previous period

Effectiveness of privileged account controls

Endpoint Protection Coverage

operations
98.5%

+1.2% from previous period

Endpoints with properly configured security tools

Secure SDLC Metrics

operations
87.3%

+5.6% from previous period

Security effectiveness in development process

MTBF - Security Controls

operations
97.4 days

+12.3% from previous period

Average time between security control failures

Backup and Recovery

resilience
98.9%

+1.2% from previous period

Reliability of data backup and recovery processes

Security Awareness Scores

awareness
87.3%

+5.8% from previous period

Employee security knowledge and attitudes

Security Budget Allocation

operations
9.2%

+1.3% from previous period

Security spend vs. organizational/IT budget

DLP Incident Metrics

data-protection
42 incidents

-18% from previous period

Data exfiltration attempts and false positive rates

Pentest Finding Closure Rate

vulnerability
93.7%

+4.5% from previous period

Remediation of identified vulnerabilities