Cyber KPI for Return on Security Investment

被引:0
|
作者
Onwubiko, Cyril [1 ]
Onwubiko, Austine [2 ]
机构
[1] Res Series Ltd, E Secur Grp, Cyber Secur Intelligence, London, England
[2] Univ West Scotland UWS, Sch Comp Engn & Phys Sci, Informat & Network Secur, Paisley, Renfrew, Scotland
关键词
Cyber KPI; Return on Security Investment; RoSI; Rol; Return on Investment; Metrics; Cyber-attack; Cyber Security; Cyber Incidents;
D O I
10.1109/cybersa.2019.8899375
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security return on investment (Rol) or return on security investment (RoSI) is extremely challenging to measure. This is partly because it is difficult to measure the actual cost of a cyber security incident or cyber security proceeds. This is further complicated by the fact that there are no consensus metrics that every organisation agrees to, and even among cyber subject matter experts, there are no set of agreed parameters or metric upon which cyber security benefits or rewards can be assessed against. One approach to demonstrating return on security investment is by producing cyber security reports of certain key performance indicators (KPI) and metrics, such as number of cyber incidents detected, number of cyberattacks or terrorist attacks that were foiled, or ongoing monitoring capabilities. These are some of the demonstratable and empirical metrics that could be used to measure RoSI. In this abstract paper, we investigate some of the cyber KPIs and metrics to be considered for cyber dashboard and reporting for RoSI.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Return on security investment against cyber attacks on availability
    Min, Byoung Joon
    Yoo, Seung Hwan
    Ryu, Jong Ho
    Seo, Dong Il
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 270 - 278
  • [2] Return on Security Investment for Cloud Platforms
    Tsalis, Nikolaos
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 132 - 137
  • [3] Decision support approaches for cyber security investment
    Fielder, Andrew
    Panaousis, Emmanouil
    Malacaria, Pasquale
    Hankin, Chris
    Smeraldi, Fabrizio
    [J]. DECISION SUPPORT SYSTEMS, 2016, 86 : 13 - 23
  • [4] The SPIDER Cyber Security Investment Component (CIC)
    Tsiodra, Maria
    Chronopoulos, Michail
    Ghering, Matthias
    Karapistoli, Eirini
    Gerosavva, Neofytos
    Kylilis, Nicolas
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 415 - 421
  • [5] Literature Review on Cyber Security Investment Decisions
    Senturk, Hakan
    Cil, Celal Zaim
    Sagiroglu, Seref
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2016, 19 (01): : 39 - 51
  • [6] Effective Security Safeguard Selection Process for Return on Security Investment
    Kim, Do Hoon
    Lee, Taek
    In, Hoh Peter
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 668 - 673
  • [7] A return on security investment model for large enterprises
    Bitz, G
    [J]. ISSE 2005 - Securing Electronic Business Processes, 2005, : 350 - 359
  • [8] What's the Return on Your Security Investment?
    UcedaVelez, Tony
    [J]. JOURNAL OF CORPORATE ACCOUNTING AND FINANCE, 2008, 19 (05): : 61 - 67
  • [9] A model of return on investment for information systems security
    Al-Humaigani, M
    Dunn, DB
    [J]. Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 483 - 485
  • [10] Integrated framework for information security investment and cyber insurance
    Wang, Shaun S.
    [J]. PACIFIC-BASIN FINANCE JOURNAL, 2019, 57