{"id":19212,"date":"2022-12-08T16:00:00","date_gmt":"2022-12-08T15:00:00","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=19212"},"modified":"2022-12-09T16:53:14","modified_gmt":"2022-12-09T15:53:14","slug":"turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/","title":{"rendered":"Turn your dashboard into a real management asset against global cyber threats"},"content":{"rendered":"\n<p style=\"text-align: justify;\">Dashboards are an essential tool for CISOs to <strong>measure<\/strong> and <strong>control<\/strong> <strong>risks<\/strong> in their scope, to <strong>steer their projects<\/strong> and to <strong>inform their management<\/strong> of the company\u2019s cyber health evolution. However, according to Wavestone\u2019s Cyber benchmark results from 2022, 47% of companies have insufficient indicators or dashboards. In practice, indicators provide only a simple overview on a perimeter, and offer limited insights on the achievement of the company&#8217;s strategic and operational goals. If the deviations are not correctly measured, it will be complicated to deploy relevant measures of improvement, necessary to define operational priorities as well as to gather more resources in areas that are the most at risk.<\/p>\n<p style=\"text-align: justify;\">Furthermore, it would be riskier to entrust on one&#8217;s dashboards without having the reassurance offered by the indicators\u2019 relevance and reliability. This can lead to serious loss, or even to some major incidents. The crash of the Eastern Airlines 401 in 1972 is a striking example: a simple burnt-out light bulb, that was used to indicate the correct deployment of the landing gear, mobilized the entire crew, who were unable to notice in time the alarm that indicated the plane\u2019s drastic decrease in altitude. The plane crashed a few minutes later.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\"><strong>How to reconsider your indicator\u2019s base to make your dashboards more efficient and reliable? <\/strong><\/h1>\n<p>\u00a0<\/p>\n<h1 style=\"text-align: justify;\">What are dashboards, KRI, KCI?<\/h1>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">The dashboard is a <strong>synthetic<\/strong> <strong>presentation<\/strong> tool. Highlights the key trends used to facilitate decision making. It is a federating tool used to improve governance efficiency and is designed for everyone (not only for the CISO). Therefore, we refer to dashboards in plural. Each instance is defined by a unique perimeter, where there are specified: the recipients and their stakes, the review frequency, the associated governance, the indicators, the calculating methods used and the source, etc.<\/p>\n<p style=\"text-align: justify;\">Constructing a well-defined dashboard will <strong>correctly address<\/strong><strong> the business stakes<\/strong> of the dashboards\u2019 users. A three-level segmentation summarizes all the requirements in an organization:<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19249 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/1.png\" alt=\"\" width=\"906\" height=\"518\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/1.png 906w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/1-334x191.png 334w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/1-68x39.png 68w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/1-120x70.png 120w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/1-768x439.png 768w\" sizes=\"auto, (max-width: 906px) 100vw, 906px\" \/><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\"><em>Figure 1: Typologies of cyber dashboards: uses and objectives<\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">An indicator is a measurement that is collected, contextualized, and used to facilitate decision-making. It is implemented to <strong>answer a well-identified need<\/strong> by one or more departments. Depending on the purpose of the measurement, three types of indicators can be defined:<\/p>\n<ol style=\"text-align: justify;\">\n<li><strong>KPI<\/strong> (<em>Key Performance Indicator<\/em>): measures the performance of a department, a team, or a strategic plan. They are linked to strategic objectives to measure the effectiveness <em>(e.g., retention of cyber talent over the year).<\/em><\/li>\n<li><strong>KRI<\/strong> (<em>Key Risk Indicator<\/em>): assesses an identified risk, quantifying its likelihood and\/or impact at a given time. They are essential for accepting or rejecting a risk, and for controlling it over time<em> (e.g., number of compromised business identifiers &#8211; account takeover).<\/em><\/li>\n<li><strong>KCI\u00a0<\/strong><em>(Key Compliance Indicator)<\/em>: measures a compliance rate in relation to a standard (PSSI, NIST, etc.). It evaluates an organization\u2019s maturity regarding to the given standard at a specific time <em>(e.g., % of policies updated within the last year).<\/em><\/li>\n<\/ol>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\">How to make a dashboard efficient?<\/h1>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">An efficient dashboard will convey self-supporting messages to the recipients. To build it, one must meticulously construct reliable and high-performance indicators, as well as minimising their number. These are defined by making a compromise between:<\/p>\n<ul style=\"text-align: justify;\">\n<li>their <strong>relevance<\/strong> (processing purpose, i.e., the ability to trigger a discussion);<\/li>\n<li>their <strong>computational<\/strong> cost (collection time, interpretation time);<\/li>\n<li>their <strong>maintainability<\/strong> over time (sustainability of data sources).<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">Let us take an example to evaluate the effectiveness of the &#8220;security-by-design&#8221; measures, where, in this case, a relevant indicator could be: <strong><em>&#8220;rate of validation of the security report at the first iteration by project scope and criticality&#8221;<\/em><\/strong>. First, it is operationally viable (approval process provides simple data for interpretation <em>(binary values)).<\/em> It is relevant <em>(responding to a clearly identified issue),<\/em> can be easily calculated if the processes are well set up <em>(characteristic depending on the quality of the feedback information)<\/em> and it is sustainable <em>(the approval process guarantees reliable data over time). <\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">A deficient indicator base can neglect one of the three criteria. This can be seen in the following field: one can often observe <strong>clusters of indicators<\/strong>, that are inherited by tradition without any real purpose or without responding to an outdated need; or indicators that require <strong>time-consuming gathering<\/strong> that creates frustration among teams. These discrepancies can be explained by a lack of long-term strategy and a lack of importance given to these indicators.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">To rectify this, the existing system must be cleaned up and supplemented with performant indicators on a regular basis <em>(methodology detailed in section 3.1) where <\/em><strong>the management of indicators itself is just as important as the other issues<\/strong>. Therefore, it must be monitored by a dedicated sponsor within the CISO&#8217;s governance team and by <strong>dedicated monitoring indicators<\/strong> <em>(% of indicators defined with an approved calculation method, % of indicators that are fully automated, etc.)<\/em>. This central governance helps in finding compromises and minimising the number of indicators: about ten per perimeter\/program is an order of magnitude that works well.<\/p>\n<p>\u00a0<\/p>\n<h1 style=\"text-align: justify;\">Increase team engagement to get more useable data?<\/h1>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">It is not new: getting people to accept change and integrate new tools is always a tricky subject, especially for CISOs. The complexity of the environment, lack of dialogue between cyber teams and business lines, unsuitable tools, useless or unanalysed collected data, etc., represents numerous reasons that can explain a team&#8217;s lack of commitment. To address this, there are two principal areas to focus on:<\/p>\n<ol style=\"text-align: justify;\">\n<li>Engage your employees in the indicator&#8217;s life cycle;<\/li>\n<li>Facilitating the report of indicators with automation to minimize the workload.<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2>Engage employees throughout the indicator\u2019s life cycle<\/h2>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">Team&#8217;s organizational complexity and local engagement are the first challenges that need to be addressed before deploying a dashboard: information gathering requires a dialogue between lines of business that are not used to work together <em>(such as finance, IT risk management, strategy, program management, etc.)<\/em>. Involving your operational teams on a long-term basis is vital for a <strong>more reliable<\/strong> gathering and reporting process of indicators. More specifically, it allows you to:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Define more <strong>realistic<\/strong> indicators, unlocking operational sticking points (unavailable data, communication problems, etc.);<\/li>\n<li>Define and develop <strong>operational needs<\/strong> more precisely: it is necessary to arise teams\u2019 interest in the results of the project <em>(i.e., ensure that their work has a tangible impact for them)<\/em>;<\/li>\n<li><strong>Facilitate change management <\/strong>to get more reliable results overall, by understanding the purpose of the gathered indicators.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">It is necessary to involve the employees from the beginning of the process, as well as <strong>maintaining the dynamic <\/strong>throughout the indicator\u2019s operational maintenance. Transversal workshops should be organized throughout the process below, which will help in defining the indicators or generating questions.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19251 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/2.png\" alt=\"\" width=\"975\" height=\"507\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/2.png 975w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/2-367x191.png 367w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/2-71x37.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/2-768x399.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\"><em>Figure 2: Indicator life cycle and maintenance<\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Facilitate data gathering and reporting with automation and appropriate tools<\/h2>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">While manual collection provides flexibility to experiment and test new indicators, (semi-)automated collection increases the team productivity and provides more reliable data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19253 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/3.png\" alt=\"\" width=\"975\" height=\"215\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/3.png 975w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/3-437x96.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/3-71x16.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/3-768x169.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>It is not always profitable to automate everything<\/strong>, as it depends on the data nature, data volatility or data maintenance. One of the highlighted reasons can be because of the cost of automation (it takes a full year on average to automate gathering and reporting process). Therefore, scope of automation should be carefully determined.<\/p>\n<p style=\"text-align: justify;\">To scale up and automate more indicators, the<strong> corporate data culture<\/strong> needs to be improved. To reduce the cost of automation, it is necessary to have organized, referenced, and standardised data. Four measures to achieve that are:<\/p>\n<ol style=\"text-align: justify;\">\n<li>Define a corporate <strong>vision<\/strong> and <strong>objectives<\/strong> to control, reference and manage the data;<\/li>\n<li>Define <strong>policies<\/strong> and <strong>rules<\/strong> supported by top management to regulate the use and standardisation of data;<\/li>\n<li><strong>Promote a data culture<\/strong> among business teams to reflect the way data is valued and used;<\/li>\n<li>Equip ISS with <strong>tools<\/strong> to support the organization&#8217;s data policies and strategy (Master Data Management, Data catalogue, Data lineage, etc.).<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">To become data-driven, <strong>the blocking points does not require to be technological, but organizational<\/strong>, particularly in terms of skills and ability to accept changes.<\/p>\n<p style=\"text-align: justify;\">As a result, automation makes data collection &#8220;<strong>more<\/strong> <strong>liveable<\/strong>&#8221; for employees and makes the indicator\u2019s feedback more reliable over time.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\">Talking to your executives: the value of limiting the number of indicators<\/h1>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">A well-constructed dashboard is an excellent way to address and involve the Executive Committee (COMEX), even though dashboards are <strong>under-exploited<\/strong> for their &#8220;marketing&#8221; side. In 2022, 25% of companies have never solicited their Executive Committee, and only 30% of the market involves them regularly.<\/p>\n<p style=\"text-align: justify;\">The dashboard must be self-sufficient (i.e., must be understandable at first sight), able to carry impactful messages, since it is intended to be shared with as many people as possible. The Executive Committee solves problems, accepts, or rejects risks daily, monitors budgetary performance and operational efficiency, supervises of customer satisfaction and the company&#8217;s public image. To talk to the executive committee, the dashboard must <strong>bring out the necessary essentials<\/strong> required to respond specifically to the targeted issues. To do so, it is more useful to highlight specific methods and solutions rather than explaining in-depth, the causes of the technical problem (unless the need is clearly expressed).<\/p>\n<p style=\"text-align: justify;\">The purpose of presenting to management the <strong><em>\u201cratio of cyber FTEs over IT FTEs per entity\u201d<\/em><\/strong> or the <strong><em>\u201cratio of cyber budget over IT budget\u201d <\/em><\/strong>(that can be two viable approaches) is to inform and make decisions on cybersecurity resources.<\/p>\n<p style=\"text-align: justify;\">In short, the choice of indicators and their format must be adapted to the COMEX. To do so, they must:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Be focused on potential <strong>business<\/strong> <strong>impacts<\/strong>;<\/li>\n<li>Be consistent over time to have a <strong>stable indicator base<\/strong> and facilitate appropriation and understanding;<\/li>\n<li>Have a <strong>self-supporting form<\/strong> to visualize the evolution of a trend and its deviation from the set target.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\">Conclusion<\/h1>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">A dashboard is only a tool that should not be considered as an end itself. However, when properly configured and defined, it is certainly the best weapon for a CISO to make cyber governance more efficient.<\/p>\n<p style=\"text-align: justify;\">To set up or update a dashboard, there are 4 success factors to remember:<\/p>\n<ol>\n<li style=\"text-align: justify;\"><strong>Incremental<\/strong>: identifying sustainable indicators is difficult. Except for EXCOM dashboards, where an agile approach is necessary to integrate time for asking questions.<\/li>\n<li style=\"text-align: justify;\"><strong>Inclusive<\/strong>: all teams must be involved to understand the purpose of gathered indicators (and the impact on their work). This will lead to increased reliability.<\/li>\n<li style=\"text-align: justify;\"><strong>Scalable<\/strong>: the cyber ecosystem and its threats are growing exponentially. The designed dashboard needs to be flexible to consider the new risks that will arise (new KRI that needs to be implemented to the standard security base).<\/li>\n<li style=\"text-align: justify;\"><strong>Simple<\/strong>: the purpose of a dashboard is to be shared. Therefore, it must be understandable at first sight. &#8220;Keep it simple&#8221; is necessary to simplify reading and accelerate appropriation.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Dashboards are an essential tool for CISOs to measure and control risks in their scope, to steer their projects and to inform their management of the company\u2019s cyber health evolution. However, according to Wavestone\u2019s Cyber benchmark results from 2022, 47%&#8230;<\/p>\n","protected":false},"author":1450,"featured_media":19203,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3270,3977],"tags":[4201,3479,4056],"coauthors":[4199,4200],"class_list":["post-19212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy-en","category-focus","tag-dashboard","tag-indicators","tag-kpi-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Turn your dashboard into a real management asset against global cyber threats - RiskInsight<\/title>\n<meta name=\"description\" content=\"Dashboards are an essential tool for CISOs to measure and control risks in their scope, to steer their projects and to inform their management of the company\u2019s cyber health evolution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Turn your dashboard into a real management asset against global cyber threats - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Dashboards are an essential tool for CISOs to measure and control risks in their scope, to steer their projects and to inform their management of the company\u2019s cyber health evolution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-08T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-09T15:53:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/Dashboard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"810\" \/>\n\t<meta property=\"og:image:height\" content=\"591\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mathieu Bouchot, R\u00e9mi Bossuet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mathieu Bouchot, R\u00e9mi Bossuet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/\"},\"author\":{\"name\":\"Mathieu Bouchot\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e7535ad304a403d8d2ac8626239ba50a\"},\"headline\":\"Turn your dashboard into a real management asset against global cyber threats\",\"datePublished\":\"2022-12-08T15:00:00+00:00\",\"dateModified\":\"2022-12-09T15:53:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/\"},\"wordCount\":1776,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/Dashboard.jpg\",\"keywords\":[\"dashboard\",\"indicators\",\"kpi\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/\",\"name\":\"Turn your dashboard into a real management asset against global cyber threats - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/Dashboard.jpg\",\"datePublished\":\"2022-12-08T15:00:00+00:00\",\"dateModified\":\"2022-12-09T15:53:14+00:00\",\"description\":\"Dashboards are an essential tool for CISOs to measure and control risks in their scope, to steer their projects and to inform their management of the company\u2019s cyber health evolution.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/Dashboard.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/Dashboard.jpg\",\"width\":810,\"height\":591},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Turn your dashboard into a real management asset against global cyber threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e7535ad304a403d8d2ac8626239ba50a\",\"name\":\"Mathieu Bouchot\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/mathieu-bouchot\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Turn your dashboard into a real management asset against global cyber threats - RiskInsight","description":"Dashboards are an essential tool for CISOs to measure and control risks in their scope, to steer their projects and to inform their management of the company\u2019s cyber health evolution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"Turn your dashboard into a real management asset against global cyber threats - RiskInsight","og_description":"Dashboards are an essential tool for CISOs to measure and control risks in their scope, to steer their projects and to inform their management of the company\u2019s cyber health evolution.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/","og_site_name":"RiskInsight","article_published_time":"2022-12-08T15:00:00+00:00","article_modified_time":"2022-12-09T15:53:14+00:00","og_image":[{"width":810,"height":591,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/Dashboard.jpg","type":"image\/jpeg"}],"author":"Mathieu Bouchot, R\u00e9mi Bossuet","twitter_misc":{"Written by":"Mathieu Bouchot, R\u00e9mi Bossuet","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/"},"author":{"name":"Mathieu Bouchot","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e7535ad304a403d8d2ac8626239ba50a"},"headline":"Turn your dashboard into a real management asset against global cyber threats","datePublished":"2022-12-08T15:00:00+00:00","dateModified":"2022-12-09T15:53:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/"},"wordCount":1776,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/Dashboard.jpg","keywords":["dashboard","indicators","kpi"],"articleSection":["Cyberrisk Management &amp; Strategy","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/","name":"Turn your dashboard into a real management asset against global cyber threats - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/Dashboard.jpg","datePublished":"2022-12-08T15:00:00+00:00","dateModified":"2022-12-09T15:53:14+00:00","description":"Dashboards are an essential tool for CISOs to measure and control risks in their scope, to steer their projects and to inform their management of the company\u2019s cyber health evolution.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/Dashboard.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/12\/Dashboard.jpg","width":810,"height":591},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/12\/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Turn your dashboard into a real management asset against global cyber threats"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e7535ad304a403d8d2ac8626239ba50a","name":"Mathieu Bouchot","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/mathieu-bouchot\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/19212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1450"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=19212"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/19212\/revisions"}],"predecessor-version":[{"id":19255,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/19212\/revisions\/19255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/19203"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=19212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=19212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=19212"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=19212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}