New SOC Talk Webinar: Optimizing Threat Intelligence to Maximize Incident Response - 12/9 at 2:00 PM EST. Register Now ➞

How to Measure and Communicate the Value of Your Security Program

ReliaQuest’s Colin O’Connor on Communicating Security’s Effectiveness

Many security professionals struggle to measure and communicate the effectiveness of their cybersecurity program. Colin O’Connor, COO of ReliaQuest, offers a new alternative to traditional metrics.

In this video interview, O’Connor discusses:

  • Why measuring cybersecurity is so hard.
  • How traditional metrics fail to translate.
  • New ways to look at visibility, metrics, and context.

Get more ReliaQuest podcasts >

O’Connor is the Chief Operating Officer for ReliaQuest, one of the fastest-growing companies in the global cybersecurity industry. Over the past 11 years with ReliaQuest, he has played a key role in nearly every area of the company, helping to architect and enhance ReliaQuest’s solutions for its customer base of Fortune 1000 companies. He is an active member of the technology and information security community and has held roles with the Tampa Bay Technology Forum, ISSA, BSides, and InfraGard.

Get your complimentary transcript of the interview below:

More resources

10 Minute-Take: Ready, Set, Automate!

In theory, automation is the perfect remedy for the security professional’s biggest headaches: manual, repetitive, time-consuming processes; inconsistent analysis and workflow; employee retention; and slow investigations and response times. It’s not a silver bullet though. To make automation work, you need to take an approach that spans the entire cyber lifecycle. That means mapping out […]

Continuous Attack Simulations

Attack simulations continuously mimic real-world threats to highlight gaps in security systems, and unlike traditional ad hoc testing, they provide an ongoing view of dynamic security environments. Can the insights from attack simulations be used to close gaps and strengthen security programs? They can, if integrated into your existing security operations. In this paper, you’ll […]