Reader small image

You're reading from  Certified Information Security Manager Exam Prep Guide - Second Edition

Product typeBook
Published inDec 2022
PublisherPackt
ISBN-139781804610633
Edition2nd Edition
Right arrow
Author (1)
Hemang Doshi
Hemang Doshi
author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi

Right arrow

Incident Management Metrics and Indicators

The effectiveness and efficiency of the incident management process can best be measured through various metrics. Metrics are measures used to track and compare the performance of various processes. Metrics are generally developed in the form of key performance indicators (KPIs) and key goal indicators (KGIs).

Key Performance Indicators and Key Goal Indicators

KPIs are generally quantifiable measures used to measure an activity. For example, the percentage of incidents detected within 24 hours. KGIs can either be quantitative or qualitative depending upon the process. KGIs are intended to show progress toward a predefined goal. For example, a goal could be to install antivirus software on all systems within 1 month. This could be monitored on a daily basis. The KGI for day 1 would be 5%, day 2 would be 10%, day 3 would be 20%, and so on. KPIs should provide value to the process owner as well as management. They should not be too complex...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Certified Information Security Manager Exam Prep Guide - Second Edition
Published in: Dec 2022Publisher: PacktISBN-13: 9781804610633

Author (1)

author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi